×
Compute Distance To:
Author ID: sasaki.yu Recent zbMATH articles by "Sasaki, Yu"
Published as: Sasaki, Yu
Documents Indexed: 111 Publications since 2006
Co-Authors: 110 Co-Authors with 96 Joint Publications
2,273 Co-Co-Authors
all top 5

Co-Authors

13 single-authored
27 Wang, Lei
17 Ohta, Kazuo
10 Todo, Yosuke
9 Aoki, Kazumaro
9 Hosoyamada, Akinori
9 Sakiyama, Kazuo
8 Kunihiro, Noboru
7 Naito, Yusuke
7 Yasuda, Kan
6 Guo, Jian
6 Nikolić, Ivica
6 Peyrin, Thomas
6 Shimoyama, Takeshi
5 Jean, Jérémy
5 Leander, Gregor
4 Iwata, Tetsu
3 Iwamoto, Mitsugu
3 Mendel, Florian
3 Naya-Plasencia, María
3 Ohtahara, Chiaki
3 Sim, Siang Meng
3 Xagawa, Keita
3 Yajima, Jun
2 Bagheri, Nasour
2 Banik, Subhadeep
2 Eichlseder, Maria
2 Hirose, Shoichi
2 Huang, Tao
2 Kondo, Kota
2 Koyama, Takuma
2 Leurent, Gaëtan
2 Liu, Yunwen
2 Matusiewicz, Krystian
2 Okada, Keita
2 Song, Ling
2 Sugawara, Takeshi
2 Tani, Seiichiro
2 Wu, Shuang
2 Yang, Li
1 Ashur, Tomer
1 Beierle, Christof
1 Beyne, Tim
1 Bonnetain, Xavier
1 Bossert, Jannis
1 Canteaut, Anne
1 Chakraborti, Avik
1 Chen, Jiageng
1 Cid, Carlos Frederico
1 Datta, Nilanjan
1 Dinur, Itai
1 Dunkelman, Orr
1 Emami, Sareh
1 Hong, Deukjo
1 Hu, Lei
1 Isobe, Takanori
1 Isuzugawa, Raimu
1 Ito, Gembu
1 Iwasaki, Terutoshi
1 Izui, Kazuhiro
1 Jana, Amit
1 Jha, Ashwin
1 Jia, Keting
1 Jovanovic, Philipp
1 Keller, Nathan
1 Kobayashi, Naoki
1 Kohyama, K.
1 Kölbl, Stefan
1 Komatsubara, Wataru
1 Kumar Pandey, Sumit
1 Kumar, Ashish
1 Lallemand, Virginie
1 Lambooij, Eran
1 Lauridsen, Martin M.
1 Li, Chaoyun
1 List, Eik
1 Liu, Zhiqiang
1 Lucks, Stefan
1 Luykx, Atul
1 Mancillas-López, Cuauhtemoc
1 Matsumoto, Ryutaroh
1 Matsushita, Mitsugu
1 Meier, Willi
1 Mennink, Bart
1 Minaud, Brice
1 Miyahara, Daiki
1 Mizuki, Takaaki
1 Moradi, Amir
1 Moriyama, Osamu
1 Nakasone, Toshiki
1 Nandi, Mridul
1 Nishiwaki, Shinji
1 Perrin, Léo
1 Rahman, Mostafizar
1 Rijmen, Vincent
1 Rotella, Yann
1 Saha, Dhiman
1 Sakai, Yusuke
1 Sarkar, Sumanta
1 Sasdrich, Pascal
1 Schläffer, Martin
...and 17 more Co-Authors

Publications by Year

Citations contained in zbMATH Open

84 Publications have been cited 553 times in 283 Documents Cited by Year
The \(\mathtt{SKINNY}\) family of block ciphers and its low-latency variant \(\mathtt{MANTIS}\). Zbl 1372.94412
Beierle, Christof; Jean, Jérémy; Kölbl, Stefan; Leander, Gregor; Moradi, Amir; Peyrin, Thomas; Sasaki, Yu; Sasdrich, Pascal; Sim, Siang Meng
58
2016
GIFT: a small present. Towards reaching the limit of lightweight encryption. Zbl 1450.94026
Banik, Subhadeep; Pandey, Sumit Kumar; Peyrin, Thomas; Sasaki, Yu; Sim, Siang Meng; Todo, Yosuke
36
2017
Boomerang Connectivity Table: a new cryptanalysis tool. Zbl 1428.94065
Cid, Carlos; Huang, Tao; Peyrin, Thomas; Sasaki, Yu; Song, Ling
32
2018
Finding preimages in full MD5 faster than exhaustive search. Zbl 1239.94064
Sasaki, Yu; Aoki, Kazumaro
26
2009
New impossible differential search tool from design and cryptanalysis aspects. Revealing structural properties of several ciphers. Zbl 1394.94941
Sasaki, Yu; Todo, Yosuke
25
2017
Preimage attacks on one-block MD4, 63-step MD5 and more. Zbl 1256.94040
Aoki, Kazumaro; Sasaki, Yu
24
2009
Quantum Demiric-Selçuk meet-in-the-middle attacks: applications to 6-round generic Feistel constructions. Zbl 06957564
Hosoyamada, Akinori; Sasaki, Yu
22
2018
Quantum attacks without superposition queries: the offline Simon’s algorithm. Zbl 1456.94052
Bonnetain, Xavier; Hosoyamada, Akinori; Naya-Plasencia, María; Sasaki, Yu; Schrottenloher, André
19
2019
