What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Takanori Isobe
Google Scholar
91
publications in security and cryptology related venues
Year
Venue
Title
2025
journals/tches
AETHER: An Ultra-High Throughput and Low Energy Authenticated Encryption Scheme.
Subhadeep Banik
Andrea Caforio
Tatsuya Ishikawa
Takanori Isobe
Mostafizar Rahman
Kosei Sakamoto
2025
journals/istr
Security analysis of SFrame.
Takanori Isobe
Ryoma Ito
Kazuhiko Minematsu
2025
conf/acisp
Forgery Attacks on SipHash.
Kosuke Sasaki
Rikuto Kurahara
Kosei Sakamoto
Takanori Isobe
2025
conf/acisp
Strengthening Key Scheduling of AES-256 with Minimal Software Modifications.
Shoma Kawakami
Kazuma Taka
Atsushi Tanaka
Tatsuya Ishikawa
Takanori Isobe
2025
conf/eurosp
Not in The Prophecies: Practical Attacks on Nostr.
Hayato Kimura
Ryoma Ito
Kazuhiko Minematsu
Shogo Shiraki
Takanori Isobe
2025
journals/istr
Parallel SAT framework to find clustering of differential characteristics and its applications.
Kosei Sakamoto
Ryoma Ito
Takanori Isobe
2025
journals/tosc
Divide-and-Conquer SAT for Exploring Optimal Differential and Linear Characteristics and Its Applications.
Kazuma Taka
Kosei Sakamoto
Ryoma Ito
Rentaro Shiba
Shion Utsumi
Takanori Isobe
2025
journals/cic
Exploring SHA Instructions and Its Application to AES-based Schemes.
Takuro Shiraya
Subhadeep Banik
Tatsuya Ishikawa
Ryoma Ito
Mostafizar Rahman
Kosei Sakamoto
Atsushi Tanaka
Shion Utsumi
Takanori Isobe
2024
journals/tches
Gleeok: A Family of Low-Latency PRFs and its Applications to Authenticated Encryption.
Ravi Anand
Subhadeep Banik
Andrea Caforio
Tatsuya Ishikawa
Takanori Isobe
Fukang Liu
Kazuhiko Minematsu
Mostafizar Rahman
Kosei Sakamoto
2024
journals/cic
On the Key-Commitment Properties of Forkcipher-based AEADs.
Mostafizar Rahman
Samir Kundu
Takanori Isobe
2024
journals/tosc
Key Committing Attacks against AES-based AEAD Schemes.
Patrick Derbez
Pierre-Alain Fouque
Takanori Isobe
Mostafizar Rahman
André Schrottenloher
2024
conf/acisp
Differential Distinguishing Attacks on SNOW-V, SNOW-Vi and KCipher-2.
Rikuto Kurahara
Kosei Sakamoto
Yuto Nakano
Takanori Isobe
2024
conf/iwsec
Bit-Wise Analysis for Forgery Attacks on AES-Based AEAD Schemes.
Takuro Shiraya
Kosei Sakamoto
Takanori Isobe
2024
conf/asiacrypt
Key Collisions on AES and Its Applications.
Kodai Taiyama
Kosei Sakamoto
Ryoma Ito
Kazuma Taka
Takanori Isobe
2024
conf/cans
Collision Attacks on Hashing Modes of Areion.
Kodai Taiyama
Kosei Sakamoto
Rentaro Shiba
Takanori Isobe
2023
journals/tches
Areion: Highly-Efficient Permutations and Its Applications to Hash Functions for Short Input.
Takanori Isobe
Ryoma Ito
Fukang Liu
Kazuhiko Minematsu
Motoki Nakahashi
Kosei Sakamoto
Rentaro Shiba
2023
conf/acisp
Ghidle: Efficient Large-State Block Ciphers for Post-quantum Security.
Motoki Nakahashi
Rentaro Shiba
Ravi Anand
Mostafizar Rahman
Kosei Sakamoto
Fukang Liu
Takanori Isobe
2023
conf/crypto
Coefficient Grouping for Complex Affine Layers.
Fukang Liu
Lorenzo Grassi
Clémence Bouvier
Willi Meier
Takanori Isobe
2023
conf/esorics
An Ultra-High Throughput AES-Based Authenticated Encryption Scheme for 6G: Design and Implementation.
