Follow
Yosuke Todo
Yosuke Todo
NTT Social Informatics Laboratories
Verified email at ntt.com
Title
Cited by
Cited by
Year
GIFT: A Small Present: Towards Reaching the Limit of Lightweight Encryption
S Banik, SK Pandey, T Peyrin, Y Sasaki, SM Sim, Y Todo
Cryptographic Hardware and Embedded Systems–CHES 2017: 19th International …, 2017
5852017
Structural evaluation by generalized integral property
Y Todo
Annual International Conference on the Theory and Applications of …, 2015
3842015
Bit-Based Division Property and Application to Simon Family
Y Todo, M Morii
Fast Software Encryption: 23rd International Conference, FSE 2016, Bochum …, 2016
2542016
New impossible differential search tool from design and cryptanalysis aspects: Revealing structural properties of several ciphers
Y Sasaki, Y Todo
Advances in Cryptology–EUROCRYPT 2017: 36th Annual International Conference …, 2017
2132017
Integral cryptanalysis on full MISTY1
Y Todo
Journal of Cryptology 30 (3), 920-959, 2017
1692017
Cube attacks on non-blackbox polynomials based on division property
Y Todo, T Isobe, Y Hao, W Meier
IEEE Transactions on Computers 67 (12), 1720-1736, 2018
1562018
MILP modeling for (large) s-boxes to optimize probability of differential characteristics
A Abdelkhalek, Y Sasaki, Y Todo, M Tolba, AM Youssef
IACR Transactions on Symmetric Cryptology, 99-129, 2017
1382017
Gimli : A Cross-Platform Permutation
DJ Bernstein, S Kölbl, S Lucks, PMC Massolino, F Mendel, K Nawaz, ...
Cryptographic Hardware and Embedded Systems–CHES 2017: 19th International …, 2017
1352017
Nonlinear invariant attack: Practical attack on full scream, i scream, and midori 64
Y Todo, G Leander, Y Sasaki
International Conference on the Theory and Application of Cryptology and …, 2016
1272016
Cryptanalysis of reduced-round SIMON32 and SIMON48
Q Wang, Z Liu, K Varıcı, Y Sasaki, V Rijmen, Y Todo
Progress in Cryptology--INDOCRYPT 2014: 15th International Conference on …, 2014
1272014
Improved division property based cube attacks exploiting algebraic properties of superpoly
Y Hao, T Isobe, L Jiao, C Li, W Meier, Y Todo, Q Wang
IEEE Transactions on Computers 68 (10), 1470-1486, 2019
1002019
Analysis of AES, SKINNY, and others with constraint programming
S Sun, D Gerault, P Lafourcade, Q Yang, Y Todo, K Qiao, L Hu
IACR transactions on symmetric cryptology 2017 (1), 281--306, 2017
952017
Modeling for three-subset division property without unknown subset: improved cube attacks against Trivium and Grain-128aead
Y Hao, G Leander, W Meier, Y Todo, Q Wang
Advances in Cryptology–EUROCRYPT 2020: 39th Annual International Conference …, 2020
93*2020
Gift-cofb
S Banik, A Chakraborti, A Inoue, T Iwata, K Minematsu, M Nandi, T Peyrin, ...
Cryptology ePrint Archive, 2020
892020
New algorithm for modeling S-box in MILP based differential and division trail search
Y Sasaki, Y Todo
Innovative Security Solutions for Information Technology and Communications …, 2017
802017
Out of oddity–new cryptanalytic techniques against symmetric primitives optimized for integrity proof systems
T Beyne, A Canteaut, I Dinur, M Eichlseder, G Leander, G Leurent, ...
Advances in Cryptology–CRYPTO 2020: 40th Annual International Cryptology …, 2020
712020
Programming the Demirci-Selçuk meet-in-the-middle attack with constraints
D Shi, S Sun, P Derbez, Y Todo, B Sun, L Hu
International Conference on the Theory and Application of Cryptology and …, 2018
652018
Fast correlation attack revisited: cryptanalysis on full grain-128a, grain-128, and grain-v1
Y Todo, T Isobe, W Meier, K Aoki, B Zhang
Advances in Cryptology–CRYPTO 2018: 38th Annual International Cryptology …, 2018
652018
Improved differential-linear attacks with applications to ARX ciphers
C Beierle, M Broll, F Canale, N David, A Flórez-Gutiérrez, G Leander, ...
Journal of Cryptology 35 (4), 29, 2022
632022
Minalpher v1
Y Sasaki, Y Todo, K Aoki, Y Naito, T Sugawara, Y Murakami, M Matsui, ...
CAESAR Round 1, 2014
57*2014
The system can't perform the operation now. Try again later.
Articles 1–20