Tetsu Iwata

From MaRDI portal



List of research outcomes

This list is not complete and representing at the moment only items from zbMATH Open and arXiv. We are working on additional sources - please check back here soon!

PublicationDate of PublicationType
Feistel ciphers based on a single primitive2024-08-30Paper
Analyzing the provable security bounds of GIFT-COFB and Photon-Beetle2022-11-09Paper
On tight quantum security of HMAC and NMAC in the quantum random oracle model2022-03-31Paper
On the (im)possibility of improving the round diffusion of generalized Feistel structures
Information Processing Letters
2021-12-14Paper
Quantum attacks on sum of Even-Mansour pseudorandom functions
Information Processing Letters
2021-10-19Paper
Cryptanalysis of OCB2: attacks on authenticity and confidentiality
Journal of Cryptology
2020-11-06Paper
Blockcipher-based authenticated encryption: how small can we go?
Lecture Notes in Computer Science
2020-06-24Paper
Blockcipher-based authenticated encryption: how small can we go?
Journal of Cryptology
2020-06-15Paper
Cryptanalysis of OCB2: attacks on authenticity and confidentiality
Advances in Cryptology – CRYPTO 2019
2020-05-20Paper
4-round Luby-Rackoff construction is a qPRP2020-05-20Paper
Quantum attacks against type-1 generalized Feistel ciphers and applications to CAST-2562020-05-12Paper
Quantum chosen-ciphertext attacks against Feistel ciphers2020-01-28Paper
Universal forgery and multiple forgeries of MergeMAC and generalized constructions2020-01-28Paper
Analyzing key schedule of \textsc{Simon}: iterative key differences and application to related-key impossible differentials2018-10-24Paper
ZMAC: a fast tweakable block cipher mode for highly secure message authentication2017-10-27Paper
Integrity Analysis of Authenticated Encryption Based on Stream Ciphers
Provable Security
2017-01-06Paper
On the Design Rationale of Simon Block Cipher: Integral Attacks and Impossible Differential Attacks against Simon Variants
Applied Cryptography and Network Security
2016-10-04Paper
On the Security of the Schnorr Signature Scheme and DSA Against Related-Key Attacks
Information Security and Cryptology - ICISC 2015
2016-05-19Paper
Tweak-length extension for tweakable blockciphers
Cryptography and Coding
2016-01-12Paper
CLOC: authenticated encryption for short input
Fast Software Encryption
2015-09-18Paper
GCM security bounds reconsidered
Fast Software Encryption
2015-09-18Paper
Attacks and security proofs of EAX-prime
Fast Software Encryption
2015-09-18Paper
Impact of ANSI X9.24-1:2009 key check value on ISO/IEC 9797-1:2011 MACs
Fast Software Encryption
2015-09-18Paper
Improved authenticity bound of EAX, and refinements
Provable Security
2013-10-23Paper
Breaking and repairing GCM security proofs
Lecture Notes in Computer Science
2012-09-25Paper
On permutation layer of type 1, source-heavy, and target-heavy generalized Feistel structures
Cryptology and Network Security
2012-07-20Paper
Security of Hash-then-CBC key wrapping revisited
Cryptography and Coding
2011-12-16Paper
Building blockcipher from tweakable blockcipher: extending FSE 2009 proposal
Cryptography and Coding
2011-12-16Paper
OMAC: one-key CBC MAC.
Lecture Notes in Computer Science
2010-01-05Paper
BTM: a single-key, inverse-cipher-free mode for deterministic authenticated encryption
Selected Areas in Cryptography
2009-12-09Paper
Bounds on Fixed Input/Output Length Post-processing Functions for Biased Physical Random Number Generators
Selected Areas in Cryptography
2009-11-03Paper
HBS: A Single-Key Mode of Operation for Deterministic Authenticated Encryption
Fast Software Encryption
2009-08-11Paper
New Blockcipher Modes of Operation with Beyond the Birthday Bound Security
Fast Software Encryption
2009-04-02Paper
Tweakable Pseudorandom Permutation from Generalized Feistel Structure
Provable Security
2009-01-27Paper
New Covering Radius of Reed–Muller Codes for<tex>$t$</tex>-Resilient Functions
IEEE Transactions on Information Theory
2008-12-21Paper
The 128-Bit Blockcipher CLEFIA (Extended Abstract)
Fast Software Encryption
2008-09-16Paper
Authenticated Encryption Mode for Beyond the Birthday Bound Security
Progress in Cryptology – AFRICACRYPT 2008
2008-06-13Paper
Progress in Cryptology - INDOCRYPT 2003
Lecture Notes in Computer Science
2007-11-29Paper
Cryptography and Coding
Lecture Notes in Computer Science
2007-11-28Paper
Fast Software Encryption
Lecture Notes in Computer Science
2006-06-22Paper
Fast Software Encryption
Lecture Notes in Computer Science
2005-12-27Paper
Information Security and Cryptology - ICISC 2003
Lecture Notes in Computer Science
2005-12-27Paper
Information Security and Privacy
Lecture Notes in Computer Science
2005-09-07Paper
Round Security and Super-Pseudorandomness of MISTY Type Structure
Fast Software Encryption
2004-08-12Paper
scientific article; zbMATH DE number 2089134 (Why is no real title available?)2004-08-12Paper
scientific article; zbMATH DE number 2085196 (Why is no real title available?)2004-08-09Paper
Non-cryptographic primitive for pseudorandom permutation.
Theoretical Computer Science
2004-03-14Paper
scientific article; zbMATH DE number 2043316 (Why is no real title available?)2004-02-16Paper
scientific article; zbMATH DE number 1962141 (Why is no real title available?)2003-08-10Paper
scientific article; zbMATH DE number 1950615 (Why is no real title available?)2003-07-17Paper
scientific article; zbMATH DE number 1759273 (Why is no real title available?)2002-10-13Paper
scientific article; zbMATH DE number 1740046 (Why is no real title available?)2002-05-14Paper
scientific article; zbMATH DE number 1689014 (Why is no real title available?)2002-01-09Paper
scientific article; zbMATH DE number 1504540 (Why is no real title available?)2000-09-12Paper
scientific article; zbMATH DE number 1504536 (Why is no real title available?)2000-09-12Paper


Research outcomes over time


This page was built for person: Tetsu Iwata