Yu Sasaki

From MaRDI portal
Person:1648855



List of research outcomes

This list is not complete and representing at the moment only items from zbMATH Open and arXiv. We are working on additional sources - please check back here soon!

PublicationDate of PublicationType
The exact multi-user security of 2-key triple DES2024-11-12Paper
The exact multi-user security of (tweakable) key alternating ciphers with a single permutation2024-11-12Paper
Designing S-boxes providing stronger security against differential cryptanalysis for ciphers using byte-wise XOR2024-10-14Paper
KIVR: committing authenticated encryption using redundancy and application to GCM, CCM, and more2024-05-31Paper
Secret can be public: low-memory AEAD mode for high-order masking
Advances in Cryptology – CRYPTO 2022
2023-06-30Paper
Double-block-length hash function for minimum memory size
Lecture Notes in Computer Science
2023-05-12Paper
\textsf{Elastic-Tweak}: a framework for short tweak tweakable block cipher
Lecture Notes in Computer Science
2023-05-12Paper
A card-minimal three-input and protocol using two shuffles2023-03-30Paper
Optimizing Online Permutation-Based AE Schemes for Lightweight Applications
Information Security Practice and Experience
2022-12-09Paper
Out of oddity -- new cryptanalytic techniques against symmetric primitives optimized for integrity proof systems2022-12-07Paper
Rate-one AE with security under RUP2022-11-02Paper
Quantum collision attacks on reduced SHA-256 and SHA-5122022-03-31Paper
Finding hash collisions with quantum computers by using differential trails with smaller probability than birthday bound2022-03-23Paper
Lightweight authenticated encryption mode suitable for threshold implementation2022-03-23Paper
On the design of bit permutation based ciphers. The interplay among S-box, bit permutation and key-addition2021-02-23Paper
Lesamnta-LW revisited: improved security analysis of primitive and new PRF mode2021-02-23Paper
Quantum algorithm for the multicollision problem
Theoretical Computer Science
2020-10-12Paper
GIFT: a small present. Towards reaching the limit of lightweight encryption
Lecture Notes in Computer Science
2020-06-24Paper
A practical forgery attack on Lilliput-AE
Journal of Cryptology
2020-06-15Paper
Related-key boomerang attacks on GIFT with automated trail search including BCT effect2020-05-27Paper
Quantum attacks without superposition queries: the offline Simon's algorithm
(available as arXiv preprint)
2020-05-20Paper
Correlation of quadratic Boolean functions: cryptanalysis of all versions of full MORUS2020-03-09Paper
Improved quantum multicollision-finding algorithm
(available as arXiv preprint)
2020-02-25Paper
Cryptanalysis of ForkAES2020-01-30Paper
Quantum chosen-ciphertext attacks against Feistel ciphers2020-01-28Paper
Universal forgery and multiple forgeries of MergeMAC and generalized constructions2020-01-28Paper
Cryptanalysis against symmetric-key schemes with online classical queries and offline quantum computations2020-01-21Paper
Nonlinear invariant attack: practical attack on full SCREAM, iSCREAM, and Midori64
Journal of Cryptology
2019-11-27Paper
Beyond conventional security in sponge-based authenticated encryption modes
Journal of Cryptology
2019-08-13Paper
Cryptanalysis of reduced sLiSCP permutation in sponge-hash and duplex-AE modes2019-02-20Paper
Cryptanalysis of MORUS
Lecture Notes in Computer Science
2019-01-23Paper
Integer linear programming for three-subset meet-in-the-middle attacks: application to GIFT2018-10-24Paper
Analyzing key schedule of \textsc{Simon}: iterative key differences and application to related-key impossible differentials2018-10-24Paper
Quantum Demiric-Selçuk meet-in-the-middle attacks: applications to 6-round generic Feistel constructions2018-10-17Paper
Tight Bounds of Differentially and Linearly Active S-Boxes and Division Property of Lilliput
IEEE Transactions on Computers
2018-09-14Paper
Related-key boomerang attacks on full ANU lightweight block cipher2018-08-10Paper
Improved related-tweakey boomerang attacks on Deoxys-BC2018-07-17Paper
Boomerang Connectivity Table: a new cryptanalysis tool2018-07-09Paper
Cryptanalysis of reduced NORX
Fast Software Encryption
2018-05-09Paper
Quantum multicollision-finding algorithm2018-03-08Paper
New differential bounds and division property of Lilliput: block cipher with extended generalized Feistel network2018-02-16Paper
