Y
Yu Sasaki
Researcher at Nippon Telegraph and Telephone
Publications - 195
Citations - 4650
Yu Sasaki is an academic researcher from Nippon Telegraph and Telephone. The author has contributed to research in topics: Hash function & Collision attack. The author has an hindex of 29, co-authored 195 publications receiving 3665 citations. Previous affiliations of Yu Sasaki include Kindai University & University of Electro-Communications.
Papers
More filters
Book ChapterDOI
The SKINNY Family of Block Ciphers and Its Low-Latency Variant MANTIS
Christof Beierle,Jérémy Jean,Stefan Kölbl,Gregor Leander,Amir Moradi,Thomas Peyrin,Yu Sasaki,Pascal Sasdrich,Siang Meng Sim +8 more
TL;DR: A new tweakable block cipher family SKINNY is presented, whose goal is to compete with NSA recent design SIMON in terms of hardware/software performances, while proving in addition much stronger security guarantees with regards to differential/linear attacks.
Book ChapterDOI
GIFT : A Small Present
Subhadeep Banik,Subhadeep Banik,Sumit Kumar Pandey,Thomas Peyrin,Yu Sasaki,Siang Meng Sim,Yosuke Todo +6 more
TL;DR: In this article, the authors revisited the design strategy of PRESENT, leveraging all the advances provided by the research community in construction and cryptanalysis since its publication, to push the design up to its limits.
Book ChapterDOI
Finding Preimages in Full MD5 Faster Than Exhaustive Search
Yu Sasaki,Kazumaro Aoki +1 more
TL;DR: This paper presents the first cryptographic preimage attack on the full MD5 hash function, based on splice-and-cut and local-collision techniques that have been applied to step-reduced MD5 and other hash functions.
Book ChapterDOI
Preimage Attacks on One-Block MD4, 63-Step MD5 and More
Kazumaro Aoki,Yu Sasaki +1 more
TL;DR: This paper shows preimage attacks on one-block MD4 and MD5 reduced to 63 (out of 64) steps, based on the meet-in-the-middle attack, and many additional improvements make the preimage computable faster than that of the brute-force attack, 2128 hash computation.
Book ChapterDOI
Meet-in-the-Middle Preimage Attacks Against Reduced SHA-0 and SHA-1
Kazumaro Aoki,Yu Sasaki +1 more
TL;DR: The newly developed cryptanalytic techniques enable the meet-in-the-middle attack to be applied to reduced SHA-0 and SHA-1 hash functions by analyzing a message schedule that does not consist of permutations but linear combinations of message words.