×
Author ID: sasaki.yu Recent zbMATH articles by "Sasaki, Yu"
Published as: Sasaki, Yu
Documents Indexed: 111 Publications since 2006
Co-Authors: 110 Co-Authors with 97 Joint Publications
1,782 Co-Co-Authors
all top 5

Co-Authors

12 single-authored
27 Wang, Lei
17 Ohta, Kazuo
10 Todo, Yosuke
9 Aoki, Kazumaro
9 Hosoyamada, Akinori
9 Sakiyama, Kazuo
8 Kunihiro, Noboru
8 Naito, Yusuke
7 Yasuda, Kan
6 Guo, Jian
6 Nikolić, Ivica
6 Peyrin, Thomas
6 Shimoyama, Takeshi
5 Jean, Jérémy
5 Leander, Gregor
4 Iwata, Tetsu
3 Iwamoto, Mitsugu
3 Mendel, Florian
3 Naya-Plasencia, María
3 Ohtahara, Chiaki
3 Sim, Siang Meng
3 Sugawara, Takeshi
3 Xagawa, Keita
3 Yajima, Jun
2 Bagheri, Nasour
2 Banik, Subhadeep
2 Eichlseder, Maria
2 Hirose, Shoichi
2 Huang, Tao
2 Kondo, Kota
2 Koyama, Takuma
2 Leurent, Gaëtan
2 Li, Yang
2 Liu, Yunwen
2 Matusiewicz, Krystian
2 Okada, Keita
2 Song, Ling
2 Tani, Seiichiro
2 Wu, Shuang
1 Ashur, Tomer
1 Beierle, Christof
1 Beyne, Tim
1 Bonnetain, Xavier
1 Bossert, Jannis
1 Canteaut, Anne
1 Chakraborti, Avik
1 Chen, Jiageng
1 Cid, Carlos Frederico
1 Datta, Nilanjan
1 Dinur, Itai
1 Dunkelman, Orr
1 Emami, Sareh
1 Hong, Deukjo
1 Hu, Lei
1 Isobe, Takanori
1 Isuzugawa, Raimu
1 Ito, Gembu
1 Iwasaki, Terutoshi
1 Izui, Kazuhiro
1 Jana, Amit
1 Jha, Ashwin
1 Jia, Keting
1 Jovanovic, Philipp
1 Keller, Nathan
1 Kobayashi, Naoki
1 Kohyama, K.
1 Kölbl, Stefan
1 Komatsubara, Wataru
1 Kumar Pandey, Sumit
1 Kumar, Ashish
1 Lallemand, Virginie
1 Lambooij, Eran
1 Lauridsen, Martin M.
1 Li, Chaoyun
1 List, Eik
1 Liu, Zhiqiang
1 Lucks, Stefan
1 Luykx, Atul
1 Mancillas-López, Cuauhtemoc
1 Matsumoto, Ryutaroh
1 Matsushita, Mitsugu
1 Meier, Willi
1 Mennink, Bart
1 Minaud, Brice
1 Miyahara, Daiki
1 Mizuki, Takaaki
1 Moradi, Amir
1 Moriyama, Osamu
1 Nakasone, Toshiki
1 Nandi, Mridul
1 Nishiwaki, Shinji
1 Perrin, Léo
1 Rahman, Mostafizar
1 Rijmen, Vincent
1 Rotella, Yann
1 Saha, Dhiman
1 Sakai, Yusuke
1 Sarkar, Sumanta
1 Sasdrich, Pascal
1 Sato, Yuki
...and 18 more Co-Authors

Publications by Year

Citations contained in zbMATH Open

90 Publications have been cited 857 times in 441 Documents Cited by Year
The \(\mathtt{SKINNY}\) family of block ciphers and its low-latency variant \(\mathtt{MANTIS}\). Zbl 1372.94412
Beierle, Christof; Jean, Jérémy; Kölbl, Stefan; Leander, Gregor; Moradi, Amir; Peyrin, Thomas; Sasaki, Yu; Sasdrich, Pascal; Sim, Siang Meng
103
2016
GIFT: a small present. Towards reaching the limit of lightweight encryption. Zbl 1450.94026
Banik, Subhadeep; Pandey, Sumit Kumar; Peyrin, Thomas; Sasaki, Yu; Sim, Siang Meng; Todo, Yosuke
63
2017
Boomerang Connectivity Table: a new cryptanalysis tool. Zbl 1428.94065
Cid, Carlos; Huang, Tao; Peyrin, Thomas; Sasaki, Yu; Song, Ling
53
2018
Quantum attacks without superposition queries: the offline Simon’s algorithm. Zbl 1456.94052
Bonnetain, Xavier; Hosoyamada, Akinori; Naya-Plasencia, María; Sasaki, Yu; Schrottenloher, André
36
2019
New impossible differential search tool from design and cryptanalysis aspects. Revealing structural properties of several ciphers. Zbl 1394.94941
Sasaki, Yu; Todo, Yosuke
35
2017
Quantum Demiric-Selçuk meet-in-the-middle attacks: applications to 6-round generic Feistel constructions. Zbl 1514.81107
Hosoyamada, Akinori; Sasaki, Yu
35
2018
Preimage attacks on one-block MD4, 63-step MD5 and more. Zbl 1256.94040
Aoki, Kazumaro; Sasaki, Yu
33
2009
Finding preimages in full MD5 faster than exhaustive search. Zbl 1239.94064
Sasaki, Yu; Aoki, Kazumaro
32
2009
Quantum chosen-ciphertext attacks against Feistel ciphers. Zbl 1453.94091
