Edit Profile (opens in new tab) Sasaki, Yu Compute Distance To: Compute Author ID: sasaki.yu Published as: Sasaki, Yu Documents Indexed: 111 Publications since 2006 Co-Authors: 110 Co-Authors with 96 Joint Publications 2,273 Co-Co-Authors all top 5 Co-Authors 13 single-authored 27 Wang, Lei 17 Ohta, Kazuo 10 Todo, Yosuke 9 Aoki, Kazumaro 9 Hosoyamada, Akinori 9 Sakiyama, Kazuo 8 Kunihiro, Noboru 7 Naito, Yusuke 7 Yasuda, Kan 6 Guo, Jian 6 Nikolić, Ivica 6 Peyrin, Thomas 6 Shimoyama, Takeshi 5 Jean, Jérémy 5 Leander, Gregor 4 Iwata, Tetsu 3 Iwamoto, Mitsugu 3 Mendel, Florian 3 Naya-Plasencia, María 3 Ohtahara, Chiaki 3 Sim, Siang Meng 3 Xagawa, Keita 3 Yajima, Jun 2 Bagheri, Nasour 2 Banik, Subhadeep 2 Eichlseder, Maria 2 Hirose, Shoichi 2 Huang, Tao 2 Kondo, Kota 2 Koyama, Takuma 2 Leurent, Gaëtan 2 Liu, Yunwen 2 Matusiewicz, Krystian 2 Okada, Keita 2 Song, Ling 2 Sugawara, Takeshi 2 Tani, Seiichiro 2 Wu, Shuang 2 Yang, Li 1 Ashur, Tomer 1 Beierle, Christof 1 Beyne, Tim 1 Bonnetain, Xavier 1 Bossert, Jannis 1 Canteaut, Anne 1 Chakraborti, Avik 1 Chen, Jiageng 1 Cid, Carlos Frederico 1 Datta, Nilanjan 1 Dinur, Itai 1 Dunkelman, Orr 1 Emami, Sareh 1 Hong, Deukjo 1 Hu, Lei 1 Isobe, Takanori 1 Isuzugawa, Raimu 1 Ito, Gembu 1 Iwasaki, Terutoshi 1 Izui, Kazuhiro 1 Jana, Amit 1 Jha, Ashwin 1 Jia, Keting 1 Jovanovic, Philipp 1 Keller, Nathan 1 Kobayashi, Naoki 1 Kohyama, K. 1 Kölbl, Stefan 1 Komatsubara, Wataru 1 Kumar Pandey, Sumit 1 Kumar, Ashish 1 Lallemand, Virginie 1 Lambooij, Eran 1 Lauridsen, Martin M. 1 Li, Chaoyun 1 List, Eik 1 Liu, Zhiqiang 1 Lucks, Stefan 1 Luykx, Atul 1 Mancillas-López, Cuauhtemoc 1 Matsumoto, Ryutaroh 1 Matsushita, Mitsugu 1 Meier, Willi 1 Mennink, Bart 1 Minaud, Brice 1 Miyahara, Daiki 1 Mizuki, Takaaki 1 Moradi, Amir 1 Moriyama, Osamu 1 Nakasone, Toshiki 1 Nandi, Mridul 1 Nishiwaki, Shinji 1 Perrin, Léo 1 Rahman, Mostafizar 1 Rijmen, Vincent 1 Rotella, Yann 1 Saha, Dhiman 1 Sakai, Yusuke 1 Sarkar, Sumanta 1 Sasdrich, Pascal 1 Schläffer, Martin ...and 17 more Co-Authors all top 5 Serials 3 Journal of Cryptology 1 Computers and Fluids 1 Lithuanian Mathematical Journal 1 IEEE Transactions on Computers 1 Theoretical Computer Science 1 Designs, Codes and Cryptography all top 5 Fields 107 Information and communication theory, circuits (94-XX) 25 Computer science (68-XX) 8 Quantum theory (81-XX) 2 Combinatorics (05-XX) 1 Number theory (11-XX) 1 Probability theory and stochastic processes (60-XX) 1 Statistics (62-XX) 1 Fluid mechanics (76-XX) 1 Operations research, mathematical programming (90-XX) 1 Biology and other natural sciences (92-XX) Publications by Year all cited Publications top 5 cited Publications Citations contained in zbMATH Open 84 Publications have been cited 553 times in 283 Documents Cited by ▼ Year ▼ The \(\mathtt{SKINNY}\) family of block ciphers and its low-latency variant \(\mathtt{MANTIS}\). Zbl 1372.94412Beierle, Christof; Jean, Jérémy; Kölbl, Stefan; Leander, Gregor; Moradi, Amir; Peyrin, Thomas; Sasaki, Yu; Sasdrich, Pascal; Sim, Siang Meng 58 2016 GIFT: a small present. Towards reaching the limit of lightweight encryption. Zbl 1450.94026Banik, Subhadeep; Pandey, Sumit Kumar; Peyrin, Thomas; Sasaki, Yu; Sim, Siang Meng; Todo, Yosuke 36 2017 Boomerang Connectivity Table: a new cryptanalysis tool. Zbl 1428.94065Cid, Carlos; Huang, Tao; Peyrin, Thomas; Sasaki, Yu; Song, Ling 32 2018 Finding preimages in full MD5 faster than exhaustive search. Zbl 1239.94064Sasaki, Yu; Aoki, Kazumaro 26 2009 New impossible differential search tool from design and cryptanalysis aspects. Revealing structural properties of several ciphers. Zbl 1394.94941Sasaki, Yu; Todo, Yosuke 25 2017 Preimage attacks on one-block MD4, 63-step MD5 and more. Zbl 1256.94040Aoki, Kazumaro; Sasaki, Yu 24 2009 Quantum Demiric-Selçuk