scispace - formally typeset
Y

Yu Sasaki

Researcher at Nippon Telegraph and Telephone

Publications -  195
Citations -  4650

Yu Sasaki is an academic researcher from Nippon Telegraph and Telephone. The author has contributed to research in topics: Hash function & Collision attack. The author has an hindex of 29, co-authored 195 publications receiving 3665 citations. Previous affiliations of Yu Sasaki include Kindai University & University of Electro-Communications.

Papers
More filters
Book ChapterDOI

The SKINNY Family of Block Ciphers and Its Low-Latency Variant MANTIS

TL;DR: A new tweakable block cipher family SKINNY is presented, whose goal is to compete with NSA recent design SIMON in terms of hardware/software performances, while proving in addition much stronger security guarantees with regards to differential/linear attacks.
Book ChapterDOI

GIFT : A Small Present

TL;DR: In this article, the authors revisited the design strategy of PRESENT, leveraging all the advances provided by the research community in construction and cryptanalysis since its publication, to push the design up to its limits.
Book ChapterDOI

Finding Preimages in Full MD5 Faster Than Exhaustive Search

TL;DR: This paper presents the first cryptographic preimage attack on the full MD5 hash function, based on splice-and-cut and local-collision techniques that have been applied to step-reduced MD5 and other hash functions.
Book ChapterDOI

Preimage Attacks on One-Block MD4, 63-Step MD5 and More

Kazumaro Aoki, +1 more
TL;DR: This paper shows preimage attacks on one-block MD4 and MD5 reduced to 63 (out of 64) steps, based on the meet-in-the-middle attack, and many additional improvements make the preimage computable faster than that of the brute-force attack, 2128 hash computation.
Book ChapterDOI

Meet-in-the-Middle Preimage Attacks Against Reduced SHA-0 and SHA-1

Kazumaro Aoki, +1 more
TL;DR: The newly developed cryptanalytic techniques enable the meet-in-the-middle attack to be applied to reduced SHA-0 and SHA-1 hash functions by analyzing a message schedule that does not consist of permutations but linear combinations of message words.