Ravi Anand
Subhadeep Banik
Andrea Caforio
Kazuhide Fukushima
Takanori Isobe
Shinsaku Kiyomoto
Fukang Liu
Yuto Nakano
Kosei Sakamoto
Nobuyuki Takeuchi
2023
conf/ctrsa
An Efficient Strategy to Construct a Better Differential on Multiple-Branch-Based Designs: Application to Orthros.
Kazuma Taka
Tatsuya Ishikawa
Kosei Sakamoto
Takanori Isobe
2023
conf/eurocrypt
Analysis of RIPEMD-160: New Collision Attacks and Finding Characteristics with MILP.
Fukang Liu
Gaoli Wang
Santanu Sarkar
Ravi Anand
Willi Meier
Yingxin Li
Takanori Isobe
2023
conf/eurocrypt
Coefficient Grouping: Breaking Chaghri and More.
Fukang Liu
Ravi Anand
Libo Wang
Willi Meier
Takanori Isobe
2023
conf/sacrypt
Parallel SAT Framework to Find Clustering of Differential Characteristics and Its Applications.
Kosei Sakamoto
Ryoma Ito
Takanori Isobe
2022
journals/istr
Distinguishing and key recovery attacks on the reduced-round SNOW-V and SNOW-Vi.
Jin Hoki
Takanori Isobe
Ryoma Ito
Fukang Liu
Kosei Sakamoto
2022
journals/tosc
Hybrid Code Lifting on Space-Hard Block Ciphers Application to Yoroi and SPNbox.
Yosuke Todo
Takanori Isobe
2022
journals/tosc
New Low-Memory Algebraic Attacks on LowMC in the Picnic Setting.
Fukang Liu
Willi Meier
Santanu Sarkar
Takanori Isobe
2022
journals/tosc
New Cryptanalysis of ZUC-256 Initialization Using Modular Differences.
Fukang Liu
Willi Meier
Santanu Sarkar
Gaoli Wang
Ryoma Ito
Takanori Isobe
2022
journals/joc
The Inverse of χ and Its Applications to Rasta-Like Ciphers.
Fukang Liu
Santanu Sarkar
Willi Meier
Takanori Isobe
2022
conf/acns
Output Prediction Attacks on Block Ciphers Using Deep Learning.
Hayato Kimura
Keita Emura
Takanori Isobe
Ryoma Ito
Kazuto Ogawa
Toshihiro Ohigashi
2022
conf/asiacrypt
Algebraic Meet-in-the-Middle Attack on LowMC.
Fukang Liu
Santanu Sarkar
Gaoli Wang
Willi Meier
Takanori Isobe
2022
conf/asiacrypt
A Modular Approach to the Incompressibility of Block-Cipher-Based AEADs.
Akinori Hosoyamada
Takanori Isobe
Yosuke Todo
Kan Yasuda
2021
journals/tches
Yoroi: Updatable Whitebox Cryptography.
Yuji Koike
Takanori Isobe
2021
journals/istr
Bit-wise cryptanalysis on AND-RX permutation Friet-PC.
Ryoma Ito
Rentaro Shiba
Kosei Sakamoto
Fukang Liu
Takanori Isobe
2021
journals/tosc
Atom: A Stream Cipher with Double Key Filter.
Subhadeep Banik
Andrea Caforio
Takanori Isobe
Fukang Liu
Willi Meier
Kosei Sakamoto
Santanu Sarkar
2021
journals/tosc
Weak Keys in Reduced AEGIS and Tiaoxin.
Fukang Liu
Takanori Isobe
Willi Meier
Kosei Sakamoto
2021
journals/tosc
Perfect Trees: Designing Energy-Optimal Symmetric Encryption Primitives.
Andrea Caforio
Subhadeep Banik
Yosuke Todo
Willi Meier
Takanori Isobe
Fukang Liu
Bin Zhang
2021
journals/tosc
Rocca: An Efficient AES-based Encryption Scheme for Beyond 5G.
Kosei Sakamoto
Fukang Liu
Yuto Nakano
Shinsaku Kiyomoto
Takanori Isobe
2021
journals/tosc
Exploiting Weak Diffusion of Gimli: Improved Distinguishers and Preimage Attacks.