meet-in-the-middle attacks: applications to 6-round generic Feistel constructions. Zbl 06957564Hosoyamada, Akinori; Sasaki, Yu 22 2018 Quantum attacks without superposition queries: the offline Simon’s algorithm. Zbl 1456.94052Bonnetain, Xavier; Hosoyamada, Akinori; Naya-Plasencia, María; Sasaki, Yu; Schrottenloher, André 19 2019 Meet-in-the-middle preimage attacks against reduced SHA-0 and SHA-1. Zbl 1252.94043Aoki, Kazumaro; Sasaki, Yu 14 2009 Cryptanalysis against symmetric-key schemes with online classical queries and offline quantum computations. Zbl 1507.94040Hosoyamada, Akinori; Sasaki, Yu 14 2018 Quantum chosen-ciphertext attacks against Feistel ciphers. Zbl 1453.94091Ito, Gembu; Hosoyamada, Akinori; Matsumoto, Ryutaroh; Sasaki, Yu; Iwata, Tetsu 13 2019 Rebound attack on the full Lane compression function. Zbl 1267.94083Matusiewicz, Krystian; Naya-Plasencia, María; Nikolić, Ivica; Sasaki, Yu; Schläffer, Martin 13 2009 Preimages for step-reduced SHA-2. Zbl 1267.94030Aoki, Kazumaro; Guo, Jian; Matusiewicz, Krystian; Sasaki, Yu; Wang, Lei 13 2009 Nonlinear invariant attack. Practical attack on full SCREAM, iSCREAM, and Midori64. Zbl 1380.94126Todo, Yosuke; Leander, Gregor; Sasaki, Yu 12 2016 Finding hash collisions with quantum computers by using differential trails with smaller probability than birthday bound. Zbl 1492.81040Hosoyamada, Akinori; Sasaki, Yu 12 2020 Meet-in-the-middle preimage attacks on AES hashing modes and an application to Whirlpool. Zbl 1307.94094Sasaki, Yu 11 2011 Preimage attacks on 3, 4, and 5-pass HAVAL. Zbl 1206.94089Sasaki, Yu; Aoki, Kazumaro 10 2008 Refinements of the \(k\)-tree algorithm for the generalized birthday problem. Zbl 1382.94147Nikolić, Ivica; Sasaki, Yu 9 2015 Known-key distinguishers on 11-round Feistel and collision attacks on its hashing modes. Zbl 1307.94095Sasaki, Yu; Yasuda, Kan 9 2011 Non-full-active Super-Sbox analysis: applications to ECHO and Grøstl. Zbl 1253.94067Sasaki, Yu; Li, Yang; Wang, Lei; Sakiyama, Kazuo; Ohta, Kazuo 9 2010 Cryptanalysis of reduced-round SIMON32 and SIMON48. Zbl 1344.94077Wang, Qingju; Liu, Zhiqiang; Varıcı, Kerem; Sasaki, Yu; Rijmen, Vincent; Todo, Yosuke 8 2014 Generic related-key attacks for HMAC. Zbl 1292.94128Peyrin, Thomas; Sasaki, Yu; Wang, Lei 7 2012 Nonlinear invariant attack: practical attack on full SCREAM, iSCREAM, and Midori64. Zbl 1435.94141Todo, Yosuke; Leander, Gregor; Sasaki, Yu 7 2019 Preimage attacks on step-reduced MD5. Zbl 1285.94094Sasaki, Yu; Aoki, Kazumaro 6 2008 Quantum multicollision-finding algorithm. Zbl 1380.81087Hosoyamada, Akinori; Sasaki, Yu; Xagawa, Keita 6 2017 Meet-in-the-middle technique for integral attacks against Feistel ciphers. Zbl 1327.94073Sasaki, Yu; Wang, Lei 6 2013 Out of oddity – new cryptanalytic techniques against symmetric primitives optimized for integrity proof systems. Zbl 1504.94105Beyne, Tim; Canteaut, Anne; Dinur, Itai; Eichlseder, Maria; Leander, Gregor; Leurent, Gaëtan; Naya-Plasencia, María; Perrin, Léo; Sasaki, Yu; Todo, Yosuke; Wiemer, Friedrich 6 2020 Boomerang distinguishers on MD4-family: first practical results on full 5-pass HAVAL. Zbl 1279.94114Sasaki, Yu 5 2012 Investigating fundamental security requirements on whirlpool: improved preimage and collision attacks. Zbl 1292.94134Sasaki, Yu; Wang, Lei; Wu, Shuang; Wu, Wenling 5 2012 Limited-birthday distinguishers for hash functions. Collisions beyond the birthday bound can be meaningful. Zbl 1314.94076Iwamoto, Mitsugu; Peyrin, Thomas; Sasaki, Yu 5 2013 Updates on generic attacks against HMAC and NMAC. Zbl 1343.94059Guo, Jian; Peyrin, Thomas; Sasaki, Yu; Wang, Lei 5 2014 Meet-in-the-middle attacks on generic Feistel constructions. Zbl 1306.94058Guo, Jian; Jean, Jérémy; Nikolić, Ivica; Sasaki, Yu 5 2014 (Second) preimage attacks