Conference Papers


  1. “Lower Bounds on the Degree of Block Ciphers”,
    Phil Hebborn, Baptiste Lambin, Gregor Leander, and Yosuke Todo,
    Asiacrypt 2020.
  2. “Improved Differential-Linear Attacks with Applications to ARX Ciphers”,
    Christof Beierle, Gregor Leander, and Yosuke Todo,
    CRYPTO 2020.
    This paper won the Best Paper Award.
  3. “Out of Oddity – New Cryptanalytic Techniques against Symmetric Primitives Optimized for Integrity Proof Systems”,
    Tim Beyne, Anne Canteaut, Itai Dinur, Maria Eichlseder, Gregor Leander, Gaëtan Leurent, María Naya-Plasencia, Léo Perrin, Yu Sasaki, Yosuke Todo, and Friedrich Wiemer,
    CRYPTO 2020.
  4. “Modeling for Three-Subset Division Property without Unknown Subset –Improved Cube Attacks against Trivium and Grain-128AEAD”,
    Yonglin Hao, Gregor Leander, Willi Meier, Yosuke Todo, and Qingju Wang,
    Eurocrypt 2020.


  1. “On the Data Limitation of Small-State Stream Ciphers: Correlation Attacks on Fruit-80 and Plantlet”,
    Yosuke Todo, Willi Meier, and Kazumaro Aoki,
    SAC 2019, LNCS, vol.11959, pp.364-392, 2019.


  1. “Programming the Demirci-Selçuk Meet-in-the-Middle Attack with Constraints”,
    Danping Shi, Siwei Sun, Patrick Derbez, Yosuke Todo, Bing Sun and Lei Hu,
    Asiacrypt 2018, LNCS, vol.11273, pp.3-34, 2018.
  2. “Several MILP-Aided Attacks against SNOW 2.0,”
    Yuki Funabiki, Yosuke Todo, Takanori Isobe and Masakatu Morii,
    CANS 2018, LNCS, vol.11124, pp.394-413, 2018.
  3. “Fast Correlation Attack Revisited –Cryptanalysis on Full Grain-128a, Grain-128, and Grain-v1,”
    Yosuke Todo, Takanori Isobe, Willi Meier, Kazumaro Aoki, and Bin Zhang,
    CRYPTO 2018, LNCS, vol.10992, pp.129-159, 2018.
  4. “Improved Division Property Based Cube Attacks Exploiting Algebraic Properties of Superpoly,”
    Qingju Wang, Yonglin Hao, Yosuke Todo, Chaoyun Li, Takanori Isobe, and Willi Meier,
    CRYPTO 2018, LNCS, vol.10991, pp.205-305, 2018.


  1. “Gimli: A Cross-Platform Permutation,”
    Daniel J. Bernstein, Stefan Koelbl, Stefan Lucks, Pedro Maat Costa Massolino, Florian Mendel, Kashif Nawaz, Tobias Schneider, Peter Schwabe, François-Xavier Standaert, Yosuke Todo, and Benoît Viguier,
    CHES 2017, LNCS, vol.10529, pp.299-320, 2017.
  2. “GIFT: A Small Present,”
    Subhadeep Banik, Sumit Kumar Pandey, Thomas Peyrin, Siang Meng Sim, Yosuke Todo, and Yu Sasaki,
    CHES 2017, LNCS, vol.10529, pp.321-345, 2017.
  3. “Analyzing Key Schedule of SIMON: Iterative Key Differences and Application to Related-Key Impossible Differentials,”
    Kota Kondo, Yu Sasaki, Yosuke Todo, and Tetsu Iwata,
    IWSEC 2017, LNCS, vol.10418, pp.141-158, 2017
  4. “Cube Attacks on Non-Blackbox Polynomials based on Division Property,”
    Yosuke Todo, Takanori Isobe, Yongling Hao, and Willi Meier,
    CRYPTO 2017, LNCS, vol.10403, pp.250-279, 2017.
  5. “Low-Data Complexity Attacks on Camellia,”
    Takeru Koie, Takanori Isobe, Yosuke Todo, and Masakatu Morii,
    ATIS 2017, CCIS, vol.719, pp.128-140, 2017.
  6. “Improved Integral Attack on HIGHT,”
    Yuki Funabiki, Yosuke Todo, Takanori Isobe, and Masakatu Morii,
    ACISP 2017, LNCS, vol.10342, pp.363-383, 2017.
  7. “New Algorithm for Modeling S-box in MILP Based Differential and Division Trail Search,”
    Yu Sasaki and Yosuke Todo,
    SecITC 2017, LNCS, vol.10543, pp.150-165, 2017.
  8. “New Impossible Differential Search Tool from Design and Cryptanalysis Aspects — Revealing Structural Properties of Several Ciphers,”
    Yu Sasaki and Yosuke Todo,
    EUROCRYPT 2017 Part III, LNCS, vol.10212, pp.185-215, 2017.


  1. “Nonlinear Invariant Attack –Practical Attack on Full SCREAM, iSCREAM, and Midori64,”
    Yosuke Todo, Gregor Leander, and Yu Sasaki,
    ASIACRYPT 2016 Part II, LNCS, vol.10032, pp.3-33, 2016.
    This paper won Asiacrypt 2016 Award Papers.
  2. “Compact Representation for Division Property,”
    Yosuke Todo and Masakatu Morii,
    CANS 2016, LNCS, vol.10052, pp.19-35, 2016.
  3. “New Conditional Differential Cryptanalysis for NLFSR-Based Stream Ciphers and Application to Grain v1,”
    Yuhei Watanabe, Yosuke Todo, and Masakatu Morii,
    AsiaJCIS 2016, 2016.
  4. “New Differential Bounds and Division Property of LILLIPUT: Block Cipher with Extended Generalized Feistel Network,”
    Yu Sasaki and Yosuke Todo,
    SAC 2016, LNCS, vol.10532, pp.264-283, 2016.
  5. “Wide Trail Design Strategy for Binary MixColumns,”
    Yosuke Todo and Kazumaro Aoki,
    ACNS 2016, LNCS, vol.9696, pp.467-484, 2016.
  6. “Bit-Based Division Property and Application to Simon Family,”
    Yosuke Todo and Masakatu Morii,
    FSE 2016, LNCS, vol.9783, pp.357-377, 2016. (full version)


  1. “Integral Cryptanalysis on Full MISTY1,”
    Yosuke Todo,
    CRYPTO 2015 Part I, LNCS, vol.9215, pp.413-432, 2015.
    This paper won the Best Paper Award and Best Young Researcher Award.
  2. “Structural Evaluation by Generalized Integral Property,”
    Yosuke Todo,
    EUROCRYPT 2015 Part I, LNCS, vol.9056, pp.287-314, 2015. (ePrint version)


  1. “How Much Can Complexity of Linear Cryptanalysis Be Reduced?,”
    Sho Sakikoyama, Yosuke Todo, Kazumaro Aoki, and Masakatu Morii,
    ICISC 2014, LNCS, vol.8949, pp.117-131, 2014.
  2. “Cryptanalysis of Reduced-Round SIMON32 and SIMON48,”
    Qingju Wang, Zhiqiang Liu, Kerem Varici, Yu Sasaki, Vincent Rijmen, and Yosuke Todo,
    INDOCRYPT 2014, LNCS, vol.8885, pp.143-160, 2014. (full version)
  3. “FFT Key Recovery for Integral Attack,”
    Yosuke Todo and Kazumaro Aoki,
    CANS 2014, LNCS, vol.8813, pp.64-81, 2014. (preliminary version in ePrint)
  4. “Practical Cryptanalysis of a Public-Key Encryption Scheme Based on New Multivariate Quadratic Assumptions,”
    Martin R. Albrecht, Jean-Charles Faugère, Robert Fitzpatrick, Ludovic Perret, Yosuke Todo, and Keita Xagawa,
    PKC 2014, LNCS, vol.8383, pp.446-464, 2014. (preliminary version in ePrint)


  1. “New Property of Diffusion Switching Mechanism on CLEFIA and Its Application to DFA,”
    Yosuke Todo and Yu Sasaki,
    IWSEC 2013, LNCS, vol.8231, pp.99-114, 2013.
  2. “Upper Bounds for the Security of Several Feistel Networks,”
    Yosuke Todo,
    ACISP 2013, LNCS, vol.7959, pp.302-317, 2013.


  1. “Proposal of a Secure WEP Operation against Existing Key Recovery Attacks and its Evaluation,”
    Tsubasa Tsukaune, Yosuke Todo, and Masakatu Morii,
    AsiaJCIS 2012, 2012.


  1. “Effective Falsification Attack on WPA-TKIP by Modifying Any Packet to QoS Packet,”
    Yosuke Todo, Toshihiro Ohigashi, and Masakatu Morii,
    JWIS 2010, pp.118-132, 2010.