Yu Sasaki
Orcid: 0000-0002-8539-3725Affiliations:
- NTT Social Informatics Laboratories, Tokyo, Japan
According to our database1,
Yu Sasaki
authored at least 195 papers
between 2005 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on rd.ntt
On csauthors.net:
Bibliography
2024
IACR Cryptol. ePrint Arch., 2024
The Exact Multi-user Security of (Tweakable) Key Alternating Ciphers with a Single Permutation.
Proceedings of the Advances in Cryptology - EUROCRYPT 2024, 2024
Proceedings of the Topics in Cryptology - CT-RSA 2024, 2024
KIVR: Committing Authenticated Encryption Using Redundancy and Application to GCM, CCM, and More.
Proceedings of the Applied Cryptography and Network Security, 2024
2023
IACR Trans. Symmetric Cryptol., 2023
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2023
Proceedings of the Information Security - 26th International Conference, 2023
Time Series Clustering of Product Categories Based on Purchase History and Consumer Characteristics.
Proceedings of the IEEE International Conference on Industrial Engineering and Engineering Management, 2023
Visualization of Evaluation Viewpoints in Similar Customers by XAI Based on Review Evaluation Scores.
Proceedings of the IEEE International Conference on Industrial Engineering and Engineering Management, 2023
2022
IACR Cryptol. ePrint Arch., 2022
Proceedings of the Advances in Information and Computer Security, 2022
The Multi-User Security of Triple Encryption, Revisited: Exact Security, Strengthening, and Application to TDES.
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022
2021
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2021
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2021
IACR Cryptol. ePrint Arch., 2021
Designing S-Boxes Providing Stronger Security Against Differential Cryptanalysis for Ciphers Using Byte-Wise XOR.
Proceedings of the Selected Areas in Cryptography - 28th International Conference, 2021
Proceedings of the Computing and Combinatorics - 27th International Conference, 2021
Proceedings of the Advances in Cryptology - ASIACRYPT 2021, 2021
2020
On the Security Margin of TinyJAMBU with Refined Differential and Linear Cryptanalysis.
IACR Trans. Symmetric Cryptol., 2020
IACR Trans. Symmetric Cryptol., 2020
Improved Attacks on sLiSCP Permutation and Tight Bound of Limited Birthday Distinguishers.
IACR Trans. Symmetric Cryptol., 2020
Pyjamask: Block Cipher and Authenticated Encryption with Highly Efficient Masked Implementation.
IACR Trans. Symmetric Cryptol., 2020
IACR Trans. Symmetric Cryptol., 2020
On the Design of Bit Permutation Based Ciphers - The Interplay Among S-box, Bit Permutation and Key-addition.
IACR Cryptol. ePrint Arch., 2020
IACR Cryptol. ePrint Arch., 2020
Finding Hash Collisions with Quantum Computers by Using Differential Trails with Smaller Probability than Birthday Bound.
IACR Cryptol. ePrint Arch., 2020
Out of Oddity - New Cryptanalytic Techniques against Symmetric Primitives Optimized for Integrity Proof Systems.
IACR Cryptol. ePrint Arch., 2020
Proceedings of the 2020 International Conference on Information Networking, 2020
Proceedings of the Applied Cryptography and Network Security, 2020
2019
IACR Trans. Symmetric Cryptol., 2019
J. Cryptol., 2019
J. Cryptol., 2019
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2019
Correlation of Quadratic Boolean Functions: Cryptanalysis of All Versions of Full MORUS.
IACR Cryptol. ePrint Arch., 2019
Related-Key Boomerang Attacks on GIFT with Automated Trail Search Including BCT Effect.
IACR Cryptol. ePrint Arch., 2019
IACR Cryptol. ePrint Arch., 2019
IACR Cryptol. ePrint Arch., 2019
IACR Cryptol. ePrint Arch., 2019
Correlation of Quadratic Boolean Functions: Cryptanalysis of All Versions of Full \mathsf MORUS.
Proceedings of the Advances in Cryptology - CRYPTO 2019, 2019
Proceedings of the Advances in Cryptology - ASIACRYPT 2019, 2019
2018
Tight Bounds of Differentially and Linearly Active S-Boxes and Division Property of Lilliput.
