Name
Playground
About
FAQ
GitHub
Playground
Shortest Path Finder
Community Detector
Connected Papers
Author Trending
Lucy McCloughan
Daniel P. Kennedy
Roland Zumkeller
Maximilian Dürr
Amina Mustansir
Peter W. Battaglia
Dan Graur
Liangliang Shang
Chen Ma
Barbara Aquilani
Home
/
Author
/
YU SASAKI
Author Info
Open Visualization
Name
Affiliation
Papers
YU SASAKI
NTT, Tokyo, Japan 180-8585
22
Collaborators
Citations
PageRank
29
247
15.33
Referers
Referees
References
329
355
245
Search Limit
100
355
Publications (22 rows)
Collaborators (29 rows)
Referers (100 rows)
Referees (100 rows)
Title
Citations
PageRank
Year
Quantum Chosen-Ciphertext Attacks against Feistel Ciphers.
0
0.34
2019
Optimizing Online Permutation-Based Ae Schemes For Lightweight Applications
0
0.34
2019
Quantum Demiric-Selçuk Meet-in-the-Middle Attacks: Applications to 6-Round Generic Feistel Constructions.
0
0.34
2018
Cryptanalysis against Symmetric-Key Schemes with Online Classical Queries and Offline Quantum Computations.
0
0.34
2018
Tight Bounds of Differentially and Linearly Active S-Boxes and Division Property of Lilliput.
0
0.34
2018
Improved Quantum Multicollision-Finding Algorithm.
0
0.34
2018
Boomerang Connectivity Table: A New Cryptanalysis Tool.
3
0.44
2018
New Impossible Differential Search Tool from Design and Cryptanalysis Aspects - Revealing Structural Properties of Several Ciphers.
5
0.45
2017
Gift: A Small Present Towards Reaching The Limit Of Lightweight Encryption
11
0.76
2017
Analyzing Key Schedule of Simon: Iterative Key Differences and Application to Related-Key Impossible Differentials.
2
0.37
2017
The SKINNY Family of Block Ciphers and its Low-Latency Variant MANTIS.
40
1.34
2016
Practical Forgeries And Distinguishers Against Paes
1
0.35
2016
New Differential Bounds and Division Property of Lilliput: Block Cipher with Extended Generalized Feistel Network.
0
0.34
2016
New Impossible Differential Search Tool from Design and Cryptanalysis Aspects.
0
0.34
2016
Nonlinear Invariant Attack -Practical Attack on Full SCREAM, iSCREAM, and Midori64.
1
0.36
2016
Improved Rebound Attacks on AESQ: Core Permutation of CAESAR Candidate PAEQ.
3
0.67
2016
A New Algorithm for the Unbalanced Meet-in-the-Middle Problem.
0
0.34
2016
Meet-in-the-Middle Attacks on Generic Feistel Constructions.
3
0.39
2014
New Property of Diffusion Switching Mechanism on CLEFIA and Its Application to DFA.
0
0.34
2013
Meet-in-the-Middle Preimage Attacks Against Reduced SHA-0 and SHA-1
55
1.83
2009
Preimage Attacks on 3, 4, and 5-Pass HAVAL
32
1.77
2008
Preimage Attacks on One-Block MD4, 63-Step MD5 and More
91
3.22
2008
1