Yu Sasaki

Orcid: 0000-0002-8539-3725

According to our database1, Yu Sasaki authored at least 189 papers between 2005 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
KIVR: Committing Authenticated Encryption Using Redundancy and Application to GCM, CCM, and More.
Proceedings of the Applied Cryptography and Network Security, 2024

2023
Committing Security of Ascon: Cryptanalysis on Primitive and Proof on Mode.
IACR Trans. Symmetric Cryptol., 2023

MMM: Authenticated Encryption with Minimum Secret State for Masking.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2023

Permutation-Based Deterministic Authenticated Encryption with Minimum Memory Size.
Proceedings of the Information Security - 26th International Conference, 2023

2022
Secret Can Be Public: Low-Memory AEAD Mode for High-Order Masking.
IACR Cryptol. ePrint Arch., 2022

Symmetric Cryptography (Dagstuhl Seminar 22141).
Dagstuhl Reports, 2022

Birthday-Bound Slide Attacks on TinyJAMBU's Keyed-Permutations for All Key Sizes.
Proceedings of the Advances in Information and Computer Security, 2022

The Multi-User Security of Triple Encryption, Revisited: Exact Security, Strengthening, and Application to TDES.
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022

2021
AES-LBBB: AES Mode for Lightweight and BBB-Secure Authenticated Encryption.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2021

Update on Analysis of Lesamnta-LW and New PRF Mode LRF.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2021

Quantum Collision Attacks on Reduced SHA-256 and SHA-512.
IACR Cryptol. ePrint Arch., 2021

Designing S-Boxes Providing Stronger Security Against Differential Cryptanalysis for Ciphers Using Byte-Wise XOR.
Proceedings of the Selected Areas in Cryptography - 28th International Conference, 2021

A Card-Minimal Three-Input AND Protocol Using Two Shuffles.
Proceedings of the Computing and Combinatorics - 27th International Conference, 2021

Double-Block-Length Hash Function for Minimum Memory Size.
Proceedings of the Advances in Cryptology - ASIACRYPT 2021, 2021

2020
LM-DAE: Low-Memory Deterministic Authenticated Encryption for 128-bit Security.
IACR Trans. Symmetric Cryptol., 2020

Preface to Volume 2020, Issue 1.
IACR Trans. Symmetric Cryptol., 2020

Pyjamask: Block Cipher and Authenticated Encryption with Highly Efficient Masked Implementation.
IACR Trans. Symmetric Cryptol., 2020

ESTATE: A Lightweight and Low Energy Authenticated Encryption Mode.
IACR Trans. Symmetric Cryptol., 2020

SKINNY-AEAD and SKINNY-Hash.
IACR Trans. Symmetric Cryptol., 2020

Quantum algorithm for the multicollision problem.
Theor. Comput. Sci., 2020

A Practical Forgery Attack on Lilliput-AE.
J. Cryptol., 2020

On the Design of Bit Permutation Based Ciphers - The Interplay Among S-box, Bit Permutation and Key-addition.
IACR Cryptol. ePrint Arch., 2020

On the Security Margin of TinyJAMBU with Refined Differential and Linear Cryptanalysis.
IACR Cryptol. ePrint Arch., 2020

Lightweight Authenticated Encryption Mode Suitable for Threshold Implementation.
IACR Cryptol. ePrint Arch., 2020

Finding Hash Collisions with Quantum Computers by Using Differential Trails with Smaller Probability than Birthday Bound.
IACR Cryptol. ePrint Arch., 2020

Improved Attacks on sLiSCP Permutation and Tight Bound of Limited Birthday Distinguishers.
IACR Cryptol. ePrint Arch., 2020

Out of Oddity - New Cryptanalytic Techniques against Symmetric Primitives Optimized for Integrity Proof Systems.
IACR Cryptol. ePrint Arch., 2020

GIFT-COFB.
IACR Cryptol. ePrint Arch., 2020

Designing Content Placement of CDN for Improving Aggregation Effect of ICN FIBs.
Proceedings of the 2020 International Conference on Information Networking, 2020

Lesamnta-LW Revisited: Improved Security Analysis of Primitive and New PRF Mode.
Proceedings of the Applied Cryptography and Network Security, 2020

2019
Preface to Volume 2019, Issue 1.
IACR Trans. Symmetric Cryptol., 2019

INT-RUP Secure Lightweight Parallel AE Modes.
IACR Trans. Symmetric Cryptol., 2019

PEIGEN - a Platform for Evaluation, Implementation, and Generation of S-boxes.
IACR Trans. Symmetric Cryptol., 2019

Nonlinear Invariant Attack: Practical Attack on Full SCREAM, iSCREAM, and Midori64.
J. Cryptol., 2019

Beyond Conventional Security in Sponge-Based Authenticated Encryption Modes.
J. Cryptol., 2019

Optimizing Online Permutation-Based AE Schemes for Lightweight Applications.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2019

Correlation of Quadratic Boolean Functions: Cryptanalysis of All Versions of Full MORUS.
IACR Cryptol. ePrint Arch., 2019

Related-Key Boomerang Attacks on GIFT with Automated Trail Search Including BCT Effect.
IACR Cryptol. ePrint Arch., 2019

Elastic-Tweak: A Framework for Short Tweak Tweakable Block Cipher.
IACR Cryptol. ePrint Arch., 2019

Quantum Attacks without Superposition Queries: the Offline Simon Algorithm.
IACR Cryptol. ePrint Arch., 2019

SoK: Peigen - a Platform for Evaluation, Implementation, and Generation of S-boxes.
IACR Cryptol. ePrint Arch., 2019

Cryptanalysis of ForkAES.
IACR Cryptol. ePrint Arch., 2019

Correlation of Quadratic Boolean Functions: Cryptanalysis of All Versions of Full \mathsf MORUS.
Proceedings of the Advances in Cryptology - CRYPTO 2019, 2019

Quantum Attacks Without Superposition Queries: The Offline Simon's Algorithm.
Proceedings of the Advances in Cryptology - ASIACRYPT 2019, 2019

2018
Tight Bounds of Differentially and Linearly Active S-Boxes and Division Property of Lilliput.
IEEE Trans. Computers, 2018

On the Design Rationale of SIMON Block Cipher: Integral Attacks and Impossible Differential Attacks against SIMON Variants.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2018

Universal Forgery and Multiple Forgeries of MergeMAC and Generalized Constructions.
IACR Cryptol. ePrint Arch., 2018

Quantum Chosen-Ciphertext Attacks against Feistel Ciphers.
IACR Cryptol. ePrint Arch., 2018

Improved Quantum Multicollision-Finding Algorithm.
IACR Cryptol. ePrint Arch., 2018

Boomerang Connectivity Table: A New Cryptanalysis Tool.
IACR Cryptol. ePrint Arch., 2018

Cryptanalysis of MORUS.
IACR Cryptol. ePrint Arch., 2018

Quantum Demiric-Selçuk Meet-in-the-Middle Attacks: Applications to 6-Round Generic Feistel Constructions.
Proceedings of the Security and Cryptography for Networks - 11th International Conference, 2018

Cryptanalysis of Reduced sLiSCP Permutation in Sponge-Hash and Duplex-AE Modes.
Proceedings of the Selected Areas in Cryptography - SAC 2018, 2018

Integer Linear Programming for Three-Subset Meet-in-the-Middle Attacks: Application to GIFT.
Proceedings of the Advances in Information and Computer Security, 2018

Improved Related-Tweakey Boomerang Attacks on Deoxys-BC.
Proceedings of the Progress in Cryptology - AFRICACRYPT 2018, 2018

Related-Key Boomerang Attacks on Full ANU Lightweight Block Cipher.
Proceedings of the Applied Cryptography and Network Security, 2018

2017
A Security Analysis of Deoxys and its Internal Tweakable Block Ciphers.
IACR Trans. Symmetric Cryptol., 2017

MILP Modeling for (Large) S-boxes to Optimize Probability of Differential Characteristics.
IACR Trans. Symmetric Cryptol., 2017

Quantum Multicollision-Finding Algorithm.
IACR Cryptol. ePrint Arch., 2017

Quantum Meet-in-the-Middle Attacks: Applications to Generic Feistel Constructions.
IACR Cryptol. ePrint Arch., 2017

Cryptanalysis against Symmetric-Key Schemes with Online Classical Queries and Offline Quantum Computations.
IACR Cryptol. ePrint Arch., 2017

Message-Recovery MACs and Verification-Unskippable AE.
IACR Cryptol. ePrint Arch., 2017

Cryptanalysis of Deoxys and its Internal Tweakable Block Ciphers.
IACR Cryptol. ePrint Arch., 2017