Fukang Liu
Takanori Isobe
Willi Meier
2021
journals/tosc
Orthros: A Low-Latency PRF.
Subhadeep Banik
Takanori Isobe
Fukang Liu
Kazuhiko Minematsu
Kosei Sakamoto
2021
conf/acisp
Algebraic Attacks on Round-Reduced Keccak.
Fukang Liu
Takanori Isobe
Willi Meier
Zhonghao Yang
2021
conf/acisp
Security Analysis of End-to-End Encryption for Zoom Meetings.
Takanori Isobe
Ryoma Ito
2021
conf/acisp
Distinguishing and Key Recovery Attacks on the Reduced-Round SNOW-V.
Jin Hoki
Takanori Isobe
Ryoma Ito
Fukang Liu
Kosei Sakamoto
2021
conf/crypto
Cryptanalysis of Full LowMC and LowMC-M with Algebraic Techniques.
Fukang Liu
Takanori Isobe
Willi Meier
2021
conf/icisc
Differential Fault Attack on Rocca.
Ravi Anand
Takanori Isobe
2021
conf/esorics
Security Analysis of SFrame.
Takanori Isobe
Ryoma Ito
Kazuhiko Minematsu
2021
conf/asiacrypt
Algebraic Attacks on Rasta and Dasta Using Low-Degree Equations.
Fukang Liu
Santanu Sarkar
Willi Meier
Takanori Isobe
2020
conf/acisp
Galaxy: A Family of Stream-Cipher-Based Space-Hard Ciphers.
Yuji Koike
Kosei Sakamoto
Takuya Hayashi
Takanori Isobe
2020
conf/crypto
Automatic Verification of Differential Characteristics: Application to Reduced Gimli.
Fukang Liu
Takanori Isobe
Willi Meier
2020
conf/acns
ACE in Chains: How Risky Is CBC Encryption of Binary Executable Files?
Rintaro Fujita
Takanori Isobe
Kazuhiko Minematsu
2020
conf/sacrypt
WARP : Revisiting GFN for Lightweight 128-Bit Block Cipher.
Subhadeep Banik
Zhenzhen Bao
Takanori Isobe
Hiroyasu Kubo
Fukang Liu
Kazuhiko Minematsu
Kosei Sakamoto
Nao Shibata
Maki Shigeri
2019
journals/tosc
Cube-Based Cryptanalysis of Subterranean-SAE.
Fukang Liu
Takanori Isobe
Willi Meier
2019
journals/tosc
Cryptanalysis of Plantlet.
Subhadeep Banik
Khashayar Barooti
Takanori Isobe
2019
journals/tosc
New Semi-Free-Start Collision Attack Framework for Reduced RIPEMD-160.
Fukang Liu
Christoph Dobraunig
Florian Mendel
Takanori Isobe
Gaoli Wang
Zhenfu Cao
2019
conf/crypto
Efficient Collision Attack Frameworks for RIPEMD-160.
Fukang Liu
Christoph Dobraunig
Florian Mendel
Takanori Isobe
Gaoli Wang
Zhenfu Cao
2019
conf/iwsec
More Results on Shortest Linear Programs.
Subhadeep Banik
Yuki Funabiki
Takanori Isobe
2019
conf/iwsec
Preimage Attacks on Reduced Troika with Divide-and-Conquer Methods.
Fukang Liu
Takanori Isobe
2019
conf/iwsec
Tweakable TWINE: Building a Tweakable Block Cipher on Generalized Feistel Structure.
Kosei Sakamoto
Kazuhiko Minematsu
Nao Shibata
Maki Shigeri
Hiroyasu Kubo
Yuki Funabiki
Andrey Bogdanov
Sumio Morioka
Takanori Isobe
2019
conf/sacrypt
Iterative Differential Characteristic of TRIFLE-BC.
Fukang Liu
Takanori Isobe
2019
conf/sacrypt
Plaintext Recovery Attacks Against XTS Beyond Collisions.
Takanori Isobe
Kazuhiko Minematsu
2018
journals/tosc
ShiftRows Alternatives for AES-like Ciphers and Optimal Cell Permutations for Midori and Skinny.
Gianira N. Alfarano
Christof Beierle
Takanori Isobe
Stefan Kölbl
Gregor Leander
2018
journals/tosc
Towards Low Energy Stream Ciphers.
