关注
Ryoma Ito
Ryoma Ito
在 nict.go.jp 的电子邮件经过验证 - 首页
标题
引用次数
引用次数
年份
Security Analysis of End-to-End Encryption for Zoom Meetings
T Isobe, R Ito
282021
PNB-focused differential cryptanalysis of ChaCha stream cipher
S Miyashita, R Ito, A Miyaji
Australasian Conference on Information Security and Privacy, 46-66, 2022
14*2022
Output prediction attacks on block ciphers using deep learning
H Kimura, K Emura, T Isobe, R Ito, K Ogawa, T Ohigashi
International Conference on Applied Cryptography and Network Security, 248-276, 2022
142022
Cryptanalysis of Rocca and feasibility of its security claim
A Hosoyamada, A Inoue, R Ito, T Iwata, K Minematsu, F Sibleyras, Y Todo
IACR Transactions on Symmetric Cryptology, 123-151, 2022
112022
Distinguishing and key recovery attacks on the reduced-round SNOW-V and SNOW-Vi
J Hoki, T Isobe, R Ito, F Liu, K Sakamoto
Journal of Information Security and Applications 65, 103100, 2022
102022
Security Analysis of SFrame
T Isobe, R Ito, K Minematsu
IACR Cryptol. ePrint Arch. 2021, 424, 2021
62021
Rotational cryptanalysis of salsa core function
R Ito
International Conference on Information Security, 129-145, 2020
62020
New Linear Correlations related to State Information of RC4 PRGA using IV in WPA
R Ito, A Miyaji
International Workshop on Fast Software Encryption, 557-576, 2015
62015
Refined construction of RC4 key setting in WPA
R Ito, A Miyaji
IEICE Transactions on Fundamentals of Electronics, Communications and …, 2017
52017
Key committing security of AEZ and more
YL Chen, A Flórez-Gutiérrez, A Inoue, R Ito, T Iwata, K Minematsu, ...
IACR Transactions on Symmetric Cryptology 2023 (4), 452-488, 2023
42023
Areion: Highly-Efficient Permutations and Its Applications (Extended Version)
T Isobe, R Ito, F Liu, K Minematsu, M Nakahashi, K Sakamoto, R Shiba
Cryptology ePrint Archive, 2023
4*2023
Bit-wise Cryptanalysis on AND-RX Permutation Friet-PC
R Ito, R Shiba, K Sakamoto, F Liu, T Isobe
42021
Parallel SAT framework to find clustering of differential characteristics and its applications
K Sakamoto, R Ito, T Isobe
International Conference on Selected Areas in Cryptography, 409-428, 2023
32023
Distinguishing and key recovery attacks on the reduced-round SNOW-V
J Hoki, T Isobe, R Ito, F Liu, K Sakamoto
Australasian Conference on Information Security and Privacy, 171-190, 2021
32021
Refined glimpse correlations of RC4
R Ito, A Miyaji
IEICE Transactions on Fundamentals of Electronics, Communications and …, 2016
32016
PNB based differential cryptanalysis of Salsa20 and Chacha
N Ghafoori, A Miyaji, R Ito, S Miyashita
IEICE TRANSACTIONS on Information and Systems 106 (9), 1407-1422, 2023
22023
A Deeper Look into Deep Learning-based Output Prediction Attacks Using Weak SPN Block Ciphers
H Kimura, K Emura, T Isobe, R Ito, K Ogawa, T Ohigashi
Journal of Information Processing 31, 550-561, 2023
22023
New Cryptanalysis of ZUC-256 Initialization Using Modular Differences
F Liu, W Meier, S Sarkar, G Wang, R Ito, T Isobe
22022
New iterated RC4 key correlations and their application to plaintext recovery on WPA-TKIP
R Ito, A Miyaji
IEICE Transactions on Fundamentals of Electronics, Communications and …, 2021
22021
New iterated RC4 Key correlations
R Ito, A Miyaji
Information Security and Privacy: 23rd Australasian Conference, ACISP 2018 …, 2018
22018
系统目前无法执行此操作,请稍后再试。
文章 1–20