Yosuke Todo

Orcid: 0000-0002-6839-4777

According to our database1, Yosuke Todo authored at least 72 papers between 2011 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Improving Linear Key Recovery Attacks using Walsh Spectrum Puncturing.
IACR Cryptol. ePrint Arch., 2024

2023
Key Committing Security of AEZ and More.
IACR Trans. Symmetric Cryptol., 2023

Keyed Sum of Permutations: a simpler RP-based PRF.
IACR Cryptol. ePrint Arch., 2023

Cryptanalysis of QARMAv2.
IACR Cryptol. ePrint Arch., 2023

2022
Hybrid Code Lifting on Space-Hard Block Ciphers Application to Yoroi and SPNbox.
IACR Trans. Symmetric Cryptol., 2022

Cryptanalysis of Rocca and Feasibility of Its Security Claim.
IACR Trans. Symmetric Cryptol., 2022

Improved Differential-Linear Attacks with Applications to ARX Ciphers.
J. Cryptol., 2022

Sycon: a new milestone in designing ASCON-like permutations.
J. Cryptogr. Eng., 2022

A Modular Approach to the Incompressibility of Block-Cipher-Based AEADs.
IACR Cryptol. ePrint Arch., 2022

SCARF: A Low-Latency Block Cipher for Secure Cache-Randomization.
IACR Cryptol. ePrint Arch., 2022

Birthday-Bound Slide Attacks on TinyJAMBU's Keyed-Permutations for All Key Sizes.
Proceedings of the Advances in Information and Computer Security, 2022

New Attacks from Old Distinguishers Improved Attacks on Serpent.
Proceedings of the Topics in Cryptology - CT-RSA 2022, 2022

2021
Modeling for Three-Subset Division Property without Unknown Subset.
J. Cryptol., 2021

Massive Superpoly Recovery with Nested Monomial Predictions.
IACR Cryptol. ePrint Arch., 2021

Strong and Tight Security Guarantees against Integral Distinguishers.
IACR Cryptol. ePrint Arch., 2021

Perfect Trees: Designing Energy-Optimal Symmetric Encryption Primitives.
IACR Cryptol. ePrint Arch., 2021

Further Improving Differential-Linear Attacks: Applications to Chaskey and Serpent.
IACR Cryptol. ePrint Arch., 2021

Designing S-Boxes Providing Stronger Security Against Differential Cryptanalysis for Ciphers Using Byte-Wise XOR.
Proceedings of the Selected Areas in Cryptography - 28th International Conference, 2021

2020
Links between Division Property and Other Cube Attack Variants.
IACR Trans. Symmetric Cryptol., 2020

Lower Bounds on the Degree of Block Ciphers.
IACR Cryptol. ePrint Arch., 2020

PRINCEv2 - More Security for (Almost) No Overhead.
IACR Cryptol. ePrint Arch., 2020

Out of Oddity - New Cryptanalytic Techniques against Symmetric Primitives Optimized for Integrity Proof Systems.
IACR Cryptol. ePrint Arch., 2020

Improved Differential-Linear Attacks with Applications to ARX Ciphers.
IACR Cryptol. ePrint Arch., 2020

GIFT-COFB.
IACR Cryptol. ePrint Arch., 2020

Modeling for Three-Subset Division Property Without Unknown Subset - Improved Cube Attacks Against Trivium and Grain-128AEAD.
Proceedings of the Advances in Cryptology - EUROCRYPT 2020, 2020

2019
Improved Division Property Based Cube Attacks Exploiting Algebraic Properties of Superpoly.
IEEE Trans. Computers, 2019

Nonlinear Invariant Attack: Practical Attack on Full SCREAM, iSCREAM, and Midori64.
J. Cryptol., 2019

Improved Integral Attack on HIGHT.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2019

On the Data Limitation of Small-State Stream Ciphers: Correlation Attacks on Fruit-80 and Plantlet.
IACR Cryptol. ePrint Arch., 2019

Zero-Correlation Attacks on Tweakable Block Ciphers with Linear Tweakey Expansion.
IACR Cryptol. ePrint Arch., 2019

2018
Cryptanalysis of AES-PRF and Its Dual.
IACR Trans. Symmetric Cryptol., 2018

Cube Attacks on Non-Blackbox Polynomials Based on Division Property.
IEEE Trans. Computers, 2018

Tight Bounds of Differentially and Linearly Active S-Boxes and Division Property of Lilliput.
IEEE Trans. Computers, 2018

On the Complexity of Impossible Differential Cryptanalysis.
Secur. Commun. Networks, 2018

On the Design Rationale of SIMON Block Cipher: Integral Attacks and Impossible Differential Attacks against SIMON Variants.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2018

Fast Correlation Attack Revisited -Cryptanalysis on Full Grain-128a, Grain-128, and Grain-v1.
IACR Cryptol. ePrint Arch., 2018

