default search action
Tetsu Iwata
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
showing all ?? records
2020 – today
- 2024
- [j44]Kento Tsuji, Tetsu Iwata:
Feistel Ciphers Based on a Single Primitive. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 107(8): 1229-1240 (2024) - [j43]Ryunouchi Takeuchi, Yosuke Todo, Tetsu Iwata:
Key Recovery, Universal Forgery, and Committing Attacks against Revised Rocca: How Finalization Affects Security. IACR Trans. Symmetric Cryptol. 2024(2): 85-117 (2024) - [i46]Ryunosuke Takeuchi, Yosuke Todo, Tetsu Iwata:
Practical Committing Attacks against Rocca-S. IACR Cryptol. ePrint Arch. 2024: 901 (2024) - [i45]Akiko Inoue, Tetsu Iwata, Kazuhiko Minematsu:
Comprehensive Robustness Analysis of GCM, CCM, and OCB3. IACR Cryptol. ePrint Arch. 2024: 1339 (2024) - 2023
- [j42]Yu Long Chen, Antonio Flórez-Gutiérrez, Akiko Inoue, Ryoma Ito, Tetsu Iwata, Kazuhiko Minematsu, Nicky Mouha, Yusuke Naito, Ferdinand Sibleyras, Yosuke Todo:
Key Committing Security of AEZ and More. IACR Trans. Symmetric Cryptol. 2023(4): 452-488 (2023) - [c52]Kento Tsuji, Tetsu Iwata:
Feistel Ciphers Based on a Single Primitive. IMACC 2023: 57-79 - [c51]Isamu Furuya, Hayato Kasahara, Akiko Inoue, Kazuhiko Minematsu, Tetsu Iwata:
PMACrx: A Vector-Input MAC for High-Dimensional Vectors with BBB Security. IWSEC 2023: 77-97 - 2022
- [j41]Chun Guo, Tetsu Iwata, Kazuhiko Minematsu:
New indifferentiability security proof of MDPH hash function. IET Inf. Secur. 16(4): 262-281 (2022) - [j40]Makoto Habu, Kazuhiko Minematsu, Tetsu Iwata:
Matching attacks on Romulus-M. IET Inf. Secur. 16(6): 459-469 (2022) - [j39]Kazuo Shinagawa, Tetsu Iwata:
Quantum attacks on Sum of Even-Mansour pseudorandom functions. Inf. Process. Lett. 173: 106172 (2022) - [j38]Kyoji Shibutani, Tetsu Iwata:
On the (im)possibility of improving the round diffusion of generalized Feistel structures. Inf. Process. Lett. 174: 106197 (2022) - [j37]Akinori Hosoyamada, Akiko Inoue, Ryoma Ito, Tetsu Iwata, Kazuhiko Minematsu, Ferdinand Sibleyras, Yosuke Todo:
Cryptanalysis of Rocca and Feasibility of Its Security Claim. IACR Trans. Symmetric Cryptol. 2022(3): 123-151 (2022) - [j36]Kazuki Nakaya, Tetsu Iwata:
Generalized Feistel Structures Based on Tweakable Block Ciphers. IACR Trans. Symmetric Cryptol. 2022(4): 24-91 (2022) - [c50]Akiko Inoue, Tetsu Iwata, Kazuhiko Minematsu:
Analyzing the Provable Security Bounds of GIFT-COFB and Photon-Beetle. ACNS 2022: 67-84 - [i44]Akiko Inoue, Tetsu Iwata, Kazuhiko Minematsu:
Analyzing the Provable Security Bounds of GIFT-COFB and Photon-Beetle. IACR Cryptol. ePrint Arch. 2022: 1 (2022) - [i43]Makoto Habu, Kazuhiko Minematsu, Tetsu Iwata:
Matching Attacks on Romulus-M. IACR Cryptol. ePrint Arch. 2022: 369 (2022) - 2021
- [j35]Akinori Hosoyamada, Tetsu Iwata:
Indifferentiability of SKINNY-HASH Internal Functions. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 104-A(9): 1156-1162 (2021) - [j34]Akinori Hosoyamada, Tetsu Iwata:
Provably Quantum-Secure Tweakable Block Ciphers. IACR Trans. Symmetric Cryptol. 2021(1): 337-377 (2021) - [c49]Akinori Hosoyamada, Tetsu Iwata:
On Tight Quantum Security of HMAC and NMAC in the Quantum Random Oracle Model. CRYPTO (1) 2021: 585-615 - [i42]Akinori Hosoyamada, Tetsu Iwata:
On Tight Quantum Security of HMAC and NMAC in the Quantum Random Oracle Model. IACR Cryptol. ePrint Arch. 2021: 774 (2021) - [i41]Chun Guo, Tetsu Iwata, Kazuhiko Minematsu:
New Indifferentiability Security Proof of MDPH Hash Function. IACR Cryptol. ePrint Arch. 2021: 1469 (2021) - 2020
- [j33]Avik Chakraborti, Tetsu Iwata, Kazuhiko Minematsu, Mridul Nandi:
Blockcipher-Based Authenticated Encryption: How Small Can We Go? J. Cryptol. 33(3): 703-741 (2020) - [j32]Akiko Inoue, Tetsu Iwata, Kazuhiko Minematsu, Bertram Poettering:
Cryptanalysis of OCB2: Attacks on Authenticity and Confidentiality. J. Cryptol. 33(4): 1871-1913 (2020) - [j31]Tetsu Iwata, Mustafa Khairallah, Kazuhiko Minematsu, Thomas Peyrin:
Duel of the Titans: The Romulus and Remus Families of Lightweight AEAD Algorithms. IACR Trans. Symmetric Cryptol. 2020(1): 43-120 (2020) - [j30]Ryota Nakamichi, Tetsu Iwata:
Beyond-Birthday-Bound Secure Cryptographic Permutations from Ideal Ciphers with Long Keys. IACR Trans. Symmetric Cryptol. 2020(2): 68-92 (2020) - [i40]Subhadeep Banik, Avik Chakraborti, Tetsu Iwata, Kazuhiko Minematsu, Mridul Nandi, Thomas Peyrin, Yu Sasaki, Siang Meng Sim, Yosuke Todo:
GIFT-COFB. IACR Cryptol. ePrint Arch. 2020: 738 (2020) - [i39]Akinori Hosoyamada, Tetsu Iwata:
Provably Quantum-Secure Tweakable Block Ciphers. IACR Cryptol. ePrint Arch. 2020: 1321 (2020) - [i38]Akinori Hosoyamada, Tetsu Iwata:
Indifferentiability of SKINNY-HASH Internal Functions. IACR Cryptol. ePrint Arch. 2020: 1344 (2020)
2010 – 2019
- 2019
- [j29]Zhenzhen Bao, Jian Guo, Tetsu Iwata, Kazuhiko Minematsu:
ZOCB and ZOTR: Tweakable Blockcipher Modes for Authenticated Encryption with Full Absorption. IACR Trans. Symmetric Cryptol. 2019(2): 1-54 (2019) - [j28]Ryota Nakamichi, Tetsu Iwata:
Iterative Block Ciphers from Tweakable Block Ciphers with Long Tweaks. IACR Trans. Symmetric Cryptol. 2019(4): 54-80 (2019) - [c48]Akinori Hosoyamada, Tetsu Iwata:
4-Round Luby-Rackoff Construction is a qPRP. ASIACRYPT (1) 2019: 145-174 - [c47]Akiko Inoue, Tetsu Iwata, Kazuhiko Minematsu, Bertram Poettering:
Cryptanalysis of OCB2: Attacks on Authenticity and Confidentiality. CRYPTO (1) 2019: 3-31 - [c46]Tetsu Iwata, Virginie Lallemand, Gregor Leander, Yu Sasaki:
Universal Forgery and Multiple Forgeries of MergeMAC and Generalized Constructions. CT-RSA 2019: 293-312 - [c45]Gembu Ito, Akinori Hosoyamada, Ryutaroh Matsumoto, Yu Sasaki, Tetsu Iwata:
Quantum Chosen-Ciphertext Attacks Against Feistel Ciphers. CT-RSA 2019: 391-411 - [c44]Boyu Ni, Gembu Ito, Xiaoyang Dong, Tetsu Iwata:
Quantum Attacks Against Type-1 Generalized Feistel Ciphers and Applications to CAST-256. INDOCRYPT 2019: 433-455 - [i37]Akinori Hosoyamada, Tetsu Iwata:
Tight Quantum Security Bound of the 4-Round Luby-Rackoff Construction. IACR Cryptol. ePrint Arch. 2019: 243 (2019) - [i36]Akiko Inoue, Tetsu Iwata, Kazuhiko Minematsu, Bertram Poettering:
Cryptanalysis of OCB2: Attacks on Authenticity and Confidentiality. IACR Cryptol. ePrint Arch. 2019: 311 (2019) - [i35]Gembu Ito, Tetsu Iwata:
Quantum Distinguishing Attacks against Type-1 Generalized Feistel Ciphers. IACR Cryptol. ePrint Arch. 2019: 327 (2019) - [i34]Zhenzhen Bao, Jian Guo, Tetsu Iwata, Kazuhiko Minematsu:
ZOCB and ZOTR: Tweakable Blockcipher Modes for Authenticated Encryption with Full Absorption. IACR Cryptol. ePrint Arch. 2019: 600 (2019) - [i33]Tetsu Iwata, Mustafa Khairallah, Kazuhiko Minematsu, Thomas Peyrin:
Duel of the Titans: The Romulus and Remus Families of Lightweight AEAD Algorithms. IACR Cryptol. ePrint Arch. 2019: 992 (2019) - 2018
- [j27]Kota Kondo, Yu Sasaki, Yosuke Todo, Tetsu Iwata:
On the Design Rationale of SIMON Block Cipher: Integral Attacks and Impossible Differential Attacks against SIMON Variants. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 101-A(1): 88-98 (2018) - [j26]Kazuya Imamura, Kazuhiko Minematsu, Tetsu Iwata:
Integrity analysis of authenticated encryption based on stream ciphers. Int. J. Inf. Sec. 17(5): 493-511 (2018) - [j25]Patrick Derbez, Tetsu Iwata, Ling Sun, Siwei Sun, Yosuke Todo, Haoyang Wang, Meiqin Wang:
Cryptanalysis of AES-PRF and Its Dual. IACR Trans. Symmetric Cryptol. 2018(2): 161-191 (2018) - [e7]Debrup Chakraborty, Tetsu Iwata:
Progress in Cryptology - INDOCRYPT 2018 - 19th International Conference on Cryptology in India, New Delhi, India, December 9-12, 2018, Proceedings. Lecture Notes in Computer Science 11356, Springer 2018, ISBN 978-3-030-05377-2 [contents] - [i32]Joan Daemen, Tetsu Iwata, Nils Gregor Leander, Kaisa Nyberg:
Symmetric Cryptography (Dagstuhl Seminar 18021). Dagstuhl Reports 8(1): 1-32 (2018) - [i31]Tetsu Iwata, Virginie Lallemand, Gregor Leander, Yu Sasaki:
Universal Forgery and Multiple Forgeries of MergeMAC and Generalized Constructions. IACR Cryptol. ePrint Arch. 2018: 793 (2018) - [i30]Tetsu Iwata:
Plaintext Recovery Attack of OCB2. IACR Cryptol. ePrint Arch. 2018: 1090 (2018) - [i29]Gembu Ito, Akinori Hosoyamada, Ryutaroh Matsumoto, Yu Sasaki, Tetsu Iwata:
Quantum Chosen-Ciphertext Attacks against Feistel Ciphers. IACR Cryptol. ePrint Arch. 2018: 1193 (2018) - 2017
- [j24]Hiraku Morita, Jacob C. N. Schuldt, Takahiro Matsuda, Goichiro Hanaoka, Tetsu Iwata:
On the Security of Schnorr Signatures, DSA, and ElGamal Signatures against Related-Key Attacks. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 100-A(1): 73-90 (2017) - [j23]Hiraku Morita, Jacob C. N. Schuldt, Takahiro Matsuda, Goichiro Hanaoka, Tetsu Iwata:
On the Security of Non-Interactive Key Exchange against Related-Key Attacks. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 100-A(9): 1910-1923 (2017) - [j22]Kazuhiko Minematsu, Tetsu Iwata:
Cryptanalysis of PMACx, PMAC2x, and SIVx. IACR Trans. Symmetric Cryptol. 2017(2): 162-176 (2017) - [j21]Tetsu Iwata, Yannick Seurin:
Reconsidering the Security Bound of AES-GCM-SIV. IACR Trans. Symmetric Cryptol. 2017(4): 240-267 (2017) - [c43]Avik Chakraborti, Tetsu Iwata, Kazuhiko Minematsu, Mridul Nandi:
Blockcipher-Based Authenticated Encryption: How Small Can We Go? CHES 2017: 277-298 - [c42]Tetsu Iwata, Kazuhiko Minematsu, Thomas Peyrin, Yannick Seurin:
ZMAC: A Fast Tweakable Block Cipher Mode for Highly Secure Message Authentication. CRYPTO (3) 2017: 34-65 - [c41]Kota Kondo, Yu Sasaki, Yosuke Todo, Tetsu Iwata:
Analyzing Key Schedule of Simon: Iterative Key Differences and Application to Related-Key Impossible Differentials. IWSEC 2017: 141-158 - [i28]Kazuhiko Minematsu, Tetsu Iwata:
Cryptanalysis of PMACx, PMAC2x, and SIVx. IACR Cryptol. ePrint Arch. 2017: 220 (2017) - [i27]Tetsu Iwata, Kazuhiko Minematsu, Thomas Peyrin, Yannick Seurin:
ZMAC: A Fast Tweakable Block Cipher Mode for Highly Secure Message Authentication. IACR Cryptol. ePrint Arch. 2017: 535 (2017) - [i26]Avik Chakraborti, Tetsu Iwata, Kazuhiko Minematsu, Mridul Nandi:
Blockcipher-based Authenticated Encryption: How Small Can We Go? IACR Cryptol. ePrint Arch. 2017: 649 (2017) - [i25]Tetsu Iwata, Yannick Seurin:
Reconsidering the Security Bound of AES-GCM-SIV. IACR Cryptol. ePrint Arch. 2017: 708 (2017) - 2016
- [j20]Tetsu Iwata, Kazuhiko Minematsu:
Stronger Security Variants of GCM-SIV. IACR Trans. Symmetric Cryptol. 2016(1): 134-157 (2016) - [c40]Kota Kondo, Yu Sasaki, Tetsu Iwata:
On the Design Rationale of Simon Block Cipher: Integral Attacks and Impossible Differential Attacks against Simon Variants. ACNS 2016: 518-536 - [c39]Kazuya Imamura, Kazuhiko Minematsu, Tetsu Iwata:
Integrity Analysis of Authenticated Encryption Based on Stream Ciphers. ProvSec 2016: 257-276 - [i24]Frederik Armknecht, Tetsu Iwata, Kaisa Nyberg, Bart Preneel:
Symmetric Cryptography (Dagstuhl Seminar 16021). Dagstuhl Reports 6(1): 34-54 (2016) - [i23]Kota Kondo, Yu Sasaki, Tetsu Iwata:
On the Design Rationale of SIMON Block Cipher: Integral Attacks and Impossible Differential Attacks against SIMON Variants. IACR Cryptol. ePrint Arch. 2016: 625 (2016) - [i22]Tetsu Iwata, Kazuhiko Minematsu:
Stronger Security Variants of GCM-SIV. IACR Cryptol. ePrint Arch. 2016: 853 (2016) - [i21]Tetsu Iwata, Bart Mennink, Damian Vizár:
CENC is Optimally Secure. IACR Cryptol. ePrint Arch. 2016: 1087 (2016) - [i20]Kazuya Imamura, Kazuhiko Minematsu, Tetsu Iwata:
Integrity Analysis of Authenticated Encryption Based on Stream Ciphers. IACR Cryptol. ePrint Arch. 2016: 1124 (2016) - 2015
- [j19]Hayato Kobayashi, Kazuhiko Minematsu, Tetsu Iwata:
Optimality of Tweak Functions in CLOC. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 98-A(10): 2152-2164 (2015) - [c38]Yuichi Niwa, Keisuke Ohashi, Kazuhiko Minematsu, Tetsu Iwata:
GCM Security Bounds Reconsidered. FSE 2015: 385-407 - [c37]Hiraku Morita, Jacob C. N. Schuldt, Takahiro Matsuda, Goichiro Hanaoka, Tetsu Iwata:
On the Security of the Schnorr Signature Scheme and DSA Against Related-Key Attacks. ICISC 2015: 20-35 - [c36]Kazuhiko Minematsu, Tetsu Iwata:
Tweak-Length Extension for Tweakable Blockciphers. IMACC 2015: 77-93 - [e6]Tetsu Iwata, Jung Hee Cheon:
Advances in Cryptology - ASIACRYPT 2015 - 21st International Conference on the Theory and Application of Cryptology and Information Security, Auckland, New Zealand, November 29 - December 3, 2015, Proceedings, Part I. Lecture Notes in Computer Science 9452, Springer 2015, ISBN 978-3-662-48796-9 [contents] - [e5]Tetsu Iwata, Jung Hee Cheon:
Advances in Cryptology - ASIACRYPT 2015 - 21st International Conference on the Theory and Application of Cryptology and Information Security, Auckland, New Zealand, November 29 - December 3, 2015, Proceedings, Part II. Lecture Notes in Computer Science 9453, Springer 2015, ISBN 978-3-662-48799-0 [contents] - [i19]Yuichi Niwa, Keisuke Ohashi, Kazuhiko Minematsu, Tetsu Iwata:
GCM Security Bounds Reconsidered. IACR Cryptol. ePrint Arch. 2015: 214 (2015) - [i18]Kazuhiko Minematsu, Tetsu Iwata:
Tweak-Length Extension for Tweakable Blockciphers. IACR Cryptol. ePrint Arch. 2015: 888 (2015) - [i17]Hiraku Morita, Jacob C. N. Schuldt, Takahiro Matsuda, Goichiro Hanaoka, Tetsu Iwata:
On the Security of the Schnorr Signature Scheme and DSA against Related-Key Attacks. IACR Cryptol. ePrint Arch. 2015: 1135 (2015) - 2014
- [j18]Yuki Asano, Shingo Yanagihara, Tetsu Iwata:
Cryptanalysis of 249-, 250-, ..., 256-Bit Key HyRAL via Equivalent Keys. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 97-A(1): 371-383 (2014) - [j17]Shingo Yanagihara, Tetsu Iwata:
Type 1.x Generalized Feistel Structures. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 97-A(4): 952-963 (2014) - [c35]Tetsu Iwata, Kazuhiko Minematsu, Jian Guo, Sumio Morioka:
CLOC: Authenticated Encryption for Short Input. FSE 2014: 149-167 - [c34]Tetsu Iwata, Lei Wang:
Impact of ANSI X9.24-1: 2009 Key Check Value on ISO/IEC 9797-1: 2011 MACs. FSE 2014: 303-322 - [e4]Palash Sarkar, Tetsu Iwata:
Advances in Cryptology - ASIACRYPT 2014 - 20th International Conference on the Theory and Application of Cryptology and Information Security, Kaoshiung, Taiwan, R.O.C., December 7-11, 2014. Proceedings, Part I. Lecture Notes in Computer Science 8873, Springer 2014, ISBN 978-3-662-45610-1 [contents] - [e3]Palash Sarkar, Tetsu Iwata:
Advances in Cryptology - ASIACRYPT 2014 - 20th International Conference on the Theory and Application of Cryptology and Information Security, Kaoshiung, Taiwan, R.O.C., December 7-11, 2014, Proceedings, Part II. Lecture Notes in Computer Science 8874, Springer 2014, ISBN 978-3-662-45607-1 [contents] - [i16]Frederik Armknecht, Helena Handschuh, Tetsu Iwata, Bart Preneel:
Symmetric Cryptography (Dagstuhl Seminar 14021). Dagstuhl Reports 4(1): 1-16 (2014) - [i15]Tetsu Iwata, Kazuhiko Minematsu, Jian Guo, Sumio Morioka:
CLOC: Authenticated Encryption for Short Input. IACR Cryptol. ePrint Arch. 2014: 157 (2014) - [i14]Tetsu Iwata, Lei Wang:
Impact of ANSI X9.24-1: 2009 Key Check Value on ISO/IEC 9797-1: 2011 MACs. IACR Cryptol. ePrint Arch. 2014: 183 (2014) - 2013
- [j16]Shingo Yanagihara, Tetsu Iwata:
Improving the Permutation Layer of Type 1, Type 3, Source-Heavy, and Target-Heavy Generalized Feistel Structures. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 96-A(1): 2-14 (2013) - [j15]Yasushi Osaki, Tetsu Iwata:
Security of Hash-then-CBC Key Wrapping Revisited. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 96-A(1): 25-34 (2013) - [c33]Kazuhiko Minematsu, Stefan Lucks, Hiraku Morita, Tetsu Iwata:
Attacks and Security Proofs of EAX-Prime. FSE 2013: 327-347 - [c32]Kazuhiko Minematsu, Stefan Lucks, Tetsu Iwata:
Improved Authenticity Bound of EAX, and Refinements. ProvSec 2013: 184-201 - [i13]Kazuhiko Minematsu, Stefan Lucks, Tetsu Iwata:
Improved Authenticity Bound of EAX, and Refinements. IACR Cryptol. ePrint Arch. 2013: 792 (2013) - 2012
- [j14]Yasushi Osaki, Tetsu Iwata:
Further More on Key Wrapping. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 95-A(1): 8-20 (2012) - [c31]Yuki Asano, Shingo Yanagihara, Tetsu Iwata:
Cryptanalysis of 256-Bit Key HyRAL via Equivalent Keys. ACNS 2012: 257-274 - [c30]Tetsu Iwata, Keisuke Ohashi, Kazuhiko Minematsu:
Breaking and Repairing GCM Security Proofs. CRYPTO 2012: 31-49 - [i12]Kazuhiko Minematsu, Hiraku Morita, Tetsu Iwata:
Cryptanalysis of EAXprime. IACR Cryptol. ePrint Arch. 2012: 18 (2012) - [i11]Tetsu Iwata, Keisuke Ohashi, Kazuhiko Minematsu:
Breaking and Repairing GCM Security Proofs. IACR Cryptol. ePrint Arch. 2012: 438 (2012) - 2011
- [c29]Shingo Yanagihara, Tetsu Iwata:
On Permutation Layer of Type 1, Source-Heavy, and Target-Heavy Generalized Feistel Structures. CANS 2011: 98-117 - [c28]Kazuhiko Minematsu, Tetsu Iwata:
Building Blockcipher from Tweakable Blockcipher: Extending FSE 2009 Proposal. IMACC 2011: 391-412 - [c27]Yasushi Osaki, Tetsu Iwata:
Security of Hash-then-CBC Key Wrapping Revisited. IMACC 2011: 413-430 - [e2]Tetsu Iwata, Masakatsu Nishigaki:
Advances in Information and Computer Security - 6th International Workshop, IWSEC 2011, Tokyo, Japan, November 8-10, 2011. Proceedings. Lecture Notes in Computer Science 7038, Springer 2011, ISBN 978-3-642-25140-5 [contents] - 2010
- [j13]Atsushi Mitsuda, Tetsu Iwata:
Tweakable Pseudorandom Permutation from Generalized Feistel Structure. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 93-A(1): 13-21 (2010) - [j12]Shungo Nakamura, Tetsu Iwata:
MPP Characteristics of Variants of Merkle-Damgård Iterated Hash Functions. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 93-A(1): 93-101 (2010) - [e1]Seokhie Hong, Tetsu Iwata:
Fast Software Encryption, 17th International Workshop, FSE 2010, Seoul, Korea, February 7-10, 2010, Revised Selected Papers. Lecture Notes in Computer Science 6147, Springer 2010, ISBN 978-3-642-13857-7 [contents]
2000 – 2009
- 2009
- [c26]Tetsu Iwata, Kan Yasuda:
HBS: A Single-Key Mode of Operation for Deterministic Authenticated Encryption. FSE 2009: 394-415 - [c25]Tetsu Iwata, Kan Yasuda:
BTM: A Single-Key, Inverse-Cipher-Free Mode for Deterministic Authenticated Encryption. Selected Areas in Cryptography 2009: 313-330 - 2008
- [j11]Tetsu Iwata, Tohru Yagi, Kaoru Kurosawa:
Security of the Five-Round Kasumi Type Permutation. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 91-A(1): 30-38 (2008) - [c24]Tetsu Iwata:
Authenticated Encryption Mode for Beyond the Birthday Bound Security. AFRICACRYPT 2008: 125-142 - [c23]Atsushi Mitsuda, Tetsu Iwata:
Tweakable Pseudorandom Permutation from Generalized Feistel Structure. ProvSec 2008: 22-37 - [c22]Kyohei Suzuki, Tetsu Iwata:
Bounds on Fixed Input/Output Length Post-processing Functions for Biased Physical Random Number Generators. Selected Areas in Cryptography 2008: 373-386 - 2007
- [j10]Tetsu Iwata, Kaoru Kurosawa:
How to Construct Super-Pseudorandom Permutations with Short Keys. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 90-A(1): 2-13 (2007) - [c21]Taizo Shirai, Kyoji Shibutani, Toru Akishita, Shiho Moriai, Tetsu Iwata:
The 128-Bit Blockcipher CLEFIA (Extended Abstract). FSE 2007: 181-195 - [i10]Tetsu Iwata:
Tightness of the Security Bound of CENC. Symmetric Cryptography 2007 - 2006
- [j9]Katsuyuki Okeya, Tetsu Iwata:
Side Channel Attacks on Message Authentication Codes. Inf. Media Technol. 1(2): 942-952 (2006) - [c20]Tetsu Iwata:
New Blockcipher Modes of Operation with Beyond the Birthday Bound Security. FSE 2006: 310-327 - [i9]Tetsu Iwata:
New Blockcipher Modes of Operation with Beyond the Birthday Bound Security. IACR Cryptol. ePrint Arch. 2006: 188 (2006) - [i8]JunHyuk Song, Radha Poovendran, Jicheol Lee, Tetsu Iwata:
The AES-CMAC Algorithm. RFC 4493: 1-20 (2006) - [i7]JunHyuk Song, Radha Poovendran, Jicheol Lee, Tetsu Iwata:
The Advanced Encryption Standard-Cipher-based Message Authentication Code-Pseudo-Random Function-128 (AES-CMAC-PRF-128) Algorithm for the Internet Key Exchange Protocol (IKE). RFC 4615: 1-7 (2006) - 2005
- [j8]Kaoru Kurosawa, Tetsu Iwata, Quang Viet Duong:
How to Improve Interpolation Attack. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 88-A(1): 9-15 (2005) - [j7]Tetsu Iwata, Kaoru Kurosawa:
On the Security of a MAC by Mitchell. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 88-A(1): 25-32 (2005) - [c19]Katsuyuki Okeya, Tetsu Iwata:
Side Channel Attacks on Message Authentication Codes. ESAS 2005: 205-217