The SKINNY Family of Block Ciphers and Its Low-Latency Variant MANTIS C Beierle, J Jean, S Kölbl, G Leander, A Moradi, T Peyrin, Y Sasaki, ... Advances in Cryptology–CRYPTO 2016: 36th Annual International Cryptology …, 2016 | 810 | 2016 |
GIFT: A Small Present: Towards Reaching the Limit of Lightweight Encryption S Banik, SK Pandey, T Peyrin, Y Sasaki, SM Sim, Y Todo Cryptographic Hardware and Embedded Systems–CHES 2017: 19th International …, 2017 | 594 | 2017 |
Finding preimages in full MD5 faster than exhaustive search Y Sasaki, K Aoki Advances in Cryptology-EUROCRYPT 2009: 28th Annual International Conference …, 2009 | 257 | 2009 |
New impossible differential search tool from design and cryptanalysis aspects: Revealing structural properties of several ciphers Y Sasaki, Y Todo Advances in Cryptology–EUROCRYPT 2017: 36th Annual International Conference …, 2017 | 219 | 2017 |
Boomerang connectivity table: a new cryptanalysis tool C Cid, T Huang, T Peyrin, Y Sasaki, L Song Advances in Cryptology–EUROCRYPT 2018: 37th Annual International Conference …, 2018 | 209 | 2018 |
Preimage attacks on one-block MD4, 63-step MD5 and more K Aoki, Y Sasaki Selected Areas in Cryptography: 15th International Workshop, SAC 2008 …, 2009 | 199 | 2009 |
Preimages for step-reduced SHA-2 K Aoki, J Guo, K Matusiewicz, Y Sasaki, L Wang Advances in Cryptology–ASIACRYPT 2009: 15th International Conference on the …, 2009 | 147 | 2009 |
Meet-in-the-middle preimage attacks against reduced SHA-0 and SHA-1 K Aoki, Y Sasaki Advances in Cryptology-CRYPTO 2009: 29th Annual International Cryptology …, 2009 | 144 | 2009 |
MILP modeling for (large) s-boxes to optimize probability of differential characteristics A Abdelkhalek, Y Sasaki, Y Todo, M Tolba, AM Youssef IACR Transactions on Symmetric Cryptology, 99-129, 2017 | 142 | 2017 |
Quantum attacks without superposition queries: the offline Simon’s algorithm X Bonnetain, A Hosoyamada, M Naya-Plasencia, Y Sasaki, ... International Conference on the Theory and Application of Cryptology and …, 2019 | 129 | 2019 |
Cryptanalysis of reduced-round SIMON32 and SIMON48 Q Wang, Z Liu, K Varıcı, Y Sasaki, V Rijmen, Y Todo Progress in Cryptology--INDOCRYPT 2014: 15th International Conference on …, 2014 | 127 | 2014 |
Nonlinear invariant attack: Practical attack on full scream, i scream, and midori 64 Y Todo, G Leander, Y Sasaki International Conference on the Theory and Application of Cryptology and …, 2016 | 126 | 2016 |
Meet-in-the-middle preimage attacks on AES hashing modes and an application to whirlpool Y Sasaki IEICE Transactions on Fundamentals of Electronics, Communications and …, 2013 | 101 | 2013 |
Quantum Demiric-Selçuk meet-in-the-middle attacks: applications to 6-round generic Feistel constructions A Hosoyamada, Y Sasaki Security and Cryptography for Networks: 11th International Conference, SCN …, 2018 | 100 | 2018 |
Gift-cofb S Banik, A Chakraborti, A Inoue, T Iwata, K Minematsu, M Nandi, T Peyrin, ... Cryptology ePrint Archive, 2020 | 92 | 2020 |
Finding hash collisions with quantum computers by using differential trails with smaller probability than birthday bound A Hosoyamada, Y Sasaki Advances in Cryptology–EUROCRYPT 2020: 39th Annual International Conference …, 2020 | 90 | 2020 |
New algorithm for modeling S-box in MILP based differential and division trail search Y Sasaki, Y Todo Innovative Security Solutions for Information Technology and Communications …, 2017 | 83 | 2017 |
Meet-in-the-middle technique for integral attacks against feistel ciphers Y Sasaki, L Wang Selected Areas in Cryptography: 19th International Conference, SAC 2012 …, 2013 | 80 | 2013 |
Quantum chosen-ciphertext attacks against Feistel ciphers G Ito, A Hosoyamada, R Matsumoto, Y Sasaki, T Iwata Topics in Cryptology–CT-RSA 2019: The Cryptographers' Track at the RSA …, 2019 | 79 | 2019 |
Out of oddity–new cryptanalytic techniques against symmetric primitives optimized for integrity proof systems T Beyne, A Canteaut, I Dinur, M Eichlseder, G Leander, G Leurent, ... Advances in Cryptology–CRYPTO 2020: 40th Annual International Cryptology …, 2020 | 72 | 2020 |