Kazuhiko Minematsu

From MaRDI portal
Person:778906


List of research outcomes

This list is not complete and representing at the moment only items from zbMATH Open and arXiv. We are working on additional sources - please check back here soon!

PublicationDate of PublicationType
Interactive aggregate message authentication equipped with detecting functionality from adaptive group testing
Designs, Codes and Cryptography
2024-12-11Paper
Compactly committing authenticated encryption using encryptment and tweakable block cipher
 
2024-10-16Paper
Parallel verification of serial MAC and AE modes
 
2024-10-14Paper
Property-preserving hash functions and combinatorial group testing
 
2024-06-25Paper
Tweakable TWINE: Building a Tweakable Block Cipher on Generalized Feistel Structure
 
2024-03-14Paper
XOCB: beyond-birthday-bound secure authenticated encryption mode with rate-one computation
Advances in Cryptology – EUROCRYPT 2023
2023-12-08Paper
Authenticated encryption for very short inputs
Topics in Cryptology – CT-RSA 2023
2023-10-04Paper
Tight lower bounds and optimal constructions of anonymous broadcast encryption and authentication
Designs, Codes and Cryptography
2023-06-20Paper
Analyzing the provable security bounds of GIFT-COFB and Photon-Beetle
 
2022-11-09Paper
Symmetric-key corruption detection: when XOR-MACs meet combinatorial group testing
 
2022-08-25Paper
Efficient message authentication codes with combinatorial group testing
Computer Security -- ESORICS 2015
2022-08-19Paper
WARP: revisiting GFN for lightweight 128-bit block cipher
 
2022-03-25Paper
ACE in chains: how risky is CBC encryption of binary executable files?
 
2021-02-23Paper
Cryptanalysis of OCB2: attacks on authenticity and confidentiality
Journal of Cryptology
2020-11-06Paper
Plaintext recovery attacks against XTS beyond collisions
 
2020-07-21Paper
A lightweight alternative to PMAC
 
2020-07-21Paper
Parallelizable authenticated encryption with small state size
 
2020-07-21Paper
Blockcipher-based authenticated encryption: how small can we go?
Lecture Notes in Computer Science
2020-06-24Paper
Blockcipher-based authenticated encryption: how small can we go?
Journal of Cryptology
2020-06-15Paper
Cryptanalysis of OCB2: attacks on authenticity and confidentiality
Advances in Cryptology – CRYPTO 2019
2020-05-20Paper
XHX -- a framework for optimally secure tweakable block ciphers from classical block ciphers and universal hashing
 
2020-03-02Paper
Count-then-permute: a precision-free alternative to inversion sampling
 
2020-01-21Paper
Connecting tweakable and multi-key blockcipher security
Designs, Codes and Cryptography
2018-04-06Paper
ZMAC: a fast tweakable block cipher mode for highly secure message authentication
 
2017-10-27Paper
Integrity Analysis of Authenticated Encryption Based on Stream Ciphers
Provable Security
2017-01-06Paper
Authenticated encryption with small stretch (or, how to accelerate AERO)
Information Security and Privacy
2016-09-02Paper
Tweak-length extension for tweakable blockciphers
Cryptography and Coding
2016-01-12Paper
$\textnormal{\textsc{TWINE}}$: A Lightweight Block Cipher for Multiple Platforms
Selected Areas in Cryptography
2015-12-04Paper
CLOC: authenticated encryption for short input
Fast Software Encryption
2015-09-18Paper
GCM security bounds reconsidered
Fast Software Encryption
2015-09-18Paper
Attacks and security proofs of EAX-prime
Fast Software Encryption
2015-09-18Paper
Building blockcipher from small-block tweakable blockcipher
Designs, Codes and Cryptography
2015-03-12Paper
Parallelizable Rate-1 Authenticated Encryption from Pseudorandom Functions
Advances in Cryptology – EUROCRYPT 2014
2014-05-27Paper
Improved authenticity bound of EAX, and refinements
Provable Security
2013-10-23Paper
A short universal hash function from bit rotation, and applications to blockcipher modes
Provable Security
2013-10-23Paper
Breaking and repairing GCM security proofs
Lecture Notes in Computer Science
2012-09-25Paper
Building blockcipher from tweakable blockcipher: extending FSE 2009 proposal
Cryptography and Coding
2011-12-16Paper
On maximum differential probability of generalized Feistel
Information Security and Privacy
2011-07-07Paper
Improving the generalized Feistel
Fast Software Encryption
2010-07-13Paper
How to Thwart Birthday Attacks against MACs via Small Randomness
Fast Software Encryption
2010-07-13Paper
Beyond-Birthday-Bound Security Based on Tweakable Block Cipher
Fast Software Encryption
2009-08-11Paper
Provably Secure MACs from Differentially-Uniform Permutations and AES-Based Implementations
Fast Software Encryption
2009-04-02Paper
Shorter Bit Sequence Is Enough to Break Stream Cipher LILI-128
IEEE Transactions on Information Theory
2008-12-21Paper
New Bounds for PMAC, TMAC, and XCBC
Fast Software Encryption
2008-09-16Paper
Tweakable Enciphering Schemes from Hash-Sum-Expansion
Lecture Notes in Computer Science
2008-04-11Paper
Improved Security Analysis of XEX and LRW Modes
Selected Areas in Cryptography
2007-11-29Paper
Information Security and Cryptology - ICISC 2005
Lecture Notes in Computer Science
2007-05-02Paper
Information Security and Cryptology - ICISC 2005
Lecture Notes in Computer Science
2007-05-02Paper


Research outcomes over time


This page was built for person: Kazuhiko Minematsu