IEEE Trans. Computers, 2018
On the Design Rationale of SIMON Block Cipher: Integral Attacks and Impossible Differential Attacks against SIMON Variants.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2018
IACR Cryptol. ePrint Arch., 2018
IACR Cryptol. ePrint Arch., 2018
IACR Cryptol. ePrint Arch., 2018
Quantum Demiric-Selçuk Meet-in-the-Middle Attacks: Applications to 6-Round Generic Feistel Constructions.
Proceedings of the Security and Cryptography for Networks - 11th International Conference, 2018
Proceedings of the Selected Areas in Cryptography - SAC 2018, 2018
Integer Linear Programming for Three-Subset Meet-in-the-Middle Attacks: Application to GIFT.
Proceedings of the Advances in Information and Computer Security, 2018
Proceedings of the Progress in Cryptology - AFRICACRYPT 2018, 2018
Proceedings of the Applied Cryptography and Network Security, 2018
2017
IACR Trans. Symmetric Cryptol., 2017
Refined Probability of Differential Characteristics Including Dependency Between Multiple Rounds.
IACR Trans. Symmetric Cryptol., 2017
MILP Modeling for (Large) S-boxes to Optimize Probability of Differential Characteristics.
IACR Trans. Symmetric Cryptol., 2017
IACR Cryptol. ePrint Arch., 2017
Cryptanalysis against Symmetric-Key Schemes with Online Classical Queries and Offline Quantum Computations.
IACR Cryptol. ePrint Arch., 2017
IACR Cryptol. ePrint Arch., 2017
IACR Cryptol. ePrint Arch., 2017
New Algorithm for Modeling S-box in MILP Based Differential and Division Trail Search.
Proceedings of the Innovative Security Solutions for Information Technology and Communications, 2017
Analyzing Key Schedule of Simon: Iterative Key Differences and Application to Related-Key Impossible Differentials.
Proceedings of the Advances in Information and Computer Security, 2017
Proceedings of the Information Security - 20th International Conference, 2017
New Impossible Differential Search Tool from Design and Cryptanalysis Aspects - Revealing Structural Properties of Several Ciphers.
Proceedings of the Advances in Cryptology - EUROCRYPT 2017 - 36th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Paris, France, April 30, 2017
Proceedings of the Cryptographic Hardware and Embedded Systems - CHES 2017, 2017
2016
Meet-in-the-Middle Attacks on Classes of Contracting and Expanding Feistel Constructions.
IACR Trans. Symmetric Cryptol., 2016
Invariant Subspace Attack Against Midori64 and The Resistance Criteria for S-box Designs.
IACR Trans. Symmetric Cryptol., 2016
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2016
Generic Internal State Recovery on Strengthened HMAC: <i>n</i>-bit Secure HMAC Requires Key in All Blocks.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2016
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2016
IACR Cryptol. ePrint Arch., 2016
IACR Cryptol. ePrint Arch., 2016
IACR Cryptol. ePrint Arch., 2016
On the Design Rationale of SIMON Block Cipher: Integral Attacks and Impossible Differential Attacks against SIMON Variants.
IACR Cryptol. ePrint Arch., 2016
IACR Cryptol. ePrint Arch., 2016
Invariant Subspace Attack Against Midori64 and The Resistance Criteria for S-box Designs.
IACR Cryptol. ePrint Arch., 2016
Des. Codes Cryptogr., 2016
New Differential Bounds and Division Property of Lilliput: Block Cipher with Extended Generalized Feistel Network.
Proceedings of the Selected Areas in Cryptography - SAC 2016, 2016
Proceedings of the Information Security and Privacy - 21st Australasian Conference, 2016
2015
Improved Single-Key Distinguisher on HMAC-MD5 and Key Recovery Attacks on Sandwich-MAC-MD5 and MD5-MAC.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2015
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2015
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2015
Equivalent Key Recovery Attacks against HMAC and NMAC with Whirlpool Reduced to 7 Rounds.
IACR Cryptol. ePrint Arch., 2015
A New Mode of Operation for Incremental Authenticated Encryption with Associated Data.
