Kan Yasuda

From MaRDI portal
Person:1633455

Available identifiers

zbMath Open yasuda.kanMaRDI QIDQ1633455

List of research outcomes





PublicationDate of PublicationType
Making the identity-based Diffie-Hellman key exchange efficiently revocable2024-10-16Paper
The COLM Authenticated Encryption Scheme2024-04-21Paper
A modular approach to the incompressibility of block-cipher-based AEADs2023-08-16Paper
Optimizing Online Permutation-Based AE Schemes for Lightweight Applications2022-12-09Paper
Rate-one AE with security under RUP2022-11-02Paper
\(\mathsf{DWCDM}_+\): a BBB secure nonce based MAC2019-09-19Paper
Beyond conventional security in sponge-based authenticated encryption modes2019-08-13Paper
Building quantum-one-way functions from block ciphers: Davies-Meyer and Merkle-Damgård constructions2018-12-20Paper
Encrypt or decrypt -- to make a single-key beyond birthday secure nonce-based MAC2018-09-12Paper
New Bounds for Keyed Sponges with Extendable Output: Independence Between Capacity and Message Length2018-05-09Paper
A MAC Mode for Lightweight Block Ciphers2018-05-09Paper
On the Influence of Message Length in PMAC’s Security Bounds2016-09-09Paper
A New Mode of Operation for Incremental Authenticated Encryption with Associated Data2016-05-19Paper
How to Incorporate Associated Data in Sponge-Based Authenticated Encryption2016-03-02Paper
Generalizing PMAC Under Weaker Assumptions2015-10-20Paper
COBRA: A Parallelizable Authenticated Online Cipher Without Block Cipher Inverse2015-09-18Paper
APE: Authenticated Permutation-Based Encryption for Lightweight Cryptography2015-09-18Paper
How to Securely Release Unverified Plaintext in Authenticated Encryption2015-01-16Paper
Generic State-Recovery and Forgery Attacks on ChopMD-MAC and on NMAC/HMAC2014-09-15Paper
Parallelizable and Authenticated Online Ciphers2013-12-10Paper
The Security of the OCB Mode of Operation without the SPRP Assumption2013-10-23Paper
The Security and Performance of “GCM” when Short Multiplications Are Used Instead2013-05-28Paper
PMAC with Parity: Minimizing the Query-Length Influence2012-06-08Paper
A New Variant of PMAC: Beyond the Birthday Bound2011-08-12Paper
Known-Key Distinguishers on 11-Round Feistel and Collision Attacks on Its Hashing Modes2011-07-07Paper
The Sum of CBC MACs Is a Secure PRF2010-03-16Paper
BTM: a single-key, inverse-cipher-free mode for deterministic authenticated encryption2009-12-09Paper
HBS: A Single-Key Mode of Operation for Deterministic Authenticated Encryption2009-08-11Paper
A Double-Piped Mode of Operation for MACs, PRFs and PROs: Security beyond the Birthday Barrier2009-05-12Paper
“Sandwich” Is Indeed Secure: How to Authenticate a Message with Just One Hashing2009-03-06Paper
How to Fill Up Merkle-Damgård Hash Functions2009-02-10Paper
A One-Pass Mode of Operation for Deterministic Message Authentication— Security beyond the Birthday Barrier2008-09-18Paper
Boosting Merkle-Damgård Hashing for Message Authentication2008-05-15Paper
Multilane HMAC— Security beyond the Birthday Limit2008-04-11Paper
Magic "Squares" Indeed!2001-11-26Paper

Research outcomes over time

This page was built for person: Kan Yasuda