Meet-in-the-middle preimage attacks against reduced SHA-0 and SHA-1. Zbl 1252.94043
Aoki, Kazumaro; Sasaki, Yu
14
2009
Cryptanalysis against symmetric-key schemes with online classical queries and offline quantum computations. Zbl 1507.94040
Hosoyamada, Akinori; Sasaki, Yu
14
2018
Quantum chosen-ciphertext attacks against Feistel ciphers. Zbl 1453.94091
Ito, Gembu; Hosoyamada, Akinori; Matsumoto, Ryutaroh; Sasaki, Yu; Iwata, Tetsu
13
2019
Rebound attack on the full Lane compression function. Zbl 1267.94083
Matusiewicz, Krystian; Naya-Plasencia, María; Nikolić, Ivica; Sasaki, Yu; Schläffer, Martin
13
2009
Preimages for step-reduced SHA-2. Zbl 1267.94030
Aoki, Kazumaro; Guo, Jian; Matusiewicz, Krystian; Sasaki, Yu; Wang, Lei
13
2009
Nonlinear invariant attack. Practical attack on full SCREAM, iSCREAM, and Midori64. Zbl 1380.94126
Todo, Yosuke; Leander, Gregor; Sasaki, Yu
12
2016
Finding hash collisions with quantum computers by using differential trails with smaller probability than birthday bound. Zbl 1492.81040
Hosoyamada, Akinori; Sasaki, Yu
12
2020
Meet-in-the-middle preimage attacks on AES hashing modes and an application to Whirlpool. Zbl 1307.94094
Sasaki, Yu
11
2011
Preimage attacks on 3, 4, and 5-pass HAVAL. Zbl 1206.94089
Sasaki, Yu; Aoki, Kazumaro
10
2008
Refinements of the \(k\)-tree algorithm for the generalized birthday problem. Zbl 1382.94147
Nikolić, Ivica; Sasaki, Yu
9
2015
Known-key distinguishers on 11-round Feistel and collision attacks on its hashing modes. Zbl 1307.94095
Sasaki, Yu; Yasuda, Kan
9
2011
Non-full-active Super-Sbox analysis: applications to ECHO and Grøstl. Zbl 1253.94067
Sasaki, Yu; Li, Yang; Wang, Lei; Sakiyama, Kazuo; Ohta, Kazuo
9
2010
Cryptanalysis of reduced-round SIMON32 and SIMON48. Zbl 1344.94077
Wang, Qingju; Liu, Zhiqiang; Varıcı, Kerem; Sasaki, Yu; Rijmen, Vincent; Todo, Yosuke
8
2014
Generic related-key attacks for HMAC. Zbl 1292.94128
Peyrin, Thomas; Sasaki, Yu; Wang, Lei
7
2012
Nonlinear invariant attack: practical attack on full SCREAM, iSCREAM, and Midori64. Zbl 1435.94141
Todo, Yosuke; Leander, Gregor; Sasaki, Yu
7
2019
Preimage attacks on step-reduced MD5. Zbl 1285.94094
Sasaki, Yu; Aoki, Kazumaro
6
2008
Quantum multicollision-finding algorithm. Zbl 1380.81087
Hosoyamada, Akinori; Sasaki, Yu; Xagawa, Keita
6
2017
Meet-in-the-middle technique for integral attacks against Feistel ciphers. Zbl 1327.94073
Sasaki, Yu; Wang, Lei
6
2013
Out of oddity – new cryptanalytic techniques against symmetric primitives optimized for integrity proof systems. Zbl 1504.94105
Beyne, Tim; Canteaut, Anne; Dinur, Itai; Eichlseder, Maria; Leander, Gregor; Leurent, Gaëtan; Naya-Plasencia, María; Perrin, Léo; Sasaki, Yu; Todo, Yosuke; Wiemer, Friedrich
6
2020
Boomerang distinguishers on MD4-family: first practical results on full 5-pass HAVAL. Zbl 1279.94114
Sasaki, Yu
5
2012
Investigating fundamental security requirements on whirlpool: improved preimage and collision attacks. Zbl 1292.94134
Sasaki, Yu; Wang, Lei; Wu, Shuang; Wu, Wenling
5
2012
Limited-birthday distinguishers for hash functions. Collisions beyond the birthday bound can be meaningful. Zbl 1314.94076
Iwamoto, Mitsugu; Peyrin, Thomas; Sasaki, Yu
5
2013
Updates on generic attacks against HMAC and NMAC. Zbl 1343.94059
Guo, Jian; Peyrin, Thomas; Sasaki, Yu; Wang, Lei
5
2014
Meet-in-the-middle attacks on generic Feistel constructions. Zbl 1306.94058
Guo, Jian; Jean, Jérémy; Nikolić, Ivica; Sasaki, Yu
5
2014
(Second) preimage attacks on step-reduced RIPEMD/RIPEMD-128 with a new local-collision approach. Zbl 1284.94123
