default search action
Yosuke Todo
Person information
- affiliation: NTT Social Informatics Laboratories, Tokyo, Japan
- unicode name: 藤堂 洋介
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j29]Soichiro Kobayashi, Rei Ueno, Yosuke Todo, Naofumi Homma:
Side-Channel Linearization Attack on Unrolled Trivium Hardware. IACR Commun. Cryptol. 1(3): 14 (2024) - [j28]Hosein Hadipour, Yosuke Todo:
Cryptanalysis of QARMAv2. IACR Trans. Symmetric Cryptol. 2024(1): 188-213 (2024) - [j27]Ryunouchi Takeuchi, Yosuke Todo, Tetsu Iwata:
Key Recovery, Universal Forgery, and Committing Attacks against Revised Rocca: How Finalization Affects Security. IACR Trans. Symmetric Cryptol. 2024(2): 85-117 (2024) - [c43]Antonio Flórez-Gutiérrez, Yosuke Todo:
Improving Linear Key Recovery Attacks Using Walsh Spectrum Puncturing. EUROCRYPT (1) 2024: 187-216 - [i36]Antonio Flórez-Gutiérrez, Yosuke Todo:
Improving Linear Key Recovery Attacks using Walsh Spectrum Puncturing. IACR Cryptol. ePrint Arch. 2024: 151 (2024) - [i35]Ryunosuke Takeuchi, Yosuke Todo, Tetsu Iwata:
Practical Committing Attacks against Rocca-S. IACR Cryptol. ePrint Arch. 2024: 901 (2024) - [i34]Christina Boura, Shahram Rasoolzadeh, Dhiman Saha, Yosuke Todo:
Multiple-Tweak Differential Attack Against SCARF. IACR Cryptol. ePrint Arch. 2024: 1408 (2024) - 2023
- [j26]Yu Long Chen, Antonio Flórez-Gutiérrez, Akiko Inoue, Ryoma Ito, Tetsu Iwata, Kazuhiko Minematsu, Nicky Mouha, Yusuke Naito, Ferdinand Sibleyras, Yosuke Todo:
Key Committing Security of AEZ and More. IACR Trans. Symmetric Cryptol. 2023(4): 452-488 (2023) - [c42]Ferdinand Sibleyras, Yosuke Todo:
Keyed Sum of Permutations: A Simpler RP-Based PRF. CT-RSA 2023: 573-593 - [c41]Federico Canale, Tim Güneysu, Gregor Leander, Jan Philipp Thoma, Yosuke Todo, Rei Ueno:
SCARF - A Low-Latency Block Cipher for Secure Cache-Randomization. USENIX Security Symposium 2023: 1937-1954 - [i33]Ferdinand Sibleyras, Yosuke Todo:
Keyed Sum of Permutations: a simpler RP-based PRF. IACR Cryptol. ePrint Arch. 2023: 1083 (2023) - [i32]Hosein Hadipour, Yosuke Todo:
Cryptanalysis of QARMAv2. IACR Cryptol. ePrint Arch. 2023: 1833 (2023) - 2022
- [j25]Kalikinkar Mandal, Dhiman Saha, Sumanta Sarkar, Yosuke Todo:
Sycon: a new milestone in designing ASCON-like permutations. J. Cryptogr. Eng. 12(3): 305-327 (2022) - [j24]Christof Beierle, Marek Broll, Federico Canale, Nicolas David, Antonio Flórez-Gutiérrez, Gregor Leander, María Naya-Plasencia, Yosuke Todo:
Improved Differential-Linear Attacks with Applications to ARX Ciphers. J. Cryptol. 35(4): 29 (2022) - [j23]Akinori Hosoyamada, Akiko Inoue, Ryoma Ito, Tetsu Iwata, Kazuhiko Minematsu, Ferdinand Sibleyras, Yosuke Todo:
Cryptanalysis of Rocca and Feasibility of Its Security Claim. IACR Trans. Symmetric Cryptol. 2022(3): 123-151 (2022) - [j22]Yosuke Todo, Takanori Isobe:
Hybrid Code Lifting on Space-Hard Block Ciphers Application to Yoroi and SPNbox. IACR Trans. Symmetric Cryptol. 2022(3): 368-402 (2022) - [c40]Akinori Hosoyamada, Takanori Isobe, Yosuke Todo, Kan Yasuda:
A Modular Approach to the Incompressibility of Block-Cipher-Based AEADs. ASIACRYPT (2) 2022: 585-619 - [c39]Marek Broll, Federico Canale, Nicolas David, Antonio Flórez-Gutiérrez, Gregor Leander, María Naya-Plasencia, Yosuke Todo:
New Attacks from Old Distinguishers Improved Attacks on Serpent. CT-RSA 2022: 484-510 - [c38]Ferdinand Sibleyras, Yu Sasaki, Yosuke Todo, Akinori Hosoyamada, Kan Yasuda:
Birthday-Bound Slide Attacks on TinyJAMBU's Keyed-Permutations for All Key Sizes. IWSEC 2022: 107-127 - [i31]Federico Canale, Tim Güneysu, Gregor Leander, Jan Philipp Thoma, Yosuke Todo, Rei Ueno:
SCARF: A Low-Latency Block Cipher for Secure Cache-Randomization. IACR Cryptol. ePrint Arch. 2022: 1228 (2022) - [i30]Akinori Hosoyamada, Takanori Isobe, Yosuke Todo, Kan Yasuda:
A Modular Approach to the Incompressibility of Block-Cipher-Based AEADs. IACR Cryptol. ePrint Arch. 2022: 1253 (2022) - 2021
- [j21]Yonglin Hao, Gregor Leander, Willi Meier, Yosuke Todo, Qingju Wang:
Modeling for Three-Subset Division Property without Unknown Subset. J. Cryptol. 34(3): 22 (2021) - [j20]Andrea Caforio, Subhadeep Banik, Yosuke Todo, Willi Meier, Takanori Isobe, Fukang Liu, Bin Zhang:
Perfect Trees: Designing Energy-Optimal Symmetric Encryption Primitives. IACR Trans. Symmetric Cryptol. 2021(4): 36-73 (2021) - [c37]Phil Hebborn, Baptiste Lambin, Gregor Leander, Yosuke Todo:
Strong and Tight Security Guarantees Against Integral Distinguishers. ASIACRYPT (1) 2021: 362-391 - [c36]Kai Hu, Siwei Sun, Yosuke Todo, Meiqin Wang, Qingju Wang:
Massive Superpoly Recovery with Nested Monomial Predictions. ASIACRYPT (1) 2021: 392-421 - [c35]Yosuke Todo, Yu Sasaki:
Designing S-Boxes Providing Stronger Security Against Differential Cryptanalysis for Ciphers Using Byte-Wise XOR. SAC 2021: 179-199 - [i29]Kalikinkar Mandal, Dhiman Saha, Sumanta Sarkar, Yosuke Todo:
Sycon: A New Milestone in Designing ASCON-like Permutations. IACR Cryptol. ePrint Arch. 2021: 157 (2021) - [i28]Marek Broll, Federico Canale, Nicolas David, Antonio Flórez-Gutiérrez, Gregor Leander, María Naya-Plasencia, Yosuke Todo:
Further Improving Differential-Linear Attacks: Applications to Chaskey and Serpent. IACR Cryptol. ePrint Arch. 2021: 820 (2021) - [i27]Kai Hu, Siwei Sun, Yosuke Todo, Meiqin Wang, Qingju Wang:
Massive Superpoly Recovery with Nested Monomial Predictions. IACR Cryptol. ePrint Arch. 2021: 1225 (2021) - [i26]Phil Hebborn, Baptiste Lambin, Gregor Leander, Yosuke Todo:
Strong and Tight Security Guarantees against Integral Distinguishers. IACR Cryptol. ePrint Arch. 2021: 1502 (2021) - [i25]Andrea Caforio, Subhadeep Banik, Yosuke Todo, Willi Meier, Takanori Isobe, Fukang Liu, Bin Zhang:
Perfect Trees: Designing Energy-Optimal Symmetric Encryption Primitives. IACR Cryptol. ePrint Arch. 2021: 1523 (2021) - 2020
- [j19]Yonglin Hao, Lin Jiao, Chaoyun Li, Willi Meier, Yosuke Todo, Qingju Wang:
Links between Division Property and Other Cube Attack Variants. IACR Trans. Symmetric Cryptol. 2020(1): 363-395 (2020) - [c34]Phil Hebborn, Baptiste Lambin, Gregor Leander, Yosuke Todo:
Lower Bounds on the Degree of Block Ciphers. ASIACRYPT (1) 2020: 537-566 - [c33]Tim Beyne, Anne Canteaut, Itai Dinur, Maria Eichlseder, Gregor Leander, Gaëtan Leurent, María Naya-Plasencia, Léo Perrin, Yu Sasaki, Yosuke Todo, Friedrich Wiemer:
Out of Oddity - New Cryptanalytic Techniques Against Symmetric Primitives Optimized for Integrity Proof Systems. CRYPTO (3) 2020: 299-328 - [c32]Christof Beierle, Gregor Leander, Yosuke Todo:
Improved Differential-Linear Attacks with Applications to ARX Ciphers. CRYPTO (3) 2020: 329-358 - [c31]Yonglin Hao, Gregor Leander, Willi Meier, Yosuke Todo, Qingju Wang:
Modeling for Three-Subset Division Property Without Unknown Subset - Improved Cube Attacks Against Trivium and Grain-128AEAD. EUROCRYPT (1) 2020: 466-495 - [c30]Dusan Bozilov, Maria Eichlseder, Miroslav Knezevic, Baptiste Lambin, Gregor Leander, Thorben Moos, Ventzislav Nikov, Shahram Rasoolzadeh, Yosuke Todo, Friedrich Wiemer:
PRINCEv2 - More Security for (Almost) No Overhead. SAC 2020: 483-511 - [i24]Tim Beyne, Anne Canteaut, Itai Dinur, Maria Eichlseder, Gregor Leander, Gaëtan Leurent, María Naya-Plasencia, Léo Perrin, Yu Sasaki, Yosuke Todo, Friedrich Wiemer:
Out of Oddity - New Cryptanalytic Techniques against Symmetric Primitives Optimized for Integrity Proof Systems. IACR Cryptol. ePrint Arch. 2020: 188 (2020) - [i23]Yonglin Hao, Gregor Leander, Willi Meier, Yosuke Todo, Qingju Wang:
Modeling for Three-Subset Division Property without Unknown Subset. IACR Cryptol. ePrint Arch. 2020: 441 (2020) - [i22]Subhadeep Banik, Avik Chakraborti, Tetsu Iwata, Kazuhiko Minematsu, Mridul Nandi, Thomas Peyrin, Yu Sasaki, Siang Meng Sim, Yosuke Todo:
GIFT-COFB. IACR Cryptol. ePrint Arch. 2020: 738 (2020) - [i21]Christof Beierle, Gregor Leander, Yosuke Todo:
Improved Differential-Linear Attacks with Applications to ARX Ciphers. IACR Cryptol. ePrint Arch. 2020: 775 (2020) - [i20]Phil Hebborn, Baptiste Lambin, Gregor Leander, Yosuke Todo:
Lower Bounds on the Degree of Block Ciphers. IACR Cryptol. ePrint Arch. 2020: 1051 (2020) - [i19]Dusan Bozilov, Maria Eichlseder, Miroslav Knezevic, Baptiste Lambin, Gregor Leander, Thorben Moos, Ventzislav Nikov, Shahram Rasoolzadeh, Yosuke Todo, Friedrich Wiemer:
PRINCEv2 - More Security for (Almost) No Overhead. IACR Cryptol. ePrint Arch. 2020: 1269 (2020)
2010 – 2019
- 2019
- [j18]Yuki Funabiki, Yosuke Todo, Takanori Isobe, Masakatu Morii:
Improved Integral Attack on HIGHT. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 102-A(9): 1259-1271 (2019) - [j17]Yosuke Todo, Gregor Leander, Yu Sasaki:
Nonlinear Invariant Attack: Practical Attack on Full SCREAM, iSCREAM, and Midori64. J. Cryptol. 32(4): 1383-1422 (2019) - [j16]Yonglin Hao, Takanori Isobe, Lin Jiao, Chaoyun Li, Willi Meier, Yosuke Todo, Qingju Wang:
Improved Division Property Based Cube Attacks Exploiting Algebraic Properties of Superpoly. IEEE Trans. Computers 68(10): 1470-1486 (2019) - [j15]Ralph Ankele, Christoph Dobraunig, Jian Guo, Eran Lambooij, Gregor Leander, Yosuke Todo:
Zero-Correlation Attacks on Tweakable Block Ciphers with Linear Tweakey Expansion. IACR Trans. Symmetric Cryptol. 2019(1): 192-235 (2019) - [c29]Yosuke Todo, Willi Meier, Kazumaro Aoki:
On the Data Limitation of Small-State Stream Ciphers: Correlation Attacks on Fruit-80 and Plantlet. SAC 2019: 365-392 - [i18]Ralph Ankele, Christoph Dobraunig, Jian Guo, Eran Lambooij, Gregor Leander, Yosuke Todo:
Zero-Correlation Attacks on Tweakable Block Ciphers with Linear Tweakey Expansion. IACR Cryptol. ePrint Arch. 2019: 185 (2019) - [i17]Yosuke Todo, Willi Meier, Kazumaro Aoki:
On the Data Limitation of Small-State Stream Ciphers: Correlation Attacks on Fruit-80 and Plantlet. IACR Cryptol. ePrint Arch. 2019: 809 (2019) - 2018
- [j14]Kota Kondo, Yu Sasaki, Yosuke Todo, Tetsu Iwata:
On the Design Rationale of SIMON Block Cipher: Integral Attacks and Impossible Differential Attacks against SIMON Variants. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 101-A(1): 88-98 (2018) - [j13]Qianqian Yang, Lei Hu, Danping Shi, Yosuke Todo, Siwei Sun:
On the Complexity of Impossible Differential Cryptanalysis. Secur. Commun. Networks 2018: 7393401:1-7393401:11 (2018) - [j12]Yu Sasaki, Yosuke Todo:
Tight Bounds of Differentially and Linearly Active S-Boxes and Division Property of Lilliput. IEEE Trans. Computers 67(5): 717-732 (2018) - [j11]Yosuke Todo, Takanori Isobe, Yonglin Hao, Willi Meier:
Cube Attacks on Non-Blackbox Polynomials Based on Division Property. IEEE Trans. Computers 67(12): 1720-1736 (2018) - [j10]Patrick Derbez, Tetsu Iwata, Ling Sun, Siwei Sun, Yosuke Todo, Haoyang Wang, Meiqin Wang:
Cryptanalysis of AES-PRF and Its Dual. IACR Trans. Symmetric Cryptol. 2018(2): 161-191 (2018) - [c28]Danping Shi, Siwei Sun, Patrick Derbez, Yosuke Todo, Bing Sun, Lei Hu:
Programming the Demirci-Selçuk Meet-in-the-Middle Attack with Constraints. ASIACRYPT (2) 2018: 3-34 - [c27]Yuki Funabiki, Yosuke Todo, Takanori Isobe, Masakatu Morii:
Several MILP-Aided Attacks Against SNOW 2.0. CANS 2018: 394-413 - [c26]Yosuke Todo, Takanori Isobe, Willi Meier, Kazumaro Aoki, Bin Zhang:
Fast Correlation Attack Revisited - Cryptanalysis on Full Grain-128a, Grain-128, and Grain-v1. CRYPTO (2) 2018: 129-159 - [c25]Qingju Wang, Yonglin Hao, Yosuke Todo, Chaoyun Li, Takanori Isobe, Willi Meier:
Improved Division Property Based Cube Attacks Exploiting Algebraic Properties of Superpoly. CRYPTO (1) 2018: 275-305 - [i16]Yosuke Todo, Takanori Isobe, Willi Meier, Kazumaro Aoki, Bin Zhang:
Fast Correlation Attack Revisited -Cryptanalysis on Full Grain-128a, Grain-128, and Grain-v1. IACR Cryptol. ePrint Arch. 2018: 522 (2018) - [i15]Danping Shi, Siwei Sun, Patrick Derbez, Yosuke Todo, Bing Sun, Lei Hu:
Programming the Demirci-Selçuk Meet-in-the-Middle Attack with Constraints. IACR Cryptol. ePrint Arch. 2018: 813 (2018) - [i14]Yonglin Hao, Lin Jiao, Chaoyun Li, Willi Meier, Yosuke Todo, Qingju Wang:
Observations on the Dynamic Cube Attack of 855-Round TRIVIUM from Crypto'18. IACR Cryptol. ePrint Arch. 2018: 972 (2018) - 2017
- [j9]Yosuke Todo:
Integral Cryptanalysis on Full MISTY1. J. Cryptol. 30(3): 920-959 (2017) - [j8]Siwei Sun, David Gérault, Pascal Lafourcade, Qianqian Yang, Yosuke Todo, Kexin Qiao, Lei Hu:
Analysis of AES, SKINNY, and Others with Constraint Programming. IACR Trans. Symmetric Cryptol. 2017(1): 281-306 (2017) - [j7]Ahmed Abdelkhalek, Yu Sasaki, Yosuke Todo, Mohamed Tolba, Amr M. Youssef:
MILP Modeling for (Large) S-boxes to Optimize Probability of Differential Characteristics. IACR Trans. Symmetric Cryptol. 2017(4): 99-129 (2017) - [c24]Yuki Funabiki, Yosuke Todo, Takanori Isobe, Masakatu Morii:
Improved Integral Attack on HIGHT. ACISP (1) 2017: 363-383 - [c23]Takeru Koie, Takanori Isobe, Yosuke Todo, Masakatu Morii:
Low-Data Complexity Attacks on Camellia. ATIS 2017: 128-140 - [c22]Daniel J. Bernstein, Stefan Kölbl, Stefan Lucks, Pedro Maat Costa Massolino, Florian Mendel, Kashif Nawaz, Tobias Schneider, Peter Schwabe, François-Xavier Standaert, Yosuke Todo, Benoît Viguier:
Gimli : A Cross-Platform Permutation. CHES 2017: 299-320 - [c21]Subhadeep Banik, Sumit Kumar Pandey, Thomas Peyrin, Yu Sasaki, Siang Meng Sim, Yosuke Todo:
GIFT: A Small Present - Towards Reaching the Limit of Lightweight Encryption. CHES 2017: 321-345 - [c20]Yosuke Todo, Takanori Isobe, Yonglin Hao, Willi Meier:
Cube Attacks on Non-Blackbox Polynomials Based on Division Property. CRYPTO (3) 2017: 250-279 - [c19]Yu Sasaki, Yosuke Todo:
New Impossible Differential Search Tool from Design and Cryptanalysis Aspects - Revealing Structural Properties of Several Ciphers. EUROCRYPT (3) 2017: 185-215 - [c18]Kota Kondo, Yu Sasaki, Yosuke Todo, Tetsu Iwata:
Analyzing Key Schedule of Simon: Iterative Key Differences and Application to Related-Key Impossible Differentials. IWSEC 2017: 141-158 - [c17]Yu Sasaki, Yosuke Todo:
New Algorithm for Modeling S-box in MILP Based Differential and Division Trail Search. SECITC 2017: 150-165 - [i13]Siwei Sun, David Gérault, Pascal Lafourcade, Qianqian Yang, Yosuke Todo, Kexin Qiao, Lei Hu:
Analysis of AES, SKINNY, and Others with Constraint Programming. IACR Cryptol. ePrint Arch. 2017: 162 (2017) - [i12]Yosuke Todo, Takanori Isobe, Yonglin Hao, Willi Meier:
Cube Attacks on Non-Blackbox Polynomials Based on Division Property. IACR Cryptol. ePrint Arch. 2017: 306 (2017) - [i11]Subhadeep Banik, Sumit Kumar Pandey, Thomas Peyrin, Siang Meng Sim, Yosuke Todo, Yu Sasaki:
GIFT: A Small Present. IACR Cryptol. ePrint Arch. 2017: 622 (2017) - [i10]Daniel J. Bernstein, Stefan Kölbl, Stefan Lucks, Pedro Maat Costa Massolino, Florian Mendel, Kashif Nawaz, Tobias Schneider, Peter Schwabe, François-Xavier Standaert, Yosuke Todo, Benoît Viguier:
Gimli: a cross-platform permutation. IACR Cryptol. ePrint Arch. 2017: 630 (2017) - [i9]Qingju Wang, Yonglin Hao, Yosuke Todo, Chaoyun Li, Takanori Isobe, Willi Meier:
Improved Division Property Based Cube Attacks Exploiting Algebraic Properties of Superpoly. IACR Cryptol. ePrint Arch. 2017: 1063 (2017) - 2016
- [j6]Sho Sakikoyama, Yosuke Todo, Kazumaro Aoki, Masakatu Morii:
Efficient Implementations for Practical Linear Cryptanalysis and Its Application to FEAL-8X. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 99-A(1): 31-38 (2016) - [j5]Yosuke Todo:
Impossible Differential Attack against 14-Round Piccolo-80 without Relying on Full Code Book. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 99-A(1): 154-157 (2016) - [c16]Yosuke Todo, Kazumaro Aoki:
Wide Trail Design Strategy for Binary MixColumns - Enhancing Lower Bound of Number of Active S-boxes. ACNS 2016: 467-484 - [c15]Yosuke Todo, Gregor Leander, Yu Sasaki:
Nonlinear Invariant Attack - Practical Attack on Full SCREAM, iSCREAM, and Midori64. ASIACRYPT (2) 2016: 3-33 - [c14]Yuhei Watanabe, Yosuke Todo, Masakatu Morii:
New Conditional Differential Cryptanalysis for NLFSR-based Stream Ciphers and Application to Grain v1. AsiaJCIS 2016: 115-123 - [c13]Yosuke Todo, Masakatu Morii:
Compact Representation for Division Property. CANS 2016: 19-35 - [c12]Yosuke Todo, Masakatu Morii:
Bit-Based Division Property and Application to Simon Family. FSE 2016: 357-377 - [c11]Yosuke Todo:
Division Property: Efficient Method to Estimate Upper Bound of Algebraic Degree. Mycrypt 2016: 553-571 - [c10]Yu Sasaki, Yosuke Todo:
New Differential Bounds and Division Property of Lilliput: Block Cipher with Extended Generalized Feistel Network. SAC 2016: 264-283 - [i8]Yosuke Todo, Masakatu Morii:
Bit-Based Division Property and Application to Simon Family. IACR Cryptol. ePrint Arch. 2016: 285 (2016) - [i7]Yosuke Todo, Gregor Leander, Yu Sasaki:
Nonlinear Invariant Attack -Practical Attack on Full SCREAM, iSCREAM, and Midori64. IACR Cryptol. ePrint Arch. 2016: 732 (2016) - [i6]Yu Sasaki, Yosuke Todo:
New Impossible Differential Search Tool from Design and Cryptanalysis Aspects. IACR Cryptol. ePrint Arch. 2016: 1181 (2016) - 2015
- [j4]Yosuke Todo:
Upper Bounds for the Security of Several Feistel Networks. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 98-A(1): 39-48 (2015) - [j3]Yosuke Todo, Kazumaro Aoki:
Fast Fourier Transform Key Recovery for Integral Attacks. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 98-A(9): 1944-1952 (2015) - [c9]Yosuke Todo:
Integral Cryptanalysis on Full MISTY1. CRYPTO (1) 2015: 413-432 - [c8]Yosuke Todo:
Structural Evaluation by Generalized Integral Property. EUROCRYPT (1) 2015: 287-314 - [i5]Yosuke Todo:
Structural Evaluation by Generalized Integral Property. IACR Cryptol. ePrint Arch. 2015: 90 (2015) - [i4]Yosuke Todo:
Integral Cryptanalysis on Full MISTY1. IACR Cryptol. ePrint Arch. 2015: 682 (2015) - 2014
- [c7]Yosuke Todo, Kazumaro Aoki:
FFT Key Recovery for Integral Attack. CANS 2014: 64-81 - [c6]Sho Sakikoyama, Yosuke Todo, Kazumaro Aoki, Masakatu Morii:
How Much Can Complexity of Linear Cryptanalysis Be Reduced? ICISC 2014: 117-131 - [c5]Qingju Wang, Zhiqiang Liu, Kerem Varici, Yu Sasaki, Vincent Rijmen, Yosuke Todo:
Cryptanalysis of Reduced-Round SIMON32 and SIMON48. INDOCRYPT 2014: 143-160 - [c4]Martin R. Albrecht, Jean-Charles Faugère, Robert Fitzpatrick, Ludovic Perret, Yosuke Todo, Keita Xagawa:
Practical Cryptanalysis of a Public-Key Encryption Scheme Based on New Multivariate Quadratic Assumptions. Public Key Cryptography 2014: 446-464 - [i3]Yosuke Todo:
FFT-Based Key Recovery for the Integral Attack. IACR Cryptol. ePrint Arch. 2014: 187 (2014) - [i2]Qingju Wang, Zhiqiang Liu, Kerem Varici, Yu Sasaki, Vincent Rijmen, Yosuke Todo:
Cryptanalysis of Reduced-round SIMON32 and SIMON48. IACR Cryptol. ePrint Arch. 2014: 761 (2014) - 2013
- [c3]Yosuke Todo:
Upper Bounds for the Security of Several Feistel Networks. ACISP 2013: 302-317 - [c2]Yosuke Todo, Yu Sasaki:
New Property of Diffusion Switching Mechanism on CLEFIA and Its Application to DFA. IWSEC 2013: 99-114 - [i1]Yosuke Todo, Keita Xagawa:
Cryptanalysis of the Huang-Liu-Yang Cryptosystem from PKC 2012. IACR Cryptol. ePrint Arch. 2013: 481 (2013) - 2012
- [j2]Yosuke Todo, Yuki Ozawa, Toshihiro Ohigashi, Masakatu Morii:
Falsification Attacks against WPA-TKIP in a Realistic Environment. IEICE Trans. Inf. Syst. 95-D(2): 588-595 (2012) - [c1]T. Tsukaune, Yosuke Todo, Masakatu Morii:
Proposal of a Secure WEP Operation against Existing Key Recovery Attacks and its Evaluation. AsiaJCIS 2012: 25-30 - 2011
- [j1]Masakatu Morii, Yosuke Todo:
Cryptanalysis for RC4 and Breaking WEP/WPA-TKIP. IEICE Trans. Inf. Syst. 94-D(11): 2087-2094 (2011)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-07 21:28 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint