Kan Yasuda

From MaRDI portal
Person:1633455

Available identifiers

zbMath Open yasuda.kanMaRDI QIDQ1633455

List of research outcomes





PublicationDate of PublicationType
Making the identity-based Diffie-Hellman key exchange efficiently revocable2024-10-16Paper
The COLM Authenticated Encryption Scheme2024-04-21Paper
A modular approach to the incompressibility of block-cipher-based AEADs2023-08-16Paper
Optimizing Online Permutation-Based AE Schemes for Lightweight Applications2022-12-09Paper
Rate-one AE with security under RUP2022-11-02Paper
\(\mathsf{DWCDM}_+\): a BBB secure nonce based MAC2019-09-19Paper
Beyond conventional security in sponge-based authenticated encryption modes2019-08-13Paper
Building quantum-one-way functions from block ciphers: Davies-Meyer and Merkle-Damgård constructions2018-12-20Paper
Encrypt or decrypt -- to make a single-key beyond birthday secure nonce-based MAC2018-09-12Paper
New bounds for keyed sponges with extendable output: independence between capacity and message length2018-05-09Paper
A MAC mode for lightweight block ciphers2018-05-09Paper
On the influence of message length in PMAC's security bounds2016-09-09Paper
A New Mode of Operation for Incremental Authenticated Encryption with Associated Data2016-05-19Paper
How to incorporate associated data in sponge-based authenticated encryption2016-03-02Paper
Generalizing PMAC under weaker assumptions2015-10-20Paper
COBRA: a parallelizable authenticated online cipher without block cipher inverse2015-09-18Paper
APE: authenticated permutation-based encryption for lightweight cryptography2015-09-18Paper
How to securely release unverified plaintext in authenticated encryption2015-01-16Paper
Generic state-recovery and forgery attacks on chopmd-MAC and on NMAC/HMAC2014-09-15Paper
Parallelizable and authenticated online ciphers2013-12-10Paper
The security of the OCB mode of operation without the SPRP assumption2013-10-23Paper
The Security and Performance of “GCM” when Short Multiplications Are Used Instead2013-05-28Paper
PMAC with parity: minimizing the query-length influence2012-06-08Paper
A new variant of PMAC: beyond the birthday bound2011-08-12Paper
Known-key distinguishers on 11-round Feistel and collision attacks on its hashing modes2011-07-07Paper
The sum of CBC MACs is a secure PRF2010-03-16Paper
BTM: a single-key, inverse-cipher-free mode for deterministic authenticated encryption2009-12-09Paper
HBS: A Single-Key Mode of Operation for Deterministic Authenticated Encryption2009-08-11Paper
A Double-Piped Mode of Operation for MACs, PRFs and PROs: Security beyond the Birthday Barrier2009-05-12Paper
“Sandwich” Is Indeed Secure: How to Authenticate a Message with Just One Hashing2009-03-06Paper
How to Fill Up Merkle-Damgård Hash Functions2009-02-10Paper
A One-Pass Mode of Operation for Deterministic Message Authentication— Security beyond the Birthday Barrier2008-09-18Paper
Boosting Merkle-Damgård Hashing for Message Authentication2008-05-15Paper
Multilane HMAC— Security beyond the Birthday Limit2008-04-11Paper
Magic "Squares" Indeed!2001-11-26Paper

Research outcomes over time

This page was built for person: Kan Yasuda