BibTeX records: Kazuhiko Minematsu

download as .bib file

@article{DBLP:journals/tches/UenoHIM24,
  author       = {Rei Ueno and
                  Naofumi Homma and
                  Akiko Inoue and
                  Kazuhiko Minematsu},
  title        = {Fallen Sanctuary: {A} Higher-Order and Leakage-Resilient Rekeying
                  Scheme},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2024},
  number       = {1},
  pages        = {264--308},
  year         = {2024},
  url          = {https://doi.org/10.46586/tches.v2024.i1.264-308},
  doi          = {10.46586/TCHES.V2024.I1.264-308},
  timestamp    = {Sat, 08 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tches/UenoHIM24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/AnandBCIILMRS24,
  author       = {Ravi Anand and
                  Subhadeep Banik and
                  Andrea Caforio and
                  Tatsuya Ishikawa and
                  Takanori Isobe and
                  Fukang Liu and
                  Kazuhiko Minematsu and
                  Mostafizar Rahman and
                  Kosei Sakamoto},
  title        = {Gleeok: {A} Family of Low-Latency PRFs and its Applications to Authenticated
                  Encryption},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2024},
  number       = {2},
  pages        = {545--587},
  year         = {2024},
  url          = {https://doi.org/10.46586/tches.v2024.i2.545-587},
  doi          = {10.46586/TCHES.V2024.I2.545-587},
  timestamp    = {Sat, 08 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tches/AnandBCIILMRS24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/BouraM24,
  author       = {Christina Boura and
                  Kazuhiko Minematsu},
  title        = {Preface to Volume 2024, Issue 1},
  journal      = {{IACR} Trans. Symmetric Cryptol.},
  volume       = {2024},
  number       = {1},
  pages        = {1--4},
  year         = {2024},
  url          = {https://doi.org/10.46586/tosc.v2024.i1.1-4},
  doi          = {10.46586/TOSC.V2024.I1.1-4},
  timestamp    = {Tue, 26 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tosc/BouraM24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AvanziDM24,
  author       = {Roberto Avanzi and
                  Orr Dunkelman and
                  Kazuhiko Minematsu},
  title        = {{MATTER:} {A} Wide-Block Tweakable Block Cipher},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1186},
  year         = {2024},
  url          = {https://eprint.iacr.org/2024/1186},
  timestamp    = {Fri, 02 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AvanziDM24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/InoueIM24,
  author       = {Akiko Inoue and
                  Tetsu Iwata and
                  Kazuhiko Minematsu},
  title        = {Comprehensive Robustness Analysis of GCM, CCM, and {OCB3}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1339},
  year         = {2024},
  url          = {https://eprint.iacr.org/2024/1339},
  timestamp    = {Sun, 01 Sep 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/InoueIM24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/MinematsuSWY23,
  author       = {Kazuhiko Minematsu and
                  Junji Shikata and
                  Yohei Watanabe and
                  Naoto Yanai},
  title        = {Anonymous Broadcast Authentication With One-to-Many Transmission to
                  Control IoT Devices},
  journal      = {{IEEE} Access},
  volume       = {11},
  pages        = {62955--62969},
  year         = {2023},
  url          = {https://doi.org/10.1109/ACCESS.2023.3288337},
  doi          = {10.1109/ACCESS.2023.3288337},
  timestamp    = {Fri, 07 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/MinematsuSWY23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/Kobayashi0MS23,
  author       = {Hirokazu Kobayashi and
                  Yohei Watanabe and
                  Kazuhiko Minematsu and
                  Junji Shikata},
  title        = {Tight lower bounds and optimal constructions of anonymous broadcast
                  encryption and authentication},
  journal      = {Des. Codes Cryptogr.},
  volume       = {91},
  number       = {7},
  pages        = {2523--2562},
  year         = {2023},
  url          = {https://doi.org/10.1007/s10623-023-01211-x},
  doi          = {10.1007/S10623-023-01211-X},
  timestamp    = {Tue, 12 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/Kobayashi0MS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iet-ifs/ShibaAMI23,
  author       = {Rentaro Shiba and
                  Ravi Anand and
                  Kazuhiko Minematsu and
                  Takanori Isobe},
  title        = {Cubicle: {A} family of space-hard ciphers for IoT},
  journal      = {{IET} Inf. Secur.},
  volume       = {17},
  number       = {1},
  pages        = {131--146},
  year         = {2023},
  url          = {https://doi.org/10.1049/ise2.12086},
  doi          = {10.1049/ISE2.12086},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iet-ifs/ShibaAMI23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iet-ifs/InoueGM23,
  author       = {Akiko Inoue and
                  Chun Guo and
                  Kazuhiko Minematsu},
  title        = {Nonce-misuse resilience of Romulus-N and {GIFT-COFB}},
  journal      = {{IET} Inf. Secur.},
  volume       = {17},
  number       = {3},
  pages        = {468--484},
  year         = {2023},
  url          = {https://doi.org/10.1049/ise2.12110},
  doi          = {10.1049/ISE2.12110},
  timestamp    = {Fri, 18 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iet-ifs/InoueGM23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jip/IsobeIM23,
  author       = {Takanori Isobe and
                  Ryoma Ito and
                  Kazuhiko Minematsu},
  title        = {Cryptanalysis on End-to-End Encryption Schemes of Communication Tools
                  and Its Research Trend},
  journal      = {J. Inf. Process.},
  volume       = {31},
  pages        = {523--536},
  year         = {2023},
  url          = {https://doi.org/10.2197/ipsjjip.31.523},
  doi          = {10.2197/IPSJJIP.31.523},
  timestamp    = {Sat, 28 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jip/IsobeIM23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/IsobeILMNSS23,
  author       = {Takanori Isobe and
                  Ryoma Ito and
                  Fukang Liu and
                  Kazuhiko Minematsu and
                  Motoki Nakahashi and
                  Kosei Sakamoto and
                  Rentaro Shiba},
  title        = {Areion: Highly-Efficient Permutations and Its Applications to Hash
                  Functions for Short Input},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2023},
  number       = {2},
  pages        = {115--154},
  year         = {2023},
  url          = {https://doi.org/10.46586/tches.v2023.i2.115-154},
  doi          = {10.46586/TCHES.V2023.I2.115-154},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tches/IsobeILMNSS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/ChenFIIIMMNST23,
  author       = {Yu Long Chen and
                  Antonio Fl{\'{o}}rez{-}Guti{\'{e}}rrez and
                  Akiko Inoue and
                  Ryoma Ito and
                  Tetsu Iwata and
                  Kazuhiko Minematsu and
                  Nicky Mouha and
                  Yusuke Naito and
                  Ferdinand Sibleyras and
                  Yosuke Todo},
  title        = {Key Committing Security of {AEZ} and More},
  journal      = {{IACR} Trans. Symmetric Cryptol.},
  volume       = {2023},
  number       = {4},
  pages        = {452--488},
  year         = {2023},
  url          = {https://doi.org/10.46586/tosc.v2023.i4.452-488},
  doi          = {10.46586/TOSC.V2023.I4.452-488},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tosc/ChenFIIIMMNST23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ctrsa/AdomnicaiMS23,
  author       = {Alexandre Adomnicai and
                  Kazuhiko Minematsu and
                  Junji Shikata},
  editor       = {Mike Rosulek},
  title        = {Authenticated Encryption for Very Short Inputs},
  booktitle    = {Topics in Cryptology - {CT-RSA} 2023 - Cryptographers' Track at the
                  {RSA} Conference 2023, San Francisco, CA, USA, April 24-27, 2023,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {13871},
  pages        = {553--572},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-30872-7\_21},
  doi          = {10.1007/978-3-031-30872-7\_21},
  timestamp    = {Sat, 29 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ctrsa/AdomnicaiMS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/BaoHILLM23,
  author       = {Zhenzhen Bao and
                  Seongha Hwang and
                  Akiko Inoue and
                  ByeongHak Lee and
                  Jooyoung Lee and
                  Kazuhiko Minematsu},
  editor       = {Carmit Hazay and
                  Martijn Stam},
  title        = {{XOCB:} Beyond-Birthday-Bound Secure Authenticated Encryption Mode
                  with Rate-One Computation},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2023 - 42nd Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Lyon, France, April 23-27, 2023, Proceedings, Part {IV}},
  series       = {Lecture Notes in Computer Science},
  volume       = {14007},
  pages        = {532--561},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-30634-1\_18},
  doi          = {10.1007/978-3-031-30634-1\_18},
  timestamp    = {Sat, 29 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/BaoHILLM23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/FuruyaKIMI23,
  author       = {Isamu Furuya and
                  Hayato Kasahara and
                  Akiko Inoue and
                  Kazuhiko Minematsu and
                  Tetsu Iwata},
  editor       = {Junji Shikata and
                  Hiroki Kuzuno},
  title        = {PMACrx: {A} Vector-Input {MAC} for High-Dimensional Vectors with {BBB}
                  Security},
  booktitle    = {Advances in Information and Computer Security - 18th International
                  Workshop on Security, {IWSEC} 2023, Yokohama, Japan, August 29-31,
                  2023, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {14128},
  pages        = {77--97},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-41326-1\_5},
  doi          = {10.1007/978-3-031-41326-1\_5},
  timestamp    = {Thu, 31 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwsec/FuruyaKIMI23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sacrypt/HiroseM23,
  author       = {Shoichi Hirose and
                  Kazuhiko Minematsu},
  editor       = {Claude Carlet and
                  Kalikinkar Mandal and
                  Vincent Rijmen},
  title        = {Compactly Committing Authenticated Encryption Using Encryptment and
                  Tweakable Block Cipher},
  booktitle    = {Selected Areas in Cryptography - {SAC} 2023 - 30th International Conference,