Subhadeep Banik
Vasily Mikhalev
Frederik Armknecht
Takanori Isobe
Willi Meier
Andrey Bogdanov
Yuhei Watanabe
Francesco Regazzoni
2018
conf/crypto
Improved Division Property Based Cube Attacks Exploiting Algebraic Properties of Superpoly.
Qingju Wang
Yonglin Hao
Yosuke Todo
Chaoyun Li
Takanori Isobe
Willi Meier
2018
conf/crypto
Fast Correlation Attack Revisited - Cryptanalysis on Full Grain-128a, Grain-128, and Grain-v1.
Yosuke Todo
Takanori Isobe
Willi Meier
Kazumaro Aoki
Bin Zhang
2018
conf/esorics
Breaking Message Integrity of an End-to-End Encryption Scheme of LINE.
Takanori Isobe
Kazuhiko Minematsu
2018
conf/host
Inverse gating for low energy encryption.
Subhadeep Banik
Andrey Bogdanov
Francesco Regazzoni
Takanori Isobe
Harunaga Hiwatari
Toru Akishita
2018
conf/cans
Several MILP-Aided Attacks Against SNOW 2.0.
Yuki Funabiki
Yosuke Todo
Takanori Isobe
Masakatu Morii
2017
journals/tosc
Some cryptanalytic results on Lizard.
Subhadeep Banik
Takanori Isobe
Tingting Cui
Jian Guo
2017
journals/tosc
Analysis of Software Countermeasures for Whitebox Encryption.
Subhadeep Banik
Andrey Bogdanov
Takanori Isobe
Martin Bjerregaard Jepsen
2017
conf/acisp
Improved Integral Attack on HIGHT.
Yuki Funabiki
Yosuke Todo
Takanori Isobe
Masakatu Morii
2017
conf/acisp
Conditional Differential Cryptanalysis for Kreyvium.
Yuhei Watanabe
Takanori Isobe
Masakatu Morii
2017
conf/crypto
Cube Attacks on Non-Blackbox Polynomials Based on Division Property.
Yosuke Todo
Takanori Isobe
Yonglin Hao
Willi Meier
2017
conf/asiacrypt
New Key Recovery Attacks on Minimal Two-Round Even-Mansour Ciphers.
Takanori Isobe
Kyoji Shibutani
2016
conf/fse
Cryptanalysis of the Full Spritz Stream Cipher.
Subhadeep Banik
Takanori Isobe
2016
conf/host
Round gating for low energy block ciphers.
Subhadeep Banik
Andrey Bogdanov
Francesco Regazzoni
Takanori Isobe
Harunaga Hiwatari
Toru Akishita
2016
conf/asiacrypt
Towards Practical Whitebox Cryptography: Optimizing Efficiency and Space Hardness.
Andrey Bogdanov
Takanori Isobe
Elmar Tischhauser
2015
conf/ccs
White-Box Cryptography Revisited: Space-Hard Ciphers.
Andrey Bogdanov
Takanori Isobe
2015
conf/asiacrypt
Midori: A Block Cipher for Low Energy.
Subhadeep Banik
Andrey Bogdanov
Takanori Isobe
Kyoji Shibutani
Harunaga Hiwatari
Toru Akishita
Francesco Regazzoni
2015
conf/asiacrypt
How Secure is AES Under Leakage.
Andrey Bogdanov
Takanori Isobe
2014
conf/fse
Improved All-Subkeys Recovery Attacks on FOX, KATAN and SHACAL-2 Block Ciphers.
Takanori Isobe
Kyoji Shibutani
2013
journals/joc
A Single-Key Attack on the Full GOST Block Cipher.
Takanori Isobe
2013
conf/fse
Full Plaintext Recovery Attack on Broadcast RC4.
Takanori Isobe
Toshihiro Ohigashi
Yuhei Watanabe
Masakatu Morii
2013
conf/acisp
Related-Key Boomerang Attacks on KATAN32/48/64.
Takanori Isobe
Yu Sasaki
Jiageng Chen
2013
conf/asiacrypt
Generic Key Recovery Attack on Feistel Scheme.
Takanori Isobe
Kyoji Shibutani
2013
conf/sacrypt
How to Recover Any Byte of Plaintext on RC4.
