Kosei Sakamoto

According to our database1, Kosei Sakamoto authored at least 31 papers between 2020 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Exploring the optimality of byte-wise permutations of a piccolo-type block cipher.
Inf. Process. Lett., February, 2024

Gleeok: A Family of Low-Latency PRFs and its Applications to Authenticated Encryption.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2024

2023
Bit-level evaluation of piccolo block cipher by satisfiability problem solver.
IET Inf. Secur., July, 2023

MILP-based security evaluation for AEGIS/Tiaoxin-346/Rocca.
IET Inf. Secur., May, 2023

Security Evaluation of Initialization Phases and Round Functions of Rocca and AEGIS.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., March, 2023

Areion: Highly-Efficient Permutations and Its Applications to Hash Functions for Short Input.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2023

On Optimality of the Round Function of Rocca.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2023

An Efficient Strategy to Construct a Better Differential on Multiple-Branch-Based Designs: Application to Orthros.
IACR Cryptol. ePrint Arch., 2023

Parallel SAT Framework to Find Clustering of Differential Characteristics and Its Applications.
IACR Cryptol. ePrint Arch., 2023

Areion: Highly-Efficient Permutations and Its Applications (Extended Version).
IACR Cryptol. ePrint Arch., 2023

BAKSHEESH: Similar Yet Different From GIFT.
IACR Cryptol. ePrint Arch., 2023

An Ultra-High Throughput AES-Based Authenticated Encryption Scheme for 6G: Design and Implementation.
Proceedings of the Computer Security - ESORICS 2023, 2023

Ghidle: Efficient Large-State Block Ciphers for Post-quantum Security.
Proceedings of the Information Security and Privacy - 28th Australasian Conference, 2023

2022
Distinguishing and key recovery attacks on the reduced-round SNOW-V and SNOW-Vi.
J. Inf. Secur. Appl., 2022

Integral and impossible-differential attacks on the reduced-round Lesamnta-LW-BC.
IET Inf. Secur., 2022

Efficient constructions for large-state block ciphers based on AES New Instructions.
IET Inf. Secur., 2022

Applying Byte-Shuffling to CLEFIA-Type Structure.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2022

Design of a Linear Layer for a Block Cipher Based on Type-2 Generalized Feistel Network with 32 Branches.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2022

Rocca: An Efficient AES-based Encryption Scheme for Beyond 5G (Full version).
IACR Cryptol. ePrint Arch., 2022

2021
Rocca: An Efficient AES-based Encryption Scheme for Beyond 5G.
IACR Trans. Symmetric Cryptol., 2021

Bit-wise cryptanalysis on AND-RX permutation Friet-PC.
J. Inf. Secur. Appl., 2021

Practical Integral Distinguishers on SNOW 3G and KCipher-2.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2021

MILP-Aided Security Evaluation of Differential Attacks on KCipher-2.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2021

Weak Keys in Reduced AEGIS and Tiaoxin.
IACR Cryptol. ePrint Arch., 2021

Distinguishing and Key Recovery Attacks on the Reduced-Round SNOW-V.
IACR Cryptol. ePrint Arch., 2021

Atom: A Stream Cipher with Double Key Filter.
IACR Cryptol. ePrint Arch., 2021

Orthros: A Low-Latency PRF.
IACR Cryptol. ePrint Arch., 2021

2020
Tweakable TWINE: Building a Tweakable Block Cipher on Generalized Feistel Structure.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2020

Security of Related-Key Differential Attacks on TWINE, Revisited.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2020

WARP : Revisiting GFN for Lightweight 128-bit Block Cipher.
IACR Cryptol. ePrint Arch., 2020

Galaxy: A Family of Stream-Cipher-Based Space-Hard Ciphers.
Proceedings of the Information Security and Privacy - 25th Australasian Conference, 2020


  Loading...