Papers - IWATA Tetsu
-
Cryptanalysis of OCB2: Attacks on Authenticity and Confidentiality Invited Reviewed International coauthorship
Akiko Inoue, Tetsu Iwata, Kazuhiko Minematsu, Bertram Poettering
Journal of Cryptology Vol. 33 page: 1871 - 1913 2020.10
-
Beyond-Birthday-Bound Secure Cryptographic Permutations from Ideal Ciphers with Long Keys Reviewed
Ryota Nakamichi and Tetsu Iwata
IACR Transactions on Symmetric Cryptology (ToSC) Vol. Vol. 2020 ( Issue 2 ) page: 68-92 2020.7
-
Blockcipher-Based Authenticated Encryption: How Small Can We Go? Invited Reviewed International coauthorship
Chakraborti Avik, Iwata Tetsu, Minematsu Kazuhiko, Nandi Mridul
Journal of Cryptology Vol. 33 ( 3 ) page: 703-741 2020.7
-
Duel of the Titans: The Romulus and Remus Families of Lightweight AEAD Algorithms Reviewed International coauthorship
Tetsu Iwata, Mustafa Khairallah, Kazuhiko Minematsu, and Thomas Peyrin
IACR Transactions on Symmetric Cryptology (ToSC) Vol. Vol. 2020 ( Issue 1 ) page: 43-120 2020.5
-
Iterative Block Ciphers from Tweakable Block Ciphers with Long Tweaks Reviewed
Ryota Nakamichi and Tetsu Iwata
IACR Transactions on Symmetric Cryptology (ToSC) Vol. Vol. 2019 ( Issue 4 ) page: 54-80 2020.1
-
Quantum Attacks against Type-1 Generalized Feistel Ciphers and Applications to CAST-256 Reviewed
Boyu Ni, Gembu Ito, Xiaoyang Dong, and Tetsu Iwata
INDOCRYPT 2019, Lecture Notes in Computer Science, Springer ( LNCS 11898 ) page: 433-455 2019.12
-
4-Round Luby-Rackoff Construction is a qPRP Reviewed
Akinori Hosoyamada and Tetsu Iwata
ASIACRYPT 2019, Lecture Notes in Computer Science, Springer ( LNCS 11921 ) page: 145-174 2019.12
-
Cryptanalysis of OCB2: Attacks on Authenticity and Confidentiality Reviewed
Inoue Akiko, Iwata Tetsu, Minematsu Kazuhiko, Poettering Bertram
Advances in Cryptology, CRYPTO 2019 Vol. 11692 page: 3-31 2019.8
-
ZOCB and ZOTR: Tweakable Blockcipher Modes for Authenticated Encryption with Full Absorption Reviewed
Zhenzhen Bao, Jian Guo, Tetsu Iwata, and Kazuhiko Minematsu
IACR Transactions on Symmetric Cryptology (ToSC) Vol. Vol. 2019 ( Issue 2 ) page: 1-54 2019.6
-
Quantum Chosen-Ciphertext Attacks Against Feistel Ciphers Reviewed
Gembu Ito, Akinori Hosoyamada, Ryutaroh Matsumoto, Yu Sasaki, and Tetsu Iwata
CT-RSA 2019 ( LNCS 11405 ) page: 391-411 2019.3
-
Universal Forgery and Multiple Forgeries of MergeMAC and Generalized Constructions Reviewed
Tetsu Iwata, Virginie Lallemand, Gregor Leander, and Yu Sasaki
CT-RSA 2019 ( LNCS 11405 ) page: 293-312 2019.3
-
Integrity Analysis of Authenticated Encryption Based on Stream Ciphers Reviewed
Kazuya Imamura, Kazuhiko Minematsu, and Tetsu Iwata
International Journal of Information Security, IJIS Vol. 17 ( 5 ) page: 493-511 2018.10
-
Cryptanalysis of AES-PRF and Its Dual Reviewed
Patrick Derbez, Tetsu Iwata, Ling Sun, Siwei Sun, Yosuke Todo, Haoyang Wang, and Meiqin Wang
IACR Transactions on Symmetric Cryptology (ToSC) Vol. Vol. 2018 ( Issue 2 ) page: 161-191 2018.6
-
On the Design Rationale of SIMON Block Cipher: Integral Attacks and Impossible Differential Attacks against SIMON Variants Reviewed
Kota Kondo, Yu Sasaki, Yosuke Todo, and Tetsu Iwata
IEICE Trans. Fundamentals Vol. Vol. E101-A ( No. 1 ) page: 88-98 2018.1
-
Reconsidering the Security Bound of AES-GCM-SIV Reviewed
Tetsu Iwata and Yannick Seurin
IACR Transactions on Symmetric Cryptology (ToSC) Vol. Vol. 2017 ( Issue 4 ) page: 240-267 2017.12
-
On the Security of Non-interactive Key Exchange against Related-Key Attacks Reviewed
Hiraku Morita, Jacob C.N. Schuldt, Takahiro Matsuda, Goichiro Hanaoka, and Tetsu Iwata
IEICE Trans. Fundamentals Vol. Vol. E100-A ( No. 9 ) page: 1910-1923 2017.9
-
Blockcipher-Based Authenticated Encryption: How Small Can We Go? Reviewed
Avik Chakrabort, Tetsu Iwata, Kazuhiko Minematsu, and Mridul Nandi
CHES 2017, Lecture Notes in Computer Science, Springer ( LNCS 10529 ) page: 277-298 2017.9
-
Analyzing Key Schedule of Simon: Iterative Key Differences and Application to Related-Key Impossible Differentials Reviewed
Kota Kondo, Yu Sasaki, Yosuke Todo, and Tetsu Iwata
IWSEC 2017, Lecture Notes in Computer Science, Springer ( LNCS 10418 ) page: 141-158 2017.8
-
ZMAC: A Fast Tweakable Block Cipher Mode for Highly Secure Message Authentication Reviewed
Tetsu Iwata, Kazuhiko Minematsu, Thomas Peyrin, and Yannick Seurin
CRYPTO 2017, Lecture Notes in Computer Science, Springer ( LNCS 10403 ) page: 34-65 2017.8
-
Cryptanalysis of PMACx, PMAC2x, and SIVx Reviewed
Kazuhiko Minematsu and Tetsu Iwata
IACR Transactions on Symmetric Cryptology (ToSC) Vol. Vol. 2017 ( Issue 2 ) page: 162-176 2017.6