Wang, Lei; Sasaki, Yu; Komatsubara, Wataru; Ohta, Kazuo; Sakiyama, Kazuo
5
2011
Meet-in-the-middle preimage attacks on double-branch hash functions: application to RIPEMD and others. Zbl 1284.94107
Sasaki, Yu; Aoki, Kazumaro
4
2009
Comprehensive study of integral analysis on 22-round LBlock. Zbl 1342.94094
Sasaki, Yu; Wang, Lei
4
2013
Three-subset meet-in-the-middle attack on reduced XTEA. Zbl 1304.94083
Sasaki, Yu; Wang, Lei; Sakai, Yasuhide; Sakiyama, Kazuo; Ohta, Kazuo
4
2012
Preimage attacks on step-reduced RIPEMD-128 and RIPEMD-160. Zbl 1295.94121
Ohtahara, Chiaki; Sasaki, Yu; Shimoyama, Takeshi
4
2011
Integer linear programming for three-subset meet-in-the-middle attacks: application to GIFT. Zbl 1398.94157
Sasaki, Yu
4
2018
Generic state-recovery and forgery attacks on chopmd-MAC and on NMAC/HMAC. Zbl 1414.94914
Naito, Yusuke; Sasaki, Yu; Wang, Lei; Yasuda, Kan
4
2013
Correlation of quadratic Boolean functions: cryptanalysis of all versions of full MORUS. Zbl 07178451
Shi, Danping; Sun, Siwei; Sasaki, Yu; Li, Chaoyun; Hu, Lei
3
2019
New message difference for MD4. Zbl 1186.94469
Sasaki, Yu; Wang, Lei; Ohta, Kazuo; Kunihiro, Noboru
3
2007
On the design rationale of Simon block cipher: integral attacks and impossible differential attacks against Simon variants. Zbl 1348.94062
Kondo, Kota; Sasaki, Yu; Iwata, Tetsu
3
2016
Improved known-key distinguishers on Feistel-SP ciphers and application to Camellia. Zbl 1305.94077
Sasaki, Yu; Emami, Sareh; Hong, Deukjo; Kumar, Ashish
3
2012
Cryptanalysis of HMAC/NMAC-Whirlpool. Zbl 1314.94070
Guo, Jian; Sasaki, Yu; Wang, Lei; Wu, Shuang
3
2013
Finding preimages of Tiger up to 23 steps. Zbl 1285.94100
Wang, Lei; Sasaki, Yu
3
2010
How to incorporate associated data in sponge-based authenticated encryption. Zbl 1382.94158
Sasaki, Yu; Yasuda, Kan
3
2015
Practical cryptanalysis of PAES. Zbl 1382.94125
Jean, Jérémy; Nikolić, Ivica; Sasaki, Yu; Wang, Lei
3
2014
Improved quantum multicollision-finding algorithm. Zbl 07173872
Hosoyamada, Akinori; Sasaki, Yu; Tani, Seiichiro; Xagawa, Keita
2
2019
Improved related-tweakey boomerang attacks on Deoxys-BC. Zbl 1423.94101
Sasaki, Yu
2
2018
Related-key boomerang attacks on GIFT with automated trail search including BCT effect. Zbl 1439.94046
Liu, Yunwen; Sasaki, Yu
2
2019
Experimental verification of super-Sbox analysis – confirmation of detailed attack complexity. Zbl 1344.94072
Sasaki, Yu; Takayanagi, Naoyuki; Sakiyama, Kazuo; Ohta, Kazuo
2
2011
Security of MD5 challenge and response: Extension of APOP password recovery attack. Zbl 1153.94428
Sasaki, Yu; Wang, Lei; Ohta, Kazuo; Kunihiro, Noboru
2
2008
Improved collision search for SHA-0. Zbl 1172.94591
Naito, Yusuke; Sasaki, Yu; Shimoyama, Takeshi; Yajima, Jun; Kunihiro, Noboru; Ohta, Kazuo
2
2006
New differential bounds and division property of Lilliput: block cipher with extended generalized Feistel network. Zbl 1412.94207
Sasaki, Yu; Todo, Yosuke
2
2017
Cryptanalysis of reduced NORX. Zbl 1385.94009
Bagheri, Nasour; Huang, Tao; Jia, Keting; Mendel, Florian; Sasaki, Yu
2
2016
Equivalent key recovery attacks against HMAC and NMAC with whirlpool reduced to 7 rounds. Zbl 1382.94115
Guo, Jian; Sasaki, Yu; Wang, Lei; Wang, Meiqin; Wen, Long
2
2015
How to construct sufficient conditions for hash functions. Zbl 1295.94142
Sasaki, Yu; Naito, Yusuke; Yajima, Jun; Shimoyama, Takeshi; Kunihiro, Noboru; Ohta, Kazuo
2
2006
Topology optimization for fluid flows using the MPS method incorporating the level set method. Zbl 07074182
Sasaki, Y.; Sato, Y.; Yamada, T.; Izui, K.; Nishiwaki, S.