                  Fredericton, Canada, August 14-18, 2023, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {14201},
  pages        = {233--252},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-53368-6\_12},
  doi          = {10.1007/978-3-031-53368-6\_12},
  timestamp    = {Sat, 16 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sacrypt/HiroseM23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BaoHILLM23,
  author       = {Zhenzhen Bao and
                  Seongha Hwang and
                  Akiko Inoue and
                  ByeongHak Lee and
                  Jooyoung Lee and
                  Kazuhiko Minematsu},
  title        = {{XOCB:} Beyond-Birthday-Bound Secure Authenticated Encryption Mode
                  with Rate-One Computation (Full Version)},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {253},
  year         = {2023},
  url          = {https://eprint.iacr.org/2023/253},
  timestamp    = {Tue, 28 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/BaoHILLM23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AdomnicaiMS23,
  author       = {Alexandre Adomnicai and
                  Kazuhiko Minematsu and
                  Junji Shikata},
  title        = {Authenticated Encryption for Very Short Inputs},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {361},
  year         = {2023},
  url          = {https://eprint.iacr.org/2023/361},
  timestamp    = {Fri, 31 Mar 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AdomnicaiMS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/IsobeILMNSS23,
  author       = {Takanori Isobe and
                  Ryoma Ito and
                  Fukang Liu and
                  Kazuhiko Minematsu and
                  Motoki Nakahashi and
                  Kosei Sakamoto and
                  Rentaro Shiba},
  title        = {Areion: Highly-Efficient Permutations and Its Applications (Extended
                  Version)},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {794},
  year         = {2023},
  url          = {https://eprint.iacr.org/2023/794},
  timestamp    = {Mon, 03 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/IsobeILMNSS23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/UenoHIM23,
  author       = {Rei Ueno and
                  Naofumi Homma and
                  Akiko Inoue and
                  Kazuhiko Minematsu},
  title        = {Fallen Sanctuary: {A} Higher-Order and Leakage-Resilient Rekeying
                  Scheme},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1213},
  year         = {2023},
  url          = {https://eprint.iacr.org/2023/1213},
  timestamp    = {Fri, 08 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/UenoHIM23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/UenoHHIM23,
  author       = {Rei Ueno and
                  Hiromichi Haneda and
                  Naofumi Homma and
                  Akiko Inoue and
                  Kazuhiko Minematsu},
  title        = {Crystalor: Persistent Memory Encryption Mechanism with Optimized Metadata
                  Structure and Fast Crash Recovery},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1630},
  year         = {2023},
  url          = {https://eprint.iacr.org/2023/1630},
  timestamp    = {Thu, 09 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/UenoHHIM23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HiroseM23,
  author       = {Shoichi Hirose and
                  Kazuhiko Minematsu},
  title        = {A Formal Treatment of Envelope Encryption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1727},
  year         = {2023},
  url          = {https://eprint.iacr.org/2023/1727},
  timestamp    = {Fri, 08 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/HiroseM23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieiceta/SakamotoMSSKI22,
  author       = {Kosei Sakamoto and
                  Kazuhiko Minematsu and
                  Nao Shibata and
                  Maki Shigeri and
                  Hiroyasu Kubo and
                  Takanori Isobe},
  title        = {Design of a Linear Layer for a Block Cipher Based on Type-2 Generalized
                  Feistel Network with 32 Branches},
  journal      = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.},
  volume       = {105-A},
  number       = {3},
  pages        = {278--288},
  year         = {2022},
  url          = {https://doi.org/10.1587/transfun.2021cip0009},
  doi          = {10.1587/TRANSFUN.2021CIP0009},
  timestamp    = {Sat, 21 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieiceta/SakamotoMSSKI22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iet-ifs/ShibaSLMI22,
  author       = {Rentaro Shiba and
                  Kosei Sakamoto and
                  Fukang Liu and
                  Kazuhiko Minematsu and
                  Takanori Isobe},
  title        = {Integral and impossible-differential attacks on the reduced-round
                  Lesamnta-LW-BC},
  journal      = {{IET} Inf. Secur.},
  volume       = {16},
  number       = {2},
  pages        = {75--85},
  year         = {2022},
  url          = {https://doi.org/10.1049/ise2.12044},
  doi          = {10.1049/ISE2.12044},
  timestamp    = {Fri, 01 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iet-ifs/ShibaSLMI22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iet-ifs/GuoIM22,
  author       = {Chun Guo and
                  Tetsu Iwata and
                  Kazuhiko Minematsu},
  title        = {New indifferentiability security proof of {MDPH} hash function},
  journal      = {{IET} Inf. Secur.},
  volume       = {16},
  number       = {4},
  pages        = {262--281},
  year         = {2022},
  url          = {https://doi.org/10.1049/ise2.12058},
  doi          = {10.1049/ISE2.12058},
  timestamp    = {Tue, 27 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iet-ifs/GuoIM22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iet-ifs/HabuMI22,
  author       = {Makoto Habu and
                  Kazuhiko Minematsu and
                  Tetsu Iwata},
  title        = {Matching attacks on Romulus-M},
  journal      = {{IET} Inf. Secur.},
  volume       = {16},
  number       = {6},
  pages        = {459--469},
  year         = {2022},
  url          = {https://doi.org/10.1049/ise2.12075},
  doi          = {10.1049/ISE2.12075},
  timestamp    = {Sun, 13 Nov 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iet-ifs/HabuMI22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/InoueMOUH22,
  author       = {Akiko Inoue and
                  Kazuhiko Minematsu and
                  Maya Oda and
                  Rei Ueno and
                  Naofumi Homma},
  title        = {{ELM:} {A} Low-Latency and Scalable Memory Encryption Scheme},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {17},
  pages        = {2628--2643},
  year         = {2022},
  url          = {https://doi.org/10.1109/TIFS.2022.3188146},
  doi          = {10.1109/TIFS.2022.3188146},
  timestamp    = {Thu, 27 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/InoueMOUH22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/HosoyamadaIIIMS22,
  author       = {Akinori Hosoyamada and
                  Akiko Inoue and
                  Ryoma Ito and
                  Tetsu Iwata and
                  Kazuhiko Minematsu and
                  Ferdinand Sibleyras and
                  Yosuke Todo},
  title        = {Cryptanalysis of Rocca and Feasibility of Its Security Claim},
  journal      = {{IACR} Trans. Symmetric Cryptol.},
  volume       = {2022},
  number       = {3},
  pages        = {123--151},
  year         = {2022},
  url          = {https://doi.org/10.46586/tosc.v2022.i3.123-151},
  doi          = {10.46586/TOSC.V2022.I3.123-151},
  timestamp    = {Fri, 05 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tosc/HosoyamadaIIIMS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/AdomnicaiMS22,
  author       = {Alexandre Adomnicai and
                  Kazuhiko Minematsu and
                  Maki Shigeri},
  editor       = {Khoa Nguyen and
                  Guomin Yang and
                  Fuchun Guo and
                  Willy Susilo},
  title        = {Fast Skinny-128 {SIMD} Implementations for Sequential Modes of Operation},
  booktitle    = {Information Security and Privacy - 27th Australasian Conference, {ACISP}
                  2022, Wollongong, NSW, Australia, November 28-30, 2022, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {13494},
  pages        = {125--144},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-22301-3\_7},
  doi          = {10.1007/978-3-031-22301-3\_7},
  timestamp    = {Sat, 17 Dec 2022 21:30:21 +0100},
  biburl       = {https://dblp.org/rec/conf/acisp/AdomnicaiMS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/InoueIM22,
  author       = {Akiko Inoue and
                  Tetsu Iwata and
                  Kazuhiko Minematsu},
  editor       = {Giuseppe Ateniese and
                  Daniele Venturi},
  title        = {Analyzing the Provable Security Bounds of {GIFT-COFB} and Photon-Beetle},
  booktitle    = {Applied Cryptography and Network Security - 20th International Conference,
                  {ACNS} 2022, Rome, Italy, June 20-23, 2022, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {13269},
  pages        = {67--84},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-09234-3\_4},
  doi          = {10.1007/978-3-031-09234-3\_4},
  timestamp    = {Tue, 21 Jun 2022 15:24:40 +0200},
  biburl       = {https://dblp.org/rec/conf/acns/InoueIM22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/arith/AokiMOT22,
  author       = {Daichi Aoki and
                  Kazuhiko Minematsu and
                  Toshihiko Okamura and
                  Tsuyoshi Takagi},
  title        = {Efficient Word Size Modular Multiplication over Signed Integers},
  booktitle    = {29th {IEEE} Symposium on Computer Arithmetic, {ARITH} 2022, Lyon,
                  France, September 12-14, 2022},
  pages        = {94--101},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/ARITH54963.2022.00026},
  doi          = {10.1109/ARITH54963.2022.00026},
  timestamp    = {Thu, 29 Dec 2022 15:06:50 +0100},
  biburl       = {https://dblp.org/rec/conf/arith/AokiMOT22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/citc/Minematsu22,
  author       = {Kazuhiko Minematsu},
  editor       = {Dana Dachman{-}Soled},
  title        = {Property-Preserving Hash Functions and Combinatorial Group Testing},
  booktitle    = {3rd Conference on Information-Theoretic Cryptography, {ITC} 2022,
                  July 5-7, 2022, Cambridge, MA, {USA}},
  series       = {LIPIcs},
  volume       = {230},
  pages        = {2:1--2:14},
  publisher    = {Schloss Dagstuhl - Leibniz-Zentrum f{\"{u}}r Informatik},
  year         = {2022},
  url          = {https://doi.org/10.4230/LIPIcs.ITC.2022.2},
  doi          = {10.4230/LIPICS.ITC.2022.2},
