Edit Profile Sasaki, Yu Compute Distance To: Compute Author ID: sasaki.yu Published as: Sasaki, Y.; Sasaki, Yu Documents Indexed: 100 Publications since 2006 all top 5 Co-Authors 12 single-authored 27 Wang, Lei 17 Ohta, Kazuo 9 Aoki, Kazumaro 9 Sakiyama, Kazuo 9 Todo, Yosuke 8 Kunihiro, Noboru 7 Hosoyamada, Akinori 6 Guo, Jian 6 Nikolić, Ivica 6 Peyrin, Thomas 6 Shimoyama, Takeshi 5 Jean, Jérémy 5 Naito, Yusuke 5 Yasuda, Kan 4 Iwata, Tetsu 4 Leander, Gregor 3 Iwamoto, Mitsugu 3 Mendel, Florian 3 Ohtahara, Chiaki 3 Xagawa, Keita 3 Yajima, Jun 2 Bagheri, Nasour 2 Banik, Subhadeep 2 Huang, Tao 2 Kondo, Kota 2 Koyama, Takuma 2 Li, Yang 2 Liu, Yunwen 2 Matusiewicz, Krystian 2 Naya-Plasencia, María 2 Okada, Keita 2 Sim, Siang Meng 2 Song, Ling 2 Tani, Seiichiro 2 Wu, Shuang 1 Ashur, Tomer 1 Beierle, Christof 1 Bonnetain, Xavier 1 Bossert, Jannis 1 Chen, Jiageng 1 Cid, Carlos Frederico 1 Dunkelman, Orr 1 Eichlseder, Maria 1 Emami, Sareh 1 Hong, Deukjo 1 Hu, Lei 1 Isobe, Takanori 1 Ito, Gembu 1 Iwasaki, Terutoshi 1 Jana, Amit 1 Jia, Keting 1 Jovanovic, Philipp 1 Keller, Nathan 1 Kölbl, Stefan 1 Komatsubara, Wataru 1 Kumar Pandey, Sumit 1 Kumar, Ashish 1 Lallemand, Virginie 1 Lambooij, Eran 1 Lauridsen, Martin M. 1 Leurent, Gaëtan 1 Li, Chaoyun 1 List, Eik 1 Liu, Zhiqiang 1 Lucks, Stefan 1 Luykx, Atul 1 Matsumoto, Ryutaroh 1 Meier, Willi 1 Mennink, Bart 1 Minaud, Brice 1 Moradi, Amir 1 Nakasone, Toshiki 1 Rahman, Mostafizar 1 Rijmen, Vincent 1 Rotella, Yann 1 Saha, Dhiman 1 Sakai, Yusuke 1 Sasdrich, Pascal 1 Schläffer, Martin 1 Schrottenloher, André 1 Shi, Danping 1 Sun, Siwei 1 Takasaki, Yasuhiro 1 Takayanagi, Naoyuki 1 Tokushige, Yuuki 1 Varıcı, Kerem 1 Viguier, Benoît 1 Wang, Gaoli 1 Wang, Meiqin 1 Wang, Qingju 1 Wen, Long 1 Wu, Wenling Serials 3 Journal of Cryptology 1 IEEE Transactions on Computers 1 Theoretical Computer Science 1 Designs, Codes and Cryptography Fields 96 Information and communication theory, circuits (94-XX) 18 Computer science (68-XX) 3 Quantum theory (81-XX) 1 Combinatorics (05-XX) 1 Operations research, mathematical programming (90-XX) Publications by Year all cited Publications top 5 cited Publications Citations contained in zbMATH 63 Publications have been cited 226 times in 115 Documents Cited by ▼ Year ▼ Finding preimages in full MD5 faster than exhaustive search. Zbl 1239.94064Sasaki, Yu; Aoki, Kazumaro 22 2009 Preimage attacks on one-block MD4, 63-step MD5 and more. Zbl 1256.94040Aoki, Kazumaro; Sasaki, Yu 19 2009 The \(\mathtt{SKINNY}\) family of block ciphers and its low-latency variant \(\mathtt{MANTIS}\). Zbl 1372.94412Beierle, Christof; Jean, Jérémy; Kölbl, Stefan; Leander, Gregor; Moradi, Amir; Peyrin, Thomas; Sasaki, Yu; Sasdrich, Pascal; Sim, Siang Meng 14 2016 Rebound attack on the full Lane compression function. Zbl 