on step-reduced RIPEMD/RIPEMD-128 with a new local-collision approach. Zbl 1284.94123Wang, Lei; Sasaki, Yu; Komatsubara, Wataru; Ohta, Kazuo; Sakiyama, Kazuo 5 2011 Meet-in-the-middle preimage attacks on double-branch hash functions: application to RIPEMD and others. Zbl 1284.94107Sasaki, Yu; Aoki, Kazumaro 4 2009 Comprehensive study of integral analysis on 22-round LBlock. Zbl 1342.94094Sasaki, Yu; Wang, Lei 4 2013 Three-subset meet-in-the-middle attack on reduced XTEA. Zbl 1304.94083Sasaki, Yu; Wang, Lei; Sakai, Yasuhide; Sakiyama, Kazuo; Ohta, Kazuo 4 2012 Preimage attacks on step-reduced RIPEMD-128 and RIPEMD-160. Zbl 1295.94121Ohtahara, Chiaki; Sasaki, Yu; Shimoyama, Takeshi 4 2011 Integer linear programming for three-subset meet-in-the-middle attacks: application to GIFT. Zbl 1398.94157Sasaki, Yu 4 2018 Generic state-recovery and forgery attacks on chopmd-MAC and on NMAC/HMAC. Zbl 1414.94914Naito, Yusuke; Sasaki, Yu; Wang, Lei; Yasuda, Kan 4 2013 Correlation of quadratic Boolean functions: cryptanalysis of all versions of full MORUS. Zbl 07178451Shi, Danping; Sun, Siwei; Sasaki, Yu; Li, Chaoyun; Hu, Lei 3 2019 New message difference for MD4. Zbl 1186.94469Sasaki, Yu; Wang, Lei; Ohta, Kazuo; Kunihiro, Noboru 3 2007 On the design rationale of Simon block cipher: integral attacks and impossible differential attacks against Simon variants. Zbl 1348.94062Kondo, Kota; Sasaki, Yu; Iwata, Tetsu 3 2016 Improved known-key distinguishers on Feistel-SP ciphers and application to Camellia. Zbl 1305.94077Sasaki, Yu; Emami, Sareh; Hong, Deukjo; Kumar, Ashish 3 2012 Cryptanalysis of HMAC/NMAC-Whirlpool. Zbl 1314.94070Guo, Jian; Sasaki, Yu; Wang, Lei; Wu, Shuang 3 2013 Finding preimages of Tiger up to 23 steps. Zbl 1285.94100Wang, Lei; Sasaki, Yu 3 2010 How to incorporate associated data in sponge-based authenticated encryption. Zbl 1382.94158Sasaki, Yu; Yasuda, Kan 3 2015 Practical cryptanalysis of PAES. Zbl 1382.94125Jean, Jérémy; Nikolić, Ivica; Sasaki, Yu; Wang, Lei 3 2014 Improved quantum multicollision-finding algorithm. Zbl 07173872Hosoyamada, Akinori; Sasaki, Yu; Tani, Seiichiro; Xagawa, Keita 2 2019 Improved related-tweakey boomerang attacks on Deoxys-BC. Zbl 1423.94101Sasaki, Yu 2 2018 Related-key boomerang attacks on GIFT with automated trail search including BCT effect. Zbl 1439.94046Liu, Yunwen; Sasaki, Yu 2 2019 Experimental verification of super-Sbox analysis – confirmation of detailed attack complexity. Zbl 1344.94072Sasaki, Yu; Takayanagi, Naoyuki; Sakiyama, Kazuo; Ohta, Kazuo 2 2011 Security of MD5 challenge and response: Extension of APOP password recovery attack. Zbl 1153.94428Sasaki, Yu; Wang, Lei; Ohta, Kazuo; Kunihiro, Noboru 2 2008 Improved collision search for SHA-0. Zbl 1172.94591Naito, Yusuke; Sasaki, Yu; Shimoyama, Takeshi; Yajima, Jun; Kunihiro, Noboru; Ohta, Kazuo 2 2006 New differential bounds and division property of Lilliput: block cipher with extended generalized Feistel network. Zbl 1412.94207Sasaki, Yu; Todo, Yosuke 2 2017 Cryptanalysis of reduced NORX. Zbl 1385.94009Bagheri, Nasour; Huang, Tao; Jia, Keting; Mendel, Florian; Sasaki, Yu 2 2016 Equivalent key recovery attacks against HMAC and NMAC with whirlpool reduced to 7 rounds. Zbl 1382.94115Guo, Jian; Sasaki, Yu; Wang, Lei; Wang, Meiqin; Wen, Long 2 2015 How to construct sufficient conditions for hash functions. Zbl 1295.94142Sasaki, Yu; Naito, Yusuke; Yajima, Jun; Shimoyama, Takeshi; Kunihiro, Noboru; Ohta, Kazuo 2 2006 Topology optimization for fluid flows using the MPS method incorporating the level set method. Zbl 07074182Sasaki, Y.; Sato, Y.; Yamada, T.; Izui, K.; Nishiwaki, S. 2 2019 Lightweight authenticated encryption mode suitable for threshold implementation. Zbl 1492.94150Naito, Yusuke; Sasaki, Yu; Sugawara, Takeshi 2 2020 Quantum collision attacks on reduced SHA-256 and SHA-512. Zbl 1487.81066Hosoyamada, Akinori; Sasaki, Yu 2 2021 Universal forgery and multiple forgeries of MergeMAC and generalized constructions. Zbl 07158416Iwata, Tetsu; Lallemand, Virginie; Leander, Gregor; Sasaki, Yu 1 2019 Cryptanalysis of ForkAES. Zbl 1458.94212Banik, Subhadeep; Bossert, Jannis; Jana, Amit; List, Eik; Lucks, Stefan; Meier, Willi; Rahman, Mostafizar; Saha, Dhiman; Sasaki, Yu 1 2019 Related-key boomerang attacks on full ANU lightweight block cipher. Zbl 1440.94080Sasaki, Yu 1 2018 Cryptanalysis of MORUS. Zbl 1446.94095Ashur, Tomer; Eichlseder, Maria; Lauridsen, Martin M.; Leurent, Gaëtan; Minaud, Brice; Rotella, Yann; Sasaki, Yu; Viguier, Benoît 1 2018 A practical forgery attack on Lilliput-AE. Zbl 1457.94126Dunkelman, Orr; Keller, Nathan; Lambooij, Eran; Sasaki, Yu 1 2020 Password recovery on challenge and response: Impossible differential attack on hash function. Zbl 1142.94359Sasaki, Yu; Wang, Lei; Ohta, Kazuo; Kunihiro, Noboru 1 2008 Boomerang distinguishers for full HAS-160 compression function. Zbl 1292.94133Sasaki, Yu; Wang, Lei; Takasaki, Yasuhiro; Sakiyama, Kazuo; Ohta, Kazuo 1 2012 Multi-differential cryptanalysis on reduced DM-PRESENT-80: collisions and other differential properties. Zbl 1342.94078Koyama, Takuma; Sasaki, Yu; Kunihiro, Noboru 1 2013 Related-key boomerang attacks on KATAN32/48/64. Zbl 1316.94079Isobe, Takanori; Sasaki, Yu; Chen, Jiageng 1 2013 Cryptanalysis of reduced sLiSCP permutation in sponge-hash and duplex-AE modes. Zbl 1447.94052Liu, Yunwen; Sasaki, Yu; Song, Ling; Wang, Gaoli 1 2019 Improved integral analysis on tweaked Lesamnta. Zbl 1301.94127Sasaki, Yu; Aoki, Kazumaro 1 2012 Meet-in-the-middle attacks using output truncation in 3-pass HAVAL. Zbl 1307.94093Sasaki, Yu 1 2009 Tight bounds of differentially and linearly active S-boxes and division property of Lilliput. Zbl 1395.94311Sasaki, Yu; Todo, Yosuke 1 2018 Cryptanalyses on a Merkle-Damgård based MAC – almost universal forgery and distinguishing-\(H\) attacks. Zbl 1297.94099Sasaki, Yu 1 2012 A new mode of operation for incremental authenticated encryption with associated data. Zbl 1396.94097Sasaki, Yu; Yasuda, Kan 1 2016 Analysis of the CAESAR candidate silver. Zbl 1396.94085Jean, Jérémy; Sasaki, Yu; Wang, Lei 1 2016 Extended meet-in-the-middle attacks on some Feistel constructions. Zbl 1348.94053Guo, Jian; Jean, Jérémy; Nikolić, Ivica; Sasaki, Yu 1 2016 Improved rebound attacks on AESQ: core permutation of CAESAR candidate PAEQ. Zbl 1346.94090Bagheri, Nasour; Mendel, Florian; Sasaki, Yu 1 2016 Memoryless unbalanced meet-in-the-middle attacks: impossible results and applications. Zbl 1353.94072Sasaki, Yu 1 2014 Cryptanalyses of narrow-pipe mode of operation in AURORA-512 hash function. Zbl 1267.94093Sasaki, Yu 1 2009 Beyond conventional security in sponge-based authenticated encryption modes. Zbl 1443.94064Jovanovic, Philipp; Luykx, Atul; Mennink, Bart; Sasaki, Yu; Yasuda, Kan 1 2019 On the design of bit permutation based ciphers. The interplay among S-box, bit permutation and key-addition. Zbl 1471.68041Sarkar, Sumanta; Sasaki, Yu; Sim, Siang Meng 1 2020 A new algorithm for the unbalanced meet-in-the-middle problem. Zbl 1404.94102Nikolić, Ivica; Sasaki, Yu 1 2016 Generic attacks on strengthened HMAC: \(n\)-bit secure HMAC requires key in all blocks. Zbl 1423.68158Sasaki, Yu; Wang, Lei 1 2014 Quantum collision attacks on reduced SHA-256 and SHA-512. Zbl 1487.81066Hosoyamada, Akinori; Sasaki, Yu 2 2021 Finding hash collisions with quantum computers by using differential trails with smaller probability than birthday bound. Zbl 1492.81040Hosoyamada, Akinori; Sasaki, Yu 12 2020 Out of oddity – new cryptanalytic techniques against symmetric primitives optimized for integrity proof systems. Zbl 1504.94105Beyne, Tim; Canteaut, Anne; Dinur, Itai; Eichlseder, Maria; Leander, Gregor; Leurent, Gaëtan; Naya-Plasencia, María; Perrin, Léo; Sasaki, Yu; Todo, Yosuke; Wiemer, Friedrich 6 2020 Lightweight authenticated encryption mode suitable for threshold implementation. Zbl 1492.94150Naito, Yusuke; Sasaki, Yu; Sugawara, Takeshi 2 2020 A practical forgery attack on Lilliput-AE. Zbl 1457.94126Dunkelman, Orr; Keller, Nathan; Lambooij, Eran; Sasaki, Yu 1 2020 On the design of bit permutation based ciphers. The interplay among S-box, bit permutation and key-addition. Zbl 1471.68041Sarkar, Sumanta; Sasaki, Yu; Sim, Siang Meng 1 2020 Quantum attacks without superposition queries: the offline Simon’s algorithm. Zbl 1456.94052Bonnetain, Xavier; Hosoyamada, Akinori; Naya-Plasencia, María; Sasaki, Yu; Schrottenloher, André 19 2019 Quantum chosen-ciphertext attacks against Feistel ciphers. Zbl 1453.94091Ito, Gembu; Hosoyamada, Akinori; Matsumoto, Ryutaroh; Sasaki, Yu; Iwata, Tetsu 13 2019 Nonlinear invariant attack: practical attack on full SCREAM, iSCREAM, and Midori64. Zbl 1435.94141Todo, Yosuke; Leander, Gregor; Sasaki, Yu 7 2019 Correlation of quadratic Boolean functions: cryptanalysis of all versions of full MORUS. Zbl 07178451Shi, Danping; Sun, Siwei; Sasaki, Yu; Li, Chaoyun; Hu, Lei 3 2019 Improved quantum multicollision-finding algorithm. Zbl 07173872Hosoyamada, Akinori; Sasaki, Yu; Tani, Seiichiro; Xagawa, Keita 2 2019 Related-key boomerang attacks on GIFT with automated trail search including BCT effect. Zbl 1439.94046Liu, Yunwen; Sasaki, Yu 2 2019 Topology optimization for fluid flows using the MPS method incorporating the level set method. Zbl 07074182Sasaki, Y.; Sato, Y.; Yamada, T.; Izui, K.; Nishiwaki, S. 2 2019 Universal forgery and multiple forgeries of MergeMAC and generalized constructions. Zbl 07158416Iwata, Tetsu; Lallemand, Virginie; Leander, Gregor; Sasaki, Yu 1 2019 Cryptanalysis of ForkAES. Zbl 1458.94212Banik, Subhadeep; Bossert, Jannis; Jana, Amit; List, Eik; Lucks, Stefan; Meier, Willi; Rahman, Mostafizar; Saha, Dhiman; Sasaki, Yu 1 2019 Cryptanalysis of reduced sLiSCP permutation in sponge-hash and duplex-AE modes. Zbl 1447.94052Liu, Yunwen; Sasaki, Yu; Song, Ling; Wang, Gaoli 1 2019 Beyond conventional security in sponge-based authenticated encryption modes. Zbl 1443.94064Jovanovic, Philipp; Luykx, Atul; Mennink, Bart; Sasaki, Yu; Yasuda, Kan 1 2019 Boomerang Connectivity Table: a new cryptanalysis tool. Zbl 1428.94065Cid, Carlos; Huang, Tao; Peyrin, Thomas; Sasaki, Yu; Song, Ling 32 2018 Quantum Demiric-Selçuk meet-in-the-middle attacks: applications to 6-round generic Feistel constructions. Zbl 06957564Hosoyamada, Akinori; Sasaki, Yu 22 2018 Cryptanalysis against symmetric-key schemes with online classical queries and offline quantum computations. Zbl 1507.94040Hosoyamada, Akinori; Sasaki, Yu 14 2018 Integer linear programming for three-subset meet-in-the-middle attacks: application to GIFT. Zbl 1398.94157Sasaki, Yu 4 2018 Improved related-tweakey boomerang attacks on Deoxys-BC. Zbl 1423.94101Sasaki, Yu 2 2018 Related-key boomerang attacks on full ANU lightweight block cipher. Zbl 1440.94080Sasaki, Yu 1 2018 Cryptanalysis of MORUS. Zbl 1446.94095Ashur, Tomer; Eichlseder, Maria; Lauridsen, Martin M.; Leurent, Gaëtan; Minaud, Brice; Rotella, Yann; Sasaki, Yu; Viguier, Benoît 1 2018 Tight bounds of differentially and linearly active S-boxes and division property of Lilliput. Zbl 1395.94311Sasaki, Yu; Todo, Yosuke 1 2018 GIFT: a small present. Towards reaching the limit of lightweight encryption. Zbl 1450.94026Banik, Subhadeep; Pandey, Sumit Kumar; Peyrin, Thomas; Sasaki, Yu; Sim, Siang Meng; Todo, Yosuke 36 2017 New impossible differential search tool from design and cryptanalysis aspects. Revealing structural properties of several ciphers. Zbl 1394.94941Sasaki, Yu; Todo, Yosuke 25 2017 Quantum multicollision-finding algorithm. Zbl 1380.81087Hosoyamada, Akinori; Sasaki, Yu; Xagawa, Keita 6 2017 New differential bounds and division property of Lilliput: block cipher with extended generalized Feistel network. Zbl 1412.94207Sasaki, Yu; Todo, Yosuke 2 2017 The \(\mathtt{SKINNY}\) family of block ciphers and its low-latency variant \(\mathtt{MANTIS}\). Zbl 1372.94412Beierle, Christof; Jean, Jérémy; Kölbl, Stefan; Leander, Gregor; Moradi, Amir; Peyrin, Thomas; Sasaki, Yu; Sasdrich, Pascal; Sim, Siang Meng 58 2016 Nonlinear invariant attack. Practical attack on full SCREAM, iSCREAM, and Midori64. Zbl 1380.94126Todo, Yosuke; Leander, Gregor; Sasaki, Yu 12 2016 On the design rationale of Simon block cipher: integral attacks and impossible differential attacks against Simon variants. Zbl 1348.94062Kondo, Kota; Sasaki, Yu; Iwata, Tetsu 3 2016 Cryptanalysis of reduced NORX. Zbl 1385.94009Bagheri, Nasour; Huang, Tao; Jia, Keting; Mendel, Florian; Sasaki, Yu 2 2016 A new mode of operation for incremental authenticated encryption with associated data. Zbl 1396.94097Sasaki, Yu; Yasuda, Kan 1 2016 Analysis of the CAESAR candidate silver. Zbl 1396.94085Jean, Jérémy; Sasaki, Yu; Wang, Lei 1 2016 Extended meet-in-the-middle attacks on some Feistel constructions. Zbl 1348.94053Guo, Jian; Jean, Jérémy; Nikolić, Ivica; Sasaki, Yu 1 2016 Improved rebound attacks on AESQ: core permutation of CAESAR candidate PAEQ. Zbl 1346.94090Bagheri, Nasour; Mendel, Florian; Sasaki, Yu 1 2016 A new algorithm for the unbalanced meet-in-the-middle problem. Zbl 1404.94102Nikolić, Ivica; Sasaki, Yu 1 2016 Refinements of the \(k\)-tree algorithm for the generalized birthday problem. Zbl 1382.94147Nikolić, Ivica; Sasaki, Yu 9 2015 How to incorporate associated data in sponge-based authenticated encryption. Zbl 1382.94158Sasaki, Yu; Yasuda, Kan 3 2015 Equivalent key recovery attacks against HMAC and NMAC with whirlpool reduced to 7 rounds. Zbl 1382.94115Guo, Jian; Sasaki, Yu; Wang, Lei; Wang, Meiqin; Wen, Long 2 2015 Cryptanalysis of reduced-round SIMON32 and SIMON48. Zbl 1344.94077Wang, Qingju; Liu, Zhiqiang; Varıcı, Kerem; Sasaki, Yu; Rijmen, Vincent; Todo, Yosuke 8 2014 Updates on generic attacks against HMAC and NMAC. Zbl 1343.94059Guo, Jian; Peyrin, Thomas; Sasaki, Yu; Wang, Lei 5 2014 Meet-in-the-middle attacks on generic Feistel constructions. Zbl 1306.94058Guo, Jian; Jean, Jérémy; Nikolić, Ivica; Sasaki, Yu 5 2014 Practical cryptanalysis of PAES. Zbl 1382.94125Jean, Jérémy; Nikolić, Ivica; Sasaki, Yu; Wang, Lei 3 2014 Memoryless unbalanced meet-in-the-middle attacks: impossible results and applications. Zbl 1353.94072Sasaki, Yu 1 2014 Generic attacks on strengthened HMAC: \(n\)-bit secure HMAC requires key in all blocks. Zbl 1423.68158Sasaki, Yu; Wang, Lei 1 2014 Meet-in-the-middle technique for integral attacks against Feistel ciphers. Zbl 1327.94073Sasaki, Yu; Wang, Lei 6 2013 Limited-birthday distinguishers for hash functions. Collisions beyond the birthday bound can be meaningful. Zbl 1314.94076Iwamoto, Mitsugu; Peyrin, Thomas; Sasaki, Yu 5 2013 Comprehensive study of integral analysis on 22-round LBlock. Zbl 1342.94094Sasaki, Yu; Wang, Lei 4 2013 Generic state-recovery and forgery attacks on chopmd-MAC and on NMAC/HMAC. Zbl 1414.94914Naito, Yusuke; Sasaki, Yu; Wang, Lei; Yasuda, Kan 4 2013 Cryptanalysis of HMAC/NMAC-Whirlpool. Zbl 1314.94070Guo, Jian; Sasaki, Yu; Wang, Lei; Wu, Shuang 3 2013 Multi-differential cryptanalysis on reduced DM-PRESENT-80: collisions and other differential properties. Zbl 1342.94078Koyama, Takuma; Sasaki, Yu; Kunihiro, Noboru 1 2013 Related-key boomerang attacks on KATAN32/48/64. Zbl 1316.94079Isobe, Takanori; Sasaki, Yu; Chen, Jiageng 1 2013 Generic related-key attacks for HMAC. Zbl 1292.94128Peyrin, Thomas; Sasaki, Yu; Wang, Lei 7 2012 Boomerang distinguishers on MD4-family: first practical results on full 5-pass HAVAL. Zbl 1279.94114Sasaki, Yu 5 2012 Investigating fundamental security requirements on whirlpool: improved preimage and collision attacks. Zbl 1292.94134Sasaki, Yu; Wang, Lei; Wu, Shuang; Wu, Wenling 5 2012 Three-subset meet-in-the-middle attack on reduced XTEA. Zbl 1304.94083Sasaki, Yu; Wang, Lei; Sakai, Yasuhide; Sakiyama, Kazuo; Ohta, Kazuo 4 2012 Improved known-key distinguishers on Feistel-SP ciphers and application to Camellia. Zbl 1305.94077Sasaki, Yu; Emami, Sareh; Hong, Deukjo; Kumar, Ashish 3 2012 Boomerang distinguishers for full HAS-160 compression function. Zbl 1292.94133Sasaki, Yu; Wang, Lei; Takasaki, Yasuhiro; Sakiyama, Kazuo; Ohta, Kazuo 1 2012 Improved integral analysis on tweaked Lesamnta. Zbl 1301.94127Sasaki, Yu; Aoki, Kazumaro 1 2012 Cryptanalyses on a Merkle-Damgård based MAC – almost universal forgery and distinguishing-\(H\) attacks. Zbl 1297.94099Sasaki, Yu 1 2012 Meet-in-the-middle preimage attacks on AES hashing modes and an application to Whirlpool. Zbl 1307.94094Sasaki, Yu 11 2011 Known-key distinguishers on 11-round Feistel and collision attacks on its hashing modes. Zbl 1307.94095Sasaki, Yu; Yasuda, Kan 9 2011 (Second) preimage attacks on step-reduced RIPEMD/RIPEMD-128 with a new local-collision approach. Zbl 1284.94123Wang, Lei; Sasaki, Yu; Komatsubara, Wataru; Ohta, Kazuo; Sakiyama, Kazuo 5 2011 Preimage attacks on step-reduced RIPEMD-128 and RIPEMD-160. Zbl 1295.94121Ohtahara, Chiaki; Sasaki, Yu; Shimoyama, Takeshi 4 2011 Experimental verification of super-Sbox analysis – confirmation of detailed attack complexity. Zbl 1344.94072Sasaki, Yu; Takayanagi, Naoyuki; Sakiyama, Kazuo; Ohta, Kazuo 2 2011 Non-full-active Super-Sbox analysis: applications to ECHO and Grøstl. Zbl 1253.94067Sasaki, Yu; Li, Yang; Wang, Lei; Sakiyama, Kazuo; Ohta, Kazuo 9 2010 Finding preimages of Tiger up to 23 steps. Zbl 1285.94100Wang, Lei; Sasaki, Yu 3 2010 Finding preimages in full MD5 faster than exhaustive search. Zbl 1239.94064Sasaki, Yu; Aoki, Kazumaro 26 2009 Preimage attacks on one-block MD4, 63-step MD5 and more. Zbl 1256.94040Aoki, Kazumaro; Sasaki, Yu 24 2009 Meet-in-the-middle preimage attacks against reduced SHA-0 and SHA-1. Zbl 1252.94043Aoki, Kazumaro; Sasaki, Yu 14 2009 Rebound attack on the full Lane compression function. Zbl 1267.94083Matusiewicz, Krystian; Naya-Plasencia, María; Nikolić, Ivica; Sasaki, Yu; Schläffer, Martin 13 2009 Preimages for step-reduced SHA-2. Zbl 1267.94030Aoki, Kazumaro; Guo, Jian; Matusiewicz, Krystian; Sasaki, Yu; Wang, Lei 13 2009 Meet-in-the-middle preimage attacks on double-branch hash functions: application to RIPEMD and others. Zbl 1284.94107Sasaki, Yu; Aoki, Kazumaro 4 2009 Meet-in-the-middle attacks using output truncation in 3-pass HAVAL. Zbl 1307.94093Sasaki, Yu 1 2009 Cryptanalyses of narrow-pipe mode of operation in AURORA-512 hash function. Zbl 1267.94093Sasaki, Yu 1 2009 Preimage attacks on 3, 4, and 5-pass HAVAL. Zbl 1206.94089Sasaki, Yu; Aoki, Kazumaro 10 2008 Preimage attacks on step-reduced MD5. Zbl 1285.94094Sasaki, Yu; Aoki, Kazumaro 6 2008 Security of MD5 challenge and response: Extension of APOP password recovery attack. Zbl 1153.94428Sasaki, Yu; Wang, Lei; Ohta, Kazuo; Kunihiro, Noboru 2 2008 Password recovery on challenge and response: Impossible differential attack on hash function. Zbl 1142.94359Sasaki, Yu; Wang, Lei; Ohta, Kazuo; Kunihiro, Noboru 1 2008 New message difference for MD4. Zbl 1186.94469Sasaki, Yu; Wang, Lei; Ohta, Kazuo; Kunihiro, Noboru 3 2007 Improved collision search for SHA-0. Zbl 1172.94591Naito, Yusuke; Sasaki, Yu; Shimoyama, Takeshi; Yajima, Jun; Kunihiro, Noboru; Ohta, Kazuo 2 2006 How to construct sufficient conditions for hash functions. Zbl 1295.94142Sasaki, Yu; Naito, Yusuke; Yajima, Jun; Shimoyama, Takeshi; Kunihiro, Noboru; Ohta, Kazuo 2 2006 all cited Publications top 5 cited Publications all top 5 Cited by 532 Authors 25 Sasaki, Yu 13 Wang, Meiqin 10 Naya-Plasencia, María 10 Wu, Wenling 9 Sun, Siwei 8 Dinur, Itai 8 Dunkelman, Orr 8 Mendel, Florian 8 Peyrin, Thomas 8 Todo, Yosuke 7 Dong, Xiaoyang 7 Isobe, Takanori 7 Jean, Jérémy 7 Leander, Gregor 7 Leurent, Gaëtan 7 Mesnager, Sihem 7 Wang, Xiaoyun 6 Guo, Jian 6 Hu, Lei 6 Keller, Nathan 6 Meier, Willi 6 Nandi, Mridul 6 Rijmen, Vincent 6 Schrottenloher, André 6 Youssef, Amr M. 5 Bao, Zhenzhen 5 Beierle, Christof 5 Bogdanov, Andrey 5 Chen, Huaifeng 5 Cui, Tingting 5 Fan, Yanhong 5 Mennink, Bart 5 Rechberger, Christian 5 Shamir, Adi 5 Stănică, Pantelimon 5 Sun, Ling 4 AlTawy, Riham 4 Anand, Ravi 4 Bagheri, Nasour 4 Bonnetain, Xavier 4 Chakraborti, Avik 4 Dobraunig, Christoph 4 Fouque, Pierre-Alain 4 Hosoyamada, Akinori 4 Jha, Ashwin 4 List, Eik 4 Liu, Fukang 4 Liu, Yunwen 4 Lucks, Stefan 4 Nikolić, Ivica 4 Preneel, Bart 4 Schläffer, Martin 4 Seurin, Yannick 4 Wang, Gaoli 3 Andreeva, Elena Anatol’evna 3 Aoki, Kazumaro 3 Banik, Subhadeep 3 Beyne, Tim 3 Datta, Nilanjan 3 Derbez, Patrick 3 Eichlseder, Maria 3 Flórez-Gutiérrez, Antonio 3 Grassi, Lorenzo 3 Guo, Chun 3 Iwata, Tetsu 3 Jin, Chenhui 3 Kim, Jongsung 3 Kircanski, Aleksandar 3 Lambin, Baptiste 3 Lee, Jooyoung 3 Li, Chao 3 Li, Kangquan 3 Li, Muzhou 3 Li, Zheng 3 Lu, Zhenyu 3 Maitra, Arpita 3 Maitra, Subhamoy 3 Mancillas-López, Cuauhtemoc 3 Mandal, Bimal 3 Minematsu, Kazuhiko 3 Mukhopadhyay, Sourav 3 Naito, Yusuke 3 Perrin, Léo 3 Qu, Longjiang 3 Sarkar, Santanu 3 Sibleyras, Ferdinand 3 Sim, Siang Meng 3 Song, Ling 3 Tischhauser, Elmar 3 Tolba, Mohamed 3 Wang, Lei 3 Wang, Peng 3 Wang, Weijia 3 Wei, Yongzhuang 3 Zou, Jian 2 Baek, Seungjun 2 Bellini, Emanuele 2 Broll, Marek 2 Caforio, Andrea 2 Calderini, Marco ...and 432 more Authors all top 5 Cited in 25 Serials 43 Designs, Codes and Cryptography 25 Journal of Cryptology 18 Quantum Information Processing 12 Cryptography and Communications 11 Information Processing Letters 3 Discrete Applied Mathematics 3 Journal of Discrete Mathematical Sciences & Cryptography 2 Discrete Mathematics 2 Applicable Algebra in Engineering, Communication and Computing 2 Finite Fields and their Applications 2 Matematicheskie Voprosy Kriptografii 1 Artificial Intelligence 1 International Journal of Theoretical Physics 1 Chaos, Solitons and Fractals 1 Theoretical Computer Science 1 Journal of Computer Science and Technology 1 Algorithmica 1 Information and Computation 1 Discrete Mathematics and Applications 1 Journal of the Egyptian Mathematical Society 1 Science in China. Series F 1 Advances in Mathematics of Communications 1 Logical Methods in Computer Science 1 Frontiers of Computer Science 1 Prikladnaya Diskretnaya Matematika all top 5 Cited in 18 Fields 268 Information and communication theory, circuits (94-XX) 48 Computer science (68-XX) 43 Quantum theory (81-XX) 20 Number theory (11-XX) 7 Algebraic geometry (14-XX) 6 Combinatorics (05-XX) 5 Order, lattices, ordered algebraic structures (06-XX) 4 Field theory and polynomials (12-XX) 3 Operations research, mathematical programming (90-XX) 2 Mathematical logic and foundations (03-XX) 2 Probability theory and stochastic processes (60-XX) 2 Numerical analysis (65-XX) 2 Game theory, economics, finance, and other social and behavioral sciences (91-XX) 1 Partial differential equations (35-XX) 1 Dynamical systems and ergodic theory (37-XX) 1 Sequences, series, summability (40-XX) 1 Manifolds and cell complexes (57-XX) 1 Global analysis, analysis on manifolds (58-XX) Citations by Year