What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Ryoma Ito
Google Scholar
ORCID:
0000-0002-4929-8974
23
publications in security and cryptology related venues
Year
Venue
Title
2025
journals/istr
On the effects of neural network-based output prediction attacks on the design of symmetric-key ciphers.
Hayato Watanabe
Ryoma Ito
Toshihiro Ohigashi
2025
journals/istr
Security analysis of SFrame.
Takanori Isobe
Ryoma Ito
Kazuhiko Minematsu
2025
conf/eurosp
Not in The Prophecies: Practical Attacks on Nostr.
Hayato Kimura
Ryoma Ito
Kazuhiko Minematsu
Shogo Shiraki
Takanori Isobe
2025
journals/istr
Parallel SAT framework to find clustering of differential characteristics and its applications.
Kosei Sakamoto
Ryoma Ito
Takanori Isobe
2025
journals/tosc
Divide-and-Conquer SAT for Exploring Optimal Differential and Linear Characteristics and Its Applications.
Kazuma Taka
Kosei Sakamoto
Ryoma Ito
Rentaro Shiba
Shion Utsumi
Takanori Isobe
2025
journals/cic
Exploring SHA Instructions and Its Application to AES-based Schemes.
Takuro Shiraya
Subhadeep Banik
Tatsuya Ishikawa
Ryoma Ito
Mostafizar Rahman
Kosei Sakamoto
Atsushi Tanaka
Shion Utsumi
Takanori Isobe
2024
conf/asiacrypt
Key Collisions on AES and Its Applications.
Kodai Taiyama
Kosei Sakamoto
Ryoma Ito
Kazuma Taka
Takanori Isobe
2023
journals/tches
Areion: Highly-Efficient Permutations and Its Applications to Hash Functions for Short Input.
Takanori Isobe
Ryoma Ito
Fukang Liu
Kazuhiko Minematsu
Motoki Nakahashi
Kosei Sakamoto
Rentaro Shiba
2023
journals/tosc
Key Committing Security of AEZ and More.
Yu Long Chen
Antonio Flórez-Gutiérrez
Akiko Inoue
Ryoma Ito
Tetsu Iwata
Kazuhiko Minematsu
Nicky Mouha
Yusuke Naito
Ferdinand Sibleyras
Yosuke Todo
2023
conf/sacrypt
Parallel SAT Framework to Find Clustering of Differential Characteristics and Its Applications.
Kosei Sakamoto
Ryoma Ito
Takanori Isobe
2022
journals/istr
Distinguishing and key recovery attacks on the reduced-round SNOW-V and SNOW-Vi.
Jin Hoki
Takanori Isobe
Ryoma Ito
Fukang Liu
Kosei Sakamoto
2022
journals/tosc
Cryptanalysis of Rocca and Feasibility of Its Security Claim.
Akinori Hosoyamada
Akiko Inoue
Ryoma Ito
Tetsu Iwata
Kazuhiko Minematsu
Ferdinand Sibleyras
Yosuke Todo
2022
journals/tosc
New Cryptanalysis of ZUC-256 Initialization Using Modular Differences.
Fukang Liu
Willi Meier
Santanu Sarkar
Gaoli Wang
Ryoma Ito
Takanori Isobe
2022
conf/acisp
PNB-Focused Differential Cryptanalysis of ChaCha Stream Cipher.
Shotaro Miyashita
Ryoma Ito
Atsuko Miyaji
2022
conf/acns
Output Prediction Attacks on Block Ciphers Using Deep Learning.
Hayato Kimura
Keita Emura
Takanori Isobe
Ryoma Ito
Kazuto Ogawa
Toshihiro Ohigashi
2021
journals/istr
Bit-wise cryptanalysis on AND-RX permutation Friet-PC.
Ryoma Ito
Rentaro Shiba
Kosei Sakamoto
Fukang Liu
Takanori Isobe
2021
conf/acisp
Security Analysis of End-to-End Encryption for Zoom Meetings.
Takanori Isobe
Ryoma Ito
2021
conf/acisp
Distinguishing and Key Recovery Attacks on the Reduced-Round SNOW-V.
Jin Hoki
Takanori Isobe
Ryoma Ito
Fukang Liu
Kosei Sakamoto
2021
conf/esorics
Security Analysis of SFrame.
Takanori Isobe
Ryoma Ito
Kazuhiko Minematsu
2018
conf/acisp
New Iterated RC4 Key Correlations.
Ryoma Ito
Atsuko Miyaji
2015
conf/fse
New Linear Correlations Related to State Information of RC4 PRGA Using IV in WPA.
Ryoma Ito
Atsuko Miyaji
2015
conf/acisp
How TKIP Induces Biases of Internal States of Generic RC4.
Ryoma Ito
Atsuko Miyaji
2014
conf/wisa
New Integrated Long-Term Glimpse of RC4.
Ryoma Ito
Atsuko Miyaji
Coauthors
Akiko Inoue
(2)
Akinori Hosoyamada
(1)
Antonio Flórez-Gutiérrez
(1)
Atsuko Miyaji
(5)
Atsushi Tanaka
(1)
Ferdinand Sibleyras
(2)
Fukang Liu
(5)
Gaoli Wang
(1)
Hayato Kimura
(2)
Hayato Watanabe
(1)
Jin Hoki
(2)
Kazuhiko Minematsu
(6)
Kazuma Taka
(2)
Kazuto Ogawa
(1)
Keita Emura
(1)
Kodai Taiyama
(1)
Kosei Sakamoto
(9)
Mostafizar Rahman
(1)
Motoki Nakahashi
(1)
Nicky Mouha
(1)
Rentaro Shiba
(3)
Ryoma Ito
(23)
Santanu Sarkar
(1)
Shion Utsumi
(2)
Shogo Shiraki
(1)
Shotaro Miyashita
(1)
Subhadeep Banik
(1)
Takanori Isobe
(15)
Takuro Shiraya
(1)
Tatsuya Ishikawa
(1)
Tetsu Iwata
(2)
Toshihiro Ohigashi
(2)
Willi Meier
(1)
Yosuke Todo
(2)
Yu Long Chen
(1)
Yusuke Naito
(1)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to