default search action
BibTeX records: Kazuhiko Minematsu
@article{DBLP:journals/tches/UenoHIM24, author = {Rei Ueno and Naofumi Homma and Akiko Inoue and Kazuhiko Minematsu}, title = {Fallen Sanctuary: {A} Higher-Order and Leakage-Resilient Rekeying Scheme}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2024}, number = {1}, pages = {264--308}, year = {2024}, url = {https://doi.org/10.46586/tches.v2024.i1.264-308}, doi = {10.46586/TCHES.V2024.I1.264-308}, timestamp = {Sat, 08 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tches/UenoHIM24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tches/AnandBCIILMRS24, author = {Ravi Anand and Subhadeep Banik and Andrea Caforio and Tatsuya Ishikawa and Takanori Isobe and Fukang Liu and Kazuhiko Minematsu and Mostafizar Rahman and Kosei Sakamoto}, title = {Gleeok: {A} Family of Low-Latency PRFs and its Applications to Authenticated Encryption}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2024}, number = {2}, pages = {545--587}, year = {2024}, url = {https://doi.org/10.46586/tches.v2024.i2.545-587}, doi = {10.46586/TCHES.V2024.I2.545-587}, timestamp = {Sat, 08 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tches/AnandBCIILMRS24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/BouraM24, author = {Christina Boura and Kazuhiko Minematsu}, title = {Preface to Volume 2024, Issue 1}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2024}, number = {1}, pages = {1--4}, year = {2024}, url = {https://doi.org/10.46586/tosc.v2024.i1.1-4}, doi = {10.46586/TOSC.V2024.I1.1-4}, timestamp = {Tue, 26 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tosc/BouraM24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AvanziDM24, author = {Roberto Avanzi and Orr Dunkelman and Kazuhiko Minematsu}, title = {{MATTER:} {A} Wide-Block Tweakable Block Cipher}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1186}, year = {2024}, url = {https://eprint.iacr.org/2024/1186}, timestamp = {Fri, 02 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AvanziDM24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/InoueIM24, author = {Akiko Inoue and Tetsu Iwata and Kazuhiko Minematsu}, title = {Comprehensive Robustness Analysis of GCM, CCM, and {OCB3}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1339}, year = {2024}, url = {https://eprint.iacr.org/2024/1339}, timestamp = {Sun, 01 Sep 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/InoueIM24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/MinematsuSWY23, author = {Kazuhiko Minematsu and Junji Shikata and Yohei Watanabe and Naoto Yanai}, title = {Anonymous Broadcast Authentication With One-to-Many Transmission to Control IoT Devices}, journal = {{IEEE} Access}, volume = {11}, pages = {62955--62969}, year = {2023}, url = {https://doi.org/10.1109/ACCESS.2023.3288337}, doi = {10.1109/ACCESS.2023.3288337}, timestamp = {Fri, 07 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/MinematsuSWY23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/Kobayashi0MS23, author = {Hirokazu Kobayashi and Yohei Watanabe and Kazuhiko Minematsu and Junji Shikata}, title = {Tight lower bounds and optimal constructions of anonymous broadcast encryption and authentication}, journal = {Des. Codes Cryptogr.}, volume = {91}, number = {7}, pages = {2523--2562}, year = {2023}, url = {https://doi.org/10.1007/s10623-023-01211-x}, doi = {10.1007/S10623-023-01211-X}, timestamp = {Tue, 12 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/Kobayashi0MS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iet-ifs/ShibaAMI23, author = {Rentaro Shiba and Ravi Anand and Kazuhiko Minematsu and Takanori Isobe}, title = {Cubicle: {A} family of space-hard ciphers for IoT}, journal = {{IET} Inf. Secur.}, volume = {17}, number = {1}, pages = {131--146}, year = {2023}, url = {https://doi.org/10.1049/ise2.12086}, doi = {10.1049/ISE2.12086}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iet-ifs/ShibaAMI23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iet-ifs/InoueGM23, author = {Akiko Inoue and Chun Guo and Kazuhiko Minematsu}, title = {Nonce-misuse resilience of Romulus-N and {GIFT-COFB}}, journal = {{IET} Inf. Secur.}, volume = {17}, number = {3}, pages = {468--484}, year = {2023}, url = {https://doi.org/10.1049/ise2.12110}, doi = {10.1049/ISE2.12110}, timestamp = {Fri, 18 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iet-ifs/InoueGM23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jip/IsobeIM23, author = {Takanori Isobe and Ryoma Ito and Kazuhiko Minematsu}, title = {Cryptanalysis on End-to-End Encryption Schemes of Communication Tools and Its Research Trend}, journal = {J. Inf. Process.}, volume = {31}, pages = {523--536}, year = {2023}, url = {https://doi.org/10.2197/ipsjjip.31.523}, doi = {10.2197/IPSJJIP.31.523}, timestamp = {Sat, 28 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jip/IsobeIM23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tches/IsobeILMNSS23, author = {Takanori Isobe and Ryoma Ito and Fukang Liu and Kazuhiko Minematsu and Motoki Nakahashi and Kosei Sakamoto and Rentaro Shiba}, title = {Areion: Highly-Efficient Permutations and Its Applications to Hash Functions for Short Input}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2023}, number = {2}, pages = {115--154}, year = {2023}, url = {https://doi.org/10.46586/tches.v2023.i2.115-154}, doi = {10.46586/TCHES.V2023.I2.115-154}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tches/IsobeILMNSS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/ChenFIIIMMNST23, author = {Yu Long Chen and Antonio Fl{\'{o}}rez{-}Guti{\'{e}}rrez and Akiko Inoue and Ryoma Ito and Tetsu Iwata and Kazuhiko Minematsu and Nicky Mouha and Yusuke Naito and Ferdinand Sibleyras and Yosuke Todo}, title = {Key Committing Security of {AEZ} and More}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2023}, number = {4}, pages = {452--488}, year = {2023}, url = {https://doi.org/10.46586/tosc.v2023.i4.452-488}, doi = {10.46586/TOSC.V2023.I4.452-488}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tosc/ChenFIIIMMNST23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ctrsa/AdomnicaiMS23, author = {Alexandre Adomnicai and Kazuhiko Minematsu and Junji Shikata}, editor = {Mike Rosulek}, title = {Authenticated Encryption for Very Short Inputs}, booktitle = {Topics in Cryptology - {CT-RSA} 2023 - Cryptographers' Track at the {RSA} Conference 2023, San Francisco, CA, USA, April 24-27, 2023, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {13871}, pages = {553--572}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-30872-7\_21}, doi = {10.1007/978-3-031-30872-7\_21}, timestamp = {Sat, 29 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ctrsa/AdomnicaiMS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/BaoHILLM23, author = {Zhenzhen Bao and Seongha Hwang and Akiko Inoue and ByeongHak Lee and Jooyoung Lee and Kazuhiko Minematsu}, editor = {Carmit Hazay and Martijn Stam}, title = {{XOCB:} Beyond-Birthday-Bound Secure Authenticated Encryption Mode with Rate-One Computation}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2023 - 42nd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Lyon, France, April 23-27, 2023, Proceedings, Part {IV}}, series = {Lecture Notes in Computer Science}, volume = {14007}, pages = {532--561}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-30634-1\_18}, doi = {10.1007/978-3-031-30634-1\_18}, timestamp = {Sat, 29 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/BaoHILLM23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/FuruyaKIMI23, author = {Isamu Furuya and Hayato Kasahara and Akiko Inoue and Kazuhiko Minematsu and Tetsu Iwata}, editor = {Junji Shikata and Hiroki Kuzuno}, title = {PMACrx: {A} Vector-Input {MAC} for High-Dimensional Vectors with {BBB} Security}, booktitle = {Advances in Information and Computer Security - 18th International Workshop on Security, {IWSEC} 2023, Yokohama, Japan, August 29-31, 2023, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {14128}, pages = {77--97}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-41326-1\_5}, doi = {10.1007/978-3-031-41326-1\_5}, timestamp = {Thu, 31 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iwsec/FuruyaKIMI23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacrypt/HiroseM23, author = {Shoichi Hirose and Kazuhiko Minematsu}, editor = {Claude Carlet and Kalikinkar Mandal and Vincent Rijmen}, title = {Compactly Committing Authenticated Encryption Using Encryptment and Tweakable Block Cipher}, booktitle = {Selected Areas in Cryptography - {SAC} 2023 - 30th International Conference, Fredericton, Canada, August 14-18, 2023, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {14201}, pages = {233--252}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-53368-6\_12}, doi = {10.1007/978-3-031-53368-6\_12}, timestamp = {Sat, 16 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sacrypt/HiroseM23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BaoHILLM23, author = {Zhenzhen Bao and Seongha Hwang and Akiko Inoue and ByeongHak Lee and Jooyoung Lee and Kazuhiko Minematsu}, title = {{XOCB:} Beyond-Birthday-Bound Secure Authenticated Encryption Mode with Rate-One Computation (Full Version)}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {253}, year = {2023}, url = {https://eprint.iacr.org/2023/253}, timestamp = {Tue, 28 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/BaoHILLM23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AdomnicaiMS23, author = {Alexandre Adomnicai and Kazuhiko Minematsu and Junji Shikata}, title = {Authenticated Encryption for Very Short Inputs}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {361}, year = {2023}, url = {https://eprint.iacr.org/2023/361}, timestamp = {Fri, 31 Mar 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AdomnicaiMS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/IsobeILMNSS23, author = {Takanori Isobe and Ryoma Ito and Fukang Liu and Kazuhiko Minematsu and Motoki Nakahashi and Kosei Sakamoto and Rentaro Shiba}, title = {Areion: Highly-Efficient Permutations and Its Applications (Extended Version)}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {794}, year = {2023}, url = {https://eprint.iacr.org/2023/794}, timestamp = {Mon, 03 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/IsobeILMNSS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/UenoHIM23, author = {Rei Ueno and Naofumi Homma and Akiko Inoue and Kazuhiko Minematsu}, title = {Fallen Sanctuary: {A} Higher-Order and Leakage-Resilient Rekeying Scheme}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1213}, year = {2023}, url = {https://eprint.iacr.org/2023/1213}, timestamp = {Fri, 08 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/UenoHIM23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/UenoHHIM23, author = {Rei Ueno and Hiromichi Haneda and Naofumi Homma and Akiko Inoue and Kazuhiko Minematsu}, title = {Crystalor: Persistent Memory Encryption Mechanism with Optimized Metadata Structure and Fast Crash Recovery}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1630}, year = {2023}, url = {https://eprint.iacr.org/2023/1630}, timestamp = {Thu, 09 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/UenoHHIM23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/HiroseM23, author = {Shoichi Hirose and Kazuhiko Minematsu}, title = {A Formal Treatment of Envelope Encryption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1727}, year = {2023}, url = {https://eprint.iacr.org/2023/1727}, timestamp = {Fri, 08 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/HiroseM23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieiceta/SakamotoMSSKI22, author = {Kosei Sakamoto and Kazuhiko Minematsu and Nao Shibata and Maki Shigeri and Hiroyasu Kubo and Takanori Isobe}, title = {Design of a Linear Layer for a Block Cipher Based on Type-2 Generalized Feistel Network with 32 Branches}, journal = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.}, volume = {105-A}, number = {3}, pages = {278--288}, year = {2022}, url = {https://doi.org/10.1587/transfun.2021cip0009}, doi = {10.1587/TRANSFUN.2021CIP0009}, timestamp = {Sat, 21 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieiceta/SakamotoMSSKI22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iet-ifs/ShibaSLMI22, author = {Rentaro Shiba and Kosei Sakamoto and Fukang Liu and Kazuhiko Minematsu and Takanori Isobe}, title = {Integral and impossible-differential attacks on the reduced-round Lesamnta-LW-BC}, journal = {{IET} Inf. Secur.}, volume = {16}, number = {2}, pages = {75--85}, year = {2022}, url = {https://doi.org/10.1049/ise2.12044}, doi = {10.1049/ISE2.12044}, timestamp = {Fri, 01 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iet-ifs/ShibaSLMI22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iet-ifs/GuoIM22, author = {Chun Guo and Tetsu Iwata and Kazuhiko Minematsu}, title = {New indifferentiability security proof of {MDPH} hash function}, journal = {{IET} Inf. Secur.}, volume = {16}, number = {4}, pages = {262--281}, year = {2022}, url = {https://doi.org/10.1049/ise2.12058}, doi = {10.1049/ISE2.12058}, timestamp = {Tue, 27 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iet-ifs/GuoIM22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iet-ifs/HabuMI22, author = {Makoto Habu and Kazuhiko Minematsu and Tetsu Iwata}, title = {Matching attacks on Romulus-M}, journal = {{IET} Inf. Secur.}, volume = {16}, number = {6}, pages = {459--469}, year = {2022}, url = {https://doi.org/10.1049/ise2.12075}, doi = {10.1049/ISE2.12075}, timestamp = {Sun, 13 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iet-ifs/HabuMI22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/InoueMOUH22, author = {Akiko Inoue and Kazuhiko Minematsu and Maya Oda and Rei Ueno and Naofumi Homma}, title = {{ELM:} {A} Low-Latency and Scalable Memory Encryption Scheme}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {17}, pages = {2628--2643}, year = {2022}, url = {https://doi.org/10.1109/TIFS.2022.3188146}, doi = {10.1109/TIFS.2022.3188146}, timestamp = {Thu, 27 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/InoueMOUH22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/HosoyamadaIIIMS22, author = {Akinori Hosoyamada and Akiko Inoue and Ryoma Ito and Tetsu Iwata and Kazuhiko Minematsu and Ferdinand Sibleyras and Yosuke Todo}, title = {Cryptanalysis of Rocca and Feasibility of Its Security Claim}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2022}, number = {3}, pages = {123--151}, year = {2022}, url = {https://doi.org/10.46586/tosc.v2022.i3.123-151}, doi = {10.46586/TOSC.V2022.I3.123-151}, timestamp = {Fri, 05 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tosc/HosoyamadaIIIMS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/AdomnicaiMS22, author = {Alexandre Adomnicai and Kazuhiko Minematsu and Maki Shigeri}, editor = {Khoa Nguyen and Guomin Yang and Fuchun Guo and Willy Susilo}, title = {Fast Skinny-128 {SIMD} Implementations for Sequential Modes of Operation}, booktitle = {Information Security and Privacy - 27th Australasian Conference, {ACISP} 2022, Wollongong, NSW, Australia, November 28-30, 2022, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {13494}, pages = {125--144}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-22301-3\_7}, doi = {10.1007/978-3-031-22301-3\_7}, timestamp = {Sat, 17 Dec 2022 21:30:21 +0100}, biburl = {https://dblp.org/rec/conf/acisp/AdomnicaiMS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acns/InoueIM22, author = {Akiko Inoue and Tetsu Iwata and Kazuhiko Minematsu}, editor = {Giuseppe Ateniese and Daniele Venturi}, title = {Analyzing the Provable Security Bounds of {GIFT-COFB} and Photon-Beetle}, booktitle = {Applied Cryptography and Network Security - 20th International Conference, {ACNS} 2022, Rome, Italy, June 20-23, 2022, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {13269}, pages = {67--84}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-09234-3\_4}, doi = {10.1007/978-3-031-09234-3\_4}, timestamp = {Tue, 21 Jun 2022 15:24:40 +0200}, biburl = {https://dblp.org/rec/conf/acns/InoueIM22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/arith/AokiMOT22, author = {Daichi Aoki and Kazuhiko Minematsu and Toshihiko Okamura and Tsuyoshi Takagi}, title = {Efficient Word Size Modular Multiplication over Signed Integers}, booktitle = {29th {IEEE} Symposium on Computer Arithmetic, {ARITH} 2022, Lyon, France, September 12-14, 2022}, pages = {94--101}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/ARITH54963.2022.00026}, doi = {10.1109/ARITH54963.2022.00026}, timestamp = {Thu, 29 Dec 2022 15:06:50 +0100}, biburl = {https://dblp.org/rec/conf/arith/AokiMOT22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/citc/Minematsu22, author = {Kazuhiko Minematsu}, editor = {Dana Dachman{-}Soled}, title = {Property-Preserving Hash Functions and Combinatorial Group Testing}, booktitle = {3rd Conference on Information-Theoretic Cryptography, {ITC} 2022, July 5-7, 2022, Cambridge, MA, {USA}}, series = {LIPIcs}, volume = {230}, pages = {2:1--2:14}, publisher = {Schloss Dagstuhl - Leibniz-Zentrum f{\"{u}}r Informatik}, year = {2022}, url = {https://doi.org/10.4230/LIPIcs.ITC.2022.2}, doi = {10.4230/LIPICS.ITC.2022.2}, timestamp = {Wed, 21 Aug 2024 22:46:00 +0200}, biburl = {https://dblp.org/rec/conf/citc/Minematsu22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/InoueIM22, author = {Akiko Inoue and Tetsu Iwata and Kazuhiko Minematsu}, title = {Analyzing the Provable Security Bounds of {GIFT-COFB} and Photon-Beetle}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1}, year = {2022}, url = {https://eprint.iacr.org/2022/001}, timestamp = {Thu, 13 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/InoueIM22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/InoueM22, author = {Akiko Inoue and Kazuhiko Minematsu}, title = {Parallelizable Authenticated Encryption with Small State Size}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {331}, year = {2022}, url = {https://eprint.iacr.org/2022/331}, timestamp = {Thu, 21 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/InoueM22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/HabuMI22, author = {Makoto Habu and Kazuhiko Minematsu and Tetsu Iwata}, title = {Matching Attacks on Romulus-M}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {369}, year = {2022}, url = {https://eprint.iacr.org/2022/369}, timestamp = {Thu, 21 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/HabuMI22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Minematsu22, author = {Kazuhiko Minematsu}, title = {Property-Preserving Hash Functions and Combinatorial Group Testing}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {478}, year = {2022}, url = {https://eprint.iacr.org/2022/478}, timestamp = {Mon, 16 May 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Minematsu22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AdomnicaiMS22, author = {Alexandre Adomnicai and Kazuhiko Minematsu and Maki Shigeri}, title = {Fast Skinny-128 {SIMD} Implementations for Sequential Modes of Operation}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {578}, year = {2022}, url = {https://eprint.iacr.org/2022/578}, timestamp = {Mon, 20 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AdomnicaiMS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Inoue0M22, author = {Akiko Inoue and Chun Guo and Kazuhiko Minematsu}, title = {Nonce-Misuse Resilience of Romulus-N and {GIFT-COFB}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1012}, year = {2022}, url = {https://eprint.iacr.org/2022/1012}, timestamp = {Tue, 27 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Inoue0M22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/HiroseM22, author = {Shoichi Hirose and Kazuhiko Minematsu}, title = {Compactly Committing Authenticated Encryption Using Encryptment and Tweakable Block Cipher}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1670}, year = {2022}, url = {https://eprint.iacr.org/2022/1670}, timestamp = {Thu, 05 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/HiroseM22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieiceta/HokiSLMI21, author = {Jin Hoki and Kosei Sakamoto and Fukang Liu and Kazuhiko Minematsu and Takanori Isobe}, title = {MILP-Aided Security Evaluation of Differential Attacks on KCipher-2}, journal = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.}, volume = {104-A}, number = {1}, pages = {203--212}, year = {2021}, url = {https://doi.org/10.1587/transfun.2020CIP0018}, doi = {10.1587/TRANSFUN.2020CIP0018}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieiceta/HokiSLMI21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieiceta/HokiSMI21, author = {Jin Hoki and Kosei Sakamoto and Kazuhiko Minematsu and Takanori Isobe}, title = {Practical Integral Distinguishers on {SNOW} 3G and KCipher-2}, journal = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.}, volume = {104-A}, number = {11}, pages = {1603--1611}, year = {2021}, url = {https://doi.org/10.1587/transfun.2020eap1102}, doi = {10.1587/TRANSFUN.2020EAP1102}, timestamp = {Thu, 12 May 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieiceta/HokiSMI21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/BanikILMS21, author = {Subhadeep Banik and Takanori Isobe and Fukang Liu and Kazuhiko Minematsu and Kosei Sakamoto}, title = {Orthros: {A} Low-Latency {PRF}}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2021}, number = {1}, pages = {37--77}, year = {2021}, url = {https://doi.org/10.46586/tosc.v2021.i1.37-77}, doi = {10.46586/TOSC.V2021.I1.37-77}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tosc/BanikILMS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/IsobeIM21, author = {Takanori Isobe and Ryoma Ito and Kazuhiko Minematsu}, editor = {Elisa Bertino and Haya Schulmann and Michael Waidner}, title = {Security Analysis of SFrame}, booktitle = {Computer Security - {ESORICS} 2021 - 26th European Symposium on Research in Computer Security, Darmstadt, Germany, October 4-8, 2021, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {12973}, pages = {127--146}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-88428-4\_7}, doi = {10.1007/978-3-030-88428-4\_7}, timestamp = {Tue, 17 Oct 2023 10:41:56 +0200}, biburl = {https://dblp.org/rec/conf/esorics/IsobeIM21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacrypt/MinematsuIMSK21, author = {Kazuhiko Minematsu and Akiko Inoue and Katsuya Moriwaki and Maki Shigeri and Hiroyasu Kubo}, editor = {Riham AlTawy and Andreas H{\"{u}}lsing}, title = {Parallel Verification of Serial {MAC} and {AE} Modes}, booktitle = {Selected Areas in Cryptography - 28th International Conference, {SAC} 2021, Virtual Event, September 29 - October 1, 2021, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {13203}, pages = {200--219}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-99277-4\_10}, doi = {10.1007/978-3-030-99277-4\_10}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sacrypt/MinematsuIMSK21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Banik0LMS21, author = {Subhadeep Banik and Takanori Isobe and Fukang Liu and Kazuhiko Minematsu and Kosei Sakamoto}, title = {Orthros: {A} Low-Latency {PRF}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {390}, year = {2021}, url = {https://eprint.iacr.org/2021/390}, timestamp = {Wed, 07 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Banik0LMS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/IsobeIM21, author = {Takanori Isobe and Ryoma Ito and Kazuhiko Minematsu}, title = {Security Analysis of SFrame}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {424}, year = {2021}, url = {https://eprint.iacr.org/2021/424}, timestamp = {Mon, 26 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/IsobeIM21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/InoueM21, author = {Akiko Inoue and Kazuhiko Minematsu}, title = {{GIFT-COFB} is Tightly Birthday Secure with Encryption Queries}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {737}, year = {2021}, url = {https://eprint.iacr.org/2021/737}, timestamp = {Mon, 07 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/InoueM21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/MinematsuIMSK21, author = {Kazuhiko Minematsu and Akiko Inoue and Katsuya Moriwaki and Maki Shigeri and Hiroyasu Kubo}, title = {Parallel Verification of Serial {MAC} and {AE} Modes}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1283}, year = {2021}, url = {https://eprint.iacr.org/2021/1283}, timestamp = {Mon, 25 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/MinematsuIMSK21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/GuoIM21, author = {Chun Guo and Tetsu Iwata and Kazuhiko Minematsu}, title = {New Indifferentiability Security Proof of {MDPH} Hash Function}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1469}, year = {2021}, url = {https://eprint.iacr.org/2021/1469}, timestamp = {Tue, 27 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/GuoIM21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/SakamotoMSSKFI20, author = {Kosei Sakamoto and Kazuhiko Minematsu and Nao Shibata and Maki Shigeri and Hiroyasu Kubo and Yuki Funabiki and Takanori Isobe}, title = {Security of Related-Key Differential Attacks on TWINE, Revisited}, journal = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.}, volume = {103-A}, number = {1}, pages = {212--214}, year = {2020}, url = {http://search.ieice.org/bin/summary.php?id=e103-a\_1\_212}, doi = {10.1587/TRANSFUN.2019CIL0004}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieicet/SakamotoMSSKFI20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/IsobeM20, author = {Takanori Isobe and Kazuhiko Minematsu}, title = {Security Analysis and Countermeasures of an End-to-End Encryption Scheme of {LINE}}, journal = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.}, volume = {103-A}, number = {1}, pages = {313--324}, year = {2020}, url = {http://search.ieice.org/bin/summary.php?id=e103-a\_1\_313}, doi = {10.1587/TRANSFUN.2019EAP1041}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieicet/IsobeM20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieiceta/SakamotoMSSKFBM20, author = {Kosei Sakamoto and Kazuhiko Minematsu and Nao Shibata and Maki Shigeri and Hiroyasu Kubo and Yuki Funabiki and Andrey Bogdanov and Sumio Morioka and Takanori Isobe}, title = {Tweakable {TWINE:} Building a Tweakable Block Cipher on Generalized Feistel Structure}, journal = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.}, volume = {103-A}, number = {12}, pages = {1629--1639}, year = {2020}, url = {https://doi.org/10.1587/transfun.2019EAP1141}, doi = {10.1587/TRANSFUN.2019EAP1141}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieiceta/SakamotoMSSKFBM20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/joc/ChakrabortiIMN20, author = {Avik Chakraborti and Tetsu Iwata and Kazuhiko Minematsu and Mridul Nandi}, title = {Blockcipher-Based Authenticated Encryption: How Small Can We Go?}, journal = {J. Cryptol.}, volume = {33}, number = {3}, pages = {703--741}, year = {2020}, url = {https://doi.org/10.1007/s00145-019-09325-z}, doi = {10.1007/S00145-019-09325-Z}, timestamp = {Sat, 21 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/joc/ChakrabortiIMN20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/joc/InoueIMP20, author = {Akiko Inoue and Tetsu Iwata and Kazuhiko Minematsu and Bertram Poettering}, title = {Cryptanalysis of {OCB2:} Attacks on Authenticity and Confidentiality}, journal = {J. Cryptol.}, volume = {33}, number = {4}, pages = {1871--1913}, year = {2020}, url = {https://doi.org/10.1007/s00145-020-09359-8}, doi = {10.1007/S00145-020-09359-8}, timestamp = {Thu, 29 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/joc/InoueIMP20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/IwataKMP20, author = {Tetsu Iwata and Mustafa Khairallah and Kazuhiko Minematsu and Thomas Peyrin}, title = {Duel of the Titans: The Romulus and Remus Families of Lightweight {AEAD} Algorithms}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2020}, number = {1}, pages = {43--120}, year = {2020}, url = {https://doi.org/10.13154/tosc.v2020.i1.43-120}, doi = {10.13154/TOSC.V2020.I1.43-120}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tosc/IwataKMP20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/Minematsu20, author = {Kazuhiko Minematsu}, title = {Fast Decryption: a New Feature of Misuse-Resistant {AE}}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2020}, number = {3}, pages = {87--118}, year = {2020}, url = {https://doi.org/10.13154/tosc.v2020.i3.87-118}, doi = {10.13154/TOSC.V2020.I3.87-118}, timestamp = {Mon, 05 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tosc/Minematsu20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/ChoiILLLMN20, author = {Wonseok Choi and Akiko Inoue and ByeongHak Lee and Jooyoung Lee and Eik List and Kazuhiko Minematsu and Yusuke Naito}, title = {Highly Secure Nonce-based MACs from the Sum of Tweakable Block Ciphers}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2020}, number = {4}, pages = {39--70}, year = {2020}, url = {https://doi.org/10.46586/tosc.v2020.i4.39-70}, doi = {10.46586/TOSC.V2020.I4.39-70}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tosc/ChoiILLLMN20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acns/Fujita0M20, author = {Rintaro Fujita and Takanori Isobe and Kazuhiko Minematsu}, editor = {Mauro Conti and Jianying Zhou and Emiliano Casalicchio and Angelo Spognardi}, title = {{ACE} in Chains: How Risky Is {CBC} Encryption of Binary Executable Files?}, booktitle = {Applied Cryptography and Network Security - 18th International Conference, {ACNS} 2020, Rome, Italy, October 19-22, 2020, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {12146}, pages = {187--207}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-57808-4\_10}, doi = {10.1007/978-3-030-57808-4\_10}, timestamp = {Thu, 27 Aug 2020 11:49:09 +0200}, biburl = {https://dblp.org/rec/conf/acns/Fujita0M20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iscas/OdaUIMH20, author = {Maya Oda and Rei Ueno and Akiko Inoue and Kazuhiko Minematsu and Naofumi Homma}, title = {{PMAC++:} Incremental {MAC} Scheme Adaptable to Lightweight Block Ciphers}, booktitle = {{IEEE} International Symposium on Circuits and Systems, {ISCAS} 2020, Sevilla, Spain, October 10-21, 2020}, pages = {1--4}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/ISCAS45731.2020.9180779}, doi = {10.1109/ISCAS45731.2020.9180779}, timestamp = {Mon, 18 Jan 2021 08:38:59 +0100}, biburl = {https://dblp.org/rec/conf/iscas/OdaUIMH20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacrypt/BanikBIKLMSSS20, author = {Subhadeep Banik and Zhenzhen Bao and Takanori Isobe and Hiroyasu Kubo and Fukang Liu and Kazuhiko Minematsu and Kosei Sakamoto and Nao Shibata and Maki Shigeri}, editor = {Orr Dunkelman and Michael J. Jacobson Jr. and Colin O'Flynn}, title = {{WARP} : Revisiting {GFN} for Lightweight 128-Bit Block Cipher}, booktitle = {Selected Areas in Cryptography - {SAC} 2020 - 27th International Conference, Halifax, NS, Canada (Virtual Event), October 21-23, 2020, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {12804}, pages = {535--564}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-81652-0\_21}, doi = {10.1007/978-3-030-81652-0\_21}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sacrypt/BanikBIKLMSSS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BanikCIMNPSST20, author = {Subhadeep Banik and Avik Chakraborti and Tetsu Iwata and Kazuhiko Minematsu and Mridul Nandi and Thomas Peyrin and Yu Sasaki and Siang Meng Sim and Yosuke Todo}, title = {{GIFT-COFB}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {738}, year = {2020}, url = {https://eprint.iacr.org/2020/738}, timestamp = {Tue, 30 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BanikCIMNPSST20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/FujitaIM20, author = {Rintaro Fujita and Takanori Isobe and Kazuhiko Minematsu}, title = {{ACE} in Chains : How Risky is {CBC} Encryption of Binary Executable Files ?}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1159}, year = {2020}, url = {https://eprint.iacr.org/2020/1159}, timestamp = {Wed, 30 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/FujitaIM20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BanikBIKLMSSS20, author = {Subhadeep Banik and Zhenzhen Bao and Takanori Isobe and Hiroyasu Kubo and Fukang Liu and Kazuhiko Minematsu and Kosei Sakamoto and Nao Shibata and Maki Shigeri}, title = {{WARP} : Revisiting {GFN} for Lightweight 128-bit Block Cipher}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1320}, year = {2020}, url = {https://eprint.iacr.org/2020/1320}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BanikBIKLMSSS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/InoueMOUH20, author = {Akiko Inoue and Kazuhiko Minematsu and Maya Oda and Rei Ueno and Naofumi Homma}, title = {{ELM} : {A} Low-Latency and Scalable Memory Encryption Scheme}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1374}, year = {2020}, url = {https://eprint.iacr.org/2020/1374}, timestamp = {Wed, 02 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/InoueMOUH20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/BaoGIM19, author = {Zhenzhen Bao and Jian Guo and Tetsu Iwata and Kazuhiko Minematsu}, title = {{ZOCB} and {ZOTR:} Tweakable Blockcipher Modes for Authenticated Encryption with Full Absorption}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2019}, number = {2}, pages = {1--54}, year = {2019}, url = {https://doi.org/10.13154/tosc.v2019.i2.1-54}, doi = {10.13154/TOSC.V2019.I2.1-54}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tosc/BaoGIM19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/InoueIMP19, author = {Akiko Inoue and Tetsu Iwata and Kazuhiko Minematsu and Bertram Poettering}, editor = {Alexandra Boldyreva and Daniele Micciancio}, title = {Cryptanalysis of {OCB2:} Attacks on Authenticity and Confidentiality}, booktitle = {Advances in Cryptology - {CRYPTO} 2019 - 39th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 18-22, 2019, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {11692}, pages = {3--31}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-26948-7\_1}, doi = {10.1007/978-3-030-26948-7\_1}, timestamp = {Wed, 21 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/InoueIMP19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/MinematsuK19, author = {Kazuhiko Minematsu and Norifumi Kamiya}, editor = {Kazue Sako and Steve A. Schneider and Peter Y. A. Ryan}, title = {Symmetric-Key Corruption Detection: When XOR-MACs Meet Combinatorial Group Testing}, booktitle = {Computer Security - {ESORICS} 2019 - 24th European Symposium on Research in Computer Security, Luxembourg, September 23-27, 2019, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {11735}, pages = {595--615}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-29959-0\_29}, doi = {10.1007/978-3-030-29959-0\_29}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esorics/MinematsuK19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iscas/UenoHIM19, author = {Rei Ueno and Naofumi Homma and Tomonori Iida and Kazuhiko Minematsu}, title = {High Throughput/Gate FN-Based Hardware Architectures for {AES-OTR}}, booktitle = {{IEEE} International Symposium on Circuits and Systems, {ISCAS} 2019, Sapporo, Japan, May 26-29, 2019}, pages = {1--4}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/ISCAS.2019.8702231}, doi = {10.1109/ISCAS.2019.8702231}, timestamp = {Wed, 16 Oct 2019 14:14:49 +0200}, biburl = {https://dblp.org/rec/conf/iscas/UenoHIM19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/SakamotoMSSKFBM19, author = {Kosei Sakamoto and Kazuhiko Minematsu and Nao Shibata and Maki Shigeri and Hiroyasu Kubo and Yuki Funabiki and Andrey Bogdanov and Sumio Morioka and Takanori Isobe}, editor = {Nuttapong Attrapadung and Takeshi Yagi}, title = {Tweakable {TWINE:} Building a Tweakable Block Cipher on Generalized Feistel Structure}, booktitle = {Advances in Information and Computer Security - 14th International Workshop on Security, {IWSEC} 2019, Tokyo, Japan, August 28-30, 2019, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11689}, pages = {129--145}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-26834-3\_8}, doi = {10.1007/978-3-030-26834-3\_8}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iwsec/SakamotoMSSKFBM19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacrypt/0001M19, author = {Takanori Isobe and Kazuhiko Minematsu}, editor = {Kenneth G. Paterson and Douglas Stebila}, title = {Plaintext Recovery Attacks Against {XTS} Beyond Collisions}, booktitle = {Selected Areas in Cryptography - {SAC} 2019 - 26th International Conference, Waterloo, ON, Canada, August 12-16, 2019, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {11959}, pages = {103--123}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-38471-5\_5}, doi = {10.1007/978-3-030-38471-5\_5}, timestamp = {Tue, 07 May 2024 20:12:23 +0200}, biburl = {https://dblp.org/rec/conf/sacrypt/0001M19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacrypt/Minematsu19, author = {Kazuhiko Minematsu}, editor = {Kenneth G. Paterson and Douglas Stebila}, title = {A Lightweight Alternative to {PMAC}}, booktitle = {Selected Areas in Cryptography - {SAC} 2019 - 26th International Conference, Waterloo, ON, Canada, August 12-16, 2019, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {11959}, pages = {393--417}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-38471-5\_16}, doi = {10.1007/978-3-030-38471-5\_16}, timestamp = {Tue, 14 Jan 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sacrypt/Minematsu19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacrypt/InoueM19, author = {Akiko Inoue and Kazuhiko Minematsu}, editor = {Kenneth G. Paterson and Douglas Stebila}, title = {Parallelizable Authenticated Encryption with Small State Size}, booktitle = {Selected Areas in Cryptography - {SAC} 2019 - 26th International Conference, Waterloo, ON, Canada, August 12-16, 2019, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {11959}, pages = {618--644}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-38471-5\_25}, doi = {10.1007/978-3-030-38471-5\_25}, timestamp = {Tue, 14 Jan 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sacrypt/InoueM19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/InoueIMP19, author = {Akiko Inoue and Tetsu Iwata and Kazuhiko Minematsu and Bertram Poettering}, title = {Cryptanalysis of {OCB2:} Attacks on Authenticity and Confidentiality}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {311}, year = {2019}, url = {https://eprint.iacr.org/2019/311}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/InoueIMP19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Minematsu19, author = {Kazuhiko Minematsu}, title = {Efficient Message Authentication Codes with Combinatorial Group Testing}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {404}, year = {2019}, url = {https://eprint.iacr.org/2019/404}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Minematsu19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Bao0IM19, author = {Zhenzhen Bao and Jian Guo and Tetsu Iwata and Kazuhiko Minematsu}, title = {{ZOCB} and {ZOTR:} Tweakable Blockcipher Modes for Authenticated Encryption with Full Absorption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {600}, year = {2019}, url = {https://eprint.iacr.org/2019/600}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Bao0IM19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/IsobeM19, author = {Takanori Isobe and Kazuhiko Minematsu}, title = {Plaintext Recovery Attacks against {XTS} Beyond Collisions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {825}, year = {2019}, url = {https://eprint.iacr.org/2019/825}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/IsobeM19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/IwataKMP19, author = {Tetsu Iwata and Mustafa Khairallah and Kazuhiko Minematsu and Thomas Peyrin}, title = {Duel of the Titans: The Romulus and Remus Families of Lightweight {AEAD} Algorithms}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {992}, year = {2019}, url = {https://eprint.iacr.org/2019/992}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/IwataKMP19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/MinematsuK19, author = {Kazuhiko Minematsu and Norifumi Kamiya}, title = {Symmetric-key Corruption Detection : When XOR-MACs Meet Combinatorial Group Testing}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1127}, year = {2019}, url = {https://eprint.iacr.org/2019/1127}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/MinematsuK19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/LeeLMM18, author = {Jooyoung Lee and Atul Luykx and Bart Mennink and Kazuhiko Minematsu}, title = {Connecting tweakable and multi-key blockcipher security}, journal = {Des. Codes Cryptogr.}, volume = {86}, number = {3}, pages = {623--640}, year = {2018}, url = {https://doi.org/10.1007/s10623-017-0347-3}, doi = {10.1007/S10623-017-0347-3}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/LeeLMM18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijisec/ImamuraMI18, author = {Kazuya Imamura and Kazuhiko Minematsu and Tetsu Iwata}, title = {Integrity analysis of authenticated encryption based on stream ciphers}, journal = {Int. J. Inf. Sec.}, volume = {17}, number = {5}, pages = {493--511}, year = {2018}, url = {https://doi.org/10.1007/s10207-017-0378-9}, doi = {10.1007/S10207-017-0378-9}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijisec/ImamuraMI18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ctrsa/MinematsuST18, author = {Kazuhiko Minematsu and Kentarou Sasaki and Yuki Tanaka}, editor = {Nigel P. Smart}, title = {Count-then-Permute: {A} Precision-Free Alternative to Inversion Sampling}, booktitle = {Topics in Cryptology - {CT-RSA} 2018 - The Cryptographers' Track at the {RSA} Conference 2018, San Francisco, CA, USA, April 16-20, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10808}, pages = {264--278}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-76953-0\_14}, doi = {10.1007/978-3-319-76953-0\_14}, timestamp = {Tue, 14 May 2019 10:00:52 +0200}, biburl = {https://dblp.org/rec/conf/ctrsa/MinematsuST18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/IsobeM18, author = {Takanori Isobe and Kazuhiko Minematsu}, editor = {Javier L{\'{o}}pez and Jianying Zhou and Miguel Soriano}, title = {Breaking Message Integrity of an End-to-End Encryption Scheme of {LINE}}, booktitle = {Computer Security - 23rd European Symposium on Research in Computer Security, {ESORICS} 2018, Barcelona, Spain, September 3-7, 2018, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {11099}, pages = {249--268}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-98989-1\_13}, doi = {10.1007/978-3-319-98989-1\_13}, timestamp = {Fri, 03 Jan 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/esorics/IsobeM18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/IsobeM18, author = {Takanori Isobe and Kazuhiko Minematsu}, title = {Breaking Message Integrity of an End-to-End Encryption Scheme of {LINE}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {668}, year = {2018}, url = {https://eprint.iacr.org/2018/668}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/IsobeM18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/InoueM18, author = {Akiko Inoue and Kazuhiko Minematsu}, title = {Cryptanalysis of {OCB2}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1040}, year = {2018}, url = {https://eprint.iacr.org/2018/1040}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/InoueM18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/MinematsuI17, author = {Kazuhiko Minematsu and Tetsu Iwata}, title = {Cryptanalysis of PMACx, PMAC2x, and SIVx}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2017}, number = {2}, pages = {162--176}, year = {2017}, url = {https://doi.org/10.13154/tosc.v2017.i2.162-176}, doi = {10.13154/TOSC.V2017.I2.162-176}, timestamp = {Tue, 04 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tosc/MinematsuI17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/ChakrabortiIMN17, author = {Avik Chakraborti and Tetsu Iwata and Kazuhiko Minematsu and Mridul Nandi}, editor = {Wieland Fischer and Naofumi Homma}, title = {Blockcipher-Based Authenticated Encryption: How Small Can We Go?}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2017 - 19th International Conference, Taipei, Taiwan, September 25-28, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10529}, pages = {277--298}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-66787-4\_14}, doi = {10.1007/978-3-319-66787-4\_14}, timestamp = {Fri, 27 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ches/ChakrabortiIMN17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/IwataMPS17, author = {Tetsu Iwata and Kazuhiko Minematsu and Thomas Peyrin and Yannick Seurin}, editor = {Jonathan Katz and Hovav Shacham}, title = {{ZMAC:} {A} Fast Tweakable Block Cipher Mode for Highly Secure Message Authentication}, booktitle = {Advances in Cryptology - {CRYPTO} 2017 - 37th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 20-24, 2017, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {10403}, pages = {34--65}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-63697-9\_2}, doi = {10.1007/978-3-319-63697-9\_2}, timestamp = {Fri, 27 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/crypto/IwataMPS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/latincrypt/JhaLMMN17, author = {Ashwin Jha and Eik List and Kazuhiko Minematsu and Sweta Mishra and Mridul Nandi}, editor = {Tanja Lange and Orr Dunkelman}, title = {{XHX} - {A} Framework for Optimally Secure Tweakable Block Ciphers from Classical Block Ciphers and Universal Hashing}, booktitle = {Progress in Cryptology - {LATINCRYPT} 2017 - 5th International Conference on Cryptology and Information Security in Latin America, Havana, Cuba, September 20-22, 2017, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {11368}, pages = {207--227}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-030-25283-0\_12}, doi = {10.1007/978-3-030-25283-0\_12}, timestamp = {Fri, 23 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/latincrypt/JhaLMMN17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/MinematsuI17, author = {Kazuhiko Minematsu and Tetsu Iwata}, title = {Cryptanalysis of PMACx, PMAC2x, and SIVx}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {220}, year = {2017}, url = {http://eprint.iacr.org/2017/220}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/MinematsuI17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/IwataMPS17, author = {Tetsu Iwata and Kazuhiko Minematsu and Thomas Peyrin and Yannick Seurin}, title = {{ZMAC:} {A} Fast Tweakable Block Cipher Mode for Highly Secure Message Authentication}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {535}, year = {2017}, url = {http://eprint.iacr.org/2017/535}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/IwataMPS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ChakrabortiIMN17, author = {Avik Chakraborti and Tetsu Iwata and Kazuhiko Minematsu and Mridul Nandi}, title = {Blockcipher-based Authenticated Encryption: How Small Can We Go?}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {649}, year = {2017}, url = {http://eprint.iacr.org/2017/649}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ChakrabortiIMN17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/JhaLMMN17, author = {Ashwin Jha and Eik List and Kazuhiko Minematsu and Sweta Mishra and Mridul Nandi}, title = {{XHX} - {A} Framework for Optimally Secure Tweakable Block Ciphers from Classical Block Ciphers and Universal Hashing}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1075}, year = {2017}, url = {http://eprint.iacr.org/2017/1075}, timestamp = {Fri, 23 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/JhaLMMN17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/IwataM16, author = {Tetsu Iwata and Kazuhiko Minematsu}, title = {Stronger Security Variants of {GCM-SIV}}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2016}, number = {1}, pages = {134--157}, year = {2016}, url = {https://doi.org/10.13154/tosc.v2016.i1.134-157}, doi = {10.13154/TOSC.V2016.I1.134-157}, timestamp = {Tue, 04 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tosc/IwataM16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/Minematsu16, author = {Kazuhiko Minematsu}, editor = {Joseph K. Liu and Ron Steinfeld}, title = {Authenticated Encryption with Small Stretch (or, How to Accelerate {AERO)}}, booktitle = {Information Security and Privacy - 21st Australasian Conference, {ACISP} 2016, Melbourne, VIC, Australia, July 4-6, 2016, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {9723}, pages = {347--362}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-40367-0\_22}, doi = {10.1007/978-3-319-40367-0\_22}, timestamp = {Tue, 14 May 2019 10:00:46 +0200}, biburl = {https://dblp.org/rec/conf/acisp/Minematsu16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/host/BanikBM16, author = {Subhadeep Banik and Andrey Bogdanov and Kazuhiko Minematsu}, editor = {William H. Robinson and Swarup Bhunia and Ryan Kastner}, title = {Low-area hardware implementations of CLOC, {SILC} and {AES-OTR}}, booktitle = {2016 {IEEE} International Symposium on Hardware Oriented Security and Trust, {HOST} 2016, McLean, VA, USA, May 3-5, 2016}, pages = {71--74}, publisher = {{IEEE} Computer Society}, year = {2016}, url = {https://doi.org/10.1109/HST.2016.7495559}, doi = {10.1109/HST.2016.7495559}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/host/BanikBM16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/provsec/ImamuraMI16, author = {Kazuya Imamura and Kazuhiko Minematsu and Tetsu Iwata}, editor = {Liqun Chen and Jinguang Han}, title = {Integrity Analysis of Authenticated Encryption Based on Stream Ciphers}, booktitle = {Provable Security - 10th International Conference, ProvSec 2016, Nanjing, China, November 10-11, 2016, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10005}, pages = {257--276}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-47422-9\_15}, doi = {10.1007/978-3-319-47422-9\_15}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/provsec/ImamuraMI16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/IwataM16, author = {Tetsu Iwata and Kazuhiko Minematsu}, title = {Stronger Security Variants of {GCM-SIV}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {853}, year = {2016}, url = {http://eprint.iacr.org/2016/853}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/IwataM16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ImamuraMI16, author = {Kazuya Imamura and Kazuhiko Minematsu and Tetsu Iwata}, title = {Integrity Analysis of Authenticated Encryption Based on Stream Ciphers}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1124}, year = {2016}, url = {http://eprint.iacr.org/2016/1124}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ImamuraMI16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/Minematsu15, author = {Kazuhiko Minematsu}, title = {Building blockcipher from small-block tweakable blockcipher}, journal = {Des. Codes Cryptogr.}, volume = {74}, number = {3}, pages = {645--663}, year = {2015}, url = {https://doi.org/10.1007/s10623-013-9882-8}, doi = {10.1007/S10623-013-9882-8}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/Minematsu15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/KobayashiMI15, author = {Hayato Kobayashi and Kazuhiko Minematsu and Tetsu Iwata}, title = {Optimality of Tweak Functions in {CLOC}}, journal = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.}, volume = {98-A}, number = {10}, pages = {2152--2164}, year = {2015}, url = {https://doi.org/10.1587/transfun.E98.A.2152}, doi = {10.1587/TRANSFUN.E98.A.2152}, timestamp = {Sat, 11 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieicet/KobayashiMI15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/Minematsu15, author = {Kazuhiko Minematsu}, editor = {G{\"{u}}nther Pernul and Peter Y. A. Ryan and Edgar R. Weippl}, title = {Efficient Message Authentication Codes with Combinatorial Group Testing}, booktitle = {Computer Security - {ESORICS} 2015 - 20th European Symposium on Research in Computer Security, Vienna, Austria, September 21-25, 2015, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {9326}, pages = {185--202}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-24174-6\_10}, doi = {10.1007/978-3-319-24174-6\_10}, timestamp = {Tue, 04 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/esorics/Minematsu15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/NiwaOMI15, author = {Yuichi Niwa and Keisuke Ohashi and Kazuhiko Minematsu and Tetsu Iwata}, editor = {Gregor Leander}, title = {{GCM} Security Bounds Reconsidered}, booktitle = {Fast Software Encryption - 22nd International Workshop, {FSE} 2015, Istanbul, Turkey, March 8-11, 2015, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9054}, pages = {385--407}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-662-48116-5\_19}, doi = {10.1007/978-3-662-48116-5\_19}, timestamp = {Sat, 19 Oct 2019 20:27:47 +0200}, biburl = {https://dblp.org/rec/conf/fse/NiwaOMI15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ima/MinematsuI15, author = {Kazuhiko Minematsu and Tetsu Iwata}, editor = {Jens Groth}, title = {Tweak-Length Extension for Tweakable Blockciphers}, booktitle = {Cryptography and Coding - 15th {IMA} International Conference, {IMACC} 2015, Oxford, UK, December 15-17, 2015. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9496}, pages = {77--93}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-27239-9\_5}, doi = {10.1007/978-3-319-27239-9\_5}, timestamp = {Wed, 18 Mar 2020 16:00:58 +0100}, biburl = {https://dblp.org/rec/conf/ima/MinematsuI15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/NiwaOMI15, author = {Yuichi Niwa and Keisuke Ohashi and Kazuhiko Minematsu and Tetsu Iwata}, title = {{GCM} Security Bounds Reconsidered}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {214}, year = {2015}, url = {http://eprint.iacr.org/2015/214}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/NiwaOMI15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Minematsu15, author = {Kazuhiko Minematsu}, title = {Authenticated Encryption without Tag Expansion (or, How to Accelerate {AERO)}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {738}, year = {2015}, url = {http://eprint.iacr.org/2015/738}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Minematsu15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/MinematsuI15, author = {Kazuhiko Minematsu and Tetsu Iwata}, title = {Tweak-Length Extension for Tweakable Blockciphers}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {888}, year = {2015}, url = {http://eprint.iacr.org/2015/888}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/MinematsuI15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/date/YamashitaMOT14, author = {Noritaka Yamashita and Kazuhiko Minematsu and Toshihiko Okamura and Yukiyasu Tsunoo}, editor = {Gerhard P. Fettweis and Wolfgang Nebel}, title = {A smaller and faster variant of {RSM}}, booktitle = {Design, Automation {\&} Test in Europe Conference {\&} Exhibition, {DATE} 2014, Dresden, Germany, March 24-28, 2014}, pages = {1--6}, publisher = {European Design and Automation Association}, year = {2014}, url = {https://doi.org/10.7873/DATE.2014.218}, doi = {10.7873/DATE.2014.218}, timestamp = {Wed, 16 Oct 2019 14:14:53 +0200}, biburl = {https://dblp.org/rec/conf/date/YamashitaMOT14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/Minematsu14, author = {Kazuhiko Minematsu}, editor = {Phong Q. Nguyen and Elisabeth Oswald}, title = {Parallelizable Rate-1 Authenticated Encryption from Pseudorandom Functions}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2014 - 33rd Annual International Conference on the Theory and Applications of Cryptographic Techniques, Copenhagen, Denmark, May 11-15, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8441}, pages = {275--292}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-642-55220-5\_16}, doi = {10.1007/978-3-642-55220-5\_16}, timestamp = {Thu, 14 Oct 2021 09:58:16 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/Minematsu14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/IwataM0M14, author = {Tetsu Iwata and Kazuhiko Minematsu and Jian Guo and Sumio Morioka}, editor = {Carlos Cid and Christian Rechberger}, title = {{CLOC:} Authenticated Encryption for Short Input}, booktitle = {Fast Software Encryption - 21st International Workshop, {FSE} 2014, London, UK, March 3-5, 2014. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8540}, pages = {149--167}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-662-46706-0\_8}, doi = {10.1007/978-3-662-46706-0\_8}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/IwataM0M14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/IwataMGM14, author = {Tetsu Iwata and Kazuhiko Minematsu and Jian Guo and Sumio Morioka}, title = {{CLOC:} Authenticated Encryption for Short Input}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {157}, year = {2014}, url = {http://eprint.iacr.org/2014/157}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/IwataMGM14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/MinematsuLMI13, author = {Kazuhiko Minematsu and Stefan Lucks and Hiraku Morita and Tetsu Iwata}, editor = {Shiho Moriai}, title = {Attacks and Security Proofs of EAX-Prime}, booktitle = {Fast Software Encryption - 20th International Workshop, {FSE} 2013, Singapore, March 11-13, 2013. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8424}, pages = {327--347}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-662-43933-3\_17}, doi = {10.1007/978-3-662-43933-3\_17}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/MinematsuLMI13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/provsec/MinematsuLI13, author = {Kazuhiko Minematsu and Stefan Lucks and Tetsu Iwata}, editor = {Willy Susilo and Reza Reyhanitabar}, title = {Improved Authenticity Bound of EAX, and Refinements}, booktitle = {Provable Security - 7th International Conference, ProvSec 2013, Melaka, Malaysia, October 23-25, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8209}, pages = {184--201}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-41227-1\_11}, doi = {10.1007/978-3-642-41227-1\_11}, timestamp = {Tue, 14 May 2019 10:00:45 +0200}, biburl = {https://dblp.org/rec/conf/provsec/MinematsuLI13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/provsec/Minematsu13, author = {Kazuhiko Minematsu}, editor = {Willy Susilo and Reza Reyhanitabar}, title = {A Short Universal Hash Function from Bit Rotation, and Applications to Blockcipher Modes}, booktitle = {Provable Security - 7th International Conference, ProvSec 2013, Melaka, Malaysia, October 23-25, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8209}, pages = {221--238}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-41227-1\_13}, doi = {10.1007/978-3-642-41227-1\_13}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/provsec/Minematsu13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Minematsu13, author = {Kazuhiko Minematsu}, title = {Parallelizable Authenticated Encryption from Functions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {628}, year = {2013}, url = {http://eprint.iacr.org/2013/628}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Minematsu13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/MinematsuLI13, author = {Kazuhiko Minematsu and Stefan Lucks and Tetsu Iwata}, title = {Improved Authenticity Bound of EAX, and Refinements}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {792}, year = {2013}, url = {http://eprint.iacr.org/2013/792}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/MinematsuLI13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/IwataOM12, author = {Tetsu Iwata and Keisuke Ohashi and Kazuhiko Minematsu}, editor = {Reihaneh Safavi{-}Naini and Ran Canetti}, title = {Breaking and Repairing {GCM} Security Proofs}, booktitle = {Advances in Cryptology - {CRYPTO} 2012 - 32nd Annual Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7417}, pages = {31--49}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-32009-5\_3}, doi = {10.1007/978-3-642-32009-5\_3}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/crypto/IwataOM12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacrypt/SuzakiMMK12, author = {Tomoyasu Suzaki and Kazuhiko Minematsu and Sumio Morioka and Eita Kobayashi}, editor = {Lars R. Knudsen and Huapeng Wu}, title = {{\textdollar}{\textbackslash}textnormal\{{\textbackslash}textsc\{TWINE\}\}{\textdollar} : {A} Lightweight Block Cipher for Multiple Platforms}, booktitle = {Selected Areas in Cryptography, 19th International Conference, {SAC} 2012, Windsor, ON, Canada, August 15-16, 2012, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7707}, pages = {339--354}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-35999-6\_22}, doi = {10.1007/978-3-642-35999-6\_22}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sacrypt/SuzakiMMK12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/MinematsuMI12, author = {Kazuhiko Minematsu and Hiraku Morita and Tetsu Iwata}, title = {Cryptanalysis of EAXprime}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {18}, year = {2012}, url = {http://eprint.iacr.org/2012/018}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/MinematsuMI12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/IwataOM12, author = {Tetsu Iwata and Keisuke Ohashi and Kazuhiko Minematsu}, title = {Breaking and Repairing {GCM} Security Proofs}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {438}, year = {2012}, url = {http://eprint.iacr.org/2012/438}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/IwataOM12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/MinematsuSS11, author = {Kazuhiko Minematsu and Tomoyasu Suzaki and Maki Shigeri}, editor = {Udaya Parampalli and Philip Hawkes}, title = {On Maximum Differential Probability of Generalized Feistel}, booktitle = {Information Security and Privacy - 16th Australasian Conference, {ACISP} 2011, Melbourne, Australia, July 11-13, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6812}, pages = {89--105}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-22497-3\_7}, doi = {10.1007/978-3-642-22497-3\_7}, timestamp = {Tue, 14 May 2019 10:00:46 +0200}, biburl = {https://dblp.org/rec/conf/acisp/MinematsuSS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ima/MinematsuI11, author = {Kazuhiko Minematsu and Tetsu Iwata}, editor = {Liqun Chen}, title = {Building Blockcipher from Tweakable Blockcipher: Extending {FSE} 2009 Proposal}, booktitle = {Cryptography and Coding - 13th {IMA} International Conference, {IMACC} 2011, Oxford, UK, December 12-15, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7089}, pages = {391--412}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-25516-8\_24}, doi = {10.1007/978-3-642-25516-8\_24}, timestamp = {Wed, 18 Mar 2020 16:00:56 +0100}, biburl = {https://dblp.org/rec/conf/ima/MinematsuI11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/SuzakiM10, author = {Tomoyasu Suzaki and Kazuhiko Minematsu}, editor = {Seokhie Hong and Tetsu Iwata}, title = {Improving the Generalized Feistel}, booktitle = {Fast Software Encryption, 17th International Workshop, {FSE} 2010, Seoul, Korea, February 7-10, 2010, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {6147}, pages = {19--39}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-13858-4\_2}, doi = {10.1007/978-3-642-13858-4\_2}, timestamp = {Tue, 14 May 2019 10:00:54 +0200}, biburl = {https://dblp.org/rec/conf/fse/SuzakiM10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/Minematsu10, author = {Kazuhiko Minematsu}, editor = {Seokhie Hong and Tetsu Iwata}, title = {How to Thwart Birthday Attacks against MACs via Small Randomness}, booktitle = {Fast Software Encryption, 17th International Workshop, {FSE} 2010, Seoul, Korea, February 7-10, 2010, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {6147}, pages = {230--249}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-13858-4\_13}, doi = {10.1007/978-3-642-13858-4\_13}, timestamp = {Tue, 26 Jun 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/Minematsu10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/MinematsuM09, author = {Kazuhiko Minematsu and Toshiyasu Matsushima}, title = {Generalization and Extension of XEX\({}^{\mbox{*}}\) Mode}, journal = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.}, volume = {92-A}, number = {2}, pages = {517--524}, year = {2009}, url = {https://doi.org/10.1587/transfun.E92.A.517}, doi = {10.1587/TRANSFUN.E92.A.517}, timestamp = {Sat, 11 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieicet/MinematsuM09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/Minematsu09, author = {Kazuhiko Minematsu}, editor = {Orr Dunkelman}, title = {Beyond-Birthday-Bound Security Based on Tweakable Block Cipher}, booktitle = {Fast Software Encryption, 16th International Workshop, {FSE} 2009, Leuven, Belgium, February 22-25, 2009, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {5665}, pages = {308--326}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-03317-9\_19}, doi = {10.1007/978-3-642-03317-9\_19}, timestamp = {Tue, 14 May 2019 10:00:54 +0200}, biburl = {https://dblp.org/rec/conf/fse/Minematsu09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/MinematsuM07, author = {Kazuhiko Minematsu and Toshiyasu Matsushima}, title = {Improved MACs from Differentially-Uniform Permutations}, journal = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.}, volume = {90-A}, number = {12}, pages = {2908--2915}, year = {2007}, url = {https://doi.org/10.1093/ietfec/e90-a.12.2908}, doi = {10.1093/IETFEC/E90-A.12.2908}, timestamp = {Sat, 11 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieicet/MinematsuM07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/MinematsuM07, author = {Kazuhiko Minematsu and Toshiyasu Matsushima}, editor = {Alex Biryukov}, title = {New Bounds for PMAC, TMAC, and {XCBC}}, booktitle = {Fast Software Encryption, 14th International Workshop, {FSE} 2007, Luxembourg, Luxembourg, March 26-28, 2007, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {4593}, pages = {434--451}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-74619-5\_27}, doi = {10.1007/978-3-540-74619-5\_27}, timestamp = {Sun, 25 Oct 2020 23:06:50 +0100}, biburl = {https://dblp.org/rec/conf/fse/MinematsuM07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/indocrypt/MinematsuM07, author = {Kazuhiko Minematsu and Toshiyasu Matsushima}, editor = {K. Srinathan and C. Pandu Rangan and Moti Yung}, title = {Tweakable Enciphering Schemes from Hash-Sum-Expansion}, booktitle = {Progress in Cryptology - {INDOCRYPT} 2007, 8th International Conference on Cryptology in India, Chennai, India, December 9-13, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4859}, pages = {252--267}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-77026-8\_19}, doi = {10.1007/978-3-540-77026-8\_19}, timestamp = {Tue, 14 May 2019 10:00:51 +0200}, biburl = {https://dblp.org/rec/conf/indocrypt/MinematsuM07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijisec/TsunooTSKM06, author = {Yukiyasu Tsunoo and Etsuko Tsujihara and Maki Shigeri and Hiroyasu Kubo and Kazuhiko Minematsu}, title = {Improving cache attacks by considering cipher structure}, journal = {Int. J. Inf. Sec.}, volume = {5}, number = {3}, pages = {166--176}, year = {2006}, url = {https://doi.org/10.1007/s10207-005-0079-7}, doi = {10.1007/S10207-005-0079-7}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijisec/TsunooTSKM06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/MinematsuT06, author = {Kazuhiko Minematsu and Yukiyasu Tsunoo}, editor = {Matthew J. B. Robshaw}, title = {Provably Secure MACs from Differentially-Uniform Permutations and AES-Based Implementations}, booktitle = {Fast Software Encryption, 13th International Workshop, {FSE} 2006, Graz, Austria, March 15-17, 2006, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {4047}, pages = {226--241}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11799313\_15}, doi = {10.1007/11799313\_15}, timestamp = {Tue, 14 May 2019 10:00:54 +0200}, biburl = {https://dblp.org/rec/conf/fse/MinematsuT06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacrypt/Minematsu06, author = {Kazuhiko Minematsu}, editor = {Eli Biham and Amr M. Youssef}, title = {Improved Security Analysis of {XEX} and {LRW} Modes}, booktitle = {Selected Areas in Cryptography, 13th International Workshop, {SAC} 2006, Montreal, Canada, August 17-18, 2006 Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {4356}, pages = {96--113}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/978-3-540-74462-7\_8}, doi = {10.1007/978-3-540-74462-7\_8}, timestamp = {Tue, 14 May 2019 10:00:38 +0200}, biburl = {https://dblp.org/rec/conf/sacrypt/Minematsu06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tit/TsunooSSKM05, author = {Yukiyasu Tsunoo and Teruo Saito and Maki Shigeri and Hiroyasu Kubo and Kazuhiko Minematsu}, title = {Shorter bit sequence is enough to break stream cipher {LILI-128}}, journal = {{IEEE} Trans. Inf. Theory}, volume = {51}, number = {12}, pages = {4312--4319}, year = {2005}, url = {https://doi.org/10.1109/TIT.2005.859285}, doi = {10.1109/TIT.2005.859285}, timestamp = {Tue, 10 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tit/TsunooSSKM05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icisc/MinematsuT05, author = {Kazuhiko Minematsu and Yukiyasu Tsunoo}, editor = {Dongho Won and Seungjoo Kim}, title = {Hybrid Symmetric Encryption Using Known-Plaintext Attack-Secure Components}, booktitle = {Information Security and Cryptology - {ICISC} 2005, 8th International Conference, Seoul, Korea, December 1-2, 2005, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {3935}, pages = {242--260}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11734727\_21}, doi = {10.1007/11734727\_21}, timestamp = {Tue, 14 May 2019 10:00:36 +0200}, biburl = {https://dblp.org/rec/conf/icisc/MinematsuT05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icisc/MinematsuT05a, author = {Kazuhiko Minematsu and Yukiyasu Tsunoo}, editor = {Dongho Won and Seungjoo Kim}, title = {Expanding Weak {PRF} with Small Key Size}, booktitle = {Information Security and Cryptology - {ICISC} 2005, 8th International Conference, Seoul, Korea, December 1-2, 2005, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {3935}, pages = {284--298}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11734727\_24}, doi = {10.1007/11734727\_24}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icisc/MinematsuT05a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.