Yosuke Todo
Yosuke Todo
NTT Secure Platform Laboratories
Bestätigte E-Mail-Adresse bei hco.ntt.co.jp
Titel
Zitiert von
Zitiert von
Jahr
GIFT: A Small Present
S Banik, SK Pandey, T Peyrin, Y Sasaki, SM Sim, Y Todo
International Conference on Cryptographic Hardware and Embedded Systems, 321-345, 2017
2042017
Structural evaluation by generalized integral property
Y Todo
Annual International Conference on the Theory and Applications of …, 2015
1812015
Bit-based division property and application to Simon family
Y Todo, M Morii
International Conference on Fast Software Encryption, 357-377, 2016
1142016
Integral cryptanalysis on full MISTY1
Y Todo
Journal of Cryptology 30 (3), 920-959, 2017
1042017
Cryptanalysis of reduced-round SIMON32 and SIMON48
Q Wang, Z Liu, K Varıcı, Y Sasaki, V Rijmen, Y Todo
International Conference on Cryptology in India, 143-160, 2014
972014
New impossible differential search tool from design and cryptanalysis aspects
Y Sasaki, Y Todo
Annual International Conference on the Theory and Applications of …, 2017
902017
Cube attacks on non-blackbox polynomials based on division property
Y Todo, T Isobe, Y Hao, W Meier
IEEE Transactions on Computers 67 (12), 1720-1736, 2018
772018
Nonlinear Invariant Attack: Practical Attack on Full SCREAM, i SCREAM, and Midori 64
Y Todo, G Leander, Y Sasaki
Journal of Cryptology 32 (4), 1383-1422, 2019
76*2019
Gimli: a cross-platform permutation
DJ Bernstein, S Kölbl, S Lucks, PMC Massolino, F Mendel, K Nawaz, ...
International Conference on Cryptographic Hardware and Embedded Systems, 299-320, 2017
582017
Minalpher v1
Y Sasaki, Y Todo, K Aoki, Y Naito, T Sugawara, Y Murakami, M Matsui, ...
CAESAR Round 1, 2014
49*2014
Improved division property based cube attacks exploiting algebraic properties of superpoly
Y Hao, T Isobe, L Jiao, C Li, W Meier, Y Todo, Q Wang
IEEE Transactions on Computers 68 (10), 2019
442019
MILP modeling for (large) s-boxes to optimize probability of differential characteristics
A Abdelkhalek, Y Sasaki, Y Todo, M Tolba, AM Youssef
IACR Transactions on Symmetric Cryptology, 99-129, 2017
422017
Analysis of AES, SKINNY, and others with constraint programming
S Sun, D Gerault, P Lafourcade, Q Yang, Y Todo, K Qiao, L Hu
IACR Transactions on Symmetric Cryptology 2017 (1), 281--306, 2017
422017
Falsification attacks against WPA-TKIP in a realistic environment
Y Todo, Y Ozawa, T Ohigashi, M Morii
IEICE TRANSACTIONS on Information and Systems 95 (2), 588-595, 2012
242012
On the design rationale of SIMON block cipher: Integral attacks and impossible differential attacks against SIMON variants
K Kondo, Y Sasaki, Y Todo, T Iwata
IEICE Transactions on Fundamentals of Electronics, Communications and …, 2018
192018
Fast correlation attack revisited
Y Todo, T Isobe, W Meier, K Aoki, B Zhang
Annual International Cryptology Conference, 129-159, 2018
182018
Fast Fourier Transform Key Recovery for Integral Attacks
Y Todo, K Aoki
IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and …, 2015
15*2015
Cryptanalysis for rc4 and breaking wep/wpa-tkip
M Morii, Y Todo
IEICE TRANSACTIONS on Information and Systems 94 (11), 2087-2094, 2011
142011
New algorithm for modeling S-box in MILP based differential and division trail search
Y Sasaki, Y Todo
International Conference for Information Technology and Communications, 150-165, 2017
132017
New Differential Bounds and Division Property of Lilliput: Block Cipher with Extended Generalized Feistel Network
Y Sasaki, Y Todo
International Conference on Selected Areas in Cryptography, 264-283, 2016
132016
Das System kann den Vorgang jetzt nicht ausführen. Versuchen Sie es später erneut.
Artikel 1–20