Papers - IWATA Tetsu
-
Stronger Security Variants of GCM-SIV Reviewed
Tetsu Iwata and Kazuhiko Minematsu
IACR Transactions on Symmetric Cryptology (ToSC) Vol. Vol. 2016 ( Issue 2 ) page: 134-157 2017.3
-
On the Security of Schnorr Signatures, DSA, and ElGamal Signatures against Related-Key Attacks Reviewed
Hiraku Morita, Jacob C.N. Schuldt, Takahiro Matsuda, Goichiro Hanaoka, and Tetsu Iwata
IEICE Trans. Fundamentals Vol. Vol. E100-A ( No. 1 ) page: 73-90 2017.1
-
Blockcipher-Based Authenticated Encryption: How Small Can We Go?
Chakraborti Avik, Iwata Tetsu, Minematsu Kazuhiko, Nandi Mridul
CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS - CHES 2017 Vol. 10529 page: 277-298 2017
-
Integrity Analysis of Authenticated Encryption Based on Stream Ciphers Reviewed
Kazuya Imamura, Kazuhiko Minematsu, and Tetsu Iwata
ProvSec 2016, Lecture Notes in Computer Science, Springer ( LNCS 10005 ) page: 257-276 2016.11
-
On the Design Rationale of Simon Block Cipher: Integral Attacks and Impossible Differential Attacks against Simon Variants Reviewed
Kota Kondo, Yu Sasaki, and Tetsu Iwata
Applied Cryptography and Network Security, ACNS 2016, Lecture Notes in Computer Science, Springer ( LNCS 9696 ) page: 518-536 2016.6
-
Tweak-Length Extension for Tweakable Blockciphers Reviewed
Kazuhiko Minematsu and Tetsu Iwata
Cryptography and Coding, IMACC 2015, Lecture Notes in Computer Science, Springer ( LNCS 9496 ) page: 77-93 2015.12
-
On the Security of the Schnorr Signature Scheme and DSA Against Related-Key Attacks Reviewed
Hiraku Morita, Jacob C. N. Schuldt, Takahiro Matsuda, Goichiro Hanaoka, and Tetsu Iwata
Information Security and Cryptology, ICISC 2015, Lecture Notes in Computer Science, Springer ( LNCS 9558 ) page: 20-35 2015.11
-
Optimality of Tweak Functions in CLOC Reviewed
Hayato Kobayashi, Kazuhiko Minematsu, and Tetsu Iwata
IEICE Trans. Fundamentals Vol. Vol. E98-A ( No. 10 ) page: 2152-2164 2015.10
-
GCM security bounds reconsidered Reviewed
Yuichi Niwa, Keisuke Ohashi, Kazuhiko Minematsu, and Tetsu Iwata
Fast Software Encryption, FSE 2015, Lecture Notes in Computer Science, Springer ( LNCS 9054 ) page: 385-407 2015.3
-
Type 1.x generalized Feistel structures Reviewed
Shingo Yanagihara and Tetsu Iwata
IEICE Trans. Fundamentals Vol. Vol. E97-A ( No. 4 ) page: 952-963 2014.4
-
Impact of ANSI X9.24-1:2009 key check value on ISO/IEC 9797-1:2011 MACs Reviewed
Tetsu Iwata and Lei Wang
Fast Software Encryption, FSE 2014, Lecture Notes in Computer Science, Springer ( LNCS ) page: - 2014.3
-
CLOC: Authenticated encryption for short input Reviewed
Tetsu Iwata, Kazuhiko Minematsu, Jian Guo, and Sumio Morioka
Fast Software Encryption, FSE 2014, Lecture Notes in Computer Science, Springer ( LNCS ) page: - 2014.3
-
Cryptanalysis of 249-, 250-,..., 256-bit key HyRAL via equivalent keys Reviewed
Yuki Asano, Shingo Yanagihara, and Tetsu Iwata
IEICE Trans. Fundamentals Vol. Vol. E97-A ( No. 1 ) page: 371-383 2014.1
-
Improved authenticity bound of EAX, and refinements Reviewed
Kazuhiko Minematsu, Stefan Lucks, and Tetsu Iwata
ProvSec 2013, Lecture Notes in Computer Science, Springer ( LNCS 8209 ) page: 284-201 2013.10
-
Type 1.x generalized Feistel structures Reviewed
Shingo Yanagihara and Tetsu Iwata
Pre-proceedings of International Workshop on Coding and Cryptography, WCC 2013 page: - 2013.4
-
Attacks and security proofs of EAX-prime Reviewed
Kazuhiko Minematsu, Stefan Lucks, Hiraku Morita, and Tetsu Iwata
Fast Software Encryption, FSE 2013, Lecture Notes in Computer Science, Springer ( LNCS ) page: - 2013.3
-
Improving the permutation layer of type 1, type 3, source-heavy, and target-heavy generalized Feistel structures Reviewed
Shingo Yanagihara and Tetsu Iwata
IEICE Trans. Fundamentals Vol. Vol. E96-A ( No. 1 ) page: 2-14 2013.1
-
Breaking and repairing GCM security proofs Reviewed
Tetsu Iwata, Keisuke Ohashi, and Kazuhiko Minematsu
CRYPTO 2012, Lecture Notes in Computer Science, Springer ( LNCS 7417 ) page: 31–49 2012.8
-
Cryptanalysis of EAX-prime Reviewed
Kazuhiko Minematsu, Stefan Lucks, Hiraku Morita, and Tetsu Iwata
Workshop records of Directions in Authenticated Ciphers (DIAC) page: 3-13 2012.7
-
How fast can a two-pass mode go? A parallel deterministic authenticated encryption mode for AES-NI (Extended abstract of work in progress) Reviewed
Kazumaro Aoki, Tetsu Iwata, and Kan Yasuda
Workshop records of Directions in Authenticated Ciphers (DIAC) page: 35-43 2012.7