Yu Sasaki

From MaRDI portal



List of research outcomes

This list is not complete and representing at the moment only items from zbMATH Open and arXiv. We are working on additional sources - please check back here soon!

PublicationDate of PublicationType
The exact multi-user security of 2-key triple DES2024-11-12Paper
The exact multi-user security of (tweakable) key alternating ciphers with a single permutation2024-11-12Paper
Designing S-boxes providing stronger security against differential cryptanalysis for ciphers using byte-wise XOR2024-10-14Paper
KIVR: committing authenticated encryption using redundancy and application to GCM, CCM, and more2024-05-31Paper
Secret can be public: low-memory AEAD mode for high-order masking
Advances in Cryptology – CRYPTO 2022
2023-06-30Paper
Double-block-length hash function for minimum memory size
Lecture Notes in Computer Science
2023-05-12Paper
\textsf{Elastic-Tweak}: a framework for short tweak tweakable block cipher
Lecture Notes in Computer Science
2023-05-12Paper
A card-minimal three-input and protocol using two shuffles2023-03-30Paper
Optimizing Online Permutation-Based AE Schemes for Lightweight Applications
Information Security Practice and Experience
2022-12-09Paper
Out of oddity -- new cryptanalytic techniques against symmetric primitives optimized for integrity proof systems2022-12-07Paper
Rate-one AE with security under RUP2022-11-02Paper
Quantum collision attacks on reduced SHA-256 and SHA-5122022-03-31Paper
Finding hash collisions with quantum computers by using differential trails with smaller probability than birthday bound2022-03-23Paper
Lightweight authenticated encryption mode suitable for threshold implementation2022-03-23Paper
On the design of bit permutation based ciphers. The interplay among S-box, bit permutation and key-addition2021-02-23Paper
Lesamnta-LW revisited: improved security analysis of primitive and new PRF mode2021-02-23Paper
Quantum algorithm for the multicollision problem
Theoretical Computer Science
2020-10-12Paper
GIFT: a small present. Towards reaching the limit of lightweight encryption
Lecture Notes in Computer Science
2020-06-24Paper
A practical forgery attack on Lilliput-AE
Journal of Cryptology
2020-06-15Paper
Related-key boomerang attacks on GIFT with automated trail search including BCT effect2020-05-27Paper
Quantum attacks without superposition queries: the offline Simon's algorithm
(available as arXiv preprint)
2020-05-20Paper
Correlation of quadratic Boolean functions: cryptanalysis of all versions of full MORUS2020-03-09Paper
Improved quantum multicollision-finding algorithm
(available as arXiv preprint)
2020-02-25Paper
Cryptanalysis of ForkAES2020-01-30Paper
Quantum chosen-ciphertext attacks against Feistel ciphers2020-01-28Paper
Universal forgery and multiple forgeries of MergeMAC and generalized constructions2020-01-28Paper
Cryptanalysis against symmetric-key schemes with online classical queries and offline quantum computations2020-01-21Paper
Nonlinear invariant attack: practical attack on full SCREAM, iSCREAM, and Midori64
Journal of Cryptology
2019-11-27Paper
Beyond conventional security in sponge-based authenticated encryption modes
Journal of Cryptology
2019-08-13Paper
Cryptanalysis of reduced sLiSCP permutation in sponge-hash and duplex-AE modes2019-02-20Paper
Cryptanalysis of MORUS
Lecture Notes in Computer Science
2019-01-23Paper
Integer linear programming for three-subset meet-in-the-middle attacks: application to GIFT2018-10-24Paper
Analyzing key schedule of \textsc{Simon}: iterative key differences and application to related-key impossible differentials2018-10-24Paper
Quantum Demiric-Selçuk meet-in-the-middle attacks: applications to 6-round generic Feistel constructions2018-10-17Paper
Tight Bounds of Differentially and Linearly Active S-Boxes and Division Property of Lilliput
IEEE Transactions on Computers
2018-09-14Paper
Related-key boomerang attacks on full ANU lightweight block cipher2018-08-10Paper
Improved related-tweakey boomerang attacks on Deoxys-BC2018-07-17Paper
Boomerang Connectivity Table: a new cryptanalysis tool2018-07-09Paper
Cryptanalysis of reduced NORX
Fast Software Encryption
2018-05-09Paper
Quantum multicollision-finding algorithm2018-03-08Paper
New differential bounds and division property of Lilliput: block cipher with extended generalized Feistel network2018-02-16Paper
New impossible differential search tool from design and cryptanalysis aspects. Revealing structural properties of several ciphers
Lecture Notes in Computer Science
2017-06-23Paper
A new algorithm for the unbalanced meet-in-the-middle problem
Advances in Cryptology – ASIACRYPT 2016
2017-02-01Paper
Nonlinear invariant attack. Practical attack on full SCREAM, iSCREAM, and Midori64
Advances in Cryptology – ASIACRYPT 2016
2017-01-06Paper
The SKINNY Family of Block Ciphers and Its Low-Latency Variant MANTIS
Advances in Cryptology – CRYPTO 2016
2016-10-27Paper
On the Design Rationale of Simon Block Cipher: Integral Attacks and Impossible Differential Attacks against Simon Variants
Applied Cryptography and Network Security
2016-10-04Paper
Improved rebound attacks on AESQ: core permutation of CAESAR candidate PAEQ
Information Security and Privacy
2016-09-02Paper
Extended meet-in-the-middle attacks on some Feistel constructions
Designs, Codes and Cryptography
2016-07-21Paper
A New Mode of Operation for Incremental Authenticated Encryption with Associated Data
Lecture Notes in Computer Science
2016-05-19Paper
Analysis of the CAESAR candidate silver
Lecture Notes in Computer Science
2016-05-19Paper
Practical Cryptanalysis of PAES
Selected Areas in Cryptography -- SAC 2014
2016-04-13Paper
Refinements of the k-tree Algorithm for the Generalized Birthday Problem
Advances in Cryptology – ASIACRYPT 2015
2016-03-23Paper
How to incorporate associated data in sponge-based authenticated encryption
Lecture Notes in Computer Science
2016-03-02Paper
Meet-in-the-middle technique for integral attacks against Feistel ciphers
Selected Areas in Cryptography
2015-12-04Paper
Bitwise partial-sum on HIGHT: a new tool for integral analysis against ARX designs
Information Security and Cryptology -- ICISC 2013
2015-10-16Paper
Improved single-key distinguisher on HMAC-MD5 and key recovery attacks on sandwich-MAC-MD5
Selected Areas in Cryptography -- SAC 2013
2015-10-01Paper
Equivalent key recovery attacks against HMAC and NMAC with whirlpool reduced to 7 rounds
Fast Software Encryption
2015-09-18Paper
Cryptanalysis of reduced-round SIMON32 and SIMON48
Progress in Cryptology -- INDOCRYPT 2014
2015-09-10Paper
Message extension attack against authenticated encryptions: application to PANDA
Cryptology and Network Security
2015-02-10Paper
Meet-in-the-middle attacks on generic Feistel constructions
Lecture Notes in Computer Science
2015-01-16Paper
Generic Attacks on Strengthened HMAC: n-bit Secure HMAC Requires Key in All Blocks
Lecture Notes in Computer Science
2014-10-14Paper
Generic state-recovery and forgery attacks on chopmd-MAC and on NMAC/HMAC
Advances in Information and Computer Security
2014-09-15Paper
New property of diffusion switching mechanism on CLEFIA and its application to DFA
Advances in Information and Computer Security
2014-09-15Paper
How to construct sufficient conditions for hash functions
Progress in Cryptology - VIETCRYPT 2006
2014-08-21Paper
Double-SP is weaker than single-SP: rebound attacks on Feistel ciphers with several rounds
Lecture Notes in Computer Science
2014-08-20Paper
Updates on generic attacks against HMAC and NMAC
Advances in Cryptology – CRYPTO 2014
2014-08-07Paper
Memoryless unbalanced meet-in-the-middle attacks: impossible results and applications
Applied Cryptography and Network Security
2014-07-07Paper
An automated evaluation tool for improved rebound attack: new distinguishers and proposals of shiftbytes parameters for Grøstl
Topics in Cryptology – CT-RSA 2014
2014-03-28Paper
Preimage attacks on Feistel-SP functions: impact of omitting the last network twist
Applied Cryptography and Network Security
2014-01-24Paper
Limited-birthday distinguishers for hash functions. Collisions beyond the birthday bound can be meaningful
Advances in Cryptology - ASIACRYPT 2013
2013-12-10Paper
Cryptanalysis of HMAC/NMAC-Whirlpool
Advances in Cryptology - ASIACRYPT 2013
2013-12-10Paper
Related-key boomerang attacks on KATAN32/48/64
Information Security and Privacy
2013-06-28Paper
Comprehensive study of integral analysis on 22-round LBlock
Lecture Notes in Computer Science
2013-06-04Paper
Multi-differential Cryptanalysis on Reduced DM-PRESENT-80: Collisions and Other Differential Properties
Lecture Notes in Computer Science
2013-06-04Paper
Key-Dependent Weakness of AES-Based Ciphers under Clockwise Collision Distinguisher
Lecture Notes in Computer Science
2013-06-04Paper
Polynomial-advantage cryptanalysis of 3D cipher and 3D-based hash function
