Ryoma Ito

Orcid: 0000-0002-4929-8974

Affiliations:
  • Security Fundamentals Laboratory, National Institute of Information and Communications Technology (NICT), Japan


According to our database1, Ryoma Ito authored at least 29 papers between 2014 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
PNB Based Differential Cryptanalysis of Salsa20 and ChaCha.
IEICE Trans. Inf. Syst., September, 2023

Key Committing Security of AEZ and More.
IACR Trans. Symmetric Cryptol., 2023

Areion: Highly-Efficient Permutations and Its Applications to Hash Functions for Short Input.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2023

A Deeper Look into Deep Learning-based Output Prediction Attacks Using Weak SPN Block Ciphers.
J. Inf. Process., 2023

Cryptanalysis on End-to-End Encryption Schemes of Communication Tools and Its Research Trend.
J. Inf. Process., 2023

Parallel SAT Framework to Find Clustering of Differential Characteristics and Its Applications.
IACR Cryptol. ePrint Arch., 2023

Areion: Highly-Efficient Permutations and Its Applications (Extended Version).
IACR Cryptol. ePrint Arch., 2023

2022
New Cryptanalysis of ZUC-256 Initialization Using Modular Differences.
IACR Trans. Symmetric Cryptol., 2022

Cryptanalysis of Rocca and Feasibility of Its Security Claim.
IACR Trans. Symmetric Cryptol., 2022

Distinguishing and key recovery attacks on the reduced-round SNOW-V and SNOW-Vi.
J. Inf. Secur. Appl., 2022

Output Prediction Attacks on Block Ciphers Using Deep Learning.
Proceedings of the Applied Cryptography and Network Security Workshops, 2022

PNB-Focused Differential Cryptanalysis of ChaCha Stream Cipher.
Proceedings of the Information Security and Privacy - 27th Australasian Conference, 2022

2021
Bit-wise cryptanalysis on AND-RX permutation Friet-PC.
J. Inf. Secur. Appl., 2021

New Iterated RC4 Key Correlations and their Application to Plaintext Recovery on WPA-TKIP.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2021

PNB-based Differential Cryptanalysis of ChaCha Stream Cipher.
IACR Cryptol. ePrint Arch., 2021

Finding Practical Distinguishers for ZUC-256 Using Modular Differences.
IACR Cryptol. ePrint Arch., 2021

Security Analysis of SFrame.
IACR Cryptol. ePrint Arch., 2021

Distinguishing and Key Recovery Attacks on the Reduced-Round SNOW-V.
IACR Cryptol. ePrint Arch., 2021

State-free End-to-End Encrypted Storage and Chat Systems based on Searchable Encryption.
IACR Cryptol. ePrint Arch., 2021

Output Prediction Attacks on SPN Block Ciphers using Deep Learning.
IACR Cryptol. ePrint Arch., 2021

Security Analysis of End-to-End Encryption for Zoom Meetings.
IEEE Access, 2021

2020
Rotational Cryptanalysis of Salsa Core Function.
Proceedings of the Information Security - 23rd International Conference, 2020

2018
New Iterated RC4 Key Correlations.
Proceedings of the Information Security and Privacy - 23rd Australasian Conference, 2018

2017
Refined Construction of RC4 Key Setting in WPA.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2017

2016
Refined RC4 Key Correlations of Internal States in WPA.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2016

Refined Glimpse Correlations of RC4.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2016

2015
New Linear Correlations Related to State Information of RC4 PRGA Using IV in WPA.
Proceedings of the Fast Software Encryption - 22nd International Workshop, 2015

How TKIP Induces Biases of Internal States of Generic RC4.
Proceedings of the Information Security and Privacy - 20th Australasian Conference, 2015

2014
New Integrated Long-Term Glimpse of RC4.
Proceedings of the Information Security Applications - 15th International Workshop, 2014


  Loading...