Ito, Gembu; Hosoyamada, Akinori; Matsumoto, Ryutaroh; Sasaki, Yu; Iwata, Tetsu
26
2019
Finding hash collisions with quantum computers by using differential trails with smaller probability than birthday bound. Zbl 1492.81040
Hosoyamada, Akinori; Sasaki, Yu
25
2020
Cryptanalysis against symmetric-key schemes with online classical queries and offline quantum computations. Zbl 1507.94040
Hosoyamada, Akinori; Sasaki, Yu
21
2018
Meet-in-the-middle preimage attacks against reduced SHA-0 and SHA-1. Zbl 1252.94043
Aoki, Kazumaro; Sasaki, Yu
18
2009
Out of oddity – new cryptanalytic techniques against symmetric primitives optimized for integrity proof systems. Zbl 1504.94105
Beyne, Tim; Canteaut, Anne; Dinur, Itai; Eichlseder, Maria; Leander, Gregor; Leurent, Gaëtan; Naya-Plasencia, María; Perrin, Léo; Sasaki, Yu; Todo, Yosuke; Wiemer, Friedrich
18
2020
Nonlinear invariant attack. Practical attack on full SCREAM, iSCREAM, and Midori64. Zbl 1380.94126
Todo, Yosuke; Leander, Gregor; Sasaki, Yu
17
2016
Meet-in-the-middle preimage attacks on AES hashing modes and an application to Whirlpool. Zbl 1307.94094
Sasaki, Yu
17
2011
Rebound attack on the full Lane compression function. Zbl 1267.94083
Matusiewicz, Krystian; Naya-Plasencia, María; Nikolić, Ivica; Sasaki, Yu; Schläffer, Martin
17
2009
Cryptanalysis of reduced-round SIMON32 and SIMON48. Zbl 1344.94077
Wang, Qingju; Liu, Zhiqiang; Varıcı, Kerem; Sasaki, Yu; Rijmen, Vincent; Todo, Yosuke
15
2014
Preimages for step-reduced SHA-2. Zbl 1267.94030
Aoki, Kazumaro; Guo, Jian; Matusiewicz, Krystian; Sasaki, Yu; Wang, Lei
15
2009
Preimage attacks on 3, 4, and 5-pass HAVAL. Zbl 1206.94089
Sasaki, Yu; Aoki, Kazumaro
13
2008
Non-full-active Super-Sbox analysis: applications to ECHO and Grøstl. Zbl 1253.94067
Sasaki, Yu; Li, Yang; Wang, Lei; Sakiyama, Kazuo; Ohta, Kazuo
12
2010
Quantum collision attacks on reduced SHA-256 and SHA-512. Zbl 1487.81066
Hosoyamada, Akinori; Sasaki, Yu
12
2021
Investigating fundamental security requirements on whirlpool: improved preimage and collision attacks. Zbl 1292.94134
Sasaki, Yu; Wang, Lei; Wu, Shuang; Wu, Wenling
11
2012
Nonlinear invariant attack: practical attack on full SCREAM, iSCREAM, and Midori64. Zbl 1435.94141
Todo, Yosuke; Leander, Gregor; Sasaki, Yu
10
2019
Meet-in-the-middle technique for integral attacks against Feistel ciphers. Zbl 1327.94073
Sasaki, Yu; Wang, Lei
10
2013
Refinements of the \(k\)-tree algorithm for the generalized birthday problem. Zbl 1382.94147
Nikolić, Ivica; Sasaki, Yu
10
2015
Known-key distinguishers on 11-round Feistel and collision attacks on its hashing modes. Zbl 1307.94095
Sasaki, Yu; Yasuda, Kan
10
2011
Meet-in-the-middle attacks on generic Feistel constructions. Zbl 1306.94058
Guo, Jian; Jean, Jérémy; Nikolić, Ivica; Sasaki, Yu
9
2014
Limited-birthday distinguishers for hash functions. Collisions beyond the birthday bound can be meaningful. Zbl 1314.94076
Iwamoto, Mitsugu; Peyrin, Thomas; Sasaki, Yu
9
2013
Generic related-key attacks for HMAC. Zbl 1292.94128
Peyrin, Thomas; Sasaki, Yu; Wang, Lei
8
2012
Integer linear programming for three-subset meet-in-the-middle attacks: application to GIFT. Zbl 1398.94157
Sasaki, Yu
8
2018
Preimage attacks on step-reduced MD5. Zbl 1285.94094
Sasaki, Yu; Aoki, Kazumaro
7
2008
Quantum multicollision-finding algorithm. Zbl 1380.81087
Hosoyamada, Akinori; Sasaki, Yu; Xagawa, Keita
7
2017
Boomerang distinguishers on MD4-family: first practical results on full 5-pass HAVAL. Zbl 1279.94114
Sasaki, Yu
6
2012
Lightweight authenticated encryption mode suitable for threshold implementation. Zbl 1492.94150
Naito, Yusuke; Sasaki, Yu; Sugawara, Takeshi
6
2020
On the design rationale of Simon block cipher: integral attacks and impossible differential attacks against Simon variants. Zbl 1348.94062
Kondo, Kota; Sasaki, Yu; Iwata, Tetsu
5
2016
Comprehensive study of integral analysis on 22-round LBlock. Zbl 1342.94094
Sasaki, Yu; Wang, Lei
5
2013
(Second) preimage attacks on step-reduced RIPEMD/RIPEMD-128 with a new local-collision approach. Zbl 1284.94123
Wang, Lei; Sasaki, Yu; Komatsubara, Wataru; Ohta, Kazuo; Sakiyama, Kazuo
5
2011
Preimage attacks on step-reduced RIPEMD-128 and RIPEMD-160. Zbl 1295.94121
Ohtahara, Chiaki; Sasaki, Yu; Shimoyama, Takeshi
5
2011
Updates on generic attacks against HMAC and NMAC. Zbl 1343.94059
Guo, Jian; Peyrin, Thomas; Sasaki, Yu; Wang, Lei
5
2014
Related-key boomerang attacks on GIFT with automated trail search including BCT effect. Zbl 1439.94046
Liu, Yunwen; Sasaki, Yu
5
2019
Improved quantum multicollision-finding algorithm. Zbl 1509.81377
Hosoyamada, Akinori; Sasaki, Yu; Tani, Seiichiro; Xagawa, Keita
4
2019
How to incorporate associated data in sponge-based authenticated encryption. Zbl 1382.94158
Sasaki, Yu; Yasuda, Kan
4
2015
Improved related-tweakey boomerang attacks on Deoxys-BC. Zbl 1423.94101
Sasaki, Yu
4
2018
Meet-in-the-middle preimage attacks on double-branch hash functions: application to RIPEMD and others. Zbl 1284.94107
Sasaki, Yu; Aoki, Kazumaro
4
2009
Three-subset meet-in-the-middle attack on reduced XTEA. Zbl 1304.94083
Sasaki, Yu; Wang, Lei; Sakai, Yasuhide; Sakiyama, Kazuo; Ohta, Kazuo
4
2012
Generic state-recovery and forgery attacks on chopmd-MAC and on NMAC/HMAC. Zbl 1414.94914
Naito, Yusuke; Sasaki, Yu; Wang, Lei; Yasuda, Kan
4
2013
New message difference for MD4. Zbl 1186.94469
Sasaki, Yu; Wang, Lei; Ohta, Kazuo; Kunihiro, Noboru
4
2007
New differential bounds and division property of Lilliput: block cipher with extended generalized Feistel network. Zbl 1412.94207
Sasaki, Yu; Todo, Yosuke
4
2017
Practical cryptanalysis of PAES. Zbl 1382.94125
Jean, Jérémy; Nikolić, Ivica; Sasaki, Yu; Wang, Lei
3
2014
A new mode of operation for incremental authenticated encryption with associated data. Zbl 1396.94097
Sasaki, Yu; Yasuda, Kan
3
2016
Cryptanalysis of HMAC/NMAC-Whirlpool. Zbl 1314.94070
Guo, Jian; Sasaki, Yu; Wang, Lei; Wu, Shuang
3
2013
Finding preimages of Tiger up to 23 steps. Zbl 1285.94100
Wang, Lei; Sasaki, Yu
3
2010
Improved known-key distinguishers on Feistel-SP ciphers and application to Camellia. Zbl 1305.94077
Sasaki, Yu; Emami, Sareh; Hong, Deukjo; Kumar, Ashish
3
2012
Improved collision search for SHA-0. Zbl 1172.94591
Naito, Yusuke; Sasaki, Yu; Shimoyama, Takeshi; Yajima, Jun; Kunihiro, Noboru; Ohta, Kazuo
3
2006
Correlation of quadratic Boolean functions: cryptanalysis of all versions of full MORUS. Zbl 1512.94188
Shi, Danping; Sun, Siwei; Sasaki, Yu; Li, Chaoyun; Hu, Lei
3
2019
Cryptanalysis of ForkAES. Zbl 1458.94212
Banik, Subhadeep; Bossert, Jannis; Jana, Amit; List, Eik; Lucks, Stefan; Meier, Willi; Rahman, Mostafizar; Saha, Dhiman; Sasaki, Yu
2
2019
Beyond conventional security in sponge-based authenticated encryption modes. Zbl 1443.94064
Jovanovic, Philipp; Luykx, Atul; Mennink, Bart; Sasaki, Yu; Yasuda, Kan
2
2019
Topology optimization for fluid flows using the MPS method incorporating the level set method. Zbl 1519.76039
Sasaki, Y.; Sato, Y.; Yamada, T.; Izui, K.; Nishiwaki, S.
2
2019
Cryptanalysis of reduced NORX. Zbl 1385.94009
Bagheri, Nasour; Huang, Tao; Jia, Keting; Mendel, Florian; Sasaki, Yu
2
2016
Extended meet-in-the-middle attacks on some Feistel constructions. Zbl 1348.94053
Guo, Jian; Jean, Jérémy; Nikolić, Ivica; Sasaki, Yu
2
2016
Equivalent key recovery attacks against HMAC and NMAC with whirlpool reduced to 7 rounds. Zbl 1382.94115
Guo, Jian; Sasaki, Yu; Wang, Lei; Wang, Meiqin; Wen, Long
2
2015
Double-SP is weaker than single-SP: rebound attacks on Feistel ciphers with several rounds. Zbl 1295.94141
Sasaki, Yu
2
2012
How to construct sufficient conditions for hash functions. Zbl 1295.94142
Sasaki, Yu; Naito, Yusuke; Yajima, Jun; Shimoyama, Takeshi; Kunihiro, Noboru; Ohta, Kazuo
2
2006
Experimental verification of super-Sbox analysis – confirmation of detailed attack complexity. Zbl 1344.94072
Sasaki, Yu; Takayanagi, Naoyuki; Sakiyama, Kazuo; Ohta, Kazuo
2
2011
Security of MD5 challenge and response: Extension of APOP password recovery attack. Zbl 1153.94428
Sasaki, Yu; Wang, Lei; Ohta, Kazuo; Kunihiro, Noboru
2
2008
Secret can be public: low-memory AEAD mode for high-order masking. Zbl 1517.94135
Naito, Yusuke; Sasaki, Yu; Sugawara, Takeshi
2
2022
A practical forgery attack on Lilliput-AE. Zbl 1457.94126
Dunkelman, Orr; Keller, Nathan; Lambooij, Eran; Sasaki, Yu
2
2020
A card-minimal three-input and protocol using two shuffles. Zbl 07670501
Isuzugawa, Raimu; Toyoda, Kodai; Sasaki, Yu; Miyahara, Daiki; Mizuki, Takaaki
2
2021
Boomerang distinguishers for full HAS-160 compression function. Zbl 1292.94133
Sasaki, Yu; Wang, Lei; Takasaki, Yasuhiro; Sakiyama, Kazuo; Ohta, Kazuo
2
2012
Cryptanalysis of reduced sLiSCP permutation in sponge-hash and duplex-AE modes. Zbl 1447.94052
Liu, Yunwen; Sasaki, Yu; Song, Ling; Wang, Gaoli
1
2019
Cryptanalysis of MORUS. Zbl 1446.94095
Ashur, Tomer; Eichlseder, Maria; Lauridsen, Martin M.; Leurent, Gaëtan; Minaud, Brice; Rotella, Yann; Sasaki, Yu; Viguier, Benoît
1
2018
Universal forgery and multiple forgeries of MergeMAC and generalized constructions. Zbl 1509.94098
Iwata, Tetsu; Lallemand, Virginie; Leander, Gregor; Sasaki, Yu
1
2019
Analysis of the CAESAR candidate silver. Zbl 1396.94085
Jean, Jérémy; Sasaki, Yu; Wang, Lei
1
2016
Improved rebound attacks on AESQ: core permutation of CAESAR candidate PAEQ. Zbl 1346.94090
Bagheri, Nasour; Mendel, Florian; Sasaki, Yu
1
2016
Generic attacks on strengthened HMAC: \(n\)-bit secure HMAC requires key in all blocks. Zbl 1423.68158
Sasaki, Yu; Wang, Lei
1
2014
A new algorithm for the unbalanced meet-in-the-middle problem. Zbl 1404.94102
Nikolić, Ivica; Sasaki, Yu
1
2016
Multi-differential cryptanalysis on reduced DM-PRESENT-80: collisions and other differential properties. Zbl 1342.94078
Koyama, Takuma; Sasaki, Yu; Kunihiro, Noboru
1
2013
Related-key boomerang attacks on KATAN32/48/64. Zbl 1316.94079
Isobe, Takanori; Sasaki, Yu; Chen, Jiageng
1
2013
Meet-in-the-middle attacks using output truncation in 3-pass HAVAL. Zbl 1307.94093
Sasaki, Yu
1
2009
Cryptanalyses on a Merkle-Damgård based MAC – almost universal forgery and distinguishing-\(H\) attacks. Zbl 1297.94099
Sasaki, Yu
1
2012
Memoryless unbalanced meet-in-the-middle attacks: impossible results and applications. Zbl 1353.94072
Sasaki, Yu
1
2014
Improved integral analysis on tweaked Lesamnta. Zbl 1301.94127
Sasaki, Yu; Aoki, Kazumaro
1
2012
Password recovery on challenge and response: Impossible differential attack on hash function. Zbl 1142.94359
Sasaki, Yu; Wang, Lei; Ohta, Kazuo; Kunihiro, Noboru
1
2008
Cryptanalyses of narrow-pipe mode of operation in AURORA-512 hash function. Zbl 1267.94093
Sasaki, Yu
1
2009
On the design of bit permutation based ciphers. The interplay among S-box, bit permutation and key-addition. Zbl 1471.68041
Sarkar, Sumanta; Sasaki, Yu; Sim, Siang Meng
1
2020
Elastic-Tweak: a framework for short tweak tweakable block cipher. Zbl 1514.94060
Chakraborti, Avik; Datta, Nilanjan; Jha, Ashwin; Mancillas-López, Cuauhtemoc; Nandi, Mridul; Sasaki, Yu
1
2021
Tight bounds of differentially and linearly active S-boxes and division property of Lilliput. Zbl 1395.94311
Sasaki, Yu; Todo, Yosuke
1
2018
Analyzing key schedule of Simon: iterative key differences and application to related-key impossible differentials. Zbl 1398.94129
Kondo, Kota; Sasaki, Yu; Todo, Yosuke; Iwata, Tetsu
1
2017
Related-key boomerang attacks on full ANU lightweight block cipher. Zbl 1440.94080
Sasaki, Yu
1
2018
Quantum algorithm for the multicollision problem. Zbl 1455.68067
Hosoyamada, Akinori; Sasaki, Yu; Tani, Seiichiro; Xagawa, Keita
1
2020
Secret can be public: low-memory AEAD mode for high-order masking. Zbl 1517.94135
Naito, Yusuke; Sasaki, Yu; Sugawara, Takeshi
2
2022
Quantum collision attacks on reduced SHA-256 and SHA-512. Zbl 1487.81066
Hosoyamada, Akinori; Sasaki, Yu
12
2021
A card-minimal three-input and protocol using two shuffles. Zbl 07670501
Isuzugawa, Raimu; Toyoda, Kodai; Sasaki, Yu; Miyahara, Daiki; Mizuki, Takaaki
2
2021
Elastic-Tweak: a framework for short tweak tweakable block cipher. Zbl 1514.94060
Chakraborti, Avik; Datta, Nilanjan; Jha, Ashwin; Mancillas-López, Cuauhtemoc; Nandi, Mridul; Sasaki, Yu
1
2021
Finding hash collisions with quantum computers by using differential trails with smaller probability than birthday bound. Zbl 1492.81040
Hosoyamada, Akinori; Sasaki, Yu
25
2020
Out of oddity – new cryptanalytic techniques against symmetric primitives optimized for integrity proof systems. Zbl 1504.94105
Beyne, Tim; Canteaut, Anne; Dinur, Itai; Eichlseder, Maria; Leander, Gregor; Leurent, Gaëtan; Naya-Plasencia, María; Perrin, Léo; Sasaki, Yu; Todo, Yosuke; Wiemer, Friedrich
18
2020
Lightweight authenticated encryption mode suitable for threshold implementation. Zbl 1492.94150
Naito, Yusuke; Sasaki, Yu; Sugawara, Takeshi
6
2020
A practical forgery attack on Lilliput-AE. Zbl 1457.94126
Dunkelman, Orr; Keller, Nathan; Lambooij, Eran; Sasaki, Yu
2
2020
On the design of bit permutation based ciphers. The interplay among S-box, bit permutation and key-addition. Zbl 1471.68041
Sarkar, Sumanta; Sasaki, Yu; Sim, Siang Meng
1
2020
Quantum algorithm for the multicollision problem. Zbl 1455.68067
Hosoyamada, Akinori; Sasaki, Yu; Tani, Seiichiro; Xagawa, Keita
1
2020
Quantum attacks without superposition queries: the offline Simon’s algorithm. Zbl 1456.94052
Bonnetain, Xavier; Hosoyamada, Akinori; Naya-Plasencia, María; Sasaki, Yu; Schrottenloher, André
36
2019
Quantum chosen-ciphertext attacks against Feistel ciphers. Zbl 1453.94091
Ito, Gembu; Hosoyamada, Akinori; Matsumoto, Ryutaroh; Sasaki, Yu; Iwata, Tetsu
26
2019
Nonlinear invariant attack: practical attack on full SCREAM, iSCREAM, and Midori64. Zbl 1435.94141
Todo, Yosuke; Leander, Gregor; Sasaki, Yu
10
2019
Related-key boomerang attacks on GIFT with automated trail search including BCT effect. Zbl 1439.94046
Liu, Yunwen; Sasaki, Yu
5
2019
Improved quantum multicollision-finding algorithm. Zbl 1509.81377
Hosoyamada, Akinori; Sasaki, Yu; Tani, Seiichiro; Xagawa, Keita
4
2019
Correlation of quadratic Boolean functions: cryptanalysis of all versions of full MORUS. Zbl 1512.94188
Shi, Danping; Sun, Siwei; Sasaki, Yu; Li, Chaoyun; Hu, Lei
3
2019
Cryptanalysis of ForkAES. Zbl 1458.94212
Banik, Subhadeep; Bossert, Jannis; Jana, Amit; List, Eik; Lucks, Stefan; Meier, Willi; Rahman, Mostafizar; Saha, Dhiman; Sasaki, Yu
2
2019
Beyond conventional security in sponge-based authenticated encryption modes. Zbl 1443.94064
Jovanovic, Philipp; Luykx, Atul; Mennink, Bart; Sasaki, Yu; Yasuda, Kan
2
2019
Topology optimization for fluid flows using the MPS method incorporating the level set method. Zbl 1519.76039
Sasaki, Y.; Sato, Y.; Yamada, T.; Izui, K.; Nishiwaki, S.
2
2019
Cryptanalysis of reduced sLiSCP permutation in sponge-hash and duplex-AE modes. Zbl 1447.94052
Liu, Yunwen; Sasaki, Yu; Song, Ling; Wang, Gaoli
1
2019
Universal forgery and multiple forgeries of MergeMAC and generalized constructions. Zbl 1509.94098
Iwata, Tetsu; Lallemand, Virginie; Leander, Gregor; Sasaki, Yu
1
2019
Boomerang Connectivity Table: a new cryptanalysis tool. Zbl 1428.94065
Cid, Carlos; Huang, Tao; Peyrin, Thomas; Sasaki, Yu; Song, Ling
53
2018
Quantum Demiric-Selçuk meet-in-the-middle attacks: applications to 6-round generic Feistel constructions. Zbl 1514.81107
Hosoyamada, Akinori; Sasaki, Yu
35
2018
Cryptanalysis against symmetric-key schemes with online classical queries and offline quantum computations. Zbl 1507.94040
Hosoyamada, Akinori; Sasaki, Yu
21
2018
Integer linear programming for three-subset meet-in-the-middle attacks: application to GIFT. Zbl 1398.94157
Sasaki, Yu
8
2018
Improved related-tweakey boomerang attacks on Deoxys-BC. Zbl 1423.94101
Sasaki, Yu
4
2018
Cryptanalysis of MORUS. Zbl 1446.94095
Ashur, Tomer; Eichlseder, Maria; Lauridsen, Martin M.; Leurent, Gaëtan; Minaud, Brice; Rotella, Yann; Sasaki, Yu; Viguier, Benoît
1
2018
Tight bounds of differentially and linearly active S-boxes and division property of Lilliput. Zbl 1395.94311
Sasaki, Yu; Todo, Yosuke
1
2018
Related-key boomerang attacks on full ANU lightweight block cipher. Zbl 1440.94080
Sasaki, Yu
1
2018
GIFT: a small present. Towards reaching the limit of lightweight encryption. Zbl 1450.94026
Banik, Subhadeep; Pandey, Sumit Kumar; Peyrin, Thomas; Sasaki, Yu; Sim, Siang Meng; Todo, Yosuke
63
2017
New impossible differential search tool from design and cryptanalysis aspects. Revealing structural properties of several ciphers. Zbl 1394.94941
Sasaki, Yu; Todo, Yosuke
35
2017
Quantum multicollision-finding algorithm. Zbl 1380.81087
Hosoyamada, Akinori; Sasaki, Yu; Xagawa, Keita
7
2017
New differential bounds and division property of Lilliput: block cipher with extended generalized Feistel network. Zbl 1412.94207
Sasaki, Yu; Todo, Yosuke
4
2017
Analyzing key schedule of Simon: iterative key differences and application to related-key impossible differentials. Zbl 1398.94129
Kondo, Kota; Sasaki, Yu; Todo, Yosuke; Iwata, Tetsu
1
2017
The \(\mathtt{SKINNY}\) family of block ciphers and its low-latency variant \(\mathtt{MANTIS}\). Zbl 1372.94412
Beierle, Christof; Jean, Jérémy; Kölbl, Stefan; Leander, Gregor; Moradi, Amir; Peyrin, Thomas; Sasaki, Yu; Sasdrich, Pascal; Sim, Siang Meng
103
2016
Nonlinear invariant attack. Practical attack on full SCREAM, iSCREAM, and Midori64. Zbl 1380.94126
Todo, Yosuke; Leander, Gregor; Sasaki, Yu
17
2016
On the design rationale of Simon block cipher: integral attacks and impossible differential attacks against Simon variants. Zbl 1348.94062
Kondo, Kota; Sasaki, Yu; Iwata, Tetsu
5
2016
A new mode of operation for incremental authenticated encryption with associated data. Zbl 1396.94097
Sasaki, Yu; Yasuda, Kan
3
2016
Cryptanalysis of reduced NORX. Zbl 1385.94009
Bagheri, Nasour; Huang, Tao; Jia, Keting; Mendel, Florian; Sasaki, Yu
2
2016
Extended meet-in-the-middle attacks on some Feistel constructions. Zbl 1348.94053
Guo, Jian; Jean, Jérémy; Nikolić, Ivica; Sasaki, Yu
2
2016
Analysis of the CAESAR candidate silver. Zbl 1396.94085
Jean, Jérémy; Sasaki, Yu; Wang, Lei
1
2016
Improved rebound attacks on AESQ: core permutation of CAESAR candidate PAEQ. Zbl 1346.94090
Bagheri, Nasour; Mendel, Florian; Sasaki, Yu
1
2016
A new algorithm for the unbalanced meet-in-the-middle problem. Zbl 1404.94102
Nikolić, Ivica; Sasaki, Yu
1
2016
Refinements of the \(k\)-tree algorithm for the generalized birthday problem. Zbl 1382.94147
Nikolić, Ivica; Sasaki, Yu
10
2015
How to incorporate associated data in sponge-based authenticated encryption. Zbl 1382.94158
Sasaki, Yu; Yasuda, Kan
4
2015
Equivalent key recovery attacks against HMAC and NMAC with whirlpool reduced to 7 rounds. Zbl 1382.94115
Guo, Jian; Sasaki, Yu; Wang, Lei; Wang, Meiqin; Wen, Long
2
2015
Cryptanalysis of reduced-round SIMON32 and SIMON48. Zbl 1344.94077
Wang, Qingju; Liu, Zhiqiang; Varıcı, Kerem; Sasaki, Yu; Rijmen, Vincent; Todo, Yosuke
15
2014
Meet-in-the-middle attacks on generic Feistel constructions. Zbl 1306.94058
Guo, Jian; Jean, Jérémy; Nikolić, Ivica; Sasaki, Yu
9
2014
Updates on generic attacks against HMAC and NMAC. Zbl 1343.94059
Guo, Jian; Peyrin, Thomas; Sasaki, Yu; Wang, Lei
5
2014
Practical cryptanalysis of PAES. Zbl 1382.94125
Jean, Jérémy; Nikolić, Ivica; Sasaki, Yu; Wang, Lei
3
2014
Generic attacks on strengthened HMAC: \(n\)-bit secure HMAC requires key in all blocks. Zbl 1423.68158
Sasaki, Yu; Wang, Lei
1
2014
Memoryless unbalanced meet-in-the-middle attacks: impossible results and applications. Zbl 1353.94072
Sasaki, Yu
1
2014
Meet-in-the-middle technique for integral attacks against Feistel ciphers. Zbl 1327.94073
Sasaki, Yu; Wang, Lei
10
2013
Limited-birthday distinguishers for hash functions. Collisions beyond the birthday bound can be meaningful. Zbl 1314.94076
Iwamoto, Mitsugu; Peyrin, Thomas; Sasaki, Yu
9
2013
Comprehensive study of integral analysis on 22-round LBlock. Zbl 1342.94094
Sasaki, Yu; Wang, Lei
5
2013
Generic state-recovery and forgery attacks on chopmd-MAC and on NMAC/HMAC. Zbl 1414.94914
Naito, Yusuke; Sasaki, Yu; Wang, Lei; Yasuda, Kan
4
2013
Cryptanalysis of HMAC/NMAC-Whirlpool. Zbl 1314.94070
Guo, Jian; Sasaki, Yu; Wang, Lei; Wu, Shuang
3
2013
Multi-differential cryptanalysis on reduced DM-PRESENT-80: collisions and other differential properties. Zbl 1342.94078
Koyama, Takuma; Sasaki, Yu; Kunihiro, Noboru
1
2013
Related-key boomerang attacks on KATAN32/48/64. Zbl 1316.94079
Isobe, Takanori; Sasaki, Yu; Chen, Jiageng
1
2013
Investigating fundamental security requirements on whirlpool: improved preimage and collision attacks. Zbl 1292.94134
Sasaki, Yu; Wang, Lei; Wu, Shuang; Wu, Wenling
11
2012
Generic related-key attacks for HMAC. Zbl 1292.94128
Peyrin, Thomas; Sasaki, Yu; Wang, Lei
8
2012
Boomerang distinguishers on MD4-family: first practical results on full 5-pass HAVAL. Zbl 1279.94114
Sasaki, Yu
6
2012
Three-subset meet-in-the-middle attack on reduced XTEA. Zbl 1304.94083
Sasaki, Yu; Wang, Lei; Sakai, Yasuhide; Sakiyama, Kazuo; Ohta, Kazuo
4
2012
Improved known-key distinguishers on Feistel-SP ciphers and application to Camellia. Zbl 1305.94077
Sasaki, Yu; Emami, Sareh; Hong, Deukjo; Kumar, Ashish
3
2012
Double-SP is weaker than single-SP: rebound attacks on Feistel ciphers with several rounds. Zbl 1295.94141
Sasaki, Yu
2
2012
Boomerang distinguishers for full HAS-160 compression function. Zbl 1292.94133
Sasaki, Yu; Wang, Lei; Takasaki, Yasuhiro; Sakiyama, Kazuo; Ohta, Kazuo
2
2012
Cryptanalyses on a Merkle-Damgård based MAC – almost universal forgery and distinguishing-\(H\) attacks. Zbl 1297.94099
Sasaki, Yu
1
2012
Improved integral analysis on tweaked Lesamnta. Zbl 1301.94127
Sasaki, Yu; Aoki, Kazumaro
1
2012
Meet-in-the-middle preimage attacks on AES hashing modes and an application to Whirlpool. Zbl 1307.94094
Sasaki, Yu
17
2011
Known-key distinguishers on 11-round Feistel and collision attacks on its hashing modes. Zbl 1307.94095
Sasaki, Yu; Yasuda, Kan
10
2011
(Second) preimage attacks on step-reduced RIPEMD/RIPEMD-128 with a new local-collision approach. Zbl 1284.94123
Wang, Lei; Sasaki, Yu; Komatsubara, Wataru; Ohta, Kazuo; Sakiyama, Kazuo
5
2011
Preimage attacks on step-reduced RIPEMD-128 and RIPEMD-160. Zbl 1295.94121
Ohtahara, Chiaki; Sasaki, Yu; Shimoyama, Takeshi
5
2011
Experimental verification of super-Sbox analysis – confirmation of detailed attack complexity. Zbl 1344.94072
Sasaki, Yu; Takayanagi, Naoyuki; Sakiyama, Kazuo; Ohta, Kazuo
2
2011
Non-full-active Super-Sbox analysis: applications to ECHO and Grøstl. Zbl 1253.94067
Sasaki, Yu; Li, Yang; Wang, Lei; Sakiyama, Kazuo; Ohta, Kazuo
12
2010
Finding preimages of Tiger up to 23 steps. Zbl 1285.94100
Wang, Lei; Sasaki, Yu
3
2010
Preimage attacks on one-block MD4, 63-step MD5 and more. Zbl 1256.94040
Aoki, Kazumaro; Sasaki, Yu
33
2009
Finding preimages in full MD5 faster than exhaustive search. Zbl 1239.94064
Sasaki, Yu; Aoki, Kazumaro
32
2009
Meet-in-the-middle preimage attacks against reduced SHA-0 and SHA-1. Zbl 1252.94043
Aoki, Kazumaro; Sasaki, Yu
18
2009
Rebound attack on the full Lane compression function. Zbl 1267.94083
Matusiewicz, Krystian; Naya-Plasencia, María; Nikolić, Ivica; Sasaki, Yu; Schläffer, Martin
17
2009
Preimages for step-reduced SHA-2. Zbl 1267.94030
Aoki, Kazumaro; Guo, Jian; Matusiewicz, Krystian; Sasaki, Yu; Wang, Lei
15
2009
Meet-in-the-middle preimage attacks on double-branch hash functions: application to RIPEMD and others. Zbl 1284.94107
Sasaki, Yu; Aoki, Kazumaro
4
2009
Meet-in-the-middle attacks using output truncation in 3-pass HAVAL. Zbl 1307.94093
Sasaki, Yu
1
2009
Cryptanalyses of narrow-pipe mode of operation in AURORA-512 hash function. Zbl 1267.94093
Sasaki, Yu
1
2009
Preimage attacks on 3, 4, and 5-pass HAVAL. Zbl 1206.94089
Sasaki, Yu; Aoki, Kazumaro
13
2008
Preimage attacks on step-reduced MD5. Zbl 1285.94094
Sasaki, Yu; Aoki, Kazumaro
7
2008
Security of MD5 challenge and response: Extension of APOP password recovery attack. Zbl 1153.94428
Sasaki, Yu; Wang, Lei; Ohta, Kazuo; Kunihiro, Noboru
2
2008
Password recovery on challenge and response: Impossible differential attack on hash function. Zbl 1142.94359
Sasaki, Yu; Wang, Lei; Ohta, Kazuo; Kunihiro, Noboru
1
2008
New message difference for MD4. Zbl 1186.94469
Sasaki, Yu; Wang, Lei; Ohta, Kazuo; Kunihiro, Noboru
4
2007
Improved collision search for SHA-0. Zbl 1172.94591
Naito, Yusuke; Sasaki, Yu; Shimoyama, Takeshi; Yajima, Jun; Kunihiro, Noboru; Ohta, Kazuo
3
2006
How to construct sufficient conditions for hash functions. Zbl 1295.94142
Sasaki, Yu; Naito, Yusuke; Yajima, Jun; Shimoyama, Takeshi; Kunihiro, Noboru; Ohta, Kazuo
2
2006
all top 5

Cited by 707 Authors

29 Sasaki, Yu
17 Wang, Meiqin
16 Wu, Wenling
15 Leander, Gregor
15 Naya-Plasencia, María
14 Dong, Xiaoyang
14 Sun, Siwei
13 Isobe, Takanori
13 Todo, Yosuke
12 Guo, Jian
12 Meier, Willi
12 Schrottenloher, André
11 Hu, Lei
11 Leurent, Gaëtan
10 Mendel, Florian
10 Song, Ling
10 Wang, Xiaoyun
9 Beierle, Christof
9 Dinur, Itai
9 Dunkelman, Orr
9 Grassi, Lorenzo
9 Nandi, Mridul
9 Peyrin, Thomas
9 Youssef, Amr M.
9 Zou, Jian
8 Liu, Fukang
8 Mesnager, Sihem
8 Rechberger, Christian
8 Wang, Gaoli
7 AlTawy, Riham
7 Bao, Zhenzhen
7 Jean, Jérémy
7 Keller, Nathan
7 Lee, Jooyoung
7 Mennink, Bart
7 Perrin, Léo
7 Rijmen, Vincent
7 Shi, Danping
7 Stănică, Pantelimon
6 Anand, Ravi
6 Beyne, Tim
6 Bogdanov, Andrey
6 Derbez, Patrick
6 Eichlseder, Maria
6 Fan, Yanhong
6 List, Eik
6 Shamir, Adi
6 Wang, Qingju
5 Banik, Subhadeep
5 Bonnetain, Xavier
5 Chakraborti, Avik
5 Chen, Huaifeng
5 Cui, Tingting
5 Dobraunig, Christoph
5 Fouque, Pierre-Alain
5 Guo, Chun
5 Kim, Jongsung
5 Lee, ByeongHak
5 Lin, Dongdai
5 Liu, Yunwen
5 Luo, Yiyuan
5 Minematsu, Kazuhiko
5 Naito, Yusuke
5 Sarkar, Santanu
5 Sibleyras, Ferdinand
5 Sun, Ling
5 Tolba, Mohamed
5 Wang, Peng
5 Zeng, Xiangyong
4 Andreeva, Elena Anatol’evna
4 Bagheri, Nasour
4 Datta, Nilanjan
4 Flórez-Gutiérrez, Antonio
4 Guan, Jie
4 Guo, Tingting
4 Hao, Yonglin
4 Hosoyamada, Akinori
4 Hu, Bin
4 Hua, Jialiang
4 Iwata, Tetsu
4 Jha, Ashwin
4 Kölbl, Stefan
4 Lambin, Baptiste
4 Li, Chao
4 Liu, Qian
4 Lu, Zhenyu
4 Lucks, Stefan
4 Nikolić, Ivica
4 Preneel, Bart
4 Schläffer, Martin
4 Seurin, Yannick
4 Sim, Siang Meng
4 Wang, Lei
4 Wang, Weijia
4 Wei, Yongzhuang
4 Yuan, Zheng
4 Zhang, Wentao
3 Aoki, Kazumaro
3 Baek, Seungjun
3 Bhaumik, Ritam
...and 607 more Authors

Citations by Year