Y
Yosuke Todo
Researcher at Ruhr University Bochum
Publications - 82
Citations - 1993
Yosuke Todo is an academic researcher from Ruhr University Bochum. The author has contributed to research in topics: Block cipher & Computer science. The author has an hindex of 17, co-authored 73 publications receiving 1345 citations. Previous affiliations of Yosuke Todo include Nippon Telegraph and Telephone & Kobe University.
Papers
More filters
Book ChapterDOI
GIFT : A Small Present
Subhadeep Banik,Subhadeep Banik,Sumit Kumar Pandey,Thomas Peyrin,Yu Sasaki,Siang Meng Sim,Yosuke Todo +6 more
TL;DR: In this article, the authors revisited the design strategy of PRESENT, leveraging all the advances provided by the research community in construction and cryptanalysis since its publication, to push the design up to its limits.
Book ChapterDOI
Structural Evaluation by Generalized Integral Property
TL;DR: In this paper, a new property called the division property was proposed, which can effectively construct the integral distinguisher even if the block cipher has non-bijective functions, bit-oriented structures, and low-degree functions.
Book ChapterDOI
Bit-Based Division Property and Application to Simon Family
Yosuke Todo,Masakatu Morii +1 more
TL;DR: A bit-based division property is introduced and applied to the Simoni¾?family and it is shown that Simon48, 64, 96, and 128 probably do not have 17-, 20-, 25-, and 29-round integral characteristics, respectively.
Proceedings Article
GIFT: A Small Present Towards Reaching the Limit of Lightweight Encryption
TL;DR: An improved version of PRESENT is obtained, named GIFT, that provides a much increased efficiency in all domains (smaller and faster), while correcting the well-known weakness of PRES present with regards to linear hulls.
Book ChapterDOI
Cryptanalysis of Reduced-round SIMON32 and SIMON48
Qingju Wang,Qingju Wang,Zhiqiang Liu,Zhiqiang Liu,Kerem Varici,Kerem Varici,Yu Sasaki,Vincent Rijmen,Yosuke Todo +8 more
TL;DR: In this paper, the security of SIMON32, SIMON48/72 and SIMON 48/96 was analyzed by using integral, zero-correlation linear and impossible differential cryptanalysis.