×

zbMATH — the first resource for mathematics

Sasaki, Yu

Compute Distance To:
Author ID: sasaki.yu Recent zbMATH articles by "Sasaki, Yu"
Published as: Sasaki, Y.; Sasaki, Yu
Documents Indexed: 100 Publications since 2006
all top 5

Co-Authors

12 single-authored
27 Wang, Lei
17 Ohta, Kazuo
9 Aoki, Kazumaro
9 Sakiyama, Kazuo
9 Todo, Yosuke
8 Kunihiro, Noboru
7 Hosoyamada, Akinori
6 Guo, Jian
6 Nikolić, Ivica
6 Peyrin, Thomas
6 Shimoyama, Takeshi
5 Jean, Jérémy
5 Naito, Yusuke
5 Yasuda, Kan
4 Iwata, Tetsu
4 Leander, Gregor
3 Iwamoto, Mitsugu
3 Mendel, Florian
3 Ohtahara, Chiaki
3 Xagawa, Keita
3 Yajima, Jun
2 Bagheri, Nasour
2 Banik, Subhadeep
2 Huang, Tao
2 Kondo, Kota
2 Koyama, Takuma
2 Li, Yang
2 Liu, Yunwen
2 Matusiewicz, Krystian
2 Naya-Plasencia, María
2 Okada, Keita
2 Sim, Siang Meng
2 Song, Ling
2 Tani, Seiichiro
2 Wu, Shuang
1 Ashur, Tomer
1 Beierle, Christof
1 Bonnetain, Xavier
1 Bossert, Jannis
1 Chen, Jiageng
1 Cid, Carlos Frederico
1 Dunkelman, Orr
1 Eichlseder, Maria
1 Emami, Sareh
1 Hong, Deukjo
1 Hu, Lei
1 Isobe, Takanori
1 Ito, Gembu
1 Iwasaki, Terutoshi
1 Jana, Amit
1 Jia, Keting
1 Jovanovic, Philipp
1 Keller, Nathan
1 Kölbl, Stefan
1 Komatsubara, Wataru
1 Kumar Pandey, Sumit
1 Kumar, Ashish
1 Lallemand, Virginie
1 Lambooij, Eran
1 Lauridsen, Martin M.
1 Leurent, Gaëtan
1 Li, Chaoyun
1 List, Eik
1 Liu, Zhiqiang
1 Lucks, Stefan
1 Luykx, Atul
1 Matsumoto, Ryutaroh
1 Meier, Willi
1 Mennink, Bart
1 Minaud, Brice
1 Moradi, Amir
1 Nakasone, Toshiki
1 Rahman, Mostafizar
1 Rijmen, Vincent
1 Rotella, Yann
1 Saha, Dhiman
1 Sakai, Yusuke
1 Sasdrich, Pascal
1 Schläffer, Martin
1 Schrottenloher, André
1 Shi, Danping
1 Sun, Siwei
1 Takasaki, Yasuhiro
1 Takayanagi, Naoyuki
1 Tokushige, Yuuki
1 Varıcı, Kerem
1 Viguier, Benoît
1 Wang, Gaoli
1 Wang, Meiqin
1 Wang, Qingju
1 Wen, Long
1 Wu, Wenling

Publications by Year

Citations contained in zbMATH

63 Publications have been cited 226 times in 115 Documents Cited by Year
Finding preimages in full MD5 faster than exhaustive search. Zbl 1239.94064
Sasaki, Yu; Aoki, Kazumaro
22
2009
Preimage attacks on one-block MD4, 63-step MD5 and more. Zbl 1256.94040
Aoki, Kazumaro; Sasaki, Yu
19
2009
The \(\mathtt{SKINNY}\) family of block ciphers and its low-latency variant \(\mathtt{MANTIS}\). Zbl 1372.94412
Beierle, Christof; Jean, Jérémy; Kölbl, Stefan; Leander, Gregor; Moradi, Amir; Peyrin, Thomas; Sasaki, Yu; Sasdrich, Pascal; Sim, Siang Meng
14
2016
Rebound attack on the full Lane compression function. Zbl 1267.94083
Matusiewicz, Krystian; Naya-Plasencia, María; Nikolić, Ivica; Sasaki, Yu; Schläffer, Martin
13
2009
Preimages for step-reduced SHA-2. Zbl 1267.94030
Aoki, Kazumaro; Guo, Jian; Matusiewicz, Krystian; Sasaki, Yu; Wang, Lei
10
2009
Meet-in-the-middle preimage attacks against reduced SHA-0 and SHA-1. Zbl 1252.94043
Aoki, Kazumaro; Sasaki, Yu
9
2009
Non-full-active Super-Sbox analysis: applications to ECHO and Grøstl. Zbl 1253.94067
Sasaki, Yu; Li, Yang; Wang, Lei; Sakiyama, Kazuo; Ohta, Kazuo
7
2010
