default search action
Kosei Sakamoto
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j23]Shion Utsumi, Kosei Sakamoto, Takanori Isobe:
SAT-Based Analysis of Related-Key Impossible Distinguishers on Piccolo and (Tweakable) TWINE. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 107(8): 1186-1195 (2024) - [j22]Nobuyuki Takeuchi, Kosei Sakamoto, Takuro Shiraya, Takanori Isobe:
Improving the Security Bounds against Differential Attacks for Pholkos Family. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 107(8): 1196-1204 (2024) - [j21]Shion Utsumi, Motoki Nakahashi, Kosei Sakamoto, Takanori Isobe:
Exploring the optimality of byte-wise permutations of a piccolo-type block cipher. Inf. Process. Lett. 184: 106436 (2024) - [j20]Ravi Anand, Subhadeep Banik, Andrea Caforio, Tatsuya Ishikawa, Takanori Isobe, Fukang Liu, Kazuhiko Minematsu, Mostafizar Rahman, Kosei Sakamoto:
Gleeok: A Family of Low-Latency PRFs and its Applications to Authenticated Encryption. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2024(2): 545-587 (2024) - [c11]Rikuto Kurahara, Kosei Sakamoto, Yuto Nakano, Takanori Isobe:
Differential Distinguishing Attacks on SNOW-V, SNOW-Vi and KCipher-2. ACISP (1) 2024: 77-97 - [c10]Kodai Taiyama, Kosei Sakamoto, Rentaro Shiba, Takanori Isobe:
Collision Attacks on Hashing Modes of Areion. CANS (2) 2024: 265-285 - [c9]Takuro Shiraya, Kosei Sakamoto, Takanori Isobe:
Bit-Wise Analysis for Forgery Attacks on AES-Based AEAD Schemes. IWSEC 2024: 3-22 - [i12]Kodai Taiyama, Kosei Sakamoto, Ryoma Ito, Kazuma Taka, Takanori Isobe:
Key Collisions on AES and Its Applications. IACR Cryptol. ePrint Arch. 2024: 1508 (2024) - 2023
- [j19]Nobuyuki Takeuchi, Kosei Sakamoto, Takanori Isobe:
On Optimality of the Round Function of Rocca. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 106(1): 45-53 (2023) - [j18]Nobuyuki Takeuchi, Kosei Sakamoto, Takanori Isobe:
Security Evaluation of Initialization Phases and Round Functions of Rocca and AEGIS. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 106(3): 253-262 (2023) - [j17]Takuro Shiraya, Nobuyuki Takeuchi, Kosei Sakamoto, Takanori Isobe:
MILP-based security evaluation for AEGIS/Tiaoxin-346/Rocca. IET Inf. Secur. 17(3): 458-467 (2023) - [j16]Shion Utsumi, Kosei Sakamoto, Takanori Isobe:
Bit-level evaluation of piccolo block cipher by satisfiability problem solver. IET Inf. Secur. 17(4): 616-625 (2023) - [j15]Takanori Isobe, Ryoma Ito, Fukang Liu, Kazuhiko Minematsu, Motoki Nakahashi, Kosei Sakamoto, Rentaro Shiba:
Areion: Highly-Efficient Permutations and Its Applications to Hash Functions for Short Input. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2023(2): 115-154 (2023) - [c8]Motoki Nakahashi, Rentaro Shiba, Ravi Anand, Mostafizar Rahman, Kosei Sakamoto, Fukang Liu, Takanori Isobe:
Ghidle: Efficient Large-State Block Ciphers for Post-quantum Security. ACISP 2023: 403-430 - [c7]Kazuma Taka, Tatsuya Ishikawa, Kosei Sakamoto, Takanori Isobe:
An Efficient Strategy to Construct a Better Differential on Multiple-Branch-Based Designs: Application to Orthros. CT-RSA 2023: 277-304 - [c6]Ravi Anand, Subhadeep Banik, Andrea Caforio, Kazuhide Fukushima, Takanori Isobe, Shinsaku Kiyomoto, Fukang Liu, Yuto Nakano, Kosei Sakamoto, Nobuyuki Takeuchi:
An Ultra-High Throughput AES-Based Authenticated Encryption Scheme for 6G: Design and Implementation. ESORICS (1) 2023: 229-248 - [c5]Kosei Sakamoto, Ryoma Ito, Takanori Isobe:
Parallel SAT Framework to Find Clustering of Differential Characteristics and Its Applications. SAC 2023: 409-428 - [i11]Kazuma Taka, Tatsuya Ishikawa, Kosei Sakamoto, Takanori Isobe:
An Efficient Strategy to Construct a Better Differential on Multiple-Branch-Based Designs: Application to Orthros. IACR Cryptol. ePrint Arch. 2023: 674 (2023) - [i10]Anubhab Baksi, Jakub Breier, Anupam Chattopadhyay, Tomas Gerlich, Sylvain Guilley, Naina Gupta, Kai Hu, Takanori Isobe, Arpan Jati, Petr Jedlicka, Hyunjun Kim, Fukang Liu, Zdenek Martinasek, Kosei Sakamoto, Hwajeong Seo, Rentaro Shiba, Ritu Ranjan Shrivastwa:
BAKSHEESH: Similar Yet Different From GIFT. IACR Cryptol. ePrint Arch. 2023: 750 (2023) - [i9]Takanori Isobe, Ryoma Ito, Fukang Liu, Kazuhiko Minematsu, Motoki Nakahashi, Kosei Sakamoto, Rentaro Shiba:
Areion: Highly-Efficient Permutations and Its Applications (Extended Version). IACR Cryptol. ePrint Arch. 2023: 794 (2023) - [i8]Kosei Sakamoto, Ryoma Ito, Takanori Isobe:
Parallel SAT Framework to Find Clustering of Differential Characteristics and Its Applications. IACR Cryptol. ePrint Arch. 2023: 1227 (2023) - 2022
- [j14]Kazuto Shimizu, Kosei Sakamoto, Takanori Isobe:
Applying Byte-Shuffling to CLEFIA-Type Structure. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 105-A(3): 268-277 (2022) - [j13]Kosei Sakamoto, Kazuhiko Minematsu, Nao Shibata, Maki Shigeri, Hiroyasu Kubo, Takanori Isobe:
Design of a Linear Layer for a Block Cipher Based on Type-2 Generalized Feistel Network with 32 Branches. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 105-A(3): 278-288 (2022) - [j12]Rentaro Shiba, Kosei Sakamoto, Fukang Liu, Kazuhiko Minematsu, Takanori Isobe:
Integral and impossible-differential attacks on the reduced-round Lesamnta-LW-BC. IET Inf. Secur. 16(2): 75-85 (2022) - [j11]Rentaro Shiba, Kosei Sakamoto, Takanori Isobe:
Efficient constructions for large-state block ciphers based on AES New Instructions. IET Inf. Secur. 16(3): 145-160 (2022) - [j10]Jin Hoki, Takanori Isobe, Ryoma Ito, Fukang Liu, Kosei Sakamoto:
Distinguishing and key recovery attacks on the reduced-round SNOW-V and SNOW-Vi. J. Inf. Secur. Appl. 65: 103100 (2022) - [i7]Kosei Sakamoto, Fukang Liu, Yuto Nakano, Shinsaku Kiyomoto, Takanori Isobe:
Rocca: An Efficient AES-based Encryption Scheme for Beyond 5G (Full version). IACR Cryptol. ePrint Arch. 2022: 116 (2022) - 2021
- [j9]Jin Hoki, Kosei Sakamoto, Fukang Liu, Kazuhiko Minematsu, Takanori Isobe:
MILP-Aided Security Evaluation of Differential Attacks on KCipher-2. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 104-A(1): 203-212 (2021) - [j8]Jin Hoki, Kosei Sakamoto, Kazuhiko Minematsu, Takanori Isobe:
Practical Integral Distinguishers on SNOW 3G and KCipher-2. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 104-A(11): 1603-1611 (2021) - [j7]Ryoma Ito, Rentaro Shiba, Kosei Sakamoto, Fukang Liu, Takanori Isobe:
Bit-wise cryptanalysis on AND-RX permutation Friet-PC. J. Inf. Secur. Appl. 59: 102860 (2021) - [j6]Subhadeep Banik, Andrea Caforio, Takanori Isobe, Fukang Liu, Willi Meier, Kosei Sakamoto, Santanu Sarkar:
Atom: A Stream Cipher with Double Key Filter. IACR Trans. Symmetric Cryptol. 2021(1): 5-36 (2021) - [j5]Subhadeep Banik, Takanori Isobe, Fukang Liu, Kazuhiko Minematsu, Kosei Sakamoto:
Orthros: A Low-Latency PRF. IACR Trans. Symmetric Cryptol. 2021(1): 37-77 (2021) - [j4]Kosei Sakamoto, Fukang Liu, Yuto Nakano, Shinsaku Kiyomoto, Takanori Isobe:
Rocca: An Efficient AES-based Encryption Scheme for Beyond 5G. IACR Trans. Symmetric Cryptol. 2021(2): 1-30 (2021) - [j3]Fukang Liu, Takanori Isobe, Willi Meier, Kosei Sakamoto:
Weak Keys in Reduced AEGIS and Tiaoxin. IACR Trans. Symmetric Cryptol. 2021(2): 104-139 (2021) - [c4]Jin Hoki, Takanori Isobe, Ryoma Ito, Fukang Liu, Kosei Sakamoto:
Distinguishing and Key Recovery Attacks on the Reduced-Round SNOW-V. ACISP 2021: 171-190 - [i6]Fukang Liu, Takanori Isobe, Willi Meier, Kosei Sakamoto:
Weak Keys in Reduced AEGIS and Tiaoxin. IACR Cryptol. ePrint Arch. 2021: 187 (2021) - [i5]Ryoma Ito, Rentaro Shiba, Kosei Sakamoto, Fukang Liu, Takanori Isobe:
Bit-wise Cryptanalysis on AND-RX Permutation Friet-PC. IACR Cryptol. ePrint Arch. 2021: 212 (2021) - [i4]Subhadeep Banik, Takanori Isobe, Fukang Liu, Kazuhiko Minematsu, Kosei Sakamoto:
Orthros: A Low-Latency PRF. IACR Cryptol. ePrint Arch. 2021: 390 (2021) - [i3]Subhadeep Banik, Andrea Caforio, Takanori Isobe, Fukang Liu, Willi Meier, Kosei Sakamoto, Santanu Sarkar:
Atom: A Stream Cipher with Double Key Filter. IACR Cryptol. ePrint Arch. 2021: 403 (2021) - [i2]Jin Hoki, Takanori Isobe, Ryoma Ito, Fukang Liu, Kosei Sakamoto:
Distinguishing and Key Recovery Attacks on the Reduced-Round SNOW-V. IACR Cryptol. ePrint Arch. 2021: 546 (2021) - 2020
- [j2]Kosei Sakamoto, Kazuhiko Minematsu, Nao Shibata, Maki Shigeri, Hiroyasu Kubo, Yuki Funabiki, Takanori Isobe:
Security of Related-Key Differential Attacks on TWINE, Revisited. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 103-A(1): 212-214 (2020) - [j1]Kosei Sakamoto, Kazuhiko Minematsu, Nao Shibata, Maki Shigeri, Hiroyasu Kubo, Yuki Funabiki, Andrey Bogdanov, Sumio Morioka, Takanori Isobe:
Tweakable TWINE: Building a Tweakable Block Cipher on Generalized Feistel Structure. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 103-A(12): 1629-1639 (2020) - [c3]Yuji Koike, Kosei Sakamoto, Takuya Hayashi, Takanori Isobe:
Galaxy: A Family of Stream-Cipher-Based Space-Hard Ciphers. ACISP 2020: 142-159 - [c2]Subhadeep Banik, Zhenzhen Bao, Takanori Isobe, Hiroyasu Kubo, Fukang Liu, Kazuhiko Minematsu, Kosei Sakamoto, Nao Shibata, Maki Shigeri:
WARP : Revisiting GFN for Lightweight 128-Bit Block Cipher. SAC 2020: 535-564 - [i1]Subhadeep Banik, Zhenzhen Bao, Takanori Isobe, Hiroyasu Kubo, Fukang Liu, Kazuhiko Minematsu, Kosei Sakamoto, Nao Shibata, Maki Shigeri:
WARP : Revisiting GFN for Lightweight 128-bit Block Cipher. IACR Cryptol. ePrint Arch. 2020: 1320 (2020)
2010 – 2019
- 2019
- [c1]Kosei Sakamoto, Kazuhiko Minematsu, Nao Shibata, Maki Shigeri, Hiroyasu Kubo, Yuki Funabiki, Andrey Bogdanov, Sumio Morioka, Takanori Isobe:
Tweakable TWINE: Building a Tweakable Block Cipher on Generalized Feistel Structure. IWSEC 2019: 129-145
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-10 21:18 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint