Piccolo: An Ultra-Lightweight Blockcipher K Shibutani, T Isobe, H Hiwatari, A Mitsuda, T Akishita, T Shirai International workshop on cryptographic hardware and embedded systems, 342-357, 2011 | 609 | 2011 |
Midori: A Block Cipher for Low Energy S Banik, A Bogdanov, T Isobe, K Shibutani, H Hiwatari, T Akishita, ... International Conference on the Theory and Application of Cryptology and …, 2015 | 414 | 2015 |
A single-key attack on the full GOST block cipher T Isobe Journal of cryptology 26 (1), 172-189, 2013 | 137 | 2013 |
Cube attacks on non-blackbox polynomials based on division property Y Todo, T Isobe, Y Hao, W Meier IEEE Transactions on Computers 67 (12), 1720-1736, 2018 | 104 | 2018 |
White-box cryptography revisited: Space-hard ciphers A Bogdanov, T Isobe Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications …, 2015 | 80 | 2015 |
Security analysis of the lightweight block ciphers XTEA, LED and Piccolo T Isobe, K Shibutani Australasian Conference on Information Security and Privacy, 71-86, 2012 | 79 | 2012 |
Full plaintext recovery attack on broadcast RC4 T Isobe, T Ohigashi, Y Watanabe, M Morii International Workshop on Fast Software Encryption, 179-202, 2013 | 78 | 2013 |
Improved division property based cube attacks exploiting algebraic properties of superpoly Q Wang, Y Hao, Y Todo, C Li, T Isobe, W Meier Annual International Cryptology Conference, 275-305, 2018 | 67 | 2018 |
Generic key recovery attack on Feistel scheme T Isobe, K Shibutani International Conference on the Theory and Application of Cryptology and …, 2013 | 55 | 2013 |
Towards practical whitebox cryptography: optimizing efficiency and space hardness A Bogdanov, T Isobe, E Tischhauser International Conference on the Theory and Application of Cryptology and …, 2016 | 48 | 2016 |
Preimage attacks on reduced Tiger and SHA-2 T Isobe, K Shibutani International Workshop on Fast Software Encryption, 139-155, 2009 | 46 | 2009 |
All subkeys recovery attack on block ciphers: Extending meet-in-the-middle approach T Isobe, K Shibutani International Conference on Selected Areas in Cryptography, 202-221, 2012 | 42 | 2012 |
Analysis of software countermeasures for whitebox encryption S Banik, A Bogdanov, T Isobe, MB Jepsen Cryptology ePrint Archive, 2017 | 36 | 2017 |
Fast correlation attack revisited Y Todo, T Isobe, W Meier, K Aoki, B Zhang Annual International Cryptology Conference, 129-159, 2018 | 33 | 2018 |
How to recover any byte of plaintext on RC4 T Ohigashi, T Isobe, Y Watanabe, M Morii International Conference on Selected Areas in Cryptography, 155-173, 2013 | 28 | 2013 |
Converting meet-in-the-middle preimage attack into pseudo collision attack: Application to SHA-2 J Li, T Isobe, K Shibutani International workshop on fast software encryption, 264-286, 2012 | 27 | 2012 |
Towards low energy stream ciphers S Banik, V Mikhalev, F Armknecht, T Isobe, W Meier, A Bogdanov, ... IACR Transactions on Symmetric Cryptology, 1-19, 2018 | 24 | 2018 |
More results on shortest linear programs S Banik, Y Funabiki, T Isobe International Workshop on Security, 109-128, 2019 | 23 | 2019 |
Improved all-subkeys recovery attacks on FOX, KATAN and SHACAL-2 block ciphers T Isobe, K Shibutani International Workshop on Fast Software Encryption, 104-126, 2014 | 21 | 2014 |
Related-key boomerang attacks on KATAN32/48/64 T Isobe, Y Sasaki, J Chen Australasian Conference on Information Security and Privacy, 268-285, 2013 | 21 | 2013 |