2
2019
Lightweight authenticated encryption mode suitable for threshold implementation. Zbl 1492.94150
Naito, Yusuke; Sasaki, Yu; Sugawara, Takeshi
2
2020
Quantum collision attacks on reduced SHA-256 and SHA-512. Zbl 1487.81066
Hosoyamada, Akinori; Sasaki, Yu
2
2021
Universal forgery and multiple forgeries of MergeMAC and generalized constructions. Zbl 07158416
Iwata, Tetsu; Lallemand, Virginie; Leander, Gregor; Sasaki, Yu
1
2019
Cryptanalysis of ForkAES. Zbl 1458.94212
Banik, Subhadeep; Bossert, Jannis; Jana, Amit; List, Eik; Lucks, Stefan; Meier, Willi; Rahman, Mostafizar; Saha, Dhiman; Sasaki, Yu
1
2019
Related-key boomerang attacks on full ANU lightweight block cipher. Zbl 1440.94080
Sasaki, Yu
1
2018
Cryptanalysis of MORUS. Zbl 1446.94095
Ashur, Tomer; Eichlseder, Maria; Lauridsen, Martin M.; Leurent, Gaëtan; Minaud, Brice; Rotella, Yann; Sasaki, Yu; Viguier, Benoît
1
2018
A practical forgery attack on Lilliput-AE. Zbl 1457.94126
Dunkelman, Orr; Keller, Nathan; Lambooij, Eran; Sasaki, Yu
1
2020
Password recovery on challenge and response: Impossible differential attack on hash function. Zbl 1142.94359
Sasaki, Yu; Wang, Lei; Ohta, Kazuo; Kunihiro, Noboru
1
2008
Boomerang distinguishers for full HAS-160 compression function. Zbl 1292.94133
Sasaki, Yu; Wang, Lei; Takasaki, Yasuhiro; Sakiyama, Kazuo; Ohta, Kazuo
1
2012
Multi-differential cryptanalysis on reduced DM-PRESENT-80: collisions and other differential properties. Zbl 1342.94078
Koyama, Takuma; Sasaki, Yu; Kunihiro, Noboru
1
2013
Related-key boomerang attacks on KATAN32/48/64. Zbl 1316.94079
Isobe, Takanori; Sasaki, Yu; Chen, Jiageng
1
2013
Cryptanalysis of reduced sLiSCP permutation in sponge-hash and duplex-AE modes. Zbl 1447.94052
Liu, Yunwen; Sasaki, Yu; Song, Ling; Wang, Gaoli
1
2019
Improved integral analysis on tweaked Lesamnta. Zbl 1301.94127
Sasaki, Yu; Aoki, Kazumaro
1
2012
Meet-in-the-middle attacks using output truncation in 3-pass HAVAL. Zbl 1307.94093
Sasaki, Yu
1
2009
Tight bounds of differentially and linearly active S-boxes and division property of Lilliput. Zbl 1395.94311
Sasaki, Yu; Todo, Yosuke
1
2018
Cryptanalyses on a Merkle-Damgård based MAC – almost universal forgery and distinguishing-\(H\) attacks. Zbl 1297.94099
Sasaki, Yu
1
2012
A new mode of operation for incremental authenticated encryption with associated data. Zbl 1396.94097
Sasaki, Yu; Yasuda, Kan
1
2016
Analysis of the CAESAR candidate silver. Zbl 1396.94085
Jean, Jérémy; Sasaki, Yu; Wang, Lei
1
2016
Extended meet-in-the-middle attacks on some Feistel constructions. Zbl 1348.94053
Guo, Jian; Jean, Jérémy; Nikolić, Ivica; Sasaki, Yu
1
2016
Improved rebound attacks on AESQ: core permutation of CAESAR candidate PAEQ. Zbl 1346.94090
Bagheri, Nasour; Mendel, Florian; Sasaki, Yu
1
2016
Memoryless unbalanced meet-in-the-middle attacks: impossible results and applications. Zbl 1353.94072
Sasaki, Yu
1
2014
Cryptanalyses of narrow-pipe mode of operation in AURORA-512 hash function. Zbl 1267.94093
Sasaki, Yu
1
2009
Beyond conventional security in sponge-based authenticated encryption modes. Zbl 1443.94064
Jovanovic, Philipp; Luykx, Atul; Mennink, Bart; Sasaki, Yu; Yasuda, Kan
1
2019
On the design of bit permutation based ciphers. The interplay among S-box, bit permutation and key-addition. Zbl 1471.68041
Sarkar, Sumanta; Sasaki, Yu; Sim, Siang Meng
1
2020
A new algorithm for the unbalanced meet-in-the-middle problem. Zbl 1404.94102
Nikolić, Ivica; Sasaki, Yu
1
2016
Generic attacks on strengthened HMAC: \(n\)-bit secure HMAC requires key in all blocks. Zbl 1423.68158
Sasaki, Yu; Wang, Lei
1
2014
Quantum collision attacks on reduced SHA-256 and SHA-512. Zbl 1487.81066
Hosoyamada, Akinori; Sasaki, Yu
2
2021
Finding hash collisions with quantum computers by using differential trails with smaller probability than birthday bound. Zbl 1492.81040
Hosoyamada, Akinori; Sasaki, Yu
12
2020
Out of oddity – new cryptanalytic techniques against symmetric primitives optimized for integrity proof systems. Zbl 1504.94105
Beyne, Tim; Canteaut, Anne; Dinur, Itai; Eichlseder, Maria; Leander, Gregor; Leurent, Gaëtan; Naya-Plasencia, María; Perrin, Léo; Sasaki, Yu; Todo, Yosuke; Wiemer, Friedrich
6
2020
Lightweight authenticated encryption mode suitable for threshold implementation. Zbl 1492.94150
Naito, Yusuke; Sasaki, Yu; Sugawara, Takeshi
2
2020
A practical forgery attack on Lilliput-AE. Zbl 1457.94126
Dunkelman, Orr; Keller, Nathan; Lambooij, Eran; Sasaki, Yu
1
2020
On the design of bit permutation based ciphers. The interplay among S-box, bit permutation and key-addition. Zbl 1471.68041
Sarkar, Sumanta; Sasaki, Yu; Sim, Siang Meng
1
2020
Quantum attacks without superposition queries: the offline Simon’s algorithm. Zbl 1456.94052
Bonnetain, Xavier; Hosoyamada, Akinori; Naya-Plasencia, María; Sasaki, Yu; Schrottenloher, André
19
2019
Quantum chosen-ciphertext attacks against Feistel ciphers. Zbl 1453.94091
Ito, Gembu; Hosoyamada, Akinori; Matsumoto, Ryutaroh; Sasaki, Yu; Iwata, Tetsu
13
2019
Nonlinear invariant attack: practical attack on full SCREAM, iSCREAM, and Midori64. Zbl 1435.94141
Todo, Yosuke; Leander, Gregor; Sasaki, Yu
7
2019
Correlation of quadratic Boolean functions: cryptanalysis of all versions of full MORUS. Zbl 07178451
Shi, Danping; Sun, Siwei; Sasaki, Yu; Li, Chaoyun; Hu, Lei
3
2019
Improved quantum multicollision-finding algorithm. Zbl 07173872
Hosoyamada, Akinori; Sasaki, Yu; Tani, Seiichiro; Xagawa, Keita
2
2019
Related-key boomerang attacks on GIFT with automated trail search including BCT effect. Zbl 1439.94046
Liu, Yunwen; Sasaki, Yu
2
2019
Topology optimization for fluid flows using the MPS method incorporating the level set method. Zbl 07074182
Sasaki, Y.; Sato, Y.; Yamada, T.; Izui, K.; Nishiwaki, S.
2
2019
Universal forgery and multiple forgeries of MergeMAC and generalized constructions. Zbl 07158416
Iwata, Tetsu; Lallemand, Virginie; Leander, Gregor; Sasaki, Yu
1
2019
Cryptanalysis of ForkAES. Zbl 1458.94212
Banik, Subhadeep; Bossert, Jannis; Jana, Amit; List, Eik; Lucks, Stefan; Meier, Willi; Rahman, Mostafizar; Saha, Dhiman; Sasaki, Yu
1
2019
Cryptanalysis of reduced sLiSCP permutation in sponge-hash and duplex-AE modes. Zbl 1447.94052
Liu, Yunwen; Sasaki, Yu; Song, Ling; Wang, Gaoli
1
2019
Beyond conventional security in sponge-based authenticated encryption modes. Zbl 1443.94064
Jovanovic, Philipp; Luykx, Atul; Mennink, Bart; Sasaki, Yu; Yasuda, Kan
1
2019
Boomerang Connectivity Table: a new cryptanalysis tool. Zbl 1428.94065
Cid, Carlos; Huang, Tao; Peyrin, Thomas; Sasaki, Yu; Song, Ling
32
2018
Quantum Demiric-Selçuk meet-in-the-middle attacks: applications to 6-round generic Feistel constructions. Zbl 06957564
Hosoyamada, Akinori; Sasaki, Yu
22
2018
Cryptanalysis against symmetric-key schemes with online classical queries and offline quantum computations. Zbl 1507.94040
Hosoyamada, Akinori; Sasaki, Yu
14
2018
Integer linear programming for three-subset meet-in-the-middle attacks: application to GIFT. Zbl 1398.94157
