Follow
Takanori Isobe
Takanori Isobe
Verified email at ai.u-hyogo.ac.jp - Homepage
Title
Cited by
Cited by
Year
Piccolo: An Ultra-Lightweight Blockcipher.
K Shibutani, T Isobe, H Hiwatari, A Mitsuda, T Akishita, T Shirai
CHES 6917, 342-357, 2011
6612011
Midori: A Block Cipher for Low Energy
S Banik, A Bogdanov, T Isobe, K Shibutani, H Hiwatari, T Akishita, ...
Advances in Cryptology–ASIACRYPT 2015: 21st International Conference on the …, 2015
4692015
A single-key attack on the full GOST block cipher
T Isobe
Journal of cryptology 26, 172-189, 2013
1422013
Cube attacks on non-blackbox polynomials based on division property
Y Todo, T Isobe, Y Hao, W Meier
IEEE Transactions on Computers 67 (12), 1720-1736, 2018
1202018
White-box cryptography revisited: Space-hard ciphers
A Bogdanov, T Isobe
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications …, 2015
892015
Security analysis of the lightweight block ciphers XTEA, LED and Piccolo
T Isobe, K Shibutani
Information Security and Privacy: 17th Australasian Conference, ACISP 2012 …, 2012
812012
Full plaintext recovery attack on broadcast RC4
T Isobe, T Ohigashi, Y Watanabe, M Morii
Fast Software Encryption: 20th International Workshop, FSE 2013, Singapore …, 2014
782014
Improved division property based cube attacks exploiting algebraic properties of superpoly
Q Wang, Y Hao, Y Todo, C Li, T Isobe, W Meier
Advances in Cryptology–CRYPTO 2018: 38th Annual International Cryptology …, 2018
772018
Generic key recovery attack on Feistel scheme
T Isobe, K Shibutani
Advances in Cryptology-ASIACRYPT 2013: 19th International Conference on the …, 2013
612013
Towards practical whitebox cryptography: optimizing efficiency and space hardness
A Bogdanov, T Isobe, E Tischhauser
Advances in Cryptology–ASIACRYPT 2016: 22nd International Conference on the …, 2016
572016
Preimage attacks on reduced Tiger and SHA-2
T Isobe, K Shibutani
Fast Software Encryption: 16th International Workshop, FSE 2009 Leuven …, 2009
502009
All subkeys recovery attack on block ciphers: Extending meet-in-the-middle approach
T Isobe, K Shibutani
Selected Areas in Cryptography: 19th International Conference, SAC 2012 …, 2013
492013
Fast correlation attack revisited: cryptanalysis on full grain-128a, grain-128, and grain-v1
Y Todo, T Isobe, W Meier, K Aoki, B Zhang
Advances in Cryptology–CRYPTO 2018: 38th Annual International Cryptology …, 2018
442018
Analysis of software countermeasures for whitebox encryption
S Banik, A Bogdanov, T Isobe, MB Jepsen
Cryptology ePrint Archive, 2017
412017
Converting meet-in-the-middle preimage attack into pseudo collision attack: Application to SHA-2
J Li, T Isobe, K Shibutani
Fast Software Encryption: 19th International Workshop, FSE 2012, Washington …, 2012
312012
More results on shortest linear programs
S Banik, Y Funabiki, T Isobe
Advances in Information and Computer Security: 14th International Workshop …, 2019
292019
How to recover any byte of plaintext on RC4
T Ohigashi, T Isobe, Y Watanabe, M Morii
Selected Areas in Cryptography--SAC 2013: 20th International Conference …, 2014
282014
Towards low energy stream ciphers
S Banik, V Mikhalev, F Armknecht, T Isobe, W Meier, A Bogdanov, ...
IACR Transactions on Symmetric Cryptology, 1-19, 2018
262018
Related-key boomerang attacks on KATAN32/48/64
T Isobe, Y Sasaki, J Chen
Information Security and Privacy: 18th Australasian Conference, ACISP 2013 …, 2013
262013
Automatic verification of differential characteristics: Application to reduced Gimli
F Liu, T Isobe, W Meier
Advances in Cryptology–CRYPTO 2020: 40th Annual International Cryptology …, 2020
25*2020
The system can't perform the operation now. Try again later.
Articles 1–20