New impossible differential search tool from design and cryptanalysis aspects. Revealing structural properties of several ciphers
Lecture Notes in Computer Science
2017-06-23Paper
A new algorithm for the unbalanced meet-in-the-middle problem
Advances in Cryptology – ASIACRYPT 2016
2017-02-01Paper
Nonlinear invariant attack. Practical attack on full SCREAM, iSCREAM, and Midori64
Advances in Cryptology – ASIACRYPT 2016
2017-01-06Paper
The SKINNY Family of Block Ciphers and Its Low-Latency Variant MANTIS
Advances in Cryptology – CRYPTO 2016
2016-10-27Paper
On the Design Rationale of Simon Block Cipher: Integral Attacks and Impossible Differential Attacks against Simon Variants
Applied Cryptography and Network Security
2016-10-04Paper
Improved rebound attacks on AESQ: core permutation of CAESAR candidate PAEQ
Information Security and Privacy
2016-09-02Paper
Extended meet-in-the-middle attacks on some Feistel constructions
Designs, Codes and Cryptography
2016-07-21Paper
A New Mode of Operation for Incremental Authenticated Encryption with Associated Data
Lecture Notes in Computer Science
2016-05-19Paper
Analysis of the CAESAR candidate silver
Lecture Notes in Computer Science
2016-05-19Paper
Practical Cryptanalysis of PAES
Selected Areas in Cryptography -- SAC 2014
2016-04-13Paper
Refinements of the k-tree Algorithm for the Generalized Birthday Problem
Advances in Cryptology – ASIACRYPT 2015
2016-03-23Paper
How to incorporate associated data in sponge-based authenticated encryption
Lecture Notes in Computer Science
2016-03-02Paper
Meet-in-the-middle technique for integral attacks against Feistel ciphers
Selected Areas in Cryptography
2015-12-04Paper
Bitwise partial-sum on HIGHT: a new tool for integral analysis against ARX designs
Information Security and Cryptology -- ICISC 2013
2015-10-16Paper
Improved single-key distinguisher on HMAC-MD5 and key recovery attacks on sandwich-MAC-MD5
Selected Areas in Cryptography -- SAC 2013
2015-10-01Paper
Equivalent key recovery attacks against HMAC and NMAC with whirlpool reduced to 7 rounds
Fast Software Encryption
2015-09-18Paper
Cryptanalysis of reduced-round SIMON32 and SIMON48
Progress in Cryptology -- INDOCRYPT 2014
2015-09-10Paper
Message extension attack against authenticated encryptions: application to PANDA
Cryptology and Network Security
2015-02-10Paper
Meet-in-the-middle attacks on generic Feistel constructions
Lecture Notes in Computer Science
2015-01-16Paper
Generic Attacks on Strengthened HMAC: n-bit Secure HMAC Requires Key in All Blocks
Lecture Notes in Computer Science
2014-10-14Paper
Generic state-recovery and forgery attacks on chopmd-MAC and on NMAC/HMAC
Advances in Information and Computer Security
2014-09-15Paper
New property of diffusion switching mechanism on CLEFIA and its application to DFA
Advances in Information and Computer Security
2014-09-15Paper
How to construct sufficient conditions for hash functions
Progress in Cryptology - VIETCRYPT 2006
2014-08-21Paper
Double-SP is weaker than single-SP: rebound attacks on Feistel ciphers with several rounds
Lecture Notes in Computer Science
2014-08-20Paper
Updates on generic attacks against HMAC and NMAC
Advances in Cryptology – CRYPTO 2014
2014-08-07Paper
Memoryless unbalanced meet-in-the-middle attacks: impossible results and applications
Applied Cryptography and Network Security
2014-07-07Paper
An automated evaluation tool for improved rebound attack: new distinguishers and proposals of shiftbytes parameters for Grøstl
Topics in Cryptology – CT-RSA 2014
2014-03-28Paper
Preimage attacks on Feistel-SP functions: impact of omitting the last network twist
Applied Cryptography and Network Security
2014-01-24Paper
Limited-birthday distinguishers for hash functions. Collisions beyond the birthday bound can be meaningful
Advances in Cryptology - ASIACRYPT 2013
2013-12-10Paper
Cryptanalysis of HMAC/NMAC-Whirlpool
Advances in Cryptology - ASIACRYPT 2013
2013-12-10Paper
Related-key boomerang attacks on KATAN32/48/64
Information Security and Privacy
2013-06-28Paper
Comprehensive study of integral analysis on 22-round LBlock
Lecture Notes in Computer Science
2013-06-04Paper
Multi-differential Cryptanalysis on Reduced DM-PRESENT-80: Collisions and Other Differential Properties
Lecture Notes in Computer Science
2013-06-04Paper
Key-Dependent Weakness of AES-Based Ciphers under Clockwise Collision Distinguisher
Lecture Notes in Computer Science
2013-06-04Paper
Polynomial-advantage cryptanalysis of 3D cipher and 3D-based hash function
