顔写真

PHOTO

Isobe Takanori
五十部 孝典
Isobe Takanori
五十部 孝典
Graduate School of Information Science and Technology Department of Multimedia Engineering,Professor

keyword End-to-End Encryption,Cryptanalysis,Whitebox Cryptagraphy,Lightweight Cryptgraphy,Symmetric-key Cryptgraphy

Research History 10

  1. 2025/04 - Present
    The University of Osaka Graduate School of Information Science and Technology

  2. 2018/08 - Present
    National Institute of Information and Communications Technology Invited Advisor

  3. 2023/04 - 2025/03
    University of Hyogo Graduate School of Information Science Professor

  4. 2017/04 - 2023/03
    University of Hyogo Graduate School of Information Science Associate Professor

  5. 2008/04 - 2017/03
    Sony Corporation

  6. 2020/11 - 2022/03
    JST さきがけ 兼任研究員

  7. 2018/04 - 2021/03
    Carnegie Mellon University Adjunct Faculty

  8. 2017/09 - 2018/03
    Carnegie Mellon University Visiting Professor

  9. 2016/04 - 2017/03
    Kobe University Researcher

  10. 2014/09 - 2015/11
    Technical University of Denmark Visiting Reseacher

Education 2

  1. Kobe University Graduate School of Engineering

    2011/10 - 2013/09

  2. Kobe University Graduate School of Science and Technology

    2006/04 - 2008/03

Committee Memberships 30

  1. ASIACRYPT 2025 プログラム委員 Academic society

    2025/04 - 2025/12

  2. EUROCRYPT 2025 プログラム委員

    2024/09 - 2025/08

  3. ASIACRYPT 2024 プログラム委員

    2024/04 - 2024/12

  4. FSE2025/ToSC2024 プログラム委員

    2024/01 - 2024/12

  5. Selected Areas in Cryptography 2023 Program Committee Academic society

    2023/04 - 2023/09

  6. FSE 2023 Co General Chair Academic society

    2023/01 - 2023/03

  7. INDOCRYPT 2022 Program Co-Chair Academic society

    2022/04 - 2023/03

  8. FSE 2023/ToSC2022 Program Commitee

    2022/04 - 2023/03

  9. ASIACRYPT 2022 プログラム委員

    2022/04 - 2022/12

  10. FSE 2022/ToSC2021 Program Committee

    2021/04 - 2022/03

  11. CT-RSA 2021 Program Committee Academic society

    2020/12 - 2021/06

  12. FSE 2021/ToSC2020 Program Commitee Academic society

    2020/04 - 2021/03

  13. ASIACRYPT 2020 Program Committee Academic society

    2020/05 - 2020/12

  14. ASIACRYPT 2019 Program Commitee Academic society

    2019/05 - 2020/03

  15. 電子情報通信学会 情報セキュリティ研究専門委員会 専門委員 Academic society

    2018/06 - 2026/03

  16. コンピュータセキュリティシンポジウム 2025 暗号セッション副チェア

    2025/04 - 2025/10

  17. IWSEC 2025プログラム委員

    2025/04 - 2025/10

  18. INDOCRYPT 2024 プログラム委員

    2024/04 - 2024/12

  19. IWSEC 2024 プログラム委員

    2024/04 - 2024/09

  20. Selected Areas in Cryptography (SAC) 2024 プログラム委員

    2024/04 - 2024/08

  21. INDOCRYPT 2023 プログラム委員

    2023/04 - 2023/12

  22. FSE 2020/ToSC 2019 Program Commitee Academic society

    2019/04 - 2020/03

  23. Asian-workshop on Symmetric Key Cryptography (ASK 2019) General and Program co-chair. Academic society

    2019/04 - 2019/12

  24. INDOCRYPT 2019 Program Commitee Academic society

    2019/04 - 2019/11

  25. SAC 2019 Program Committee Academic society

    2018/10 - 2019/09

  26. ASIACRYPT 2018 Program Commitee Academic society

    2018/03 - 2019/04

  27. Program Committee Academic society

    2018/04 - 2019/03

  28. INDOCRYPT 2018 Program Committee Academic society

    2018/04 - 2019/03

  29. INDOCRYPT 2016 Program Committee Academic society

    2016/04 - 2017/03

  30. FSE 2016 Program Committee Academic society

    2016/04 - 2017/03

Research Areas 1

  1. Informatics / Information security / Cryptgraphy

Awards 16

  1. 船井学術賞

    五十部 孝典 船井情報科学振興財団 2024/05

  2. 末松安晴賞

    五十部 孝典 電子情報通信学会 2023/06

  3. The Young Scientists’ Award

    Takanori Isobe The Commendation for Science and Technology by the Minister of Education, Culture, Sports, Science and Technology 2023/04

  4. Fast Software Encryption 2022 Best Paper Award

    International Association for Cryptologic Research 2023/03

  5. Fast Software Encryption 2022 Best Paper Award

    International Association for Cryptologic Research 2022/03

  6. 2021年暗号と情報セキュリティシンポジウム(SCIS) イノベーション論文賞,

    五十部 孝典, 伊藤 竜馬 電子情報通信学会 2021/07

  7. 第3回 辻井重男セキュリティ論文賞 大賞,

    五十部 孝典, Andrey Bogdanov 日本セキュリテイ・マネジメント学会 2018/10

  8. SCIS 2018 Innovation paper award

    takanori isobe, kazuhiko minematsu 2018/05

  9. 論文賞

    五十部 孝典, 大東俊博, 渡辺優平, 森井昌克 電子情報通信学会 2014/04

  10. Fast Software Encryption 2011 Best Paper Award

    Takanori Isobe International Association for Cryptographic Research 2011/03

  11. SCIS イノベーション論文賞

    2025/01

  12. ICSS研究賞

    白木章伍, 五十部孝典 電子情報通信学会 情報通信システムセキュリティ研究会 2024/06

  13. Best Poster Award,

    Takanori Isobe, Yuji Koike, Takuya Hayashi IWSEC 2019 2019/08

  14. ICSS 2013年度研究賞

    五十部 孝典, 大東俊博, 渡辺優平, 森井昌克, 野島良 電子情報通信学会 2014/04

  15. 2013年暗号と情報セキュリティシンポジウム(SCIS) イノベーション論文賞,

    五十部 孝典, 渡辺優平, 大東俊博, 森井昌克 電子情報通信学会 2013/04

  16. 2007年暗号と情報セキュリティシンポジウム(SCIS) 論文賞

    五十部 孝典, 大東俊博, 桑門秀典, 森井昌克 電子情報通信学会 2008/04

Papers 153

  1. Gravity of the Situation: Security Analysis on Rocket.Chat E2EE

    Hayato Kimura, Ryoma Ito, Kazuhiko Minematsu, Takanori Isobe

    ACSAC 2025 2025/12 Research paper (international conference proceedings)

  2. Exploring SHA Instructions and Its Application to AES-based Schemes

    Takuro Shiraya, Subhadeep Banik, Tatsuya Ishikawa, Ryoma Ito, Mostafizar Rahman, Kosei Sakamoto, Atsushi Tanaka, Shion Utsumi, Takanori Isobe

    IACR Communications in Cryptology 2025/09

  3. Divide-and-Conquer SAT for Exploring Optimal Differential and Linear Characteristics and Its Applications

    Kazuma Taka, Kosei Sakamoto, Ryoma Ito, Rentaro Shiba, Shion Utsumi, Takanori Isobe

    IACR Transactions on Symmetric Cryptology 2025/09 Research paper (scientific journal)

  4. Not Sealed: Practical Attacks on Nostr, a Decentralized Censorship-Resistant Protocol

    Hayato Kimura, Ryoma Ito, Kazuhiko Minematsu, Shogo Shiraki, Takanori Isobe

    Black Hat USA 202 Briefing 2025/08 Research paper (conference, symposium, etc.)

  5. Not in The Prophecies: Practical Attacks on Nostr.

    Hayato Kimura, Ryoma Ito, Kazuhiko Minematsu, Shogo Shiraki, Takanori Isobe

    EuroS&P p. 585-606 2025/06 Research paper (international conference proceedings)

  6. AETHER: An Ultra-High Throughput and Low Energy Authenticated Encryption Scheme.

    Subhadeep Banik, Andrea Caforio, Tatsuya Ishikawa, Takanori Isobe, Mostafizar Rahman, Kosei Sakamoto

    IACR Trans. Cryptogr. Hardw. Embed. Syst. Vol. 2025 No. 2 p. 705-742 2025/03 Research paper (scientific journal)

  7. Key Collisions on AES and Its Applications.

    Kodai Taiyama, Kosei Sakamoto, Ryoma Ito 0001, Kazuma Taka, Takanori Isobe

    ASIACRYPT (7) p. 267-300 2024/12 Research paper (international conference proceedings)

  8. Gleeok: A Family of Low-Latency PRFs and its Applications to Authenticated Encryption.

    Ravi Anand, Subhadeep Banik, Andrea Caforio, Tatsuya Ishikawa, Takanori Isobe, Fukang Liu, Kazuhiko Minematsu, Mostafizar Rahman, Kosei Sakamoto

    IACR Trans. Cryptogr. Hardw. Embed. Syst. Vol. 2024 No. 2 p. 545-587 2024 Research paper (scientific journal)

  9. Coefficient Grouping for Complex Affine Layers.

    Fukang Liu, Lorenzo Grassi, Clémence Bouvier, Willi Meier, Takanori Isobe

    CRYPTO p. 540-572 2023 Research paper (international conference proceedings)

    Publisher: Springer
  10. An Ultra-High Throughput AES-Based Authenticated Encryption Scheme for 6G: Design and Implementation.

    Ravi Anand, Subhadeep Banik, Andrea Caforio, Kazuhide Fukushima, Takanori Isobe, Shinsaku Kiyomoto, Fukang Liu, Yuto Nakano, Kosei Sakamoto, Nobuyuki Takeuchi

    ESORICS (1) p. 229-248 2023 Research paper (international conference proceedings)

    Publisher: Springer
  11. Coefficient Grouping: Breaking Chaghri and More.

    Fukang Liu, Ravi Anand, Libo Wang, Willi Meier, Takanori Isobe

    EUROCRYPT (4) p. 287-317 2023 Research paper (international conference proceedings)

    Publisher: Springer
  12. Analysis of RIPEMD-160: New Collision Attacks and Finding Characteristics with MILP.

    Fukang Liu, Gaoli Wang, Santanu Sarkar, Ravi Anand, Willi Meier, Yingxin Li, Takanori Isobe

    EUROCRYPT (4) p. 189-219 2023 Research paper (international conference proceedings)

    Publisher: Springer
  13. Areion: Highly-Efficient Permutations and Its Applications to Hash Functions for Short Input.

    Takanori Isobe, Ryoma Ito, Fukang Liu, Kazuhiko Minematsu, Motoki Nakahashi, Kosei Sakamoto, Rentaro Shiba

    IACR Trans. Cryptogr. Hardw. Embed. Syst. Vol. 2023 No. 2 p. 115-154 2023 Research paper (scientific journal)

  14. Algebraic Meet-in-the-Middle Attack on LowMC.

    Fukang Liu, Santanu Sarkar 0001, Gaoli Wang, Willi Meier, Takanori Isobe

    ASIACRYPT (1) p. 225-255 2022 Research paper (international conference proceedings)

  15. Hybrid Code Lifting on Space-Hard Block Ciphers Application to Yoroi and SPNbox.

    Yosuke Todo, Takanori Isobe

    IACR Transactions on Symmetric Cryptology Vol. 2022 No. 3 p. 368-402 2022

  16. New Cryptanalysis of ZUC-256 Initialization Using Modular Differences.

    Fukang Liu, Willi Meier, Santanu Sarkar 0001, Gaoli Wang, Ryoma Ito 0001, Takanori Isobe 0001

    IACR Transactions on Symmetric Cryptology Vol. 2022 No. 3 p. 152-190 2022 Research paper (scientific journal)

  17. New Low-Memory Algebraic Attacks on LowMC in the Picnic Setting.

    Fukang Liu, Willi Meier, Santanu Sarkar 0001, Takanori Isobe 0001

    IACR Transactions on Symmetric Cryptology Vol. 2022 No. 3 p. 102-122 2022 Research paper (scientific journal)

  18. The Inverse of χ and Its Applications to Rasta-Like Ciphers.

    Fukang Liu, Santanu Sarkar 0001, Willi Meier, Takanori Isobe 0001

    Journal of Cryptology Vol. 35 No. 4 p. 28-28 2022 Research paper (scientific journal)

  19. Algebraic Attacks on Rasta and Dasta Using Low-Degree Equations.

    Fukang Liu, Santanu Sarkar, Willi Meier, Takanori Isobe

    ASIACRYPT 2021 p. 214-240 2021 Research paper (international conference proceedings)

  20. Perfect Trees: Designing Energy-Optimal Symmetric Encryption Primitives.

    Andrea Caforio, Subhadeep Banik, Yosuke Todo, Willi Meier, Takanori Isobe 0001, Fukang Liu, Bin Zhang 0003

    IACR Trans. Symmetric Cryptol. Vol. 2021 No. 4 p. 36-73 2021 Research paper (scientific journal)

  21. Yoroi: Updatable Whitebox Cryptography.

    Yuji Koike, Takanori Isobe 0001

    IACR Trans. Cryptogr. Hardw. Embed. Syst. Vol. 2021 No. 4 p. 587-617 2021 Research paper (scientific journal)

  22. Security Analysis of SFrame.

    Takanori Isobe 0001, Ryoma Ito 0001, Kazuhiko Minematsu

    Computer Security – ESORICS 2021 p. 127-146 2021 Research paper (international conference proceedings)

    Publisher: Springer International Publishing
  23. Weak Keys in Reduced AEGIS and Tiaoxin.

    Fukang Liu, Takanori Isobe 0001, Willi Meier, Kosei Sakamoto

    IACR Cryptol. ePrint Arch. Vol. 2021 p. 187-187 2021 Research paper (scientific journal)

  24. Cryptanalysis of Full LowMC and LowMC-M with Algebraic Techniques.

    Fukang Liu, Takanori Isobe, Willi Meier

    Advances in Cryptology - CRYPTO 2021 - 41st Annual International Cryptology Conference p. 368-401 2021 Research paper (international conference proceedings)

    Publisher: Springer
  25. Weak Keys in Reduced AEGIS and Tiaoxin.

    Fukang Liu, Takanori Isobe 0001, Willi Meier, Kosei Sakamoto

    IACR Trans. Symmetric Cryptol. Vol. 2021 No. 2 p. 104-139 2021 Research paper (scientific journal)

  26. Rocca: An Efficient AES-based Encryption Scheme for Beyond 5G.

    Kosei Sakamoto, Fukang Liu, Yuto Nakano, Shinsaku Kiyomoto, Takanori Isobe 0001

    IACR Trans. Symmetric Cryptol. Vol. 2021 No. 2 p. 1-30 2021 Research paper (scientific journal)

  27. Exploiting Weak Diffusion of Gimli: Improved Distinguishers and Preimage Attacks.

    Fukang Liu, Takanori Isobe 0001, Willi Meier

    IACR Trans. Symmetric Cryptol. Vol. 2021 No. 1 p. 185-216 2021 Research paper (scientific journal)

  28. Orthros: A Low-Latency PRF.

    Subhadeep Banik, Takanori Isobe 0001, Fukang Liu, Kazuhiko Minematsu, Kosei Sakamoto

    IACR Trans. Symmetric Cryptol. Vol. 2021 No. 1 p. 37-77 2021 Research paper (scientific journal)

  29. Atom: A Stream Cipher with Double Key Filter.

    Subhadeep Banik, Andrea Caforio, Takanori Isobe 0001, Fukang Liu, Willi Meier, Kosei Sakamoto, Santanu Sarkar 0001

    IACR Trans. Symmetric Cryptol. Vol. 2021 No. 1 p. 5-36 2021 Research paper (scientific journal)

  30. Automatic Verification of Differential Characteristics: Application to Reduced Gimli.

    Fukang Liu, Takanori Isobe, Willi Meier

    Advances in Cryptology - CRYPTO 2020 - 40th Annual International Cryptology Conference p. 219-248 2020 Research paper (international conference proceedings)

    Publisher: Springer
  31. Efficient Collision Attack Frameworks for RIPEMD-160.

    Fukang Liu, Christoph Dobraunig, Florian Mendel, Takanori Isobe 0001, Gaoli Wang, Zhenfu Cao

    CRYPTO 2019 p. 117-149 2019 Research paper (international conference proceedings)

    Publisher: Springer
  32. Parallel SAT framework to find clustering of differential characteristics and its applications

    Kosei Sakamoto, Ryoma Ito, Takanori Isobe

    Journal of Information Security and Applications Vol. 94 p. 104203-104203 2025/11 Research paper (scientific journal)

    Publisher: Elsevier BV
  33. Collision Attacks on SPONGENT with Grouping Method

    Keita Toyama, Kosei Sakamoto, Takanori Isobe

    Proceedings of Selected Areas in Cryptography 2025/08 Research paper (international conference proceedings)

  34. Strengthening Key Scheduling of AES-256 with Minimal Software Modifications.

    Shoma Kawakami, Kazuma Taka, Atsushi Tanaka, Tatsuya Ishikawa, Takanori Isobe

    ACISP (1) p. 98-115 2025/07 Research paper (international conference proceedings)

  35. SAT-based Differential Analysis of Initialization Phase of AEGIS/Tiaoxin-346/Rocca/Rocca-S

    Takuro SHIRAYA, Kosei SAKAMOTO, Takanori ISOBE

    IEICE Transactions on Information and Systems 2025/06 Research paper (scientific journal)

    Publisher: Institute of Electronics, Information and Communications Engineers (IEICE)
  36. Differential Analysis of Encryption and Finalization Phases of AES-based AEAD Schemes

    Takuro Shiraya, Kosei Sakamoto, Takanori Isobe

    Journal of Information Processing Vol. 33 p. 563-582 2025/05 Research paper (scientific journal)

    Publisher: Information Processing Society of Japan
  37. Security analysis of SFrame.

    Takanori Isobe, Ryoma Ito, Kazuhiko Minematsu

    J. Inf. Secur. Appl. Vol. 89 p. 103958-103958 2025/02 Research paper (scientific journal)

  38. Forgery Attacks on SipHash.

    Kosuke Sasaki, Rikuto Kurahara, Kosei Sakamoto, Takanori Isobe

    ACISP (1) p. 3-22 2025 Research paper (international conference proceedings)

  39. Towards Finding Better Differentials on Multiple-Branch-Based Structures with the SAT Method.

    Kazuma Taka, Tatsuya Ishikawa, Kosei Sakamoto, Takanori Isobe

    IEICE Trans. Fundam. Electron. Commun. Comput. Sci. Vol. 108 No. 6 p. 816-833 2025 Research paper (scientific journal)

  40. Finding New Differential Characteristics on SPECK Family.

    Rikuto Kurahara, Kosei Sakamoto, Takanori Isobe

    IEICE Trans. Fundam. Electron. Commun. Comput. Sci. Vol. 108 No. 5 p. 760-763 2025 Research paper (scientific journal)

  41. ASURA: An Efficient Large-State Tweakable Block Cipher for ARM Environment.

    Atsushi Tanaka, Rentaro Shiba, Kosei Sakamoto, Mostafizar Rahman, Takuro Shiraya, Takanori Isobe 0001

    INDOCRYPT (1) p. 143-164 2024/12 Research paper (international conference proceedings)

  42. Differential fault attack on AES-based encryption schemes: application to B5G/6G ciphers - Rocca, Rocca-S and AEGIS.

    Ravi Anand, Takanori Isobe, Anup Kumar Kundu, Mostafizar Rahman, Sahiba Suryawanshi

    Journal of Cryptographic Engineering Vol. 14 No. 4 p. 595-607 2024/11 Research paper (scientific journal)

  43. Bit-Wise Analysis for Forgery Attacks on AES-Based AEAD Schemes.

    Takuro Shiraya, Kosei Sakamoto, Takanori Isobe 0001

    Advances in Information and Computer Security - 19th International Workshop on Security(IWSEC) p. 3-22 2024/10 Research paper (international conference proceedings)

    Publisher: Springer
  44. Security Analysis on End-to-End Encryption of Zoom Mail.

    Shogo Shiraki, Takanori Isobe 0001

    ISITA p. 413-418 2024/10 Research paper (international conference proceedings)

  45. Collision Attacks on Hashing Modes of Areion.

    Kodai Taiyama, Kosei Sakamoto, Rentaro Shiba, Takanori Isobe 0001

    Cryptology and Network Security - 23rd International Conference p. 265-285 2024/10 Research paper (international conference proceedings)

    Publisher: Springer
  46. On the Key-Commitment Properties of Forkcipher-based AEADs.

    Mostafizar Rahman, Samir Kundu, Takanori Isobe 0001

    IACR Communications in Cryptology Vol. 1 No. 4 p. 32-32 2024/10 Research paper (scientific journal)

  47. Quantum Key Recovery Attacks on 4-Round Iterated Even-Mansour with Two Keys.

    Ravi Anand, Shibam Ghosh, Takanori Isobe 0001, Rentaro Shiba

    Information Security - 27th International Conference p. 87-103 2024/09 Research paper (international conference proceedings)

    Publisher: Springer
  48. Differential Distinguishing Attacks on SNOW-V, SNOW-Vi and KCipher-2.

    Rikuto Kurahara, Kosei Sakamoto, Yuto Nakano, Takanori Isobe 0001

    Information Security and Privacy - 29th Australasian Conference p. 77-97 2024/07 Research paper (international conference proceedings)

    Publisher: Springer
  49. Revisiting the Boomerang Attack From a Perspective of 3-Differential.

    Libo Wang, Ling Song 0001, Baofeng Wu, Mostafizar Rahman, Takanori Isobe

    IEEE Trans. Inf. Theory Vol. 70 No. 7 p. 5343-5357 2024/07 Research paper (scientific journal)

  50. Looking Further into the Security of End-to-End Encryption of SFrame.

    Shogo Shiraki, Hayato Kimura 0002, Takanori Isobe 0001

    Journal of Information Processing Vol. 32 p. 679-689 2024/05 Research paper (scientific journal)

  51. Restricted near collision attack on Plantlet.

    Satyam Kumar, Sandip Kumar Mondal, Santanu Sarkar, Takanori Isobe, Anubhab Baksi, Avishek Adhikari

    J. Cryptogr. Eng. Vol. 14 No. 1 p. 19-34 2024/04 Research paper (scientific journal)

  52. Improving the Security Bounds against Differential Attacks for Pholkos Family.

    Nobuyuki Takeuchi, Kosei Sakamoto, Takuro Shiraya, Takanori Isobe 0001

    IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences Vol. 107 No. 8 p. 1196-1204 2024/03 Research paper (scientific journal)

  53. Analysis of Atom against quantum attacks.

    Ravi Anand, Rimpa Nandi, Takanori Isobe

    IET Quantum Commun. Vol. 5 No. 1 p. 88-102 2024/03 Research paper (scientific journal)

  54. Parallel SAT Framework to Find Clustering of Differential Characteristics and Its Applications

    Kosei Sakamoto, Ryoma Ito, Takanori Isobe

    Selected Areas in Cryptography – SAC 2023 p. 409-428 2024/02/19 Research paper (international conference proceedings)

    Publisher: Springer
  55. SAT-Based Analysis of Related-Key Impossible Distinguishers on Piccolo and (Tweakable) TWINE.

    Shion Utsumi, Kosei Sakamoto, Takanori Isobe 0001

    IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences Vol. 107 No. 8 p. 1186-1195 2024/02 Research paper (scientific journal)

  56. Exploring the optimality of byte-wise permutations of a piccolo-type block cipher.

    Shion Utsumi, Motoki Nakahashi, Kosei Sakamoto, Takanori Isobe

    Inf. Process. Lett. Vol. 184 p. 106436-106436 2024/02 Research paper (scientific journal)

  57. Key Committing Attacks against AES-based AEAD Schemes.

    Patrick Derbez, Pierre-Alain Fouque, Takanori Isobe, Mostafizar Rahman, André Schrottenloher

    IACR Trans. Symmetric Cryptol. Vol. 2024 No. 1 p. 135-157 2024/01 Research paper (scientific journal)

  58. Cryptanalysis on End-to-End Encryption Schemes of Communication Tools and Its Research Trend

    Takanori Isobe, Ryoma Ito, Kazuhiko Minematsu

    Journal of Information Processing Vol. 31 p. 523-536 2023/09/15 Research paper (scientific journal)

    Publisher: Information Processing Society of Japan
  59. Bit-level evaluation of piccolo block cipher by satisfiability problem solver.

    Shion Utsumi, Kosei Sakamoto, Takanori Isobe

    IET Information Security Vol. 17 No. 4 p. 616-625 2023/07 Research paper (scientific journal)

  60. MILP-based security evaluation for AEGIS/Tiaoxin-346/Rocca.

    Takuro Shiraya, Nobuyuki Takeuchi, Kosei Sakamoto, Takanori Isobe

    IET Information Security Vol. 17 No. 3 p. 458-467 2023/05 Research paper (scientific journal)

  61. Quantum security analysis of Rocca.

    Ravi Anand, Takanori Isobe

    Quantum Inf. Process. Vol. 22 No. 4 p. 164-164 2023/04 Research paper (scientific journal)

  62. mPoW: How to Make Proof of Work Meaningful.

    Takaki Asanuma, Takanori Isobe

    IEICE Trans. Fundam. Electron. Commun. Comput. Sci. Vol. 106 No. 3 p. 333-340 2023/03 Research paper (scientific journal)

  63. Security Evaluation of Initialization Phases and Round Functions of Rocca and AEGIS.

    Nobuyuki Takeuchi, Kosei Sakamoto, Takanori Isobe

    IEICE Trans. Fundam. Electron. Commun. Comput. Sci. Vol. 106 No. 3 p. 253-262 2023/03 Research paper (scientific journal)

  64. A Deeper Look into Deep Learning-based Output Prediction Attacks Using Weak SPN Block Ciphers.

    Hayato Kimura, Keita Emura, Takanori Isobe, Ryoma Ito, Kazuto Ogawa, Toshihiro Ohigashi

    Journal of Information Processing Vol. 31 p. 550-561 2023 Research paper (scientific journal)

  65. Ghidle: Efficient Large-State Block Ciphers for Post-quantum Security.

    Motoki Nakahashi, Rentaro Shiba, Ravi Anand, Mostafizar Rahman, Kosei Sakamoto, Fukang Liu, Takanori Isobe

    ACISP p. 403-430 2023 Research paper (international conference proceedings)

    Publisher: Springer
  66. Even-Mansour Space-hard Cipher: White-box Cryptography Cipher Meets Physically Unclonable Function.

    Takaki Asanuma, Takanori Isobe

    J. Inf. Process. Vol. 31 p. 88-96 2023 Research paper (scientific journal)

  67. Cubicle: A family of space-hard ciphers for IoT.

    Rentaro Shiba, Ravi Anand, Kazuhiko Minematsu, Takanori Isobe

    IET Inf. Secur. Vol. 17 No. 1 p. 131-146 2023/01 Research paper (scientific journal)

  68. An Efficient Strategy to Construct a Better Differential on Multiple-Branch-Based Designs: Application to Orthros.

    Kazuma Taka, Tatsuya Ishikawa, Kosei Sakamoto, Takanori Isobe

    CT-RSA p. 277-304 2023 Research paper (international conference proceedings)

    Publisher: Springer
  69. On Optimality of the Round Function of Rocca.

    Nobuyuki Takeuchi, Kosei Sakamoto, Takanori Isobe

    IEICE Trans. Fundam. Electron. Commun. Comput. Sci. Vol. 106 No. 1 p. 45-53 2023 Research paper (scientific journal)

  70. Distinguishing and key recovery attacks on the reduced-round SNOW-V and SNOW-Vi.

    Jin Hoki, Takanori Isobe 0001, Ryoma Ito 0001, Fukang Liu, Kosei Sakamoto

    Journal of Information Security and Applications Vol. 65 p. 103100-103100 2022 Research paper (scientific journal)

  71. Output Prediction Attacks on Block Ciphers Using Deep Learning

    Hayato Kimura, Keita Emura, Takanori Isobe, Ryoma Ito, Kazuto Ogawa, Toshihiro Ohigashi

    Lecture Notes in Computer Science p. 248-276 2022 Part of collection (book)

    Publisher: Springer International Publishing
  72. Efficient constructions for large-state block ciphers based on AES New Instructions.

    Rentaro Shiba, Kosei Sakamoto, Takanori Isobe 0001

    IET Information Security Vol. 16 No. 3 p. 145-160 2022 Research paper (scientific journal)

  73. Integral and impossible-differential attacks on the reduced-round Lesamnta-LW-BC.

    Rentaro Shiba, Kosei Sakamoto, Fukang Liu, Kazuhiko Minematsu, Takanori Isobe 0001

    IET Information Security Vol. 16 No. 2 p. 75-85 2022 Research paper (scientific journal)

  74. A Proof of Work Based on Key Recovery Problem of Cascade Block Ciphers with ASIC Resistance.

    Takaki Asanuma, Takanori Isobe

    IEICE Transactions on Information & Systems Vol. 105 No. 2 p. 248-255 2022 Research paper (scientific journal)

  75. Design of a Linear Layer for a Block Cipher Based on Type-2 Generalized Feistel Network with 32 Branches.

    Kosei Sakamoto, Kazuhiko Minematsu, Nao Shibata, Maki Shigeri, Hiroyasu Kubo, Takanori Isobe 0001

    IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences Vol. 105-A No. 3 p. 278-288 2022 Research paper (scientific journal)

  76. Applying Byte-Shuffling to CLEFIA-Type Structure.

    Kazuto Shimizu, Kosei Sakamoto, Takanori Isobe 0001

    IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences Vol. 105-A No. 3 p. 268-277 2022 Research paper (scientific journal)

  77. A Proof of Work based on Preimage Problem of Variants of SHA-3 with ASIC Resistance.

    Takaki Asanuma, Takanori Isobe 0001

    J. Inf. Process. Vol. 30 p. 75-83 2022 Research paper (scientific journal)

  78. WARP : Revisiting GFN for Lightweight 128-Bit Block Cipher

    Subhadeep Banik, Zhenzhen Bao, Takanori Isobe, Hiroyasu Kubo, Fukang Liu, Kazuhiko Minematsu, Kosei Sakamoto, Nao Shibata, Maki Shigeri

    Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) Vol. 12804 p. 535-564 2021 Research paper (international conference proceedings)

    Publisher: Springer Science and Business Media Deutschland GmbH
  79. Output Prediction Attacks on SPN Block Ciphers using Deep Learning.

    Hayato Kimura 0002, Keita Emura, Takanori Isobe 0001, Ryoma Ito 0001, Kazuto Ogawa, Toshihiro Ohigashi

    IACR Cryptology ePrint Archive Vol. 2021 p. 401-401 2021 Research paper (scientific journal)

  80. Distinguishing and Key Recovery Attacks on the Reduced-Round SNOW-V

    Jin Hoki, Takanori Isobe, Ryoma Ito, Fukang Liu, Kosei Sakamoto

    Information Security and Privacy p. 171-190 2021 Part of collection (book)

    Publisher: Springer International Publishing
  81. Bit-wise cryptanalysis on AND-RX permutation Friet-PC.

    Ryoma Ito 0001, Rentaro Shiba, Kosei Sakamoto, Fukang Liu, Takanori Isobe 0001

    J. Inf. Secur. Appl. Vol. 59 p. 102860-102860 2021 Research paper (scientific journal)

  82. Further Results on Efficient Implementations of Block Cipher Linear Layers.

    Subhadeep Banik, Yuki Funabiki, Takanori Isobe 0001

    IEICE Trans. Fundam. Electron. Commun. Comput. Sci. Vol. 104-A No. 1 p. 213-225 2021 Research paper (scientific journal)

  83. MILP-Aided Security Evaluation of Differential Attacks on KCipher-2.

    Jin Hoki, Kosei Sakamoto, Fukang Liu, Kazuhiko Minematsu, Takanori Isobe 0001

    IEICE Trans. Fundam. Electron. Commun. Comput. Sci. Vol. 104-A No. 1 p. 203-212 2021 Research paper (scientific journal)

  84. Virtual Vault: A Practical Leakage Resilient Scheme Using Space-Hard Ciphers.

    Yuji Koike, Takuya Hayashi 0001, Jun Kurihara, Takanori Isobe 0001

    IEICE Trans. Fundam. Electron. Commun. Comput. Sci. Vol. 104-A No. 1 p. 182-189 2021 Research paper (scientific journal)

  85. Security Analysis of End-to-End Encryption for Zoom Meetings.

    Takanori Isobe 0001, Ryoma Ito 0001

    IEEE Access Vol. 9 p. 90677-90689 2021 Research paper (scientific journal)

  86. Tweakable TWINE: Building a Tweakable Block Cipher on Generalized Feistel Structure.

    Kosei Sakamoto, Kazuhiko Minematsu, Nao Shibata, Maki Shigeri, Hiroyasu Kubo, Yuki Funabiki, Andrey Bogdanov, Sumio Morioka, Takanori Isobe 0001

    IEICE Trans. Fundam. Electron. Commun. Comput. Sci. Vol. 103-A No. 12 p. 1629-1639 2020 Research paper (scientific journal)

  87. Preimage Attacks on Reduced Troika with Divide-and-Conquer Methods.

    Fukang Liu, Takanori Isobe 0001

    IEICE Trans. Fundam. Electron. Commun. Comput. Sci. Vol. 103-A No. 11 p. 1260-1273 2020 Research paper (scientific journal)

  88. Key-Recovery Security of Single-Key Even-Mansour Ciphers.

    Takanori Isobe 0001, Kyoji Shibutani

    IEICE Trans. Fundam. Electron. Commun. Comput. Sci. Vol. 103-A No. 7 p. 893-905 2020 Research paper (scientific journal)

  89. ACE in Chains: How Risky Is CBC Encryption of Binary Executable Files?

    Rintaro Fujita, Takanori Isobe 0001, Kazuhiko Minematsu

    ACNS 2020 p. 187-207 2020 Research paper (international conference proceedings)

    Publisher: Springer
  90. Galaxy: A Family of Stream-Cipher-Based Space-Hard Ciphers.

    Yuji Koike, Kosei Sakamoto, Takuya Hayashi 0001, Takanori Isobe 0001

    Information Security and Privacy - 25th Australasian Conference(ACISP) p. 142-159 2020 Research paper (international conference proceedings)

    Publisher: Springer
  91. Security Analysis and Countermeasures of an End-to-End Encryption Scheme of LINE.

    Takanori Isobe 0001, Kazuhiko Minematsu

    IEICE Trans. Fundam. Electron. Commun. Comput. Sci. Vol. 103-A No. 1 p. 313-324 2020 Research paper (scientific journal)

  92. Security of Related-Key Differential Attacks on TWINE, Revisited.

    Kosei Sakamoto, Kazuhiko Minematsu, Nao Shibata, Maki Shigeri, Hiroyasu Kubo, Yuki Funabiki, Takanori Isobe 0001

    IEICE Trans. Fundam. Electron. Commun. Comput. Sci. Vol. 103-A No. 1 p. 212-214 2020 Research paper (scientific journal)

  93. Plaintext Recovery Attacks Against XTS Beyond Collisions.

    Takanori Isobe 0001, Kazuhiko Minematsu

    Selected Areas in Cryptography - SAC 2019 - 26th International Conference(SAC) p. 103-123 2019 Research paper (international conference proceedings)

    Publisher: Springer
  94. Iterative Differential Characteristic of TRIFLE-BC.

    Fukang Liu, Takanori Isobe 0001

    Selected Areas in Cryptography - SAC 2019 - 26th International Conference(SAC) p. 85-100 2019 Research paper (international conference proceedings)

    Publisher: Springer
  95. Preimage Attacks on Reduced Troika with Divide-and-Conquer Methods.

    Fukang Liu, Takanori Isobe 0001

    Advances in Information and Computer Security - 14th International Workshop on Security(IWSEC) p. 306-326 2019 Research paper (international conference proceedings)

    Publisher: Springer
  96. Tweakable TWINE: Building a Tweakable Block Cipher on Generalized Feistel Structure.

    Kosei Sakamoto, Kazuhiko Minematsu, Nao Shibata, Maki Shigeri, Hiroyasu Kubo, Yuki Funabiki, Andrey Bogdanov, Sumio Morioka, Takanori Isobe 0001

    Advances in Information and Computer Security - 14th International Workshop on Security(IWSEC) p. 129-145 2019 Research paper (international conference proceedings)

    Publisher: Springer
  97. More Results on Shortest Linear Programs.

    Subhadeep Banik, Yuki Funabiki, Takanori Isobe 0001

    Advances in Information and Computer Security - 14th International Workshop on Security(IWSEC) p. 109-128 2019 Research paper (international conference proceedings)

    Publisher: Springer
  98. Neural-Network-Based Pseudo-Random Number Generator Evaluation Tool for Stream Ciphers.

    Hayato Kimura 0002, Takanori Isobe 0001, Toshihiro Ohigashi

    Seventh International Symposium on Computing and Networking Workshops p. 333-338 2019 Research paper (international conference proceedings)

    Publisher: IEEE
  99. Cube-Based Cryptanalysis of Subterranean-SAE.

    Fukang Liu, Takanori Isobe 0001, Willi Meier

    IACR Trans. Symmetric Cryptol. Vol. 2019 No. 4 p. 192-222 2019 Research paper (scientific journal)

  100. New Semi-Free-Start Collision Attack Framework for Reduced RIPEMD-160.

    Fukang Liu, Christoph Dobraunig, Florian Mendel, Takanori Isobe 0001, Gaoli Wang, Zhenfu Cao

    IACR Trans. Symmetric Cryptol. Vol. 2019 No. 3 p. 169-192 2019 Research paper (scientific journal)

  101. Cryptanalysis of Plantlet.

    Subhadeep Banik, Khashayar Barooti, Takanori Isobe 0001

    IACR Trans. Symmetric Cryptol. Vol. 2019 No. 3 p. 103-120 2019 Research paper (scientific journal)

  102. Improved Division Property Based Cube Attacks Exploiting Algebraic Properties of Superpoly.

    Yonglin Hao, Takanori Isobe 0001, Lin Jiao, Chaoyun Li, Willi Meier, Yosuke Todo, Qingju Wang 0001

    IEEE Trans. Computers Vol. 68 No. 10 p. 1470-1486 2019 Research paper (scientific journal)

  103. Improved Integral Attack on HIGHT.

    Yuki Funabiki, Yosuke Todo, Takanori Isobe 0001, Masakatu Morii

    IEICE Trans. Fundam. Electron. Commun. Comput. Sci. Vol. 102-A No. 9 p. 1259-1271 2019 Research paper (scientific journal)

  104. Meet-in-the-Middle Key Recovery Attacks on a Single-Key Two-Round Even-Mansour Cipher.

    Takanori Isobe 0001, Kyoji Shibutani

    IEICE Trans. Fundam. Electron. Commun. Comput. Sci. Vol. 102-A No. 1 p. 17-26 2019 Research paper (scientific journal)

  105. Cube Attacks on Non-Blackbox Polynomials Based on Division Property.

    Array,Takanori Isobe, Array,Willi Meier

    IEEE Trans. Computers Vol. 67 No. 12 p. 1720-1736 2018

  106. Theoretical Understanding of Some Conditional and Joint Biases in RC4 Stream Cipher.

    Sonu Jha, Subhadeep Banik, Takanori Isobe, Toshihiro Ohigashi, Santanu Sarka

    IEICE Transactions Vol. 101-A No. 11 p. 1869-1879 2018

  107. Inverse gating for low energy encryption.

    Subhadeep Banik, Andrey Bogdanov, Francesco Regazzoni, Takanori Isobe, Harunaga Hiwatari, Toru Akishita

    2018 IEEE International Symposium on Hardware Oriented Security and Trust, HOST 2018, Washington, DC, USA, April 30 - May 4, 2018 p. 173-176 2018

    Publisher: IEEE Computer Society
  108. Breaking Message Integrity of an End-to-End Encryption Scheme of LINE.

    Takanori Isobe, Kazuhiko Minematsu

    Computer Security - 23rd European Symposium on Research in Computer Security, ESORICS 2018, Barcelona, Spain, September 3-7, 2018, Proceedings, Part II p. 249-268 2018

    Publisher: Springer
  109. Improved Division Property Based Cube Attacks Exploiting Algebraic Properties of Superpoly.

    Qingju Wang, Yonglin Hao, Yosuke Todo, Chaoyun Li, Takanori Isobe, Willi Meier

    Advances in Cryptology - CRYPTO 2018 - 38th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2018, Proceedings, Part I p. 275-305 2018

    Publisher: Springer
  110. Fast Correlation Attack Revisited - Cryptanalysis on Full Grain-128a, Grain-128, and Grain-v1.

    Yosuke Todo, Takanori Isobe, Willi Meier, Kazumaro Aoki, Bin Zhang

    Advances in Cryptology - CRYPTO 2018 - 38th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2018, Proceedings, Part II p. 129-159 2018

    Publisher: Springer
  111. Several MILP-Aided Attacks Against SNOW 2.0.

    Yuki Funabiki, Yosuke Todo, Takanori Isobe, Masakatu Morii

    Cryptology and Network Security - 17th International Conference, CANS 2018, Naples, Italy, September 30 - October 3, 2018, Proceedings p. 394-413 2018

    Publisher: Springer
  112. ShiftRows Alternatives for AES-like Ciphers and Optimal Cell Permutations for Midori and Skinny.

    Gianira N, Alfarano,Christof Beierle, Takanori Isobe, Stefan Kölbl, Gregor Leander

    IACR Trans. Symmetric Cryptol. Vol. 2018 No. 2 p. 20-47 2018

  113. Towards Low Energy Stream Ciphers.

    Subhadeep Banik, Vasily Mikhalev, Frederik Armknecht, Takanori Isobe, Willi Meier, Andrey Bogdanov, Yuhei Watanabe, Francesco Regazzoni

    IACR Trans. Symmetric Cryptol. Vol. 2018 No. 2 p. 1-19 2018

  114. Cryptanalysis of Reduced Kreyvium.

    Yuhei Watanabe, Takanori Isobe, Masakatu Morii

    IEICE Transactions Vol. 101-A No. 9 p. 1548-1556 2018

  115. On design of robust lightweight stream cipher with short internal state

    Subhadeep Banik, Takanori Isobe, Masakatu Morii

    IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences Vol. E101A No. 1 p. 99-109 2018/01/01 Research paper (international conference proceedings)

    Publisher: Institute of Electronics, Information and Communication, Engineers, IEICE
  116. Analysis and Improvements of the Full Spritz Stream Cipher

    Subhadeep Banik, Takanori Isobe, Masakatu Morii

    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES Vol. E100A No. 6 p. 1296-1305 2017/06 Research paper (scientific journal)

  117. How to Efficiently Exploit Different Types of Biases for Plaintext Recovery of RC4

    Yuhei Watanabe, Takanori Isobe, Toshihiro Ohigashi, Masakatu Morii

    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES Vol. E100A No. 3 p. 803-810 2017/03 Research paper (scientific journal)

  118. Evaluation of trapezium current mode in comparison to the discontinuous current Mode for Single Phase Grid-tied Inverter.

    Jiantao Zhang, Rene A. Barrera-Cardenas, Takanori Isobe, Tadano Hiroshi

    IECON 2017 - 43rd Annual Conference of the IEEE Industrial Electronics Society, Beijing, China, October 29 - November 1, 2017 p. 1125-1132 2017

    Publisher: IEEE
  119. Cube attacks on non-blackbox polynomials based on division property

    Yosuke Todo, Takanori Isobe, Yonglin Hao, Willi Meier

    Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) Vol. 10403 p. 250-279 2017 Research paper (international conference proceedings)

    Publisher: Springer Verlag
  120. Low-data complexity attacks on Camellia

    Takeru Koie, Takanori Isobe, Yosuke Todo, Masakatu Morii

    Communications in Computer and Information Science Vol. 719 p. 128-140 2017 Research paper (international conference proceedings)

    Publisher: Springer Verlag
  121. New key recovery attacks on minimal two-round Even-Mansour ciphers

    Takanori Isobe, Kyoji Shibutani

    Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) Vol. 10624 p. 244-263 2017 Research paper (international conference proceedings)

    Publisher: Springer Verlag
  122. Conditional differential cryptanalysis for kreyvium

    Yuhei Watanabe, Takanori Isobe, Masakatu Morii

    Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) Vol. 10342 p. 421-434 2017 Research paper (international conference proceedings)

    Publisher: Springer Verlag
  123. Improved integral attack on hight

    Yuki Funabiki, Yosuke Todo, Takanori Isobe, Masakatu Morii

    Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) Vol. 10342 p. 363-383 2017 Research paper (international conference proceedings)

    Publisher: Springer Verlag
  124. Some cryptanalytic results on Lizard.

    Subhadeep Banik, Takanori Isobe, Tingting Cui, Jian Guo

    IACR Trans. Symmetric Cryptol. Vol. 2017 No. 4 p. 82-98 2017

  125. Analysis of Software Countermeasures for Whitebox Encryption.

    Array,Andrey Bogdanov, Takanori Isobe,Martin Bjerregaard Jepsen

    IACR Trans. Symmetric Cryptol. Vol. 2017 No. 1 p. 307-328 2017

  126. Some Proofs of Joint Distributions of Keystream Biases in RC4

    Sonu Jha, Subhadeep Banik, Takanori Isobe, Toshihiro Ohigashi

    PROGRESS IN CRYPTOLOGY - INDOCRYPT 2016 Vol. 10095 p. 305-321 2016 Research paper (international conference proceedings)

  127. Round Gating for Low Energy Block Ciphers

    Subhadeep Banik, Andrey Bogdanov, Francesco Regazzoni, Takanori Isobe, Harunaga Hiwatari, Toru Akishita

    PROCEEDINGS OF THE 2016 IEEE INTERNATIONAL SYMPOSIUM ON HARDWARE ORIENTED SECURITY AND TRUST (HOST) p. 55-60 2016 Research paper (international conference proceedings)

  128. Cryptanalysis of the Full Spritz Stream Cipher

    Subhadeep Banik, Takanori Isobe

    FAST SOFTWARE ENCRYPTION (FSE 2016) Vol. 9783 p. 63-77 2016 Research paper (international conference proceedings)

  129. Towards Practical Whitebox Cryptography: Optimizing Efficiency and Space Hardness

    Andrey Bogdanov, Takanori Isobe, Elmar Tischhauser

    ADVANCES IN CRYPTOLOGY - ASIACRYPT 2016, PT I Vol. 10031 p. 126-158 2016 Research paper (international conference proceedings)

  130. Improved All-Subkeys Recovery Attacks on FOX, KATAN and SHACAL-2 Block Ciphers

    Takanori Isobe, Kyoji Shibutani

    FAST SOFTWARE ENCRYPTION, FSE 2014 Vol. 8540 p. 104-126 2015 Research paper (international conference proceedings)

  131. White-box Cryptography Revisited: Space-Hard Ciphers

    Andrey Bogdanov, Takanori Isobe

    CCS'15: PROCEEDINGS OF THE 22ND ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY p. 1058-1069 2015 Research paper (international conference proceedings)

  132. Midori: A Block Cipher for Low Energy

    Subhadeep Banik, Andrey Bogdanov, Takanori Isobe, Kyoji Shibutani, Harunaga Hiwatari, Toru Akishita, Francesco Regazzoni

    ADVANCES IN CRYPTOLOGY - ASIACRYPT 2015, PT II Vol. 9453 p. 411-436 2015 Research paper (international conference proceedings)

  133. How Secure is AES Under Leakage

    Andrey Bogdanov, Takanori Isobe

    ADVANCES IN CRYPTOLOGY - ASIACRYPT 2015, PT II Vol. 9453 p. 361-385 2015 Research paper (international conference proceedings)

  134. Full Plaintext Recovery Attacks on RC4 Using Multiple Biases

    Toshihiro Ohigashi, Takanori Isobe, Yuhei Watanabe, Masakatu Morii

    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES Vol. E98A No. 1 p. 81-91 2015/01 Research paper (scientific journal)

  135. How to Recover Any Byte of Plaintext on RC4

    Toshihiro Ohigashi, Takanori Isobe, Yuhei Watanabe, Masakatu Morii

    SELECTED AREAS IN CRYPTOGRAPHY - SAC 2013 Vol. 8282 p. 155-173 2014 Research paper (international conference proceedings)

  136. Full Plaintext Recovery Attack on Broadcast RC4

    Takanori Isobe, Toshihiro Ohigashi, Yuhei Watanabe, Masakatu Morii

    FAST SOFTWARE ENCRYPTION (FSE 2013) Vol. 8424 p. 179-202 2014 Research paper (international conference proceedings)

  137. Expandingweak-key space of RC4

    Atsushi Nagao, Toshihiro Ohigashi, Takanori Isobe, Masakatu Morii

    Journal of Information Processing Vol. 22 No. 2 p. 357-365 2014 Research paper (scientific journal)

    Publisher: Information Processing Society of Japan
  138. Comprehensive Analysis of Initial Keystream Biases of RC4

    Takanori Isobe, Toshihiro Ohigashi, Yuhei Watanabe, Masakatu Morii

    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES Vol. E97A No. 1 p. 139-151 2014/01 Research paper (scientific journal)

  139. Slide Property of RAKAPOSHI and Its Application to Key Recovery Attack

    Isobe Takanori, Ohigashi Toshihiro, Morii Masakatu

    IMT Vol. 8 No. 4 p. 987-994 2013

    Publisher: Information and Media Technologies Editorial Board
  140. All subkeys recovery attack on block ciphers: Extending meet-in-the-middle approach

    Takanori Isobe, Kyoji Shibutani

    Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) Vol. 7707 p. 202-221 2013 Research paper (international conference proceedings)

    Publisher: Springer
  141. Generic Key Recovery Attack on Feistel Scheme

    Takanori Isobe, Kyoji Shibutani

    ADVANCES IN CRYPTOLOGY - ASIACRYPT 2013, PT I Vol. 8269 p. 464-485 2013 Research paper (international conference proceedings)

  142. Related-key boomerang attacks on KATAN32/48/64

    Takanori Isobe, Yu Sasaki, Jiageng Chen

    Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) Vol. 7959 p. 268-285 2013 Research paper (international conference proceedings)

    Publisher: Springer
  143. Offshore-Wind-Farm Configuration Using Diode Rectifier With MERS in Current Link Topology.

    Takayuki Kawaguchi, Tsukasa Sakazaki, Takanori Isobe, Ryuichi Shimada

    IEEE Trans. Industrial Electronics Vol. 60 No. 7 p. 2930-2937 2013

  144. A single-key attack on the full GOST block cipher

    Takanori Isobe

    Journal of Cryptology Vol. 26 No. 1 p. 172-189 2013 Research paper (scientific journal)

  145. Slide property of RAKAPOSHI and its application to key recovery attack

    Takanori Isobe, Toshihiro Ohigashi, Masakatu Morii

    Journal of Information Processing Vol. 21 No. 4 p. 599-606 2013 Research paper (scientific journal)

  146. Slide cryptanalysis of lightweight stream cipher RAKAPOSHI

    Takanori Isobe, Toshihiro Ohigashi, Masakatu Morii

    Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) Vol. 7631 p. 138-155 2012 Research paper (international conference proceedings)

    Publisher: Springer
  147. Converting Meet-In-The-Middle Preimage Attack into Pseudo Collision Attack: Application to SHA-2

    Ji Li, Takanori Isobe, Kyoji Shibutani

    FAST SOFTWARE ENCRYPTION (FSE 2012) Vol. 7549 p. 264-286 2012 Research paper (international conference proceedings)

  148. Security analysis of the lightweight block ciphers XTEA, LED and Piccolo

    Takanori Isobe, Kyoji Shibutani

    Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) Vol. 7372 p. 71-86 2012 Research paper (international conference proceedings)

    Publisher: Springer
  149. A Single-Key Attack on the Full GOST Block Cipher

    Takanori Isobe

    FAST SOFTWARE ENCRYPTION (FSE 2011) Vol. 6733 p. 290-305 2011 Research paper (international conference proceedings)

  150. Piccolo: An Ultra-Lightweight Blockcipher

    Kyoji Shibutani, Takanori Isobe, Harunaga Hiwatari, Atsushi Mitsuda, Toru Akishita, Taizo Shirai

    CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS - CHES 2011 Vol. 6917 p. 342-357 2011 Research paper (international conference proceedings)

  151. Preimage Attacks on Reduced Tiger and SHA-2

    Takanori Isobe, Kyoji Shibutani

    FAST SOFTWARE ENCRYPTION Vol. 5665 p. 139-155 2009 Research paper (international conference proceedings)

  152. A Chosen-IV Key Recovery Attack on Py and Pypy

    Takanori Isobe, Toshihiro Ohigashi, Hidenori Kuwakado, Masakatu Morii

    IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS Vol. E92D No. 1 p. 32-40 2009/01 Research paper (scientific journal)

  153. How to Break Py and Pypy by a Chosen-IV Attack

    Takanori Isobe, Toshihiro Ohigashi, Hidenori Kuwakado, Masakatu Morii

    Workshop Record of The State of the Art of Stream Ciphers (SASC) 2007 p. 340-352 2007/01 Research paper (international conference proceedings)