Piccolo: An Ultra-Lightweight Blockcipher K Shibutani, T Isobe, H Hiwatari, A Mitsuda, T Akishita, T Shirai Cryptographic Hardware and Embedded Systems–CHES 2011: 13th International …, 2011 | 777 | 2011 |
Midori: A Block Cipher for Low Energy S Banik, A Bogdanov, T Isobe, K Shibutani, H Hiwatari, T Akishita, ... Advances in Cryptology–ASIACRYPT 2015: 21st International Conference on the …, 2015 | 631 | 2015 |
Cube attacks on non-blackbox polynomials based on division property Y Todo, T Isobe, Y Hao, W Meier IEEE Transactions on Computers 67 (12), 1720-1736, 2018 | 164 | 2018 |
A single-key attack on the full GOST block cipher T Isobe Journal of cryptology 26, 172-189, 2013 | 153 | 2013 |
White-box cryptography revisited: Space-hard ciphers A Bogdanov, T Isobe Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications …, 2015 | 118 | 2015 |
Improved division property based cube attacks exploiting algebraic properties of superpoly Y Hao, T Isobe, L Jiao, C Li, W Meier, Y Todo, Q Wang IEEE Transactions on Computers 68 (10), 1470-1486, 2019 | 108 | 2019 |
Security analysis of the lightweight block ciphers XTEA, LED and Piccolo T Isobe, K Shibutani Information Security and Privacy: 17th Australasian Conference, ACISP 2012 …, 2012 | 87 | 2012 |
Towards practical whitebox cryptography: optimizing efficiency and space hardness A Bogdanov, T Isobe, E Tischhauser International Conference on the Theory and Application of Cryptology and …, 2016 | 79 | 2016 |
Full plaintext recovery attack on broadcast RC4 T Isobe, T Ohigashi, Y Watanabe, M Morii International Workshop on Fast Software Encryption, 179-202, 2013 | 76 | 2013 |
Generic key recovery attack on Feistel scheme T Isobe, K Shibutani Advances in Cryptology-ASIACRYPT 2013: 19th International Conference on the …, 2013 | 70 | 2013 |
Fast correlation attack revisited: cryptanalysis on full grain-128a, grain-128, and grain-v1 Y Todo, T Isobe, W Meier, K Aoki, B Zhang Advances in Cryptology–CRYPTO 2018: 38th Annual International Cryptology …, 2018 | 68 | 2018 |
Analysis of software countermeasures for whitebox encryption S Banik, A Bogdanov, T Isobe, MB Jepsen Cryptology ePrint Archive, 2017 | 59 | 2017 |
WARP: Revisiting GFN for lightweight 128-bit block cipher S Banik, Z Bao, T Isobe, H Kubo, F Liu, K Minematsu, K Sakamoto, ... Selected Areas in Cryptography: 27th International Conference, Halifax, NS …, 2021 | 58 | 2021 |
All subkeys recovery attack on block ciphers: Extending meet-in-the-middle approach T Isobe, K Shibutani Selected Areas in Cryptography: 19th International Conference, SAC 2012 …, 2013 | 57 | 2013 |
Preimage attacks on reduced Tiger and SHA-2 T Isobe, K Shibutani Fast Software Encryption: 16th International Workshop, FSE 2009 Leuven …, 2009 | 52 | 2009 |
Cryptanalysis of full LowMC and LowMC-M with algebraic techniques F Liu, T Isobe, W Meier Advances in Cryptology–CRYPTO 2021: 41st Annual International Cryptology …, 2021 | 43 | 2021 |
More results on shortest linear programs S Banik, Y Funabiki, T Isobe Advances in Information and Computer Security: 14th International Workshop …, 2019 | 43 | 2019 |
Towards low energy stream ciphers S Banik, V Mikhalev, F Armknecht, T Isobe, W Meier, A Bogdanov, ... IACR Transactions on Symmetric Cryptology, 1-19, 2018 | 38 | 2018 |
Converting meet-in-the-middle preimage attack into pseudo collision attack: Application to SHA-2 J Li, T Isobe, K Shibutani International workshop on fast software encryption, 264-286, 2012 | 38 | 2012 |
Automatic verification of differential characteristics: application to reduced gimli F Liu, T Isobe, W Meier Advances in Cryptology–CRYPTO 2020: 40th Annual International Cryptology …, 2020 | 36* | 2020 |