Conference Papers


  1. “Keyed Sum of Permutations: a simpler RP-based PRF”,
    Ferdinand Sibleyras and Yosuke Todo.
    CT-RSA 2023


  1. “A Modular Approach to the Incompressibility of Block-Cipher-Based AEADs”,
    Akinori Hosoyamada, Takanori Isobe, Yosuke Todo, Kan Yasuda,
    Asiacrypt 2022
  2. “Birthday-Bound Slide Attacks on TinyJAMBU’s Keyed-Permutations for All Key Sizes”,
    Ferdinand Sibleyras, Yu Sasaki, Yosuke Todo, Akinori Hosoyamada, and Kan Yasuda,
    IWSEC 2022
  3. “Birthday-Bound Slide Attacks on TinyJAMBU’s Keyed-Permutations for All Key Sizes”,
    Ferdinand Sibleyras, Yu Sasaki, Yosuke Todo, Akinori Hosoyamada, and Kan Yasuda
    NIST Lightweight Cryptography Workshop 2022
  4. “New Attacks from Old Distinguishers, Improved Attacks on Serpent”,
    Marek Broll, Federico Canale, Nicolas David, Antonio Florez-Gutierrez, Gregor Leander, Maria Naya-Plasencia and Yosuke Todo,
    CT-RSA 2022


  1. “Massive Superpoly Recovery with Nested Monomial Predictions”,
    Kai Hu, Siwei Sun, Yosuke Todo, Meiqin Wang, Qingju Wang,
    Asiacrypt 2021
  2. “Strong and Tight Security Guarantees against Integral Distinguishers”,
    Phil Hebborn, Baptiste Lambin, Gregor Leander, Yosuke Todo,
    Asiacrypt 2021
  3. Designing S-boxes Providing Stronger Security against Differential Cryptanalysis for Ciphers Using Byte-Wise XOR“,
    Yosuke Todo, Yu Sasaki,
    SAC 2021.


  1. “Lower Bounds on the Degree of Block Ciphers”,
    Phil Hebborn, Baptiste Lambin, Gregor Leander, and Yosuke Todo,
    Asiacrypt 2020, LNCS, vol. 12491, pp.537-566.
  2. “Prince v2 –More Security for (Almost) No Overhead”,
    Dušan Božilov, Maria Eichlseder, Miroslav Knežević, Baptiste Lambin, Gregor Leander, Thorben Moos, Ventzislav Nikov, Shahram Rasoolzadeh, Yosuke Todo, and Friedrich Wiemer,
    SAC 2020, LNCS, vol. 12804, pp.483-511.
  3. “Improved Differential-Linear Attacks with Applications to ARX Ciphers”,
    Christof Beierle, Gregor Leander, and Yosuke Todo,
    CRYPTO 2020, LNCS, vol. 12172, pp.329-358.
    This paper won the Best Paper Award.
  4. “Out of Oddity – New Cryptanalytic Techniques against Symmetric Primitives Optimized for Integrity Proof Systems”,
    Tim Beyne, Anne Canteaut, Itai Dinur, Maria Eichlseder, Gregor Leander, Gaëtan Leurent, María Naya-Plasencia, Léo Perrin, Yu Sasaki, Yosuke Todo, and Friedrich Wiemer,
    CRYPTO 2020, LNCS, vol. 12172, pp.299-328, 2021.
  5. “Modeling for Three-Subset Division Property without Unknown Subset –Improved Cube Attacks against Trivium and Grain-128AEAD”,
    Yonglin Hao, Gregor Leander, Willi Meier, Yosuke Todo, and Qingju Wang,
    Eurocrypt 2020, LNCS, vol. 12105, pp.466-495, 2020.


  1. “On the Data Limitation of Small-State Stream Ciphers: Correlation Attacks on Fruit-80 and Plantlet”,
    Yosuke Todo, Willi Meier, and Kazumaro Aoki,
    SAC 2019, LNCS, vol.11959, pp.364-392, 2019.


  1. “Programming the Demirci-Selçuk Meet-in-the-Middle Attack with Constraints”,
    Danping Shi, Siwei Sun, Patrick Derbez, Yosuke Todo, Bing Sun and Lei Hu,
    Asiacrypt 2018, LNCS, vol.11273, pp.3-34, 2018.
  2. “Several MILP-Aided Attacks against SNOW 2.0,”
    Yuki Funabiki, Yosuke Todo, Takanori Isobe and Masakatu Morii,
    CANS 2018, LNCS, vol.11124, pp.394-413, 2018.
  3. “Fast Correlation Attack Revisited –Cryptanalysis on Full Grain-128a, Grain-128, and Grain-v1,”
    Yosuke Todo, Takanori Isobe, Willi Meier, Kazumaro Aoki, and Bin Zhang,
    CRYPTO 2018, LNCS, vol.10992, pp.129-159, 2018.
  4. “Improved Division Property Based Cube Attacks Exploiting Algebraic Properties of Superpoly,”
    Qingju Wang, Yonglin Hao, Yosuke Todo, Chaoyun Li, Takanori Isobe, and Willi Meier,
    CRYPTO 2018, LNCS, vol.10991, pp.205-305, 2018.