Refined Probability of Differential Characteristics Including Dependency Between Multiple Rounds.
IACR Cryptol. ePrint Arch., 2017

GIFT: A Small Present.
IACR Cryptol. ePrint Arch., 2017

New Algorithm for Modeling S-box in MILP Based Differential and Division Trail Search.
Proceedings of the Innovative Security Solutions for Information Technology and Communications, 2017

Analyzing Key Schedule of Simon: Iterative Key Differences and Application to Related-Key Impossible Differentials.
Proceedings of the Advances in Information and Computer Security, 2017

Rate-One AE with Security Under RUP.
Proceedings of the Information Security - 20th International Conference, 2017

New Impossible Differential Search Tool from Design and Cryptanalysis Aspects - Revealing Structural Properties of Several Ciphers.
Proceedings of the Advances in Cryptology - EUROCRYPT 2017 - 36th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Paris, France, April 30, 2017

GIFT: A Small Present - Towards Reaching the Limit of Lightweight Encryption.
Proceedings of the Cryptographic Hardware and Embedded Systems - CHES 2017, 2017

2016
Invariant Subspace Attack Against Midori64 and The Resistance Criteria for S-box Designs.
IACR Trans. Symmetric Cryptol., 2016

Message Extension Attack against Authenticated Encryptions: Application to PANDA.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2016

Generic Internal State Recovery on Strengthened HMAC: <i>n</i>-bit Secure HMAC Requires Key in All Blocks.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2016

Practical Forgeries and Distinguishers against PAES.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2016

New Impossible Differential Search Tool from Design and Cryptanalysis Aspects.
IACR Cryptol. ePrint Arch., 2016

A New Algorithm for the Unbalanced Meet-in-the-Middle Problem.
IACR Cryptol. ePrint Arch., 2016

Refinements of the k-tree Algorithm for the Generalized Birthday Problem.
IACR Cryptol. ePrint Arch., 2016

On the Design Rationale of SIMON Block Cipher: Integral Attacks and Impossible Differential Attacks against SIMON Variants.
IACR Cryptol. ePrint Arch., 2016

Meet-in-the-Middle Attacks on Classes of Contracting and Expanding Feistel Constructions.
IACR Cryptol. ePrint Arch., 2016

The SKINNY Family of Block Ciphers and its Low-Latency Variant MANTIS.
IACR Cryptol. ePrint Arch., 2016

Cryptanalysis of Reduced NORX.
IACR Cryptol. ePrint Arch., 2016

Invariant Subspace Attack Against Midori64 and The Resistance Criteria for S-box Designs.
IACR Cryptol. ePrint Arch., 2016

Extended meet-in-the-middle attacks on some Feistel constructions.
Des. Codes Cryptogr., 2016

New Differential Bounds and Division Property of Lilliput: Block Cipher with Extended Generalized Feistel Network.
Proceedings of the Selected Areas in Cryptography - SAC 2016, 2016

Improved Rebound Attacks on AESQ: Core Permutation of CAESAR Candidate PAEQ.
Proceedings of the Information Security and Privacy - 21st Australasian Conference, 2016

2015
Improved Single-Key Distinguisher on HMAC-MD5 and Key Recovery Attacks on Sandwich-MAC-MD5 and MD5-MAC.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2015

Bitwise Partial-Sum: A New Tool for Integral Analysis against ARX Designs.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2015

Preimage Attacks on Feistel-SP Functions: Impact of Omitting the Last Network Twist.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2015

Equivalent Key Recovery Attacks against HMAC and NMAC with Whirlpool Reduced to 7 Rounds.
IACR Cryptol. ePrint Arch., 2015

Cryptanalysis of HMAC/NMAC-Whirlpool.
IACR Cryptol. ePrint Arch., 2015

Invariant Subspace Attack Against Full Midori64.
IACR Cryptol. ePrint Arch., 2015

A New Mode of Operation for Incremental Authenticated Encryption with Associated Data.
Proceedings of the Selected Areas in Cryptography - SAC 2015, 2015

Analysis of the CAESAR Candidate Silver.
Proceedings of the Selected Areas in Cryptography - SAC 2015, 2015

How to Incorporate Associated Data in Sponge-Based Authenticated Encryption.
Proceedings of the Topics in Cryptology, 2015

Security of Block Ciphers - From Algorithm Design to Hardware Implementation.
Wiley, ISBN: 978-1-118-66001-0, 2015

