Yasutaka Igarashi

According to our database1, Yasutaka Igarashi authored at least 19 papers between 2006 and 2024.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Higher-order Differential Attack on Reduced-round SLIM.
J. Inf. Process., 2024

2023
A New Higher Order Differential of LCB.
Proceedings of the Information Security Applications - 24th International Conference, 2023

2022
Integral Cryptanalysis on Reduced-Round KASUMI.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., September, 2022

A New Higher Order Differential of RAGHAV.
IACR Cryptol. ePrint Arch., 2022

2021
A New Higher Order Differential of Enocoro-128v2.
Proceedings of the Ninth International Symposium on Computing and Networking, 2021

2020
Higher Order Differential Attack against Full-Round BIG.
IACR Cryptol. ePrint Arch., 2020

2019
A New Higher Order Differential of BIG.
Proceedings of the Seventh International Symposium on Computing and Networking Workshops, 2019

2018
Integral Cryptanalysis of Reduced-round KASUMI.
Proceedings of the International Symposium on Information Theory and Its Applications, 2018

A New Higher Order Differential of FeW.
Proceedings of the Sixth International Symposium on Computing and Networking, 2018

2017
The 12th-Order Differential Attack on the 10-Round Variants of Midori64 Block Cipher.
Proceedings of the 31st IEEE International Conference on Advanced Information Networking and Applications, 2017

2016
New Integral Characteristics of KASUMI Derived by Division Property.
Proceedings of the Information Security Applications - 17th International Workshop, 2016

Integral characteristics of MISTY2 derived by division property.
Proceedings of the 2016 International Symposium on Information Theory and Its Applications, 2016

A Practical-time Attack on Reduced-round MISTY1.
Proceedings of the 2nd International Conference on Information Systems Security and Privacy, 2016

2012
Some Saturation Characteristics of XOR Sum of Balance Functions.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2012

2010
On the Strength Evaluation of Lesamnta against Differential Cryptanalysis.
Proceedings of the Advances in Swarm Intelligence, First International Conference, 2010

Update on Enocoro stream cipher.
Proceedings of the International Symposium on Information Theory and its Applications, 2010

On the truncated path search for the maximum differential characteristic probability on a generalized Feistel-type block cipher.
Proceedings of the International Symposium on Information Theory and its Applications, 2010

2006
Performance Analysis of Coherent Ultrashort Light Pulse CDMA Communication Systems with Nonlinear Optical Thresholder.
IEICE Trans. Commun., 2006

Improvement of Coherent Ultrashort Light Pulse CDMA Communication Systems with Distinct 4-Level <i>m</i>-Sequences.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2006


  Loading...