  1. “Gimli: A Cross-Platform Permutation,”
    Daniel J. Bernstein, Stefan Koelbl, Stefan Lucks, Pedro Maat Costa Massolino, Florian Mendel, Kashif Nawaz, Tobias Schneider, Peter Schwabe, François-Xavier Standaert, Yosuke Todo, and Benoît Viguier,
    CHES 2017, LNCS, vol.10529, pp.299-320, 2017.
  2. “GIFT: A Small Present,”
    Subhadeep Banik, Sumit Kumar Pandey, Thomas Peyrin, Siang Meng Sim, Yosuke Todo, and Yu Sasaki,
    CHES 2017, LNCS, vol.10529, pp.321-345, 2017.
  3. “Analyzing Key Schedule of SIMON: Iterative Key Differences and Application to Related-Key Impossible Differentials,”
    Kota Kondo, Yu Sasaki, Yosuke Todo, and Tetsu Iwata,
    IWSEC 2017, LNCS, vol.10418, pp.141-158, 2017
  4. “Cube Attacks on Non-Blackbox Polynomials based on Division Property,”
    Yosuke Todo, Takanori Isobe, Yongling Hao, and Willi Meier,
    CRYPTO 2017, LNCS, vol.10403, pp.250-279, 2017.
  5. “Low-Data Complexity Attacks on Camellia,”
    Takeru Koie, Takanori Isobe, Yosuke Todo, and Masakatu Morii,
    ATIS 2017, CCIS, vol.719, pp.128-140, 2017.
  6. “Improved Integral Attack on HIGHT,”
    Yuki Funabiki, Yosuke Todo, Takanori Isobe, and Masakatu Morii,
    ACISP 2017, LNCS, vol.10342, pp.363-383, 2017.
  7. “New Algorithm for Modeling S-box in MILP Based Differential and Division Trail Search,”
    Yu Sasaki and Yosuke Todo,
    SecITC 2017, LNCS, vol.10543, pp.150-165, 2017.
  8. “New Impossible Differential Search Tool from Design and Cryptanalysis Aspects — Revealing Structural Properties of Several Ciphers,”
    Yu Sasaki and Yosuke Todo,
    EUROCRYPT 2017 Part III, LNCS, vol.10212, pp.185-215, 2017.


  1. “Nonlinear Invariant Attack –Practical Attack on Full SCREAM, iSCREAM, and Midori64,”
    Yosuke Todo, Gregor Leander, and Yu Sasaki,
    ASIACRYPT 2016 Part II, LNCS, vol.10032, pp.3-33, 2016.
    This paper won Asiacrypt 2016 Award Papers.
  2. “Compact Representation for Division Property,”
    Yosuke Todo and Masakatu Morii,
    CANS 2016, LNCS, vol.10052, pp.19-35, 2016.
  3. “New Conditional Differential Cryptanalysis for NLFSR-Based Stream Ciphers and Application to Grain v1,”
    Yuhei Watanabe, Yosuke Todo, and Masakatu Morii,
    AsiaJCIS 2016, 2016.
  4. “New Differential Bounds and Division Property of LILLIPUT: Block Cipher with Extended Generalized Feistel Network,”
    Yu Sasaki and Yosuke Todo,
    SAC 2016, LNCS, vol.10532, pp.264-283, 2016.
  5. “Wide Trail Design Strategy for Binary MixColumns,”
    Yosuke Todo and Kazumaro Aoki,
    ACNS 2016, LNCS, vol.9696, pp.467-484, 2016.
  6. “Bit-Based Division Property and Application to Simon Family,”
    Yosuke Todo and Masakatu Morii,
    FSE 2016, LNCS, vol.9783, pp.357-377, 2016. (full version)


  1. “Integral Cryptanalysis on Full MISTY1,”
    Yosuke Todo,
    CRYPTO 2015 Part I, LNCS, vol.9215, pp.413-432, 2015.
    This paper won the Best Paper Award and Best Young Researcher Award.
  2. “Structural Evaluation by Generalized Integral Property,”
    Yosuke Todo,
    EUROCRYPT 2015 Part I, LNCS, vol.9056, pp.287-314, 2015. (ePrint version)


  1. “How Much Can Complexity of Linear Cryptanalysis Be Reduced?,”
    Sho Sakikoyama, Yosuke Todo, Kazumaro Aoki, and Masakatu Morii,
    ICISC 2014, LNCS, vol.8949, pp.117-131, 2014.
  2. “Cryptanalysis of Reduced-Round SIMON32 and SIMON48,”
    Qingju Wang, Zhiqiang Liu, Kerem Varici, Yu Sasaki, Vincent Rijmen, and Yosuke Todo,
    INDOCRYPT 2014, LNCS, vol.8885, pp.143-160, 2014. (full version)
  3. “FFT Key Recovery for Integral Attack,”
    Yosuke Todo and Kazumaro Aoki,
    CANS 2014, LNCS, vol.8813, pp.64-81, 2014. (preliminary version in ePrint)
  4. “Practical Cryptanalysis of a Public-Key Encryption Scheme Based on New Multivariate Quadratic Assumptions,”
    Martin R. Albrecht, Jean-Charles Faugère, Robert Fitzpatrick, Ludovic Perret, Yosuke Todo, and Keita Xagawa,
    PKC 2014, LNCS, vol.8383, pp.446-464, 2014. (preliminary version in ePrint)


  1. “New Property of Diffusion Switching Mechanism on CLEFIA and Its Application to DFA,”
    Yosuke Todo and Yu Sasaki,
    IWSEC 2013, LNCS, vol.8231, pp.99-114, 2013.
  2. “Upper Bounds for the Security of Several Feistel Networks,”
    Yosuke Todo,
    ACISP 2013, LNCS, vol.7959, pp.302-317, 2013.


  1. “Proposal of a Secure WEP Operation against Existing Key Recovery Attacks and its Evaluation,”
    Tsubasa Tsukaune, Yosuke Todo, and Masakatu Morii,
    AsiaJCIS 2012, 2012.


  1. “Effective Falsification Attack on WPA-TKIP by Modifying Any Packet to QoS Packet,”
    Yosuke Todo, Toshihiro Ohigashi, and Masakatu Morii,
    JWIS 2010, pp.118-132, 2010.