Yusuke Naito

From MaRDI portal



List of research outcomes

This list is not complete and representing at the moment only items from zbMATH Open and arXiv. We are working on additional sources - please check back here soon!

PublicationDate of PublicationType
The exact multi-user security of key-alternating Feistel ciphers with a single permutation2026-02-06Paper
The multi-user security of MACs via universal hashing in the ideal cipher model2024-11-12Paper
The exact multi-user security of 2-key triple DES2024-11-12Paper
The exact multi-user security of (tweakable) key alternating ciphers with a single permutation2024-11-12Paper
KIVR: committing authenticated encryption using redundancy and application to GCM, CCM, and more2024-05-31Paper
Secret can be public: low-memory AEAD mode for high-order masking
Advances in Cryptology – CRYPTO 2022
2023-06-30Paper
On the Efficiency of ZMAC-Type Modes
Cryptology and Network Security
2023-06-28Paper
Double-block-length hash function for minimum memory size
Lecture Notes in Computer Science
2023-05-12Paper
Lightweight authenticated encryption mode suitable for threshold implementation2022-03-23Paper
A highly secure MAC from tweakable blockciphers with support for short tweaks2020-05-27Paper
Improved XKX-based AEAD scheme: removing the birthday terms2020-03-02Paper
Improved security bound of LightMAC\_Plus and its single-key variant2020-01-21Paper
Optimally indifferentiable double-block-length hashing without post-processing and with support for longer key than single block2020-01-14Paper
Sandwich construction for keyed sponges: independence between capacity and online queries2018-10-26Paper
Keyed sponge with prefix-free padding: independence between capacity and online queries without the suffix key2018-09-26Paper
New bounds for keyed sponges with extendable output: independence between capacity and message length
Fast Software Encryption
2018-05-09Paper
Blockcipher-based MACs: beyond the birthday bound without message length2018-02-23Paper
Output masking of tweakable Even-Mansour can be eliminated for message authentication code2018-02-16Paper
Indifferentiability of double-block-length hash function without feed-forward operations2017-08-25Paper
Replacing SHA-2 with SHA-3 Enhances Generic Security of $$\mathtt {HMAC}$$
Topics in Cryptology - CT-RSA 2016
2016-04-08Paper
Full PRF-secure message authentication code based on tweakable block cipher
Provable Security
2016-01-27Paper
Improved Indifferentiable Security Analysis of PHOTON
Lecture Notes in Computer Science
2014-10-14Paper
Generic state-recovery and forgery attacks on chopmd-MAC and on NMAC/HMAC
Advances in Information and Computer Security
2014-09-15Paper
How to construct sufficient conditions for hash functions
Progress in Cryptology - VIETCRYPT 2006
2014-08-21Paper
Reset indifferentiability from weakened random oracle salvages one-pass hash functions
Applied Cryptography and Network Security
2014-07-07Paper
Blockcipher-based double-length hash functions for pseudorandom oracles
Selected Areas in Cryptography
2012-06-08Paper
Security of practical cryptosystems using Merkle-Damgård hash function in the ideal cipher model
Provable Security
2011-09-16Paper
How to confirm cryptosystems security: the original Merkle-Damgård is still alive!
Advances in Cryptology – ASIACRYPT 2009
2009-12-15Paper
A New Strategy for Finding a Differential Path of SHA-1
Information Security and Privacy
2009-03-06Paper
Improved Collision Search for SHA-0
Advances in Cryptology – ASIACRYPT 2006
2008-04-24Paper
Information Security and Cryptology - ICISC 2005
Lecture Notes in Computer Science
2007-05-02Paper


Research outcomes over time


This page was built for person: Yusuke Naito