Yu SASAKI


On the Design Rationale of SIMON Block Cipher: Integral Attacks and Impossible Differential Attacks against SIMON Variants
Kota KONDO Yu SASAKI Yosuke TODO Tetsu IWATA 
Publication:   
Publication Date: 2018/01/01
Vol. E101-A  No. 1  pp. 88-98
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: 
Keyword: 
lightweight block cipherintegral attackimpossible differential attackdesign rationalerotation constant
 Summary | Full Text:PDF(1.6MB)

Generic Internal State Recovery on Strengthened HMAC: n-bit Secure HMAC Requires Key in All Blocks
Yu SASAKI Lei WANG 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2016/01/01
Vol. E99-A  No. 1  pp. 22-30
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: 
Keyword: 
HMACgeneric attackinternal state recoverymulti-collision
 Summary | Full Text:PDF(919.2KB)

Message Extension Attack against Authenticated Encryptions: Application to PANDA
Yu SASAKI Lei WANG 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2016/01/01
Vol. E99-A  No. 1  pp. 49-57
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: 
Keyword: 
message extension attackinternal state recoveryexistential forgerynonce misuseCAESARPANDA
 Summary | Full Text:PDF(1.1MB)

Practical Forgeries and Distinguishers against PAES
Jérémy JEAN Ivica NIKOLIC Yu SASAKI Lei WANG 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2016/01/01
Vol. E99-A  No. 1  pp. 39-48
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: 
Keyword: 
PAESuniversal forgerydistinguishersymmetric propertyauthenticated encryption
 Summary | Full Text:PDF(1.9MB)

Bitwise Partial-Sum: A New Tool for Integral Analysis against ARX Designs
Yu SASAKI Lei WANG 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2015/01/01
Vol. E98-A  No. 1  pp. 49-60
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: Symmetric Key Based Cryptography
Keyword: 
integral analysispartial-sumbitwise partial-sumARXHIGHT
 Summary | Full Text:PDF(1.4MB)

Improved Single-Key Distinguisher on HMAC-MD5 and Key Recovery Attacks on Sandwich-MAC-MD5 and MD5-MAC
Yu SASAKI Gaoli WANG Lei WANG 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2015/01/01
Vol. E98-A  No. 1  pp. 26-38
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: Symmetric Key Based Cryptography
Keyword: 
HMACSandwich-MACMD5-MACMD5key recovery
 Summary | Full Text:PDF(1.3MB)

Preimage Attacks on Feistel-SP Functions: Impact of Omitting the Last Network Twist
Yu SASAKI 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2015/01/01
Vol. E98-A  No. 1  pp. 61-71
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: Symmetric Key Based Cryptography
Keyword: 
Feistelgeneralized FeistelSP round functionhashing modesmeet-in-the-middle attackpreimage attackCamelliaCLEFIA
 Summary | Full Text:PDF(1.7MB)

Comprehensive Study of Integral Analysis on LBlock
Yu SASAKI Lei WANG 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2014/01/01
Vol. E97-A  No. 1  pp. 127-138
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: Symmetric Key Based Cryptography
Keyword: 
LBlockintegral analysispartial-summeet-in-the-middlesubkey relations
 Summary | Full Text:PDF(1.6MB)

Distinguishers on Double-Branch Compression Function and Applications to Round-Reduced RIPEMD-128 and RIPEMD-160
Yu SASAKI Lei WANG 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2014/01/01
Vol. E97-A  No. 1  pp. 177-190
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: Symmetric Key Based Cryptography
Keyword: 
RIPEMD-128RIPEMD-160double-branch structure2-dimension sumq-multi-second-order collision
 Summary | Full Text:PDF(699.4KB)

Cryptanalyses on a Merkle-Damgård Based MAC — Almost Universal Forgery and Distinguishing-H Attacks
Yu SASAKI 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2014/01/01
Vol. E97-A  No. 1  pp. 167-176
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: Symmetric Key Based Cryptography
Keyword: 
LPMACdistinguishing-H attackalmost universal forgery attackmulti-collisiondiamond structureprefix freeness
 Summary | Full Text:PDF(1MB)

Meet-in-the-Middle Preimage Attacks on AES Hashing Modes and an Application to Whirlpool
Yu SASAKI 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2013/01/01
Vol. E96-A  No. 1  pp. 121-130
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: Hash Functions
Keyword: 
AEShash functionDavies-MeyerMatyas-Meyer-OseasMiyaguchi-PreneelPGVpreimagemeet-in-the-middleWhirlpool
 Summary | Full Text:PDF(1.1MB)

Boomerang Distinguishers on MD4-Based Hash Functions: First Practical Results on Full 5-Pass HAVAL Compression Function
Yu SASAKI 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2013/01/01
Vol. E96-A  No. 1  pp. 131-140
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: Hash Functions
Keyword: 
boomerang attack4-sum distinguisherhashHAVALmessage-words permutation
 Summary | Full Text:PDF(476.7KB)

Open-Key Distinguishers for the Internal Block Cipher of Tweaked Lesamnta
Yu SASAKI Kazumaro AOKI 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2013/01/01
Vol. E96-A  No. 1  pp. 141-149
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: Hash Functions
Keyword: 
integral attackmiddletext distinguisherknown-keychosen-keyLesamntahashSHA-3
 Summary | Full Text:PDF(467.5KB)