Sasaki, Yu
4
2018
Improved related-tweakey boomerang attacks on Deoxys-BC. Zbl 1423.94101
Sasaki, Yu
2
2018
Related-key boomerang attacks on full ANU lightweight block cipher. Zbl 1440.94080
Sasaki, Yu
1
2018
Cryptanalysis of MORUS. Zbl 1446.94095
Ashur, Tomer; Eichlseder, Maria; Lauridsen, Martin M.; Leurent, Gaëtan; Minaud, Brice; Rotella, Yann; Sasaki, Yu; Viguier, Benoît
1
2018
Tight bounds of differentially and linearly active S-boxes and division property of Lilliput. Zbl 1395.94311
Sasaki, Yu; Todo, Yosuke
1
2018
GIFT: a small present. Towards reaching the limit of lightweight encryption. Zbl 1450.94026
Banik, Subhadeep; Pandey, Sumit Kumar; Peyrin, Thomas; Sasaki, Yu; Sim, Siang Meng; Todo, Yosuke
36
2017
New impossible differential search tool from design and cryptanalysis aspects. Revealing structural properties of several ciphers. Zbl 1394.94941
Sasaki, Yu; Todo, Yosuke
25
2017
Quantum multicollision-finding algorithm. Zbl 1380.81087
Hosoyamada, Akinori; Sasaki, Yu; Xagawa, Keita
6
2017
New differential bounds and division property of Lilliput: block cipher with extended generalized Feistel network. Zbl 1412.94207
Sasaki, Yu; Todo, Yosuke
2
2017
The \(\mathtt{SKINNY}\) family of block ciphers and its low-latency variant \(\mathtt{MANTIS}\). Zbl 1372.94412
Beierle, Christof; Jean, Jérémy; Kölbl, Stefan; Leander, Gregor; Moradi, Amir; Peyrin, Thomas; Sasaki, Yu; Sasdrich, Pascal; Sim, Siang Meng
58
2016
Nonlinear invariant attack. Practical attack on full SCREAM, iSCREAM, and Midori64. Zbl 1380.94126
Todo, Yosuke; Leander, Gregor; Sasaki, Yu
12
2016
On the design rationale of Simon block cipher: integral attacks and impossible differential attacks against Simon variants. Zbl 1348.94062
Kondo, Kota; Sasaki, Yu; Iwata, Tetsu
3
2016
Cryptanalysis of reduced NORX. Zbl 1385.94009
Bagheri, Nasour; Huang, Tao; Jia, Keting; Mendel, Florian; Sasaki, Yu
2
2016
A new mode of operation for incremental authenticated encryption with associated data. Zbl 1396.94097
Sasaki, Yu; Yasuda, Kan
1
2016
Analysis of the CAESAR candidate silver. Zbl 1396.94085
Jean, Jérémy; Sasaki, Yu; Wang, Lei
1
2016
Extended meet-in-the-middle attacks on some Feistel constructions. Zbl 1348.94053
Guo, Jian; Jean, Jérémy; Nikolić, Ivica; Sasaki, Yu
1
2016
Improved rebound attacks on AESQ: core permutation of CAESAR candidate PAEQ. Zbl 1346.94090
Bagheri, Nasour; Mendel, Florian; Sasaki, Yu
1
2016
A new algorithm for the unbalanced meet-in-the-middle problem. Zbl 1404.94102
Nikolić, Ivica; Sasaki, Yu
1
2016
Refinements of the \(k\)-tree algorithm for the generalized birthday problem. Zbl 1382.94147
Nikolić, Ivica; Sasaki, Yu
9
2015
How to incorporate associated data in sponge-based authenticated encryption. Zbl 1382.94158
Sasaki, Yu; Yasuda, Kan
3
2015
Equivalent key recovery attacks against HMAC and NMAC with whirlpool reduced to 7 rounds. Zbl 1382.94115
Guo, Jian; Sasaki, Yu; Wang, Lei; Wang, Meiqin; Wen, Long
2
2015
Cryptanalysis of reduced-round SIMON32 and SIMON48. Zbl 1344.94077
Wang, Qingju; Liu, Zhiqiang; Varıcı, Kerem; Sasaki, Yu; Rijmen, Vincent; Todo, Yosuke
8
2014
Updates on generic attacks against HMAC and NMAC. Zbl 1343.94059
Guo, Jian; Peyrin, Thomas; Sasaki, Yu; Wang, Lei
5
2014
Meet-in-the-middle attacks on generic Feistel constructions. Zbl 1306.94058
Guo, Jian; Jean, Jérémy; Nikolić, Ivica; Sasaki, Yu
5
2014
Practical cryptanalysis of PAES. Zbl 1382.94125
Jean, Jérémy; Nikolić, Ivica; Sasaki, Yu; Wang, Lei
3
2014
Memoryless unbalanced meet-in-the-middle attacks: impossible results and applications. Zbl 1353.94072
Sasaki, Yu
1
2014
Generic attacks on strengthened HMAC: \(n\)-bit secure HMAC requires key in all blocks. Zbl 1423.68158
Sasaki, Yu; Wang, Lei
1
2014
Meet-in-the-middle technique for integral attacks against Feistel ciphers. Zbl 1327.94073
Sasaki, Yu; Wang, Lei
6
2013
Limited-birthday distinguishers for hash functions. Collisions beyond the birthday bound can be meaningful. Zbl 1314.94076
Iwamoto, Mitsugu; Peyrin, Thomas; Sasaki, Yu
5
2013
Comprehensive study of integral analysis on 22-round LBlock. Zbl 1342.94094
Sasaki, Yu; Wang, Lei
4
2013
Generic state-recovery and forgery attacks on chopmd-MAC and on NMAC/HMAC. Zbl 1414.94914
Naito, Yusuke; Sasaki, Yu; Wang, Lei; Yasuda, Kan
4
2013
Cryptanalysis of HMAC/NMAC-Whirlpool. Zbl 1314.94070
Guo, Jian; Sasaki, Yu; Wang, Lei; Wu, Shuang
3
2013
Multi-differential cryptanalysis on reduced DM-PRESENT-80: collisions and other differential properties. Zbl 1342.94078
Koyama, Takuma; Sasaki, Yu; Kunihiro, Noboru
1
2013
Related-key boomerang attacks on KATAN32/48/64. Zbl 1316.94079
Isobe, Takanori; Sasaki, Yu; Chen, Jiageng
1
2013
Generic related-key attacks for HMAC. Zbl 1292.94128
Peyrin, Thomas; Sasaki, Yu; Wang, Lei
7
2012
Boomerang distinguishers on MD4-family: first practical results on full 5-pass HAVAL. Zbl 1279.94114
Sasaki, Yu
5
2012
Investigating fundamental security requirements on whirlpool: improved preimage and collision attacks. Zbl 1292.94134
Sasaki, Yu; Wang, Lei; Wu, Shuang; Wu, Wenling
5
2012
Three-subset meet-in-the-middle attack on reduced XTEA. Zbl 1304.94083
Sasaki, Yu; Wang, Lei; Sakai, Yasuhide; Sakiyama, Kazuo; Ohta, Kazuo
4
2012
Improved known-key distinguishers on Feistel-SP ciphers and application to Camellia. Zbl 1305.94077
Sasaki, Yu; Emami, Sareh; Hong, Deukjo; Kumar, Ashish
3
2012
Boomerang distinguishers for full HAS-160 compression function. Zbl 1292.94133
Sasaki, Yu; Wang, Lei; Takasaki, Yasuhiro; Sakiyama, Kazuo; Ohta, Kazuo
1
2012
Improved integral analysis on tweaked Lesamnta. Zbl 1301.94127
Sasaki, Yu; Aoki, Kazumaro
1
2012
Cryptanalyses on a Merkle-Damgård based MAC – almost universal forgery and distinguishing-\(H\) attacks. Zbl 1297.94099
Sasaki, Yu
1
2012
Meet-in-the-middle preimage attacks on AES hashing modes and an application to Whirlpool. Zbl 1307.94094
Sasaki, Yu
11
2011
Known-key distinguishers on 11-round Feistel and collision attacks on its hashing modes. Zbl 1307.94095
Sasaki, Yu; Yasuda, Kan
9
2011
(Second) preimage attacks on step-reduced RIPEMD/RIPEMD-128 with a new local-collision approach. Zbl 1284.94123
Wang, Lei; Sasaki, Yu; Komatsubara, Wataru; Ohta, Kazuo; Sakiyama, Kazuo
5
2011
Preimage attacks on step-reduced RIPEMD-128 and RIPEMD-160. Zbl 1295.94121
Ohtahara, Chiaki; Sasaki, Yu; Shimoyama, Takeshi
4
2011
Experimental verification of super-Sbox analysis – confirmation of detailed attack complexity. Zbl 1344.94072
Sasaki, Yu; Takayanagi, Naoyuki; Sakiyama, Kazuo; Ohta, Kazuo
2
2011
Non-full-active Super-Sbox analysis: applications to ECHO and Grøstl. Zbl 1253.94067
Sasaki, Yu; Li, Yang; Wang, Lei; Sakiyama, Kazuo; Ohta, Kazuo
9
2010
Finding preimages of Tiger up to 23 steps. Zbl 1285.94100
Wang, Lei; Sasaki, Yu
3
2010
Finding preimages in full MD5 faster than exhaustive search. Zbl 1239.94064
Sasaki, Yu; Aoki, Kazumaro
26
2009
Preimage attacks on one-block MD4, 63-step MD5 and more. Zbl 1256.94040
Aoki, Kazumaro; Sasaki, Yu
24
2009
