Skip to main content

Page of 2 next disabled
and
  1. Chapter and Conference Paper

    Cube Attacks on Non-Blackbox Polynomials Based on Division Property

    The cube attack is a powerful cryptanalytic technique and is especially powerful against stream ciphers. Since we need to analyze the complicated structure of a stream cipher in the cube attack, the cube attac...

    Yosuke Todo, Takanori Isobe, Yonglin Hao in Advances in Cryptology – CRYPTO 2017 (2017)

  2. No Access

    Chapter and Conference Paper

    Analyzing Key Schedule of Simon: Iterative Key Differences and Application to Related-Key Impossible Differentials

    The current paper analyzes the key schedule function of lightweight block cipher Simon, which was designed by NSA in 2013. In particular, a list of all iterative key differences is provided for all members of the...

    Kota Kondo, Yu Sasaki, Yosuke Todo in Advances in Information and Computer Secur… (2017)

  3. Chapter and Conference Paper

    New Differential Bounds and Division Property of Lilliput: Block Cipher with Extended Generalized Feistel Network

    This paper provides security analysis of lightweight block cipher Lilliput, which is an instantiation of extended generalized Feistel network (EGFN) developed by Berger et al. at SAC 2013. Its round function upda...

    Yu Sasaki, Yosuke Todo in Selected Areas in Cryptography – SAC 2016 (2017)

  4. Chapter and Conference Paper

    GIFT: A Small Present

    In this article, we revisit the design strategy of PRESENT, leveraging all the advances provided by the research community in construction and cryptanalysis since its publication, to push the design up to its lim...

    Subhadeep Banik, Sumit Kumar Pandey in Cryptographic Hardware and Embedded System… (2017)

  5. Chapter and Conference Paper

    New Impossible Differential Search Tool from Design and Cryptanalysis Aspects

    In this paper, a new tool searching for impossible differentials is presented. Our tool can detect any contradiction between input and output differences. It can also take into account the property inside the ...

    Yu Sasaki, Yosuke Todo in Advances in Cryptology – EUROCRYPT 2017 (2017)

  6. Chapter and Conference Paper

    Nonlinear Invariant Attack

    In this paper we introduce a new type of attack, called nonlinear invariant attack. As application examples, we present new attacks that are able to distinguish the full versions of the (tweakable) block ciphers

    Yosuke Todo, Gregor Leander, Yu Sasaki in Advances in Cryptology – ASIACRYPT 2016 (2016)

  7. No Access

    Chapter and Conference Paper

    Compact Representation for Division Property

    The division property, which is a new method to find integral characteristics, was proposed at Eurocrypt 2015. Thereafter, some applications and improvements have been proposed. The bit-based division property...

    Yosuke Todo, Masakatu Morii in Cryptology and Network Security (2016)

  8. Chapter and Conference Paper

    Bit-Based Division Property and Application to Simon Family

    Ciphers that do not use S-boxes have been discussed for the demand on lightweight cryptosystems, and their round functions consist of and, rotation, and xor. Especially, the Simon family is one of the most famous...

    Yosuke Todo, Masakatu Morii in Fast Software Encryption (2016)

  9. Chapter and Conference Paper

    Wide Trail Design Strategy for Binary MixColumns

    AES is one of the most common block ciphers and many AES-like primitives have been proposed. Recently, many lightweight symmetric-key cryptographic primitives have also been proposed. Some such primitives requ...

    Yosuke Todo, Kazumaro Aoki in Applied Cryptography and Network Security (2016)

  10. No Access

    Chapter and Conference Paper

    How Much Can Complexity of Linear Cryptanalysis Be Reduced?

    The linear cryptanalysis proposed by Matsui is one of the most effective attacks on block ciphers, and he demonstrated an experimental cryptanalysis against DES at CRYPTO 1994. In this paper, we show how to op...

    Sho Sakikoyama, Yosuke Todo, Kazumaro Aoki in Information Security and Cryptology - ICIS… (2015)

  11. Chapter and Conference Paper

    Integral Cryptanalysis on Full MISTY1

    MISTY1 is a block cipher designed by Matsui in 1997. It was well evaluated and standardized by projects, such as CRYPTREC, ISO/IEC, and NESSIE. In this paper, we propose a key recovery attack on the full MISTY...

    Yosuke Todo in Advances in Cryptology -- CRYPTO 2015 (2015)

  12. Chapter and Conference Paper

    Structural Evaluation by Generalized Integral Property

    In this paper, we show structural cryptanalyses against two popular networks, i.e., the Feistel Network and the Substitute-Permutation Network (SPN). Our cryptanalyses are distinguishing attacks by an improved...

    Yosuke Todo in Advances in Cryptology -- EUROCRYPT 2015 (2015)

  13. Chapter and Conference Paper

    Practical Cryptanalysis of a Public-Key Encryption Scheme Based on New Multivariate Quadratic Assumptions

    In this paper, we investigate the security of a public-key encryption scheme introduced by Huang, Liu and Yang (HLY) at PKC’12. This new scheme can be provably reduced to the hardness of solving a set of quadr...

    Martin R. Albrecht, Jean-Charles Faugére in Public-Key Cryptography – PKC 2014 (2014)

  14. No Access

    Chapter and Conference Paper

    FFT Key Recovery for Integral Attack

    An integral attack is one of the most powerful attacks against block ciphers. We propose a new technique for the integral attack called the Fast Fourier Transform (FFT) key recovery. When the integral distingu...

    Yosuke Todo, Kazumaro Aoki in Cryptology and Network Security (2014)

  15. No Access

    Chapter and Conference Paper

    Cryptanalysis of Reduced-Round SIMON32 and SIMON48

    SIMON family is one of the recent lightweight block cipher designs introduced by NSA. So far there have been several cryptanalytic results on this cipher by means of differential, linear and impossible differe...

    Qingju Wang, Zhiqiang Liu, Kerem Varıcı in Progress in Cryptology -- INDOCRYPT 2014 (2014)

  16. No Access

    Chapter and Conference Paper

    Upper Bounds for the Security of Several Feistel Networks

    In this paper, we are dealing with upper bounds for the security of some Feistel networks. Such a topic has been discussed since the introduction of Luby-Rackoff construction, but it is unrealistic constructio...

    Yosuke Todo in Information Security and Privacy (2013)

  17. No Access

    Chapter and Conference Paper

    New Property of Diffusion Switching Mechanism on CLEFIA and Its Application to DFA

    In this paper, we show a new property for the diffusion switching mechanism (DSM) which was proposed by Shirai and Shibutani in 2006, and propose new differential fault attacks (DFAs) on CLEFIA. The DSM is an ...

    Yosuke Todo, Yu Sasaki in Advances in Information and Computer Security (2013)

Page of 2 next disabled