Publication
Journal Papers
Takanori Isobe, Ryoma Ito and Kazuhiko Minematsu, "Security Analysis of SFrame", Journal of Information Security and Applications, 2025
Takanori Isobe, Samir Kundu, and Mostafizar Rahman, "On the Key-Commitment Properties of Forkcipher-based AEADs", IACR Communications in Cryptology, 2025 (to appear).
Subhadeep Banik, Andrea Caforio, Tatsuya Ishikawa,Takanori Isobe, Mostafizar Rahman and Kosei Sakamoto "AETHER: An Ultra-High Throughput and Low Energy Authenticated Encryption Scheme", IACR Transactions on Cryptographic Hardware and Embedded Systems(TCHES 2025), 2025 (To appear).
Rikuto Kurahara, Kosei Sakamoto and Takanori Isobe, "Finding New Differential Characteristics on SPECK Family", IEICE Trans. on Fundamentals of Electronics, Comm. and Computer Sciences, 2024 (to appear)
Kazuma Taka, Tatsuya Ishikawa, Kosei Sakamoto and Takanori Isobe, "Towards Finding Better Differentials on Multiple-Branch-Based Structures with the SAT Method", IEICE Trans. on Fundamentals of Electronics, Comm. and Computer Sciences, 2024 (to appear)
Anand Ravi, Takanori Isobe, Surajit Mandal, Mostafizar Rahman and Santanu Sarkar, "Implementing Grover's on AES-based AEAD Schemes", Nature Scientific Report, 2024 (to appear).
Ravi Anand, Takanori Isobe, Anup Kumar Kundum Mostafizar Rahman and Sahiba Suryawanshi, "Differential Fault Attack on AES-based Encryption Schemes: Application to B5G/6G ciphers: Rocca, Rocca-S and AEGIS", Journal of Cryptographic Engineering, 2024 (to appear).
Shogo Shiraki, Hayato Kimura and Takanori Isobe, “Looking Further into Security of End-to-End Encryption of SFrame, Journal of Information Processing, 2024 (to appear).
Patrick Derbez, Pierre-Alain Fouque, Takanori Isobe, Mostafizar Rahman and André Schrottenloher, "Key Committing Attacks against AES-based AEAD Schemes", IACR Trans. Symmetric Cryptol (ToSC/FSE), 2024, issue 1 , pp. 135-157, 2024.
Shion Utsumi, Kosei Sakamoto and Takanori Isobe, "SAT-based Analysis of Related-key Impossible Distinguishers on Piccolo and (Tweakable) TWINE", IEICE Trans. on Fundamentals of Electronics, Comm. and Computer Sciences, Vol., No.: Vol.E107-A, No.8, pp.1186-1195, 2024
Nobuyuki Takeuchi, Kosei Sakamoto, Takuro Shiraya and Takanori Isobe, "Improving the Security Bounds against Differential Attacks for Pholkos Family", IEICE Trans. on Fundamentals of Electronics, Comm. and Computer Sciences, Vol., No.: Vol.E107-A, No.8, pp.1196-1204, 2024.
Ravi Anand, Subhadeep Banik, Andrea Caforio, Tatsuya Ishikawa,Takanori Isobe, Fukang Liu, Kazuhiko Minematsu, Mostafizar Rahman and Kosei Sakamoto "Gleeok: A Family of Low-Latency PRFs and its Applications to Authenticated Encryption"IACR Transactions on Cryptographic Hardware and Embedded Systems(TCHES 2023), 2024(2), pp.545-587, 2024.
Rimpa Nandi, Anand Ravi and Takanori Isobe, "Analysis of Atom Against Quantum Attacks", IET Information Security, vol. 5, no.1, pp. 88-102, 2024.
Shion Utsumi, Kosei Sakamoti and Takanori Isobe, "Exploring the Optimality of Byte-wise Permutations of a Piccolo-type Block Cipher", Information Processing Letters,vol.184,106436,2024.
Libo Wang, Ling Song, Baofeng Wu, Mostafizar Rahman and Takanori Isobe, "Revisiting the boomerang attack from a perspective of 3-differential", IEEE Transactions on Information Theory, vol.70, issue7, pp.5343 - 5357, 2024.
Satyam Kumar, Sandip Kumar Mondal, Santanu Sarkar andTakanori Isobe; Anubhab Baksi; Avishek Adhikari, "Restricted Near Collision Attack on Plantlet", Journal of Cryptographic Engineering, Volume 14, pp. 19–34. 2024.
Takanori Isobe, Ryoma Ito and Kazuhiko Minematsu, "Cryptanalysis on End-to-End Encryption Schemes of Communication Tools and Its Research Trend", Journal of Information Processing, vol. 31, pp.523-536 2023. (Invited Paper).
Hayato Kimura, Keita Emura, Takanori Isobe, Ryoma Ito, Kazuto Ogawa, and Toshihiro Ohigashi.”A Deeper Look into Deep Learning-based Output Prediction Attacks Using Weak SPN Block Ciphers ”, Journal of Information Processing, vol. 31, pp.550-561, 2023 (Specially Selected Paper).
Shion Utsumi, Kosei Sakamoto and Takanori Isobe, "Bit-level Evaluation of Piccolo Block Cipher by SAT Solver", IET Information Security, vol. 17, no.4, pp. 616-625 , 2023.
Ravi Anand and Takanori Isobe, "Quantum Security Analysis of Rocca", Quantum Information Processing, vol. 22,no.4 pp.164, 2023.
Takanori Isobe, Ryoma Ito, Fukang Liu, Kazuhiko Minematsu, Motoki Nakahashi, Kosei Sakamoto and Rentaro Shiba, " Areion: Highly-Efficient Permutations and Its Applications to Hash Functions for Short Input", IACR Transactions on Cryptographic Hardware and Embedded Systems(TCHES 2023), 2023(2), 115–154, 2023.
Takuro Shiraya, Nobuyuki Takeuchi, Kosei Sakamoto and Takanori Isobe, "MILP-based Security Evaluation for AEGIS/Tiaoxin-346/Rocca", IET Information Security, vol. 17, no.3, pp. 458-467 , 2023.
Takaki Asanuma and Takanori Isobe, "Even-Mansour Space-hard Cipher: White-box Cryptography Cipher Meets Physically Unclonable Function", Journal of Information Processing, issue 31: pp.88-96 2023.
Takaki Asanuma and Takanori Isobe, "mPoW: How to Make Proof of Work Meaningful", IEICE Trans. on Fundamentals of Electronics, Comm. and Computer Sciences, Vol.E106-A,no.3,pp. 333-340, 2023.
Takeuchi Nobuyuki, Kosei Sakamoto and Takanori Isobe, "Security Evaluation of Initialization Phases and Round Functions of Rocca and AEGIS", IEICE Trans. on Fundamentals of Electronics, Comm. and Computer Sciences, Vol.E106-A,no.3,pp. 253-262, 2023. .
Rentaro Shiba, Ravi Anand, Kazuhiko Minematsu and Takanori Isobe, "Cubicle: a family of space-hard ciphers for IoT", IET Information Security, 2023 .
Fukang Liu, Santanu Sarkar, Willi Meier and Takanori Isobe, "New Low-Memory Algebraic Attacks on LowMC in the Picnic Setting", IACR Trans. Symmetric Cryptol (ToSC/FSE), 2022, issue 3, pp. 102-122, 2022.
Yosuke Todo and Takanori Isobe, "Hybrid Code Lifting on Space-Hard Block Ciphers", IACR Trans. Symmetric Cryptol (ToSC/FSE), 2022, issue 3, pp. 368-402, 2022.
Fukang Liu, Willi Meier, Santanu Sarkar, Gaoli Wang, Ryoma Ito, Takanori Isobe, "New Cryptanalysis of ZUC-256 Initialization Using Modular Differences" ,IACR Trans. Symmetric Cryptol (ToSC/FSE), 2022, issue 3, pp. 152-190, 2022.
Fukang Liu, Santanu Sarkar, Willi Meier and Takanori Isobe, "The Inverse of χ and Its Applications to Rasta-like Ciphers", Journal of Cryptology, vo.35, no.4, pp. 28-47, 2022.
Takeuchi Nobuyuki, Kosei Sakamoto and Takanori Isobe, On Optimality of the Round Function of Rocca", IEICE Trans. on Fundamentals of Electronics, Comm. and Computer Sciences, Vol.E106-A,no.1,pp. 45-53, 2023.
Rentaro Shiba, Kosei Sakamoto and Takanori Isobe, "Efficient constructions for large-state block ciphers based on AES-NI" , IET Information Security, vol. 16, No.3, pages 145-160, 2022.
Rentaro Shiba, Kosei Sakamoto, Fukang Liu, Kazuhiko Minematsu and Takanori Isobe, "Integral and Impossible-Differential Attacks on the Reduced-Round Lesamnta-LW-BC", IET Information Security, vol. 16, no.2, pp. 75-85, 2022.
Jin Hoki, Takanori Isobe, Ryoma Ito, Fukang Liu and Kosei Sakamoto. "Distinguishing and Key Recovery Attacks on the Reduced-Round SNOW-V and SNOW-Vi". Journal of Information Security and Applications, vol. 65, no. 103100, 2022.
Andrea Caforio, Subhadeep Banik, Yosuke Todo, Willi Meier, Takanori Isobe, Fukang Liu and Bin Zhang, "Perfect Trees: Designing Energy-Optimal Symmetric Encryption Primitives", IACR Trans. Symmetric Cryptol (ToSC/FSE), 2021, issue 4, pp. 36-73, 2021.
Kosei Sakamoto, Hiroyasu Kubo and Kazuhiko Minematsu, Nao Shibata, Maki Shigeri and Takanori Isobe, "Design of a Linear Layer for a Block Cipher Based on Type-2 Generalized Feistel Network with 32 Branches", IEICE Trans. on Fundamentals of Electronics, Comm. and Computer Sciences, Vol.E105-A,no.3,pp. 268-277, 2022.
Kazuto Shimizu, Kosei Sakamoto and Takanori Isobe, "Applying Byte-shuffling to CLEFIA-type Structure",IEICE Trans. on Fundamentals of Electronics, Comm. and Computer Sciences, Vol.E105-A,no.3,pp. 278-288, 2022.
Takaki Asanuma and Takanori Isobe, "A Proof of Work based on Preimage Problem of Variants of SHA-3 with ASIC Resistance", Journal of Information Processing, vol. 30, pp.75-83, 2021 (Invited From CSS 2020).
Takaki Asanuma and Takanori Isobe, "A Proof of Work based on Key Recovery Problem of Cascade Block Ciphers with ASIC Resistance", IEICE Trans. on Fundamentals of Electronics, Comm. and Computer Sciences, Vol.E105-D,No.2,pp. 248-255, 2022.
Takanori Isobe and Ryoma Ito, "Security Analysis of End-to-End Encryption for Zoom Meetings", IEEE Access, vol. 9, pp. 90677 - 90689, 2021.
Yuji Koike and Takanori Isobe, "Yoroi: Updatable Whitebox Cryptography", IACR Transactions on Cryptographic Hardware and Embedded Sytems (TCHES), no.4, pp.587-617, 2021.
Kosei Sakamoto, Fukang Liu, Yuto Nakano, Shinsaku Kiyomoto and Takanori Isobe, "Rocca: An Efficient AES-based Encryption Scheme for Beyond 5G", IACR Trans. Symmetric Cryptol (ToSC/FSE), 2021, issue 2, pp.1-30, 2021.
Fukang Liu, Takanori Isobe, Willi Meier and Kosei Sakamoto, "Weak Keys in Reduced AEGIS and Tiaoxin", IACR Trans. Symmetric Cryptol (ToSC/FSE),no.2, pp.104-139, 2021 (Best Paper Award) .
Ryoma Ito, Rentaro Shiba, Kosei Sakamoto, Fukang Liu and Takanori Isobe, "Bit-wise Cryptanalysis on AND-RX Permutation Friet-PC" , Journal of Information Security and Applications, vol. 59, no. 102860, 2021.
Jin Hoki ,Kosei Sakamoto ,Kazuhiko Minematsu and Takanori Isobe, "Practical Integral Distinguishers on SNOW 3G and KCipher-2", IEICE Vol.E104-A,no.11,pp.1603-1611, 2021.
Subhadeep Banik, Andrea Caforio, Takanori Isobe, Fukang Liu, Willi Meier, Kosei Sakamoto and Santanu Sarkar, "Atom: A Stream Cipher with Double Key Filter", IACR Trans. Symmetric Cryptol (ToSC/FSE), issue 1, pp.5-36, 2021.
Fukang Liu, Takanori Isobe and Willi Meier, "Exploiting Weak Diffusion of Gimli: Improved Distinguishers and Preimage Attacks", IACR Trans. Symmetric Cryptol (ToSC/FSE), issue 1, pp.185-216, 2021.
Subhadeep Banik, Takanori Isobe, Fukang Liu, Kazuhiko Minematsu and Kosei Sakamoto, "Orthros: A Low-Latency PRF", IACR Trans. Symmetric Cryptol (ToSC/FSE), 2021, issue 1, pp.37-77, 2021.
Subhadeep Banik, Yuki Funabiki and Takanori Isobe, "Further Results on Efficient Implementations of Block Cipher Linear Layers", IEICE Trans. on Fundamentals of Electronics, Comm. and Computer Sciences, Vol.E104-A, no.01, pp. 213-225, 2021. (Invited From IWSEC 2019)
Jin Hoki ,Kosei Sakamoto,Fukang Liu ,Kazuhiko Minematsu and Takanori Isobe, "MILP-Aided Security Evaluation of Differential Attacks on KCipher-2", IEICE Trans. on Fundamentals of Electronics, Comm. and Computer Sciences, Vol.E104-A, no.01, pp. 203-212, 2021.
Yuji Koike, Takuya Hayashi, Jun Kurihara and Takanori Isobe, "Virtual Vault : A Practical Leakage Resilient Scheme Using Space-Hard Ciphers", IEICE Trans. on Fundamentals of Electronics, Comm. and Computer Sciences, Vol.E104-A, no.01, pp. 182-189, 2021..
Fukang Liu and Takanori Isobe, "Preimage Attacks on Reduced Troika with Divide-and-Conquer Methods", IEICE Trans. on Fundamentals of Electronics, Comm. and Computer Sciences, Vol.E103-A, no.11, pp.1260-1273, 2020.
Kosei Sakamoto, Kazuhiko Minematsu, Nao Shibata, Maki Shigeri, Hiroyasu Kubo, Yuki Funabiki, Andrey Bogdanov, Sumio Morioka and Takanori Isobe, "Tweakable TWINE: Building a Tweakable Block Cipher on Generalized Feistel Structure", IEICE Trans. on Fundamentals of Electronics, Comm. and Computer Sciences, No.: Vol.E103-A, no.12, pp.1629-1639, 2020.
Takanori Isobe and Kyoji Shibutani, "Key-Recovery Security of Single-Key Even-Mansour Cipher", IEICE Trans. on Fundamentals of Electronics, Comm. and Computer Sciences, Vol.E103-A, No.07, pp893-905,2020.
Fukang Liu, Takanori Isobe and Willi Meier, "Cube-based Cryptanalysis of Subterranean-SAE", IACR Trans. Symmetric Cryptol (ToSC/FSE), issue 4, pp.192-222, 2019.
Takanori Isobe and Kazuhiko Minematsu, "Security Analysis and Countermeasures of an End-to-End Encryption Scheme of LINE", IEICE Trans. on Fundamentals of Electronics, Comm. and Computer Sciences, vol.E103-A, no.9, pp. 313-324 , 2020.
Kosei Sakamoto, Kazuhiko Minematsu, Nao Shibata, Maki Shigeri, Hiroyasu Kubo, Yuki Funabiki, a and Takanori Isobe, "Security of Related-Key Differential Attacks on TWINE, Revisited", IEICE Trans. on Fundamentals of Electronics, Comm. and Computer Sciences, vol.E103-A, no.9, pp. 212-214 , 2020.
Subhadeep Banik, Khashayar Barooti and Takanori Isobe, "Cryptanalysis of Plantlet ", IACR Trans. Symmetric Cryptol (ToSC/FSE), issue 3, pp.103-120, 2019.
Fukang Liu, Christoph Dobraunig, Florian Mendel, Takanori Isobe , Gaoli Wang and Zhenfu Cao, "New Semi-Free-Start Collision Attack Framework for Reduced RIPEMD-160 ", IACR Trans. Symmetric Cryptol (ToSC/FSE), issue 3, pp.169-192, 2019.
Yuki Funabiki, Yosuke Todo, Takanori Isobe and Masakatu Morii, "Improved Integral Attack on HIGHT", IEICE Trans. on Fundamentals of Electronics, Comm. and Computer Sciences, vol.E102-A, no.9, pp.1259-1271 , 2019.
Yonglin Hao, Takanori Isobe, Lin Jiao, Chaoyun Li, Willi Meier, Yosuke Todo, and Qingju Wang, "Improved Division Property Based Cube Attacks Exploiting Algebraic Properties of Superpoly", IEEE Trans. on Computers, vol.68, issue 10, pp. 1470-1486, 2019.
Takanori Isobe and Kyoji Shibutani, "Meet-in-the-Middle Key Recovery Attacks on A Single-Key Two-Round Even-Mansour Cipher", IEICE Trans. on Fundamentals of Electronics, Comm. and Computer Sciences, vol.E102-A, no.1, pp.17-26, 2019.
Sonu Jha, Subhadeep Banik, Takanori Isobe, Toshihiro Ohigashi, Santanu Sarkar, "Theoretical Understanding of Some Conditional and Joint Biases in RC4 Stream Cipher ", IEICE Trans. on Fundamentals of Electronics, Comm. and Computer Sciences, vol.E101-A, no.11, pp.1869-1879, 2018.
Yuhei Watanabe, Takanori Isobe, and Masakatu Morii, "Cryptanalysis of Reduced Kreyvium", IEICE Trans. on Fundamentals of Electronics, Comm. and Computer Sciences, vol.E101-A, no.9, pp.1548-1556, 2018.
Yosuke Todo, Takanori Isobe, Yonglin Hao, and Willi Meier, "Cube Attacks on Non-Blackbox Polynomials Based on Division Property", IEEE Trans. on Computers, vol.67, issue12, pp.1548-1556, 2018.
Gianira N. Alfarano,Christof Beierle, Takanori Isobe, Stefan Kölbl, Gregor Leander, "ShiftRows Alternatives for AES-like Ciphers and Optimal Cell Permutations for Midori and Skinny", IACR Trans. Symmetric Cryptol (ToSC/FSE), issue 2, pp.1-19 2018.
Subhapeep, Banik, Vasily Mikhalev, Frederik Armknecht, Takanori Isobe, Willi Meier, Andrey Bogdanov, Yuhei Watanabe, Francesco Regazzoni, "Toward Low Energy Stream Ciphers", IACR Trans. Symmetric Cryptol (ToSC/FSE), issue 2, pp.20-47 2018.
Subhadeep Banik, Takanori Isobe and Masakatu Morii, “On Design of Robust Lightweight Stream Cipher with Short Internal State”, IEICE Trans. on Fundamentals of Electronics, Comm. and Computer Sciences, vol.E101-A, no.1, pp.99-109, 2018.
Subhadeep Banik, Takanori Isobe, Tingting Cui and Jian Guo , “Some cryptanalytic results on Lizard ”, IACR Trans. Symmetric Cryptol (ToSC/FSE), issue 4, pp.82-98 2017.
Subhadeep Banik, Takanori Isobe and Masakatu Morii, “Analysis and Improvements of the Full Spritz Stream Cipher”, IEICE Trans. on Fundamentals of Electronics, Comm. and Computer Sciences, vol.E100-A, no.3, pp.1296-1305, 2017.
Yuhei Watanabe, Takanori Isobe, Toshihiro Ohigashi, and Masakatu Morii, “How to Efficiently Exploit Different Types of Biases for Plaintext Recovery of RC4,” IEICE Trans. on Fundamentals of Electronics, Comm. and Computer Sciences, vol.E100-A, no.3, pp.803-810, 2017.
Subhadeep Banik, Andrey Bogdanov, Takanori Isobe and Martin Bjerregard jepsen. “Analysis of Software Countermeasures for Whitebox Encryption.” IACR Trans. Symmetric Cryptol(ToSC/FSE), issue 2, pp.307-328, 2017.
Toshihiro Ohgashi, Takanori Isobe, Yuhei Watanabe, and Masakatu Morii, "Full Plaintext Recovery Attacks on RC4 using Multiple Biases," IEICE Trans. on Fundamentals of Electronics, Comm. and Computer Sciences, vol.E98-A, no.1, pp.81-91, 2015.
Atsushi Nagao, Toshhiro Ohigashi, Takanori Isobe and Masakatu Morii, "Expanding Weak-Key Space of RC4". Journal of Information Processing , vol.22, no.2, pp. 357-365, 2014
Takanori Isobe, Toshihiro Ohigashi, Yuhei Watanabe and Masakatu Morii, "Comprehensive Analysis of Initial Keystream Biases of RC4”, IEICE Trans. on Fundamentals of Electronics, Comm. And Computer Science, vol.E97-A, no.1, pp.139-151, 2014. (Best Paper Award)
Takanori Isobe, "A Single Key Attack on the Full GOST Block Cipher", Journal of Cryptology, vo.26, no.1, pp. 172-189, 2013.
Takanori Isobe, Toshihiro Ohigashi, and Masakatu Morii, "Slide Property of RAKAPOSHI and Its Application to Key Recovery Attack", Journal of Information Processing, vol.21, no.4, pp.559-606, 2013.
Takanori Isobe, Toshihiro Ohigashi, Hidenori Kuwakado, and Masakatu Morii, "A Chosen-IV Key Recovery Attack on Py and Pypy", IEICE Trans. on Information and Systems, vol.E92-D, no.1, pp.32-40, 2009.
International Conference Papers
Atsushi Tanaka, Rentaro Shiba, Kosei Sakamoto, Mostafizar Rahman, Takuro Shiraya and Takanori Isobe, "ASURA: An Efficient Large-State Tweakable Block Cipher For ARM Environment", INDOCRYPT 2024 (to appear).
Kodai Taiyama, Kosei Sakamoto, Ryoma Ito, Kazuma Taka and Takanori Isobe, "Key Collisions on AES and Its Applications", ASIACRYPT 2024 (to appear). .
Shogo Shiraki and Takanori Isobe, "ecurity Analysis on End-to-End Encryption of Zoom Mail", ISITA 2024
Takuro Shiraya, Kosei Sakamoto and Takanori Isobe, "Bit-wise Analysis for Forgery Attacks on AES-based AEAD Schemes", IWSEC 2024.
Kodai Taiyama, Kosei Sakamoto, Rentaro Shiba and Takanori Isobe, "Collision Attacks on Hashing Modes of Areion" , CANS 2024 .
Rikuto Kurahara, Kosei Sakamoto, Yuto Nakano and Takanori Isobe, "Differential Distinguishing Attacks on SNOW-V, SNOW-Vi and KCipher-2", ACISP 2024.
Kosei Sakamoto, Ryoma Ito and Takanori Isobe, "Parallel SAT Framework to Find Clustering of Differential Characteristics and Its Applications", Conference on Selected Areas in Cryptography (SAC), vol. 14201, pp. 409-428, Springer, 2023
Fukang Liu, Lorenzo Grassi, Clémence Bouvier, Willi Meier and Takanori Isobe, "Coefficient Grouping for Complex Affine Layers", Advances in Cryptology (CRYPTO) 2023, Lecture Note in Computer Science, Part 4, vol. 14083, pp. 540--572 Springer, 2023.
Ravi Anand, Subhadeep Banik, Andrea Caforio, Kazuhide Fukushima, Takanori Isobe, Shisaku Kiyomoto, Fukang Liu, Yuto Nakano, Kosei Sakamoto and Nobuyuki Takeuchi. "An Ultra-High Throughput AES-based Authenticated Encryption Scheme for 6G: Design and Implementation", ESORICS 2023 part2, vol. 14344, pp. 229-248, Springer, 2023
Motoki Nakahashi, Rentaro Shiba, Ravi Anand, Mostafizar Rahman, Kosei Sakamoto, Liu Fukang and Takanori Isobe, "Ghidle: Efficient Large-State Block Ciphers for Post-Quantum Security", ustralasian Conference on Information Security and Privacy - ACISP 2023, volume 13915 of Lecture Notes in Computer Science, pages 403-430 , Springer 2023 .
Fukang Liu, Ravi Anand, Libo Wang, Willi Meier and Takanori Isobe, "Coefficient Grouping: Breaking Chaghri and More", Advances in Cryptology (EUROCRYPT) 2023, Lecture Note in Computer Science, Part 4, vol. 14007, pp. 287-317, Springer, 2023.
Fukang Liu, Gaoli Wang, Santanu Sarkar, Ravi Anand, Willi Meier, Yingxin Li and Takanori Isobe, "Analysis of RIPEMD-160: New Collision Attacks and Finding Characteristics with MILP", Advances in Cryptology (EUROCRYPT) 2023, Lecture Note in Computer Science, Part 4, vol. 14007, pp. 189-219, Springer, 2023.
Kazuma Taka, Tatuya Ishikawa, Kosei Sakamoto and Takanori Isobe, "An Efficient Strategy to Construct a Better Differential on Multiple-Brunch-Based Designs: Application to Orthros", Topics in Cryptology - CT-RSA 2023 - Cryptographers' Track at the RSA Conference 2023, Lecture Note in Computer Science, Part 4, vol. 13871, pp. 277-304, Springer, 2023.
Anubhab Baksi, Arghya Bhattacharjee, Jakub Breier, Takanori Isobe and Mridul Nandi, "Big Brother Is Watching You: A Closer Look At Backdoor Construction", International Conference on Security, Privacy, and Applied Cryptography Engineering - SPACE 2022, volume 13783 of Lecture Notes in Computer Science, pages 81-96 , 2022.
Akinori Hosoyamada, Takanori Isobe, Kan Yasuda and Yosuke Todo, “A Modular Approach to the Incompressibility of Block-Cipher-Based AEADs”, Advanced in Cryptology (ASIACRYPT) 2022, Lecture Note in Computer Science, Part 2, vol. 13792, pp. 585-619, Springer, 2022.
Fukang Liu, Santanu Sarkar, Gaoli Wang, Willi Meier and Takanori Isobe, “Algebraic Meet-in-the-Middle Attack on LowMC ”, Advanced in Cryptology (ASIACRYPT) 2022, Lecture Note in Computer Science, Part 1, vol. 13792, pp. 225-255, Springer, 2022.
Hayato Kimura, Keita Emura, Takanori Isobe, Ryoma Ito, Kazuto Ogawa and Toshihiro Ohigashi. "Output Prediction Attacks on Block Ciphers using Deep Learning". Artificial Intelligence and Industrial Internet-of-Things Security - AIoTS 2022, volume 13285 of Lecture Notes in Computer Science, pages 248-276, 2022.
Ravi Anand and Takanori Isobe, "Differential Fault Attack on Rocca", Information Security and Cryptology – ICISC 2021, volume 13218 of Lecture Notes in Computer Science, pages 283–295, 2021 (acceptance rate: 0.36 = (23/63))
Anubhab Baksi, Vishnu Asutosh Dasu, Banashri Karmakar, Anupam Chattopadhyay and Takanori Isobe, "Three Input Exclusive-OR Gate Support For Boyar-Peralta's Algorithm",Progress in Cryptology – INDOCRYPT 2021, volume 13143 of Lecture Notes in Computer Science, pages 141–158, 2021.
Fukang Liu, Santanu Sarkar, Willi Meier and Takanori Isobe, "Algebraic Attacks on Rasta and Dasta Using Low-Degree Equations", Advanced in Cryptology (ASIACRYPT) 2021, Lecture Note in Computer Science, Part 1, vol. 13090, pp. 214-240, Springer, 2021.
Takanori Isobe, Ryoma Ito and Kazuhiko Minematsu, "Security Analysis of SFrame", ESORICS 2021, part2, vol. 12973, pp. 127-146, Springer, 2021. (acceptance rate: 0.24 (= 59/249)).
Fukang Liu, Takanori Isobe and Willi Meier, "Cryptanalysis of Full LowMC and LowMC-M with Algebraic Techniques" Advances in Cryptology (CRYPTO) 2021, Lecture Note in Computer Science, Part 3, vol. 12827, pp. 368-401, Springer (acceptance rate : 0.23 = 103/430)
Takanori Isobe and Ryoma Ito, "Security Analysis of End-to-End Encryption for Zoom Meetings",Australasian Conference on Information Security and Privacy - ACISP 2021, volume 13083 of Lecture Notes in Computer Science, pages 234-253 , 2021 (acceptance rate: 0.24 (= 36/150)).
Jin Hoki, Takanori Isobe, Ryoma Ito, Fukang Liu and Kosei Sakamoto, "Distinguishing and Key Recovery Attacks on the Reduced-Round SNOW-V", Australasian Conference on Information Security and Privacy - ACISP 2021, volume 13083 of Lecture Notes in Computer Science, pages 171–190, 2021 (acceptance rate: 0.24 (= 36/150)).
Fukang Liu, Takanori Isobe, Willi Meier and Zhonghao Yang, "Algebraic Attacks on Round-Reduced Keccak, Australasian Conference on Information Security and Privacy - ACISP 2021, volume 13083 of Lecture Notes in Computer Science, pages 91-110 , 2021 (acceptance rate: 0.24 (= 36/150)).
Subhadeep Banik, Zhenzhen Bao, Takanori Isobe, Hiroyasu Kubo, Kazuhiko Minematsu, Fukang Liu, Kosei Sakamoto, Nao Shibata and Maki Shigeri, "WARP : Revisiting GFN for Lightweight 128-bit Block Cipher", Conference on Selected Areas in Cryptography (SAC) 2020, Lecture Note in Computer Science, vol. 12804, pp. 535--564. Springer, 2020
Fukang Liu, Takanori Isobe and Willi Meier, "Automatic Verification of Differential Characteristics:Application to Reduced Gimli", Advances in Cryptology (CRYPTO) 2020, Lecture Note in Computer Science, Part 3, vol. 12172, pp. 219-248, Springer, 2020. (acceptance rate : 0.23 = 85/371) .
Yuji Koike, Kosei Sakamoto, Takuya Hayashi and Takanori Isobe, "Galaxy: A Family of Stream-Cipher-Based Space-Hard Ciphers" , Australasian Conference on Information Security and Privacy (ACISP) 2020, Lecture Note in Computer Science, Part 1, vol. 12248, pp. 142-159, Springer, 2020. (acceptance rate : 0.20= 30/151)
Rintaro Fujita, Takanori Isobe and Kazuhiko Minematsu, "ACE in Chains : How Risky is CBC Encryption of Binary Executable Files ?" 18th International Conference on Applied Cryptography and Network Security (ACNS 2020), Lecture Note in Computer Science, Part 1, vol. 12146, pp. 187-207, Springer, 2020. (acceptance rate : 0.21)
Hayato Kimura, Takanori Isobe and Toshihiro Ohigashi, "Neural-Network-Based Pseudo-Random Number Generator Evaluation Tool for Stream Ciphers", CANDAR Workshops 2019, pp. 333-338, IEEE, 2019.
Takanori Isobe and Kazuhiko Minematsu, "Plaintext Recovery Attacks against XTS Beyond Collisions", Conference on Selected Areas in Cryptography (SAC) 2019, Lecture Note in Computer Science, vol. 11959, pp. 103-123. Springer, 2019. (acceptance rate : 0.37 = 28/74)
Fukang Liu and Takanori Isobe, "Iterative Differential Characteristic of TRIFLE-BC", Conference on Selected Areas in Cryptography (SAC) 2019, Lecture Note in Computer Science, vol. 11959, pp. 85-100. Springer, 2019. (acceptance rate : 0.37 = 28/74)
Kosei Sakamoto, Kazuhiko Minematsu, Nao Shibata, Maki Shigeri, Hiroyasu Kubo, Yuki Funabiki, Andrey Bogdanov, Sumio Morioka and Takanori Isobe, "Tweakable TWINE: Building a Tweakable Block Cipher on Generalized Feistel Structure", International Workshop on Security, (IWSEC) 2019, Lecture Note in Computer Science, vol. 11689, pp. 129-145. Springer, 2019. (acceptance rate : 0.28 = 18/63)
Fukang Liu and Takanori Isobe, "Preimage Attacks on Reduced Troika with Divide-and-Conquer Methods", International Workshop on Security, (IWSEC) 2019, Lecture Note in Computer Science, vol. 11689, pp. 306-326. Springer, 2019. (acceptance rate : 0.28 = 18/63)
Subhadeep Banik, Yuki Funabiki and Takanori Isobe, "More results on Shortest Linear Programs", (IWSEC) 2019, Lecture Note in Computer Science, vol. 11689, pp. 109-128. Springer, 2019. (acceptance rate : 0.28 = 18/63)
Fukang Liu, Christoph Dobraunig, Florian Mendel, Takanori Isobe, Gaoli Wang and Zhenfu Cao, "Efficient Collision Attack Frameworks for RIPEMD-160", Advances in Cryptology (CRYPTO) 2019, Lecture Note in Computer Science, Part 2, vol. 10992, pp. 117-149, Springer, 2019. (acceptance rate : 0.21 = 81/378).
Yuki Funabiki, Yosuke Todo, Takanori Isobe and Masakatu Morii, "Several MILP-Aided Attacks against SNOW 2.0", CANS 2018, vol. 11124, pp. 394--413, Springer, 2018. (acceptance rate : 0.33 = 26/79)
Takanori Isobe and Kazuhiko Minematsu, "Breaking the Message Integrity of End-to-End Encryption Schemes of LINE", ESORICS 2018, part2, vol. 11099, pp. 249-268, Springer, 2018. (acceptance rate : 0.19 = 66/283)
Yosuke Todo, Takanori Isobe, Willi Meier, Kazumaro Aoki, and Bin Zhang, "Fast Correlation Attack Revisited --Cryptanalysis on Full Grain-128a, Grain-128, and Grain-v1", Advances in Cryptology (CRYPTO) 2018, Lecture Note in Computer Science, Part 2, vol. 10992, pp. 129--159, Springer, 2018. (acceptance rate : 0.22 = 79/351)
Qingju Wang, Yonglin Hao, Yosuke Todo, Chaoyun Li, Takanori Isobe, Willi Meier, "Improved Division Property Based Cube Attacks Exploiting Algebraic Properties of Superpoly", Advances in Cryptology (CRYPTO) 2018, Lecture Note in Computer Science, Part 1, vol. 10991, pp. 275--305, Springer, 2018. (acceptance rate : 0.22 = 79/351)
Subhadeep Banik, Andrey Bogdanov, Francesco Regazzoni, Takanori Isobe, Toru Akishita, Harunaga Hiwatari.Inverse Gating for Low Energy Block Ciphers. IEEE International Symposium on Hardware Oriented Security and Trust (IEEE HOST 2018), IEEE Computer Society, pp. 173--176, Springer, 2018. (acceptance rate : 0.26 = 22/84)
Takanori Isobe and Kyoji Shibutani, "New Key Recovery Attacks on Minimal Two-Round Even-Mansour Ciphers", Advanced in Cryptology (ASIACRYPT) 2017, Lecture Note in Computer Science, Part 1, vol. 10624, pp. 244-263, Springer, 2017. (acceptance rate : 0.27 = 67/243)
Yosuke Todo, Takanori Isobe, Yonglin Hao, and Willi Meier, "Cube Attacks on Non-Blackbox Polynomials Based on Division Property", Advances in Cryptology (CRYPTO) 2017, Lecture Note in Computer Science, Part 3, vol. 10403, pp. 250-279, Springer, 2017. (acceptance rate : 0.23 = 72/311)
Takeru Koie, Takanori Isobe , Yosuke Todo and Masakatu Morii, "Low-Data Complexity Attacks on Camellia", International Conference on Applications and Technologies in Information Security (ATIS) 2017.
Yuki Funabiki, Yosuke Todo, Takanori Isobe and Masakatu Morii "Improved Integral Attack on HIGHT”, Australasian Conference on Information Security and Privacy (ACISP) 2017, Lecture Note in Computer Science, vol. 10342, pp. 363-383, Springer, 2017. (acceptance rate : 0.30%= 45/150)
Yuhei Watanabe, Takanori Isobe and Masakatu Morii "Conditional Differential Cryptanalysis for Kreyvium”, Australasian Conference on Information Security and Privacy (ACISP) 2017, Lecture Note in Computer Science, vol. 10342, pp. 421-434, Springer, 2017. (acceptance rate : 0.30 = 45/150)
Andrey Bogdanov , Takanori Isobe and Elmar Tischhauser, “Towards Practical Whitebox Cryptography: Optimizing Efficiency and Space Hardness”, Advanced in Cryptology (ASIACRYPT) 2016, Lecture Note in Computer Science, Part 1, vol. 10031, pp. 126-158, Springer, 2016.(acceptance rate : 0.27 = 67/140)
Sonu Jha, Subhadeep Banik, Takanori Isobe and Toshihiro Ohigashi, “Some Proofs of TLS related Keystream Biases in RC4”, (INDOCRYPT ), Lecture Note in Computer Science, 10095, pp. 305-321, Springer, 2016. (acceptance rate : 0.27 = 23/84)
Subhadeep Banik, Andrey Bogdanov, Francesco Regazzoni, Takanori Isobe, Harunaga Hiwatari, Toru Akishita, “Round gating for low energy block ciphers”, IEEE International Symposium on Hardware Oriented Security and Trust (HOST) 2016, pp. 55-60, IEEE Computer Society 2016. (acceptance rate : 0.24 = 26/106)
Subhadeep Banik and Takanori Isobe, " Cryptanalysis of the Full Spritz Stream Cipher”, Fast Software Encryption (FSE) 2016, Lecture Note in Computer Science, vol. 9783, pp. 63-77. Springer, 2016. (acceptance rate : 0.33 = 29/86)
Andrey Bogdanov and Takanori Isobe, “White-Box Cryptography Revisited: Space-Hard Ciphers”, Proceeding of 22nd ACM Conference on Computer and Communications Security (CCS) 2015, pp. 1058-1069. Springer, 2015. (acceptance rate : 0.19 = 128/660)
Subhadeep Banik, Andrey Bogdanov, Takanori Isobe, Kyoji Shibutani, Harunaga Hiwatari, Toru Akishita, Francesco Regazzoni, “Midori: A Block Cipher for Low Energy”, Advanced in Cryptology (ASIACRYPT) 2015, Lecture Note in Computer Science, vol. 9453, pp. 411-436. Springer, 2015. (acceptance rate : 0.25 = 64/251)
Andrey Bogdanov and Takanori Isobe, “How Secure is AES Under Leakage”, Advanced in Cryptology (ASIACRYPT) 2015, Lecture Note in Computer Science, vol. 9453, pp. 104--126. Springer, 2015. (acceptance rate : 0.25 = 64/251)
Takanori Isobe and Kyoji Shibutani, " Improved All-Subkeys Recovery Attacks on FOX, KATAN and SHACAL-2 Block cipher”, Fast Software Encryption (FSE) 2014, Lecture Note in Computer Science, vol. 8269, pp. 464-486. Springer, 2014. (acceptance rate : 0.31 = 31/99)
Takanori Isobe and Kyoji Shibutani, "Generic Key Recovery Attack on Feistel Scheme”, Advanced in Cryptology (ASIACRYPT) 2013, Lecture Note in Computer Science, vol. 8269, pp. 464-486. Springer, 2013. (acceptance rate : 0.20 = 54/269)
Toshihiro Ohigashi, Takanori Isobe, Yuhei, Watanabe and Masakatu Morii, "How to Recovery Any Byte of RC4”, Conference on Selected Areas in Cryptography (SAC) 2013, Lecture Note in Computer Science, vo. 8282, pp. 155-173, Springer, 2013. (acceptance rate : 0.26 = 26/98)
Takanori Isobe, Toshihiro Ohigashi, Yuhei, Watanabe and Masakatu Morii, "Full Plaintext Recovery Attack on Broadcast RC4”, Fast Software Encryption (FSE) 2013, Lecture Note in Computer Science, Lecture Note in Computer Science, vol. 8424, pp. 179-202. Springer, 2013. (acceptance rate : 0.25 = 24/97)
Takanori Isobe, Yu Sasaki and Jiageng Chen "Related-Key Boomerang Attacks on KATAN32/48/64”, Australasian Conference on Information Security and Privacy (ACISP) 2013, Lecture Note in Computer Science, vol. 7959, pp. 268-285. Springer, 2013. (acceptance rate : 0.27 = 24/90)
Takanori Isobe, Toshihiro Ohigashi and Masakatu Morii, "Slide Cryptanalysis on Lightweight Stream Cipher RAKAPOSHI”, International Workshop on Security, (IWSEC) 2012, Lecture Note in Computer Science, vol. 7631, pp. 138-155. Springer, 2012. (acceptance rate : 0.30 = 16/56)
Takanori Isobe and Kyoji Shibutani, "All Subkey Recovery Attack on Block Cipher : Extending Meet-in-the-Middle Approach”, Conference on Selected Areas in Cryptography (SAC) 2012, Lecture Note in Computer Science, vol. 7707, pp. 202-221. Springer, 2012. (acceptance rate : 0.27 = 24/87)
Takanori Isobe and Kyoji Shibutani, "Security Analysis Lightweight Block Ciphers XTEA, LED and Piccolo”, Australasian Conference on Information Security and Privacy (ACISP) 2012, Lecture Note in Computer Science, vol. 7372, pp. 71-86. Springer, 2012. (acceptance rate : 0.33 = 30/89)
Li Ji, Takanori Isobe and Kyoji Shibutani, "Converting Meet-in-the-Middle Preimage Attack into Pseudo Collision Attack: Application to SHA-2”, Fast Software Encryption (FSE) 2012, Lecture Note in Computer Science, vol. 7549, pp. 264-287. Springer, 2012. (acceptance rate : 0.27 = 24/90)
Harunaga Hiwatari, Kyoji Shibutani, Takanori Isobe, Atsushi Mitsuda, Toru Akishita and Taizo Shirai, "Compact Hardware Implementations of the Ultra-Lightweight Blockcipher Piccolo", Proceedings of ECRYPT Workshop on Lightweight Cryptography, 2011.
Kyoji Shibutani, Takanori Isobe, Harunaga Hiwatari, Atsushi Mitsuda, Toru Akishita and Taizo Shirai, "Piccolo : A Ultra-Lightweight Blockcipher" Cryptographic Hardware and Embedded Systems (CHES) 2011, Lecture Note in Computer Science, vol. 6917, pp. 342-357. Springer, 2011. (acceptance rate : 0.27 = 32/19)
Takanori Isobe, "A Single Key Attack on the Full GOST Block Cipher", Fast Software Encryption (FSE) 2011, Lecture Note in Computer Science, vol. 6733, pp. 290-305. Springer, 2011. (Best Paper Award) (acceptance rate : 0.21 = 22/106)
Takanori Isobe and Kyoji Shibutani, "Preimage Attack on Reduced Tiger and SHA-2”, Fast Software Encryption (FSE) 2009, Lecture Note in Computer Science, vol. 5665, pp. 139-155. Springer, 2009. (acceptance rate : 0.31 = 24/76)
Takanori Isobe, Toshihiro Ohigashi, Hidenori Kuwakado and Masakatu Morii, "How to Break Py and Pypy by a Chosen-IV Attack", Workshop Record of The State of the Art of Stream Ciphers (SASC) 2007, pp. 340-352, 2007.
Domestic Conference Papers
佐々木 皓亮, 倉原 陸斗, 阪本 光星, 五十部 孝典, "SipHashの偽造攻撃に対する安全性評価", コンピュータセキュリティシンポジウム (CSS) , 2024 (情報処理学会論文誌 推薦論文).
木村 隼人, 白木 章伍, 伊藤 竜馬, 峯松 一彦, 五十部 孝典, "Link Previewを介した暗号化DMに対する平文回復攻撃", コンピュータセキュリティシンポジウム(CSS), 2024 (優秀論文賞, エシカルプラクティス賞, 情報処理学会論文誌 推薦論文).
泰山幸大, 阪本光星, 伊藤竜馬, 髙 和真, 五十部孝典, "AESのDavies-Meyerハッシュモードに対する衝突攻撃", ISEC 7月, 2024.
中田和磨, 石川達也, 阪本光星, 峯松一彦, 五十部孝典, " 複数線形層を用いた低遅延ブロック暗号の設計", ISEC 7月, 2024.
白木章伍, 五十部孝典, "Bluetoothを用いた本人認証プロセスに対する安全性評価" , ISEC 7月, 2024.
髙 和真, 阪本 光星 , 伊藤 竜馬, 芝 廉太朗, 内海 潮音, 五十部 孝典, "分割統治法SATを用いたAESとCamelliaの最大差分/線形特性確率の導出", 2024年 暗号と情報セキュリティシンポジウム(SCIS 2024).
倉原 陸斗, 阪本 光星 , 仲野 有登, 五十部 孝典, "SNOW-V/SNOW-Vi/KCipher-2に対する差分攻撃", 2024年 暗号と情報セキュリティシンポジウム(SCIS 2024).
泰山 幸大, 阪本 光星, 芝 廉太朗, 五十部 孝典, "衝突攻撃評価自動化ツールの提案と Areion のハッシュモードへの適用", 2024年 暗号と情報セキュリティシンポジウム(SCIS 2024).
田中 篤, 芝 廉太朗, 阪本 光星, 五十部 孝典, "ARM NEONに基づいた高速なラージブロック暗号の設計", 2024年 暗号と情報セキュリティシンポジウム(SCIS 2024).
芝 廉太朗, アナンド ラビ, ゴーシュ シバーム, 五十部 孝典, "2つの鍵を用いるIterated Even-Mansour構造に対する量子鍵回復攻撃", 2024年 暗号と情報セキュリティシンポジウム(SCIS 2024).
泰山 幸大, 芝 廉太朗, 阪本 光星, 五十部 孝典, "ラージブロック置換 Areion と Simpira v2 の最大差分特性確率の導出と衝突攻撃評 " コンピュータセキュリティシンポジウム(CSS) 2023.
中田 和磨, 石川 達也, 高 和真, 阪本 光星, 五十部 孝典, "複数線形層を用いた Midori 型低遅延ブロック暗号の設計", コンピュータセキュリティシンポジウム(CSS) 2023.
白木 章伍, 木村 隼人, 五十部 孝典, "更新版SFrameに対する安全性評価", コンピュータセキュリティシンポジウム(CSS) 2023.
木村 隼人, 伊藤 竜馬 , 峯松 一彦, 五十部 孝典, "分散型SNSプロトコルNostrに対する改ざん攻撃", コンピュータセキュリティシンポジウム(CSS) 2023. (CSS2023 学生論文賞)
木村隼人・五十部孝典, " 分散型SNSプロトコルNostrの安全性評価", ISEC 7月, 2023.
髙 和真, 阪本 光星, 五十部 孝典, " 複数ブランチ構造に対する最大差分特性確率について ", ISEC 7月, 2023.
内海 潮音, 阪本 光星, 五十部 孝典 “SATソルバーを用いたPiccolo, TWINE, LBlockに対する関連鍵不能差分識別子の探索 , ISEC 7月, 2023.
白矢 琢朗, 阪本 光星, 五十部 孝典, "AEGIS Familyに対するSATを用いた差分解析 ", ISEC 7月, 2023.
平尾星音・堀部佳吾・阪本光星・五十部 孝典,“ブロック暗号Midoriの関連鍵差分攻撃評価とその対策”, ISEC 2023
内海 潮音, 中橋 元輝, 阪本 光星, 五十部 孝典 “Piccolo-typeブロック暗号のラウンド置換の改良”, コンピュータセキュリティシンポジウム(CSS) 2022.
白矢 琢朗 , 竹内 信幸, 阪本 光星, 五十部 孝典, "混合整数線形計画法を用いたAEGIS/Tiaoxin-346/Roccaに対する安全性評価", コンピュータセキュリティシンポジウム(CSS) 2022.
髙 和真, 石川 達也, 阪本 光星, 五十部 孝典, "SATソルバーを用いた低遅延暗号Orthrosに対する差分攻撃の耐性評価", コンピュータセキュリティシンポジウム(CSS) 2022.
竹内 信幸, 阪本 光星, 五十部 孝典, "高速でより安全なRocca-typeラウンド関数の設計", コンピュータセキュリティシンポジウム(CSS) 2022.
中橋 元輝, 芝 廉太朗, 阪本 光星, Liu Fukang, 伊藤 竜馬, 峯松 一彦, 五十部 孝典, “AES instructionを用いたラージブロック置換の改良とその応用”, ISEC研究会, 2022年3月, 2022.
阪本 光星, Liu Fukang, 仲野有登, 清本 晋作, 五十部 孝典, “共通鍵暗号方式Roccaの設計と安全性評価”, ISEC研究会, 2022年3月, 2022.
仲野 有登, 阪本 光星, Liu Fukang, 清本 晋作, 五十部 孝典, “共通鍵暗号方式Roccaの実装評価”, ISEC研究会, 2022年3月, 2022.
竹内 信幸, 阪本 光星, 五十部 孝典, “RoccaとAEGISファミリーのラウンド関数の安全性評価”, 2022年 暗号と情報セキュリティシンポジウム(SCIS 2022).
中橋 元輝, 芝 廉太朗, 五十部 孝典, "AES-NIを用いたFeistel型ラージブロック置換" , コンピュータセキュリティシンポジウム(CSS) 2021.
竹内 信幸, 阪本 光星, 五十部 孝典, "AES-NIを用いたBeyond 5G向け認証暗号Roccaのラウンド関数の最適性の検証", コンピュータセキュリティシンポジウム(CSS) 2021 (CSS2021 学生論文賞).
堀部 佳吾, Fukang Liu, 五十部 孝典, "Modular差分を用いたストリーム暗号ZUC-256の解析", コンピュータセキュリティシンポジウム(CSS) 2021.
Rentaro Shiba, Ravi Anand, Kazuhiko Minematsu, Takanori Isobe, "Cubicle: A Family of Space-Hard Ciphers for IoT", コンピュータセキュリティシンポジウム(CSS) 2021.
浅沼 岳樹, 五十部 孝典, "mPoW: 意味のある計算によるProof of Work", コンピュータセキュリティシンポジウム(CSS) 2021.
五十部 孝典, 伊藤 竜馬, 峯松 一彦, "エンドツーエンド暗号化SFrameに対する安全性評価" , コンピュータセキュリティシンポジウム(CSS) 2021 (CSS2020 奨励賞).
五十部 孝典, 伊藤 竜馬, "Zoomのエンドツーエンド暗号化に対する安全性評価".2021年 暗号と情報セキュリティシンポジウム(SCIS 2021) , 2021年1月 . (SCIS イノベーション論文賞)
木村隼人, 江村 恵太, 五十部 孝典, 伊藤 竜馬,小川 一人,大東 俊博 "深層学習を用いたSPNブロック暗号への出力予測攻撃". 2021年 暗号と情報セキュリティシンポジウム(SCIS 2021) , 2021年1月 .
浅沼 岳樹, 五十部 孝典 , "Cascadeなブロック暗号をベースにしたASIC耐性のあるProof of Work", 2021年 暗号と情報セキュリティシンポジウム(SCIS 2021) , 2021年1月 .
芝 廉太朗, 阪本 光星, Fukang Liu, 峯松 一彦, 五十部 孝典, "Integral and Impossible Differential Attacks on the Reduced-Round Lesamnta-LW-BC", 2021年 暗号と情報セキュリティシンポジウム(SCIS 2021) , 2021年1月 .
小池 祐二, 五十部 孝典, "Yoroi: Updatable Whitebox Cryptgraphy", 2021年 暗号と情報セキュリティシンポジウム(SCIS 2021) , 2021年1月 .
寶木 仁, 阪本 光星, 五十部 孝典, "KCipher-2に対する差分攻撃の耐性評価", 2021年 暗号と情報セキュリティシンポジウム(SCIS 2021) , 2021年1月 .
阪本 光星, Fukang Liu, 仲野 有登, 清本 晋作, 五十部 孝典, "AES-NIを用いた効率的なスポンジ構造のラウンド関数の設計", 2021年 暗号と情報セキュリティシンポジウム(SCIS 2021) , 2021年1月 .
浅沼 岳樹, 五十部 孝典 , "SHA-3の原像復元問題をベースにしたASIC耐性のあるProof of Work", コンピュータセキュリティシンポジウム(CSS) 2020 (CSS2020 学生論文賞).
清水 隆太郎, 五十部 孝典, "暗号化と復号の計算量がアンバランスな共通鍵暗号の提案とその応用", コンピュータセキュリティシンポジウム(CSS) 2020.
芝 廉太朗, 阪本 光星, 五十部 孝典, "AES-NIを用いたラージブロック暗号の効率的な構成", コンピュータセキュリティシンポジウム(CSS) 2020. (CSS2020 学生論文賞)
寶木 仁, 阪本 光星, 峯松 一彦, 五十部 孝典, "KCipher-2に対する差分攻撃への耐性評価", ISEC研究会,2020年3月 .
清水 隆太郎, 仲野 有登, 披田野 清良, 清本 晋作, 五十部 孝典, "学習フェーズでの検証可能計算の実装評価と応用" , 2020年 暗号と情報セキュリティシンポジウム(SCIS 2020) ,2020年1月 .
寶木 仁, 阪本 光星, 峯松 一彦, 五十部 孝典, "KCipher-2とSNOW 3Gに対するIntegral攻撃への耐性評価", 2020年 暗号と情報セキュリティシンポジウム(SCIS 2020) ,2020年1月 .
小池 祐二, 林 卓也, 五十部 孝典, "スペースハード暗号を用いたデータ流出耐性のあるシステムの提案", 2020年 暗号と情報セキュリティシンポジウム(SCIS 2020) ,2020年1月 .
阪本 光星, 峯松 一彦, 五十部 孝典, "複数線形層を用いた低遅延ブロック暗号の構成方法" , 2020年 暗号と情報セキュリティシンポジウム(SCIS 2020) ,2020年1月 .. (SCIS論文賞)
Fukang Liu, 五十部 孝典, Willi Meier, Zhonghao Yang, "Algebraic Attacks on Reduced Keccak" , 2020年 暗号と情報セキュリティシンポジウム(SCIS 2020) ,2020年1月 .
小池 祐二, 阪本 光星, 林 卓也, 五十部 孝典, "Galaxy:ストリーム暗号ベースSpacehard暗号", コンピュータセキュリティシンポジウム (CSS 2019), 2019年10月.
阪本 光星, 峯松 一彦, 五十部 孝典, "Low-latency ブロック暗号に適した線形層の設計" , コンピュータセキュリティシンポジウム (CSS 2019), 2019年10月. (CSS学生論文賞)
Fukang Liu, 五十部 孝典, "Cryptanalysis of Subterranean-SAE ", コンピュータセキュリティシンポジウム (CSS 2019), 2019年10月.
阪本 光星, 峯松 一彦, 柴田 直, 茂 真紀, 久保 博靖, 船引 悠生, アンドレイボグダノフ, 五十部孝典, " TWINEを基にしたTweakableブロック暗号の検討", 2019年暗号と情報セキュリティシンポジウム(SCIS 2019), 2019年1月
正木 史明, 渡辺 優平, 五十部 孝典, "軽量ストリーム暗号に対する衝突攻撃の一般化とその対策", 2019年暗号と情報セキュリティシンポジウム(SCIS 2019), 2019年1月
船引 悠生, 藤堂 洋介, 五十部 孝典, 森井 昌克, "Enocoro-128v2 のCube 攻撃に対する安全性評価", 2019年暗号と情報セキュリティシンポジウム(SCIS 2019), 2019年1月
小家武, 五十部 孝典, 藤堂 洋介, 森井 昌克, " Type-1.x 一般化Feistel 構造におけるブロックシャッフルの評価", 2019年暗号と情報セキュリティシンポジウム(SCIS 2019), 2019年1月
仲野 有登, 五十部 孝典, 披田野 清良, 正木 史明, 清本 晋作, "学習フェーズへの検証可能計算の適用 " , 2019年暗号と情報セキュリティシンポジウム(SCIS 2019), 2019年1月
窪田 恵人, 小家 武, 藤堂 洋介, 五十部 孝典, 森井 昌克, " Wi-Fi 機器に対する中間者攻撃の実装と考察", 2019年暗号と情報セキュリティシンポジウム(SCIS 2019), 2019年1月
棚本 清也, 五十部 孝典, 大東 俊博, “ストリーム暗号のバイアス探索に関する統計的な評価手法,” 電子情報通信学会技術研究報告, 情報セキュリティ(ISEC)研究会, ISEC, 2018年11月. (2018年情報セキュリティ研究奨励賞 )
木村 隼人, 五十部 孝典, 大東 俊博, “ニューラルネットワークを用いた擬似乱数検証ツールに関する検討,” 電子情報通信学会技術研究報告, 情報セキュリティ(ISEC)研究会, ISEC2018, 2018年11月. (2018年情報セキュリティ研究奨励賞 )
五十部 孝典, 峯松 一彦, "LINEのEnd-to-End Encryptionに対するなりすましと偽造攻撃", 2018年暗号と情報セキュリティシンポジウム(SCIS 2018), 2018年1月. (SCIS イノベーション論文賞)
正木 史明, 渡辺 優平, 五十部 孝典, "軽量ストリーム暗号に対するタイムメモリデータトレードオフ攻撃の改良", 2018年暗号と情報セキュリティシンポジウム(SCIS 2018), 2018年1月.
小家 武, 五十部 孝典, 藤堂 洋介, 森井 昌克, "一般化Feistel構造における最適なブロックシャッフルの評価", 2018年暗号と情報セキュリティシンポジウム(SCIS 2018), 2018年1月.
船引 悠生, 藤堂 洋介, 五十部 孝典, 森井 昌克, "SNOW 2.0に対する新たな線形近似探索手法と高速相関攻撃への応用", 2018年暗号と情報セキュリティシンポジウム(SCIS 2018), 2018年1月.
北川 理太, 船引 悠生, 藤堂 洋介, 五十部 孝典, 森井 昌克, "整数計画法を用いたXOR-SNOW 2.0に対する差分特性探索", 2018年暗号と情報セキュリティシンポジウム(SCIS 2018), 2018年1月.
城所 賢史, 五十部 孝典, 大東 俊博, “ストリーム暗号Grain v1の出力の鍵依存度に関する考察,” 電子情報通信学会技術研究報告, 情報セキュリティ(ISEC)研究会, vol.116, no.505, pp.1-6, 2017年3月. (2017年情報セキュリティ研究奨励賞 )
小家 武, 藤堂 洋介, 五十部 孝典, 森井 昌克, "Camelliaに対する少ないデータ量での攻撃" , 2017年暗号と情報セキュリティシンポジウム(SCIS 2017), 電子情報通信学会情報セキュリティ研究専門委員会,, 2017年1月.
大東 俊博, 五十部 孝典, 渡辺 優平, 野島 良, 森井 昌克, “SSL/TLSのRC4へのActive Attack,” 電子情報通信学会技術研究報告, 情報通信システムセキュリティ(ICSS)研究会, vol.113, no.502, ICSS2013-63, pp.7-12, 2014年3月. (ICSS 論文賞)
Yuhei Watanabe, Takanori Isobe, Toshihiro Ohigashi, and Masakatu Morii, “Vulnerability of RC4 in SSL/TLS,” 電子情報通信学会技術研究報告, 情報通信システムセキュリティ(ICSS)研究会, vol.113, no.95, ICSS2013-4, pp.19-24, 2013年6月.
Toshihiro Ohigashi, Takanori Isobe, Yuhei Watanabe, and Masakatu Morii, “How to Recover Full Plaintext from Only Ciphertexts on Broadcast RC4,” 2013年暗号と情報セキュリティシンポジウム(SCIS2013), 電子情報通信学会情報セキュリティ研究専門委員会, 8 pages, CD-ROM, 2013年1月. (SCIS イノベーション論文賞)
Yuhei Watanabe, Takanori Isobe, Toshihiro Ohigashi, and Masakatu Morii, “New Biases of RC4 and its Application to Disitingushing, Key Recovery, Plaintext Recovery Attacks,” 2013年暗号と情報セキュリティシンポジウム(SCIS2013), 電子情報通信学会情報セキュリティ研究専門委員会, 8 pages, CD-ROM, 2013年1月.
Atsushi Nagao, Toshihiro Ohigashi, Takanori Isobe, and Masakatu Morii, “Expanding Weak-Key Space of RC4,” 2013年暗号と情報セキュリティシンポジウム(SCIS2013), 電子情報通信学会情報セキュリティ研究専門委員会, 8 pages, CD-ROM, 2013年1月.
Atsushi Nagao, Toshihiro Ohigashi, Takanori Isobe, and Masakatu Morii, “New Classes of Weak Keys on RC4 using Predictive State,” CSS2012 (Computer Security Symposium 2012), (社)情報処理学会コンピュータセキュリティ研究会, vol.2012, no.3, pp.169-176, 2012年10月. (CSS 学生論文賞)
Takanori Isobe, Toshihiro Ohigashi, Hidenori Kuwakado, and Masakatu Morii, “A Key Recovery Attack with Equivalent Keys of Stream Cipher,” 電子情報通信学会技術研究報告, 情報セキュリティ(ISEC)研究会, vol.107, no.346, pp.69-74, 2007年11月.
Takanori Isobe, Toshihiro Ohigashi, Hidenori Kuwakado, and Masakatu Morii, “A Chosen-IV Attack against Grain,” 情報通信システムセキュリティ(ICSS)研究会予稿集, pp.15-20, 2007年9月.
寺村亮一, 五十部 孝典, 大東 俊博, 桑門 秀典, 森井 昌克, “ストリーム暗号の等価鍵について,” 電子情報通信学会技術研究報告, 情報セキュリティ(ISEC)研究会, vol.107, no.44, pp.101-108, 2007年5月.
Takanori Isobe, Toshihiro Ohigashi, Hidenori Kuwakado, and Masakatu MORII, “A Practical Key Recovery Attack against Py and Pypy with Chosen IVs,” 2007年暗号と情報セキュリティシンポジウム(SCIS2007), 電子情報通信学会情報セキュリティ研究専門委員会, p.87, 2007年1月. (SCIS 論文賞)
五十部 孝典, 大東 俊博, 桑門 秀典, 森井 昌克, “現実的な計算量で解読可能なPyに対する鍵回復攻撃,” 電子情報通信学会技術研究報告, 情報セキュリティ(ISEC)研究会, vol.106, no.411, pp.81-87, 2006年12月.
五十部 孝典, 大東 俊博, 桑門 秀典, 森井 昌克, “Pyに対する鍵回復攻撃の実現について,” 電子情報通信学会技術研究報告, 情報セキュリティ(ISEC)研究会, vol.106, no.175, pp.141-148, 2006年7月.
五十部 孝典, 大東 俊博, 桑門秀典, 森井昌克, “ストリーム暗号Pyの鍵回復攻撃に関する一考察,” 情報通信システムセキュリティ(ICSS)研究会予稿集, pp.5-10, 2006年4月.
Patent
Takanori Isobe, Andrey Bogdanov, "Encryption device, encryption method, decryption device, and decryption method", No. 11436946, (米国出願番号:16/636,122), (出願日:2018年5月28日) 登録
Takanori Isobe, Harunaga Hiwatari, Andrey Bogdanov, "Encryption device, encryption method, decryption device, and decryption method", No. 11269993, (米国出願番号:16/636,169), (出願日:2018年5月28日) 登録
Takanori Isobe, Harunaga Hiwatari, Kyoji Shibutani, "Encryption device, encryption method, decryption device, and decryption method", No. 11153068, (米国出願番号:16/086,505), (出願日:2017年5月11日) 登録
Kyoji Shibutani and Takanori Isobe, "Encryption processing device and encryption processing method ", No. 10425226, (米国出願番号:15/127,109), (出願日:2015年2月24日) 登録
Kyoji Shibutani and Takanori Isobe, "Encryption processing device and encryption processing method ", No. 10341090, (米国出願番号:15/512,764), (出願日:2015年8月20日) 登録
Takanori Isobe, Andrey Bogdanov, "Encryption device, encryption method, decryption device, and decryption method", No. 10277391, (米国出願番号:15/255,693), (出願日:2016年9月2日) 登録
Kyoji Shibutani and Takanori Isobe, "Encryption processing device and encryption processing method ", No. 10205589, (米国出願番号:15/127,072), (出願日:2015年2月23日) 登録
Kyoji Shibutani, Toru Akishita, Takanori Isobe, Taizo Shirai, Harunaga Hiwatari and Atsushi Mitsuda "Encryption processing device, encryption processing method, and program ", No. 9418245, (米国出願番号:14/002,379), (出願日:2012年2月20日) 登録
Kyoji Shibutani, Toru Akishita, Takanori Isobe, Taizo Shirai, Harunaga Hiwatari and Atsushi Mitsuda "Encryption processing device, encryption processing method, and program ", No. 9270458, (米国出願番号:14/002,363), (出願日:2012年2月20日) 登録
Kyoji Shibutani, Toru Akishita, Takanori Isobe, Taizo Shirai, Harunaga Hiwatari and Atsushi Mitsuda "Encryption processing device, encryption processing method, and program ", No. 9083507, (米国出願番号:14/006,392), (出願日:2012年2月20日) 登録
Misc
Yuji Koike, Takuya Hayashi and Takanori Isobe, "A Practical Leakage-Resilient Scheme using Big-key Encryptions", IWSEC 2019 poster (Best Poster Award)
五十部 孝典, 大東 俊博, 森井昌克, “Security Evaluation of RC4 Stream cipher ”, Investigation Reports on Cryptographic Technique in FY 2012 (in Japanese)