Takanori Isobe
Takanori Isobe
Verified email at ai.u-hyogo.ac.jp - Homepage
Title
Cited by
Cited by
Year
Piccolo: An Ultra-Lightweight Blockcipher
K Shibutani, T Isobe, H Hiwatari, A Mitsuda, T Akishita, T Shirai
International workshop on cryptographic hardware and embedded systems, 342-357, 2011
5122011
Midori: A Block Cipher for Low Energy
S Banik, A Bogdanov, T Isobe, K Shibutani, H Hiwatari, T Akishita, ...
International Conference on the Theory and Application of Cryptology and …, 2015
2842015
A single-key attack on the full GOST block cipher
T Isobe
Journal of cryptology 26 (1), 172-189, 2013
1202013
Cube attacks on non-blackbox polynomials based on division property
Y Todo, T Isobe, Y Hao, W Meier
IEEE Transactions on Computers 67 (12), 1720-1736, 2018
772018
Full plaintext recovery attack on broadcast RC4
T Isobe, T Ohigashi, Y Watanabe, M Morii
International Workshop on Fast Software Encryption, 179-202, 2013
722013
Security analysis of the lightweight block ciphers XTEA, LED and Piccolo
T Isobe, K Shibutani
Australasian Conference on Information Security and Privacy, 71-86, 2012
722012
White-box cryptography revisited: Space-hard ciphers
A Bogdanov, T Isobe
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications …, 2015
602015
Preimage attacks on reduced Tiger and SHA-2
T Isobe, K Shibutani
International Workshop on Fast Software Encryption, 139-155, 2009
452009
Improved division property based cube attacks exploiting algebraic properties of superpoly
Q Wang, Y Hao, Y Todo, C Li, T Isobe, W Meier
Annual International Cryptology Conference, 275-305, 2018
442018
Generic key recovery attack on Feistel scheme
T Isobe, K Shibutani
International Conference on the Theory and Application of Cryptology and …, 2013
432013
Towards practical whitebox cryptography: optimizing efficiency and space hardness
A Bogdanov, T Isobe, E Tischhauser
International Conference on the Theory and Application of Cryptology and …, 2016
342016
All subkeys recovery attack on block ciphers: Extending meet-in-the-middle approach
T Isobe, K Shibutani
International Conference on Selected Areas in Cryptography, 202-221, 2012
332012
Analysis of software countermeasures for whitebox encryption
S Banik, A Bogdanov, T Isobe, M Jepsen
IACR Transactions on Symmetric Cryptology, 307-328, 2017
292017
Midori: A Block Cipher for Low Energy (Extended Version).
S Banik, A Bogdanov, T Isobe, K Shibutani, H Hiwatari, T Akishita, ...
IACR Cryptol. ePrint Arch. 2015, 1142, 2015
272015
How to recover any byte of plaintext on RC4
T Ohigashi, T Isobe, Y Watanabe, M Morii
International Conference on Selected Areas in Cryptography, 155-173, 2013
262013
Converting meet-in-the-middle preimage attack into pseudo collision attack: Application to SHA-2
J Li, T Isobe, K Shibutani
International workshop on fast software encryption, 264-286, 2012
252012
Fast correlation attack revisited
Y Todo, T Isobe, W Meier, K Aoki, B Zhang
Annual International Cryptology Conference, 129-159, 2018
182018
Improved all-subkeys recovery attacks on FOX, KATAN and SHACAL-2 block ciphers
T Isobe, K Shibutani
International Workshop on Fast Software Encryption, 104-126, 2014
182014
Related-key boomerang attacks on KATAN32/48/64
T Isobe, Y Sasaki, J Chen
Australasian Conference on Information Security and Privacy, 268-285, 2013
182013
Towards low energy stream ciphers
S Banik, V Mikhalev, F Armknecht, T Isobe, W Meier, A Bogdanov, ...
IACR Transactions on Symmetric Cryptology, 1-19, 2018
162018
The system can't perform the operation now. Try again later.
Articles 1–20