Preimage attacks on 3, 4, and 5-pass HAVAL. Zbl 1206.94089
Sasaki, Yu; Aoki, Kazumaro
7
2008
Boomerang Connectivity Table: a new cryptanalysis tool. Zbl 1428.94065
Cid, Carlos; Huang, Tao; Peyrin, Thomas; Sasaki, Yu; Song, Ling
6
2018
Nonlinear invariant attack. Practical attack on full SCREAM, iSCREAM, and Midori64. Zbl 1380.94126
Todo, Yosuke; Leander, Gregor; Sasaki, Yu
6
2016
Known-key distinguishers on 11-round Feistel and collision attacks on its hashing modes. Zbl 1307.94095
Sasaki, Yu; Yasuda, Kan
6
2011
New impossible differential search tool from design and cryptanalysis aspects. Revealing structural properties of several ciphers. Zbl 1394.94941
Sasaki, Yu; Todo, Yosuke
5
2017
Meet-in-the-middle preimage attacks on AES hashing modes and an application to Whirlpool. Zbl 1307.94094
Sasaki, Yu
5
2011
Meet-in-the-middle technique for integral attacks against Feistel ciphers. Zbl 1327.94073
Sasaki, Yu; Wang, Lei
4
2013
Generic state-recovery and forgery attacks on chopmd-MAC and on NMAC/HMAC. Zbl 1414.94914
Naito, Yusuke; Sasaki, Yu; Wang, Lei; Yasuda, Kan
4
2013
Limited-birthday distinguishers for hash functions. Collisions beyond the birthday bound can be meaningful. Zbl 1314.94076
Iwamoto, Mitsugu; Peyrin, Thomas; Sasaki, Yu
4
2013
Generic related-key attacks for HMAC. Zbl 1292.94128
Peyrin, Thomas; Sasaki, Yu; Wang, Lei
4
2012
Preimage attacks on step-reduced RIPEMD-128 and RIPEMD-160. Zbl 1295.94121
Ohtahara, Chiaki; Sasaki, Yu; Shimoyama, Takeshi
4
2011
Meet-in-the-middle preimage attacks on double-branch hash functions: application to RIPEMD and others. Zbl 1284.94107
Sasaki, Yu; Aoki, Kazumaro
4
2009
Preimage attacks on step-reduced MD5. Zbl 1285.94094
Sasaki, Yu; Aoki, Kazumaro
4
2008
Quantum multicollision-finding algorithm. Zbl 1380.81087
Hosoyamada, Akinori; Sasaki, Yu; Xagawa, Keita
3
2017
Cryptanalysis of reduced-round SIMON32 and SIMON48. Zbl 1344.94077
Wang, Qingju; Liu, Zhiqiang; Varıcı, Kerem; Sasaki, Yu; Rijmen, Vincent; Todo, Yosuke
3
2014
Three-subset meet-in-the-middle attack on reduced XTEA. Zbl 1304.94083
Sasaki, Yu; Wang, Lei; Sakai, Yasuhide; Sakiyama, Kazuo; Ohta, Kazuo
3
2012
Boomerang distinguishers on MD4-family: first practical results on full 5-pass HAVAL. Zbl 1279.94114
Sasaki, Yu
3
2012
(Second) preimage attacks on step-reduced RIPEMD/RIPEMD-128 with a new local-collision approach. Zbl 1284.94123
Wang, Lei; Sasaki, Yu; Komatsubara, Wataru; Ohta, Kazuo; Sakiyama, Kazuo
3
2011
New message difference for MD4. Zbl 1186.94469
Sasaki, Yu; Wang, Lei; Ohta, Kazuo; Kunihiro, Noboru
3
2007
Cryptanalysis of reduced NORX. Zbl 1385.94009
Bagheri, Nasour; Huang, Tao; Jia, Keting; Mendel, Florian; Sasaki, Yu
2
2016
Refinements of the \(k\)-tree algorithm for the generalized birthday problem. Zbl 1382.94147
Nikolić, Ivica; Sasaki, Yu
2
2015
How to incorporate associated data in sponge-based authenticated encryption. Zbl 1382.94158
Sasaki, Yu; Yasuda, Kan
2
2015
Equivalent key recovery attacks against HMAC and NMAC with whirlpool reduced to 7 rounds. Zbl 1382.94115
