The following pages link to Yusuke Naito (Q1698648):
Displaying 27 items.
- Output masking of tweakable Even-Mansour can be eliminated for message authentication code (Q1698650) (← links)
- Blockcipher-based MACs: beyond the birthday bound without message length (Q1701456) (← links)
- Keyed sponge with prefix-free padding: independence between capacity and online queries without the suffix key (Q1784453) (← links)
- Sandwich construction for keyed sponges: independence between capacity and online queries (Q1801199) (← links)
- Indifferentiability of double-block-length hash function without feed-forward operations (Q2014605) (← links)
- Lightweight authenticated encryption mode suitable for threshold implementation (Q2119030) (← links)
- A highly secure MAC from tweakable blockciphers with support for short tweaks (Q2183950) (← links)
- Optimally indifferentiable double-block-length hashing without post-processing and with support for longer key than single block (Q2284105) (← links)
- Improved security bound of LightMAC\_Plus and its single-key variant (Q2287526) (← links)
- Improved XKX-based AEAD scheme: removing the birthday terms (Q2303108) (← links)
- Replacing SHA-2 with SHA-3 Enhances Generic Security of $$\mathtt {HMAC}$$ (Q2799032) (← links)
- How to Construct Sufficient Conditions for Hash Functions (Q2876979) (← links)
- Blockcipher-Based Double-Length Hash Functions for Pseudorandom Oracles (Q2889880) (← links)
- Improved Indifferentiable Security Analysis of PHOTON (Q2922666) (← links)
- Security of Practical Cryptosystems Using Merkle-Damgård Hash Function in the Ideal Cipher Model (Q3092365) (← links)
- Generic State-Recovery and Forgery Attacks on ChopMD-MAC and on NMAC/HMAC (Q3190016) (← links)
- Full PRF-Secure Message Authentication Code Based on Tweakable Block Cipher (Q3467161) (← links)
- A New Strategy for Finding a Differential Path of SHA-1 (Q3608903) (← links)
- How to Confirm Cryptosystems Security: The Original Merkle-Damgård Is Still Alive! (Q3650704) (← links)
- New Bounds for Keyed Sponges with Extendable Output: Independence Between Capacity and Message Length (Q4639468) (← links)
- Reset Indifferentiability from Weakened Random Oracle Salvages One-Pass Hash Functions (Q5168544) (← links)
- Improved Collision Search for SHA-0 (Q5459067) (← links)
- Information Security and Cryptology - ICISC 2005 (Q5899286) (← links)
- KIVR: committing authenticated encryption using redundancy and application to GCM, CCM, and more (Q6547985) (← links)
- The multi-user security of MACs via universal hashing in the ideal cipher model (Q6636105) (← links)
- The exact multi-user security of 2-key triple DES (Q6636107) (← links)
- The exact multi-user security of (tweakable) key alternating ciphers with a single permutation (Q6636386) (← links)