Ryoma Ito

Orcid: 0000-0002-4929-8974

Affiliations:
  • Security Fundamentals Laboratory, National Institute of Information and Communications Technology (NICT), Japan


According to our database1, Ryoma Ito authored at least 34 papers between 2014 and 2025.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2025
Divide-and-Conquer SAT for Exploring Optimal Differential and Linear Characteristics and Its Applications.
IACR Trans. Symmetric Cryptol., 2025

Exploring SHA Instructions and Its Application to AES-based Schemes.
IACR Commun. Cryptol., 2025

Not in The Prophecies: Practical Attacks on Nostr.
Proceedings of the 10th IEEE European Symposium on Security and Privacy, 2025

2024
On the Effects of Neural Network-Based Output Prediction Attacks on the Design of Symmetric-Key Ciphers.
Proceedings of the Cyber Security, Cryptology, and Machine Learning, 2024

Key Collisions on AES and Its Applications.
Proceedings of the Advances in Cryptology - ASIACRYPT 2024, 2024

2023
PNB Based Differential Cryptanalysis of Salsa20 and ChaCha.
IEICE Trans. Inf. Syst., September, 2023

Key Committing Security of AEZ and More.
IACR Trans. Symmetric Cryptol., 2023

Areion: Highly-Efficient Permutations and Its Applications to Hash Functions for Short Input.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2023

A Deeper Look into Deep Learning-based Output Prediction Attacks Using Weak SPN Block Ciphers.
J. Inf. Process., 2023

Cryptanalysis on End-to-End Encryption Schemes of Communication Tools and Its Research Trend.
J. Inf. Process., 2023

Areion: Highly-Efficient Permutations and Its Applications (Extended Version).
IACR Cryptol. ePrint Arch., 2023

Parallel SAT Framework to Find Clustering of Differential Characteristics and Its Applications.
Proceedings of the Selected Areas in Cryptography - SAC 2023, 2023

2022
New Cryptanalysis of ZUC-256 Initialization Using Modular Differences.
IACR Trans. Symmetric Cryptol., 2022

Cryptanalysis of Rocca and Feasibility of Its Security Claim.
IACR Trans. Symmetric Cryptol., 2022

Distinguishing and key recovery attacks on the reduced-round SNOW-V and SNOW-Vi.
J. Inf. Secur. Appl., 2022

State-free End-to-End Encrypted Storage and Chat Systems based on Searchable Encryption.
Proceedings of the 24th International Conference on Enterprise Information Systems, 2022

Output Prediction Attacks on Block Ciphers Using Deep Learning.
Proceedings of the Applied Cryptography and Network Security Workshops, 2022

PNB-Focused Differential Cryptanalysis of ChaCha Stream Cipher.
Proceedings of the Information Security and Privacy - 27th Australasian Conference, 2022

2021
Bit-wise cryptanalysis on AND-RX permutation Friet-PC.
J. Inf. Secur. Appl., 2021

New Iterated RC4 Key Correlations and their Application to Plaintext Recovery on WPA-TKIP.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2021

PNB-based Differential Cryptanalysis of ChaCha Stream Cipher.
IACR Cryptol. ePrint Arch., 2021

Finding Practical Distinguishers for ZUC-256 Using Modular Differences.
IACR Cryptol. ePrint Arch., 2021

Output Prediction Attacks on SPN Block Ciphers using Deep Learning.
IACR Cryptol. ePrint Arch., 2021

Security Analysis of SFrame.
Proceedings of the Computer Security - ESORICS 2021, 2021

Security Analysis of End-to-End Encryption for Zoom Meetings.
Proceedings of the Information Security and Privacy - 26th Australasian Conference, 2021

Distinguishing and Key Recovery Attacks on the Reduced-Round SNOW-V.
Proceedings of the Information Security and Privacy - 26th Australasian Conference, 2021

2020
Rotational Cryptanalysis of Salsa Core Function.
Proceedings of the Information Security - 23rd International Conference, 2020

2018
New Iterated RC4 Key Correlations.
Proceedings of the Information Security and Privacy - 23rd Australasian Conference, 2018

2017
Refined Construction of RC4 Key Setting in WPA.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2017

2016
Refined RC4 Key Correlations of Internal States in WPA.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2016

Refined Glimpse Correlations of RC4.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2016

2015
New Linear Correlations Related to State Information of RC4 PRGA Using IV in WPA.
Proceedings of the Fast Software Encryption - 22nd International Workshop, 2015

How TKIP Induces Biases of Internal States of Generic RC4.
Proceedings of the Information Security and Privacy - 20th Australasian Conference, 2015

2014
New Integrated Long-Term Glimpse of RC4.
Proceedings of the Information Security Applications - 15th International Workshop, 2014


  Loading...