What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Yu Sasaki
Google Scholar
126
publications in security and cryptology related venues
Year
Venue
Title
2025
journals/tosc
Committing Wide Encryption Mode with Minimum Ciphertext Expansion.
Yusuke Naito
Yu Sasaki
Takeshi Sugawara
2025
conf/crypto
Cryptographic Treatment of Key Control Security - In Light of NIST SP 800-108.
Ritam Bhaumik
Avijit Dutta
Akiko Inoue
Tetsu Iwata
Ashwin Jha
Kazuhiko Minematsu
Mridul Nandi
Yu Sasaki
Meltem Sönmez Turan
Stefano Tessaro
2025
conf/crypto
The Exact Multi-User Security of Key-Alternating Feistel Ciphers with a Single Permutation.
Yusuke Naito
Yu Sasaki
Takeshi Sugawara
2024
conf/acns
KIVR: Committing Authenticated Encryption Using Redundancy and Application to GCM, CCM, and More.
Yusuke Naito
Yu Sasaki
Takeshi Sugawara
2024
conf/ctrsa
The Exact Multi-user Security of 2-Key Triple DES.
Yusuke Naito
Yu Sasaki
Takeshi Sugawara
2024
conf/eurocrypt
The Exact Multi-user Security of (Tweakable) Key Alternating Ciphers with a Single Permutation.
Yusuke Naito
Yu Sasaki
Takeshi Sugawara
2023
journals/tches
MMM: Authenticated Encryption with Minimum Secret State for Masking.
Yusuke Naito
Yu Sasaki
Takeshi Sugawara
2023
journals/tosc
Committing Security of Ascon: Cryptanalysis on Primitive and Proof on Mode.
Yusuke Naito
Yu Sasaki
Takeshi Sugawara
2022
conf/ccs
The Multi-User Security of Triple Encryption, Revisited: Exact Security, Strengthening, and Application to TDES.
Yusuke Naito
Yu Sasaki
Takeshi Sugawara
Kan Yasuda
2022
conf/crypto
Secret Can Be Public: Low-Memory AEAD Mode for High-Order Masking.
Yusuke Naito
Yu Sasaki
Takeshi Sugawara
2022
conf/iwsec
Birthday-Bound Slide Attacks on TinyJAMBU's Keyed-Permutations for All Key Sizes.
Ferdinand Sibleyras
Yu Sasaki
Yosuke Todo
Akinori Hosoyamada
Kan Yasuda
2021
journals/tches
AES-LBBB: AES Mode for Lightweight and BBB-Secure Authenticated Encryption.
Yusuke Naito
Yu Sasaki
Takeshi Sugawara
2021
conf/crypto
Quantum Collision Attacks on Reduced SHA-256 and SHA-512.
Akinori Hosoyamada
Yu Sasaki
2021
conf/asiacrypt
Double-Block-Length Hash Function for Minimum Memory Size.
Yusuke Naito
Yu Sasaki
Takeshi Sugawara
2021
conf/sacrypt
Designing S-Boxes Providing Stronger Security Against Differential Cryptanalysis for Ciphers Using Byte-Wise XOR.
Yosuke Todo
Yu Sasaki
2020
journals/tosc
On the Security Margin of TinyJAMBU with Refined Differential and Linear Cryptanalysis.
Dhiman Saha
Yu Sasaki
Danping Shi
Ferdinand Sibleyras
Siwei Sun
Yingjie Zhang
2020
journals/tosc
Preface to Volume 2020, Issue 1.
Gaëtan Leurent
Yu Sasaki
2020
journals/tosc
ESTATE: A Lightweight and Low Energy Authenticated Encryption Mode.
Avik Chakraborti
Nilanjan Datta
Ashwin Jha
Cuauhtemoc Mancillas-López
Mridul Nandi
Yu Sasaki
2020
journals/tosc
Improved Attacks on sLiSCP Permutation and Tight Bound of Limited Birthday Distinguishers.
Akinori Hosoyamada
María Naya-Plasencia
Yu Sasaki
2020
journals/tosc
SKINNY-AEAD and SKINNY-Hash.
