Seguir
Yu Sasaki
Yu Sasaki
NTT Secure Platform Labratories
No hay ninguna dirección de correo electrónico verificada.
Título
Citado por
Citado por
Año
The SKINNY Family of Block Ciphers and Its Low-Latency Variant MANTIS
C Beierle, J Jean, S Kölbl, G Leander, A Moradi, T Peyrin, Y Sasaki, ...
Advances in Cryptology–CRYPTO 2016: 36th Annual International Cryptology …, 2016
7602016
GIFT: A Small Present: Towards Reaching the Limit of Lightweight Encryption
S Banik, SK Pandey, T Peyrin, Y Sasaki, SM Sim, Y Todo
Cryptographic Hardware and Embedded Systems–CHES 2017: 19th International …, 2017
5512017
Finding preimages in full MD5 faster than exhaustive search
Y Sasaki, K Aoki
Advances in Cryptology-EUROCRYPT 2009: 28th Annual International Conference …, 2009
2582009
New impossible differential search tool from design and cryptanalysis aspects: Revealing structural properties of several ciphers
Y Sasaki, Y Todo
Advances in Cryptology–EUROCRYPT 2017: 36th Annual International Conference …, 2017
2112017
Preimage attacks on one-block MD4, 63-step MD5 and more
K Aoki, Y Sasaki
Selected Areas in Cryptography: 15th International Workshop, SAC 2008 …, 2009
1992009
Boomerang connectivity table: a new cryptanalysis tool
C Cid, T Huang, T Peyrin, Y Sasaki, L Song
Advances in Cryptology–EUROCRYPT 2018: 37th Annual International Conference …, 2018
1922018
Preimages for step-reduced SHA-2
K Aoki, J Guo, K Matusiewicz, Y Sasaki, L Wang
Advances in Cryptology–ASIACRYPT 2009: 15th International Conference on the …, 2009
1462009
Meet-in-the-middle preimage attacks against reduced SHA-0 and SHA-1
K Aoki, Y Sasaki
Advances in Cryptology-CRYPTO 2009: 29th Annual International Cryptology …, 2009
1422009
MILP modeling for (large) s-boxes to optimize probability of differential characteristics
A Abdelkhalek, Y Sasaki, Y Todo, M Tolba, AM Youssef
IACR Transactions on Symmetric Cryptology, 99-129, 2017
1382017
Cryptanalysis of reduced-round SIMON32 and SIMON48
Q Wang, Z Liu, K Varıcı, Y Sasaki, V Rijmen, Y Todo
Progress in Cryptology--INDOCRYPT 2014: 15th International Conference on …, 2014
1272014
Quantum attacks without superposition queries: the offline Simon’s algorithm
X Bonnetain, A Hosoyamada, M Naya-Plasencia, Y Sasaki, ...
International Conference on the Theory and Application of Cryptology and …, 2019
1222019
Nonlinear invariant attack: Practical attack on full scream, i scream, and midori 64
Y Todo, G Leander, Y Sasaki
International Conference on the Theory and Application of Cryptology and …, 2016
1182016
Meet-in-the-middle preimage attacks on AES hashing modes and an application to whirlpool
Y Sasaki
IEICE Transactions on Fundamentals of Electronics, Communications and …, 2013
1012013
Quantum Demiric-Selçuk meet-in-the-middle attacks: applications to 6-round generic Feistel constructions
A Hosoyamada, Y Sasaki
Security and Cryptography for Networks: 11th International Conference, SCN …, 2018
902018
Gift-cofb
S Banik, A Chakraborti, A Inoue, T Iwata, K Minematsu, M Nandi, T Peyrin, ...
Cryptology ePrint Archive, 2020
842020
Finding hash collisions with quantum computers by using differential trails with smaller probability than birthday bound
A Hosoyamada, Y Sasaki
Advances in Cryptology–EUROCRYPT 2020: 39th Annual International Conference …, 2020
812020
New algorithm for modeling S-box in MILP based differential and division trail search
Y Sasaki, Y Todo
Innovative Security Solutions for Information Technology and Communications …, 2017
772017
Meet-in-the-middle technique for integral attacks against feistel ciphers
Y Sasaki, L Wang
Selected Areas in Cryptography: 19th International Conference, SAC 2012 …, 2013
762013
Quantum chosen-ciphertext attacks against Feistel ciphers
G Ito, A Hosoyamada, R Matsumoto, Y Sasaki, T Iwata
Topics in Cryptology–CT-RSA 2019: The Cryptographers' Track at the RSA …, 2019
742019
Rebound Attack on the Full Lane Compression Function
K Matusiewicz, M Naya-Plasencia, I Nikolić, Y Sasaki, M Schläffer
International Conference on the Theory and Application of Cryptology and …, 2009
732009
El sistema no puede realizar la operación en estos momentos. Inténtalo de nuevo más tarde.
Artículos 1–20