2014
Distinguishers on Double-Branch Compression Function and Applications to Round-Reduced RIPEMD-128 and RIPEMD-160.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2014

Comprehensive Study of Integral Analysis on LBlock.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2014

Cryptanalyses on a Merkle-Damgård Based MAC - Almost Universal Forgery and Distinguishing-<i>H</i> Attacks.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2014

Cryptanalysis of Reduced-round SIMON32 and SIMON48.
IACR Cryptol. ePrint Arch., 2014

A Practical Universal Forgery Attack against PAES-8.
IACR Cryptol. ePrint Arch., 2014

A Forgery Attack against PANDA-s.
IACR Cryptol. ePrint Arch., 2014

Generic Attacks on Strengthened HMAC: n-bit Secure HMAC Requires Key in All Blocks.
Proceedings of the Security and Cryptography for Networks - 9th International Conference, 2014

Practical Cryptanalysis of PAES.
Proceedings of the Selected Areas in Cryptography - SAC 2014, 2014

An Automated Evaluation Tool for Improved Rebound Attack: New Distinguishers and Proposals of ShiftBytes Parameters for Grøstl.
Proceedings of the Topics in Cryptology - CT-RSA 2014, 2014

Updates on Generic Attacks against HMAC and NMAC.
Proceedings of the Advances in Cryptology - CRYPTO 2014, 2014

Meet-in-the-Middle Attacks on Generic Feistel Constructions.
Proceedings of the Advances in Cryptology - ASIACRYPT 2014, 2014

Memoryless Unbalanced Meet-in-the-Middle Attacks: Impossible Results and Applications.
Proceedings of the Applied Cryptography and Network Security, 2014

2013
Open-Key Distinguishers for the Internal Block Cipher of Tweaked Lesamnta.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2013

Boomerang Distinguishers on MD4-Based Hash Functions: First Practical Results on Full 5-Pass HAVAL Compression Function.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2013

Meet-in-the-Middle Preimage Attacks on AES Hashing Modes and an Application to Whirlpool.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2013

Limited-birthday Distinguishers for Hash Functions - Collisions Beyond the Birthday Bound can be Meaningful.
IACR Cryptol. ePrint Arch., 2013

Meet-in-the-Middle Preimage Attacks Revisited - New Results on MD5 and HAVAL.
Proceedings of the SECRYPT 2013, 2013

Improved Single-Key Distinguisher on HMAC-MD5 and Key Recovery Attacks on Sandwich-MAC-MD5.
Proceedings of the Selected Areas in Cryptography - SAC 2013, 2013

New Property of Diffusion Switching Mechanism on CLEFIA and Its Application to DFA.
Proceedings of the Advances in Information and Computer Security, 2013

Generic State-Recovery and Forgery Attacks on ChopMD-MAC and on NMAC/HMAC.
Proceedings of the Advances in Information and Computer Security, 2013

Bitwise Partial-Sum on HIGHT: A New Tool for Integral Analysis Against ARX Designs.
Proceedings of the Information Security and Cryptology - ICISC 2013, 2013

Coupon Collector's Problem for Fault Analysis against AES - High Tolerance for Noisy Fault Injections.
Proceedings of the Financial Cryptography and Data Security, 2013

Related-Key Boomerang Attacks on KATAN32/48/64.
Proceedings of the Information Security and Privacy - 18th Australasian Conference, 2013

2012
Meet-in-the-Middle (Second) Preimage Attacks on Two Double-Branch Hash Functions RIPEMD and RIPEMD-128.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2012

Preimage Attacks against PKC98-Hash and HAS-V.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2012

Known-Key Attacks on Rijndael with Large Blocks and Strengthening ShiftRow Parameter.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2012

Preimage Attacks on the Step-Reduced RIPEMD-128 and RIPEMD-160.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2012

2-Dimension Sums: Distinguishers Beyond Three Rounds of RIPEMD-128 and RIPEMD-160.
IACR Cryptol. ePrint Arch., 2012

Generic Related-key Attacks for HMAC.
IACR Cryptol. ePrint Arch., 2012

Meet-in-the-Middle Technique for Integral Attacks against Feistel Ciphers.
Proceedings of the Selected Areas in Cryptography, 19th International Conference, 2012

Boomerang Distinguishers for Full HAS-160 Compression Function.
Proceedings of the Advances in Information and Computer Security, 2012

Polynomial-Advantage Cryptanalysis of 3D Cipher and 3D-Based Hash Function.
Proceedings of the Advances in Information and Computer Security, 2012

New Truncated Differential Cryptanalysis on 3D Block Cipher.
Proceedings of the Information Security Practice and Experience, 2012

Double-SP Is Weaker Than Single-SP: Rebound Attacks on Feistel Ciphers with Several Rounds.
Proceedings of the Progress in Cryptology, 2012

Comprehensive Study of Integral Analysis on 22-Round LBlock.
Proceedings of the Information Security and Cryptology - ICISC 2012, 2012

Key-Dependent Weakness of AES-Based Ciphers under Clockwise Collision Distinguisher.
Proceedings of the Information Security and Cryptology - ICISC 2012, 2012

Multi-differential Cryptanalysis on Reduced DM-PRESENT-80: Collisions and Other Differential Properties.
Proceedings of the Information Security and Cryptology - ICISC 2012, 2012

Cryptanalyses on a Merkle-Damgård Based MAC - Almost Universal Forgery and Distinguishing-H Attacks.
Proceedings of the Advances in Cryptology - EUROCRYPT 2012, 2012

Investigating Fundamental Security Requirements on Whirlpool: Improved Preimage and Collision Attacks.
Proceedings of the Advances in Cryptology - ASIACRYPT 2012, 2012

Three-Subset Meet-in-the-Middle Attack on Reduced XTEA.
Proceedings of the Progress in Cryptology - AFRICACRYPT 2012, 2012

Distinguishers beyond Three Rounds of the RIPEMD-128/-160 Compression Functions.
Proceedings of the Applied Cryptography and Network Security, 2012

Improved Known-Key Distinguishers on Feistel-SP Ciphers and Application to Camellia.
Proceedings of the Information Security and Privacy - 17th Australasian Conference, 2012

2011
Preimage Attack on 23-Step Tiger.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2011

Cryptanalyses of Double-Mix Merkle-Damgård Mode in the Original Version of AURORA-512.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2011

Preimage Attacks on Full-ARIRANG: Analysis of DM-Mode with Middle Feed-Forward.
Proceedings of the Information Security Applications - 12th International Workshop, 2011

Byte Slicing Grøstl - Optimized Intel AES-NI and 8-bit Implementations of the SHA-3 Finalist Grøstl.
Proceedings of the SECRYPT 2011 - Proceedings of the International Conference on Security and Cryptography, Seville, Spain, 18, 2011

Boomerang Distinguishers on MD4-Family: First Practical Results on Full 5-Pass HAVAL.
Proceedings of the Selected Areas in Cryptography - 18th International Workshop, 2011

Experimental Verification of Super-Sbox Analysis - Confirmation of Detailed Attack Complexity.
Proceedings of the Advances in Information and Computer Security, 2011

Improved Integral Analysis on Tweaked Lesamnta.
Proceedings of the Information Security and Cryptology - ICISC 2011 - 14th International Conference, Seoul, Korea, November 30, 2011

Byte Slicing Grøstl: Improved Intel AES-NI and Vector-Permute Implementations of the SHA-3 Finalist Grøstl.
Proceedings of the E-Business and Telecommunications - International Joint Conference, 2011

Known-Key Distinguishers on 11-Round Feistel and Collision Attacks on Its Hashing Modes.
Proceedings of the Fast Software Encryption - 18th International Workshop, 2011

(Second) Preimage Attacks on Step-Reduced RIPEMD/RIPEMD-128 with a New Local-Collision Approach.
Proceedings of the Topics in Cryptology - CT-RSA 2011, 2011

Collisions of MMO-MD5 and Their Impact on Original MD5.
Proceedings of the Progress in Cryptology - AFRICACRYPT 2011, 2011

Preimage Attacks on Full-ARIRANG (Poster).
Proceedings of the Information Security and Privacy - 16th Australasian Conference, 2011

2010
Cryptanalysis of Two MD5-Based Authentication Protocols: APOP and NMAC.
IEICE Trans. Inf. Syst., 2010

Practical Password Recovery Attacks on MD4 Based Prefix and Hybrid Authentication Protocols.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2010

Efficient Differential Fault Analysis for AES.
IACR Cryptol. ePrint Arch., 2010

Known-Key Attacks on Rijndael with Large Blocks and Strengthening <i>ShiftRow</i> Parameter.
Proceedings of the Advances in Information and Computer Security, 2010