Programming the Demirci-Selçuk Meet-in-the-Middle Attack with Constraints.
IACR Cryptol. ePrint Arch., 2018

Observations on the Dynamic Cube Attack of 855-Round TRIVIUM from Crypto'18.
IACR Cryptol. ePrint Arch., 2018

Several MILP-Aided Attacks Against SNOW 2.0.
Proceedings of the Cryptology and Network Security - 17th International Conference, 2018

2017
MILP Modeling for (Large) S-boxes to Optimize Probability of Differential Characteristics.
IACR Trans. Symmetric Cryptol., 2017

Integral Cryptanalysis on Full MISTY1.
J. Cryptol., 2017

Improved Division Property Based Cube Attacks Exploiting Algebraic Properties of Superpoly.
IACR Cryptol. ePrint Arch., 2017

Analysis of AES, SKINNY, and Others with Constraint Programming.
IACR Cryptol. ePrint Arch., 2017

Gimli: a cross-platform permutation.
IACR Cryptol. ePrint Arch., 2017

GIFT: A Small Present.
IACR Cryptol. ePrint Arch., 2017

New Algorithm for Modeling S-box in MILP Based Differential and Division Trail Search.
Proceedings of the Innovative Security Solutions for Information Technology and Communications, 2017

Analyzing Key Schedule of Simon: Iterative Key Differences and Application to Related-Key Impossible Differentials.
Proceedings of the Advances in Information and Computer Security, 2017

New Impossible Differential Search Tool from Design and Cryptanalysis Aspects - Revealing Structural Properties of Several Ciphers.
Proceedings of the Advances in Cryptology - EUROCRYPT 2017 - 36th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Paris, France, April 30, 2017

GIFT: A Small Present - Towards Reaching the Limit of Lightweight Encryption.
Proceedings of the Cryptographic Hardware and Embedded Systems - CHES 2017, 2017

Low-Data Complexity Attacks on Camellia.
Proceedings of the Applications and Techniques in Information Security, 2017

2016
Impossible Differential Attack against 14-Round <i>Piccolo</i>-80 without Relying on Full Code Book.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2016

Efficient Implementations for Practical Linear Cryptanalysis and Its Application to FEAL-8X.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2016

Bit-Based Division Property and Application to Simon Family.
IACR Cryptol. ePrint Arch., 2016

New Impossible Differential Search Tool from Design and Cryptanalysis Aspects.
IACR Cryptol. ePrint Arch., 2016

New Differential Bounds and Division Property of Lilliput: Block Cipher with Extended Generalized Feistel Network.
Proceedings of the Selected Areas in Cryptography - SAC 2016, 2016

Division Property: Efficient Method to Estimate Upper Bound of Algebraic Degree.
Proceedings of the Paradigms in Cryptology - Mycrypt 2016. Malicious and Exploratory Cryptology, 2016

Compact Representation for Division Property.
Proceedings of the Cryptology and Network Security - 15th International Conference, 2016

New Conditional Differential Cryptanalysis for NLFSR-based Stream Ciphers and Application to Grain v1.
Proceedings of the 11th Asia Joint Conference on Information Security, 2016

Wide Trail Design Strategy for Binary MixColumns - Enhancing Lower Bound of Number of Active S-boxes.
Proceedings of the Applied Cryptography and Network Security, 2016

2015
Fast Fourier Transform Key Recovery for Integral Attacks.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2015

Upper Bounds for the Security of Several Feistel Networks.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2015

Structural Evaluation by Generalized Integral Property.
IACR Cryptol. ePrint Arch., 2015

2014
Cryptanalysis of Reduced-round SIMON32 and SIMON48.
IACR Cryptol. ePrint Arch., 2014

FFT-Based Key Recovery for the Integral Attack.
IACR Cryptol. ePrint Arch., 2014

Practical Cryptanalysis of a Public-Key Encryption Scheme Based on New Multivariate Quadratic Assumptions.
Proceedings of the Public-Key Cryptography - PKC 2014, 2014

How Much Can Complexity of Linear Cryptanalysis Be Reduced?
Proceedings of the Information Security and Cryptology - ICISC 2014, 2014

FFT Key Recovery for Integral Attack.
Proceedings of the Cryptology and Network Security - 13th International Conference, 2014

2013
Cryptanalysis of the Huang-Liu-Yang Cryptosystem from PKC 2012.
IACR Cryptol. ePrint Arch., 2013

New Property of Diffusion Switching Mechanism on CLEFIA and Its Application to DFA.
Proceedings of the Advances in Information and Computer Security, 2013

2012
Falsification Attacks against WPA-TKIP in a Realistic Environment.
IEICE Trans. Inf. Syst., 2012

Proposal of a Secure WEP Operation against Existing Key Recovery Attacks and its Evaluation.
Proceedings of the Seventh Asia Joint Conference on Information Security, 2012

2011
Cryptanalysis for RC4 and Breaking WEP/WPA-TKIP.
IEICE Trans. Inf. Syst., 2011


  Loading...