1267.94083Matusiewicz, Krystian; Naya-Plasencia, María; Nikolić, Ivica; Sasaki, Yu; Schläffer, Martin 13 2009 Preimages for step-reduced SHA-2. Zbl 1267.94030Aoki, Kazumaro; Guo, Jian; Matusiewicz, Krystian; Sasaki, Yu; Wang, Lei 10 2009 Meet-in-the-middle preimage attacks against reduced SHA-0 and SHA-1. Zbl 1252.94043Aoki, Kazumaro; Sasaki, Yu 9 2009 Non-full-active Super-Sbox analysis: applications to ECHO and Grøstl. Zbl 1253.94067Sasaki, Yu; Li, Yang; Wang, Lei; Sakiyama, Kazuo; Ohta, Kazuo 7 2010 Preimage attacks on 3, 4, and 5-pass HAVAL. Zbl 1206.94089Sasaki, Yu; Aoki, Kazumaro 7 2008 Boomerang Connectivity Table: a new cryptanalysis tool. Zbl 1428.94065Cid, Carlos; Huang, Tao; Peyrin, Thomas; Sasaki, Yu; Song, Ling 6 2018 Nonlinear invariant attack. Practical attack on full SCREAM, iSCREAM, and Midori64. Zbl 1380.94126Todo, Yosuke; Leander, Gregor; Sasaki, Yu 6 2016 Known-key distinguishers on 11-round Feistel and collision attacks on its hashing modes. Zbl 1307.94095Sasaki, Yu; Yasuda, Kan 6 2011 New impossible differential search tool from design and cryptanalysis aspects. Revealing structural properties of several ciphers. Zbl 1394.94941Sasaki, Yu; Todo, Yosuke 5 2017 Meet-in-the-middle preimage attacks on AES hashing modes and an application to Whirlpool. Zbl 1307.94094Sasaki, Yu 5 2011 Meet-in-the-middle technique for integral attacks against Feistel ciphers. Zbl 1327.94073Sasaki, Yu; Wang, Lei 4 2013 Generic state-recovery and forgery attacks on chopmd-MAC and on NMAC/HMAC. Zbl 1414.94914Naito, Yusuke; Sasaki, Yu; Wang, Lei; Yasuda, Kan 4 2013 Limited-birthday distinguishers for hash functions. Collisions beyond the birthday bound can be meaningful. Zbl 1314.94076Iwamoto, Mitsugu; Peyrin, Thomas; Sasaki, Yu 4 2013 Generic related-key attacks for HMAC. Zbl 1292.94128Peyrin, Thomas; Sasaki, Yu; Wang, Lei 4 2012 Preimage attacks on step-reduced RIPEMD-128 and RIPEMD-160. Zbl 1295.94121Ohtahara, Chiaki; Sasaki, Yu; Shimoyama, Takeshi 4 2011 Meet-in-the-middle preimage attacks on double-branch hash functions: application to RIPEMD and others. Zbl 1284.94107Sasaki, Yu; Aoki, Kazumaro 4 2009 Preimage attacks on step-reduced MD5. Zbl 1285.94094Sasaki, Yu; Aoki, Kazumaro 4 2008 Quantum multicollision-finding algorithm. Zbl 1380.81087Hosoyamada, Akinori; Sasaki, Yu; Xagawa, Keita 3 2017 Cryptanalysis of reduced-round SIMON32 and SIMON48. Zbl 1344.94077Wang, Qingju; Liu, Zhiqiang; Varıcı, Kerem; Sasaki, Yu; Rijmen, Vincent; Todo, Yosuke 3 2014 Three-subset meet-in-the-middle attack on reduced XTEA. Zbl 1304.94083Sasaki, Yu; Wang, Lei; Sakai, Yasuhide; Sakiyama, Kazuo; Ohta, Kazuo 3 2012 Boomerang distinguishers on MD4-family: first practical results on full 5-pass HAVAL. Zbl 1279.94114Sasaki, Yu 3 2012 (Second) preimage attacks on step-reduced