BibTeX records: Kan Yasuda

download as .bib file

@article{DBLP:journals/joc/AndreevaBDLMNTY24,
  author       = {Elena Andreeva and
                  Andrey Bogdanov and
                  Nilanjan Datta and
                  Atul Luykx and
                  Bart Mennink and
                  Mridul Nandi and
                  Elmar Tischhauser and
                  Kan Yasuda},
  title        = {The {COLM} Authenticated Encryption Scheme},
  journal      = {J. Cryptol.},
  volume       = {37},
  number       = {2},
  pages        = {15},
  year         = {2024},
  url          = {https://doi.org/10.1007/s00145-024-09492-8},
  doi          = {10.1007/S00145-024-09492-8},
  timestamp    = {Tue, 19 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/joc/AndreevaBDLMNTY24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/latincrypt/NakagawaFNTXY23,
  author       = {Kohei Nakagawa and
                  Atsushi Fujioka and
                  Akira Nagai and
                  Junichi Tomida and
                  Keita Xagawa and
                  Kan Yasuda},
  editor       = {Abdelrahaman Aly and
                  Mehdi Tibouchi},
  title        = {Making the Identity-Based Diffie-Hellman Key Exchange Efficiently
                  Revocable},
  booktitle    = {Progress in Cryptology - {LATINCRYPT} 2023 - 8th International Conference
                  on Cryptology and Information Security in Latin America, {LATINCRYPT}
                  2023, Quito, Ecuador, October 3-6, 2023, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {14168},
  pages        = {171--191},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-44469-2\_9},
  doi          = {10.1007/978-3-031-44469-2\_9},
  timestamp    = {Fri, 06 Oct 2023 18:13:29 +0200},
  biburl       = {https://dblp.org/rec/conf/latincrypt/NakagawaFNTXY23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/HosoyamadaITY22,
  author       = {Akinori Hosoyamada and
                  Takanori Isobe and
                  Yosuke Todo and
                  Kan Yasuda},
  editor       = {Shweta Agrawal and
                  Dongdai Lin},
  title        = {A Modular Approach to the Incompressibility of Block-Cipher-Based
                  AEADs},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2022 - 28th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Taipei, Taiwan, December 5-9, 2022, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {13792},
  pages        = {585--619},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-22966-4\_20},
  doi          = {10.1007/978-3-031-22966-4\_20},
  timestamp    = {Fri, 10 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/HosoyamadaITY22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/0001S0Y22,
  author       = {Yusuke Naito and
                  Yu Sasaki and
                  Takeshi Sugawara and
                  Kan Yasuda},
  editor       = {Heng Yin and
                  Angelos Stavrou and
                  Cas Cremers and
                  Elaine Shi},
  title        = {The Multi-User Security of Triple Encryption, Revisited: Exact Security,
                  Strengthening, and Application to {TDES}},
  booktitle    = {Proceedings of the 2022 {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, {CCS} 2022, Los Angeles, CA, USA, November
                  7-11, 2022},
  pages        = {2323--2336},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3548606.3560674},
  doi          = {10.1145/3548606.3560674},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/0001S0Y22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/SibleyrasSTHY22,
  author       = {Ferdinand Sibleyras and
                  Yu Sasaki and
                  Yosuke Todo and
                  Akinori Hosoyamada and
                  Kan Yasuda},
  editor       = {Chen{-}Mou Cheng and
                  Mitsuaki Akiyama},
  title        = {Birthday-Bound Slide Attacks on TinyJAMBU's Keyed-Permutations for
                  All Key Sizes},
  booktitle    = {Advances in Information and Computer Security - 17th International
                  Workshop on Security, {IWSEC} 2022, Tokyo, Japan, August 31 - September
                  2, 2022, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {13504},
  pages        = {107--127},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-15255-9\_6},
  doi          = {10.1007/978-3-031-15255-9\_6},
  timestamp    = {Thu, 18 Aug 2022 14:32:38 +0200},
  biburl       = {https://dblp.org/rec/conf/iwsec/SibleyrasSTHY22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HosoyamadaITY22,
  author       = {Akinori Hosoyamada and
                  Takanori Isobe and
                  Yosuke Todo and
                  Kan Yasuda},
  title        = {A Modular Approach to the Incompressibility of Block-Cipher-Based
                  AEADs},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1253},
  year         = {2022},
  url          = {https://eprint.iacr.org/2022/1253},
  timestamp    = {Sat, 22 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/HosoyamadaITY22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosc/ChakrabortiNTY20,
  author       = {Avik Chakraborti and
                  Mridul Nandi and
                  Suprita Talnikar and
                  Kan Yasuda},
  title        = {On the Composition of Single-Keyed Tweakable Even-Mansour for Achieving
                  {BBB} Security},
  journal      = {{IACR} Trans. Symmetric Cryptol.},
  volume       = {2020},
  number       = {2},
  pages        = {1--39},
  year         = {2020},
  url          = {https://doi.org/10.13154/tosc.v2020.i2.1-39},