Advances in Information and Computer Security
2013-04-04Paper
Boomerang distinguishers for full HAS-160 compression function
Advances in Information and Computer Security
2013-04-04Paper
Generic Related-Key Attacks for HMAC
Advances in Cryptology – ASIACRYPT 2012
2013-03-19Paper
Investigating fundamental security requirements on whirlpool: improved preimage and collision attacks
Advances in Cryptology – ASIACRYPT 2012
2013-03-19Paper
Improved integral analysis on tweaked Lesamnta
Information Security and Cryptology - ICISC 2011
2012-11-01Paper
Improved known-key distinguishers on Feistel-SP ciphers and application to Camellia
Information Security and Privacy
2012-09-07Paper
Preimage attacks on full-ARIRANG: analysis of DM-mode with middle feed-forward
Information Security Applications
2012-08-17Paper
Three-subset meet-in-the-middle attack on reduced XTEA
Progress in Cryptology - AFRICACRYPT 2012
2012-07-23Paper
Cryptanalyses on a Merkle-Damgård based MAC -- almost universal forgery and distinguishing-\(H\) attacks
Advances in Cryptology – EUROCRYPT 2012
2012-06-29Paper
New truncated differential cryptanalysis on 3D block cipher
Information Security Practice and Experience
2012-06-29Paper
Boomerang distinguishers on MD4-family: first practical results on full 5-pass HAVAL
Selected Areas in Cryptography
2012-06-08Paper
Experimental verification of super-Sbox analysis -- confirmation of detailed attack complexity
Advances in Information and Computer Security
2011-11-10Paper
Preimage attacks against PKC98-Hash and HAS-V
Information Security and Cryptology - ICISC 2010
2011-10-27Paper
Preimage attacks on step-reduced RIPEMD-128 and RIPEMD-160
Information Security and Cryptology
2011-07-29Paper
Known-key distinguishers on 11-round Feistel and collision attacks on its hashing modes
Fast Software Encryption
2011-07-07Paper
Meet-in-the-middle preimage attacks on AES hashing modes and an application to Whirlpool
Fast Software Encryption
2011-07-07Paper
Preimage attacks on full-ARIRANG (poster)
Information Security and Privacy
2011-07-07Paper
Collisions of MMO-MD5 and their impact on original MD5
Lecture Notes in Computer Science
2011-06-29Paper
(Second) preimage attacks on step-reduced RIPEMD/RIPEMD-128 with a new local-collision approach
Topics in Cryptology – CT-RSA 2011
2011-02-11Paper
Non-full-active Super-Sbox analysis: applications to ECHO and Grøstl
Advances in Cryptology - ASIACRYPT 2010
2010-12-07Paper
Finding preimages of Tiger up to 23 steps
Fast Software Encryption
2010-07-13Paper
Rebound attack on the full Lane compression function
Advances in Cryptology – ASIACRYPT 2009
2009-12-15Paper
Preimages for step-reduced SHA-2
Advances in Cryptology – ASIACRYPT 2009
2009-12-15Paper
Cryptanalyses of narrow-pipe mode of operation in AURORA-512 hash function
Selected Areas in Cryptography
2009-12-09Paper
Preimage Attacks on One-Block MD4, 63-Step MD5 and More
Selected Areas in Cryptography
2009-11-03Paper
Bit-Free Collision: Application to APOP Attack
Advances in Information and Computer Security
2009-10-28Paper
Meet-in-the-Middle Preimage Attacks Against Reduced SHA-0 and SHA-1
Advances in Cryptology - CRYPTO 2009
2009-10-20Paper
Meet-in-the-Middle Attacks Using Output Truncation in 3-Pass HAVAL
Lecture Notes in Computer Science
2009-09-29Paper
Meet-in-the-Middle Preimage Attacks on Double-Branch Hash Functions: Application to RIPEMD and Others
Information Security and Privacy
2009-06-25Paper
Finding Preimages in Full MD5 Faster Than Exhaustive Search
Advances in Cryptology - EUROCRYPT 2009
2009-05-12Paper
A New Strategy for Finding a Differential Path of SHA-1
Information Security and Privacy
2009-03-06Paper
Preimage Attacks on 3, 4, and 5-Pass HAVAL
Advances in Cryptology - ASIACRYPT 2008
2009-02-10Paper
New Message Difference for MD4
Fast Software Encryption
2008-09-16Paper
Preimage Attacks on Step-Reduced MD5
Information Security and Privacy
2008-07-08Paper
Password Recovery on Challenge and Response: Impossible Differential Attack on Hash Function
Progress in Cryptology – AFRICACRYPT 2008
2008-06-13Paper
Improved Collision Search for SHA-0
Advances in Cryptology – ASIACRYPT 2006
2008-04-24Paper
Security of MD5 Challenge and Response: Extension of APOP Password Recovery Attack
Topics in Cryptology – CT-RSA 2008
2008-04-24Paper
Information Security and Cryptology - ICISC 2005
Lecture Notes in Computer Science
2007-05-02Paper


Research outcomes over time


This page was built for person: Yu Sasaki