RIPEMD/RIPEMD-128 with a new local-collision approach. Zbl 1284.94123Wang, Lei; Sasaki, Yu; Komatsubara, Wataru; Ohta, Kazuo; Sakiyama, Kazuo 3 2011 New message difference for MD4. Zbl 1186.94469Sasaki, Yu; Wang, Lei; Ohta, Kazuo; Kunihiro, Noboru 3 2007 Cryptanalysis of reduced NORX. Zbl 1385.94009Bagheri, Nasour; Huang, Tao; Jia, Keting; Mendel, Florian; Sasaki, Yu 2 2016 Refinements of the \(k\)-tree algorithm for the generalized birthday problem. Zbl 1382.94147Nikolić, Ivica; Sasaki, Yu 2 2015 How to incorporate associated data in sponge-based authenticated encryption. Zbl 1382.94158Sasaki, Yu; Yasuda, Kan 2 2015 Equivalent key recovery attacks against HMAC and NMAC with whirlpool reduced to 7 rounds. Zbl 1382.94115Guo, Jian; Sasaki, Yu; Wang, Lei; Wang, Meiqin; Wen, Long 2 2015 Meet-in-the-middle attacks on generic Feistel constructions. Zbl 1306.94058Guo, Jian; Jean, Jérémy; Nikolić, Ivica; Sasaki, Yu 2 2014 Updates on generic attacks against HMAC and NMAC. Zbl 1343.94059Guo, Jian; Peyrin, Thomas; Sasaki, Yu; Wang, Lei 2 2014 Cryptanalysis of HMAC/NMAC-Whirlpool. Zbl 1314.94070Guo, Jian; Sasaki, Yu; Wang, Lei; Wu, Shuang 2 2013 Comprehensive study of integral analysis on 22-round LBlock. Zbl 1342.94094Sasaki, Yu; Wang, Lei 2 2013 Investigating fundamental security requirements on whirlpool: improved preimage and collision attacks. Zbl 1292.94134Sasaki, Yu; Wang, Lei; Wu, Shuang; Wu, Wenling 2 2012 Improved known-key distinguishers on Feistel-SP ciphers and application to Camellia. Zbl 1305.94077Sasaki, Yu; Emami, Sareh; Hong, Deukjo; Kumar, Ashish 2 2012 Experimental verification of super-Sbox analysis – confirmation of detailed attack complexity. Zbl 1344.94072Sasaki, Yu; Takayanagi, Naoyuki; Sakiyama, Kazuo; Ohta, Kazuo 2 2011 Security of MD5 challenge and response: Extension of APOP password recovery attack. Zbl 1153.94428Sasaki, Yu; Wang, Lei; Ohta, Kazuo; Kunihiro, Noboru 2 2008 How to construct sufficient conditions for hash functions. Zbl 1295.94142Sasaki, Yu; Naito, Yusuke; Yajima, Jun; Shimoyama, Takeshi; Kunihiro, Noboru; Ohta, Kazuo 2 2006 Improved collision search for SHA-0. Zbl 1172.94591Naito, Yusuke; Sasaki, Yu; Shimoyama, Takeshi; Yajima, Jun; Kunihiro, Noboru; Ohta, Kazuo 2 2006 Improved quantum multicollision-finding algorithm. Zbl 07173872Hosoyamada, Akinori; Sasaki, Yu; Tani, Seiichiro; Xagawa, Keita 1 2019 Quantum chosen-ciphertext attacks against Feistel ciphers. Zbl 07158421Ito, Gembu; Hosoyamada, Akinori; Matsumoto, Ryutaroh; Sasaki, Yu; Iwata, Tetsu 1 2019 Nonlinear invariant attack: practical attack on full SCREAM, iSCREAM, and Midori64. Zbl 1435.94141Todo, Yosuke; Leander, Gregor; Sasaki, Yu 1 2019 Cryptanalysis against symmetric-key schemes with online classical queries and offline quantum computations. Zbl 