Conference Papers

2018

  1. “Programming the Demirci-Selçuk Meet-in-the-Middle Attack with Constraints”,
    Danping Shi, Siwei Sun, Patrick Derbez, Yosuke Todo, Bing Sun and Lei Hu,
    Asiacrypt 2018.
  2. “Several MILP-Aided Attacks against SNOW 2.0,”
    Yuki Funabiki, Yosuke Todo, Takanori Isobe and Masakatu Morii,
    CANS 2018, LNCS, vol.11124, pp.394-413, 2018.
  3. “Fast Correlation Attack Revisited –Cryptanalysis on Full Grain-128a, Grain-128, and Grain-v1,”
    Yosuke Todo, Takanori Isobe, Willi Meier, Kazumaro Aoki, and Bin Zhang,
    CRYPTO 2018, LNCS, vol.10992, pp.129-159, 2018.
  4. “Improved Division Property Based Cube Attacks Exploiting Algebraic Properties of Superpoly,”
    Qingju Wang, Yonglin Hao, Yosuke Todo, Chaoyun Li, Takanori Isobe, and Willi Meier,
    CRYPTO 2018, LNCS, vol.10991, pp.205-305, 2018.

2017

  1. “Gimli: A Cross-Platform Permutation,”
    Daniel J. Bernstein, Stefan Koelbl, Stefan Lucks, Pedro Maat Costa Massolino, Florian Mendel, Kashif Nawaz, Tobias Schneider, Peter Schwabe, François-Xavier Standaert, Yosuke Todo, and Benoît Viguier,
    CHES 2017, LNCS, vol.10529, pp.299-320, 2017.
  2. “GIFT: A Small Present,”
    Subhadeep Banik, Sumit Kumar Pandey, Thomas Peyrin, Siang Meng Sim, Yosuke Todo, and Yu Sasaki,
    CHES 2017, LNCS, vol.10529, pp.321-345, 2017.
  3. “Analyzing Key Schedule of SIMON: Iterative Key Differences and Application to Related-Key Impossible Differentials,”
    Kota Kondo, Yu Sasaki, Yosuke Todo, and Tetsu Iwata,
    IWSEC 2017, LNCS, vol.10418, pp.141-158, 2017
  4. “Cube Attacks on Non-Blackbox Polynomials based on Division Property,”
    Yosuke Todo, Takanori Isobe, Yongling Hao, and Willi Meier,
    CRYPTO 2017, LNCS, vol.10403, pp.250-279, 2017.
  5. “Low-Data Complexity Attacks on Camellia,”
    Takeru Koie, Takanori Isobe, Yosuke Todo, and Masakatu Morii,
    ATIS 2017, CCIS, vol.719, pp.128-140, 2017.
  6. “Improved Integral Attack on HIGHT,”
    Yuki Funabiki, Yosuke Todo, Takanori Isobe, and Masakatu Morii,
    ACISP 2017, LNCS, vol.10342, pp.363-383, 2017.
  7. “New Algorithm for Modeling S-box in MILP Based Differential and Division Trail Search,”
    Yu Sasaki and Yosuke Todo,
    SecITC 2017, LNCS, vol.10543, pp.150-165, 2017.
  8. “New Impossible Differential Search Tool from Design and Cryptanalysis Aspects — Revealing Structural Properties of Several Ciphers,”
    Yu Sasaki and Yosuke Todo,
    EUROCRYPT 2017 Part III, LNCS, vol.10212, pp.185-215, 2017.

2016

  1. “Nonlinear Invariant Attack –Practical Attack on Full SCREAM, iSCREAM, and Midori64,”
    Yosuke Todo, Gregor Leander, and Yu Sasaki,
    ASIACRYPT 2016 Part II, LNCS, vol.10032, pp.3-33, 2016.
    This paper won Asiacrypt 2016 Award Papers.
  2. “Compact Representation for Division Property,”
    Yosuke Todo and Masakatu Morii,
    CANS 2016, LNCS, vol.10052, pp.19-35, 2016.
  3. “New Conditional Differential Cryptanalysis for NLFSR-Based Stream Ciphers and Application to Grain v1,”
    Yuhei Watanabe, Yosuke Todo, and Masakatu Morii,
    AsiaJCIS 2016, 2016.
  4. “New Differential Bounds and Division Property of LILLIPUT: Block Cipher with Extended Generalized Feistel Network,”
    Yu Sasaki and Yosuke Todo,
    SAC 2016, LNCS, vol.10532, pp.264-283, 2016.
  5. “Wide Trail Design Strategy for Binary MixColumns,”
    Yosuke Todo and Kazumaro Aoki,
    ACNS 2016, LNCS, vol.9696, pp.467-484, 2016.
  6. “Bit-Based Division Property and Application to Simon Family,”
    Yosuke Todo and Masakatu Morii,
    FSE 2016, LNCS, vol.9783, pp.357-377, 2016. (full version)

2015

  1. “Integral Cryptanalysis on Full MISTY1,”
    Yosuke Todo,
    CRYPTO 2015 Part I, LNCS, vol.9215, pp.413-432, 2015.
    This paper won the Best Paper Award and Best Young Researcher Award.
  2. “Structural Evaluation by Generalized Integral Property,”
    Yosuke Todo,
    EUROCRYPT 2015 Part I, LNCS, vol.9056, pp.287-314, 2015. (ePrint version)

2014

  1. “How Much Can Complexity of Linear Cryptanalysis Be Reduced?,”
    Sho Sakikoyama, Yosuke Todo, Kazumaro Aoki, and Masakatu Morii,
    ICISC 2014, LNCS, vol.8949, pp.117-131, 2014.
  2. “Cryptanalysis of Reduced-Round SIMON32 and SIMON48,”
    Qingju Wang, Zhiqiang Liu, Kerem Varici, Yu Sasaki, Vincent Rijmen, and Yosuke Todo,
    INDOCRYPT 2014, LNCS, vol.8885, pp.143-160, 2014. (full version)
  3. “FFT Key Recovery for Integral Attack,”
    Yosuke Todo and Kazumaro Aoki,
    CANS 2014, LNCS, vol.8813, pp.64-81, 2014. (preliminary version in ePrint)
  4. “Practical Cryptanalysis of a Public-Key Encryption Scheme Based on New Multivariate Quadratic Assumptions,”
    Martin R. Albrecht, Jean-Charles Faugère, Robert Fitzpatrick, Ludovic Perret, Yosuke Todo, and Keita Xagawa,
    PKC 2014, LNCS, vol.8383, pp.446-464, 2014. (preliminary version in ePrint)

2013

  1. “New Property of Diffusion Switching Mechanism on CLEFIA and Its Application to DFA,”
    Yosuke Todo and Yu Sasaki,
    IWSEC 2013, LNCS, vol.8231, pp.99-114, 2013.
  2. “Upper Bounds for the Security of Several Feistel Networks,”
    Yosuke Todo,
    ACISP 2013, LNCS, vol.7959, pp.302-317, 2013.

2012

  1. “Proposal of a Secure WEP Operation against Existing Key Recovery Attacks and its Evaluation,”
    Tsubasa Tsukaune, Yosuke Todo, and Masakatu Morii,
    AsiaJCIS 2012, 2012.

2010

  1. “Effective Falsification Attack on WPA-TKIP by Modifying Any Packet to QoS Packet,”
    Yosuke Todo, Toshihiro Ohigashi, and Masakatu Morii,
    JWIS 2010, pp.118-132, 2010.
Advertisements