GIFT: A Small Present S Banik, SK Pandey, T Peyrin, Y Sasaki, SM Sim, Y Todo International Conference on Cryptographic Hardware and Embedded Systems, 321-345, 2017 | 204 | 2017 |
Structural evaluation by generalized integral property Y Todo Annual International Conference on the Theory and Applications of …, 2015 | 181 | 2015 |
Bit-based division property and application to Simon family Y Todo, M Morii International Conference on Fast Software Encryption, 357-377, 2016 | 114 | 2016 |
Integral cryptanalysis on full MISTY1 Y Todo Journal of Cryptology 30 (3), 920-959, 2017 | 104 | 2017 |
Cryptanalysis of reduced-round SIMON32 and SIMON48 Q Wang, Z Liu, K Varıcı, Y Sasaki, V Rijmen, Y Todo International Conference on Cryptology in India, 143-160, 2014 | 97 | 2014 |
New impossible differential search tool from design and cryptanalysis aspects Y Sasaki, Y Todo Annual International Conference on the Theory and Applications of …, 2017 | 90 | 2017 |
Cube attacks on non-blackbox polynomials based on division property Y Todo, T Isobe, Y Hao, W Meier IEEE Transactions on Computers 67 (12), 1720-1736, 2018 | 77 | 2018 |
Nonlinear Invariant Attack: Practical Attack on Full SCREAM, i SCREAM, and Midori 64 Y Todo, G Leander, Y Sasaki Journal of Cryptology 32 (4), 1383-1422, 2019 | 76* | 2019 |
Gimli: a cross-platform permutation DJ Bernstein, S Kölbl, S Lucks, PMC Massolino, F Mendel, K Nawaz, ... International Conference on Cryptographic Hardware and Embedded Systems, 299-320, 2017 | 58 | 2017 |
Minalpher v1 Y Sasaki, Y Todo, K Aoki, Y Naito, T Sugawara, Y Murakami, M Matsui, ... CAESAR Round 1, 2014 | 49* | 2014 |
Improved division property based cube attacks exploiting algebraic properties of superpoly Y Hao, T Isobe, L Jiao, C Li, W Meier, Y Todo, Q Wang IEEE Transactions on Computers 68 (10), 2019 | 44 | 2019 |
MILP modeling for (large) s-boxes to optimize probability of differential characteristics A Abdelkhalek, Y Sasaki, Y Todo, M Tolba, AM Youssef IACR Transactions on Symmetric Cryptology, 99-129, 2017 | 42 | 2017 |
Analysis of AES, SKINNY, and others with constraint programming S Sun, D Gerault, P Lafourcade, Q Yang, Y Todo, K Qiao, L Hu IACR Transactions on Symmetric Cryptology 2017 (1), 281--306, 2017 | 42 | 2017 |
Falsification attacks against WPA-TKIP in a realistic environment Y Todo, Y Ozawa, T Ohigashi, M Morii IEICE TRANSACTIONS on Information and Systems 95 (2), 588-595, 2012 | 24 | 2012 |
On the design rationale of SIMON block cipher: Integral attacks and impossible differential attacks against SIMON variants K Kondo, Y Sasaki, Y Todo, T Iwata IEICE Transactions on Fundamentals of Electronics, Communications and …, 2018 | 19 | 2018 |
Fast correlation attack revisited Y Todo, T Isobe, W Meier, K Aoki, B Zhang Annual International Cryptology Conference, 129-159, 2018 | 18 | 2018 |
Fast Fourier Transform Key Recovery for Integral Attacks Y Todo, K Aoki IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and …, 2015 | 15* | 2015 |
Cryptanalysis for rc4 and breaking wep/wpa-tkip M Morii, Y Todo IEICE TRANSACTIONS on Information and Systems 94 (11), 2087-2094, 2011 | 14 | 2011 |
New algorithm for modeling S-box in MILP based differential and division trail search Y Sasaki, Y Todo International Conference for Information Technology and Communications, 150-165, 2017 | 13 | 2017 |
New Differential Bounds and Division Property of Lilliput: Block Cipher with Extended Generalized Feistel Network Y Sasaki, Y Todo International Conference on Selected Areas in Cryptography, 264-283, 2016 | 13 | 2016 |