Takanori Isobe
Affiliations:- University of Hyogo, Japan
According to our database1,
Takanori Isobe
authored at least 148 papers
between 2009 and 2025.
Collaborative distances:
Collaborative distances:
Timeline
2010
2012
2014
2016
2018
2020
2022
2024
0
5
10
15
20
25
1
12
19
16
19
11
11
8
7
1
4
2
2
1
1
4
2
1
4
1
2
2
2
3
3
3
4
1
1
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
On csauthors.net:
Bibliography
2025
2024
Differential fault attack on AES-based encryption schemes: application to B5G/6G ciphers - Rocca, Rocca-S and AEGIS.
J. Cryptogr. Eng., November, 2024
IEEE Trans. Inf. Theory, July, 2024
Inf. Process. Lett., February, 2024
IACR Trans. Symmetric Cryptol., 2024
Gleeok: A Family of Low-Latency PRFs and its Applications to Authenticated Encryption.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2024
J. Inf. Process., 2024
SAT-Based Analysis of Related-Key Impossible Distinguishers on Piccolo and (Tweakable) TWINE.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2024
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2024
IACR Cryptol. ePrint Arch., 2024
Proceedings of the Advances in Information and Computer Security, 2024
Proceedings of the Progress in Cryptology - INDOCRYPT 2024, 2024
Proceedings of the Cryptology and Network Security - 23rd International Conference, 2024
Proceedings of the Information Security and Privacy - 29th Australasian Conference, 2024
2023
IET Inf. Secur., July, 2023
IET Inf. Secur., May, 2023
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., March, 2023
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., March, 2023
Areion: Highly-Efficient Permutations and Its Applications to Hash Functions for Short Input.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2023
A Deeper Look into Deep Learning-based Output Prediction Attacks Using Weak SPN Block Ciphers.
J. Inf. Process., 2023
Cryptanalysis on End-to-End Encryption Schemes of Communication Tools and Its Research Trend.
J. Inf. Process., 2023
Even-Mansour Space-hard Cipher: White-box Cryptography Cipher Meets Physically Unclonable Function.
J. Inf. Process., 2023
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2023
An Efficient Strategy to Construct a Better Differential on Multiple-Branch-Based Designs: Application to Orthros.
IACR Cryptol. ePrint Arch., 2023
Parallel SAT Framework to Find Clustering of Differential Characteristics and Its Applications.
IACR Cryptol. ePrint Arch., 2023
IACR Cryptol. ePrint Arch., 2023
IACR Cryptol. ePrint Arch., 2023
An Ultra-High Throughput AES-Based Authenticated Encryption Scheme for 6G: Design and Implementation.
Proceedings of the Computer Security - ESORICS 2023, 2023
Proceedings of the Information Security and Privacy - 28th Australasian Conference, 2023
2022
IACR Trans. Symmetric Cryptol., 2022
IACR Trans. Symmetric Cryptol., 2022
IACR Trans. Symmetric Cryptol., 2022
J. Inf. Process., 2022
J. Inf. Secur. Appl., 2022
IET Inf. Secur., 2022
IET Inf. Secur., 2022
A Proof of Work Based on Key Recovery Problem of Cascade Block Ciphers with ASIC Resistance.
IEICE Trans. Inf. Syst., 2022
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2022
Design of a Linear Layer for a Block Cipher Based on Type-2 Generalized Feistel Network with 32 Branches.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2022
IACR Cryptol. ePrint Arch., 2022
IACR Cryptol. ePrint Arch., 2022
IACR Cryptol. ePrint Arch., 2022
Proceedings of the Applied Cryptography and Network Security Workshops, 2022
2021
IACR Trans. Symmetric Cryptol., 2021
IACR Trans. Symmetric Cryptol., 2021
IACR Trans. Symmetric Cryptol., 2021
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2021
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2021
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2021
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2021
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2021
IACR Cryptol. ePrint Arch., 2021
IACR Cryptol. ePrint Arch., 2021
IACR Cryptol. ePrint Arch., 2021
Three Input Exclusive-OR Gate Support For Boyar-Peralta's Algorithm (Extended Version).
IACR Cryptol. ePrint Arch., 2021
IACR Cryptol. ePrint Arch., 2021
Proceedings of the Progress in Cryptology - INDOCRYPT 2021, 2021
Proceedings of the Information Security and Cryptology - ICISC 2021, 2021
Proceedings of the Advances in Cryptology - ASIACRYPT 2021, 2021
Proceedings of the Information Security and Privacy - 26th Australasian Conference, 2021
2020
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2020
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2020
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2020
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2020
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2020
IACR Cryptol. ePrint Arch., 2020
Automatic Verification of Differential Characteristics: Application to Reduced Gimli.
