What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Yosuke Todo
Google Scholar
60
publications in security and cryptology related venues
Year
Venue
Title
2025
journals/tches
All You Need is XOR-Convolution: A Generalized Higher-Order Side-Channel Attack with Application to XEX/XE-based Encryptions.
Rei Ueno
Akira Ito
Yosuke Todo
Akiko Inoue
Kazuhiko Minematsu
Hibiki Ishikawa
Naofumi Homma
2025
conf/eurocrypt
Improved Cryptanalysis of ChaCha: Beating PNBs with Bit Puncturing.
Antonio Flórez-Gutiérrez
Yosuke Todo
2025
journals/joc
Improving Linear Key Recovery Attacks using Walsh Spectrum Puncturing.
Antonio Flórez-Gutiérrez
Yosuke Todo
2024
journals/cic
Side-Channel Linearization Attack on Unrolled Trivium Hardware.
Soichiro Kobayashi
Rei Ueno
Yosuke Todo
Naofumi Homma
2024
journals/tosc
Key Recovery, Universal Forgery, and Committing Attacks against Revised Rocca: How Finalization Affects Security.
Ryunouchi Takeuchi
Yosuke Todo
Tetsu Iwata
2024
journals/tosc
Cryptanalysis of QARMAv2.
Hosein Hadipour
Yosuke Todo
2024
conf/eurocrypt
Improving Linear Key Recovery Attacks Using Walsh Spectrum Puncturing.
Antonio Flórez-Gutiérrez
Yosuke Todo
2024
conf/asiacrypt
General Practical Cryptanalysis of the Sum of Round-Reduced Block Ciphers and ZIP-AES.
Antonio Flórez-Gutiérrez
Lorenzo Grassi
Gregor Leander
Ferdinand Sibleyras
Yosuke Todo
2024
conf/asiacrypt
Multiple-Tweak Differential Attack Against SCARF.
Christina Boura
Shahram Rasoolzadeh
Dhiman Saha
Yosuke Todo
2023
journals/tosc
Key Committing Security of AEZ and More.
Yu Long Chen
Antonio Flórez-Gutiérrez
Akiko Inoue
Ryoma Ito
Tetsu Iwata
Kazuhiko Minematsu
Nicky Mouha
Yusuke Naito
Ferdinand Sibleyras
Yosuke Todo
2023
conf/uss
SCARF - A Low-Latency Block Cipher for Secure Cache-Randomization.
Federico Canale
Tim Güneysu
Gregor Leander
Jan Philipp Thoma
Yosuke Todo
Rei Ueno
2023
conf/ctrsa
Keyed Sum of Permutations: A Simpler RP-Based PRF.
Ferdinand Sibleyras
Yosuke Todo
2022
journals/tosc
Cryptanalysis of Rocca and Feasibility of Its Security Claim.
Akinori Hosoyamada
Akiko Inoue
Ryoma Ito
Tetsu Iwata
Kazuhiko Minematsu
Ferdinand Sibleyras
Yosuke Todo
2022
journals/tosc
Hybrid Code Lifting on Space-Hard Block Ciphers Application to Yoroi and SPNbox.
Yosuke Todo
Takanori Isobe
2022
journals/joc
Improved Differential-Linear Attacks with Applications to ARX Ciphers.
Christof Beierle
Marek Broll
Federico Canale
Nicolas David
Antonio Flórez-Gutiérrez
Gregor Leander
María Naya-Plasencia
Yosuke Todo
2022
conf/ctrsa
New Attacks from Old Distinguishers Improved Attacks on Serpent.
Marek Broll
Federico Canale
Nicolas David
Antonio Flórez-Gutiérrez
Gregor Leander
María Naya-Plasencia
Yosuke Todo
2022
conf/iwsec
Birthday-Bound Slide Attacks on TinyJAMBU's Keyed-Permutations for All Key Sizes.
Ferdinand Sibleyras
Yu Sasaki
Yosuke Todo
Akinori Hosoyamada
Kan Yasuda
2022
conf/asiacrypt
A Modular Approach to the Incompressibility of Block-Cipher-Based AEADs.