Finding Preimages of Tiger Up to 23 Steps.
Proceedings of the Fast Software Encryption, 17th International Workshop, 2010

Non-full-active Super-Sbox Analysis: Applications to ECHO and Grøstl.
Proceedings of the Advances in Cryptology - ASIACRYPT 2010, 2010

2009
A Strict Evaluation on the Number of Conditions for SHA-1 Collision Search.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2009

Extended Password Recovery Attacks against APOP, SIP, and Digest Authentication.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2009

Preimage Attacks on 41-Step SHA-256 and 46-Step SHA-512.
IACR Cryptol. ePrint Arch., 2009

A Full Key Recovery Attack on HMAC-AURORA-512.
IACR Cryptol. ePrint Arch., 2009

A 2nd-Preimage Attack on AURORA-512.
IACR Cryptol. ePrint Arch., 2009

A Collision Attack on AURORA-512.
IACR Cryptol. ePrint Arch., 2009

Rebound Attack on the Full LANE Compression Function.
IACR Cryptol. ePrint Arch., 2009

Cryptanalyses of Narrow-Pipe Mode of Operation in AURORA-512 Hash Function.
Proceedings of the Selected Areas in Cryptography, 16th Annual International Workshop, 2009

Bit-Free Collision: Application to APOP Attack.
Proceedings of the Advances in Information and Computer Security, 2009

Meet-in-the-Middle Attacks Using Output Truncation in 3-Pass HAVAL.
Proceedings of the Information Security, 12th International Conference, 2009

Improved Preimage Attack for 68-Step HAS-160.
Proceedings of the Information, Security and Cryptology, 2009

Finding Preimages in Full MD5 Faster Than Exhaustive Search.
Proceedings of the Advances in Cryptology, 2009

Meet-in-the-Middle Preimage Attacks Against Reduced SHA-0 and SHA-1.
Proceedings of the Advances in Cryptology, 2009

Preimages for Step-Reduced SHA-2.
Proceedings of the Advances in Cryptology, 2009

Meet-in-the-Middle Preimage Attacks on Double-Branch Hash Functions: Application to RIPEMD and Others.
Proceedings of the Information Security and Privacy, 14th Australasian Conference, 2009

2008
New Message Differences for Collision Attacks on MD4 and MD5.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2008

Preimage Attacks on One-Block MD4, 63-Step MD5 and More.
Proceedings of the Selected Areas in Cryptography, 15th International Workshop, SAC 2008, 2008

A Preimage Attack for 52-Step HAS-160.
Proceedings of the Information Security and Cryptology, 2008

Security of MD5 Challenge and Response: Extension of APOP Password Recovery Attack.
Proceedings of the Topics in Cryptology, 2008

A strict evaluation method on the number of conditions for the SHA-1 collision search.
Proceedings of the 2008 ACM Symposium on Information, Computer and Communications Security, 2008

Preimage Attacks on 3, 4, and 5-Pass HAVAL.
Proceedings of the Advances in Cryptology, 2008

Password Recovery on Challenge and Response: Impossible Differential Attack on Hash Function.
Proceedings of the Progress in Cryptology, 2008

Preimage Attacks on Step-Reduced MD5.
Proceedings of the Information Security and Privacy, 13th Australasian Conference, 2008

2007
Improved Collision Attacks on MD4 and MD5.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2007

Practical Password Recovery on an MD5 Challenge and Response.
IACR Cryptol. ePrint Arch., 2007

New Message Difference for MD4.
Proceedings of the Fast Software Encryption, 14th International Workshop, 2007

A New Strategy for Finding a Differential Path of SHA-1.
Proceedings of the Information Security and Privacy, 12th Australasian Conference, 2007

2006
How to Construct Sufficient Condition in Searching Collisions of MD5.
IACR Cryptol. ePrint Arch., 2006

Message Modification for Step 21-23 on SHA-0.
IACR Cryptol. ePrint Arch., 2006

How to Construct Sufficient Conditions for Hash Functions.
Proceedings of the Progressin Cryptology, 2006

Improved Collision Search for SHA-0.
Proceedings of the Advances in Cryptology, 2006

2005
Improved Collision Attack on MD5.
IACR Cryptol. ePrint Arch., 2005

Improved Collision Attack on MD4.
IACR Cryptol. ePrint Arch., 2005

Improved Collision Attack on MD4 with Probability Almost 1.
Proceedings of the Information Security and Cryptology, 2005


  Loading...