Guo, Jian; Sasaki, Yu; Wang, Lei; Wang, Meiqin; Wen, Long
2
2015
Meet-in-the-middle attacks on generic Feistel constructions. Zbl 1306.94058
Guo, Jian; Jean, Jérémy; Nikolić, Ivica; Sasaki, Yu
2
2014
Updates on generic attacks against HMAC and NMAC. Zbl 1343.94059
Guo, Jian; Peyrin, Thomas; Sasaki, Yu; Wang, Lei
2
2014
Cryptanalysis of HMAC/NMAC-Whirlpool. Zbl 1314.94070
Guo, Jian; Sasaki, Yu; Wang, Lei; Wu, Shuang
2
2013
Comprehensive study of integral analysis on 22-round LBlock. Zbl 1342.94094
Sasaki, Yu; Wang, Lei
2
2013
Investigating fundamental security requirements on whirlpool: improved preimage and collision attacks. Zbl 1292.94134
Sasaki, Yu; Wang, Lei; Wu, Shuang; Wu, Wenling
2
2012
Improved known-key distinguishers on Feistel-SP ciphers and application to Camellia. Zbl 1305.94077
Sasaki, Yu; Emami, Sareh; Hong, Deukjo; Kumar, Ashish
2
2012
Experimental verification of super-Sbox analysis – confirmation of detailed attack complexity. Zbl 1344.94072
Sasaki, Yu; Takayanagi, Naoyuki; Sakiyama, Kazuo; Ohta, Kazuo
2
2011
Security of MD5 challenge and response: Extension of APOP password recovery attack. Zbl 1153.94428
Sasaki, Yu; Wang, Lei; Ohta, Kazuo; Kunihiro, Noboru
2
2008
How to construct sufficient conditions for hash functions. Zbl 1295.94142
Sasaki, Yu; Naito, Yusuke; Yajima, Jun; Shimoyama, Takeshi; Kunihiro, Noboru; Ohta, Kazuo
2
2006
Improved collision search for SHA-0. Zbl 1172.94591
Naito, Yusuke; Sasaki, Yu; Shimoyama, Takeshi; Yajima, Jun; Kunihiro, Noboru; Ohta, Kazuo
2
2006
Improved quantum multicollision-finding algorithm. Zbl 07173872
Hosoyamada, Akinori; Sasaki, Yu; Tani, Seiichiro; Xagawa, Keita
1
2019
Quantum chosen-ciphertext attacks against Feistel ciphers. Zbl 07158421
Ito, Gembu; Hosoyamada, Akinori; Matsumoto, Ryutaroh; Sasaki, Yu; Iwata, Tetsu
1
2019
Nonlinear invariant attack: practical attack on full SCREAM, iSCREAM, and Midori64. Zbl 1435.94141
Todo, Yosuke; Leander, Gregor; Sasaki, Yu
1
2019
Cryptanalysis against symmetric-key schemes with online classical queries and offline quantum computations. Zbl 07154103
Hosoyamada, Akinori; Sasaki, Yu
1
2018
Integer linear programming for three-subset meet-in-the-middle attacks: application to GIFT. Zbl 1398.94157
Sasaki, Yu
1
2018
Quantum Demiric-Selçuk meet-in-the-middle attacks: applications to 6-round generic Feistel constructions. Zbl 06957564
Hosoyamada, Akinori; Sasaki, Yu
1
2018
Tight bounds of differentially and linearly active S-boxes and division property of Lilliput. Zbl 1395.94311
Sasaki, Yu; Todo, Yosuke
1
2018
New differential bounds and division property of Lilliput: block cipher with extended generalized Feistel network. Zbl 1412.94207
Sasaki, Yu; Todo, Yosuke
1
2017
A new algorithm for the unbalanced meet-in-the-middle problem. Zbl 1404.94102
Nikolić, Ivica; Sasaki, Yu
1
2016
On the design rationale of Simon block cipher: integral attacks and impossible differential attacks against Simon variants. Zbl 1348.94062
Kondo, Kota; Sasaki, Yu; Iwata, Tetsu
1
2016
