Takanori Isobe

From MaRDI portal
Person:778904

Available identifiers

zbMath Open isobe.takanoriMaRDI QIDQ778904

List of research outcomes





PublicationDate of PublicationType
Parallel SAT framework to find clustering of differential characteristics and its applications2024-10-16Paper
Revisiting the boomerang attack from a perspective of 3-differential2024-07-23Paper
Exploring the optimality of byte-wise permutations of a piccolo-type block Cipher2024-03-26Paper
More Results on Shortest Linear Programs2024-03-14Paper
Tweakable TWINE: Building a Tweakable Block Cipher on Generalized Feistel Structure2024-03-14Paper
Coefficient grouping for complex affine layers2024-02-02Paper
Ghidle: efficient large-state block ciphers for post-quantum security2024-01-11Paper
Analysis of RIPEMD-160: new collision attacks and finding characteristics with MILP2023-12-08Paper
Coefficient grouping: breaking Chaghri and more2023-12-08Paper
An efficient strategy to construct a better differential on multiple-branch-based designs: application to Orthros2023-10-04Paper
Algebraic meet-in-the-middle attack on LowMC2023-08-25Paper
A modular approach to the incompressibility of block-cipher-based AEADs2023-08-16Paper
Several MILP-Aided Attacks Against SNOW 2.02023-06-28Paper
Quantum security analysis of Rocca2023-05-23Paper
Algebraic attacks on Rasta and Dasta using low-degree equations2023-05-12Paper
Three input exclusive-or gate support for Boyar-Peralta's algorithm2023-05-12Paper
Algebraic Attacks on Round-Reduced Keccak2023-04-13Paper
Distinguishing and Key Recovery Attacks on the Reduced-Round SNOW-V2023-04-13Paper
Automatic verification of differential characteristics: application to reduced Gimli2022-12-07Paper
Differential fault attack on Rocca2022-12-07Paper
The inverse of \(\chi\) and its applications to Rasta-like ciphers2022-10-06Paper
Cryptanalysis of full LowMC and LowMC-M with algebraic techniques2022-04-22Paper
WARP: revisiting GFN for lightweight 128-bit block cipher2022-03-25Paper
ACE in chains: how risky is CBC encryption of binary executable files?2021-02-23Paper
Iterative differential characteristic of TRIFLE-BC2020-07-21Paper
Plaintext recovery attacks against XTS beyond collisions2020-07-21Paper
Efficient collision attack frameworks for RIPEMD-1602020-03-09Paper
Improved Division Property Based Cube Attacks Exploiting Algebraic Properties of Superpoly2020-01-28Paper
Cube Attacks on Non-Blackbox Polynomials Based on Division Property2019-03-07Paper
Fast correlation attack revisited -- cryptanalysis on full Grain-128a, Grain-128, and Grain-v12018-09-26Paper
Improved division property based cube attacks exploiting algebraic properties of superpoly2018-09-12Paper
Cryptanalysis of the Full Spritz Stream Cipher2018-05-09Paper
New key recovery attacks on minimal two-round Even-Mansour ciphers2018-04-06Paper
Cube attacks on non-blackbox polynomials based on division property2017-10-27Paper
Conditional differential cryptanalysis for Kreyvium2017-08-25Paper
Improved integral attack on HIGHT2017-08-25Paper
Towards Practical Whitebox Cryptography: Optimizing Efficiency and Space Hardness2017-02-01Paper
Some Proofs of Joint Distributions of Keystream Biases in RC42016-12-21Paper
Midori: A Block Cipher for Low Energy2016-03-23Paper
How Secure is AES Under Leakage2016-03-23Paper
All Subkeys Recovery Attack on Block Ciphers: Extending Meet-in-the-Middle Approach2015-12-04Paper
How to Recover Any Byte of Plaintext on RC42015-10-01Paper
Full Plaintext Recovery Attack on Broadcast RC42015-09-18Paper
Improved All-Subkeys Recovery Attacks on FOX, KATAN and SHACAL-2 Block Ciphers2015-09-18Paper
Generic Key Recovery Attack on Feistel Scheme2013-12-10Paper
Related-Key Boomerang Attacks on KATAN32/48/642013-06-28Paper
A single-key attack on the full GOST block cipher2013-04-15Paper
Slide Cryptanalysis of Lightweight Stream Cipher RAKAPOSHI2013-04-04Paper
Converting Meet-In-The-Middle Preimage Attack into Pseudo Collision Attack: Application to SHA-22013-01-08Paper
Security Analysis of the Lightweight Block Ciphers XTEA, LED and Piccolo2012-09-07Paper
Piccolo: An Ultra-Lightweight Blockcipher2011-10-07Paper
A single-key attack on the full GOST block cipher2011-07-07Paper
Preimage Attacks on Reduced Tiger and SHA-22009-08-11Paper

Research outcomes over time

This page was built for person: Takanori Isobe