IACR Cryptol. ePrint Arch., 2020
Exploiting Weak Diffusion of Gimli: A Full-Round Distinguisher and Reduced-Round Preimage Attacks.
IACR Cryptol. ePrint Arch., 2020
IACR Cryptol. ePrint Arch., 2020
IACR Cryptol. ePrint Arch., 2020
Proceedings of the Information Security and Privacy - 25th Australasian Conference, 2020
2019
IACR Trans. Symmetric Cryptol., 2019
Improved Division Property Based Cube Attacks Exploiting Algebraic Properties of Superpoly.
IEEE Trans. Computers, 2019
Meet-in-the-Middle Key Recovery Attacks on a Single-Key Two-Round Even-Mansour Cipher.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2019
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2019
Preimages and Collisions for Up to 5-Round Gimli-Hash Using Divide-and-Conquer Methods.
IACR Cryptol. ePrint Arch., 2019
IACR Cryptol. ePrint Arch., 2019
Neural-Network-Based Pseudo-Random Number Generator Evaluation Tool for Stream Ciphers.
Proceedings of the Seventh International Symposium on Computing and Networking Workshops, 2019
Proceedings of the Advances in Cryptology - CRYPTO 2019, 2019
2018
ShiftRows Alternatives for AES-like Ciphers and Optimal Cell Permutations for Midori and Skinny.
IACR Trans. Symmetric Cryptol., 2018
IEEE Trans. Computers, 2018
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2018
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2018
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2018
Fast Correlation Attack Revisited -Cryptanalysis on Full Grain-128a, Grain-128, and Grain-v1.
IACR Cryptol. ePrint Arch., 2018
IACR Cryptol. ePrint Arch., 2018
Proceedings of the 2018 IEEE International Symposium on Hardware Oriented Security and Trust, 2018
Proceedings of the Cryptology and Network Security - 17th International Conference, 2018
2017
IACR Trans. Symmetric Cryptol., 2017
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2017
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2017
Improved Division Property Based Cube Attacks Exploiting Algebraic Properties of Superpoly.
IACR Cryptol. ePrint Arch., 2017
IACR Cryptol. ePrint Arch., 2017
Proceedings of the Applications and Techniques in Information Security, 2017
Proceedings of the Information Security and Privacy - 22nd Australasian Conference, 2017
2016
Proceedings of the Progress in Cryptology - INDOCRYPT 2016, 2016
Proceedings of the 2016 IEEE International Symposium on Hardware Oriented Security and Trust, 2016
Proceedings of the Advances in Cryptology - ASIACRYPT 2016, 2016
2015
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2015
IACR Cryptol. ePrint Arch., 2015
IACR Cryptol. ePrint Arch., 2015
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015
Proceedings of the Advances in Cryptology - ASIACRYPT 2015 - 21st International Conference on the Theory and Application of Cryptology and Information Security, Auckland, New Zealand, November 29, 2015
Proceedings of the Advances in Cryptology - ASIACRYPT 2015 - 21st International Conference on the Theory and Application of Cryptology and Information Security, Auckland, New Zealand, November 29, 2015
2014
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2014
2013
J. Inf. Process., 2013
Proceedings of the Selected Areas in Cryptography - SAC 2013, 2013
Proceedings of the Fast Software Encryption - 20th International Workshop, 2013
Proceedings of the Information Security and Privacy - 18th Australasian Conference, 2013
2012
Proceedings of the Selected Areas in Cryptography, 19th International Conference, 2012
Proceedings of the Advances in Information and Computer Security, 2012
Converting Meet-In-The-Middle Preimage Attack into Pseudo Collision Attack: Application to SHA-2.
Proceedings of the Fast Software Encryption - 19th International Workshop, 2012
Proceedings of the Information Security and Privacy - 17th Australasian Conference, 2012
2011
Proceedings of the Cryptographic Hardware and Embedded Systems - CHES 2011 - 13th International Workshop, Nara, Japan, September 28, 2011
2010
Low-weight Pseudo Collision Attack on Shabal and Preimage Attack on Reduced Shabal-512.
IACR Cryptol. ePrint Arch., 2010
2009
Proceedings of the Fast Software Encryption, 16th International Workshop, 2009