GIFT: A Small Present: Towards Reaching the Limit of Lightweight Encryption S Banik, SK Pandey, T Peyrin, Y Sasaki, SM Sim, Y Todo Cryptographic Hardware and Embedded Systems–CHES 2017: 19th International …, 2017 | 608 | 2017 |
Structural evaluation by generalized integral property Y Todo Annual International Conference on the Theory and Applications of …, 2015 | 397 | 2015 |
Bit-Based Division Property and Application to Simon Family Y Todo, M Morii Fast Software Encryption: 23rd International Conference, FSE 2016, Bochum …, 2016 | 265 | 2016 |
New impossible differential search tool from design and cryptanalysis aspects: Revealing structural properties of several ciphers Y Sasaki, Y Todo Advances in Cryptology–EUROCRYPT 2017: 36th Annual International Conference …, 2017 | 222 | 2017 |
Integral cryptanalysis on full MISTY1 Y Todo Journal of Cryptology 30 (3), 920-959, 2017 | 173 | 2017 |
Cube attacks on non-blackbox polynomials based on division property Y Todo, T Isobe, Y Hao, W Meier IEEE Transactions on Computers 67 (12), 1720-1736, 2018 | 162 | 2018 |
Gimli : A Cross-Platform Permutation DJ Bernstein, S Kölbl, S Lucks, PMC Massolino, F Mendel, K Nawaz, ... Cryptographic Hardware and Embedded Systems–CHES 2017: 19th International …, 2017 | 146 | 2017 |
MILP modeling for (large) s-boxes to optimize probability of differential characteristics A Abdelkhalek, Y Sasaki, Y Todo, M Tolba, AM Youssef IACR Transactions on Symmetric Cryptology, 99-129, 2017 | 144 | 2017 |
Nonlinear invariant attack: Practical attack on full scream, i scream, and midori 64 Y Todo, G Leander, Y Sasaki International Conference on the Theory and Application of Cryptology and …, 2016 | 134 | 2016 |
Cryptanalysis of reduced-round SIMON32 and SIMON48 Q Wang, Z Liu, K Varıcı, Y Sasaki, V Rijmen, Y Todo Progress in Cryptology--INDOCRYPT 2014: 15th International Conference on …, 2014 | 127 | 2014 |
Improved division property based cube attacks exploiting algebraic properties of superpoly Y Hao, T Isobe, L Jiao, C Li, W Meier, Y Todo, Q Wang IEEE Transactions on Computers 68 (10), 1470-1486, 2019 | 102 | 2019 |
Modeling for three-subset division property without unknown subset: improved cube attacks against Trivium and Grain-128aead Y Hao, G Leander, W Meier, Y Todo, Q Wang Advances in Cryptology–EUROCRYPT 2020: 39th Annual International Conference …, 2020 | 101* | 2020 |
Analysis of AES, SKINNY, and others with constraint programming S Sun, D Gerault, P Lafourcade, Q Yang, Y Todo, K Qiao, L Hu IACR transactions on symmetric cryptology 2017 (1), 281--306, 2017 | 99 | 2017 |
Gift-cofb S Banik, A Chakraborti, A Inoue, T Iwata, K Minematsu, M Nandi, T Peyrin, ... Cryptology ePrint Archive, 2020 | 94 | 2020 |
New algorithm for modeling S-box in MILP based differential and division trail search Y Sasaki, Y Todo Innovative Security Solutions for Information Technology and Communications …, 2017 | 86 | 2017 |
Out of oddity–new cryptanalytic techniques against symmetric primitives optimized for integrity proof systems T Beyne, A Canteaut, I Dinur, M Eichlseder, G Leander, G Leurent, ... Advances in Cryptology–CRYPTO 2020: 40th Annual International Cryptology …, 2020 | 74 | 2020 |
Improved differential-linear attacks with applications to ARX ciphers C Beierle, M Broll, F Canale, N David, A Flórez-Gutiérrez, G Leander, ... Journal of Cryptology 35 (4), 29, 2022 | 69 | 2022 |
Fast correlation attack revisited: cryptanalysis on full grain-128a, grain-128, and grain-v1 Y Todo, T Isobe, W Meier, K Aoki, B Zhang Advances in Cryptology–CRYPTO 2018: 38th Annual International Cryptology …, 2018 | 66 | 2018 |
Programming the Demirci-Selçuk meet-in-the-middle attack with constraints D Shi, S Sun, P Derbez, Y Todo, B Sun, L Hu International Conference on the Theory and Application of Cryptology and …, 2018 | 65 | 2018 |
Minalpher v1 Y Sasaki, Y Todo, K Aoki, Y Naito, T Sugawara, Y Murakami, M Matsui, ... CAESAR Round 1, 2014 | 58* | 2014 |