default search action
Tetsu Iwata
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j44]Kento Tsuji, Tetsu Iwata:
Feistel Ciphers Based on a Single Primitive. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 107(8): 1229-1240 (2024) - [j43]Ryunouchi Takeuchi, Yosuke Todo, Tetsu Iwata:
Key Recovery, Universal Forgery, and Committing Attacks against Revised Rocca: How Finalization Affects Security. IACR Trans. Symmetric Cryptol. 2024(2): 85-117 (2024) - [i46]Ryunosuke Takeuchi, Yosuke Todo, Tetsu Iwata:
Practical Committing Attacks against Rocca-S. IACR Cryptol. ePrint Arch. 2024: 901 (2024) - [i45]Akiko Inoue, Tetsu Iwata, Kazuhiko Minematsu:
Comprehensive Robustness Analysis of GCM, CCM, and OCB3. IACR Cryptol. ePrint Arch. 2024: 1339 (2024) - 2023
- [j42]Yu Long Chen, Antonio Flórez-Gutiérrez, Akiko Inoue, Ryoma Ito, Tetsu Iwata, Kazuhiko Minematsu, Nicky Mouha, Yusuke Naito, Ferdinand Sibleyras, Yosuke Todo:
Key Committing Security of AEZ and More. IACR Trans. Symmetric Cryptol. 2023(4): 452-488 (2023) - [c52]Kento Tsuji, Tetsu Iwata:
Feistel Ciphers Based on a Single Primitive. IMACC 2023: 57-79 - [c51]Isamu Furuya, Hayato Kasahara, Akiko Inoue, Kazuhiko Minematsu, Tetsu Iwata:
PMACrx: A Vector-Input MAC for High-Dimensional Vectors with BBB Security. IWSEC 2023: 77-97 - 2022
- [j41]Chun Guo, Tetsu Iwata, Kazuhiko Minematsu:
New indifferentiability security proof of MDPH hash function. IET Inf. Secur. 16(4): 262-281 (2022) - [j40]Makoto Habu, Kazuhiko Minematsu, Tetsu Iwata:
Matching attacks on Romulus-M. IET Inf. Secur. 16(6): 459-469 (2022) - [j39]Kazuo Shinagawa, Tetsu Iwata:
Quantum attacks on Sum of Even-Mansour pseudorandom functions. Inf. Process. Lett. 173: 106172 (2022) - [j38]Kyoji Shibutani, Tetsu Iwata:
On the (im)possibility of improving the round diffusion of generalized Feistel structures. Inf. Process. Lett. 174: 106197 (2022) - [j37]Akinori Hosoyamada, Akiko Inoue, Ryoma Ito, Tetsu Iwata, Kazuhiko Minematsu, Ferdinand Sibleyras, Yosuke Todo:
Cryptanalysis of Rocca and Feasibility of Its Security Claim. IACR Trans. Symmetric Cryptol. 2022(3): 123-151 (2022) - [j36]Kazuki Nakaya, Tetsu Iwata:
Generalized Feistel Structures Based on Tweakable Block Ciphers. IACR Trans. Symmetric Cryptol. 2022(4): 24-91 (2022) - [c50]Akiko Inoue, Tetsu Iwata, Kazuhiko Minematsu:
Analyzing the Provable Security Bounds of GIFT-COFB and Photon-Beetle. ACNS 2022: 67-84 - [i44]Akiko Inoue, Tetsu Iwata, Kazuhiko Minematsu:
Analyzing the Provable Security Bounds of GIFT-COFB and Photon-Beetle. IACR Cryptol. ePrint Arch. 2022: 1 (2022) - [i43]Makoto Habu, Kazuhiko Minematsu, Tetsu Iwata:
Matching Attacks on Romulus-M. IACR Cryptol. ePrint Arch. 2022: 369 (2022) - 2021
- [j35]Akinori Hosoyamada, Tetsu Iwata:
Indifferentiability of SKINNY-HASH Internal Functions. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 104-A(9): 1156-1162 (2021) - [j34]Akinori Hosoyamada, Tetsu Iwata:
Provably Quantum-Secure Tweakable Block Ciphers. IACR Trans. Symmetric Cryptol. 2021(1): 337-377 (2021) - [c49]Akinori Hosoyamada, Tetsu Iwata:
On Tight Quantum Security of HMAC and NMAC in the Quantum Random Oracle Model. CRYPTO (1) 2021: 585-615 - [i42]Akinori Hosoyamada, Tetsu Iwata:
On Tight Quantum Security of HMAC and NMAC in the Quantum Random Oracle Model. IACR Cryptol. ePrint Arch. 2021: 774 (2021) - [i41]Chun Guo, Tetsu Iwata, Kazuhiko Minematsu:
New Indifferentiability Security Proof of MDPH Hash Function. IACR Cryptol. ePrint Arch. 2021: 1469 (2021) - 2020
- [j33]Avik Chakraborti, Tetsu Iwata, Kazuhiko Minematsu, Mridul Nandi:
Blockcipher-Based Authenticated Encryption: How Small Can We Go? J. Cryptol. 33(3): 703-741 (2020) - [j32]Akiko Inoue, Tetsu Iwata, Kazuhiko Minematsu, Bertram Poettering:
Cryptanalysis of OCB2: Attacks on Authenticity and Confidentiality. J. Cryptol. 33(4): 1871-1913 (2020) - [j31]Tetsu Iwata, Mustafa Khairallah, Kazuhiko Minematsu, Thomas Peyrin:
Duel of the Titans: The Romulus and Remus Families of Lightweight AEAD Algorithms. IACR Trans. Symmetric Cryptol. 2020(1): 43-120 (2020) - [j30]Ryota Nakamichi, Tetsu Iwata:
Beyond-Birthday-Bound Secure Cryptographic Permutations from Ideal Ciphers with Long Keys. IACR Trans. Symmetric Cryptol. 2020(2): 68-92 (2020) - [i40]Subhadeep Banik, Avik Chakraborti, Tetsu Iwata, Kazuhiko Minematsu, Mridul Nandi, Thomas Peyrin, Yu Sasaki, Siang Meng Sim, Yosuke Todo:
GIFT-COFB. IACR Cryptol. ePrint Arch. 2020: 738 (2020) - [i39]Akinori Hosoyamada, Tetsu Iwata:
Provably Quantum-Secure Tweakable Block Ciphers. IACR Cryptol. ePrint Arch. 2020: 1321 (2020) - [i38]Akinori Hosoyamada, Tetsu Iwata:
Indifferentiability of SKINNY-HASH Internal Functions. IACR Cryptol. ePrint Arch. 2020: 1344 (2020)
2010 – 2019
- 2019
- [j29]Zhenzhen Bao, Jian Guo, Tetsu Iwata, Kazuhiko Minematsu:
ZOCB and ZOTR: Tweakable Blockcipher Modes for Authenticated Encryption with Full Absorption. IACR Trans. Symmetric Cryptol. 2019(2): 1-54 (2019) - [j28]Ryota Nakamichi, Tetsu Iwata:
Iterative Block Ciphers from Tweakable Block Ciphers with Long Tweaks. IACR Trans. Symmetric Cryptol. 2019(4): 54-80 (2019) - [c48]Akinori Hosoyamada, Tetsu Iwata:
4-Round Luby-Rackoff Construction is a qPRP. ASIACRYPT (1) 2019: 145-174 - [c47]Akiko Inoue, Tetsu Iwata, Kazuhiko Minematsu, Bertram Poettering:
Cryptanalysis of OCB2: Attacks on Authenticity and Confidentiality. CRYPTO (1) 2019: 3-31 - [c46]Tetsu Iwata, Virginie Lallemand, Gregor Leander, Yu Sasaki:
Universal Forgery and Multiple Forgeries of MergeMAC and Generalized Constructions. CT-RSA 2019: 293-312 - [c45]Gembu Ito, Akinori Hosoyamada, Ryutaroh Matsumoto, Yu Sasaki, Tetsu Iwata:
Quantum Chosen-Ciphertext Attacks Against Feistel Ciphers. CT-RSA 2019: 391-411 - [c44]Boyu Ni, Gembu Ito, Xiaoyang Dong, Tetsu Iwata:
Quantum Attacks Against Type-1 Generalized Feistel Ciphers and Applications to CAST-256. INDOCRYPT 2019: 433-455 - [i37]Akinori Hosoyamada, Tetsu Iwata:
Tight Quantum Security Bound of the 4-Round Luby-Rackoff Construction. IACR Cryptol. ePrint Arch. 2019: 243 (2019) - [i36]Akiko Inoue, Tetsu Iwata, Kazuhiko Minematsu, Bertram Poettering:
