Conference Papers


  1. “Gimli: A Cross-Platform Permutation,” Daniel J. Bernstein, Stefan Koelbl, Stefan Lucks, Pedro Maat Costa Massolino, Florian Mendel, Kashif Nawaz, Tobias Schneider, Peter Schwabe, François-Xavier Standaert, Yosuke Todo, and Benoît Viguier, CHES 2017, LNCS, vol.10529, pp.299-320, 2017.
  2. “GIFT: A Small Present,” Subhadeep Banik, Sumit Kumar Pandey, Thomas Peyrin, Siang Meng Sim, Yosuke Todo, and Yu Sasaki, CHES 2017, LNCS, vol.10529, pp.321-345, 2017.
  3. “Analyzing Key Schedule of SIMON: Iterative Key Differences and Application to Related-Key Impossible Differentials,” Kota Kondo, Yu Sasaki, Yosuke Todo, and Tetsu Iwata, IWSEC 2017, LNCS, vol.10418, pp.141-158, 2017
  4. “Cube Attacks on Non-Blackbox Polynomials based on Division Property,” Yosuke Todo, Takanori Isobe, Yongling Hao, and Willi Meier, CRYPTO 2017, LNCS, vol.10403, pp.250-279, 2017.
  5. “Low-Data Complexity Attacks on Camellia,” Takeru Koie, Takanori Isobe, Yosuke Todo, and Masakatu Morii, ATIS 2017, CCIS, vol.719, pp.128-140, 2017.
  6. “Improved Integral Attack on HIGHT,” Yuki Funabiki, Yosuke Todo, Takanori Isobe, and Masakatu Morii, ACISP 2017, LNCS, vol.10342, pp.363-383, 2017.
  7. “New Algorithm for Modeling S-box in MILP Based Differential and Division Trail Search,” Yu Sasaki and Yosuke Todo, SecITC 2017, LNCS, vol.10543, pp.150-165, 2017.
  8. “New Impossible Differential Search Tool from Design and Cryptanalysis Aspects — Revealing Structural Properties of Several Ciphers,” Yu Sasaki and Yosuke Todo, EUROCRYPT 2017 Part III, LNCS, vol.10212, pp.185-215, 2017.


  1. “Nonlinear Invariant Attack –Practical Attack on Full SCREAM, iSCREAM, and Midori64,” Yosuke Todo, Gregor Leander, and Yu Sasaki, ASIACRYPT 2016 Part II, LNCS, vol.10032, pp.3-33, 2016.
    This paper won Asiacrypt 2016 Award Papers.
  2. “Compact Representation for Division Property,” Yosuke Todo and Masakatu Morii, CANS 2016, LNCS, vol.10052, pp.19-35, 2016.
  3. “New Conditional Differential Cryptanalysis for NLFSR-Based Stream Ciphers and Application to Grain v1,” Yuhei Watanabe, Yosuke Todo, and Masakatu Morii, AsiaJCIS 2016, 2016.
  4. “New Differential Bounds and Division Property of LILLIPUT: Block Cipher with Extended Generalized Feistel Network,” Yu Sasaki and Yosuke Todo, SAC 2016, LNCS, vol.10532, pp.264-283, 2016.
  5. “Wide Trail Design Strategy for Binary MixColumns,” Yosuke Todo and Kazumaro Aoki, ACNS 2016, LNCS, vol.9696, pp.467-484, 2016.
  6. “Bit-Based Division Property and Application to Simon Family,” Yosuke Todo and Masakatu Morii, FSE 2016, LNCS, vol.9783, pp.357-377, 2016. (full version)


  1. “Integral Cryptanalysis on Full MISTY1,” Yosuke Todo, CRYPTO 2015 Part I, LNCS, vol.9215, pp.413-432, 2015.
    This paper won the Best Paper Award and Best Young Researcher Award.
  2. “Structural Evaluation by Generalized Integral Property,” Yosuke Todo, EUROCRYPT 2015 Part I, LNCS, vol.9056, pp.287-314, 2015. (ePrint version)


  1. “How Much Can Complexity of Linear Cryptanalysis Be Reduced?,” Sho Sakikoyama, Yosuke Todo, Kazumaro Aoki, and Masakatu Morii, ICISC 2014, LNCS, vol.8949, pp.117-131, 2014.
  2. “Cryptanalysis of Reduced-Round SIMON32 and SIMON48,” Qingju Wang, Zhiqiang Liu, Kerem Varici, Yu Sasaki, Vincent Rijmen, and Yosuke Todo, INDOCRYPT 2014, LNCS, vol.8885, pp.143-160, 2014. (full version)
  3. “FFT Key Recovery for Integral Attack,” Yosuke Todo and Kazumaro Aoki, CANS 2014, LNCS, vol.8813, pp.64-81, 2014. (preliminary version in ePrint)
  4. “Practical Cryptanalysis of a Public-Key Encryption Scheme Based on New Multivariate Quadratic Assumptions,” Martin R. Albrecht, Jean-Charles Faugère, Robert Fitzpatrick, Ludovic Perret, Yosuke Todo, and Keita Xagawa, PKC 2014, LNCS, vol.8383, pp.446-464, 2014. (preliminary version in ePrint)


  1. “New Property of Diffusion Switching Mechanism on CLEFIA and Its Application to DFA,” Yosuke Todo and Yu Sasaki, IWSEC 2013, LNCS, vol.8231, pp.99-114, 2013.
  2. “Upper Bounds for the Security of Several Feistel Networks,” Yosuke Todo, ACISP 2013, LNCS, vol.7959, pp.302-317, 2013.


  1. “Proposal of a Secure WEP Operation against Existing Key Recovery Attacks and its Evaluation,” Tsubasa Tsukaune, Yosuke Todo, and Masakatu Morii, AsiaJCIS 2012, 2012.


  1. “Effective Falsification Attack on WPA-TKIP by Modifying Any Packet to QoS Packet,” Yosuke Todo, Toshihiro Ohigashi, and Masakatu Morii, JWIS 2010, pp.118-132, 2010.