Meet-in-the-middle preimage attacks against reduced SHA-0 and SHA-1. Zbl 1252.94043
Aoki, Kazumaro; Sasaki, Yu
14
2009
Rebound attack on the full Lane compression function. Zbl 1267.94083
Matusiewicz, Krystian; Naya-Plasencia, María; Nikolić, Ivica; Sasaki, Yu; Schläffer, Martin
13
2009
Preimages for step-reduced SHA-2. Zbl 1267.94030
Aoki, Kazumaro; Guo, Jian; Matusiewicz, Krystian; Sasaki, Yu; Wang, Lei
13
2009
Meet-in-the-middle preimage attacks on double-branch hash functions: application to RIPEMD and others. Zbl 1284.94107
Sasaki, Yu; Aoki, Kazumaro
4
2009
Meet-in-the-middle attacks using output truncation in 3-pass HAVAL. Zbl 1307.94093
Sasaki, Yu
1
2009
Cryptanalyses of narrow-pipe mode of operation in AURORA-512 hash function. Zbl 1267.94093
Sasaki, Yu
1
2009
Preimage attacks on 3, 4, and 5-pass HAVAL. Zbl 1206.94089
Sasaki, Yu; Aoki, Kazumaro
10
2008
Preimage attacks on step-reduced MD5. Zbl 1285.94094
Sasaki, Yu; Aoki, Kazumaro
6
2008
Security of MD5 challenge and response: Extension of APOP password recovery attack. Zbl 1153.94428
Sasaki, Yu; Wang, Lei; Ohta, Kazuo; Kunihiro, Noboru
2
2008
Password recovery on challenge and response: Impossible differential attack on hash function. Zbl 1142.94359
Sasaki, Yu; Wang, Lei; Ohta, Kazuo; Kunihiro, Noboru
1
2008
New message difference for MD4. Zbl 1186.94469
Sasaki, Yu; Wang, Lei; Ohta, Kazuo; Kunihiro, Noboru
3
2007
Improved collision search for SHA-0. Zbl 1172.94591
Naito, Yusuke; Sasaki, Yu; Shimoyama, Takeshi; Yajima, Jun; Kunihiro, Noboru; Ohta, Kazuo
2
2006
How to construct sufficient conditions for hash functions. Zbl 1295.94142
Sasaki, Yu; Naito, Yusuke; Yajima, Jun; Shimoyama, Takeshi; Kunihiro, Noboru; Ohta, Kazuo
2
2006
all top 5

Cited by 532 Authors

25 Sasaki, Yu
13 Wang, Meiqin
10 Naya-Plasencia, María
10 Wu, Wenling
9 Sun, Siwei
8 Dinur, Itai
8 Dunkelman, Orr
8 Mendel, Florian
8 Peyrin, Thomas
8 Todo, Yosuke
7 Dong, Xiaoyang
7 Isobe, Takanori
7 Jean, Jérémy
7 Leander, Gregor
7 Leurent, Gaëtan
7 Mesnager, Sihem
7 Wang, Xiaoyun
6 Guo, Jian
6 Hu, Lei
6 Keller, Nathan
6 Meier, Willi
6 Nandi, Mridul
6 Rijmen, Vincent
6 Schrottenloher, André
6 Youssef, Amr M.
5 Bao, Zhenzhen
5 Beierle, Christof
5 Bogdanov, Andrey
5 Chen, Huaifeng
5 Cui, Tingting
5 Fan, Yanhong
5 Mennink, Bart
5 Rechberger, Christian
5 Shamir, Adi
5 Stănică, Pantelimon
5 Sun, Ling
4 AlTawy, Riham
4 Anand, Ravi
4 Bagheri, Nasour
4 Bonnetain, Xavier
4 Chakraborti, Avik
4 Dobraunig, Christoph
4 Fouque, Pierre-Alain
4 Hosoyamada, Akinori
4 Jha, Ashwin
4 List, Eik
4 Liu, Fukang
4 Liu, Yunwen
4 Lucks, Stefan
4 Nikolić, Ivica
4 Preneel, Bart
4 Schläffer, Martin
4 Seurin, Yannick
4 Wang, Gaoli
3 Andreeva, Elena Anatol’evna
3 Aoki, Kazumaro
3 Banik, Subhadeep
3 Beyne, Tim
3 Datta, Nilanjan
3 Derbez, Patrick
3 Eichlseder, Maria
3 Flórez-Gutiérrez, Antonio
3 Grassi, Lorenzo
3 Guo, Chun
3 Iwata, Tetsu
3 Jin, Chenhui
3 Kim, Jongsung
3 Kircanski, Aleksandar
3 Lambin, Baptiste
3 Lee, Jooyoung
3 Li, Chao
3 Li, Kangquan
3 Li, Muzhou
3 Li, Zheng
3 Lu, Zhenyu
3 Maitra, Arpita
3 Maitra, Subhamoy
3 Mancillas-López, Cuauhtemoc
3 Mandal, Bimal
3 Minematsu, Kazuhiko
3 Mukhopadhyay, Sourav
3 Naito, Yusuke
3 Perrin, Léo
3 Qu, Longjiang
3 Sarkar, Santanu
3 Sibleyras, Ferdinand
3 Sim, Siang Meng
3 Song, Ling
3 Tischhauser, Elmar
3 Tolba, Mohamed
3 Wang, Lei
3 Wang, Peng
3 Wang, Weijia
3 Wei, Yongzhuang
3 Zou, Jian
2 Baek, Seungjun
2 Bellini, Emanuele
2 Broll, Marek
2 Caforio, Andrea
2 Calderini, Marco
...and 432 more Authors

Citations by Year