Toshihiro Ohigashi
Takanori Isobe
Yuhei Watanabe
Masakatu Morii
2012
conf/fse
Converting Meet-In-The-Middle Preimage Attack into Pseudo Collision Attack: Application to SHA-2.
Ji Li
Takanori Isobe
Kyoji Shibutani
2012
conf/acisp
Security Analysis of the Lightweight Block Ciphers XTEA, LED and Piccolo.
Takanori Isobe
Kyoji Shibutani
2012
conf/iwsec
Slide Cryptanalysis of Lightweight Stream Cipher RAKAPOSHI.
Takanori Isobe
Toshihiro Ohigashi
Masakatu Morii
2012
conf/sacrypt
All Subkeys Recovery Attack on Block Ciphers: Extending Meet-in-the-Middle Approach.
Takanori Isobe
Kyoji Shibutani
2011
conf/fse
A Single-Key Attack on the Full GOST Block Cipher.
Takanori Isobe
2011
conf/ches
Piccolo: An Ultra-Lightweight Blockcipher.
Kyoji Shibutani
Takanori Isobe
Harunaga Hiwatari
Atsushi Mitsuda
Toru Akishita
Taizo Shirai
2009
conf/fse
Preimage Attacks on Reduced Tiger and SHA-2.
Takanori Isobe
Kyoji Shibutani
Coauthors
Akinori Hosoyamada
(1)
André Schrottenloher
(1)
Andrea Caforio
(5)
Andrey Bogdanov
(9)
Atsushi Mitsuda
(1)
Atsushi Tanaka
(2)
Bin Zhang
(2)
Chaoyun Li
(1)
Christof Beierle
(1)
Christoph Dobraunig
(2)
Clémence Bouvier
(1)
Elmar Tischhauser
(1)
Florian Mendel
(2)
Francesco Regazzoni
(4)
Frederik Armknecht
(1)
Fukang Liu
(30)
Gaoli Wang
(5)
Gianira N. Alfarano
(1)
Gregor Leander
(1)
Harunaga Hiwatari
(4)
Hayato Kimura
(2)
Hiroyasu Kubo
(2)
Ji Li
(1)
Jiageng Chen
(1)
Jian Guo
(1)
Jin Hoki
(2)
Kan Yasuda
(1)
Kazuhide Fukushima
(1)
Kazuhiko Minematsu
(11)
Kazuma Taka
(4)
Kazumaro Aoki
(1)
Kazuto Ogawa
(1)
Keita Emura
(1)
Khashayar Barooti
(1)
Kodai Taiyama
(2)
Kosei Sakamoto
(25)
Kosuke Sasaki
(1)
Kyoji Shibutani
(9)
Libo Wang
(1)
Lorenzo Grassi
(1)
Maki Shigeri
(2)
Martin Bjerregaard Jepsen
(1)
Masakatu Morii
(6)
Mostafizar Rahman
(6)
Motoki Nakahashi
(2)
Nao Shibata
(2)
Nobuyuki Takeuchi
(1)
Patrick Derbez
(1)
Pierre-Alain Fouque
(1)
Qingju Wang
(1)
Ravi Anand
(6)
Rentaro Shiba
(5)
Rikuto Kurahara
(2)
Rintaro Fujita
(1)
Ryoma Ito
(15)
Samir Kundu
(1)
Santanu Sarkar
(7)
Shinsaku Kiyomoto
(2)
Shion Utsumi
(2)
Shogo Shiraki
(1)
Shoma Kawakami
(1)
Stefan Kölbl
(1)
Subhadeep Banik
(17)
Sumio Morioka
(1)
Taizo Shirai
(1)
Takanori Isobe
(91)
Takuro Shiraya
(2)
Takuya Hayashi
(1)
Tatsuya Ishikawa
(5)
Tingting Cui
(1)
Toru Akishita
(4)
Toshihiro Ohigashi
(4)
Vasily Mikhalev
(1)
Willi Meier
(20)
Yingxin Li
(1)
Yonglin Hao
(2)
Yosuke Todo
(8)
Yu Sasaki
(1)
Yuhei Watanabe
(4)
Yuji Koike
(2)
Yuki Funabiki
(4)
Yuto Nakano
(3)
Zhenfu Cao
(2)
Zhenzhen Bao
(1)
Zhonghao Yang
(1)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to