Journals and Letters

2018

  1. “Cryptanalysis of AES-PRF and Its Dual”,
    Patrick Derbez, Tetsu Iwata, Ling Sun, Siwei Sun, Yosuke Todo, Haoyang Wang, Meiqin Wang
    IACR Transactions on Symmetric Cryptology (ToSC), Vol. 2018, No.2, pp.161-191.
  2. “Cube Attacks on Non-Blackbox Polynomials Based on Division Property”,
    Yosuke Todo, Takanori Isobe, Yonglin Hao, and Willi Meier
    IEEE Transactions on Computers, (Early Access)
    Preliminary version appeared in CRYPTO2017.
  3. “Nonlinear Invariant Attack: Practical Attack on Full SCREAM, iSCREAM, and Midori64”,
    Yosuke Todo, Gregor Leander, and Yu Sasaki
    Journal of Cryptology, (First Online)
    Preliminary version appeared in Asiacrypt2016.
  4. “Tight Bounds of Differentially and Linearly Active S-boxes and Division Property of Lilliput”,
    Yu Sasaki and Yosuke Todo
    IEEE Transactions on Computers, Vol. 67, Issue 5, 2018.
    Preliminary version appeared in SAC2016.
  5. “On the Complexity of Impossible Differential Cryptanalysis”,
    Qianqian Yang, Lei Hu, Danping Shi, Yosuke Todo, and Siwei Sun
    Security and Communication Networks, vol. 2018, Article ID 7393401, 2018.
  6. “On the Design Rationale of SIMON Block Cipher: Integral Attacks and Impossible Differential Attacks against SIMON Variants”,
    Kota Kondo, Yu Sasaki, Yosuke Todo, and Tetsu Iwata
    IEICE Trans., Vol. E101-A, No 1, pp.88-98, 2018.

2017

  1. “MILP Modeling for (Large) S-boxes to Optimize Probability of Differential Characteristics”,
    Ahmed Abdelkhalek, Yu Sasaki, Yosuke Todo, Mohamed Tolba, and Amr M. Youssef
    IACR Transactions on Symmetric Cryptology (ToSC), Vol. 2017, No.4, pp.99-129.
  2. “Integral Cryptanalysis on Full MISTY1”,
    Yosuke Todo
    Journal of Cryptology, Vol. 30, No. 3, pp.920-959, 2017.
    Preliminary version appeared in CRYPTO 2015.
  3. “Analysis of AES, SKINNY, and Others with Constraint Programming”,
    Siwei Sun, David Gerault, Pascal Lafourcade, Qianqian Yang, Yosuke Todo, Kexin Qiao, and Lei Hu
    IACR Transactions on Symmetric Cryptology (ToSC), Vol. 2017, No.1, pp.281-306.

2016

  1. “Efficient Implementations for Practical Linear Cryptanalysis and Its Application to FEAL-8X”,
    Sho Sakikoyama, Yosuke Todo, Kazumaro Aoki, and Masakatu Morii
    IEICE Trans., Vol. E99-A, No 1, pp.31-38, 2016.
    Preliminary version appeared in ICISC 2015.
  2. “Impossible Differential Attack against 14-Round Piccolo-80 without Relying on Full Code Book”,
    Yosuke Todo
    IEICE Trans., Vol. E99-A, No 1, pp.154-157, 2016.

2015

  1. “Fast Fourier Transform Key Recovery for Integral Attacks”,
    Yosuke Todo and Kazumaro Aoki
    IEICE Trans., Vol. E98-A, No 9, pp.1944-1952, 2015.
    Preliminary version appeared in CANS 2014.
    Preliminary version in ePrint.
  2. “Upper Bounds for the Security of Several Feistel Networks”,
    Yosuke Todo
    IEICE Trans., Vol. E98-A, No 1, pp.39-48, 2015.
    Preliminary version appeared in ACISP 2013.

2012

  1. “Falsification Attacks against WPA-TKIP in a Realistic Environment”,
    Yosuke Todo, Yuki Ozawa, Toshihiro Ohigashi, and Masakatu Morii
    IEICE Trans., vol. E95-D, no.2, pp.588-595, 2012.
    Preliminary version appeared in JWIS 2010.

2011

  1. “Cryptanalysis for RC4 and Breaking WEP/WPA-TKIP”,
    Masakatu Morii and Yosuke Todo
    IEICE Trans., Vol. E94-D, No.11, pp.2087-2094, 2011.
Advertisements