Preimage Attacks on the Step-Reduced RIPEMD-128 and RIPEMD-160
Chiaki OHTAHARA Yu SASAKI Takeshi SHIMOYAMA 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2012/10/01
Vol. E95-A  No. 10  pp. 1729-1739
Type of Manuscript:  PAPER
Category: Cryptography and Information Security
Keyword: 
RIPEMD-128RIPEMD-160hashpreimagemeet-in-the-middle
 Summary | Full Text:PDF(1.9MB)

Meet-in-the-Middle (Second) Preimage Attacks on Two Double-Branch Hash Functions RIPEMD and RIPEMD-128
Lei WANG Yu SASAKI Wataru KOMATSUBARA Kazuo SAKIYAMA Kazuo OHTA 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2012/01/01
Vol. E95-A  No. 1  pp. 100-110
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: Hash Function
Keyword: 
RIPEMDRIPEMD-128meet-in-the-middleone-message-word local collision
 Summary | Full Text:PDF(1.5MB)

Preimage Attacks against PKC98-Hash and HAS-V
Yu SASAKI Florian MENDEL Kazumaro AOKI 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2012/01/01
Vol. E95-A  No. 1  pp. 111-124
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: Hash Function
Keyword: 
PKC98-HashHAS-VpreimageDavies-Meyernon-injective step function
 Summary | Full Text:PDF(677.5KB)

Known-Key Attacks on Rijndael with Large Blocks and Strengthening ShiftRow Parameter
Yu SASAKI 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2012/01/01
Vol. E95-A  No. 1  pp. 21-28
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: Symmetric Cryptography
Keyword: 
Rijndaelknown-key attackSuper-Sbox analysistruncated differential pathShiftRow
 Summary | Full Text:PDF(625.6KB)

Cryptanalyses of Double-Mix Merkle-Damgård Mode in the Original Version of AURORA-512
Yu SASAKI 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2011/01/01
Vol. E94-A  No. 1  pp. 121-128
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: Hash Function
Keyword: 
AURORASHA-3DMMDcollisionsecond preimageHMAC
 Summary | Full Text:PDF(535.9KB)

Preimage Attack on 23-Step Tiger
Lei WANG Yu SASAKI 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2011/01/01
Vol. E94-A  No. 1  pp. 110-120
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: Hash Function
Keyword: 
Tigerhash functionmeet-in-the-middlepreimage attackindependent chunks
 Summary | Full Text:PDF(5.8MB)

Cryptanalysis of Two MD5-Based Authentication Protocols: APOP and NMAC
Lei WANG Kazuo OHTA Yu SASAKI Kazuo SAKIYAMA Noboru KUNIHIRO 
Publication:   IEICE TRANSACTIONS on Information and Systems
Publication Date: 2010/05/01
Vol. E93-D  No. 5  pp. 1087-1095
Type of Manuscript:  Special Section PAPER (Special Section on Information and Communication System Security)
Category: 
Keyword: 
authentication protocolAPOPNMACMD5
 Summary | Full Text:PDF(317.2KB)

Practical Password Recovery Attacks on MD4 Based Prefix and Hybrid Authentication Protocols
Yu SASAKI Lei WANG Kazuo OHTA Kazumaro AOKI Noboru KUNIHIRO 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2010/01/01
Vol. E93-A  No. 1  pp. 84-92
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: Hash Function
Keyword: 
challenge and responseprefixhybridpassword recovery attacklocal collisionhash functionMD4
 Summary | Full Text:PDF(339.7KB)

A Strict Evaluation on the Number of Conditions for SHA-1 Collision Search
Jun YAJIMA Terutoshi IWASAKI Yusuke NAITO Yu SASAKI Takeshi SHIMOYAMA Thomas PEYRIN Noboru KUNIHIRO Kazuo OHTA 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2009/01/01
Vol. E92-A  No. 1  pp. 87-95
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: Hash Function
Keyword: 
hash functioncollision searchSHA-1disturbance vector
 Summary | Full Text:PDF(330.1KB)

Extended Password Recovery Attacks against APOP, SIP, and Digest Authentication
Yu SASAKI Lei WANG Kazuo OHTA Noboru KUNIHIRO 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2009/01/01
Vol. E92-A  No. 1  pp. 96-104
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: Hash Function
Keyword: 
APOPSIPdigest authenticationIV bridgecollision attackhash functionMD5
 Summary | Full Text:PDF(230.4KB)

New Message Differences for Collision Attacks on MD4 and MD5
Yu SASAKI Lei WANG Noboru KUNIHIRO Kazuo OHTA 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2008/01/01
Vol. E91-A  No. 1  pp. 55-63
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: Hash Functions
Keyword: 
collision attackmessage differenceMD4MD5hash function
 Summary | Full Text:PDF(265KB)

Improved Collision Attacks on MD4 and MD5
Yu SASAKI Yusuke NAITO Noboru KUNIHIRO Kazuo OHTA 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2007/01/01
Vol. E90-A  No. 1  pp. 36-47
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: Hash Functions
Keyword: 
message modificationcollision attackMD5MD4hash function
 Summary | Full Text:PDF(260.9KB)