The SKINNY Family of Block Ciphers and Its Low-Latency Variant MANTIS C Beierle, J Jean, S Kölbl, G Leander, A Moradi, T Peyrin, Y Sasaki, ... Annual International Cryptology Conference, 123-153, 2016 | 338 | 2016 |
Finding preimages in full MD5 faster than exhaustive search Y Sasaki, K Aoki Annual International Conference on the Theory and Applications of …, 2009 | 216 | 2009 |
GIFT: A Small Present S Banik, SK Pandey, T Peyrin, Y Sasaki, SM Sim, Y Todo International Conference on Cryptographic Hardware and Embedded Systems, 321-345, 2017 | 204 | 2017 |
Preimage attacks on one-block MD4, 63-step MD5 and more K Aoki, Y Sasaki International workshop on selected areas in cryptography, 103-119, 2008 | 169 | 2008 |
Preimages for step-reduced SHA-2 K Aoki, J Guo, K Matusiewicz, Y Sasaki, L Wang International Conference on the Theory and Application of Cryptology and …, 2009 | 125 | 2009 |
Meet-in-the-middle preimage attacks against reduced SHA-0 and SHA-1 K Aoki, Y Sasaki Annual International Cryptology Conference, 70-89, 2009 | 115 | 2009 |
Cryptanalysis of reduced-round SIMON32 and SIMON48 Q Wang, Z Liu, K Varıcı, Y Sasaki, V Rijmen, Y Todo International Conference on Cryptology in India, 143-160, 2014 | 97 | 2014 |
New impossible differential search tool from design and cryptanalysis aspects Y Sasaki, Y Todo Annual International Conference on the Theory and Applications of …, 2017 | 90 | 2017 |
Hot corrosion behavior of boiler tube materials in refuse incineration environment K Yamada, Y Tomono, J Morimoto, Y Sasaki, A Ohmori Vacuum 65 (3-4), 533-540, 2002 | 86 | 2002 |
Meet-in-the-middle technique for integral attacks against feistel ciphers Y Sasaki, L Wang International Conference on Selected Areas in Cryptography, 234-251, 2012 | 66 | 2012 |
Rebound attack on the full LANE compression function K Matusiewicz, M Naya-Plasencia, I Nikolić, Y Sasaki, M Schläffer International Conference on the Theory and Application of Cryptology and …, 2009 | 66 | 2009 |
Meet-in-the-middle preimage attacks on AES hashing modes and an application to whirlpool Y Sasaki International Workshop on Fast Software Encryption, 378-396, 2011 | 63 | 2011 |
Nonlinear invariant attack Y Todo, G Leander, Y Sasaki International Conference on the Theory and Application of Cryptology and …, 2016 | 59 | 2016 |
Boomerang connectivity table: a new cryptanalysis tool C Cid, T Huang, T Peyrin, Y Sasaki, L Song Annual International Conference on the Theory and Applications of …, 2018 | 57 | 2018 |
Preimage attacks on 3, 4, and 5-pass HAVAL Y Sasaki, K Aoki International Conference on the theory and application of cryptology and …, 2008 | 56 | 2008 |
Improved Collision Attack on MD5. Y Sasaki, Y Naito, N Kunihiro, K Ohta IACR Cryptol. ePrint Arch. 2005, 400, 2005 | 53 | 2005 |
Direct inhibition and down-regulation by uremic plasma components of hepatic uptake transporter for SN-38, an active metabolite of irinotecan, in humans K Fujita, T Sugiura, H Okumura, S Umeda, N Nakamichi, Y Watanabe, ... Pharmaceutical research 31 (1), 204-215, 2014 | 44 | 2014 |
MILP modeling for (large) s-boxes to optimize probability of differential characteristics A Abdelkhalek, Y Sasaki, Y Todo, M Tolba, AM Youssef IACR Transactions on Symmetric Cryptology, 99-129, 2017 | 42 | 2017 |
Comprehensive study of integral analysis on 22-round LBlock Y Sasaki, L Wang International Conference on Information Security and Cryptology, 156-169, 2012 | 41 | 2012 |
Generic related-key attacks for HMAC T Peyrin, Y Sasaki, L Wang International Conference on the Theory and Application of Cryptology and …, 2012 | 40 | 2012 |