Security Analysis of End-to-End Encryption for Zoom Meetings T Isobe, R Ito | 28 | 2021 |
PNB-focused differential cryptanalysis of ChaCha stream cipher S Miyashita, R Ito, A Miyaji Australasian Conference on Information Security and Privacy, 46-66, 2022 | 14* | 2022 |
Output prediction attacks on block ciphers using deep learning H Kimura, K Emura, T Isobe, R Ito, K Ogawa, T Ohigashi International Conference on Applied Cryptography and Network Security, 248-276, 2022 | 14 | 2022 |
Cryptanalysis of Rocca and feasibility of its security claim A Hosoyamada, A Inoue, R Ito, T Iwata, K Minematsu, F Sibleyras, Y Todo IACR Transactions on Symmetric Cryptology, 123-151, 2022 | 11 | 2022 |
Distinguishing and key recovery attacks on the reduced-round SNOW-V and SNOW-Vi J Hoki, T Isobe, R Ito, F Liu, K Sakamoto Journal of Information Security and Applications 65, 103100, 2022 | 10 | 2022 |
Security Analysis of SFrame T Isobe, R Ito, K Minematsu IACR Cryptol. ePrint Arch. 2021, 424, 2021 | 6 | 2021 |
Rotational cryptanalysis of salsa core function R Ito International Conference on Information Security, 129-145, 2020 | 6 | 2020 |
New Linear Correlations related to State Information of RC4 PRGA using IV in WPA R Ito, A Miyaji International Workshop on Fast Software Encryption, 557-576, 2015 | 6 | 2015 |
Refined construction of RC4 key setting in WPA R Ito, A Miyaji IEICE Transactions on Fundamentals of Electronics, Communications and …, 2017 | 5 | 2017 |
Key committing security of AEZ and more YL Chen, A Flórez-Gutiérrez, A Inoue, R Ito, T Iwata, K Minematsu, ... IACR Transactions on Symmetric Cryptology 2023 (4), 452-488, 2023 | 4 | 2023 |
Areion: Highly-Efficient Permutations and Its Applications (Extended Version) T Isobe, R Ito, F Liu, K Minematsu, M Nakahashi, K Sakamoto, R Shiba Cryptology ePrint Archive, 2023 | 4* | 2023 |
Bit-wise Cryptanalysis on AND-RX Permutation Friet-PC R Ito, R Shiba, K Sakamoto, F Liu, T Isobe | 4 | 2021 |
Parallel SAT framework to find clustering of differential characteristics and its applications K Sakamoto, R Ito, T Isobe International Conference on Selected Areas in Cryptography, 409-428, 2023 | 3 | 2023 |
Distinguishing and key recovery attacks on the reduced-round SNOW-V J Hoki, T Isobe, R Ito, F Liu, K Sakamoto Australasian Conference on Information Security and Privacy, 171-190, 2021 | 3 | 2021 |
Refined glimpse correlations of RC4 R Ito, A Miyaji IEICE Transactions on Fundamentals of Electronics, Communications and …, 2016 | 3 | 2016 |
PNB based differential cryptanalysis of Salsa20 and Chacha N Ghafoori, A Miyaji, R Ito, S Miyashita IEICE TRANSACTIONS on Information and Systems 106 (9), 1407-1422, 2023 | 2 | 2023 |
A Deeper Look into Deep Learning-based Output Prediction Attacks Using Weak SPN Block Ciphers H Kimura, K Emura, T Isobe, R Ito, K Ogawa, T Ohigashi Journal of Information Processing 31, 550-561, 2023 | 2 | 2023 |
New Cryptanalysis of ZUC-256 Initialization Using Modular Differences F Liu, W Meier, S Sarkar, G Wang, R Ito, T Isobe | 2 | 2022 |
New iterated RC4 key correlations and their application to plaintext recovery on WPA-TKIP R Ito, A Miyaji IEICE Transactions on Fundamentals of Electronics, Communications and …, 2021 | 2 | 2021 |
New iterated RC4 Key correlations R Ito, A Miyaji Information Security and Privacy: 23rd Australasian Conference, ACISP 2018 …, 2018 | 2 | 2018 |