The following pages link to Yosuke Todo (Q778932):
Displayed 41 items.
- On the data limitation of small-state stream ciphers: correlation attacks on Fruit-80 and Plantlet (Q778934) (← links)
- PRINCEv2. More security for (almost) no overhead (Q832374) (← links)
- Improved division property based cube attacks exploiting algebraic properties of superpoly (Q1673396) (← links)
- Cube attacks on non-blackbox polynomials based on division property (Q1675203) (← links)
- New differential bounds and division property of Lilliput: block cipher with extended generalized Feistel network (Q1698641) (← links)
- Programming the Demirci-Selçuk meet-in-the-middle attack with constraints (Q1710587) (← links)
- Fast correlation attack revisited -- cryptanalysis on full Grain-128a, Grain-128, and Grain-v1 (Q1784084) (← links)
- Analyzing key schedule of \textsc{Simon}: iterative key differences and application to related-key impossible differentials (Q1800836) (← links)
- Compact representation for division property (Q1801188) (← links)
- Nonlinear invariant attack: practical attack on full SCREAM, iSCREAM, and Midori64 (Q2010591) (← links)
- Modeling for three-subset division property without unknown subset (Q2044753) (← links)
- Modeling for three-subset division property without unknown subset. Improved cube attacks against Trivium and Grain-128AEAD (Q2055620) (← links)
- Out of oddity -- new cryptanalytic techniques against symmetric primitives optimized for integrity proof systems (Q2102068) (← links)
- New attacks from old distinguishers improved attacks on serpent (Q2152176) (← links)
- Improved integral attack on HIGHT (Q2399974) (← links)
- Integral cryptanalysis on full MISTY1 (Q2408592) (← links)
- Division property: efficient method to estimate upper bound of algebraic degree (Q2412252) (← links)
- Lower bounds on the degree of block ciphers (Q2692355) (← links)
- Wide Trail Design Strategy for Binary MixColumns (Q2822689) (← links)
- How Much Can Complexity of Linear Cryptanalysis Be Reduced? (Q2942831) (← links)
- Cryptanalysis of Reduced-Round SIMON32 and SIMON48 (Q2945379) (← links)
- Structural Evaluation by Generalized Integral Property (Q2948332) (← links)
- Nonlinear Invariant Attack (Q2953771) (← links)
- New Property of Diffusion Switching Mechanism on CLEFIA and Its Application to DFA (Q3190017) (← links)
- Integral Cryptanalysis on Full MISTY1 (Q3457121) (← links)
- Cube Attacks on Non-Blackbox Polynomials Based on Division Property (Q4626962) (← links)
- Bit-Based Division Property and Application to Simon Family (Q4639488) (← links)
- GIFT: A Small Present (Q5114641) (← links)
- Improved Division Property Based Cube Attacks Exploiting Algebraic Properties of Superpoly (Q5211704) (← links)
- New Impossible Differential Search Tool from Design and Cryptanalysis Aspects (Q5270362) (← links)
- Upper Bounds for the Security of Several Feistel Networks (Q5300953) (← links)
- Tight Bounds of Differentially and Linearly Active S-Boxes and Division Property of Lilliput (Q5375286) (← links)
- Practical Cryptanalysis of a Public-Key Encryption Scheme Based on New Multivariate Quadratic Assumptions (Q5402987) (← links)
- FFT Key Recovery for Integral Attack (Q5498717) (← links)
- Improved differential-linear attacks with applications to ARX ciphers (Q5918561) (← links)
- Improved differential-linear attacks with applications to ARX ciphers (Q5970775) (← links)
- Keyed sum of permutations: a simpler RP-based PRF (Q6057195) (← links)
- A modular approach to the incompressibility of block-cipher-based AEADs (Q6132427) (← links)
- Strong and tight security guarantees against integral distinguishers (Q6157498) (← links)
- Massive superpoly recovery with nested monomial predictions (Q6157499) (← links)
- Several MILP-Aided Attacks Against SNOW 2.0 (Q6162381) (← links)