Volgen
Ryoma Ito
Ryoma Ito
Geverifieerd e-mailadres voor nict.go.jp - Homepage
Titel
Geciteerd door
Geciteerd door
Jaar
Security Analysis of End-to-End Encryption for Zoom Meetings
T Isobe, R Ito
252021
Output prediction attacks on block ciphers using deep learning
H Kimura, K Emura, T Isobe, R Ito, K Ogawa, T Ohigashi
International Conference on Applied Cryptography and Network Security, 248-276, 2022
152022
PNB-focused differential cryptanalysis of ChaCha stream cipher
S Miyashita, R Ito, A Miyaji
Cryptology ePrint Archive, 2021
13*2021
Distinguishing and key recovery attacks on the reduced-round SNOW-V and SNOW-Vi
J Hoki, T Isobe, R Ito, F Liu, K Sakamoto
Journal of Information Security and Applications 65, 103100, 2022
82022
Cryptanalysis of Rocca and feasibility of its security claim
A Hosoyamada, A Inoue, R Ito, T Iwata, K Minematsu, F Sibleyras, Y Todo
IACR Transactions on Symmetric Cryptology, 123-151, 2022
72022
Rotational cryptanalysis of salsa core function
R Ito
International Conference on Information Security, 129-145, 2020
72020
Security Analysis of SFrame
T Isobe, R Ito, K Minematsu
IACR Cryptol. ePrint Arch. 2021, 424, 2021
62021
New Linear Correlations related to State Information of RC4 PRGA using IV in WPA
R Ito, A Miyaji
International Workshop on Fast Software Encryption, 557-576, 2015
62015
Refined construction of RC4 key setting in WPA
R Ito, A Miyaji
IEICE Transactions on Fundamentals of Electronics, Communications and …, 2017
52017
Areion: Highly-Efficient Permutations and Its Applications (Extended Version)
T Isobe, R Ito, F Liu, K Minematsu, M Nakahashi, K Sakamoto, R Shiba
Cryptology ePrint Archive, 2023
4*2023
Bit-wise Cryptanalysis on AND-RX Permutation Friet-PC
R Ito, R Shiba, K Sakamoto, F Liu, T Isobe
42021
Distinguishing and key recovery attacks on the reduced-round SNOW-V
J Hoki, T Isobe, R Ito, F Liu, K Sakamoto
Australasian Conference on Information Security and Privacy, 171-190, 2021
32021
Refined glimpse correlations of RC4
R Ito, A Miyaji
IEICE Transactions on Fundamentals of Electronics, Communications and …, 2016
32016
PNB based differential cryptanalysis of Salsa20 and Chacha
N Ghafoori, A Miyaji, R Ito, S Miyashita
IEICE TRANSACTIONS on Information and Systems 106 (9), 1407-1422, 2023
22023
Parallel SAT Framework to Find Clustering of Differential Characteristics and Its Applications
K Sakamoto, R Ito, T Isobe
International Conference on Selected Areas in Cryptography, 409-428, 2023
22023
New Cryptanalysis of ZUC-256 Initialization Using Modular Differences
F Liu, W Meier, S Sarkar, G Wang, R Ito, T Isobe
22022
New iterated RC4 key correlations and their application to plaintext recovery on WPA-TKIP
R Ito, A Miyaji
IEICE Transactions on Fundamentals of Electronics, Communications and …, 2021
22021
New iterated RC4 Key correlations
R Ito, A Miyaji
Information Security and Privacy: 23rd Australasian Conference, ACISP 2018 …, 2018
22018
Refined RC4 key correlations of internal states in WPA
R Ito, A Miyaji
IEICE Transactions on Fundamentals of Electronics, Communications and …, 2016
22016
How TKIP induces biases of internal states of generic RC4
R Ito, A Miyaji
Australasian Conference on Information Security and Privacy, 329-342, 2015
22015
Het systeem kan de bewerking nu niet uitvoeren. Probeer het later opnieuw.
Artikelen 1–20