Akinori Hosoyamada
Takanori Isobe
Yosuke Todo
Kan Yasuda
2021
journals/tosc
Perfect Trees: Designing Energy-Optimal Symmetric Encryption Primitives.
Andrea Caforio
Subhadeep Banik
Yosuke Todo
Willi Meier
Takanori Isobe
Fukang Liu
Bin Zhang
2021
journals/joc
Modeling for Three-Subset Division Property without Unknown Subset.
Yonglin Hao
Gregor Leander
Willi Meier
Yosuke Todo
Qingju Wang
2021
conf/asiacrypt
Massive Superpoly Recovery with Nested Monomial Predictions.
Kai Hu
Siwei Sun
Yosuke Todo
Meiqin Wang
Qingju Wang
2021
conf/asiacrypt
Strong and Tight Security Guarantees Against Integral Distinguishers.
Phil Hebborn
Baptiste Lambin
Gregor Leander
Yosuke Todo
2021
conf/sacrypt
Designing S-Boxes Providing Stronger Security Against Differential Cryptanalysis for Ciphers Using Byte-Wise XOR.
Yosuke Todo
Yu Sasaki
2020
journals/tosc
Links between Division Property and Other Cube Attack Variants.
Yonglin Hao
Lin Jiao
Chaoyun Li
Willi Meier
Yosuke Todo
Qingju Wang
2020
conf/crypto
Improved Differential-Linear Attacks with Applications to ARX Ciphers.
Christof Beierle
Gregor Leander
Yosuke Todo
2020
conf/crypto
Out of Oddity - New Cryptanalytic Techniques Against Symmetric Primitives Optimized for Integrity Proof Systems.
Tim Beyne
Anne Canteaut
Itai Dinur
Maria Eichlseder
Gregor Leander
Gaëtan Leurent
María Naya-Plasencia
Léo Perrin
Yu Sasaki
Yosuke Todo
Friedrich Wiemer
2020
conf/eurocrypt
Modeling for Three-Subset Division Property Without Unknown Subset - Improved Cube Attacks Against Trivium and Grain-128AEAD.
Yonglin Hao
Gregor Leander
Willi Meier
Yosuke Todo
Qingju Wang
2020
conf/asiacrypt
Lower Bounds on the Degree of Block Ciphers.
Phil Hebborn
Baptiste Lambin
Gregor Leander
Yosuke Todo
2020
conf/sacrypt
PRINCEv2 - More Security for (Almost) No Overhead.
Dusan Bozilov
Maria Eichlseder
Miroslav Knezevic
Baptiste Lambin
Gregor Leander
Thorben Moos
Ventzislav Nikov
Shahram Rasoolzadeh
Yosuke Todo
Friedrich Wiemer
2019
journals/tosc
Zero-Correlation Attacks on Tweakable Block Ciphers with Linear Tweakey Expansion.
Ralph Ankele
Christoph Dobraunig
Jian Guo
Eran Lambooij
Gregor Leander
Yosuke Todo
2019
journals/joc
Nonlinear Invariant Attack: Practical Attack on Full SCREAM, iSCREAM, and Midori64.
Yosuke Todo
Gregor Leander
Yu Sasaki
2019
conf/sacrypt
On the Data Limitation of Small-State Stream Ciphers: Correlation Attacks on Fruit-80 and Plantlet.
Yosuke Todo
Willi Meier
Kazumaro Aoki
2018
journals/tosc
Cryptanalysis of AES-PRF and Its Dual.
Patrick Derbez
Tetsu Iwata
Ling Sun
Siwei Sun
Yosuke Todo
Haoyang Wang
Meiqin Wang
2018
conf/crypto
Improved Division Property Based Cube Attacks Exploiting Algebraic Properties of Superpoly.
Qingju Wang
Yonglin Hao
Yosuke Todo
Chaoyun Li
Takanori Isobe
Willi Meier
2018
conf/crypto
Fast Correlation Attack Revisited - Cryptanalysis on Full Grain-128a, Grain-128, and Grain-v1.
Yosuke Todo
Takanori Isobe
Willi Meier
Kazumaro Aoki
Bin Zhang
2018
conf/asiacrypt
Programming the Demirci-Selçuk Meet-in-the-Middle Attack with Constraints.
Danping Shi
Siwei Sun
Patrick Derbez
Yosuke Todo
Bing Sun
Lei Hu
2018
conf/cans
Several MILP-Aided Attacks Against SNOW 2.0.
Yuki Funabiki
Yosuke Todo
Takanori Isobe
Masakatu Morii
2017
journals/tosc
Analysis of AES, SKINNY, and Others with Constraint Programming.
Siwei Sun
David Gérault
Pascal Lafourcade
Qianqian Yang
Yosuke Todo
Kexin Qiao
Lei Hu
2017
journals/tosc
MILP Modeling for (Large) S-boxes to Optimize Probability of Differential Characteristics.
Ahmed Abdelkhalek
Yu Sasaki
Yosuke Todo
Mohamed Tolba
Amr M. Youssef
2017
journals/joc
Integral Cryptanalysis on Full MISTY1.
Yosuke Todo
2017
conf/acisp
Improved Integral Attack on HIGHT.
Yuki Funabiki
Yosuke Todo
Takanori Isobe
Masakatu Morii
2017
conf/crypto
Cube Attacks on Non-Blackbox Polynomials Based on Division Property.
Yosuke Todo
Takanori Isobe
Yonglin Hao
Willi Meier
2017
conf/ches
Gimli : A Cross-Platform Permutation.
Daniel J. Bernstein
Stefan Kölbl
Stefan Lucks
Pedro Maat Costa Massolino
Florian Mendel
Kashif Nawaz
Tobias Schneider
Peter Schwabe
François-Xavier Standaert
Yosuke Todo
Benoît Viguier
2017
conf/ches
GIFT: A Small Present - Towards Reaching the Limit of Lightweight Encryption.
Subhadeep Banik
Sumit Kumar Pandey
Thomas Peyrin
Yu Sasaki
Siang Meng Sim
Yosuke Todo
2017
conf/iwsec
Analyzing Key Schedule of Simon: Iterative Key Differences and Application to Related-Key Impossible Differentials.
Kota Kondo
Yu Sasaki
Yosuke Todo
Tetsu Iwata
2017
conf/eurocrypt
New Impossible Differential Search Tool from Design and Cryptanalysis Aspects - Revealing Structural Properties of Several Ciphers.
Yu Sasaki
Yosuke Todo
2016
conf/fse
Bit-Based Division Property and Application to Simon Family.
Yosuke Todo
Masakatu Morii
2016
conf/asiajcis
New Conditional Differential Cryptanalysis for NLFSR-based Stream Ciphers and Application to Grain v1.
Yuhei Watanabe
Yosuke Todo
Masakatu Morii
2016
conf/acns
Wide Trail Design Strategy for Binary MixColumns - Enhancing Lower Bound of Number of Active S-boxes.
Yosuke Todo
Kazumaro Aoki
2016
conf/asiacrypt
Nonlinear Invariant Attack - Practical Attack on Full SCREAM, iSCREAM, and Midori64.
Yosuke Todo
Gregor Leander
Yu Sasaki
2016
conf/sacrypt
New Differential Bounds and Division Property of Lilliput: Block Cipher with Extended Generalized Feistel Network.
Yu Sasaki
Yosuke Todo
2016
conf/cans
Compact Representation for Division Property.
Yosuke Todo
Masakatu Morii
2015
conf/crypto
Integral Cryptanalysis on Full MISTY1.
Yosuke Todo
2015
conf/eurocrypt
Structural Evaluation by Generalized Integral Property.
Yosuke Todo
2014
conf/icisc
How Much Can Complexity of Linear Cryptanalysis Be Reduced?
Sho Sakikoyama
Yosuke Todo
Kazumaro Aoki
Masakatu Morii
2014
conf/pkc
Practical Cryptanalysis of a Public-Key Encryption Scheme Based on New Multivariate Quadratic Assumptions.