Proceedings of the Selected Areas in Cryptography - SAC 2015, 2015
Proceedings of the Selected Areas in Cryptography - SAC 2015, 2015
Proceedings of the Topics in Cryptology, 2015
Wiley, ISBN: 978-1-118-66001-0, 2015
2014
Distinguishers on Double-Branch Compression Function and Applications to Round-Reduced RIPEMD-128 and RIPEMD-160.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2014
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2014
Cryptanalyses on a Merkle-Damgård Based MAC - Almost Universal Forgery and Distinguishing-<i>H</i> Attacks.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2014
IACR Cryptol. ePrint Arch., 2014
Proceedings of the Security and Cryptography for Networks - 9th International Conference, 2014
Proceedings of the Selected Areas in Cryptography - SAC 2014, 2014
An Automated Evaluation Tool for Improved Rebound Attack: New Distinguishers and Proposals of ShiftBytes Parameters for Grøstl.
Proceedings of the Topics in Cryptology - CT-RSA 2014, 2014
Proceedings of the Advances in Cryptology - CRYPTO 2014, 2014
Proceedings of the Advances in Cryptology - ASIACRYPT 2014, 2014
Memoryless Unbalanced Meet-in-the-Middle Attacks: Impossible Results and Applications.
Proceedings of the Applied Cryptography and Network Security, 2014
2013
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2013
Boomerang Distinguishers on MD4-Based Hash Functions: First Practical Results on Full 5-Pass HAVAL Compression Function.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2013
Meet-in-the-Middle Preimage Attacks on AES Hashing Modes and an Application to Whirlpool.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2013
Limited-birthday Distinguishers for Hash Functions - Collisions Beyond the Birthday Bound can be Meaningful.
IACR Cryptol. ePrint Arch., 2013
Proceedings of the SECRYPT 2013, 2013
Improved Single-Key Distinguisher on HMAC-MD5 and Key Recovery Attacks on Sandwich-MAC-MD5.
Proceedings of the Selected Areas in Cryptography - SAC 2013, 2013
Proceedings of the Advances in Information and Computer Security, 2013
Proceedings of the Advances in Information and Computer Security, 2013
Proceedings of the Information Security and Cryptology - ICISC 2013, 2013
Coupon Collector's Problem for Fault Analysis against AES - High Tolerance for Noisy Fault Injections.
Proceedings of the Financial Cryptography and Data Security, 2013
Proceedings of the Information Security and Privacy - 18th Australasian Conference, 2013
2012
Meet-in-the-Middle (Second) Preimage Attacks on Two Double-Branch Hash Functions RIPEMD and RIPEMD-128.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2012
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2012
Known-Key Attacks on Rijndael with Large Blocks and Strengthening ShiftRow Parameter.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2012
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2012
IACR Cryptol. ePrint Arch., 2012
Proceedings of the Selected Areas in Cryptography, 19th International Conference, 2012
Proceedings of the Advances in Information and Computer Security, 2012
Proceedings of the Advances in Information and Computer Security, 2012
Proceedings of the Information Security Practice and Experience, 2012
Double-SP Is Weaker Than Single-SP: Rebound Attacks on Feistel Ciphers with Several Rounds.
Proceedings of the Progress in Cryptology, 2012
Proceedings of the Information Security and Cryptology - ICISC 2012, 2012
Proceedings of the Information Security and Cryptology - ICISC 2012, 2012
Multi-differential Cryptanalysis on Reduced DM-PRESENT-80: Collisions and Other Differential Properties.
Proceedings of the Information Security and Cryptology - ICISC 2012, 2012
Cryptanalyses on a Merkle-Damgård Based MAC - Almost Universal Forgery and Distinguishing-H Attacks.
Proceedings of the Advances in Cryptology - EUROCRYPT 2012, 2012
Investigating Fundamental Security Requirements on Whirlpool: Improved Preimage and Collision Attacks.
Proceedings of the Advances in Cryptology - ASIACRYPT 2012, 2012
Proceedings of the Progress in Cryptology - AFRICACRYPT 2012, 2012
Proceedings of the Applied Cryptography and Network Security, 2012
Proceedings of the Information Security and Privacy - 17th Australasian Conference, 2012
2011
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2011
Cryptanalyses of Double-Mix Merkle-Damgård Mode in the Original Version of AURORA-512.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2011
Proceedings of the Information Security Applications - 12th International Workshop, 2011
Byte Slicing Grøstl - Optimized Intel AES-NI and 8-bit Implementations of the SHA-3 Finalist Grøstl.
Proceedings of the SECRYPT 2011 - Proceedings of the International Conference on Security and Cryptography, Seville, Spain, 18, 2011
Boomerang Distinguishers on MD4-Family: First Practical Results on Full 5-Pass HAVAL.
Proceedings of the Selected Areas in Cryptography - 18th International Workshop, 2011
Experimental Verification of Super-Sbox Analysis - Confirmation of Detailed Attack Complexity.
Proceedings of the Advances in Information and Computer Security, 2011
Proceedings of the Information Security and Cryptology - ICISC 2011 - 14th International Conference, Seoul, Korea, November 30, 2011
Byte Slicing Grøstl: Improved Intel AES-NI and Vector-Permute Implementations of the SHA-3 Finalist Grøstl.
Proceedings of the E-Business and Telecommunications - International Joint Conference, 2011
Known-Key Distinguishers on 11-Round Feistel and Collision Attacks on Its Hashing Modes.
Proceedings of the Fast Software Encryption - 18th International Workshop, 2011
(Second) Preimage Attacks on Step-Reduced RIPEMD/RIPEMD-128 with a New Local-Collision Approach.
Proceedings of the Topics in Cryptology - CT-RSA 2011, 2011
Proceedings of the Progress in Cryptology - AFRICACRYPT 2011, 2011
Proceedings of the Information Security and Privacy - 16th Australasian Conference, 2011
2010
IEICE Trans. Inf. Syst., 2010
Practical Password Recovery Attacks on MD4 Based Prefix and Hybrid Authentication Protocols.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2010
Known-Key Attacks on Rijndael with Large Blocks and Strengthening <i>ShiftRow</i> Parameter.
Proceedings of the Advances in Information and Computer Security, 2010
Proceedings of the Fast Software Encryption, 17th International Workshop, 2010
Proceedings of the Advances in Cryptology - ASIACRYPT 2010, 2010
2009
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2009
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2009
IACR Cryptol. ePrint Arch., 2009
IACR Cryptol. ePrint Arch., 2009
Proceedings of the Selected Areas in Cryptography, 16th Annual International Workshop, 2009
Proceedings of the Advances in Information and Computer Security, 2009
Proceedings of the Information Security, 12th International Conference, 2009
Proceedings of the Information, Security and Cryptology, 2009
Proceedings of the Advances in Cryptology, 2009
Proceedings of the Advances in Cryptology, 2009
Meet-in-the-Middle Preimage Attacks on Double-Branch Hash Functions: Application to RIPEMD and Others.
Proceedings of the Information Security and Privacy, 14th Australasian Conference, 2009
2008
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2008
Proceedings of the Selected Areas in Cryptography, 15th International Workshop, SAC 2008, 2008
Proceedings of the Information Security and Cryptology, 2008
Proceedings of the Topics in Cryptology, 2008
A strict evaluation method on the number of conditions for the SHA-1 collision search.
Proceedings of the 2008 ACM Symposium on Information, Computer and Communications Security, 2008
Proceedings of the Advances in Cryptology, 2008
Password Recovery on Challenge and Response: Impossible Differential Attack on Hash Function.
Proceedings of the Progress in Cryptology, 2008
Proceedings of the Information Security and Privacy, 13th Australasian Conference, 2008
2007
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2007
IACR Cryptol. ePrint Arch., 2007
Proceedings of the Fast Software Encryption, 14th International Workshop, 2007
Proceedings of the Information Security and Privacy, 12th Australasian Conference, 2007
2006
IACR Cryptol. ePrint Arch., 2006
Proceedings of the Progressin Cryptology, 2006
2005
Proceedings of the Information Security and Cryptology, 2005