


default search action
Yosuke Todo
藤堂 洋介
Person information
- affiliation: NTT Social Informatics Laboratories, Tokyo, Japan
- unicode name: 藤堂 洋介
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
showing all ?? records
2020 – today
- 2024
- [j29]Soichiro Kobayashi, Rei Ueno
, Yosuke Todo
, Naofumi Homma
:
Side-Channel Linearization Attack on Unrolled Trivium Hardware. IACR Commun. Cryptol. 1(3): 14 (2024) - [j28]Hosein Hadipour
, Yosuke Todo:
Cryptanalysis of QARMAv2. IACR Trans. Symmetric Cryptol. 2024(1): 188-213 (2024) - [j27]Ryunouchi Takeuchi, Yosuke Todo, Tetsu Iwata:
Key Recovery, Universal Forgery, and Committing Attacks against Revised Rocca: How Finalization Affects Security. IACR Trans. Symmetric Cryptol. 2024(2): 85-117 (2024) - [c45]Antonio Flórez-Gutiérrez, Lorenzo Grassi
, Gregor Leander
, Ferdinand Sibleyras, Yosuke Todo
:
General Practical Cryptanalysis of the Sum of Round-Reduced Block Ciphers and ZIP-AES. ASIACRYPT (9) 2024: 280-311 - [c44]Christina Boura, Shahram Rasoolzadeh, Dhiman Saha, Yosuke Todo:
Multiple-Tweak Differential Attack Against SCARF. ASIACRYPT (7) 2024: 330-360 - [c43]Antonio Flórez-Gutiérrez
, Yosuke Todo
:
Improving Linear Key Recovery Attacks Using Walsh Spectrum Puncturing. EUROCRYPT (1) 2024: 187-216 - [i37]Antonio Flórez-Gutiérrez, Yosuke Todo:
Improving Linear Key Recovery Attacks using Walsh Spectrum Puncturing. IACR Cryptol. ePrint Arch. 2024: 151 (2024) - [i36]Ryunosuke Takeuchi, Yosuke Todo, Tetsu Iwata:
Practical Committing Attacks against Rocca-S. IACR Cryptol. ePrint Arch. 2024: 901 (2024) - [i35]Christina Boura, Shahram Rasoolzadeh, Dhiman Saha, Yosuke Todo:
Multiple-Tweak Differential Attack Against SCARF. IACR Cryptol. ePrint Arch. 2024: 1408 (2024) - [i34]Antonio Flórez-Gutiérrez, Lorenzo Grassi, Gregor Leander, Ferdinand Sibleyras, Yosuke Todo:
General Practical Cryptanalysis of the Sum of Round-Reduced Block Ciphers and ZIP-AES. IACR Cryptol. ePrint Arch. 2024: 2033 (2024) - 2023
- [j26]Yu Long Chen, Antonio Flórez-Gutiérrez, Akiko Inoue, Ryoma Ito
, Tetsu Iwata, Kazuhiko Minematsu, Nicky Mouha, Yusuke Naito, Ferdinand Sibleyras, Yosuke Todo:
Key Committing Security of AEZ and More. IACR Trans. Symmetric Cryptol. 2023(4): 452-488 (2023) - [c42]Ferdinand Sibleyras, Yosuke Todo:
Keyed Sum of Permutations: A Simpler RP-Based PRF. CT-RSA 2023: 573-593 - [c41]Federico Canale, Tim Güneysu, Gregor Leander, Jan Philipp Thoma, Yosuke Todo, Rei Ueno:
SCARF - A Low-Latency Block Cipher for Secure Cache-Randomization. USENIX Security Symposium 2023: 1937-1954 - [i33]Ferdinand Sibleyras, Yosuke Todo:
Keyed Sum of Permutations: a simpler RP-based PRF. IACR Cryptol. ePrint Arch. 2023: 1083 (2023) - [i32]Hosein Hadipour, Yosuke Todo:
Cryptanalysis of QARMAv2. IACR Cryptol. ePrint Arch. 2023: 1833 (2023) - 2022
- [j25]Kalikinkar Mandal, Dhiman Saha
, Sumanta Sarkar, Yosuke Todo
:
Sycon: a new milestone in designing ASCON-like permutations. J. Cryptogr. Eng. 12(3): 305-327 (2022) - [j24]Christof Beierle, Marek Broll, Federico Canale, Nicolas David, Antonio Flórez-Gutiérrez, Gregor Leander
, María Naya-Plasencia, Yosuke Todo:
Improved Differential-Linear Attacks with Applications to ARX Ciphers. J. Cryptol. 35(4): 29 (2022) - [j23]Akinori Hosoyamada, Akiko Inoue, Ryoma Ito
, Tetsu Iwata, Kazuhiko Minematsu, Ferdinand Sibleyras, Yosuke Todo:
Cryptanalysis of Rocca and Feasibility of Its Security Claim. IACR Trans. Symmetric Cryptol. 2022(3): 123-151 (2022) - [j22]Yosuke Todo, Takanori Isobe:
Hybrid Code Lifting on Space-Hard Block Ciphers Application to Yoroi and SPNbox. IACR Trans. Symmetric Cryptol. 2022(3): 368-402 (2022) - [c40]Akinori Hosoyamada, Takanori Isobe, Yosuke Todo
, Kan Yasuda:
A Modular Approach to the Incompressibility of Block-Cipher-Based AEADs. ASIACRYPT (2) 2022: 585-619 - [c39]Marek Broll, Federico Canale, Nicolas David, Antonio Flórez-Gutiérrez, Gregor Leander
, María Naya-Plasencia, Yosuke Todo:
New Attacks from Old Distinguishers Improved Attacks on Serpent. CT-RSA 2022: 484-510 - [c38]Ferdinand Sibleyras, Yu Sasaki, Yosuke Todo, Akinori Hosoyamada, Kan Yasuda:
Birthday-Bound Slide Attacks on TinyJAMBU's Keyed-Permutations for All Key Sizes. IWSEC 2022: 107-127 - [i31]Federico Canale, Tim Güneysu, Gregor Leander, Jan Philipp Thoma, Yosuke Todo, Rei Ueno:
SCARF: A Low-Latency Block Cipher for Secure Cache-Randomization. IACR Cryptol. ePrint Arch. 2022: 1228 (2022) - [i30]Akinori Hosoyamada, Takanori Isobe, Yosuke Todo, Kan Yasuda:
A Modular Approach to the Incompressibility of Block-Cipher-Based AEADs. IACR Cryptol. ePrint Arch. 2022: 1253 (2022) - 2021
- [j21]Yonglin Hao, Gregor Leander, Willi Meier, Yosuke Todo
, Qingju Wang:
Modeling for Three-Subset Division Property without Unknown Subset. J. Cryptol. 34(3): 22 (2021) - [j20]Andrea Caforio, Subhadeep Banik
, Yosuke Todo, Willi Meier, Takanori Isobe, Fukang Liu, Bin Zhang:
Perfect Trees: Designing Energy-Optimal Symmetric Encryption Primitives. IACR Trans. Symmetric Cryptol. 2021(4): 36-73 (2021) - [c37]Phil Hebborn, Baptiste Lambin, Gregor Leander
, Yosuke Todo:
Strong and Tight Security Guarantees Against Integral Distinguishers. ASIACRYPT (1) 2021: 362-391 - [c36]Kai Hu, Siwei Sun, Yosuke Todo, Meiqin Wang, Qingju Wang
:
Massive Superpoly Recovery with Nested Monomial Predictions. ASIACRYPT (1) 2021: 392-421 - [c35]Yosuke Todo, Yu Sasaki:
Designing S-Boxes Providing Stronger Security Against Differential Cryptanalysis for Ciphers Using Byte-Wise XOR. SAC 2021: 179-199 - [i29]Kalikinkar Mandal, Dhiman Saha, Sumanta Sarkar, Yosuke Todo:
Sycon: A New Milestone in Designing ASCON-like Permutations. IACR Cryptol. ePrint Arch. 2021: 157 (2021) - [i28]Marek Broll, Federico Canale, Nicolas David, Antonio Flórez-Gutiérrez, Gregor Leander, María Naya-Plasencia, Yosuke Todo:
Further Improving Differential-Linear Attacks: Applications to Chaskey and Serpent. IACR Cryptol. ePrint Arch. 2021: 820 (2021) - [i27]Kai Hu, Siwei Sun, Yosuke Todo, Meiqin Wang, Qingju Wang:
Massive Superpoly Recovery with Nested Monomial Predictions. IACR Cryptol. ePrint Arch. 2021: 1225 (2021) - [i26]Phil Hebborn, Baptiste Lambin, Gregor Leander, Yosuke Todo:
Strong and Tight Security Guarantees against Integral Distinguishers. IACR Cryptol. ePrint Arch. 2021: 1502 (2021) - [i25]Andrea Caforio, Subhadeep Banik, Yosuke Todo, Willi Meier, Takanori Isobe, Fukang Liu, Bin Zhang:
Perfect Trees: Designing Energy-Optimal Symmetric Encryption Primitives. IACR Cryptol. ePrint Arch. 2021: 1523 (2021) - 2020
- [j19]Yonglin Hao, Lin Jiao, Chaoyun Li, Willi Meier, Yosuke Todo
, Qingju Wang
:
Links between Division Property and Other Cube Attack Variants. IACR Trans. Symmetric Cryptol. 2020(1): 363-395 (2020) - [c34]Phil Hebborn, Baptiste Lambin, Gregor Leander
, Yosuke Todo
:
Lower Bounds on the Degree of Block Ciphers. ASIACRYPT (1) 2020: 537-566 - [c33]Tim Beyne
, Anne Canteaut, Itai Dinur, Maria Eichlseder
, Gregor Leander, Gaëtan Leurent, María Naya-Plasencia, Léo Perrin, Yu Sasaki, Yosuke Todo
, Friedrich Wiemer:
Out of Oddity - New Cryptanalytic Techniques Against Symmetric Primitives Optimized for Integrity Proof Systems. CRYPTO (3) 2020: 299-328 - [c32]Christof Beierle
, Gregor Leander, Yosuke Todo
:
Improved Differential-Linear Attacks with Applications to ARX Ciphers. CRYPTO (3) 2020: 329-358 - [c31]Yonglin Hao, Gregor Leander
, Willi Meier, Yosuke Todo
, Qingju Wang
:
Modeling for Three-Subset Division Property Without Unknown Subset - Improved Cube Attacks Against Trivium and Grain-128AEAD. EUROCRYPT (1) 2020: 466-495 - [c30]Dusan Bozilov, Maria Eichlseder
, Miroslav Knezevic, Baptiste Lambin, Gregor Leander
, Thorben Moos
, Ventzislav Nikov, Shahram Rasoolzadeh
, Yosuke Todo
, Friedrich Wiemer
:
PRINCEv2 - More Security for (Almost) No Overhead. SAC 2020: 483-511 - [i24]Tim Beyne, Anne Canteaut, Itai Dinur, Maria Eichlseder, Gregor Leander, Gaëtan Leurent, María Naya-Plasencia, Léo Perrin, Yu Sasaki, Yosuke Todo, Friedrich Wiemer
:
Out of Oddity - New Cryptanalytic Techniques against Symmetric Primitives Optimized for Integrity Proof Systems. IACR Cryptol. ePrint Arch. 2020: 188 (2020) - [i23]Yonglin Hao, Gregor Leander, Willi Meier, Yosuke Todo, Qingju Wang:
Modeling for Three-Subset Division Property without Unknown Subset. IACR Cryptol. ePrint Arch. 2020: 441 (2020) - [i22]Subhadeep Banik, Avik Chakraborti, Tetsu Iwata, Kazuhiko Minematsu, Mridul Nandi, Thomas Peyrin, Yu Sasaki, Siang Meng Sim, Yosuke Todo:
GIFT-COFB. IACR Cryptol. ePrint Arch. 2020: 738 (2020) - [i21]Christof Beierle, Gregor Leander, Yosuke Todo:
Improved Differential-Linear Attacks with Applications to ARX Ciphers. IACR Cryptol. ePrint Arch. 2020: 775 (2020) - [i20]Phil Hebborn, Baptiste Lambin, Gregor Leander, Yosuke Todo:
Lower Bounds on the Degree of Block Ciphers. IACR Cryptol. ePrint Arch. 2020: 1051 (2020) - [i19]Dusan Bozilov, Maria Eichlseder, Miroslav Knezevic, Baptiste Lambin, Gregor Leander, Thorben Moos, Ventzislav Nikov, Shahram Rasoolzadeh, Yosuke Todo, Friedrich Wiemer:
PRINCEv2 - More Security for (Almost) No Overhead. IACR Cryptol. ePrint Arch. 2020: 1269 (2020)
2010 – 2019
- 2019
- [j18]Yuki Funabiki, Yosuke Todo
, Takanori Isobe, Masakatu Morii:
Improved Integral Attack on HIGHT. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 102-A(9): 1259-1271 (2019) - [j17]Yosuke Todo
, Gregor Leander
, Yu Sasaki:
Nonlinear Invariant Attack: Practical Attack on Full SCREAM, iSCREAM, and Midori64. J. Cryptol. 32(4): 1383-1422 (2019) - [j16]Yonglin Hao
, Takanori Isobe, Lin Jiao
, Chaoyun Li
, Willi Meier, Yosuke Todo
, Qingju Wang
:
Improved Division Property Based Cube Attacks Exploiting Algebraic Properties of Superpoly. IEEE Trans. Computers 68(10): 1470-1486 (2019) - [j15]Ralph Ankele
, Christoph Dobraunig
, Jian Guo, Eran Lambooij, Gregor Leander
, Yosuke Todo
:
Zero-Correlation Attacks on Tweakable Block Ciphers with Linear Tweakey Expansion. IACR Trans. Symmetric Cryptol. 2019(1): 192-235 (2019) - [c29]Yosuke Todo
, Willi Meier, Kazumaro Aoki:
On the Data Limitation of Small-State Stream Ciphers: Correlation Attacks on Fruit-80 and Plantlet. SAC 2019: 365-392 - [i18]Ralph Ankele, Christoph Dobraunig, Jian Guo, Eran Lambooij, Gregor Leander, Yosuke Todo:
Zero-Correlation Attacks on Tweakable Block Ciphers with Linear Tweakey Expansion. IACR Cryptol. ePrint Arch. 2019: 185 (2019) - [i17]Yosuke Todo, Willi Meier, Kazumaro Aoki:
On the Data Limitation of Small-State Stream Ciphers: Correlation Attacks on Fruit-80 and Plantlet. IACR Cryptol. ePrint Arch. 2019: 809 (2019) - 2018
- [j14]Kota Kondo, Yu Sasaki, Yosuke Todo
, Tetsu Iwata:
On the Design Rationale of SIMON Block Cipher: Integral Attacks and Impossible Differential Attacks against SIMON Variants. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 101-A(1): 88-98 (2018) - [j13]Qianqian Yang
, Lei Hu
, Danping Shi, Yosuke Todo
, Siwei Sun:
On the Complexity of Impossible Differential Cryptanalysis. Secur. Commun. Networks 2018: 7393401:1-7393401:11 (2018) - [j12]Yu Sasaki, Yosuke Todo
:
Tight Bounds of Differentially and Linearly Active S-Boxes and Division Property of Lilliput. IEEE Trans. Computers 67(5): 717-732 (2018) - [j11]Yosuke Todo
, Takanori Isobe, Yonglin Hao
, Willi Meier:
Cube Attacks on Non-Blackbox Polynomials Based on Division Property. IEEE Trans. Computers 67(12): 1720-1736 (2018) - [j10]Patrick Derbez
, Tetsu Iwata, Ling Sun, Siwei Sun, Yosuke Todo
, Haoyang Wang, Meiqin Wang:
Cryptanalysis of AES-PRF and Its Dual. IACR Trans. Symmetric Cryptol. 2018(2): 161-191 (2018) - [c28]Danping Shi, Siwei Sun, Patrick Derbez, Yosuke Todo
, Bing Sun, Lei Hu:
Programming the Demirci-Selçuk Meet-in-the-Middle Attack with Constraints. ASIACRYPT (2) 2018: 3-34 - [c27]Yuki Funabiki, Yosuke Todo
, Takanori Isobe, Masakatu Morii:
Several MILP-Aided Attacks Against SNOW 2.0. CANS 2018: 394-413 - [c26]Yosuke Todo
, Takanori Isobe, Willi Meier, Kazumaro Aoki, Bin Zhang:
Fast Correlation Attack Revisited - Cryptanalysis on Full Grain-128a, Grain-128, and Grain-v1. CRYPTO (2) 2018: 129-159 - [c25]Qingju Wang
, Yonglin Hao, Yosuke Todo
, Chaoyun Li
, Takanori Isobe, Willi Meier:
Improved Division Property Based Cube Attacks Exploiting Algebraic Properties of Superpoly. CRYPTO (1) 2018: 275-305 - [i16]Yosuke Todo, Takanori Isobe, Willi Meier, Kazumaro Aoki, Bin Zhang:
Fast Correlation Attack Revisited -Cryptanalysis on Full Grain-128a, Grain-128, and Grain-v1. IACR Cryptol. ePrint Arch. 2018: 522 (2018) - [i15]Danping Shi, Siwei Sun, Patrick Derbez
, Yosuke Todo, Bing Sun, Lei Hu:
Programming the Demirci-Selçuk Meet-in-the-Middle Attack with Constraints. IACR Cryptol. ePrint Arch. 2018: 813 (2018) - [i14]Yonglin Hao, Lin Jiao, Chaoyun Li, Willi Meier, Yosuke Todo, Qingju Wang:
Observations on the Dynamic Cube Attack of 855-Round TRIVIUM from Crypto'18. IACR Cryptol. ePrint Arch. 2018: 972 (2018) - 2017
- [j9]Yosuke Todo
:
Integral Cryptanalysis on Full MISTY1. J. Cryptol. 30(3): 920-959 (2017) - [j8]Siwei Sun
, David Gérault, Pascal Lafourcade, Qianqian Yang, Yosuke Todo, Kexin Qiao, Lei Hu:
Analysis of AES, SKINNY, and Others with Constraint Programming. IACR Trans. Symmetric Cryptol. 2017(1): 281-306 (2017) - [j7]Ahmed Abdelkhalek, Yu Sasaki, Yosuke Todo, Mohamed Tolba, Amr M. Youssef:
MILP Modeling for (Large) S-boxes to Optimize Probability of Differential Characteristics. IACR Trans. Symmetric Cryptol. 2017(4): 99-129 (2017) - [c24]Yuki Funabiki, Yosuke Todo
, Takanori Isobe, Masakatu Morii:
Improved Integral Attack on HIGHT. ACISP (1) 2017: 363-383 - [c23]Takeru Koie, Takanori Isobe, Yosuke Todo
, Masakatu Morii:
Low-Data Complexity Attacks on Camellia. ATIS 2017: 128-140 - [c22]Daniel J. Bernstein, Stefan Kölbl, Stefan Lucks, Pedro Maat Costa Massolino, Florian Mendel
, Kashif Nawaz
, Tobias Schneider, Peter Schwabe, François-Xavier Standaert
, Yosuke Todo
, Benoît Viguier:
Gimli : A Cross-Platform Permutation. CHES 2017: 299-320 - [c21]Subhadeep Banik
, Sumit Kumar Pandey, Thomas Peyrin
, Yu Sasaki, Siang Meng Sim
, Yosuke Todo
:
GIFT: A Small Present - Towards Reaching the Limit of Lightweight Encryption. CHES 2017: 321-345 - [c20]Yosuke Todo
, Takanori Isobe, Yonglin Hao, Willi Meier:
Cube Attacks on Non-Blackbox Polynomials Based on Division Property. CRYPTO (3) 2017: 250-279 - [c19]Yu Sasaki, Yosuke Todo
:
New Impossible Differential Search Tool from Design and Cryptanalysis Aspects - Revealing Structural Properties of Several Ciphers. EUROCRYPT (3) 2017: 185-215 - [c18]Kota Kondo, Yu Sasaki, Yosuke Todo
, Tetsu Iwata:
Analyzing Key Schedule of Simon: Iterative Key Differences and Application to Related-Key Impossible Differentials. IWSEC 2017: 141-158 - [c17]Yu Sasaki, Yosuke Todo
:
New Algorithm for Modeling S-box in MILP Based Differential and Division Trail Search. SECITC 2017: 150-165 - [i13]Siwei Sun, David Gérault, Pascal Lafourcade, Qianqian Yang, Yosuke Todo, Kexin Qiao, Lei Hu:
Analysis of AES, SKINNY, and Others with Constraint Programming. IACR Cryptol. ePrint Arch. 2017: 162 (2017) - [i12]Yosuke Todo, Takanori Isobe, Yonglin Hao, Willi Meier:
Cube Attacks on Non-Blackbox Polynomials Based on Division Property. IACR Cryptol. ePrint Arch. 2017: 306 (2017) - [i11]Subhadeep Banik, Sumit Kumar Pandey, Thomas Peyrin, Siang Meng Sim, Yosuke Todo, Yu Sasaki:
GIFT: A Small Present. IACR Cryptol. ePrint Arch. 2017: 622 (2017) - [i10]Daniel J. Bernstein, Stefan Kölbl, Stefan Lucks, Pedro Maat Costa Massolino, Florian Mendel, Kashif Nawaz, Tobias Schneider, Peter Schwabe, François-Xavier Standaert, Yosuke Todo, Benoît Viguier:
Gimli: a cross-platform permutation. IACR Cryptol. ePrint Arch. 2017: 630 (2017) - [i9]Qingju Wang, Yonglin Hao, Yosuke Todo, Chaoyun Li, Takanori Isobe, Willi Meier:
Improved Division Property Based Cube Attacks Exploiting Algebraic Properties of Superpoly. IACR Cryptol. ePrint Arch. 2017: 1063 (2017) - 2016
- [j6]Sho Sakikoyama, Yosuke Todo
, Kazumaro Aoki, Masakatu Morii:
Efficient Implementations for Practical Linear Cryptanalysis and Its Application to FEAL-8X. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 99-A(1): 31-38 (2016) - [j5]Yosuke Todo
:
Impossible Differential Attack against 14-Round Piccolo-80 without Relying on Full Code Book. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 99-A(1): 154-157 (2016) - [c16]Yosuke Todo
, Kazumaro Aoki:
Wide Trail Design Strategy for Binary MixColumns - Enhancing Lower Bound of Number of Active S-boxes. ACNS 2016: 467-484 - [c15]Yosuke Todo
, Gregor Leander
, Yu Sasaki:
Nonlinear Invariant Attack - Practical Attack on Full SCREAM, iSCREAM, and Midori64. ASIACRYPT (2) 2016: 3-33 - [c14]Yuhei Watanabe
, Yosuke Todo
, Masakatu Morii:
New Conditional Differential Cryptanalysis for NLFSR-based Stream Ciphers and Application to Grain v1. AsiaJCIS 2016: 115-123 - [c13]Yosuke Todo
, Masakatu Morii:
Compact Representation for Division Property. CANS 2016: 19-35 - [c12]Yosuke Todo
, Masakatu Morii:
Bit-Based Division Property and Application to Simon Family. FSE 2016: 357-377 - [c11]Yosuke Todo
:
Division Property: Efficient Method to Estimate Upper Bound of Algebraic Degree. Mycrypt 2016: 553-571 - [c10]Yu Sasaki, Yosuke Todo
:
New Differential Bounds and Division Property of Lilliput: Block Cipher with Extended Generalized Feistel Network. SAC 2016: 264-283 - [i8]Yosuke Todo, Masakatu Morii:
Bit-Based Division Property and Application to Simon Family. IACR Cryptol. ePrint Arch. 2016: 285 (2016) - [i7]Yosuke Todo, Gregor Leander, Yu Sasaki:
Nonlinear Invariant Attack -Practical Attack on Full SCREAM, iSCREAM, and Midori64. IACR Cryptol. ePrint Arch. 2016: 732 (2016) - [i6]Yu Sasaki, Yosuke Todo:
New Impossible Differential Search Tool from Design and Cryptanalysis Aspects. IACR Cryptol. ePrint Arch. 2016: 1181 (2016) - 2015
- [j4]Yosuke Todo
:
Upper Bounds for the Security of Several Feistel Networks. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 98-A(1): 39-48 (2015) - [j3]Yosuke Todo
, Kazumaro Aoki:
Fast Fourier Transform Key Recovery for Integral Attacks. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 98-A(9): 1944-1952 (2015) - [c9]Yosuke Todo
:
Integral Cryptanalysis on Full MISTY1. CRYPTO (1) 2015: 413-432 - [c8]Yosuke Todo
:
Structural Evaluation by Generalized Integral Property. EUROCRYPT (1) 2015: 287-314 - [i5]Yosuke Todo:
Structural Evaluation by Generalized Integral Property. IACR Cryptol. ePrint Arch. 2015: 90 (2015) - [i4]Yosuke Todo:
Integral Cryptanalysis on Full MISTY1. IACR Cryptol. ePrint Arch. 2015: 682 (2015) - 2014
- [c7]Yosuke Todo, Kazumaro Aoki:
FFT Key Recovery for Integral Attack. CANS 2014: 64-81 - [c6]Sho Sakikoyama, Yosuke Todo
, Kazumaro Aoki, Masakatu Morii:
How Much Can Complexity of Linear Cryptanalysis Be Reduced? ICISC 2014: 117-131 - [c5]Qingju Wang
, Zhiqiang Liu, Kerem Varici, Yu Sasaki, Vincent Rijmen
, Yosuke Todo
:
Cryptanalysis of Reduced-Round SIMON32 and SIMON48. INDOCRYPT 2014: 143-160 - [c4]Martin R. Albrecht, Jean-Charles Faugère, Robert Fitzpatrick, Ludovic Perret, Yosuke Todo
, Keita Xagawa
:
Practical Cryptanalysis of a Public-Key Encryption Scheme Based on New Multivariate Quadratic Assumptions. Public Key Cryptography 2014: 446-464 - [i3]Yosuke Todo:
FFT-Based Key Recovery for the Integral Attack. IACR Cryptol. ePrint Arch. 2014: 187 (2014) - [i2]Qingju Wang, Zhiqiang Liu, Kerem Varici, Yu Sasaki, Vincent Rijmen, Yosuke Todo:
Cryptanalysis of Reduced-round SIMON32 and SIMON48. IACR Cryptol. ePrint Arch. 2014: 761 (2014) - 2013
- [c3]Yosuke Todo
:
Upper Bounds for the Security of Several Feistel Networks. ACISP 2013: 302-317 - [c2]Yosuke Todo
, Yu Sasaki:
New Property of Diffusion Switching Mechanism on CLEFIA and Its Application to DFA. IWSEC 2013: 99-114 - [i1]Yosuke Todo, Keita Xagawa:
Cryptanalysis of the Huang-Liu-Yang Cryptosystem from PKC 2012. IACR Cryptol. ePrint Arch. 2013: 481 (2013) - 2012
- [j2]Yosuke Todo
, Yuki Ozawa, Toshihiro Ohigashi
, Masakatu Morii:
Falsification Attacks against WPA-TKIP in a Realistic Environment. IEICE Trans. Inf. Syst. 95-D(2): 588-595 (2012) - [c1]T. Tsukaune, Yosuke Todo
, Masakatu Morii:
Proposal of a Secure WEP Operation against Existing Key Recovery Attacks and its Evaluation. AsiaJCIS 2012: 25-30 - 2011
- [j1]Masakatu Morii, Yosuke Todo
:
Cryptanalysis for RC4 and Breaking WEP/WPA-TKIP. IEICE Trans. Inf. Syst. 94-D(11): 2087-2094 (2011)