Christof Beierle
Jérémy Jean
Stefan Kölbl
Gregor Leander
Amir Moradi
Thomas Peyrin
Yu Sasaki
Pascal Sasdrich
Siang Meng Sim
2020
journals/tosc
LM-DAE: Low-Memory Deterministic Authenticated Encryption for 128-bit Security.
Yusuke Naito
Yu Sasaki
Takeshi Sugawara
2020
journals/tosc
Pyjamask: Block Cipher and Authenticated Encryption with Highly Efficient Masked Implementation.
Dahmun Goudarzi
Jérémy Jean
Stefan Kölbl
Thomas Peyrin
Matthieu Rivain
Yu Sasaki
Siang Meng Sim
2020
journals/joc
A Practical Forgery Attack on Lilliput-AE.
Orr Dunkelman
Nathan Keller
Eran Lambooij
Yu Sasaki
2020
conf/crypto
Out of Oddity - New Cryptanalytic Techniques Against Symmetric Primitives Optimized for Integrity Proof Systems.
Tim Beyne
Anne Canteaut
Itai Dinur
Maria Eichlseder
Gregor Leander
Gaëtan Leurent
María Naya-Plasencia
Léo Perrin
Yu Sasaki
Yosuke Todo
Friedrich Wiemer
2020
conf/acns
Lesamnta-LW Revisited: Improved Security Analysis of Primitive and New PRF Mode.
Shoichi Hirose
Yu Sasaki
Hirotaka Yoshida
2020
conf/iwsec
On the Design of Bit Permutation Based Ciphers - The Interplay Among S-Box, Bit Permutation and Key-Addition.
Sumanta Sarkar
Yu Sasaki
Siang Meng Sim
2020
conf/eurocrypt
Finding Hash Collisions with Quantum Computers by Using Differential Trails with Smaller Probability than Birthday Bound.
Akinori Hosoyamada
Yu Sasaki
2020
conf/eurocrypt
Lightweight Authenticated Encryption Mode Suitable for Threshold Implementation.
Yusuke Naito
Yu Sasaki
Takeshi Sugawara
2019
journals/tosc
Preface to Volume 2019, Issue 1.
Florian Mendel
Yu Sasaki
2019
journals/tosc
PEIGEN - a Platform for Evaluation, Implementation, and Generation of S-boxes.
Zhenzhen Bao
Jian Guo
San Ling
Yu Sasaki
2019
journals/tosc
INT-RUP Secure Lightweight Parallel AE Modes.
Avik Chakraborti
Nilanjan Datta
Ashwin Jha
Cuauhtemoc Mancillas-López
Mridul Nandi
Yu Sasaki
2019
journals/joc
Nonlinear Invariant Attack: Practical Attack on Full SCREAM, iSCREAM, and Midori64.
Yosuke Todo
Gregor Leander
Yu Sasaki
2019
journals/joc
Beyond Conventional Security in Sponge-Based Authenticated Encryption Modes.
Philipp Jovanovic
Atul Luykx
Bart Mennink
Yu Sasaki
Kan Yasuda
2019
conf/acisp
Related-Key Boomerang Attacks on GIFT with Automated Trail Search Including BCT Effect.
Yunwen Liu
Yu Sasaki
2019
conf/crypto
Correlation of Quadratic Boolean Functions: Cryptanalysis of All Versions of Full \mathsf MORUS.
Danping Shi
Siwei Sun
Yu Sasaki
Chaoyun Li
Lei Hu
2019
conf/acns
Cryptanalysis of ForkAES.
Subhadeep Banik
Jannis Bossert
Amit Jana
Eik List
Stefan Lucks
Willi Meier
Mostafizar Rahman
Dhiman Saha
Yu Sasaki
2019
conf/ctrsa
Universal Forgery and Multiple Forgeries of MergeMAC and Generalized Constructions.
Tetsu Iwata
Virginie Lallemand
Gregor Leander
Yu Sasaki
2019
conf/ctrsa
Quantum Chosen-Ciphertext Attacks Against Feistel Ciphers.
Gembu Ito
Akinori Hosoyamada
Ryutaroh Matsumoto
Yu Sasaki
Tetsu Iwata
2019
conf/asiacrypt
Quantum Attacks Without Superposition Queries: The Offline Simon's Algorithm.
Xavier Bonnetain
Akinori Hosoyamada
María Naya-Plasencia
Yu Sasaki
André Schrottenloher
2018
conf/acns
Related-Key Boomerang Attacks on Full ANU Lightweight Block Cipher.
Yu Sasaki
2018
conf/ctrsa
Cryptanalysis Against Symmetric-Key Schemes with Online Classical Queries and Offline Quantum Computations.
Akinori Hosoyamada
Yu Sasaki
2018
conf/iwsec
Integer Linear Programming for Three-Subset Meet-in-the-Middle Attacks: Application to GIFT.
Yu Sasaki
2018
conf/eurocrypt
Boomerang Connectivity Table: A New Cryptanalysis Tool.
Carlos Cid
Tao Huang
Thomas Peyrin
Yu Sasaki
Ling Song
2018
conf/asiacrypt
Cryptanalysis of MORUS.
Tomer Ashur
Maria Eichlseder
Martin M. Lauridsen
Gaëtan Leurent
Brice Minaud
Yann Rotella
Yu Sasaki
Benoît Viguier
2018
conf/africacrypt
Improved Related-Tweakey Boomerang Attacks on Deoxys-BC.
Yu Sasaki
2018
conf/sacrypt
Cryptanalysis of Reduced sLiSCP Permutation in Sponge-Hash and Duplex-AE Modes.
Yunwen Liu
Yu Sasaki
Ling Song
Gaoli Wang
2017
journals/tosc
Refined Probability of Differential Characteristics Including Dependency Between Multiple Rounds.
Anne Canteaut
Eran Lambooij
Samuel Neves
Shahram Rasoolzadeh
Yu Sasaki
Marc Stevens
2017
journals/tosc
A Security Analysis of Deoxys and its Internal Tweakable Block Ciphers.
Carlos Cid
Tao Huang
Thomas Peyrin
Yu Sasaki
Ling Song
2017
journals/tosc
MILP Modeling for (Large) S-boxes to Optimize Probability of Differential Characteristics.
Ahmed Abdelkhalek
Yu Sasaki
Yosuke Todo
Mohamed Tolba
Amr M. Youssef
2017
conf/ches
GIFT: A Small Present - Towards Reaching the Limit of Lightweight Encryption.
Subhadeep Banik
Sumit Kumar Pandey
Thomas Peyrin
Yu Sasaki
Siang Meng Sim
Yosuke Todo
2017
conf/iwsec
Analyzing Key Schedule of Simon: Iterative Key Differences and Application to Related-Key Impossible Differentials.
Kota Kondo
Yu Sasaki
Yosuke Todo
Tetsu Iwata
2017
conf/eurocrypt
New Impossible Differential Search Tool from Design and Cryptanalysis Aspects - Revealing Structural Properties of Several Ciphers.
Yu Sasaki
Yosuke Todo
2017
conf/asiacrypt
Quantum Multicollision-Finding Algorithm.
Akinori Hosoyamada
Yu Sasaki
Keita Xagawa
2016
journals/tosc
Meet-in-the-Middle Attacks on Classes of Contracting and Expanding Feistel Constructions.
Jian Guo
Jérémy Jean
Ivica Nikolic
Yu Sasaki
2016
journals/tosc
Invariant Subspace Attack Against Midori64 and The Resistance Criteria for S-box Designs.
Jian Guo
Jérémy Jean
Ivica Nikolic
Kexin Qiao
Yu Sasaki
Siang Meng Sim
2016
conf/fse
Cryptanalysis of Reduced NORX.
Nasour Bagheri
Tao Huang
Keting Jia
Florian Mendel
Yu Sasaki
2016
conf/acisp
Improved Rebound Attacks on AESQ: Core Permutation of CAESAR Candidate PAEQ.
Nasour Bagheri
Florian Mendel
Yu Sasaki
2016
conf/crypto
The SKINNY Family of Block Ciphers and Its Low-Latency Variant MANTIS.
Christof Beierle
Jérémy Jean
Stefan Kölbl
Gregor Leander
Amir Moradi
Thomas Peyrin
Yu Sasaki
Pascal Sasdrich
Siang Meng Sim
2016
conf/acns
On the Design Rationale of Simon Block Cipher: Integral Attacks and Impossible Differential Attacks against Simon Variants.
Kota Kondo
Yu Sasaki
Tetsu Iwata
2016
conf/asiacrypt
Nonlinear Invariant Attack - Practical Attack on Full SCREAM, iSCREAM, and Midori64.
Yosuke Todo
Gregor Leander
Yu Sasaki
2016
conf/asiacrypt
A New Algorithm for the Unbalanced Meet-in-the-Middle Problem.
Ivica Nikolic
Yu Sasaki
2016
conf/sacrypt
New Differential Bounds and Division Property of Lilliput: Block Cipher with Extended Generalized Feistel Network.
Yu Sasaki
Yosuke Todo
2015
conf/ctrsa
How to Incorporate Associated Data in Sponge-Based Authenticated Encryption.
Yu Sasaki
Kan Yasuda
2015
conf/asiacrypt
Refinements of the k-tree Algorithm for the Generalized Birthday Problem.
Ivica Nikolic
Yu Sasaki
2015
conf/sacrypt
A New Mode of Operation for Incremental Authenticated Encryption with Associated Data.
Yu Sasaki
Kan Yasuda
2015
conf/sacrypt
Analysis of the CAESAR Candidate Silver.
Jérémy Jean
Yu Sasaki
Lei Wang
2014
conf/fse
Equivalent Key Recovery Attacks Against HMAC and NMAC with Whirlpool Reduced to 7 Rounds.
Jian Guo
Yu Sasaki
Lei Wang
Meiqin Wang
Long Wen
2014
conf/crypto
Updates on Generic Attacks against HMAC and NMAC.
Jian Guo
Thomas Peyrin
Yu Sasaki
Lei Wang
2014
conf/acns
Memoryless Unbalanced Meet-in-the-Middle Attacks: Impossible Results and Applications.
Yu Sasaki
2014
conf/ctrsa
An Automated Evaluation Tool for Improved Rebound Attack: New Distinguishers and Proposals of ShiftBytes Parameters for Grøstl.
Yu Sasaki
Yuuki Tokushige
Lei Wang
Mitsugu Iwamoto
Kazuo Ohta
2014
conf/asiacrypt
Meet-in-the-Middle Attacks on Generic Feistel Constructions.
Jian Guo
Jérémy Jean
Ivica Nikolic
Yu Sasaki
2014
conf/sacrypt
Practical Cryptanalysis of PAES.
Jérémy Jean
Ivica Nikolic
Yu Sasaki
Lei Wang
2014
conf/cans
Message Extension Attack against Authenticated Encryptions: Application to PANDA.
Yu Sasaki
Lei Wang
2013
conf/acisp
Related-Key Boomerang Attacks on KATAN32/48/64.
Takanori Isobe
Yu Sasaki
Jiageng Chen
2013
conf/fc
Coupon Collector's Problem for Fault Analysis against AES - High Tolerance for Noisy Fault Injections.
Yu Sasaki
Yang Li
Hikaru Sakamoto
Kazuo Sakiyama
2013
conf/acns
Preimage Attacks on Feistel-SP Functions: Impact of Omitting the Last Network Twist.
Yu Sasaki
2013
conf/icisc
Bitwise Partial-Sum on HIGHT: A New Tool for Integral Analysis Against ARX Designs.
Yu Sasaki
Lei Wang
2013
conf/iwsec
Generic State-Recovery and Forgery Attacks on ChopMD-MAC and on NMAC/HMAC.
Yusuke Naito
Yu Sasaki
Lei Wang
Kan Yasuda
2013
conf/iwsec
New Property of Diffusion Switching Mechanism on CLEFIA and Its Application to DFA.
Yosuke Todo
Yu Sasaki
2013
conf/asiacrypt
Limited-Birthday Distinguishers for Hash Functions - Collisions beyond the Birthday Bound Can Be Meaningful.
Mitsugu Iwamoto
Thomas Peyrin
Yu Sasaki
2013
conf/asiacrypt
Cryptanalysis of HMAC/NMAC-Whirlpool.
Jian Guo
Yu Sasaki
Lei Wang
Shuang Wu
2013
conf/sacrypt
Improved Single-Key Distinguisher on HMAC-MD5 and Key Recovery Attacks on Sandwich-MAC-MD5.
Yu Sasaki
Lei Wang
2012
conf/acisp
Improved Known-Key Distinguishers on Feistel-SP Ciphers and Application to Camellia.
Yu Sasaki
Sareh Emami
Deukjo Hong
Ashish Kumar
2012
conf/acns
Distinguishers beyond Three Rounds of the RIPEMD-128/-160 Compression Functions.
Yu Sasaki
Lei Wang
2012
conf/icisc
Comprehensive Study of Integral Analysis on 22-Round LBlock.
Yu Sasaki
Lei Wang
2012
conf/icisc
Key-Dependent Weakness of AES-Based Ciphers under Clockwise Collision Distinguisher.
Toshiki Nakasone
Yang Li
Yu Sasaki
Mitsugu Iwamoto
Kazuo Ohta
Kazuo Sakiyama
2012
conf/icisc
Multi-differential Cryptanalysis on Reduced DM-PRESENT-80: Collisions and Other Differential Properties.
Takuma Koyama
Yu Sasaki
Noboru Kunihiro
2012
conf/iwsec
Polynomial-Advantage Cryptanalysis of 3D Cipher and 3D-Based Hash Function.
Lei Wang
Yu Sasaki
Kazuo Sakiyama
Kazuo Ohta
2012
conf/iwsec
Boomerang Distinguishers for Full HAS-160 Compression Function.
Yu Sasaki
Lei Wang
Yasuhiro Takasaki
Kazuo Sakiyama
Kazuo Ohta
2012
conf/eurocrypt
Cryptanalyses on a Merkle-Damgård Based MAC - Almost Universal Forgery and Distinguishing-H Attacks.
Yu Sasaki
2012
conf/asiacrypt
Generic Related-Key Attacks for HMAC.
Thomas Peyrin
Yu Sasaki
Lei Wang
2012
conf/asiacrypt
Investigating Fundamental Security Requirements on Whirlpool: Improved Preimage and Collision Attacks.
Yu Sasaki
Lei Wang
Shuang Wu
Wenling Wu
2012
conf/africacrypt
Three-Subset Meet-in-the-Middle Attack on Reduced XTEA.
Yu Sasaki
Lei Wang
Yasuhide Sakai
Kazuo Sakiyama
Kazuo Ohta
2012
conf/sacrypt
Meet-in-the-Middle Technique for Integral Attacks against Feistel Ciphers.
Yu Sasaki
Lei Wang
2011
conf/fse
Meet-in-the-Middle Preimage Attacks on AES Hashing Modes and an Application to Whirlpool.
Yu Sasaki
2011
conf/fse
Known-Key Distinguishers on 11-Round Feistel and Collision Attacks on Its Hashing Modes.
Yu Sasaki
Kan Yasuda
2011
conf/acisp
Preimage Attacks on Full-ARIRANG (Poster).
Chiaki Ohtahara
Keita Okada
Yu Sasaki
Takeshi Shimoyama
2011
conf/icisc
Improved Integral Analysis on Tweaked Lesamnta.
Yu Sasaki
Kazumaro Aoki
2011
conf/wisa
Preimage Attacks on Full-ARIRANG: Analysis of DM-Mode with Middle Feed-Forward.
Chiaki Ohtahara
Keita Okada
Yu Sasaki
Takeshi Shimoyama
2011
conf/ctrsa
(Second) Preimage Attacks on Step-Reduced RIPEMD/RIPEMD-128 with a New Local-Collision Approach.
Lei Wang
Yu Sasaki
Wataru Komatsubara
Kazuo Ohta
Kazuo Sakiyama
2011
conf/iwsec
Experimental Verification of Super-Sbox Analysis - Confirmation of Detailed Attack Complexity.
Yu Sasaki
Naoyuki Takayanagi
Kazuo Sakiyama
Kazuo Ohta
2011
conf/africacrypt
Collisions of MMO-MD5 and Their Impact on Original MD5.
Yu Sasaki
2011
conf/sacrypt
Boomerang Distinguishers on MD4-Family: First Practical Results on Full 5-Pass HAVAL.
Yu Sasaki
2010
conf/fse
Finding Preimages of Tiger Up to 23 Steps.
Lei Wang
Yu Sasaki
2010
conf/icisc
Preimage Attacks against PKC98-Hash and HAS-V.
Yu Sasaki
Florian Mendel
Kazumaro Aoki
2010
conf/iwsec
Parameter.
Yu Sasaki
2010
conf/asiacrypt
Non-full-active Super-Sbox Analysis: Applications to ECHO and Grøstl.
Yu Sasaki
Yang Li
Lei Wang
Kazuo Sakiyama
Kazuo Ohta
2009
conf/acisp
Meet-in-the-Middle Preimage Attacks on Double-Branch Hash Functions: Application to RIPEMD and Others.
Yu Sasaki
Kazumaro Aoki
2009
conf/crypto
Meet-in-the-Middle Preimage Attacks Against Reduced SHA-0 and SHA-1.
Kazumaro Aoki
Yu Sasaki
2009
conf/icisc
Improved Preimage Attack for 68-Step HAS-160.
Deukjo Hong
Bonwook Koo
Yu Sasaki
2009
conf/iwsec
Bit-Free Collision: Application to APOP Attack.
Lei Wang
Yu Sasaki
Kazuo Sakiyama
Kazuo Ohta
2009
conf/eurocrypt
Finding Preimages in Full MD5 Faster Than Exhaustive Search.
Yu Sasaki
Kazumaro Aoki
2009
conf/asiacrypt
Rebound Attack on the Full Lane Compression Function.
Krystian Matusiewicz
María Naya-Plasencia
Ivica Nikolic
Yu Sasaki
Martin Schläffer
2009
conf/asiacrypt
Preimages for Step-Reduced SHA-2.
Kazumaro Aoki
Jian Guo
Krystian Matusiewicz
Yu Sasaki
Lei Wang
2009
conf/sacrypt
Cryptanalyses of Narrow-Pipe Mode of Operation in AURORA-512 Hash Function.
Yu Sasaki
2008
conf/ccs
A strict evaluation method on the number of conditions for the SHA-1 collision search.
Jun Yajima
Terutoshi Iwasaki
Yusuke Naito
Yu Sasaki
Takeshi Shimoyama
Noboru Kunihiro
Kazuo Ohta
2008
conf/acisp
Preimage Attacks on Step-Reduced MD5.
Yu Sasaki
Kazumaro Aoki
2008
conf/icisc
A Preimage Attack for 52-Step HAS-160.
Yu Sasaki
Kazumaro Aoki
2008
conf/ctrsa
Security of MD5 Challenge and Response: Extension of APOP Password Recovery Attack.
Yu Sasaki
Lei Wang
Kazuo Ohta
Noboru Kunihiro
2008
conf/asiacrypt
Preimage Attacks on 3, 4, and 5-Pass HAVAL.
Yu Sasaki
Kazumaro Aoki
2008
conf/africacrypt
Password Recovery on Challenge and Response: Impossible Differential Attack on Hash Function.
Yu Sasaki
Lei Wang
Kazuo Ohta
Noboru Kunihiro
2008
conf/sacrypt
Preimage Attacks on One-Block MD4, 63-Step MD5 and More.
Kazumaro Aoki
Yu Sasaki
2007
conf/fse
New Message Difference for MD4.
Yu Sasaki
Lei Wang
Kazuo Ohta
Noboru Kunihiro
2007
conf/acisp
A New Strategy for Finding a Differential Path of SHA-1.
Jun Yajima
Yu Sasaki
Yusuke Naito
Terutoshi Iwasaki
Takeshi Shimoyama
Noboru Kunihiro
Kazuo Ohta
2006
conf/asiacrypt
Improved Collision Search for SHA-0.
Yusuke Naito
Yu Sasaki
Takeshi Shimoyama
Jun Yajima
Noboru Kunihiro
Kazuo Ohta
2005
conf/icisc
Improved Collision Attack on MD4 with Probability Almost 1.
Yusuke Naito
Yu Sasaki
Noboru Kunihiro
Kazuo Ohta
Coauthors
Ahmed Abdelkhalek
(1)
Akiko Inoue
(1)
Akinori Hosoyamada
(8)
Amir Moradi
(2)
Amit Jana
(1)
Amr M. Youssef
(1)
André Schrottenloher
(1)
Anne Canteaut
(2)
Ashish Kumar
(1)
Ashwin Jha
(3)
Atul Luykx
(1)
Avijit Dutta
(1)
Avik Chakraborti
(2)
Bart Mennink
(1)
Benoît Viguier
(1)
Bonwook Koo
(1)
Brice Minaud
(1)
Carlos Cid
(2)
Chaoyun Li
(1)
Chiaki Ohtahara
(2)
Christof Beierle
(2)
Cuauhtemoc Mancillas-López
(2)
Dahmun Goudarzi
(1)
Danping Shi
(2)
Deukjo Hong
(2)
Dhiman Saha
(2)
Eik List
(1)
Eran Lambooij
(2)
Ferdinand Sibleyras
(2)
Florian Mendel
(4)
Friedrich Wiemer
(1)
Gaëtan Leurent
(3)
Gaoli Wang
(1)
Gembu Ito
(1)
Gregor Leander
(6)
Hikaru Sakamoto
(1)
Hirotaka Yoshida
(1)
Itai Dinur
(1)
Ivica Nikolic
(7)
Jannis Bossert
(1)
Jérémy Jean
(8)
Jiageng Chen
(1)
Jian Guo
(8)
Jun Yajima
(3)
Kan Yasuda
(7)
Kazuhiko Minematsu
(1)
Kazumaro Aoki
(10)
Kazuo Ohta
(16)
Kazuo Sakiyama
(9)
Keita Okada
(2)
Keita Xagawa
(1)
Keting Jia
(1)
Kexin Qiao
(1)
Kota Kondo
(2)
Krystian Matusiewicz
(2)
Lei Hu
(1)
Lei Wang
(26)
Léo Perrin
(1)
Ling Song
(3)
Long Wen
(1)
Marc Stevens
(1)
Maria Eichlseder
(2)
María Naya-Plasencia
(4)
Martin M. Lauridsen
(1)
Martin Schläffer
(1)
Matthieu Rivain
(1)
Meiqin Wang
(1)
Meltem Sönmez Turan
(1)
Mitsugu Iwamoto
(3)
Mohamed Tolba
(1)
Mostafizar Rahman
(1)
Mridul Nandi
(3)
Naoyuki Takayanagi
(1)
Nasour Bagheri
(2)
Nathan Keller
(1)
Nilanjan Datta
(2)
Noboru Kunihiro
(8)
Orr Dunkelman
(1)
Pascal Sasdrich
(2)
Philipp Jovanovic
(1)
Ritam Bhaumik
(1)
Ryutaroh Matsumoto
(1)
Samuel Neves
(1)
San Ling
(1)
Sareh Emami
(1)
Shahram Rasoolzadeh
(1)
Shoichi Hirose
(1)
Shuang Wu
(2)
Siang Meng Sim
(6)
Siwei Sun
(2)
Stefan Kölbl
(3)
Stefan Lucks
(1)
Stefano Tessaro
(1)
Subhadeep Banik
(2)
Sumanta Sarkar
(1)
Sumit Kumar Pandey
(1)
Takanori Isobe
(1)
Takeshi Shimoyama
(5)
Takeshi Sugawara
(13)
Takuma Koyama
(1)
Tao Huang
(3)
Terutoshi Iwasaki
(2)
Tetsu Iwata
(5)
Thomas Peyrin
(9)
Tim Beyne
(1)
Tomer Ashur
(1)
Toshiki Nakasone
(1)
Virginie Lallemand
(1)
Wataru Komatsubara
(1)
Wenling Wu
(1)
Willi Meier
(1)
Xavier Bonnetain
(1)
Yang Li
(3)
Yann Rotella
(1)
Yasuhide Sakai
(1)
Yasuhiro Takasaki
(1)
Yingjie Zhang
(1)
Yosuke Todo
(11)
Yu Sasaki
(126)
Yunwen Liu
(2)
Yusuke Naito
(18)
Yuuki Tokushige
(1)
Zhenzhen Bao
(1)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to