Cryptanalysis of OCB2: Attacks on Authenticity and Confidentiality. IACR Cryptol. ePrint Arch. 2019: 311 (2019) - [i35]Gembu Ito, Tetsu Iwata:
Quantum Distinguishing Attacks against Type-1 Generalized Feistel Ciphers. IACR Cryptol. ePrint Arch. 2019: 327 (2019) - [i34]Zhenzhen Bao, Jian Guo, Tetsu Iwata, Kazuhiko Minematsu:
ZOCB and ZOTR: Tweakable Blockcipher Modes for Authenticated Encryption with Full Absorption. IACR Cryptol. ePrint Arch. 2019: 600 (2019) - [i33]Tetsu Iwata, Mustafa Khairallah, Kazuhiko Minematsu, Thomas Peyrin:
Duel of the Titans: The Romulus and Remus Families of Lightweight AEAD Algorithms. IACR Cryptol. ePrint Arch. 2019: 992 (2019) - 2018
- [j27]Kota Kondo, Yu Sasaki, Yosuke Todo, Tetsu Iwata:
On the Design Rationale of SIMON Block Cipher: Integral Attacks and Impossible Differential Attacks against SIMON Variants. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 101-A(1): 88-98 (2018) - [j26]Kazuya Imamura, Kazuhiko Minematsu, Tetsu Iwata:
Integrity analysis of authenticated encryption based on stream ciphers. Int. J. Inf. Sec. 17(5): 493-511 (2018) - [j25]Patrick Derbez, Tetsu Iwata, Ling Sun, Siwei Sun, Yosuke Todo, Haoyang Wang, Meiqin Wang:
Cryptanalysis of AES-PRF and Its Dual. IACR Trans. Symmetric Cryptol. 2018(2): 161-191 (2018) - [e7]Debrup Chakraborty, Tetsu Iwata:
Progress in Cryptology - INDOCRYPT 2018 - 19th International Conference on Cryptology in India, New Delhi, India, December 9-12, 2018, Proceedings. Lecture Notes in Computer Science 11356, Springer 2018, ISBN 978-3-030-05377-2 [contents] - [i32]Joan Daemen, Tetsu Iwata, Nils Gregor Leander, Kaisa Nyberg:
Symmetric Cryptography (Dagstuhl Seminar 18021). Dagstuhl Reports 8(1): 1-32 (2018) - [i31]Tetsu Iwata, Virginie Lallemand, Gregor Leander, Yu Sasaki:
Universal Forgery and Multiple Forgeries of MergeMAC and Generalized Constructions. IACR Cryptol. ePrint Arch. 2018: 793 (2018) - [i30]Tetsu Iwata:
Plaintext Recovery Attack of OCB2. IACR Cryptol. ePrint Arch. 2018: 1090 (2018) - [i29]Gembu Ito, Akinori Hosoyamada, Ryutaroh Matsumoto, Yu Sasaki, Tetsu Iwata:
Quantum Chosen-Ciphertext Attacks against Feistel Ciphers. IACR Cryptol. ePrint Arch. 2018: 1193 (2018) - 2017
- [j24]Hiraku Morita, Jacob C. N. Schuldt, Takahiro Matsuda, Goichiro Hanaoka, Tetsu Iwata:
On the Security of Schnorr Signatures, DSA, and ElGamal Signatures against Related-Key Attacks. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 100-A(1): 73-90 (2017) - [j23]Hiraku Morita, Jacob C. N. Schuldt, Takahiro Matsuda, Goichiro Hanaoka, Tetsu Iwata:
On the Security of Non-Interactive Key Exchange against Related-Key Attacks. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 100-A(9): 1910-1923 (2017) - [j22]Kazuhiko Minematsu, Tetsu Iwata:
Cryptanalysis of PMACx, PMAC2x, and SIVx. IACR Trans. Symmetric Cryptol. 2017(2): 162-176 (2017) - [j21]Tetsu Iwata, Yannick Seurin:
Reconsidering the Security Bound of AES-GCM-SIV. IACR Trans. Symmetric Cryptol. 2017(4): 240-267 (2017) - [c43]Avik Chakraborti, Tetsu Iwata, Kazuhiko Minematsu, Mridul Nandi:
Blockcipher-Based Authenticated Encryption: How Small Can We Go? CHES 2017: 277-298 - [c42]Tetsu Iwata, Kazuhiko Minematsu, Thomas Peyrin, Yannick Seurin:
ZMAC: A Fast Tweakable Block Cipher Mode for Highly Secure Message Authentication. CRYPTO (3) 2017: 34-65 - [c41]Kota Kondo, Yu Sasaki, Yosuke Todo, Tetsu Iwata:
Analyzing Key Schedule of Simon: Iterative Key Differences and Application to Related-Key Impossible Differentials. IWSEC 2017: 141-158 - [i28]Kazuhiko Minematsu, Tetsu Iwata:
Cryptanalysis of PMACx, PMAC2x, and SIVx. IACR Cryptol. ePrint Arch. 2017: 220 (2017) - [i27]Tetsu Iwata, Kazuhiko Minematsu, Thomas Peyrin, Yannick Seurin:
ZMAC: A Fast Tweakable Block Cipher Mode for Highly Secure Message Authentication. IACR Cryptol. ePrint Arch. 2017: 535 (2017) - [i26]Avik Chakraborti, Tetsu Iwata, Kazuhiko Minematsu, Mridul Nandi:
Blockcipher-based Authenticated Encryption: How Small Can We Go? IACR Cryptol. ePrint Arch. 2017: 649 (2017) - [i25]Tetsu Iwata, Yannick Seurin:
Reconsidering the Security Bound of AES-GCM-SIV. IACR Cryptol. ePrint Arch. 2017: 708 (2017) - 2016
- [j20]Tetsu Iwata, Kazuhiko Minematsu:
Stronger Security Variants of GCM-SIV. IACR Trans. Symmetric Cryptol. 2016(1): 134-157 (2016) - [c40]Kota Kondo, Yu Sasaki, Tetsu Iwata:
On the Design Rationale of Simon Block Cipher: Integral Attacks and Impossible Differential Attacks against Simon Variants. ACNS 2016: 518-536 - [c39]Kazuya Imamura, Kazuhiko Minematsu, Tetsu Iwata:
Integrity Analysis of Authenticated Encryption Based on Stream Ciphers. ProvSec 2016: 257-276 - [i24]Frederik Armknecht, Tetsu Iwata, Kaisa Nyberg, Bart Preneel:
Symmetric Cryptography (Dagstuhl Seminar 16021). Dagstuhl Reports 6(1): 34-54 (2016) - [i23]Kota Kondo, Yu Sasaki, Tetsu Iwata:
On the Design Rationale of SIMON Block Cipher: Integral Attacks and Impossible Differential Attacks against SIMON Variants. IACR Cryptol. ePrint Arch. 2016: 625 (2016) - [i22]Tetsu Iwata, Kazuhiko Minematsu:
Stronger Security Variants of GCM-SIV. IACR Cryptol. ePrint Arch. 2016: 853 (2016) - [i21]Tetsu Iwata, Bart Mennink, Damian Vizár:
CENC is Optimally Secure. IACR Cryptol. ePrint Arch. 2016: 1087 (2016) - [i20]Kazuya Imamura, Kazuhiko Minematsu, Tetsu Iwata:
Integrity Analysis of Authenticated Encryption Based on Stream Ciphers. IACR Cryptol. ePrint Arch. 2016: 1124 (2016) - 2015
- [j19]Hayato Kobayashi, Kazuhiko Minematsu, Tetsu Iwata:
Optimality of Tweak Functions in CLOC. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 98-A(10): 2152-2164 (2015) - [c38]Yuichi Niwa, Keisuke Ohashi, Kazuhiko Minematsu, Tetsu Iwata:
GCM Security Bounds Reconsidered. FSE 2015: 385-407 - [c37]Hiraku Morita, Jacob C. N. Schuldt, Takahiro Matsuda, Goichiro Hanaoka, Tetsu Iwata:
On the Security of the Schnorr Signature Scheme and DSA Against Related-Key Attacks. ICISC 2015: 20-35 - [c36]Kazuhiko Minematsu, Tetsu Iwata:
Tweak-Length Extension for Tweakable Blockciphers. IMACC 2015: 77-93 - [e6]Tetsu Iwata, Jung Hee Cheon:
Advances in Cryptology - ASIACRYPT 2015 - 21st International Conference on the Theory and Application of Cryptology and Information Security, Auckland, New Zealand, November 29 - December 3, 2015, Proceedings, Part I. Lecture Notes in Computer Science 9452, Springer 2015, ISBN 978-3-662-48796-9 [contents] - [e5]Tetsu Iwata, Jung Hee Cheon:
Advances in Cryptology - ASIACRYPT 2015 - 21st International Conference on the Theory and Application of Cryptology and Information Security, Auckland, New Zealand, November 29 - December 3, 2015, Proceedings, Part II. Lecture Notes in Computer Science 9453, Springer 2015, ISBN 978-3-662-48799-0 [contents] - [i19]Yuichi Niwa, Keisuke Ohashi, Kazuhiko Minematsu, Tetsu Iwata:
GCM Security Bounds Reconsidered. IACR Cryptol. ePrint Arch. 2015: 214 (2015) - [i18]Kazuhiko Minematsu, Tetsu Iwata:
Tweak-Length Extension for Tweakable Blockciphers. IACR Cryptol. ePrint Arch. 2015: 888 (2015) - [i17]Hiraku Morita, Jacob C. N. Schuldt, Takahiro Matsuda, Goichiro Hanaoka, Tetsu Iwata:
On the Security of the Schnorr Signature Scheme and DSA against Related-Key Attacks. IACR Cryptol. ePrint Arch. 2015: 1135 (2015) - 2014
- [j18]Yuki Asano, Shingo Yanagihara, Tetsu Iwata:
Cryptanalysis of 249-, 250-, ..., 256-Bit Key HyRAL via Equivalent Keys. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 97-A(1): 371-383 (2014) - [j17]Shingo Yanagihara, Tetsu Iwata:
Type 1.x Generalized Feistel Structures. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 97-A(4): 952-963 (2014) - [c35]Tetsu Iwata, Kazuhiko Minematsu, Jian Guo, Sumio Morioka:
CLOC: Authenticated Encryption for Short Input. FSE 2014: 149-167 - [c34]Tetsu Iwata, Lei Wang:
Impact of ANSI X9.24-1: 2009 Key Check Value on ISO/IEC 9797-1: 2011 MACs. FSE 2014: 303-322 - [e4]Palash Sarkar, Tetsu Iwata:
Advances in Cryptology - ASIACRYPT 2014 - 20th International Conference on the Theory and Application of Cryptology and Information Security, Kaoshiung, Taiwan, R.O.C., December 7-11, 2014. Proceedings, Part I. Lecture Notes in Computer Science 8873, Springer 2014, ISBN 978-3-662-45610-1 [contents] - [e3]Palash Sarkar, Tetsu Iwata:
Advances in Cryptology - ASIACRYPT 2014 - 20th International Conference on the Theory and Application of Cryptology and Information Security, Kaoshiung, Taiwan, R.O.C., December 7-11, 2014, Proceedings, Part II. Lecture Notes in Computer Science 8874, Springer 2014, ISBN 978-3-662-45607-1 [contents] - [i16]Frederik Armknecht, Helena Handschuh, Tetsu Iwata, Bart Preneel:
Symmetric Cryptography (Dagstuhl Seminar 14021). Dagstuhl Reports 4(1): 1-16 (2014) - [i15]Tetsu Iwata, Kazuhiko Minematsu, Jian Guo, Sumio Morioka:
CLOC: Authenticated Encryption for Short Input. IACR Cryptol. ePrint Arch. 2014: 157 (2014) - [i14]Tetsu Iwata, Lei Wang:
Impact of ANSI X9.24-1: 2009 Key Check Value on ISO/IEC 9797-1: 2011 MACs. IACR Cryptol. ePrint Arch. 2014: 183 (2014) - 2013
- [j16]Shingo Yanagihara, Tetsu Iwata:
Improving the Permutation Layer of Type 1, Type 3, Source-Heavy, and Target-Heavy Generalized Feistel Structures. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 96-A(1): 2-14 (2013) - [j15]Yasushi Osaki, Tetsu Iwata:
Security of Hash-then-CBC Key Wrapping Revisited. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 96-A(1): 25-34 (2013) - [c33]Kazuhiko Minematsu, Stefan Lucks, Hiraku Morita, Tetsu Iwata:
Attacks and Security Proofs of EAX-Prime. FSE 2013: 327-347 - [c32]Kazuhiko Minematsu, Stefan Lucks, Tetsu Iwata:
Improved Authenticity Bound of EAX, and Refinements. ProvSec 2013: 184-201 - [i13]Kazuhiko Minematsu, Stefan Lucks, Tetsu Iwata:
Improved Authenticity Bound of EAX, and Refinements. IACR Cryptol. ePrint Arch. 2013: 792 (2013) - 2012
- [j14]Yasushi Osaki, Tetsu Iwata:
Further More on Key Wrapping. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 95-A(1): 8-20 (2012) - [c31]Yuki Asano, Shingo Yanagihara, Tetsu Iwata:
Cryptanalysis of 256-Bit Key HyRAL via Equivalent Keys. ACNS 2012: 257-274 - [c30]Tetsu Iwata, Keisuke Ohashi, Kazuhiko Minematsu:
Breaking and Repairing GCM Security Proofs. CRYPTO 2012: 31-49 - [i12]Kazuhiko Minematsu, Hiraku Morita, Tetsu Iwata:
Cryptanalysis of EAXprime. IACR Cryptol. ePrint Arch. 2012: 18 (2012) - [i11]Tetsu Iwata, Keisuke Ohashi, Kazuhiko Minematsu:
Breaking and Repairing GCM Security Proofs. IACR Cryptol. ePrint Arch. 2012: 438 (2012) - 2011
- [c29]Shingo Yanagihara, Tetsu Iwata:
On Permutation Layer of Type 1, Source-Heavy, and Target-Heavy Generalized Feistel Structures. CANS 2011: 98-117 - [c28]Kazuhiko Minematsu, Tetsu Iwata:
Building Blockcipher from Tweakable Blockcipher: Extending FSE 2009 Proposal. IMACC 2011: 391-412 - [c27]Yasushi Osaki, Tetsu Iwata:
Security of Hash-then-CBC Key Wrapping Revisited. IMACC 2011: 413-430 - [e2]Tetsu Iwata, Masakatsu Nishigaki:
Advances in Information and Computer Security - 6th International Workshop, IWSEC 2011, Tokyo, Japan, November 8-10, 2011. Proceedings. Lecture Notes in Computer Science 7038, Springer 2011, ISBN 978-3-642-25140-5 [contents] - 2010
- [j13]Atsushi Mitsuda, Tetsu Iwata:
Tweakable Pseudorandom Permutation from Generalized Feistel Structure. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 93-A(1): 13-21 (2010) - [j12]Shungo Nakamura, Tetsu Iwata:
MPP Characteristics of Variants of Merkle-Damgård Iterated Hash Functions. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 93-A(1): 93-101 (2010) - [e1]Seokhie Hong, Tetsu Iwata:
Fast Software Encryption, 17th International Workshop, FSE 2010, Seoul, Korea, February 7-10, 2010, Revised Selected Papers. Lecture Notes in Computer Science 6147, Springer 2010, ISBN 978-3-642-13857-7 [contents]
2000 – 2009
- 2009
- [c26]Tetsu Iwata, Kan Yasuda:
HBS: A Single-Key Mode of Operation for Deterministic Authenticated Encryption. FSE 2009: 394-415 - [c25]Tetsu Iwata, Kan Yasuda:
BTM: A Single-Key, Inverse-Cipher-Free Mode for Deterministic Authenticated Encryption. Selected Areas in Cryptography 2009: 313-330 - 2008
- [j11]Tetsu Iwata, Tohru Yagi, Kaoru Kurosawa:
Security of the Five-Round Kasumi Type Permutation. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 91-A(1): 30-38 (2008) - [c24]Tetsu Iwata:
Authenticated Encryption Mode for Beyond the Birthday Bound Security. AFRICACRYPT 2008: 125-142 - [c23]Atsushi Mitsuda, Tetsu Iwata:
Tweakable Pseudorandom Permutation from Generalized Feistel Structure. ProvSec 2008: 22-37 - [c22]Kyohei Suzuki, Tetsu Iwata:
Bounds on Fixed Input/Output Length Post-processing Functions for Biased Physical Random Number Generators. Selected Areas in Cryptography 2008: 373-386 - 2007
- [j10]Tetsu Iwata, Kaoru Kurosawa:
How to Construct Super-Pseudorandom Permutations with Short Keys. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 90-A(1): 2-13 (2007) - [c21]Taizo Shirai, Kyoji Shibutani, Toru Akishita, Shiho Moriai, Tetsu Iwata:
The 128-Bit Blockcipher CLEFIA (Extended Abstract). FSE 2007: 181-195 - [i10]Tetsu Iwata:
Tightness of the Security Bound of CENC. Symmetric Cryptography 2007 - 2006
- [j9]Katsuyuki Okeya, Tetsu Iwata:
Side Channel Attacks on Message Authentication Codes. Inf. Media Technol. 1(2): 942-952 (2006) - [c20]Tetsu Iwata:
New Blockcipher Modes of Operation with Beyond the Birthday Bound Security. FSE 2006: 310-327 - [i9]Tetsu Iwata:
New Blockcipher Modes of Operation with Beyond the Birthday Bound Security. IACR Cryptol. ePrint Arch. 2006: 188 (2006) - [i8]JunHyuk Song, Radha Poovendran, Jicheol Lee, Tetsu Iwata:
The AES-CMAC Algorithm. RFC 4493: 1-20 (2006) - [i7]JunHyuk Song, Radha Poovendran, Jicheol Lee, Tetsu Iwata:
The Advanced Encryption Standard-Cipher-based Message Authentication Code-Pseudo-Random Function-128 (AES-CMAC-PRF-128) Algorithm for the Internet Key Exchange Protocol (IKE). RFC 4615: 1-7 (2006) - 2005
- [j8]Kaoru Kurosawa, Tetsu Iwata, Quang Viet Duong:
How to Improve Interpolation Attack. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 88-A(1): 9-15 (2005) - [j7]Tetsu Iwata, Kaoru Kurosawa:
On the Security of a MAC by Mitchell. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 88-A(1): 25-32 (2005) - [c19]Katsuyuki Okeya, Tetsu Iwata:
Side Channel Attacks on Message Authentication Codes. ESAS 2005: 205-217 - [c18]Tetsu Iwata, Kaoru Kurosawa:
How to Enhance the Security of the 3GPP Confidentiality and Integrity Algorithms. FSE 2005: 268-283 - 2004
- [j6]Kaoru Kurosawa, Tetsu Iwata:
TMAC: Two-Key CBC MAC. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 87-A(1): 46-52 (2004) - [j5]Tetsu Iwata, Kaoru Kurosawa:
On the Universal Hash Functions in Luby-Rackoff Cipher. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 87-A(1): 60-66 (2004) - [j4]Kaoru Kurosawa, Tetsu Iwata, Takayuki Yoshiwara:
New covering radius of Reed-Muller codes for t-resilient functions. IEEE Trans. Inf. Theory 50(3): 468-475 (2004) - [c17]Tetsu Iwata, Kaoru Kurosawa:
How to Re-use Round Function in Super-Pseudorandom Permutation. ACISP 2004: 224-235 - [c16]Tetsu Iwata, Tadayoshi Kohno:
New Security Proofs for the 3GPP Confidentiality and Integrity Algorithms. FSE 2004: 427-445 - [i6]Tetsu Iwata, Tadayoshi Kohno:
New Security Proofs for the 3GPP Confidentiality and Integrity Algorithms. IACR Cryptol. ePrint Arch. 2004: 19 (2004) - 2003
- [j3]Tetsu Iwata, Kaoru Kurosawa:
Inclusion Relations of Boolean Functions Satisfying PC(l) of Order k. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 86-A(1): 47-53 (2003) - [j2]Tetsu Iwata, Tomonobu Yoshino, Kaoru Kurosawa:
Non-cryptographic primitive for pseudorandom permutation. Theor. Comput. Sci. 306(1-3): 139-154 (2003) - [c15]Tetsu Iwata, Tohru Yagi, Kaoru Kurosawa:
On the Pseudorandomness of KASUMI Type Permutations. ACISP 2003: 130-141 - [c14]Kaoru Kurosawa, Tetsu Iwata:
TMAC: Two-Key CBC MAC. CT-RSA 2003: 33-49 - [c13]Tetsu Iwata, Kaoru Kurosawa:
OMAC: One-Key CBC MAC. FSE 2003: 129-153 - [c12]Tetsu Iwata, Kaoru Kurosawa:
On the Security of a New Variant of OMAC. ICISC 2003: 67-78 - [c11]Tetsu Iwata, Kaoru Kurosawa:
On the Correctness of Security Proofs for the 3GPP Confidentiality and Integrity Algorithms. IMACC 2003: 306-318 - [c10]Tetsu Iwata, Kaoru Kurosawa:
Stronger Security Bounds for OMAC, TMAC, and XCBC. INDOCRYPT 2003: 402-415 - [i5]Tetsu Iwata, Kaoru Kurosawa:
Stronger Security Bounds for OMAC, TMAC and XCBC. IACR Cryptol. ePrint Arch. 2003: 82 (2003) - [i4]Tetsu Iwata, Tohru Yagi, Kaoru Kurosawa:
On the Pseudorandomness of KASUMI Type Permutations. IACR Cryptol. ePrint Arch. 2003: 130 (2003) - 2002
- [j1]Tetsu Iwata, Tomonobu Yoshino, Tomohiro Yuasa, Kaoru Kurosawa:
Round Security and Super-Pseudorandomness of MISTY Type Structure. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 85-A(1): 2-10 (2002) - [c9]Tetsu Iwata, Tomonobu Yoshino, Kaoru Kurosawa:
Non-cryptographic Primitive for Pseudorandom Permutation. FSE 2002: 149-163 - [c8]Tetsu Iwata, Kaoru Kurosawa:
On the Universal Hash Functionsin Luby-Rackoff Cipher. ICISC 2002: 226-236 - [i3]Kaoru Kurosawa, Tetsu Iwata:
TMAC: Two-Key CBC MAC. IACR Cryptol. ePrint Arch. 2002: 92 (2002) - [i2]Kaoru Kurosawa, Tetsu Iwata, Takayuki Yoshiwara:
New covering radius of Reed-Muller codes for t-resilient functions. IACR Cryptol. ePrint Arch. 2002: 123 (2002) - [i1]Tetsu Iwata, Kaoru Kurosawa:
OMAC: One-Key CBC MAC. IACR Cryptol. ePrint Arch. 2002: 180 (2002) - 2001
- [c7]Tetsu Iwata, Tomonobu Yoshino, Tomohiro Yuasa, Kaoru Kurosawa:
Round Security and Super-Pseudorandomness of MISTY Type Structure. FSE 2001: 233-247 - [c6]Tetsu Iwata, Takayuki Yoshiwara, Kaoru Kurosawa:
New Covering Radius of Reed-Muller Codes for t-Resilient Functions. Selected Areas in Cryptography 2001: 75-86 - 2000
- [c5]Tetsu Iwata, Kaoru Kurosawa:
On the Pseudorandomness of the AES Finalists - RC6 and Serpent. FSE 2000: 231-243 - [c4]Kaoru Kurosawa, Tetsu Iwata, Quang Viet Duong:
Root Finding Interpolation Attack. Selected Areas in Cryptography 2000: 303-314
1990 – 1999
- 1999
- [c3]Takashi Satoh, Tetsu Iwata, Kaoru Kurosawa:
On Cryptographically Secure Vectorial Boolean Functions. ASIACRYPT 1999: 20-28 - [c2]Tetsu Iwata, Kaoru Kurosawa:
Probabilistic Higher Order Differential Attack and Higher Order Bent Functions. ASIACRYPT 1999: 62-74 - 1998
- [c1]Tetsu Iwata, Kaoru Kurosawa:
Inclusion Relations of Boolean Functions Satisfying PC(l) of Order k. SETA 1998: 263-272
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-09 13:06 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint