Follow
Yu Sasaki
Yu Sasaki
NTT Secure Platform Labratories
No verified email
Title
Cited by
Cited by
Year
The SKINNY Family of Block Ciphers and Its Low-Latency Variant MANTIS
C Beierle, J Jean, S Kölbl, G Leander, A Moradi, T Peyrin, Y Sasaki, ...
Advances in Cryptology–CRYPTO 2016: 36th Annual International Cryptology …, 2016
7442016
GIFT: A Small Present: Towards Reaching the Limit of Lightweight Encryption
S Banik, SK Pandey, T Peyrin, Y Sasaki, SM Sim, Y Todo
Cryptographic Hardware and Embedded Systems–CHES 2017: 19th International …, 2017
5382017
Finding preimages in full MD5 faster than exhaustive search
Y Sasaki, K Aoki
Advances in Cryptology-EUROCRYPT 2009: 28th Annual International Conference …, 2009
2552009
New impossible differential search tool from design and cryptanalysis aspects: Revealing structural properties of several ciphers
Y Sasaki, Y Todo
Advances in Cryptology–EUROCRYPT 2017: 36th Annual International Conference …, 2017
2062017
Preimage attacks on one-block MD4, 63-step MD5 and more
K Aoki, Y Sasaki
Selected Areas in Cryptography: 15th International Workshop, SAC 2008 …, 2009
1962009
Boomerang connectivity table: a new cryptanalysis tool
C Cid, T Huang, T Peyrin, Y Sasaki, L Song
Advances in Cryptology–EUROCRYPT 2018: 37th Annual International Conference …, 2018
1852018
Preimages for step-reduced SHA-2
K Aoki, J Guo, K Matusiewicz, Y Sasaki, L Wang
Advances in Cryptology–ASIACRYPT 2009: 15th International Conference on the …, 2009
1452009
Meet-in-the-middle preimage attacks against reduced SHA-0 and SHA-1
K Aoki, Y Sasaki
Advances in Cryptology-CRYPTO 2009: 29th Annual International Cryptology …, 2009
1402009
MILP modeling for (large) s-boxes to optimize probability of differential characteristics
A Abdelkhalek, Y Sasaki, Y Todo, M Tolba, AM Youssef
IACR Transactions on Symmetric Cryptology, 99-129, 2017
1342017
Cryptanalysis of reduced-round SIMON32 and SIMON48
Q Wang, Z Liu, K Varıcı, Y Sasaki, V Rijmen, Y Todo
Progress in Cryptology--INDOCRYPT 2014: 15th International Conference on …, 2014
1272014
Quantum attacks without superposition queries: the offline Simon’s algorithm
X Bonnetain, A Hosoyamada, M Naya-Plasencia, Y Sasaki, ...
International Conference on the Theory and Application of Cryptology and …, 2019
1212019
Nonlinear invariant attack: Practical attack on full scream, i scream, and midori 64
Y Todo, G Leander, Y Sasaki
International Conference on the Theory and Application of Cryptology and …, 2016
1182016
Meet-in-the-middle preimage attacks on AES hashing modes and an application to whirlpool
Y Sasaki
IEICE Transactions on Fundamentals of Electronics, Communications and …, 2013
992013
Quantum Demiric-Selçuk meet-in-the-middle attacks: applications to 6-round generic Feistel constructions
A Hosoyamada, Y Sasaki
Security and Cryptography for Networks: 11th International Conference, SCN …, 2018
882018
Gift-cofb
S Banik, A Chakraborti, A Inoue, T Iwata, K Minematsu, M Nandi, T Peyrin, ...
Cryptology ePrint Archive, 2020
822020
Finding hash collisions with quantum computers by using differential trails with smaller probability than birthday bound
A Hosoyamada, Y Sasaki
Advances in Cryptology–EUROCRYPT 2020: 39th Annual International Conference …, 2020
792020
New algorithm for modeling S-box in MILP based differential and division trail search
Y Sasaki, Y Todo
Innovative Security Solutions for Information Technology and Communications …, 2017
762017
Meet-in-the-middle technique for integral attacks against feistel ciphers
Y Sasaki, L Wang
Selected Areas in Cryptography: 19th International Conference, SAC 2012 …, 2013
752013
Quantum chosen-ciphertext attacks against Feistel ciphers
G Ito, A Hosoyamada, R Matsumoto, Y Sasaki, T Iwata
Topics in Cryptology–CT-RSA 2019: The Cryptographers' Track at the RSA …, 2019
742019
Rebound Attack on the Full Lane Compression Function
K Matusiewicz, M Naya-Plasencia, I Nikolić, Y Sasaki, M Schläffer
International Conference on the Theory and Application of Cryptology and …, 2009
722009
The system can't perform the operation now. Try again later.
Articles 1–20