  timestamp    = {Wed, 21 Aug 2024 22:46:00 +0200},
  biburl       = {https://dblp.org/rec/conf/citc/Minematsu22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/InoueIM22,
  author       = {Akiko Inoue and
                  Tetsu Iwata and
                  Kazuhiko Minematsu},
  title        = {Analyzing the Provable Security Bounds of {GIFT-COFB} and Photon-Beetle},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1},
  year         = {2022},
  url          = {https://eprint.iacr.org/2022/001},
  timestamp    = {Thu, 13 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/InoueIM22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/InoueM22,
  author       = {Akiko Inoue and
                  Kazuhiko Minematsu},
  title        = {Parallelizable Authenticated Encryption with Small State Size},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {331},
  year         = {2022},
  url          = {https://eprint.iacr.org/2022/331},
  timestamp    = {Thu, 21 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/InoueM22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HabuMI22,
  author       = {Makoto Habu and
                  Kazuhiko Minematsu and
                  Tetsu Iwata},
  title        = {Matching Attacks on Romulus-M},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {369},
  year         = {2022},
  url          = {https://eprint.iacr.org/2022/369},
  timestamp    = {Thu, 21 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/HabuMI22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Minematsu22,
  author       = {Kazuhiko Minematsu},
  title        = {Property-Preserving Hash Functions and Combinatorial Group Testing},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {478},
  year         = {2022},
  url          = {https://eprint.iacr.org/2022/478},
  timestamp    = {Mon, 16 May 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Minematsu22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AdomnicaiMS22,
  author       = {Alexandre Adomnicai and
                  Kazuhiko Minematsu and
                  Maki Shigeri},
  title        = {Fast Skinny-128 {SIMD} Implementations for Sequential Modes of Operation},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {578},
  year         = {2022},
  url          = {https://eprint.iacr.org/2022/578},
  timestamp    = {Mon, 20 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AdomnicaiMS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Inoue0M22,
  author       = {Akiko Inoue and
                  Chun Guo and
                  Kazuhiko Minematsu},
  title        = {Nonce-Misuse Resilience of Romulus-N and {GIFT-COFB}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1012},
  year         = {2022},
  url          = {https://eprint.iacr.org/2022/1012},
  timestamp    = {Tue, 27 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Inoue0M22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HiroseM22,
  author       = {Shoichi Hirose and
                  Kazuhiko Minematsu},
  title        = {Compactly Committing Authenticated Encryption Using Encryptment and
                  Tweakable Block Cipher},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1670},
  year         = {2022},
  url          = {https://eprint.iacr.org/2022/1670},
  timestamp    = {Thu, 05 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/HiroseM22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieiceta/HokiSLMI21,
  author       = {Jin Hoki and
                  Kosei Sakamoto and
                  Fukang Liu and
                  Kazuhiko Minematsu and
                  Takanori Isobe},
  title        = {MILP-Aided Security Evaluation of Differential Attacks on KCipher-2},
  journal      = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.},
  volume       = {104-A},
  number       = {1},
  pages        = {203--212},
  year         = {2021},
  url          = {https://doi.org/10.1587/transfun.2020CIP0018},
  doi          = {10.1587/TRANSFUN.2020CIP0018},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieiceta/HokiSLMI21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieiceta/HokiSMI21,
  author       = {Jin Hoki and
                  Kosei Sakamoto and
                  Kazuhiko Minematsu and
                  Takanori Isobe},
  title        = {Practical Integral Distinguishers on {SNOW} 3G and KCipher-2},
  journal      = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.},
  volume       = {104-A},
  number       = {11},
  pages        = {1603--1611},
  year         = {2021},
  url          = {https://doi.org/10.1587/transfun.2020eap1102},
  doi          = {10.1587/TRANSFUN.2020EAP1102},
  timestamp    = {Thu, 12 May 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieiceta/HokiSMI21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/BanikILMS21,
  author       = {Subhadeep Banik and
                  Takanori Isobe and
                  Fukang Liu and
                  Kazuhiko Minematsu and
                  Kosei Sakamoto},
  title        = {Orthros: {A} Low-Latency {PRF}},
  journal      = {{IACR} Trans. Symmetric Cryptol.},
  volume       = {2021},
  number       = {1},
  pages        = {37--77},
  year         = {2021},
  url          = {https://doi.org/10.46586/tosc.v2021.i1.37-77},
  doi          = {10.46586/TOSC.V2021.I1.37-77},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tosc/BanikILMS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/IsobeIM21,
  author       = {Takanori Isobe and
                  Ryoma Ito and
                  Kazuhiko Minematsu},
  editor       = {Elisa Bertino and
                  Haya Schulmann and
                  Michael Waidner},
  title        = {Security Analysis of SFrame},
  booktitle    = {Computer Security - {ESORICS} 2021 - 26th European Symposium on Research
                  in Computer Security, Darmstadt, Germany, October 4-8, 2021, Proceedings,
                  Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12973},
  pages        = {127--146},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-88428-4\_7},
  doi          = {10.1007/978-3-030-88428-4\_7},
  timestamp    = {Tue, 17 Oct 2023 10:41:56 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/IsobeIM21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sacrypt/MinematsuIMSK21,
  author       = {Kazuhiko Minematsu and
                  Akiko Inoue and
                  Katsuya Moriwaki and
                  Maki Shigeri and
                  Hiroyasu Kubo},
  editor       = {Riham AlTawy and
                  Andreas H{\"{u}}lsing},
  title        = {Parallel Verification of Serial {MAC} and {AE} Modes},
  booktitle    = {Selected Areas in Cryptography - 28th International Conference, {SAC}
                  2021, Virtual Event, September 29 - October 1, 2021, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {13203},
  pages        = {200--219},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-99277-4\_10},
  doi          = {10.1007/978-3-030-99277-4\_10},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sacrypt/MinematsuIMSK21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Banik0LMS21,
  author       = {Subhadeep Banik and
                  Takanori Isobe and
                  Fukang Liu and
                  Kazuhiko Minematsu and
                  Kosei Sakamoto},
  title        = {Orthros: {A} Low-Latency {PRF}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {390},
  year         = {2021},
  url          = {https://eprint.iacr.org/2021/390},
  timestamp    = {Wed, 07 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Banik0LMS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/IsobeIM21,
  author       = {Takanori Isobe and
                  Ryoma Ito and
                  Kazuhiko Minematsu},
  title        = {Security Analysis of SFrame},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {424},
  year         = {2021},
  url          = {https://eprint.iacr.org/2021/424},
  timestamp    = {Mon, 26 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/IsobeIM21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/InoueM21,
  author       = {Akiko Inoue and
                  Kazuhiko Minematsu},
  title        = {{GIFT-COFB} is Tightly Birthday Secure with Encryption Queries},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {737},
  year         = {2021},
  url          = {https://eprint.iacr.org/2021/737},
  timestamp    = {Mon, 07 Jun 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/InoueM21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MinematsuIMSK21,
  author       = {Kazuhiko Minematsu and
                  Akiko Inoue and
                  Katsuya Moriwaki and
                  Maki Shigeri and
                  Hiroyasu Kubo},
  title        = {Parallel Verification of Serial {MAC} and {AE} Modes},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1283},
  year         = {2021},
  url          = {https://eprint.iacr.org/2021/1283},
  timestamp    = {Mon, 25 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/MinematsuIMSK21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/GuoIM21,
  author       = {Chun Guo and
                  Tetsu Iwata and
                  Kazuhiko Minematsu},
  title        = {New Indifferentiability Security Proof of {MDPH} Hash Function},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1469},
  year         = {2021},
  url          = {https://eprint.iacr.org/2021/1469},
  timestamp    = {Tue, 27 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/GuoIM21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/SakamotoMSSKFI20,
  author       = {Kosei Sakamoto and
                  Kazuhiko Minematsu and
                  Nao Shibata and
                  Maki Shigeri and
                  Hiroyasu Kubo and
                  Yuki Funabiki and
                  Takanori Isobe},
  title        = {Security of Related-Key Differential Attacks on TWINE, Revisited},
  journal      = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.},
  volume       = {103-A},
  number       = {1},
  pages        = {212--214},
  year         = {2020},
  url          = {http://search.ieice.org/bin/summary.php?id=e103-a\_1\_212},
  doi          = {10.1587/TRANSFUN.2019CIL0004},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieicet/SakamotoMSSKFI20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/IsobeM20,
  author       = {Takanori Isobe and
                  Kazuhiko Minematsu},
  title        = {Security Analysis and Countermeasures of an End-to-End Encryption
                  Scheme of {LINE}},
  journal      = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.},
  volume       = {103-A},
  number       = {1},
  pages        = {313--324},
  year         = {2020},
  url          = {http://search.ieice.org/bin/summary.php?id=e103-a\_1\_313},
  doi          = {10.1587/TRANSFUN.2019EAP1041},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieicet/IsobeM20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieiceta/SakamotoMSSKFBM20,
  author       = {Kosei Sakamoto and
                  Kazuhiko Minematsu and
                  Nao Shibata and
                  Maki Shigeri and
                  Hiroyasu Kubo and
                  Yuki Funabiki and
                  Andrey Bogdanov and
                  Sumio Morioka and
                  Takanori Isobe},
  title        = {Tweakable {TWINE:} Building a Tweakable Block Cipher on Generalized
                  Feistel Structure},
  journal      = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.},
  volume       = {103-A},
  number       = {12},
  pages        = {1629--1639},
  year         = {2020},
  url          = {https://doi.org/10.1587/transfun.2019EAP1141},
  doi          = {10.1587/TRANSFUN.2019EAP1141},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieiceta/SakamotoMSSKFBM20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/joc/ChakrabortiIMN20,
  author       = {Avik Chakraborti and
                  Tetsu Iwata and
                  Kazuhiko Minematsu and
                  Mridul Nandi},
  title        = {Blockcipher-Based Authenticated Encryption: How Small Can We Go?},
  journal      = {J. Cryptol.},
  volume       = {33},
  number       = {3},
  pages        = {703--741},
  year         = {2020},
  url          = {https://doi.org/10.1007/s00145-019-09325-z},
  doi          = {10.1007/S00145-019-09325-Z},
  timestamp    = {Sat, 21 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/joc/ChakrabortiIMN20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/joc/InoueIMP20,
  author       = {Akiko Inoue and
                  Tetsu Iwata and
                  Kazuhiko Minematsu and
                  Bertram Poettering},
  title        = {Cryptanalysis of {OCB2:} Attacks on Authenticity and Confidentiality},
  journal      = {J. Cryptol.},
  volume       = {33},
  number       = {4},
  pages        = {1871--1913},
  year         = {2020},
  url          = {https://doi.org/10.1007/s00145-020-09359-8},
  doi          = {10.1007/S00145-020-09359-8},
  timestamp    = {Thu, 29 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/joc/InoueIMP20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/IwataKMP20,
  author       = {Tetsu Iwata and
                  Mustafa Khairallah and
                  Kazuhiko Minematsu and
                  Thomas Peyrin},
  title        = {Duel of the Titans: The Romulus and Remus Families of Lightweight
                  {AEAD} Algorithms},
  journal      = {{IACR} Trans. Symmetric Cryptol.},
  volume       = {2020},
  number       = {1},
  pages        = {43--120},
  year         = {2020},
  url          = {https://doi.org/10.13154/tosc.v2020.i1.43-120},
  doi          = {10.13154/TOSC.V2020.I1.43-120},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tosc/IwataKMP20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/Minematsu20,
  author       = {Kazuhiko Minematsu},
  title        = {Fast Decryption: a New Feature of Misuse-Resistant {AE}},
  journal      = {{IACR} Trans. Symmetric Cryptol.},
  volume       = {2020},
  number       = {3},
  pages        = {87--118},
  year         = {2020},
  url          = {https://doi.org/10.13154/tosc.v2020.i3.87-118},
  doi          = {10.13154/TOSC.V2020.I3.87-118},
  timestamp    = {Mon, 05 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tosc/Minematsu20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/ChoiILLLMN20,
  author       = {Wonseok Choi and
                  Akiko Inoue and
                  ByeongHak Lee and
                  Jooyoung Lee and
                  Eik List and
                  Kazuhiko Minematsu and
                  Yusuke Naito},
  title        = {Highly Secure Nonce-based MACs from the Sum of Tweakable Block Ciphers},
  journal      = {{IACR} Trans. Symmetric Cryptol.},
  volume       = {2020},
  number       = {4},
  pages        = {39--70},
  year         = {2020},
  url          = {https://doi.org/10.46586/tosc.v2020.i4.39-70},
  doi          = {10.46586/TOSC.V2020.I4.39-70},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tosc/ChoiILLLMN20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/Fujita0M20,
  author       = {Rintaro Fujita and
                  Takanori Isobe and
                  Kazuhiko Minematsu},
  editor       = {Mauro Conti and
                  Jianying Zhou and
                  Emiliano Casalicchio and
                  Angelo Spognardi},
  title        = {{ACE} in Chains: How Risky Is {CBC} Encryption of Binary Executable
                  Files?},
  booktitle    = {Applied Cryptography and Network Security - 18th International Conference,
                  {ACNS} 2020, Rome, Italy, October 19-22, 2020, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12146},
  pages        = {187--207},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-57808-4\_10},
  doi          = {10.1007/978-3-030-57808-4\_10},
  timestamp    = {Thu, 27 Aug 2020 11:49:09 +0200},
  biburl       = {https://dblp.org/rec/conf/acns/Fujita0M20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iscas/OdaUIMH20,
  author       = {Maya Oda and
                  Rei Ueno and
                  Akiko Inoue and
                  Kazuhiko Minematsu and
                  Naofumi Homma},
  title        = {{PMAC++:} Incremental {MAC} Scheme Adaptable to Lightweight Block
                  Ciphers},
  booktitle    = {{IEEE} International Symposium on Circuits and Systems, {ISCAS} 2020,
                  Sevilla, Spain, October 10-21, 2020},
  pages        = {1--4},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/ISCAS45731.2020.9180779},
  doi          = {10.1109/ISCAS45731.2020.9180779},
  timestamp    = {Mon, 18 Jan 2021 08:38:59 +0100},
  biburl       = {https://dblp.org/rec/conf/iscas/OdaUIMH20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sacrypt/BanikBIKLMSSS20,
  author       = {Subhadeep Banik and
                  Zhenzhen Bao and
                  Takanori Isobe and
                  Hiroyasu Kubo and
                  Fukang Liu and
                  Kazuhiko Minematsu and
                  Kosei Sakamoto and
                  Nao Shibata and
                  Maki Shigeri},
  editor       = {Orr Dunkelman and
                  Michael J. Jacobson Jr. and
                  Colin O'Flynn},
  title        = {{WARP} : Revisiting {GFN} for Lightweight 128-Bit Block Cipher},
  booktitle    = {Selected Areas in Cryptography - {SAC} 2020 - 27th International Conference,
                  Halifax, NS, Canada (Virtual Event), October 21-23, 2020, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {12804},
  pages        = {535--564},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-81652-0\_21},
  doi          = {10.1007/978-3-030-81652-0\_21},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sacrypt/BanikBIKLMSSS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BanikCIMNPSST20,
  author       = {Subhadeep Banik and
                  Avik Chakraborti and
                  Tetsu Iwata and
                  Kazuhiko Minematsu and
                  Mridul Nandi and
                  Thomas Peyrin and
                  Yu Sasaki and
                  Siang Meng Sim and
                  Yosuke Todo},
  title        = {{GIFT-COFB}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {738},
  year         = {2020},
  url          = {https://eprint.iacr.org/2020/738},
  timestamp    = {Tue, 30 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BanikCIMNPSST20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/FujitaIM20,
  author       = {Rintaro Fujita and
                  Takanori Isobe and
                  Kazuhiko Minematsu},
  title        = {{ACE} in Chains : How Risky is {CBC} Encryption of Binary Executable
                  Files ?},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1159},
  year         = {2020},
  url          = {https://eprint.iacr.org/2020/1159},
  timestamp    = {Wed, 30 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/FujitaIM20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BanikBIKLMSSS20,
  author       = {Subhadeep Banik and
                  Zhenzhen Bao and
                  Takanori Isobe and
                  Hiroyasu Kubo and
                  Fukang Liu and
                  Kazuhiko Minematsu and
                  Kosei Sakamoto and
                  Nao Shibata and
                  Maki Shigeri},
  title        = {{WARP} : Revisiting {GFN} for Lightweight 128-bit Block Cipher},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1320},
  year         = {2020},
  url          = {https://eprint.iacr.org/2020/1320},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BanikBIKLMSSS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/InoueMOUH20,
  author       = {Akiko Inoue and
                  Kazuhiko Minematsu and
                  Maya Oda and
                  Rei Ueno and
                  Naofumi Homma},
  title        = {{ELM} : {A} Low-Latency and Scalable Memory Encryption Scheme},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1374},
  year         = {2020},
  url          = {https://eprint.iacr.org/2020/1374},
  timestamp    = {Wed, 02 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/InoueMOUH20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/BaoGIM19,
  author       = {Zhenzhen Bao and
                  Jian Guo and
                  Tetsu Iwata and
                  Kazuhiko Minematsu},
  title        = {{ZOCB} and {ZOTR:} Tweakable Blockcipher Modes for Authenticated Encryption
                  with Full Absorption},
  journal      = {{IACR} Trans. Symmetric Cryptol.},
  volume       = {2019},
  number       = {2},
  pages        = {1--54},
  year         = {2019},
  url          = {https://doi.org/10.13154/tosc.v2019.i2.1-54},
  doi          = {10.13154/TOSC.V2019.I2.1-54},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tosc/BaoGIM19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/InoueIMP19,
  author       = {Akiko Inoue and
                  Tetsu Iwata and
                  Kazuhiko Minematsu and
                  Bertram Poettering},
  editor       = {Alexandra Boldyreva and
                  Daniele Micciancio},
  title        = {Cryptanalysis of {OCB2:} Attacks on Authenticity and Confidentiality},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2019 - 39th Annual International
                  Cryptology Conference, Santa Barbara, CA, USA, August 18-22, 2019,
                  Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11692},
  pages        = {3--31},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-26948-7\_1},
  doi          = {10.1007/978-3-030-26948-7\_1},
  timestamp    = {Wed, 21 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/InoueIMP19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/MinematsuK19,
  author       = {Kazuhiko Minematsu and
                  Norifumi Kamiya},
  editor       = {Kazue Sako and
                  Steve A. Schneider and
                  Peter Y. A. Ryan},
  title        = {Symmetric-Key Corruption Detection: When XOR-MACs Meet Combinatorial
                  Group Testing},
  booktitle    = {Computer Security - {ESORICS} 2019 - 24th European Symposium on Research
                  in Computer Security, Luxembourg, September 23-27, 2019, Proceedings,
                  Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11735},
  pages        = {595--615},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-29959-0\_29},
  doi          = {10.1007/978-3-030-29959-0\_29},
  timestamp    = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/MinematsuK19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iscas/UenoHIM19,
  author       = {Rei Ueno and
                  Naofumi Homma and
                  Tomonori Iida and
                  Kazuhiko Minematsu},
  title        = {High Throughput/Gate FN-Based Hardware Architectures for {AES-OTR}},
  booktitle    = {{IEEE} International Symposium on Circuits and Systems, {ISCAS} 2019,
                  Sapporo, Japan, May 26-29, 2019},
  pages        = {1--4},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/ISCAS.2019.8702231},
  doi          = {10.1109/ISCAS.2019.8702231},
  timestamp    = {Wed, 16 Oct 2019 14:14:49 +0200},
  biburl       = {https://dblp.org/rec/conf/iscas/UenoHIM19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/SakamotoMSSKFBM19,
  author       = {Kosei Sakamoto and
                  Kazuhiko Minematsu and
                  Nao Shibata and
                  Maki Shigeri and
                  Hiroyasu Kubo and
                  Yuki Funabiki and
                  Andrey Bogdanov and
                  Sumio Morioka and
                  Takanori Isobe},
  editor       = {Nuttapong Attrapadung and
                  Takeshi Yagi},
  title        = {Tweakable {TWINE:} Building a Tweakable Block Cipher on Generalized
                  Feistel Structure},
  booktitle    = {Advances in Information and Computer Security - 14th International
                  Workshop on Security, {IWSEC} 2019, Tokyo, Japan, August 28-30, 2019,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11689},
  pages        = {129--145},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-26834-3\_8},
  doi          = {10.1007/978-3-030-26834-3\_8},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwsec/SakamotoMSSKFBM19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sacrypt/0001M19,
  author       = {Takanori Isobe and
                  Kazuhiko Minematsu},
  editor       = {Kenneth G. Paterson and
                  Douglas Stebila},
  title        = {Plaintext Recovery Attacks Against {XTS} Beyond Collisions},
  booktitle    = {Selected Areas in Cryptography - {SAC} 2019 - 26th International Conference,
                  Waterloo, ON, Canada, August 12-16, 2019, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {11959},
  pages        = {103--123},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-38471-5\_5},
  doi          = {10.1007/978-3-030-38471-5\_5},
  timestamp    = {Tue, 07 May 2024 20:12:23 +0200},
  biburl       = {https://dblp.org/rec/conf/sacrypt/0001M19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sacrypt/Minematsu19,
  author       = {Kazuhiko Minematsu},
  editor       = {Kenneth G. Paterson and
                  Douglas Stebila},
  title        = {A Lightweight Alternative to {PMAC}},
  booktitle    = {Selected Areas in Cryptography - {SAC} 2019 - 26th International Conference,
                  Waterloo, ON, Canada, August 12-16, 2019, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {11959},
  pages        = {393--417},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-38471-5\_16},
  doi          = {10.1007/978-3-030-38471-5\_16},
  timestamp    = {Tue, 14 Jan 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sacrypt/Minematsu19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sacrypt/InoueM19,
  author       = {Akiko Inoue and
                  Kazuhiko Minematsu},
  editor       = {Kenneth G. Paterson and
                  Douglas Stebila},
  title        = {Parallelizable Authenticated Encryption with Small State Size},
  booktitle    = {Selected Areas in Cryptography - {SAC} 2019 - 26th International Conference,
                  Waterloo, ON, Canada, August 12-16, 2019, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {11959},
  pages        = {618--644},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-38471-5\_25},
  doi          = {10.1007/978-3-030-38471-5\_25},
  timestamp    = {Tue, 14 Jan 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sacrypt/InoueM19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/InoueIMP19,
  author       = {Akiko Inoue and
                  Tetsu Iwata and
                  Kazuhiko Minematsu and
                  Bertram Poettering},
  title        = {Cryptanalysis of {OCB2:} Attacks on Authenticity and Confidentiality},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {311},
  year         = {2019},
  url          = {https://eprint.iacr.org/2019/311},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/InoueIMP19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Minematsu19,
  author       = {Kazuhiko Minematsu},
  title        = {Efficient Message Authentication Codes with Combinatorial Group Testing},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {404},
  year         = {2019},
  url          = {https://eprint.iacr.org/2019/404},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Minematsu19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Bao0IM19,
  author       = {Zhenzhen Bao and
                  Jian Guo and
                  Tetsu Iwata and
                  Kazuhiko Minematsu},
  title        = {{ZOCB} and {ZOTR:} Tweakable Blockcipher Modes for Authenticated Encryption
                  with Full Absorption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {600},
  year         = {2019},
  url          = {https://eprint.iacr.org/2019/600},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Bao0IM19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/IsobeM19,
  author       = {Takanori Isobe and
                  Kazuhiko Minematsu},
  title        = {Plaintext Recovery Attacks against {XTS} Beyond Collisions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {825},
  year         = {2019},
  url          = {https://eprint.iacr.org/2019/825},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/IsobeM19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/IwataKMP19,
  author       = {Tetsu Iwata and
                  Mustafa Khairallah and
                  Kazuhiko Minematsu and
                  Thomas Peyrin},
  title        = {Duel of the Titans: The Romulus and Remus Families of Lightweight
                  {AEAD} Algorithms},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {992},
  year         = {2019},
  url          = {https://eprint.iacr.org/2019/992},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/IwataKMP19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MinematsuK19,
  author       = {Kazuhiko Minematsu and
                  Norifumi Kamiya},
  title        = {Symmetric-key Corruption Detection : When XOR-MACs Meet Combinatorial
                  Group Testing},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1127},
  year         = {2019},
  url          = {https://eprint.iacr.org/2019/1127},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/MinematsuK19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/LeeLMM18,
  author       = {Jooyoung Lee and
                  Atul Luykx and
                  Bart Mennink and
                  Kazuhiko Minematsu},
  title        = {Connecting tweakable and multi-key blockcipher security},
  journal      = {Des. Codes Cryptogr.},
  volume       = {86},
  number       = {3},
  pages        = {623--640},
  year         = {2018},
  url          = {https://doi.org/10.1007/s10623-017-0347-3},
  doi          = {10.1007/S10623-017-0347-3},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/LeeLMM18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijisec/ImamuraMI18,
  author       = {Kazuya Imamura and
                  Kazuhiko Minematsu and
                  Tetsu Iwata},
  title        = {Integrity analysis of authenticated encryption based on stream ciphers},
  journal      = {Int. J. Inf. Sec.},
  volume       = {17},
  number       = {5},
  pages        = {493--511},
  year         = {2018},
  url          = {https://doi.org/10.1007/s10207-017-0378-9},
  doi          = {10.1007/S10207-017-0378-9},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijisec/ImamuraMI18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ctrsa/MinematsuST18,
  author       = {Kazuhiko Minematsu and
                  Kentarou Sasaki and
                  Yuki Tanaka},
  editor       = {Nigel P. Smart},
  title        = {Count-then-Permute: {A} Precision-Free Alternative to Inversion Sampling},
  booktitle    = {Topics in Cryptology - {CT-RSA} 2018 - The Cryptographers' Track at
                  the {RSA} Conference 2018, San Francisco, CA, USA, April 16-20, 2018,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10808},
  pages        = {264--278},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-76953-0\_14},
  doi          = {10.1007/978-3-319-76953-0\_14},
  timestamp    = {Tue, 14 May 2019 10:00:52 +0200},
  biburl       = {https://dblp.org/rec/conf/ctrsa/MinematsuST18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/IsobeM18,
  author       = {Takanori Isobe and
                  Kazuhiko Minematsu},
  editor       = {Javier L{\'{o}}pez and
                  Jianying Zhou and
                  Miguel Soriano},
  title        = {Breaking Message Integrity of an End-to-End Encryption Scheme of {LINE}},
  booktitle    = {Computer Security - 23rd European Symposium on Research in Computer
                  Security, {ESORICS} 2018, Barcelona, Spain, September 3-7, 2018, Proceedings,
                  Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11099},
  pages        = {249--268},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-98989-1\_13},
  doi          = {10.1007/978-3-319-98989-1\_13},
  timestamp    = {Fri, 03 Jan 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/esorics/IsobeM18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/IsobeM18,
  author       = {Takanori Isobe and
                  Kazuhiko Minematsu},
  title        = {Breaking Message Integrity of an End-to-End Encryption Scheme of {LINE}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {668},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/668},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/IsobeM18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/InoueM18,
  author       = {Akiko Inoue and
                  Kazuhiko Minematsu},
  title        = {Cryptanalysis of {OCB2}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1040},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/1040},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/InoueM18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/MinematsuI17,
  author       = {Kazuhiko Minematsu and
                  Tetsu Iwata},
  title        = {Cryptanalysis of PMACx, PMAC2x, and SIVx},
  journal      = {{IACR} Trans. Symmetric Cryptol.},
  volume       = {2017},
  number       = {2},
  pages        = {162--176},
  year         = {2017},
  url          = {https://doi.org/10.13154/tosc.v2017.i2.162-176},
  doi          = {10.13154/TOSC.V2017.I2.162-176},
  timestamp    = {Tue, 04 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tosc/MinematsuI17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/ChakrabortiIMN17,
  author       = {Avik Chakraborti and
                  Tetsu Iwata and
                  Kazuhiko Minematsu and
                  Mridul Nandi},
  editor       = {Wieland Fischer and
                  Naofumi Homma},
  title        = {Blockcipher-Based Authenticated Encryption: How Small Can We Go?},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2017 - 19th International
                  Conference, Taipei, Taiwan, September 25-28, 2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10529},
  pages        = {277--298},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-66787-4\_14},
  doi          = {10.1007/978-3-319-66787-4\_14},
  timestamp    = {Fri, 27 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ches/ChakrabortiIMN17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/IwataMPS17,
  author       = {Tetsu Iwata and
                  Kazuhiko Minematsu and
                  Thomas Peyrin and
                  Yannick Seurin},
  editor       = {Jonathan Katz and
                  Hovav Shacham},
  title        = {{ZMAC:} {A} Fast Tweakable Block Cipher Mode for Highly Secure Message
                  Authentication},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2017 - 37th Annual International
                  Cryptology Conference, Santa Barbara, CA, USA, August 20-24, 2017,
                  Proceedings, Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10403},
  pages        = {34--65},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-63697-9\_2},
  doi          = {10.1007/978-3-319-63697-9\_2},
  timestamp    = {Fri, 27 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/crypto/IwataMPS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/latincrypt/JhaLMMN17,
  author       = {Ashwin Jha and
                  Eik List and
                  Kazuhiko Minematsu and
                  Sweta Mishra and
                  Mridul Nandi},
  editor       = {Tanja Lange and
                  Orr Dunkelman},
  title        = {{XHX} - {A} Framework for Optimally Secure Tweakable Block Ciphers
                  from Classical Block Ciphers and Universal Hashing},
  booktitle    = {Progress in Cryptology - {LATINCRYPT} 2017 - 5th International Conference
                  on Cryptology and Information Security in Latin America, Havana, Cuba,
                  September 20-22, 2017, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {11368},
  pages        = {207--227},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-030-25283-0\_12},
  doi          = {10.1007/978-3-030-25283-0\_12},
  timestamp    = {Fri, 23 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/latincrypt/JhaLMMN17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MinematsuI17,
  author       = {Kazuhiko Minematsu and
                  Tetsu Iwata},
  title        = {Cryptanalysis of PMACx, PMAC2x, and SIVx},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {220},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/220},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/MinematsuI17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/IwataMPS17,
  author       = {Tetsu Iwata and
                  Kazuhiko Minematsu and
                  Thomas Peyrin and
                  Yannick Seurin},
  title        = {{ZMAC:} {A} Fast Tweakable Block Cipher Mode for Highly Secure Message
                  Authentication},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {535},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/535},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/IwataMPS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ChakrabortiIMN17,
  author       = {Avik Chakraborti and
                  Tetsu Iwata and
                  Kazuhiko Minematsu and
                  Mridul Nandi},
  title        = {Blockcipher-based Authenticated Encryption: How Small Can We Go?},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {649},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/649},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ChakrabortiIMN17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/JhaLMMN17,
  author       = {Ashwin Jha and
                  Eik List and
                  Kazuhiko Minematsu and
                  Sweta Mishra and
                  Mridul Nandi},
  title        = {{XHX} - {A} Framework for Optimally Secure Tweakable Block Ciphers
                  from Classical Block Ciphers and Universal Hashing},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1075},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/1075},
  timestamp    = {Fri, 23 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/JhaLMMN17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/IwataM16,
  author       = {Tetsu Iwata and
                  Kazuhiko Minematsu},
  title        = {Stronger Security Variants of {GCM-SIV}},
  journal      = {{IACR} Trans. Symmetric Cryptol.},
  volume       = {2016},
  number       = {1},
  pages        = {134--157},
  year         = {2016},
  url          = {https://doi.org/10.13154/tosc.v2016.i1.134-157},
  doi          = {10.13154/TOSC.V2016.I1.134-157},
  timestamp    = {Tue, 04 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tosc/IwataM16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/Minematsu16,
  author       = {Kazuhiko Minematsu},
  editor       = {Joseph K. Liu and
                  Ron Steinfeld},
  title        = {Authenticated Encryption with Small Stretch (or, How to Accelerate
                  {AERO)}},
  booktitle    = {Information Security and Privacy - 21st Australasian Conference, {ACISP}
                  2016, Melbourne, VIC, Australia, July 4-6, 2016, Proceedings, Part
                  {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9723},
  pages        = {347--362},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-40367-0\_22},
  doi          = {10.1007/978-3-319-40367-0\_22},
  timestamp    = {Tue, 14 May 2019 10:00:46 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/Minematsu16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/host/BanikBM16,
  author       = {Subhadeep Banik and
                  Andrey Bogdanov and
                  Kazuhiko Minematsu},
  editor       = {William H. Robinson and
                  Swarup Bhunia and
                  Ryan Kastner},
  title        = {Low-area hardware implementations of CLOC, {SILC} and {AES-OTR}},
  booktitle    = {2016 {IEEE} International Symposium on Hardware Oriented Security
                  and Trust, {HOST} 2016, McLean, VA, USA, May 3-5, 2016},
  pages        = {71--74},
  publisher    = {{IEEE} Computer Society},
  year         = {2016},
  url          = {https://doi.org/10.1109/HST.2016.7495559},
  doi          = {10.1109/HST.2016.7495559},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/host/BanikBM16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/provsec/ImamuraMI16,
  author       = {Kazuya Imamura and
                  Kazuhiko Minematsu and
                  Tetsu Iwata},
  editor       = {Liqun Chen and
                  Jinguang Han},
  title        = {Integrity Analysis of Authenticated Encryption Based on Stream Ciphers},
  booktitle    = {Provable Security - 10th International Conference, ProvSec 2016, Nanjing,
                  China, November 10-11, 2016, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10005},
  pages        = {257--276},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-47422-9\_15},
  doi          = {10.1007/978-3-319-47422-9\_15},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/provsec/ImamuraMI16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/IwataM16,
  author       = {Tetsu Iwata and
                  Kazuhiko Minematsu},
  title        = {Stronger Security Variants of {GCM-SIV}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {853},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/853},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/IwataM16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ImamuraMI16,
  author       = {Kazuya Imamura and
                  Kazuhiko Minematsu and
                  Tetsu Iwata},
  title        = {Integrity Analysis of Authenticated Encryption Based on Stream Ciphers},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1124},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/1124},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ImamuraMI16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/Minematsu15,
  author       = {Kazuhiko Minematsu},
  title        = {Building blockcipher from small-block tweakable blockcipher},
  journal      = {Des. Codes Cryptogr.},
  volume       = {74},
  number       = {3},
  pages        = {645--663},
  year         = {2015},
  url          = {https://doi.org/10.1007/s10623-013-9882-8},
  doi          = {10.1007/S10623-013-9882-8},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/Minematsu15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/KobayashiMI15,
  author       = {Hayato Kobayashi and
                  Kazuhiko Minematsu and
                  Tetsu Iwata},
  title        = {Optimality of Tweak Functions in {CLOC}},
  journal      = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.},
  volume       = {98-A},
  number       = {10},
  pages        = {2152--2164},
  year         = {2015},
  url          = {https://doi.org/10.1587/transfun.E98.A.2152},
  doi          = {10.1587/TRANSFUN.E98.A.2152},
  timestamp    = {Sat, 11 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieicet/KobayashiMI15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/Minematsu15,
  author       = {Kazuhiko Minematsu},
  editor       = {G{\"{u}}nther Pernul and
                  Peter Y. A. Ryan and
                  Edgar R. Weippl},
  title        = {Efficient Message Authentication Codes with Combinatorial Group Testing},
  booktitle    = {Computer Security - {ESORICS} 2015 - 20th European Symposium on Research
                  in Computer Security, Vienna, Austria, September 21-25, 2015, Proceedings,
                  Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9326},
  pages        = {185--202},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-24174-6\_10},
  doi          = {10.1007/978-3-319-24174-6\_10},
  timestamp    = {Tue, 04 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/esorics/Minematsu15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/NiwaOMI15,
  author       = {Yuichi Niwa and
                  Keisuke Ohashi and
                  Kazuhiko Minematsu and
                  Tetsu Iwata},
  editor       = {Gregor Leander},
  title        = {{GCM} Security Bounds Reconsidered},
  booktitle    = {Fast Software Encryption - 22nd International Workshop, {FSE} 2015,
                  Istanbul, Turkey, March 8-11, 2015, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {9054},
  pages        = {385--407},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-662-48116-5\_19},
  doi          = {10.1007/978-3-662-48116-5\_19},
  timestamp    = {Sat, 19 Oct 2019 20:27:47 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/NiwaOMI15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ima/MinematsuI15,
  author       = {Kazuhiko Minematsu and
                  Tetsu Iwata},
  editor       = {Jens Groth},
  title        = {Tweak-Length Extension for Tweakable Blockciphers},
  booktitle    = {Cryptography and Coding - 15th {IMA} International Conference, {IMACC}
                  2015, Oxford, UK, December 15-17, 2015. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9496},
  pages        = {77--93},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-27239-9\_5},
  doi          = {10.1007/978-3-319-27239-9\_5},
  timestamp    = {Wed, 18 Mar 2020 16:00:58 +0100},
  biburl       = {https://dblp.org/rec/conf/ima/MinematsuI15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/NiwaOMI15,
  author       = {Yuichi Niwa and
                  Keisuke Ohashi and
                  Kazuhiko Minematsu and
                  Tetsu Iwata},
  title        = {{GCM} Security Bounds Reconsidered},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {214},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/214},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/NiwaOMI15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Minematsu15,
  author       = {Kazuhiko Minematsu},
  title        = {Authenticated Encryption without Tag Expansion (or, How to Accelerate
                  {AERO)}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {738},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/738},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Minematsu15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MinematsuI15,
  author       = {Kazuhiko Minematsu and
                  Tetsu Iwata},
  title        = {Tweak-Length Extension for Tweakable Blockciphers},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {888},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/888},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/MinematsuI15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/date/YamashitaMOT14,
  author       = {Noritaka Yamashita and
                  Kazuhiko Minematsu and
                  Toshihiko Okamura and
                  Yukiyasu Tsunoo},
  editor       = {Gerhard P. Fettweis and
                  Wolfgang Nebel},
  title        = {A smaller and faster variant of {RSM}},
  booktitle    = {Design, Automation {\&} Test in Europe Conference {\&} Exhibition,
                  {DATE} 2014, Dresden, Germany, March 24-28, 2014},
  pages        = {1--6},
  publisher    = {European Design and Automation Association},
  year         = {2014},
  url          = {https://doi.org/10.7873/DATE.2014.218},
  doi          = {10.7873/DATE.2014.218},
  timestamp    = {Wed, 16 Oct 2019 14:14:53 +0200},
  biburl       = {https://dblp.org/rec/conf/date/YamashitaMOT14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/Minematsu14,
  author       = {Kazuhiko Minematsu},
  editor       = {Phong Q. Nguyen and
                  Elisabeth Oswald},
  title        = {Parallelizable Rate-1 Authenticated Encryption from Pseudorandom Functions},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2014 - 33rd Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Copenhagen, Denmark, May 11-15, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8441},
  pages        = {275--292},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-642-55220-5\_16},
  doi          = {10.1007/978-3-642-55220-5\_16},
  timestamp    = {Thu, 14 Oct 2021 09:58:16 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/Minematsu14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/IwataM0M14,
  author       = {Tetsu Iwata and
                  Kazuhiko Minematsu and
                  Jian Guo and
                  Sumio Morioka},
  editor       = {Carlos Cid and
                  Christian Rechberger},
  title        = {{CLOC:} Authenticated Encryption for Short Input},
  booktitle    = {Fast Software Encryption - 21st International Workshop, {FSE} 2014,
                  London, UK, March 3-5, 2014. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8540},
  pages        = {149--167},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-662-46706-0\_8},
  doi          = {10.1007/978-3-662-46706-0\_8},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/IwataM0M14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/IwataMGM14,
  author       = {Tetsu Iwata and
                  Kazuhiko Minematsu and
                  Jian Guo and
                  Sumio Morioka},
  title        = {{CLOC:} Authenticated Encryption for Short Input},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {157},
  year         = {2014},
  url          = {http://eprint.iacr.org/2014/157},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/IwataMGM14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/MinematsuLMI13,
  author       = {Kazuhiko Minematsu and
                  Stefan Lucks and
                  Hiraku Morita and
                  Tetsu Iwata},
  editor       = {Shiho Moriai},
  title        = {Attacks and Security Proofs of EAX-Prime},
  booktitle    = {Fast Software Encryption - 20th International Workshop, {FSE} 2013,
                  Singapore, March 11-13, 2013. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8424},
  pages        = {327--347},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-662-43933-3\_17},
  doi          = {10.1007/978-3-662-43933-3\_17},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/MinematsuLMI13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/provsec/MinematsuLI13,
  author       = {Kazuhiko Minematsu and
                  Stefan Lucks and
                  Tetsu Iwata},
  editor       = {Willy Susilo and
                  Reza Reyhanitabar},
  title        = {Improved Authenticity Bound of EAX, and Refinements},
  booktitle    = {Provable Security - 7th International Conference, ProvSec 2013, Melaka,
                  Malaysia, October 23-25, 2013. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8209},
  pages        = {184--201},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-41227-1\_11},
  doi          = {10.1007/978-3-642-41227-1\_11},
  timestamp    = {Tue, 14 May 2019 10:00:45 +0200},
  biburl       = {https://dblp.org/rec/conf/provsec/MinematsuLI13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/provsec/Minematsu13,
  author       = {Kazuhiko Minematsu},
  editor       = {Willy Susilo and
                  Reza Reyhanitabar},
  title        = {A Short Universal Hash Function from Bit Rotation, and Applications
                  to Blockcipher Modes},
  booktitle    = {Provable Security - 7th International Conference, ProvSec 2013, Melaka,
                  Malaysia, October 23-25, 2013. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8209},
  pages        = {221--238},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-41227-1\_13},
  doi          = {10.1007/978-3-642-41227-1\_13},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/provsec/Minematsu13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Minematsu13,
  author       = {Kazuhiko Minematsu},
  title        = {Parallelizable Authenticated Encryption from Functions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {628},
  year         = {2013},
  url          = {http://eprint.iacr.org/2013/628},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Minematsu13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MinematsuLI13,
  author       = {Kazuhiko Minematsu and
                  Stefan Lucks and
                  Tetsu Iwata},
  title        = {Improved Authenticity Bound of EAX, and Refinements},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {792},
  year         = {2013},
  url          = {http://eprint.iacr.org/2013/792},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/MinematsuLI13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/IwataOM12,
  author       = {Tetsu Iwata and
                  Keisuke Ohashi and
                  Kazuhiko Minematsu},
  editor       = {Reihaneh Safavi{-}Naini and
                  Ran Canetti},
  title        = {Breaking and Repairing {GCM} Security Proofs},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2012 - 32nd Annual Cryptology Conference,
                  Santa Barbara, CA, USA, August 19-23, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7417},
  pages        = {31--49},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-32009-5\_3},
  doi          = {10.1007/978-3-642-32009-5\_3},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/IwataOM12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sacrypt/SuzakiMMK12,
  author       = {Tomoyasu Suzaki and
                  Kazuhiko Minematsu and
                  Sumio Morioka and
                  Eita Kobayashi},
  editor       = {Lars R. Knudsen and
                  Huapeng Wu},
  title        = {{\textdollar}{\textbackslash}textnormal\{{\textbackslash}textsc\{TWINE\}\}{\textdollar}
                  : {A} Lightweight Block Cipher for Multiple Platforms},
  booktitle    = {Selected Areas in Cryptography, 19th International Conference, {SAC}
                  2012, Windsor, ON, Canada, August 15-16, 2012, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7707},
  pages        = {339--354},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-35999-6\_22},
  doi          = {10.1007/978-3-642-35999-6\_22},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sacrypt/SuzakiMMK12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MinematsuMI12,
  author       = {Kazuhiko Minematsu and
                  Hiraku Morita and
                  Tetsu Iwata},
  title        = {Cryptanalysis of EAXprime},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {18},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/018},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/MinematsuMI12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/IwataOM12,
  author       = {Tetsu Iwata and
                  Keisuke Ohashi and
                  Kazuhiko Minematsu},
  title        = {Breaking and Repairing {GCM} Security Proofs},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {438},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/438},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/IwataOM12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/MinematsuSS11,
  author       = {Kazuhiko Minematsu and
                  Tomoyasu Suzaki and
                  Maki Shigeri},
  editor       = {Udaya Parampalli and
                  Philip Hawkes},
  title        = {On Maximum Differential Probability of Generalized Feistel},
  booktitle    = {Information Security and Privacy - 16th Australasian Conference, {ACISP}
                  2011, Melbourne, Australia, July 11-13, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6812},
  pages        = {89--105},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-22497-3\_7},
  doi          = {10.1007/978-3-642-22497-3\_7},
  timestamp    = {Tue, 14 May 2019 10:00:46 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/MinematsuSS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ima/MinematsuI11,
  author       = {Kazuhiko Minematsu and
                  Tetsu Iwata},
  editor       = {Liqun Chen},
  title        = {Building Blockcipher from Tweakable Blockcipher: Extending {FSE} 2009
                  Proposal},
  booktitle    = {Cryptography and Coding - 13th {IMA} International Conference, {IMACC}
                  2011, Oxford, UK, December 12-15, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7089},
  pages        = {391--412},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-25516-8\_24},
  doi          = {10.1007/978-3-642-25516-8\_24},
  timestamp    = {Wed, 18 Mar 2020 16:00:56 +0100},
  biburl       = {https://dblp.org/rec/conf/ima/MinematsuI11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/SuzakiM10,
  author       = {Tomoyasu Suzaki and
                  Kazuhiko Minematsu},
  editor       = {Seokhie Hong and
                  Tetsu Iwata},
  title        = {Improving the Generalized Feistel},
  booktitle    = {Fast Software Encryption, 17th International Workshop, {FSE} 2010,
                  Seoul, Korea, February 7-10, 2010, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {6147},
  pages        = {19--39},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-13858-4\_2},
  doi          = {10.1007/978-3-642-13858-4\_2},
  timestamp    = {Tue, 14 May 2019 10:00:54 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/SuzakiM10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/Minematsu10,
  author       = {Kazuhiko Minematsu},
  editor       = {Seokhie Hong and
                  Tetsu Iwata},
  title        = {How to Thwart Birthday Attacks against MACs via Small Randomness},
  booktitle    = {Fast Software Encryption, 17th International Workshop, {FSE} 2010,
                  Seoul, Korea, February 7-10, 2010, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {6147},
  pages        = {230--249},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-13858-4\_13},
  doi          = {10.1007/978-3-642-13858-4\_13},
  timestamp    = {Tue, 26 Jun 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/Minematsu10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/MinematsuM09,
  author       = {Kazuhiko Minematsu and
                  Toshiyasu Matsushima},
  title        = {Generalization and Extension of XEX\({}^{\mbox{*}}\) Mode},
  journal      = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.},
  volume       = {92-A},
  number       = {2},
  pages        = {517--524},
  year         = {2009},
  url          = {https://doi.org/10.1587/transfun.E92.A.517},
  doi          = {10.1587/TRANSFUN.E92.A.517},
  timestamp    = {Sat, 11 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieicet/MinematsuM09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/Minematsu09,
  author       = {Kazuhiko Minematsu},
  editor       = {Orr Dunkelman},
  title        = {Beyond-Birthday-Bound Security Based on Tweakable Block Cipher},
  booktitle    = {Fast Software Encryption, 16th International Workshop, {FSE} 2009,
                  Leuven, Belgium, February 22-25, 2009, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {5665},
  pages        = {308--326},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-03317-9\_19},
  doi          = {10.1007/978-3-642-03317-9\_19},
  timestamp    = {Tue, 14 May 2019 10:00:54 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/Minematsu09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/MinematsuM07,
  author       = {Kazuhiko Minematsu and
                  Toshiyasu Matsushima},
  title        = {Improved MACs from Differentially-Uniform Permutations},
  journal      = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.},
  volume       = {90-A},
  number       = {12},
  pages        = {2908--2915},
  year         = {2007},
  url          = {https://doi.org/10.1093/ietfec/e90-a.12.2908},
  doi          = {10.1093/IETFEC/E90-A.12.2908},
  timestamp    = {Sat, 11 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieicet/MinematsuM07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/MinematsuM07,
  author       = {Kazuhiko Minematsu and
                  Toshiyasu Matsushima},
  editor       = {Alex Biryukov},
  title        = {New Bounds for PMAC, TMAC, and {XCBC}},
  booktitle    = {Fast Software Encryption, 14th International Workshop, {FSE} 2007,
                  Luxembourg, Luxembourg, March 26-28, 2007, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {4593},
  pages        = {434--451},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-74619-5\_27},
  doi          = {10.1007/978-3-540-74619-5\_27},
  timestamp    = {Sun, 25 Oct 2020 23:06:50 +0100},
  biburl       = {https://dblp.org/rec/conf/fse/MinematsuM07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/indocrypt/MinematsuM07,
  author       = {Kazuhiko Minematsu and
                  Toshiyasu Matsushima},
  editor       = {K. Srinathan and
                  C. Pandu Rangan and
                  Moti Yung},
  title        = {Tweakable Enciphering Schemes from Hash-Sum-Expansion},
  booktitle    = {Progress in Cryptology - {INDOCRYPT} 2007, 8th International Conference
                  on Cryptology in India, Chennai, India, December 9-13, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4859},
  pages        = {252--267},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-77026-8\_19},
  doi          = {10.1007/978-3-540-77026-8\_19},
  timestamp    = {Tue, 14 May 2019 10:00:51 +0200},
  biburl       = {https://dblp.org/rec/conf/indocrypt/MinematsuM07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijisec/TsunooTSKM06,
  author       = {Yukiyasu Tsunoo and
                  Etsuko Tsujihara and
                  Maki Shigeri and
                  Hiroyasu Kubo and
                  Kazuhiko Minematsu},
  title        = {Improving cache attacks by considering cipher structure},
  journal      = {Int. J. Inf. Sec.},
  volume       = {5},
  number       = {3},
  pages        = {166--176},
  year         = {2006},
  url          = {https://doi.org/10.1007/s10207-005-0079-7},
  doi          = {10.1007/S10207-005-0079-7},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijisec/TsunooTSKM06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/MinematsuT06,
  author       = {Kazuhiko Minematsu and
                  Yukiyasu Tsunoo},
  editor       = {Matthew J. B. Robshaw},
  title        = {Provably Secure MACs from Differentially-Uniform Permutations and
                  AES-Based Implementations},
  booktitle    = {Fast Software Encryption, 13th International Workshop, {FSE} 2006,
                  Graz, Austria, March 15-17, 2006, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {4047},
  pages        = {226--241},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11799313\_15},
  doi          = {10.1007/11799313\_15},
  timestamp    = {Tue, 14 May 2019 10:00:54 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/MinematsuT06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sacrypt/Minematsu06,
  author       = {Kazuhiko Minematsu},
  editor       = {Eli Biham and
                  Amr M. Youssef},
  title        = {Improved Security Analysis of {XEX} and {LRW} Modes},
  booktitle    = {Selected Areas in Cryptography, 13th International Workshop, {SAC}
                  2006, Montreal, Canada, August 17-18, 2006 Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {4356},
  pages        = {96--113},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/978-3-540-74462-7\_8},
  doi          = {10.1007/978-3-540-74462-7\_8},
  timestamp    = {Tue, 14 May 2019 10:00:38 +0200},
  biburl       = {https://dblp.org/rec/conf/sacrypt/Minematsu06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tit/TsunooSSKM05,
  author       = {Yukiyasu Tsunoo and
                  Teruo Saito and
                  Maki Shigeri and
                  Hiroyasu Kubo and
                  Kazuhiko Minematsu},
  title        = {Shorter bit sequence is enough to break stream cipher {LILI-128}},
  journal      = {{IEEE} Trans. Inf. Theory},
  volume       = {51},
  number       = {12},
  pages        = {4312--4319},
  year         = {2005},
  url          = {https://doi.org/10.1109/TIT.2005.859285},
  doi          = {10.1109/TIT.2005.859285},
  timestamp    = {Tue, 10 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tit/TsunooSSKM05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icisc/MinematsuT05,
  author       = {Kazuhiko Minematsu and
                  Yukiyasu Tsunoo},
  editor       = {Dongho Won and
                  Seungjoo Kim},
  title        = {Hybrid Symmetric Encryption Using Known-Plaintext Attack-Secure Components},
  booktitle    = {Information Security and Cryptology - {ICISC} 2005, 8th International
                  Conference, Seoul, Korea, December 1-2, 2005, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3935},
  pages        = {242--260},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11734727\_21},
  doi          = {10.1007/11734727\_21},
  timestamp    = {Tue, 14 May 2019 10:00:36 +0200},
  biburl       = {https://dblp.org/rec/conf/icisc/MinematsuT05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icisc/MinematsuT05a,
  author       = {Kazuhiko Minematsu and
                  Yukiyasu Tsunoo},
  editor       = {Dongho Won and
                  Seungjoo Kim},
  title        = {Expanding Weak {PRF} with Small Key Size},
  booktitle    = {Information Security and Cryptology - {ICISC} 2005, 8th International
                  Conference, Seoul, Korea, December 1-2, 2005, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3935},
  pages        = {284--298},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11734727\_24},
  doi          = {10.1007/11734727\_24},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icisc/MinematsuT05a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}