07154103Hosoyamada, Akinori; Sasaki, Yu 1 2018 Integer linear programming for three-subset meet-in-the-middle attacks: application to GIFT. Zbl 1398.94157Sasaki, Yu 1 2018 Quantum Demiric-Selçuk meet-in-the-middle attacks: applications to 6-round generic Feistel constructions. Zbl 06957564Hosoyamada, Akinori; Sasaki, Yu 1 2018 Tight bounds of differentially and linearly active S-boxes and division property of Lilliput. Zbl 1395.94311Sasaki, Yu; Todo, Yosuke 1 2018 New differential bounds and division property of Lilliput: block cipher with extended generalized Feistel network. Zbl 1412.94207Sasaki, Yu; Todo, Yosuke 1 2017 A new algorithm for the unbalanced meet-in-the-middle problem. Zbl 1404.94102Nikolić, Ivica; Sasaki, Yu 1 2016 On the design rationale of Simon block cipher: integral attacks and impossible differential attacks against Simon variants. Zbl 1348.94062Kondo, Kota; Sasaki, Yu; Iwata, Tetsu 1 2016 Analysis of the CAESAR candidate silver. Zbl 1396.94085Jean, Jérémy; Sasaki, Yu; Wang, Lei 1 2016 Practical cryptanalysis of PAES. Zbl 1382.94125Jean, Jérémy; Nikolić, Ivica; Sasaki, Yu; Wang, Lei 1 2014 Generic attacks on strengthened HMAC: \(n\)-bit secure HMAC requires key in all blocks. Zbl 1423.68158Sasaki, Yu; Wang, Lei 1 2014 Memoryless unbalanced meet-in-the-middle attacks: impossible results and applications. Zbl 1353.94072Sasaki, Yu 1 2014 Related-key boomerang attacks on KATAN32/48/64. Zbl 1316.94079Isobe, Takanori; Sasaki, Yu; Chen, Jiageng 1 2013 Multi-differential cryptanalysis on reduced DM-PRESENT-80: collisions and other differential properties. Zbl 1342.94078Koyama, Takuma; Sasaki, Yu; Kunihiro, Noboru 1 2013 Boomerang distinguishers for full HAS-160 compression function. Zbl 1292.94133Sasaki, Yu; Wang, Lei; Takasaki, Yasuhiro; Sakiyama, Kazuo; Ohta, Kazuo 1 2012 Improved integral analysis on tweaked Lesamnta. Zbl 1301.94127Sasaki, Yu; Aoki, Kazumaro 1 2012 Cryptanalyses on a Merkle-Damgård based MAC – almost universal forgery and distinguishing-\(H\) attacks. Zbl 1297.94099Sasaki, Yu 1 2012 Finding preimages of Tiger up to 23 steps. Zbl 1285.94100Wang, Lei; Sasaki, Yu 1 2010 Cryptanalyses of narrow-pipe mode of operation in AURORA-512 hash function. Zbl 1267.94093Sasaki, Yu 1 2009 Meet-in-the-middle attacks using output truncation in 3-pass HAVAL. Zbl 1307.94093Sasaki, Yu 1 2009 Password recovery on challenge and response: Impossible differential attack on hash function. Zbl 1142.94359Sasaki, Yu; Wang, Lei; Ohta, Kazuo; Kunihiro, Noboru 1 2008 Improved quantum multicollision-finding algorithm. Zbl 07173872Hosoyamada, Akinori; Sasaki, Yu; Tani, Seiichiro; Xagawa, Keita 1 2019 Quantum chosen-ciphertext attacks against Feistel ciphers. Zbl 07158421Ito, Gembu; Hosoyamada, Akinori; Matsumoto, Ryutaroh; Sasaki, Yu; Iwata, Tetsu 1 2019 Nonlinear invariant