Papers - IWATA Tetsu
-
New covering radius of Reed-Muller codes for t-resilient functions Reviewed
Tetsu Iwata, Takayuki Yoshiwara and Kaoru Kurosawa
Selected Areas in Cryptography, SAC 2001, Lecture Notes in Computer Science, Springer ( LNCS 2259 ) page: 75-86 2001.8
-
Round security and super-pseudorandomness of MISTY type structure Reviewed
Tetsu Iwata, Tomonobu Yoshino, Tomohiro Yuasa and Kaoru Kurosawa
Fast Software Encryption, FSE 2001, Lecture Notes in Computer Science, Springer ( LNCS 2355 ) page: 233-247 2001.4
-
Root finding interpolation attack Reviewed
Kaoru Kurosawa, Tetsu Iwata and Quang Viet Duong
Selected Areas in Cryptography, SAC 2000, Lecture Notes in Computer Science, Springer ( LNCS 2012 ) page: 303-314 2000.8
-
On the pseudorandomness of the AES finalists --- RC6 and Serpent Reviewed
Tetsu Iwata and Kaoru Kurosawa
Fast Software Encryption, FSE 2000, Lecture Notes in Computer Science, Springer ( LNCS 1978 ) page: 231-243 2000.4
-
Probabilistic higher order differential attack and higher order bent functions Reviewed
Tetsu Iwata and Kaoru Kurosawa
Advances in Cryptology, ASIACRYPT '99, Lecture Notes in Computer Science, Springer ( LNCS 1716 ) page: 62-74 1999.11
-
On cryptographically secure vectorial Boolean functions Reviewed
Takashi Satoh, Tetsu Iwata and Kaoru Kurosawa
Advances in Cryptology, ASIACRYPT '99, Lecture Notes in Computer Science, Springer ( LNCS 1716 ) page: 20-28 1999.11
-
Inclusion relations of Boolean functions satisfying PC(l) of order k Reviewed
Tetsu Iwata and Kaoru Kurosawa
Sequences and Their Applications, SETA '98, DMTCS, Springer ( DMTCS ) page: 263-272 1998.12
-
Balanced Boolean functions satisfying PC(2) and very large degree Reviewed
Tomoyoshi Honda, Takashi Satoh, Tetsu Iwata and Kaoru Kurosawa
Proceedings of the Fourth Annual Workshop on Selected Areas in Cryptography, SAC '97 page: 64-72 1997.8