Conference Papers


  1. “Several MILP-Aided Attacks against SNOW 2.0”,
    Yuki Funabiki, Yosuke Todo, Takanori Isobe and Masakatu Morii,
    CANS 2018.
  2. “Fast Correlation Attack Revisited –Cryptanalysis on Full Grain-128a, Grain-128, and Grain-v1,”
    Yosuke Todo, Takanori Isobe, Willi Meier, Kazumaro Aoki, and Bin Zhang,
    CRYPTO 2018.
  3. “Improved Division Property Based Cube Attacks Exploiting Algebraic Properties of Superpoly,”
    Qingju Wang, Yonglin Hao, Yosuke Todo, Chaoyun Li, Takanori Isobe, and Willi Meier,
    CRYPTO 2018.


  1. “Gimli: A Cross-Platform Permutation,”
    Daniel J. Bernstein, Stefan Koelbl, Stefan Lucks, Pedro Maat Costa Massolino, Florian Mendel, Kashif Nawaz, Tobias Schneider, Peter Schwabe, François-Xavier Standaert, Yosuke Todo, and Benoît Viguier,
    CHES 2017, LNCS, vol.10529, pp.299-320, 2017.
  2. “GIFT: A Small Present,”
    Subhadeep Banik, Sumit Kumar Pandey, Thomas Peyrin, Siang Meng Sim, Yosuke Todo, and Yu Sasaki,
    CHES 2017, LNCS, vol.10529, pp.321-345, 2017.
  3. “Analyzing Key Schedule of SIMON: Iterative Key Differences and Application to Related-Key Impossible Differentials,”
    Kota Kondo, Yu Sasaki, Yosuke Todo, and Tetsu Iwata,
    IWSEC 2017, LNCS, vol.10418, pp.141-158, 2017
  4. “Cube Attacks on Non-Blackbox Polynomials based on Division Property,”
    Yosuke Todo, Takanori Isobe, Yongling Hao, and Willi Meier,
    CRYPTO 2017, LNCS, vol.10403, pp.250-279, 2017.
  5. “Low-Data Complexity Attacks on Camellia,”
    Takeru Koie, Takanori Isobe, Yosuke Todo, and Masakatu Morii,
    ATIS 2017, CCIS, vol.719, pp.128-140, 2017.
  6. “Improved Integral Attack on HIGHT,”
    Yuki Funabiki, Yosuke Todo, Takanori Isobe, and Masakatu Morii,
    ACISP 2017, LNCS, vol.10342, pp.363-383, 2017.
  7. “New Algorithm for Modeling S-box in MILP Based Differential and Division Trail Search,”
    Yu Sasaki and Yosuke Todo,
    SecITC 2017, LNCS, vol.10543, pp.150-165, 2017.
  8. “New Impossible Differential Search Tool from Design and Cryptanalysis Aspects — Revealing Structural Properties of Several Ciphers,”
    Yu Sasaki and Yosuke Todo,
    EUROCRYPT 2017 Part III, LNCS, vol.10212, pp.185-215, 2017.


  1. “Nonlinear Invariant Attack –Practical Attack on Full SCREAM, iSCREAM, and Midori64,”
    Yosuke Todo, Gregor Leander, and Yu Sasaki,
    ASIACRYPT 2016 Part II, LNCS, vol.10032, pp.3-33, 2016.
    This paper won Asiacrypt 2016 Award Papers.
  2. “Compact Representation for Division Property,”
    Yosuke Todo and Masakatu Morii,
    CANS 2016, LNCS, vol.10052, pp.19-35, 2016.
  3. “New Conditional Differential Cryptanalysis for NLFSR-Based Stream Ciphers and Application to Grain v1,”
    Yuhei Watanabe, Yosuke Todo, and Masakatu Morii,
    AsiaJCIS 2016, 2016.
  4. “New Differential Bounds and Division Property of LILLIPUT: Block Cipher with Extended Generalized Feistel Network,”
    Yu Sasaki and Yosuke Todo,
    SAC 2016, LNCS, vol.10532, pp.264-283, 2016.
  5. “Wide Trail Design Strategy for Binary MixColumns,”
    Yosuke Todo and Kazumaro Aoki,
    ACNS 2016, LNCS, vol.9696, pp.467-484, 2016.
  6. “Bit-Based Division Property and Application to Simon Family,”
    Yosuke Todo and Masakatu Morii,
    FSE 2016, LNCS, vol.9783, pp.357-377, 2016. (full version)


  1. “Integral Cryptanalysis on Full MISTY1,”
    Yosuke Todo,
    CRYPTO 2015 Part I, LNCS, vol.9215, pp.413-432, 2015.
    This paper won the Best Paper Award and Best Young Researcher Award.
  2. “Structural Evaluation by Generalized Integral Property,”
    Yosuke Todo,
    EUROCRYPT 2015 Part I, LNCS, vol.9056, pp.287-314, 2015. (ePrint version)


  1. “How Much Can Complexity of Linear Cryptanalysis Be Reduced?,”
    Sho Sakikoyama, Yosuke Todo, Kazumaro Aoki, and Masakatu Morii,
    ICISC 2014, LNCS, vol.8949, pp.117-131, 2014.
  2. “Cryptanalysis of Reduced-Round SIMON32 and SIMON48,”
    Qingju Wang, Zhiqiang Liu, Kerem Varici, Yu Sasaki, Vincent Rijmen, and Yosuke Todo,
    INDOCRYPT 2014, LNCS, vol.8885, pp.143-160, 2014. (full version)
  3. “FFT Key Recovery for Integral Attack,”
    Yosuke Todo and Kazumaro Aoki,
    CANS 2014, LNCS, vol.8813, pp.64-81, 2014. (preliminary version in ePrint)
  4. “Practical Cryptanalysis of a Public-Key Encryption Scheme Based on New Multivariate Quadratic Assumptions,”
    Martin R. Albrecht, Jean-Charles Faugère, Robert Fitzpatrick, Ludovic Perret, Yosuke Todo, and Keita Xagawa,
    PKC 2014, LNCS, vol.8383, pp.446-464, 2014. (preliminary version in ePrint)


  1. “New Property of Diffusion Switching Mechanism on CLEFIA and Its Application to DFA,”
    Yosuke Todo and Yu Sasaki,
    IWSEC 2013, LNCS, vol.8231, pp.99-114, 2013.
  2. “Upper Bounds for the Security of Several Feistel Networks,”
    Yosuke Todo,
    ACISP 2013, LNCS, vol.7959, pp.302-317, 2013.


  1. “Proposal of a Secure WEP Operation against Existing Key Recovery Attacks and its Evaluation,”
    Tsubasa Tsukaune, Yosuke Todo, and Masakatu Morii,
    AsiaJCIS 2012, 2012.


  1. “Effective Falsification Attack on WPA-TKIP by Modifying Any Packet to QoS Packet,”
    Yosuke Todo, Toshihiro Ohigashi, and Masakatu Morii,
    JWIS 2010, pp.118-132, 2010.