attack: practical attack on full SCREAM, iSCREAM, and Midori64. Zbl 1435.94141Todo, Yosuke; Leander, Gregor; Sasaki, Yu 1 2019 Boomerang Connectivity Table: a new cryptanalysis tool. Zbl 1428.94065Cid, Carlos; Huang, Tao; Peyrin, Thomas; Sasaki, Yu; Song, Ling 6 2018 Cryptanalysis against symmetric-key schemes with online classical queries and offline quantum computations. Zbl 07154103Hosoyamada, Akinori; Sasaki, Yu 1 2018 Integer linear programming for three-subset meet-in-the-middle attacks: application to GIFT. Zbl 1398.94157Sasaki, Yu 1 2018 Quantum Demiric-Selçuk meet-in-the-middle attacks: applications to 6-round generic Feistel constructions. Zbl 06957564Hosoyamada, Akinori; Sasaki, Yu 1 2018 Tight bounds of differentially and linearly active S-boxes and division property of Lilliput. Zbl 1395.94311Sasaki, Yu; Todo, Yosuke 1 2018 New impossible differential search tool from design and cryptanalysis aspects. Revealing structural properties of several ciphers. Zbl 1394.94941Sasaki, Yu; Todo, Yosuke 5 2017 Quantum multicollision-finding algorithm. Zbl 1380.81087Hosoyamada, Akinori; Sasaki, Yu; Xagawa, Keita 3 2017 New differential bounds and division property of Lilliput: block cipher with extended generalized Feistel network. Zbl 1412.94207Sasaki, Yu; Todo, Yosuke 1 2017 The \(\mathtt{SKINNY}\) family of block ciphers and its low-latency variant \(\mathtt{MANTIS}\). Zbl 1372.94412Beierle, Christof; Jean, Jérémy; Kölbl, Stefan; Leander, Gregor; Moradi, Amir; Peyrin, Thomas; Sasaki, Yu; Sasdrich, Pascal; Sim, Siang Meng 14 2016 Nonlinear invariant attack. Practical attack on full SCREAM, iSCREAM, and Midori64. Zbl 1380.94126Todo, Yosuke; Leander, Gregor; Sasaki, Yu 6 2016 Cryptanalysis of reduced NORX. Zbl 1385.94009Bagheri, Nasour; Huang, Tao; Jia, Keting; Mendel, Florian; Sasaki, Yu 2 2016 A new algorithm for the unbalanced meet-in-the-middle problem. Zbl 1404.94102Nikolić, Ivica; Sasaki, Yu 1 2016 On the design rationale of Simon block cipher: integral attacks and impossible differential attacks against Simon variants. Zbl 1348.94062Kondo, Kota; Sasaki, Yu; Iwata, Tetsu 1 2016 Analysis of the CAESAR candidate silver. Zbl 1396.94085Jean, Jérémy; Sasaki, Yu; Wang, Lei 1 2016 Refinements of the \(k\)-tree algorithm for the generalized birthday problem. Zbl 1382.94147Nikolić, Ivica; Sasaki, Yu 2 2015 How to incorporate associated data in sponge-based authenticated encryption. Zbl 1382.94158Sasaki, Yu; Yasuda, Kan 2 2015 Equivalent key recovery attacks against HMAC and NMAC with whirlpool reduced to 7 rounds. Zbl 1382.94115Guo, Jian; Sasaki, Yu; Wang, Lei; Wang, Meiqin; Wen, Long 2 2015 Cryptanalysis of reduced-round SIMON32 and SIMON48. Zbl 1344.94077Wang, Qingju; Liu, Zhiqiang; Varıcı, Kerem; Sasaki, Yu; Rijmen, Vincent; Todo, Yosuke 3 2014 Meet-in-the-middle attacks on generic Feistel constructions. Zbl 1306.94058Guo, Jian; Jean, Jérémy; Nikolić, Ivica; Sasaki, Yu 2 2014 Updates on generic attacks against HMAC and NMAC. Zbl 1343.94059Guo, Jian; Peyrin, Thomas; Sasaki, Yu; Wang, Lei 2 2014 Practical cryptanalysis of PAES. Zbl 1382.94125Jean, Jérémy; Nikolić, Ivica; Sasaki, Yu; Wang, Lei 1 2014 Generic attacks on strengthened HMAC: \(n\)-bit secure HMAC requires key in all blocks. Zbl 1423.68158Sasaki, Yu; Wang, Lei 1 2014 Memoryless unbalanced meet-in-the-middle attacks: impossible results and applications. Zbl 1353.94072Sasaki, Yu 1 2014 Meet-in-the-middle technique for integral attacks against Feistel ciphers. Zbl 1327.94073Sasaki, Yu; Wang, Lei 4 2013 Generic state-recovery and forgery attacks on chopmd-MAC and on NMAC/HMAC. Zbl 1414.94914Naito, Yusuke; Sasaki, Yu; Wang, Lei; Yasuda, Kan 4 2013 Limited-birthday distinguishers for hash functions. Collisions beyond the birthday bound can be meaningful. Zbl 1314.94076Iwamoto, Mitsugu; Peyrin, Thomas; Sasaki, Yu 4 2013 Cryptanalysis of HMAC/NMAC-Whirlpool. Zbl 1314.94070Guo, Jian; Sasaki, Yu; Wang, Lei; Wu, Shuang 2 2013 Comprehensive study of integral analysis on 22-round LBlock. Zbl 1342.94094Sasaki, Yu; Wang, Lei 2 2013 Related-key boomerang attacks on KATAN32/48/64. Zbl 1316.94079Isobe, Takanori; Sasaki, Yu; Chen, Jiageng 1 2013 Multi-differential cryptanalysis on reduced DM-PRESENT-80: collisions and other differential properties. Zbl 1342.94078Koyama, Takuma; Sasaki, Yu; Kunihiro, Noboru 1 2013 Generic related-key attacks for HMAC. Zbl 1292.94128Peyrin, Thomas; Sasaki, Yu; Wang, Lei 4 2012 Three-subset meet-in-the-middle attack on reduced XTEA. Zbl 1304.94083Sasaki, Yu; Wang, Lei; Sakai, Yasuhide; Sakiyama, Kazuo; Ohta, Kazuo 3 2012 Boomerang distinguishers on MD4-family: first practical results on full 5-pass HAVAL. Zbl 1279.94114Sasaki, Yu 3 2012 Investigating fundamental security requirements on whirlpool: improved preimage and collision attacks. Zbl 1292.94134Sasaki, Yu; Wang, Lei; Wu, Shuang; Wu, Wenling 2 2012 Improved known-key distinguishers on Feistel-SP ciphers and application to Camellia. Zbl 1305.94077Sasaki, Yu; Emami, Sareh; Hong, Deukjo; Kumar, Ashish 2 2012 Boomerang distinguishers for full HAS-160 compression function. Zbl 1292.94133Sasaki, Yu; Wang, Lei; Takasaki, Yasuhiro; Sakiyama, Kazuo; Ohta, Kazuo 1 2012 Improved integral analysis on tweaked Lesamnta. Zbl 1301.94127Sasaki, Yu; Aoki, Kazumaro 1 2012 Cryptanalyses on a Merkle-Damgård based MAC – almost universal forgery and distinguishing-\(H\) attacks. Zbl 1297.94099Sasaki, Yu 1 2012 Known-key distinguishers on 11-round Feistel and collision attacks on its hashing modes. Zbl 1307.94095Sasaki, Yu; Yasuda, Kan 6 2011 Meet-in-the-middle preimage attacks on AES hashing modes and an application to Whirlpool. Zbl 1307.94094Sasaki, Yu 5 2011 Preimage attacks on step-reduced RIPEMD-128 and RIPEMD-160. Zbl 1295.94121Ohtahara, Chiaki; Sasaki, Yu; Shimoyama, Takeshi 4 2011 (Second) preimage attacks on step-reduced RIPEMD/RIPEMD-128 with a new local-collision approach. Zbl 1284.94123Wang, Lei; Sasaki, Yu; Komatsubara, Wataru; Ohta, Kazuo; Sakiyama, Kazuo 3 2011 Experimental verification of super-Sbox analysis – confirmation of detailed attack complexity. Zbl 1344.94072Sasaki, Yu; Takayanagi, Naoyuki; Sakiyama, Kazuo; Ohta, Kazuo 2 2011 Non-full-active Super-Sbox analysis: applications to ECHO and Grøstl. Zbl 1253.94067Sasaki, Yu; Li, Yang; Wang, Lei; Sakiyama, Kazuo; Ohta, Kazuo 7 2010 Finding preimages of Tiger up to 23 steps. Zbl 1285.94100Wang, Lei; Sasaki, Yu 1 2010 Finding preimages in full MD5 faster than exhaustive search. Zbl 1239.94064Sasaki, Yu; Aoki, Kazumaro 22 2009 Preimage attacks on one-block MD4, 63-step MD5 and more. Zbl 1256.94040Aoki, Kazumaro; Sasaki, Yu 19 2009 Rebound attack on the full Lane compression function. Zbl 1267.94083Matusiewicz, Krystian; Naya-Plasencia, María; Nikolić, Ivica; Sasaki, Yu; Schläffer, Martin 13 2009 Preimages for step-reduced SHA-2. Zbl 1267.94030Aoki, Kazumaro; Guo, Jian; Matusiewicz, Krystian; Sasaki, Yu; Wang, Lei 10 2009 Meet-in-the-middle preimage attacks against reduced SHA-0 and SHA-1. Zbl 1252.94043Aoki, Kazumaro; Sasaki, Yu 9 2009 Meet-in-the-middle preimage attacks on double-branch hash functions: application to RIPEMD and others. Zbl 1284.94107Sasaki, Yu; Aoki, Kazumaro 4 2009 Cryptanalyses of narrow-pipe mode of operation in AURORA-512 hash function. Zbl 1267.94093Sasaki, Yu 1 2009 Meet-in-the-middle attacks using output truncation in 3-pass HAVAL. Zbl 1307.94093Sasaki, Yu 1 2009 Preimage attacks on 3, 4, and 5-pass HAVAL. Zbl 1206.94089Sasaki, Yu; Aoki, Kazumaro 7 2008 Preimage attacks on step-reduced MD5. Zbl 1285.94094Sasaki, Yu; Aoki, Kazumaro 4 2008 Security of MD5 challenge and response: Extension of APOP password recovery attack. Zbl 1153.94428Sasaki, Yu; Wang, Lei; Ohta, Kazuo; Kunihiro, Noboru 2 2008 Password recovery on challenge and response: Impossible differential attack on hash function. Zbl 1142.94359Sasaki, Yu; Wang, Lei; Ohta, Kazuo; Kunihiro, Noboru 1 2008 New message difference for MD4. Zbl 1186.94469Sasaki, Yu; Wang, Lei; Ohta, Kazuo; Kunihiro, Noboru 3 2007 How to construct sufficient conditions for hash functions. Zbl 1295.94142Sasaki, Yu; Naito, Yusuke; Yajima, Jun; Shimoyama, Takeshi; Kunihiro, Noboru; Ohta, Kazuo 2 2006 Improved collision search for SHA-0. Zbl 1172.94591Naito, Yusuke; Sasaki, Yu; Shimoyama, Takeshi; Yajima, Jun; Kunihiro, Noboru; Ohta, Kazuo 2 2006 all cited Publications top 5 cited Publications all top 5 Cited by 213 Authors 18 Sasaki, Yu 6 Dinur, Itai 6 Dunkelman, Orr 6 Jean, Jérémy 6 Mendel, Florian 6 Peyrin, Thomas 5 Chen, Huaifeng 5 Keller, Nathan 5 Rechberger, Christian 5 Shamir, Adi 5 Wang, Meiqin 5 Youssef, Amr M. 4 Bogdanov, Andrey 4 Fouque, Pierre-Alain 4 Guo, Jian 4 Wang, Gaoli 4 Wu, Wenling 3 Aoki, Kazumaro 3 Bagheri, Nasour 3 Beierle, Christof 3 Cui, Tingting 3 Dong, Xiaoyang 3 Isobe, Takanori 3 Meier, Willi 3 Nandi, Mridul 3 Naya-Plasencia, María 3 Nikolić, Ivica 3 Rijmen, Vincent 3 Schläffer, Martin 3 Tischhauser, Elmar 3 Todo, Yosuke 3 Wang, Xiaoyun 2 AlTawy, Riham 2 Bao, Zhenzhen 2 Derbez, Patrick 2 Grassi, Lorenzo 2 Jia, Keting 2 Kircanski, Aleksandar 2 Kölbl, Stefan 2 Leurent, Gaëtan 2 Lin, Dongdai 2 Lucks, Stefan 2 Minier, Marine 2 Mouha, Nicky 2 Ohta, Kazuo 2 Preneel, Bart 2 Sakiyama, Kazuo 2 Shi, Weimin 2 Su, Chunhua 2 Sun, Ling 2 Tolba, Mohamed 2 Wang, Lei 2 Wen, Long 2 Yang, Yuguang 2 Yasuda, Kan 2 Zheng, Yafei 2 Zhou, Yihua 1 Abdelkhalek, Ahmed 1 Andreeva, Elena Anatol’evna 1 Araújo, Filipe 1 Asgari Chenaghlu, Meysam 1 Aumasson, Jean-Philippe 1 Barreto, Paulo S. L. M. 1 Beyne, Tim 1 Bi, Jing-Lin 1 Bi, Wenquan 1 Biham, Eli 1 Biryukov, Alex 1 Boháček, Milan 1 Bouillaguet, Charles 1 Boura, Christina 1 Bresson, Emmanuel 1 Cao, Wei-Feng 1 Chaigneau, Colin 1 Chakraborti, Avik 1 Chen, Jiageng 1 Chen, Shaozhen 1 Chen, Xiubo 1 Chevallier-Mames, Benoît 1 Clavier, Christophe 1 Cogliati, Benoît 1 Cui, Binbin 1 Dhar, Shalini 1 Dobraunig, Christoph 1 Dong, Bingyou 1 Dong, Le 1 Dutta, Avijit 1 Dwivedi, Ashutosh Dhar 1 Espitau, Thomas 1 Fang, Junbin 1 Forler, Christian 1 Fuhr, Thomas 1 Gauravaram, Praveen 1 Gérault, David 1 Gilbert, Henri 1 Gong, Guang 1 Gorski, Michael 1 Gouget, Aline 1 Gribanova, Irina 1 Gueron, Shay ...and 113 more Authors all top 5 Cited in 14 Serials 23 Designs, Codes and Cryptography 18 Journal of Cryptology 10 Information Processing Letters 3 Quantum Information Processing 3 Cryptography and Communications 1 Artificial Intelligence 1 Chaos, Solitons and Fractals 1 Theoretical Computer Science 1 Journal of Computer Science and Technology 1 Algorithmica 1 Applicable Algebra in Engineering, Communication and Computing 1 Journal of the Egyptian Mathematical Society 1 Logical Methods in Computer Science 1 Frontiers of Computer Science all top 5 Cited in 12 Fields 106 Information and communication theory, circuits (94-XX) 16 Computer science (68-XX) 4 Quantum theory (81-XX) 3 Number theory (11-XX) 3 Algebraic geometry (14-XX) 2 Order, lattices, ordered algebraic structures (06-XX) 2 Field theory and polynomials (12-XX) 1 Mathematical logic and foundations (03-XX) 1 Combinatorics (05-XX) 1 Dynamical systems and ergodic theory (37-XX) 1 Probability theory and stochastic processes (60-XX) 1 Biology and other natural sciences (92-XX) Citations by Year