Martin R. Albrecht
Jean-Charles Faugère
Robert Fitzpatrick
Ludovic Perret
Yosuke Todo
Keita Xagawa
2014
conf/cans
FFT Key Recovery for Integral Attack.
Yosuke Todo
Kazumaro Aoki
2013
conf/acisp
Upper Bounds for the Security of Several Feistel Networks.
Yosuke Todo
2013
conf/iwsec
New Property of Diffusion Switching Mechanism on CLEFIA and Its Application to DFA.
Yosuke Todo
Yu Sasaki
2012
conf/asiajcis
Proposal of a Secure WEP Operation against Existing Key Recovery Attacks and its Evaluation.
T. Tsukaune
Yosuke Todo
Masakatu Morii
Coauthors
Ahmed Abdelkhalek
(1)
Akiko Inoue
(3)
Akinori Hosoyamada
(3)
Akira Ito
(1)
Amr M. Youssef
(1)
Andrea Caforio
(1)
Anne Canteaut
(1)
Antonio Flórez-Gutiérrez
(7)
Baptiste Lambin
(3)
Benoît Viguier
(1)
Bin Zhang
(2)
Bing Sun
(1)
Chaoyun Li
(2)
Christina Boura
(1)
Christof Beierle
(2)
Christoph Dobraunig
(1)
Daniel J. Bernstein
(1)
Danping Shi
(1)
David Gérault
(1)
Dhiman Saha
(1)
Dusan Bozilov
(1)
Eran Lambooij
(1)
Federico Canale
(3)
Ferdinand Sibleyras
(5)
Florian Mendel
(1)
François-Xavier Standaert
(1)
Friedrich Wiemer
(2)
Fukang Liu
(1)
Gaëtan Leurent
(1)
Gregor Leander
(14)
Haoyang Wang
(1)
Hibiki Ishikawa
(1)
Hosein Hadipour
(1)
Itai Dinur
(1)
Jan Philipp Thoma
(1)
Jean-Charles Faugère
(1)
Jian Guo
(1)
Kai Hu
(1)
Kan Yasuda
(2)
Kashif Nawaz
(1)
Kazuhiko Minematsu
(3)
Kazumaro Aoki
(5)
Keita Xagawa
(1)
Kexin Qiao
(1)
Kota Kondo
(1)
Lei Hu
(2)
Léo Perrin
(1)
Lin Jiao
(1)
Ling Sun
(1)
Lorenzo Grassi
(1)
Ludovic Perret
(1)
Marek Broll
(2)
Maria Eichlseder
(2)
María Naya-Plasencia
(3)
Martin R. Albrecht
(1)
Masakatu Morii
(7)
Meiqin Wang
(2)
Miroslav Knezevic
(1)
Mohamed Tolba
(1)
Naofumi Homma
(2)
Nicky Mouha
(1)
Nicolas David
(2)
Pascal Lafourcade
(1)
Patrick Derbez
(2)
Pedro Maat Costa Massolino
(1)
Peter Schwabe
(1)
Phil Hebborn
(2)
Qianqian Yang
(1)
Qingju Wang
(5)
Ralph Ankele
(1)
Rei Ueno
(3)
Robert Fitzpatrick
(1)
Ryoma Ito
(2)
Ryunouchi Takeuchi
(1)
Shahram Rasoolzadeh
(2)
Sho Sakikoyama
(1)
Siang Meng Sim
(1)
Siwei Sun
(4)
Soichiro Kobayashi
(1)
Stefan Kölbl
(1)
Stefan Lucks
(1)
Subhadeep Banik
(2)
Sumit Kumar Pandey
(1)
T. Tsukaune
(1)
Takanori Isobe
(8)
Tetsu Iwata
(5)
Thomas Peyrin
(1)
Thorben Moos
(1)
Tim Beyne
(1)
Tim Güneysu
(1)
Tobias Schneider
(1)
Ventzislav Nikov
(1)
Willi Meier
(8)
Yonglin Hao
(5)
Yosuke Todo
(60)
Yu Long Chen
(1)
Yu Sasaki
(11)
Yuhei Watanabe
(1)
Yuki Funabiki
(2)
Yusuke Naito
(1)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to