Security Analysis of End-to-End Encryption for Zoom Meetings T Isobe, R Ito | 25 | 2021 |
Output prediction attacks on block ciphers using deep learning H Kimura, K Emura, T Isobe, R Ito, K Ogawa, T Ohigashi International Conference on Applied Cryptography and Network Security, 248-276, 2022 | 15 | 2022 |
PNB-focused differential cryptanalysis of ChaCha stream cipher S Miyashita, R Ito, A Miyaji Cryptology ePrint Archive, 2021 | 13* | 2021 |
Distinguishing and key recovery attacks on the reduced-round SNOW-V and SNOW-Vi J Hoki, T Isobe, R Ito, F Liu, K Sakamoto Journal of Information Security and Applications 65, 103100, 2022 | 8 | 2022 |
Cryptanalysis of Rocca and feasibility of its security claim A Hosoyamada, A Inoue, R Ito, T Iwata, K Minematsu, F Sibleyras, Y Todo IACR Transactions on Symmetric Cryptology, 123-151, 2022 | 7 | 2022 |
Rotational cryptanalysis of salsa core function R Ito International Conference on Information Security, 129-145, 2020 | 7 | 2020 |
Security Analysis of SFrame T Isobe, R Ito, K Minematsu IACR Cryptol. ePrint Arch. 2021, 424, 2021 | 6 | 2021 |
New Linear Correlations related to State Information of RC4 PRGA using IV in WPA R Ito, A Miyaji International Workshop on Fast Software Encryption, 557-576, 2015 | 6 | 2015 |
Refined construction of RC4 key setting in WPA R Ito, A Miyaji IEICE Transactions on Fundamentals of Electronics, Communications and …, 2017 | 5 | 2017 |
Areion: Highly-Efficient Permutations and Its Applications (Extended Version) T Isobe, R Ito, F Liu, K Minematsu, M Nakahashi, K Sakamoto, R Shiba Cryptology ePrint Archive, 2023 | 4* | 2023 |
Bit-wise Cryptanalysis on AND-RX Permutation Friet-PC R Ito, R Shiba, K Sakamoto, F Liu, T Isobe | 4 | 2021 |
Distinguishing and key recovery attacks on the reduced-round SNOW-V J Hoki, T Isobe, R Ito, F Liu, K Sakamoto Australasian Conference on Information Security and Privacy, 171-190, 2021 | 3 | 2021 |
Refined glimpse correlations of RC4 R Ito, A Miyaji IEICE Transactions on Fundamentals of Electronics, Communications and …, 2016 | 3 | 2016 |
PNB based differential cryptanalysis of Salsa20 and Chacha N Ghafoori, A Miyaji, R Ito, S Miyashita IEICE TRANSACTIONS on Information and Systems 106 (9), 1407-1422, 2023 | 2 | 2023 |
Parallel SAT Framework to Find Clustering of Differential Characteristics and Its Applications K Sakamoto, R Ito, T Isobe International Conference on Selected Areas in Cryptography, 409-428, 2023 | 2 | 2023 |
New Cryptanalysis of ZUC-256 Initialization Using Modular Differences F Liu, W Meier, S Sarkar, G Wang, R Ito, T Isobe | 2 | 2022 |
New iterated RC4 key correlations and their application to plaintext recovery on WPA-TKIP R Ito, A Miyaji IEICE Transactions on Fundamentals of Electronics, Communications and …, 2021 | 2 | 2021 |
New iterated RC4 Key correlations R Ito, A Miyaji Information Security and Privacy: 23rd Australasian Conference, ACISP 2018 …, 2018 | 2 | 2018 |
Refined RC4 key correlations of internal states in WPA R Ito, A Miyaji IEICE Transactions on Fundamentals of Electronics, Communications and …, 2016 | 2 | 2016 |
How TKIP induces biases of internal states of generic RC4 R Ito, A Miyaji Australasian Conference on Information Security and Privacy, 329-342, 2015 | 2 | 2015 |