Analysis of the CAESAR candidate silver. Zbl 1396.94085
Jean, Jérémy; Sasaki, Yu; Wang, Lei
1
2016
Practical cryptanalysis of PAES. Zbl 1382.94125
Jean, Jérémy; Nikolić, Ivica; Sasaki, Yu; Wang, Lei
1
2014
Generic attacks on strengthened HMAC: \(n\)-bit secure HMAC requires key in all blocks. Zbl 1423.68158
Sasaki, Yu; Wang, Lei
1
2014
Memoryless unbalanced meet-in-the-middle attacks: impossible results and applications. Zbl 1353.94072
Sasaki, Yu
1
2014
Related-key boomerang attacks on KATAN32/48/64. Zbl 1316.94079
Isobe, Takanori; Sasaki, Yu; Chen, Jiageng
1
2013
Multi-differential cryptanalysis on reduced DM-PRESENT-80: collisions and other differential properties. Zbl 1342.94078
Koyama, Takuma; Sasaki, Yu; Kunihiro, Noboru
1
2013
Boomerang distinguishers for full HAS-160 compression function. Zbl 1292.94133
Sasaki, Yu; Wang, Lei; Takasaki, Yasuhiro; Sakiyama, Kazuo; Ohta, Kazuo
1
2012
Improved integral analysis on tweaked Lesamnta. Zbl 1301.94127
Sasaki, Yu; Aoki, Kazumaro
1
2012
Cryptanalyses on a Merkle-Damgård based MAC – almost universal forgery and distinguishing-\(H\) attacks. Zbl 1297.94099
Sasaki, Yu
1
2012
Finding preimages of Tiger up to 23 steps. Zbl 1285.94100
Wang, Lei; Sasaki, Yu
1
2010
Cryptanalyses of narrow-pipe mode of operation in AURORA-512 hash function. Zbl 1267.94093
Sasaki, Yu
1
2009
Meet-in-the-middle attacks using output truncation in 3-pass HAVAL. Zbl 1307.94093
Sasaki, Yu
1
2009
Password recovery on challenge and response: Impossible differential attack on hash function. Zbl 1142.94359
Sasaki, Yu; Wang, Lei; Ohta, Kazuo; Kunihiro, Noboru
1
2008
Improved quantum multicollision-finding algorithm. Zbl 07173872
Hosoyamada, Akinori; Sasaki, Yu; Tani, Seiichiro; Xagawa, Keita
1
2019
Quantum chosen-ciphertext attacks against Feistel ciphers. Zbl 07158421
Ito, Gembu; Hosoyamada, Akinori; Matsumoto, Ryutaroh; Sasaki, Yu; Iwata, Tetsu
1
2019
Nonlinear invariant attack: practical attack on full SCREAM, iSCREAM, and Midori64. Zbl 1435.94141
Todo, Yosuke; Leander, Gregor; Sasaki, Yu
1
2019
Boomerang Connectivity Table: a new cryptanalysis tool. Zbl 1428.94065
Cid, Carlos; Huang, Tao; Peyrin, Thomas; Sasaki, Yu; Song, Ling
6
2018
Cryptanalysis against symmetric-key schemes with online classical queries and offline quantum computations. Zbl 07154103
Hosoyamada, Akinori; Sasaki, Yu
1
2018
Integer linear programming for three-subset meet-in-the-middle attacks: application to GIFT. Zbl 1398.94157
Sasaki, Yu
1
2018
Quantum Demiric-Selçuk meet-in-the-middle attacks: applications to 6-round generic Feistel constructions. Zbl 06957564
Hosoyamada, Akinori; Sasaki, Yu
1
2018
Tight bounds of differentially and linearly active S-boxes and division property of Lilliput. Zbl 1395.94311
Sasaki, Yu; Todo, Yosuke
1
2018
New impossible differential search tool from design and cryptanalysis aspects. Revealing structural properties of several ciphers. Zbl 1394.94941
Sasaki, Yu; Todo, Yosuke
5
2017
Quantum multicollision-finding algorithm. Zbl 1380.81087
Hosoyamada, Akinori; Sasaki, Yu; Xagawa, Keita
3
2017
New differential bounds and division property of Lilliput: block cipher with extended generalized Feistel network. Zbl 1412.94207
Sasaki, Yu; Todo, Yosuke
1
2017
The \(\mathtt{SKINNY}\) family of block ciphers and its low-latency variant \(\mathtt{MANTIS}\). Zbl 1372.94412
Beierle, Christof; Jean, Jérémy; Kölbl, Stefan; Leander, Gregor; Moradi, Amir; Peyrin, Thomas; Sasaki, Yu; Sasdrich, Pascal; Sim, Siang Meng
14
2016
Nonlinear invariant attack. Practical attack on full SCREAM, iSCREAM, and Midori64. Zbl 1380.94126
Todo, Yosuke; Leander, Gregor; Sasaki, Yu
6
2016
Cryptanalysis of reduced NORX. Zbl 1385.94009
Bagheri, Nasour; Huang, Tao; Jia, Keting; Mendel, Florian; Sasaki, Yu
2
2016
A new algorithm for the unbalanced meet-in-the-middle problem. Zbl 1404.94102
Nikolić, Ivica; Sasaki, Yu
1
2016
On the design rationale of Simon block cipher: integral attacks and impossible differential attacks against Simon variants. Zbl 1348.94062
Kondo, Kota; Sasaki, Yu; Iwata, Tetsu
1
2016
Analysis of the CAESAR candidate silver. Zbl 1396.94085
Jean, Jérémy; Sasaki, Yu; Wang, Lei
1
2016
Refinements of the \(k\)-tree algorithm for the generalized birthday problem. Zbl 1382.94147
Nikolić, Ivica; Sasaki, Yu
2
2015
How to incorporate associated data in sponge-based authenticated encryption. Zbl 1382.94158
Sasaki, Yu; Yasuda, Kan
2
2015
Equivalent key recovery attacks against HMAC and NMAC with whirlpool reduced to 7 rounds. Zbl 1382.94115
Guo, Jian; Sasaki, Yu; Wang, Lei; Wang, Meiqin; Wen, Long
2
2015
Cryptanalysis of reduced-round SIMON32 and SIMON48. Zbl 1344.94077
Wang, Qingju; Liu, Zhiqiang; Varıcı, Kerem; Sasaki, Yu; Rijmen, Vincent; Todo, Yosuke
3
2014
Meet-in-the-middle attacks on generic Feistel constructions. Zbl 1306.94058
Guo, Jian; Jean, Jérémy; Nikolić, Ivica; Sasaki, Yu
2
2014
Updates on generic attacks against HMAC and NMAC. Zbl 1343.94059
Guo, Jian; Peyrin, Thomas; Sasaki, Yu; Wang, Lei
2
2014
Practical cryptanalysis of PAES. Zbl 1382.94125
Jean, Jérémy; Nikolić, Ivica; Sasaki, Yu; Wang, Lei
1
2014
Generic attacks on strengthened HMAC: \(n\)-bit secure HMAC requires key in all blocks. Zbl 1423.68158
Sasaki, Yu; Wang, Lei
1
2014
Memoryless unbalanced meet-in-the-middle attacks: impossible results and applications. Zbl 1353.94072
Sasaki, Yu
1
2014
Meet-in-the-middle technique for integral attacks against Feistel ciphers. Zbl 1327.94073
Sasaki, Yu; Wang, Lei
4
2013
Generic state-recovery and forgery attacks on chopmd-MAC and on NMAC/HMAC. Zbl 1414.94914
Naito, Yusuke; Sasaki, Yu; Wang, Lei; Yasuda, Kan
4
2013
Limited-birthday distinguishers for hash functions. Collisions beyond the birthday bound can be meaningful. Zbl 1314.94076
Iwamoto, Mitsugu; Peyrin, Thomas; Sasaki, Yu
4
2013
Cryptanalysis of HMAC/NMAC-Whirlpool. Zbl 1314.94070
Guo, Jian; Sasaki, Yu; Wang, Lei; Wu, Shuang
2
2013
Comprehensive study of integral analysis on 22-round LBlock. Zbl 1342.94094
Sasaki, Yu; Wang, Lei
2
2013
Related-key boomerang attacks on KATAN32/48/64. Zbl 1316.94079
Isobe, Takanori; Sasaki, Yu; Chen, Jiageng
1
2013
Multi-differential cryptanalysis on reduced DM-PRESENT-80: collisions and other differential properties. Zbl 1342.94078
Koyama, Takuma; Sasaki, Yu; Kunihiro, Noboru
1
2013
Generic related-key attacks for HMAC. Zbl 1292.94128
Peyrin, Thomas; Sasaki, Yu; Wang, Lei
4
2012
Three-subset meet-in-the-middle attack on reduced XTEA. Zbl 1304.94083
Sasaki, Yu; Wang, Lei; Sakai, Yasuhide; Sakiyama, Kazuo; Ohta, Kazuo
3
2012
Boomerang distinguishers on MD4-family: first practical results on full 5-pass HAVAL. Zbl 1279.94114
Sasaki, Yu
3
2012
Investigating fundamental security requirements on whirlpool: improved preimage and collision attacks. Zbl 1292.94134
Sasaki, Yu; Wang, Lei; Wu, Shuang; Wu, Wenling
2
2012
Improved known-key distinguishers on Feistel-SP ciphers and application to Camellia. Zbl 1305.94077
Sasaki, Yu; Emami, Sareh; Hong, Deukjo; Kumar, Ashish
2
2012
Boomerang distinguishers for full HAS-160 compression function. Zbl 1292.94133
Sasaki, Yu; Wang, Lei; Takasaki, Yasuhiro; Sakiyama, Kazuo; Ohta, Kazuo
1
2012
Improved integral analysis on tweaked Lesamnta. Zbl 1301.94127
Sasaki, Yu; Aoki, Kazumaro
1
2012
Cryptanalyses on a Merkle-Damgård based MAC – almost universal forgery and distinguishing-\(H\) attacks. Zbl 1297.94099
Sasaki, Yu
1
2012
Known-key distinguishers on 11-round Feistel and collision attacks on its hashing modes. Zbl 1307.94095
Sasaki, Yu; Yasuda, Kan
6
2011
Meet-in-the-middle preimage attacks on AES hashing modes and an application to Whirlpool. Zbl 1307.94094
Sasaki, Yu
5
2011
Preimage attacks on step-reduced RIPEMD-128 and RIPEMD-160. Zbl 1295.94121
Ohtahara, Chiaki; Sasaki, Yu; Shimoyama, Takeshi
4
2011
(Second) preimage attacks on step-reduced RIPEMD/RIPEMD-128 with a new local-collision approach. Zbl 1284.94123
Wang, Lei; Sasaki, Yu; Komatsubara, Wataru; Ohta, Kazuo; Sakiyama, Kazuo
3
2011
Experimental verification of super-Sbox analysis – confirmation of detailed attack complexity. Zbl 1344.94072
Sasaki, Yu; Takayanagi, Naoyuki; Sakiyama, Kazuo; Ohta, Kazuo
2
2011
Non-full-active Super-Sbox analysis: applications to ECHO and Grøstl. Zbl 1253.94067
Sasaki, Yu; Li, Yang; Wang, Lei; Sakiyama, Kazuo; Ohta, Kazuo
7
2010
Finding preimages of Tiger up to 23 steps. Zbl 1285.94100
Wang, Lei; Sasaki, Yu
1
2010
Finding preimages in full MD5 faster than exhaustive search. Zbl 1239.94064
Sasaki, Yu; Aoki, Kazumaro
22
2009
Preimage attacks on one-block MD4, 63-step MD5 and more. Zbl 1256.94040
Aoki, Kazumaro; Sasaki, Yu
19
2009
Rebound attack on the full Lane compression function. Zbl 1267.94083
Matusiewicz, Krystian; Naya-Plasencia, María; Nikolić, Ivica; Sasaki, Yu; Schläffer, Martin
13
2009
Preimages for step-reduced SHA-2. Zbl 1267.94030
Aoki, Kazumaro; Guo, Jian; Matusiewicz, Krystian; Sasaki, Yu; Wang, Lei
10
2009
Meet-in-the-middle preimage attacks against reduced SHA-0 and SHA-1. Zbl 1252.94043
Aoki, Kazumaro; Sasaki, Yu
9
2009
Meet-in-the-middle preimage attacks on double-branch hash functions: application to RIPEMD and others. Zbl 1284.94107
Sasaki, Yu; Aoki, Kazumaro
4
2009
Cryptanalyses of narrow-pipe mode of operation in AURORA-512 hash function. Zbl 1267.94093
Sasaki, Yu
1
2009
Meet-in-the-middle attacks using output truncation in 3-pass HAVAL. Zbl 1307.94093
Sasaki, Yu
1
2009
Preimage attacks on 3, 4, and 5-pass HAVAL. Zbl 1206.94089
Sasaki, Yu; Aoki, Kazumaro
7
2008
Preimage attacks on step-reduced MD5. Zbl 1285.94094
Sasaki, Yu; Aoki, Kazumaro
4
2008
Security of MD5 challenge and response: Extension of APOP password recovery attack. Zbl 1153.94428
Sasaki, Yu; Wang, Lei; Ohta, Kazuo; Kunihiro, Noboru
2
2008
Password recovery on challenge and response: Impossible differential attack on hash function. Zbl 1142.94359
Sasaki, Yu; Wang, Lei; Ohta, Kazuo; Kunihiro, Noboru
1
2008
New message difference for MD4. Zbl 1186.94469
Sasaki, Yu; Wang, Lei; Ohta, Kazuo; Kunihiro, Noboru
3
2007
How to construct sufficient conditions for hash functions. Zbl 1295.94142
Sasaki, Yu; Naito, Yusuke; Yajima, Jun; Shimoyama, Takeshi; Kunihiro, Noboru; Ohta, Kazuo
2
2006
Improved collision search for SHA-0. Zbl 1172.94591
Naito, Yusuke; Sasaki, Yu; Shimoyama, Takeshi; Yajima, Jun; Kunihiro, Noboru; Ohta, Kazuo
2
2006
all top 5

Cited by 213 Authors

18 Sasaki, Yu
6 Dinur, Itai
6 Dunkelman, Orr
6 Jean, Jérémy
6 Mendel, Florian
6 Peyrin, Thomas
5 Chen, Huaifeng
5 Keller, Nathan
5 Rechberger, Christian
5 Shamir, Adi
5 Wang, Meiqin
5 Youssef, Amr M.
4 Bogdanov, Andrey
4 Fouque, Pierre-Alain
4 Guo, Jian
4 Wang, Gaoli
4 Wu, Wenling
3 Aoki, Kazumaro
3 Bagheri, Nasour
3 Beierle, Christof
3 Cui, Tingting
3 Dong, Xiaoyang
3 Isobe, Takanori
3 Meier, Willi
3 Nandi, Mridul
3 Naya-Plasencia, María
3 Nikolić, Ivica
3 Rijmen, Vincent
3 Schläffer, Martin
3 Tischhauser, Elmar
3 Todo, Yosuke
3 Wang, Xiaoyun
2 AlTawy, Riham
2 Bao, Zhenzhen
2 Derbez, Patrick
2 Grassi, Lorenzo
2 Jia, Keting
2 Kircanski, Aleksandar
2 Kölbl, Stefan
2 Leurent, Gaëtan
2 Lin, Dongdai
2 Lucks, Stefan
2 Minier, Marine
2 Mouha, Nicky
2 Ohta, Kazuo
2 Preneel, Bart
2 Sakiyama, Kazuo
2 Shi, Weimin
2 Su, Chunhua
2 Sun, Ling
2 Tolba, Mohamed
2 Wang, Lei
2 Wen, Long
2 Yang, Yuguang
2 Yasuda, Kan
2 Zheng, Yafei
2 Zhou, Yihua
1 Abdelkhalek, Ahmed
1 Andreeva, Elena Anatol’evna
1 Araújo, Filipe
1 Asgari Chenaghlu, Meysam
1 Aumasson, Jean-Philippe
1 Barreto, Paulo S. L. M.
1 Beyne, Tim
1 Bi, Jing-Lin
1 Bi, Wenquan
1 Biham, Eli
1 Biryukov, Alex
1 Boháček, Milan
1 Bouillaguet, Charles
1 Boura, Christina
1 Bresson, Emmanuel
1 Cao, Wei-Feng
1 Chaigneau, Colin
1 Chakraborti, Avik
1 Chen, Jiageng
1 Chen, Shaozhen
1 Chen, Xiubo
1 Chevallier-Mames, Benoît
1 Clavier, Christophe
1 Cogliati, Benoît
1 Cui, Binbin
1 Dhar, Shalini
1 Dobraunig, Christoph
1 Dong, Bingyou
1 Dong, Le
1 Dutta, Avijit
1 Dwivedi, Ashutosh Dhar
1 Espitau, Thomas
1 Fang, Junbin
1 Forler, Christian
1 Fuhr, Thomas
1 Gauravaram, Praveen
1 Gérault, David
1 Gilbert, Henri
1 Gong, Guang
1 Gorski, Michael
1 Gouget, Aline
1 Gribanova, Irina
1 Gueron, Shay
...and 113 more Authors

Citations by Year