Skip to main content

and
  1. Chapter and Conference Paper

    Wide Trail Design Strategy for Binary MixColumns

    AES is one of the most common block ciphers and many AES-like primitives have been proposed. Recently, many lightweight symmetric-key cryptographic primitives have also been proposed. Some such primitives requ...

    Yosuke Todo, Kazumaro Aoki in Applied Cryptography and Network Security (2016)

  2. Chapter and Conference Paper

    Cube Attacks on Non-Blackbox Polynomials Based on Division Property

    The cube attack is a powerful cryptanalytic technique and is especially powerful against stream ciphers. Since we need to analyze the complicated structure of a stream cipher in the cube attack, the cube attac...

    Yosuke Todo, Takanori Isobe, Yonglin Hao in Advances in Cryptology – CRYPTO 2017 (2017)

  3. No Access

    Chapter and Conference Paper

    Analyzing Key Schedule of Simon: Iterative Key Differences and Application to Related-Key Impossible Differentials

    The current paper analyzes the key schedule function of lightweight block cipher Simon, which was designed by NSA in 2013. In particular, a list of all iterative key differences is provided for all members of the...

    Kota Kondo, Yu Sasaki, Yosuke Todo in Advances in Information and Computer Secur… (2017)

  4. No Access

    Chapter and Conference Paper

    Several MILP-Aided Attacks Against SNOW 2.0

    SNOW 2.0 is a software-oriented stream cipher and internationally standardized by ISO/IEC 18033-4. In this paper, we present three attacks on SNOW 2.0 by MILP-aided automatic search algorithms. First, we prese...

    Yuki Funabiki, Yosuke Todo, Takanori Isobe in Cryptology and Network Security (2018)