Advances in Information and Computer Security
2013-04-04Paper
Boomerang distinguishers for full HAS-160 compression function
Advances in Information and Computer Security
2013-04-04Paper
Generic Related-Key Attacks for HMAC
Advances in Cryptology – ASIACRYPT 2012
2013-03-19Paper
Investigating fundamental security requirements on whirlpool: improved preimage and collision attacks
Advances in Cryptology – ASIACRYPT 2012
2013-03-19Paper
Improved integral analysis on tweaked Lesamnta
Information Security and Cryptology - ICISC 2011
2012-11-01Paper
Improved known-key distinguishers on Feistel-SP ciphers and application to Camellia
Information Security and Privacy
2012-09-07Paper
Preimage attacks on full-ARIRANG: analysis of DM-mode with middle feed-forward
Information Security Applications
2012-08-17Paper
Three-subset meet-in-the-middle attack on reduced XTEA
Progress in Cryptology - AFRICACRYPT 2012
2012-07-23Paper
Cryptanalyses on a Merkle-Damgård based MAC -- almost universal forgery and distinguishing-\(H\) attacks
Advances in Cryptology – EUROCRYPT 2012
2012-06-29Paper
New truncated differential cryptanalysis on 3D block cipher
Information Security Practice and Experience
2012-06-29Paper
Boomerang distinguishers on MD4-family: first practical results on full 5-pass HAVAL
Selected Areas in Cryptography
2012-06-08Paper
Experimental verification of super-Sbox analysis -- confirmation of detailed attack complexity
Advances in Information and Computer Security
2011-11-10Paper
Preimage attacks against PKC98-Hash and HAS-V
Information Security and Cryptology - ICISC 2010
2011-10-27Paper
Preimage attacks on step-reduced RIPEMD-128 and RIPEMD-160
Information Security and Cryptology
2011-07-29Paper
Known-key distinguishers on 11-round Feistel and collision attacks on its hashing modes
Fast Software Encryption
2011-07-07Paper
Meet-in-the-middle preimage attacks on AES hashing modes and an application to Whirlpool
Fast Software Encryption
2011-07-07Paper
Preimage attacks on full-ARIRANG (poster)
Information Security and Privacy
2011-07-07Paper
Collisions of MMO-MD5 and their impact on original MD5
Lecture Notes in Computer Science
2011-06-29Paper
(Second) preimage attacks on step-reduced RIPEMD/RIPEMD-128 with a new local-collision approach
Topics in Cryptology – CT-RSA 2011
2011-02-11Paper
Non-full-active Super-Sbox analysis: applications to ECHO and Grøstl
Advances in Cryptology - ASIACRYPT 2010
2010-12-07Paper
Finding preimages of Tiger up to 23 steps
Fast Software Encryption
2010-07-13Paper
Rebound attack on the full Lane compression function
Advances in Cryptology – ASIACRYPT 2009
2009-12-15Paper
Preimages for step-reduced SHA-2
Advances in Cryptology – ASIACRYPT 2009
2009-12-15Paper
Cryptanalyses of narrow-pipe mode of operation in AURORA-512 hash function
Selected Areas in Cryptography
2009-12-09Paper
Preimage Attacks on One-Block MD4, 63-Step MD5 and More
Selected Areas in Cryptography
2009-11-03Paper
Bit-Free Collision: Application to APOP Attack
Advances in Information and Computer Security
2009-10-28Paper
Meet-in-the-Middle Preimage Attacks Against Reduced SHA-0 and SHA-1
Advances in Cryptology - CRYPTO 2009
2009-10-20Paper
Meet-in-the-Middle Attacks Using Output Truncation in 3-Pass HAVAL
Lecture Notes in Computer Science
2009-09-29Paper
Meet-in-the-Middle Preimage Attacks on Double-Branch Hash Functions: Application to RIPEMD and Others
Information Security and Privacy
2009-06-25Paper
Finding Preimages in Full MD5 Faster Than Exhaustive Search
Advances in Cryptology - EUROCRYPT 2009
2009-05-12Paper
A New Strategy for Finding a Differential Path of SHA-1
Information Security and Privacy
2009-03-06Paper
Preimage Attacks on 3, 4, and 5-Pass HAVAL
Advances in Cryptology - ASIACRYPT 2008
2009-02-10Paper
New Message Difference for MD4
Fast Software Encryption
2008-09-16Paper
Preimage Attacks on Step-Reduced MD5
Information Security and Privacy
2008-07-08Paper
Password Recovery on Challenge and Response: Impossible Differential Attack on Hash Function
Progress in Cryptology – AFRICACRYPT 2008
2008-06-13Paper
Improved Collision Search for SHA-0
Advances in Cryptology – ASIACRYPT 2006
2008-04-24Paper
Security of MD5 Challenge and Response: Extension of APOP Password Recovery Attack
Topics in Cryptology – CT-RSA 2008
2008-04-24Paper
Information Security and Cryptology - ICISC 2005
Lecture Notes in Computer Science
2007-05-02Paper


Research outcomes over time


This page was built for person: Yu Sasaki