Yosuke Todo

According to our database1, Yosuke Todo authored at least 47 papers between 2011 and 2019.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

Homepages:

On csauthors.net:

Bibliography

2019
Improved Division Property Based Cube Attacks Exploiting Algebraic Properties of Superpoly.
IEEE Trans. Computers, 2019

Nonlinear Invariant Attack: Practical Attack on Full SCREAM, iSCREAM, and Midori64.
J. Cryptology, 2019

Improved Integral Attack on HIGHT.
IEICE Transactions, 2019

On the Data Limitation of Small-State Stream Ciphers: Correlation Attacks on Fruit-80 and Plantlet.
IACR Cryptology ePrint Archive, 2019

Zero-Correlation Attacks on Tweakable Block Ciphers with Linear Tweakey Expansion.
IACR Cryptology ePrint Archive, 2019

2018
Cryptanalysis of AES-PRF and Its Dual.
IACR Trans. Symmetric Cryptol., 2018

Cube Attacks on Non-Blackbox Polynomials Based on Division Property.
IEEE Trans. Computers, 2018

Tight Bounds of Differentially and Linearly Active S-Boxes and Division Property of Lilliput.
IEEE Trans. Computers, 2018

On the Complexity of Impossible Differential Cryptanalysis.
Security and Communication Networks, 2018

On the Design Rationale of SIMON Block Cipher: Integral Attacks and Impossible Differential Attacks against SIMON Variants.
IEICE Transactions, 2018

Fast Correlation Attack Revisited -Cryptanalysis on Full Grain-128a, Grain-128, and Grain-v1.
IACR Cryptology ePrint Archive, 2018

Programming the Demirci-Selçuk Meet-in-the-Middle Attack with Constraints.
IACR Cryptology ePrint Archive, 2018

Observations on the Dynamic Cube Attack of 855-Round TRIVIUM from Crypto'18.
IACR Cryptology ePrint Archive, 2018

Several MILP-Aided Attacks Against SNOW 2.0.
Proceedings of the Cryptology and Network Security - 17th International Conference, 2018

2017
MILP Modeling for (Large) S-boxes to Optimize Probability of Differential Characteristics.
IACR Trans. Symmetric Cryptol., 2017

Integral Cryptanalysis on Full MISTY1.
J. Cryptology, 2017

Improved Division Property Based Cube Attacks Exploiting Algebraic Properties of Superpoly.
IACR Cryptology ePrint Archive, 2017

Analysis of AES, SKINNY, and Others with Constraint Programming.
IACR Cryptology ePrint Archive, 2017

Gimli: a cross-platform permutation.
IACR Cryptology ePrint Archive, 2017

GIFT: A Small Present.
IACR Cryptology ePrint Archive, 2017

New Algorithm for Modeling S-box in MILP Based Differential and Division Trail Search.
Proceedings of the Innovative Security Solutions for Information Technology and Communications, 2017

Analyzing Key Schedule of Simon: Iterative Key Differences and Application to Related-Key Impossible Differentials.
Proceedings of the Advances in Information and Computer Security, 2017

New Impossible Differential Search Tool from Design and Cryptanalysis Aspects - Revealing Structural Properties of Several Ciphers.
Proceedings of the Advances in Cryptology - EUROCRYPT 2017 - 36th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Paris, France, April 30, 2017

GIFT: A Small Present - Towards Reaching the Limit of Lightweight Encryption.
Proceedings of the Cryptographic Hardware and Embedded Systems - CHES 2017, 2017

Low-Data Complexity Attacks on Camellia.
Proceedings of the Applications and Techniques in Information Security, 2017

2016
Impossible Differential Attack against 14-Round Piccolo-80 without Relying on Full Code Book.
IEICE Transactions, 2016

Efficient Implementations for Practical Linear Cryptanalysis and Its Application to FEAL-8X.
IEICE Transactions, 2016

Bit-Based Division Property and Application to Simon Family.
IACR Cryptology ePrint Archive, 2016

New Impossible Differential Search Tool from Design and Cryptanalysis Aspects.
IACR Cryptology ePrint Archive, 2016

New Differential Bounds and Division Property of Lilliput: Block Cipher with Extended Generalized Feistel Network.
Proceedings of the Selected Areas in Cryptography - SAC 2016, 2016

Division Property: Efficient Method to Estimate Upper Bound of Algebraic Degree.
Proceedings of the Paradigms in Cryptology - Mycrypt 2016. Malicious and Exploratory Cryptology, 2016

Compact Representation for Division Property.
Proceedings of the Cryptology and Network Security - 15th International Conference, 2016

New Conditional Differential Cryptanalysis for NLFSR-based Stream Ciphers and Application to Grain v1.
Proceedings of the 11th Asia Joint Conference on Information Security, 2016

Wide Trail Design Strategy for Binary MixColumns - Enhancing Lower Bound of Number of Active S-boxes.
Proceedings of the Applied Cryptography and Network Security, 2016

2015
Fast Fourier Transform Key Recovery for Integral Attacks.
IEICE Transactions, 2015

Upper Bounds for the Security of Several Feistel Networks.
IEICE Transactions, 2015

Structural Evaluation by Generalized Integral Property.
IACR Cryptology ePrint Archive, 2015

2014
Cryptanalysis of Reduced-round SIMON32 and SIMON48.
IACR Cryptology ePrint Archive, 2014

FFT-Based Key Recovery for the Integral Attack.
IACR Cryptology ePrint Archive, 2014

Practical Cryptanalysis of a Public-Key Encryption Scheme Based on New Multivariate Quadratic Assumptions.
Proceedings of the Public-Key Cryptography - PKC 2014, 2014

How Much Can Complexity of Linear Cryptanalysis Be Reduced?
Proceedings of the Information Security and Cryptology - ICISC 2014, 2014

FFT Key Recovery for Integral Attack.
Proceedings of the Cryptology and Network Security - 13th International Conference, 2014

2013
Cryptanalysis of the Huang-Liu-Yang Cryptosystem from PKC 2012.
IACR Cryptology ePrint Archive, 2013

New Property of Diffusion Switching Mechanism on CLEFIA and Its Application to DFA.
Proceedings of the Advances in Information and Computer Security, 2013

2012
Falsification Attacks against WPA-TKIP in a Realistic Environment.
IEICE Transactions, 2012

Proposal of a Secure WEP Operation against Existing Key Recovery Attacks and its Evaluation.
Proceedings of the Seventh Asia Joint Conference on Information Security, 2012

2011
Cryptanalysis for RC4 and Breaking WEP/WPA-TKIP.
IEICE Transactions, 2011


  Loading...