  doi          = {10.13154/TOSC.V2020.I2.1-39},
  timestamp    = {Tue, 04 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tosc/ChakrabortiNTY20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dagstuhl-reports/LeanderMNY20,
  author       = {Nils Gregor Leander and
                  Bart Mennink and
                  Kaisa Nyberg and
                  Kan Yasuda},
  title        = {Symmetric Cryptography (Dagstuhl Seminar 20041)},
  journal      = {Dagstuhl Reports},
  volume       = {10},
  number       = {1},
  pages        = {130--143},
  year         = {2020},
  url          = {https://doi.org/10.4230/DagRep.10.1.130},
  doi          = {10.4230/DAGREP.10.1.130},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dagstuhl-reports/LeanderMNY20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/amco/DattaDNY19,
  author       = {Nilanjan Datta and
                  Avijit Dutta and
                  Mridul Nandi and
                  Kan Yasuda},
  title        = {sfDWCDM+: {A} {BBB} secure nonce based {MAC}},
  journal      = {Adv. Math. Commun.},
  volume       = {13},
  number       = {4},
  pages        = {705--732},
  year         = {2019},
  url          = {https://doi.org/10.3934/amc.2019042},
  doi          = {10.3934/AMC.2019042},
  timestamp    = {Mon, 26 Oct 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/amco/DattaDNY19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/SasakiY19,
  author       = {Yu Sasaki and
                  Kan Yasuda},
  title        = {Optimizing Online Permutation-Based {AE} Schemes for Lightweight Applications},
  journal      = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.},
  volume       = {102-A},
  number       = {1},
  pages        = {35--47},
  year         = {2019},
  url          = {https://doi.org/10.1587/transfun.E102.A.35},
  doi          = {10.1587/TRANSFUN.E102.A.35},
  timestamp    = {Sat, 11 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieicet/SasakiY19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/joc/JovanovicLMSY19,
  author       = {Philipp Jovanovic and
                  Atul Luykx and
                  Bart Mennink and
                  Yu Sasaki and
                  Kan Yasuda},
  title        = {Beyond Conventional Security in Sponge-Based Authenticated Encryption
                  Modes},
  journal      = {J. Cryptol.},
  volume       = {32},
  number       = {3},
  pages        = {895--940},
  year         = {2019},
  url          = {https://doi.org/10.1007/s00145-018-9299-7},
  doi          = {10.1007/S00145-018-9299-7},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/joc/JovanovicLMSY19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/ChakrabortiDNY18,
  author       = {Avik Chakraborti and
                  Nilanjan Datta and
                  Mridul Nandi and
                  Kan Yasuda},
  title        = {Beetle Family of Lightweight and Secure Authenticated Encryption Ciphers},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2018},
  number       = {2},
  pages        = {218--241},
  year         = {2018},
  url          = {https://doi.org/10.13154/tches.v2018.i2.218-241},
  doi          = {10.13154/TCHES.V2018.I2.218-241},
  timestamp    = {Thu, 06 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tches/ChakrabortiDNY18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/HosoyamadaY18,
  author       = {Akinori Hosoyamada and
                  Kan Yasuda},
  editor       = {Thomas Peyrin and
                  Steven D. Galbraith},
  title        = {Building Quantum-One-Way Functions from Block Ciphers: Davies-Meyer
                  and Merkle-Damg{\aa}rd Constructions},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2018 - 24th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Brisbane, QLD, Australia, December 2-6, 2018, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11272},
  pages        = {275--304},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-03326-2\_10},
  doi          = {10.1007/978-3-030-03326-2\_10},
  timestamp    = {Mon, 16 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/HosoyamadaY18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/DattaDNY18,
  author       = {Nilanjan Datta and
                  Avijit Dutta and
                  Mridul Nandi and
                  Kan Yasuda},
  editor       = {Hovav Shacham and
                  Alexandra Boldyreva},
  title        = {Encrypt or Decrypt? To Make a Single-Key Beyond Birthday Secure Nonce-Based
                  {MAC}},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2018 - 38th Annual International
                  Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2018,
                  Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10991},
  pages        = {631--661},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-96884-1\_21},
  doi          = {10.1007/978-3-319-96884-1\_21},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/DattaDNY18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/iwsec/2018,
  editor       = {Atsuo Inomata and
                  Kan Yasuda},
  title        = {Advances in Information and Computer Security - 13th International
                  Workshop on Security, {IWSEC} 2018, Sendai, Japan, September 3-5,
                  2018, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11049},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-97916-8},
  doi          = {10.1007/978-3-319-97916-8},
  isbn         = {978-3-319-97915-1},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwsec/2018.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DattaDNY18,
  author       = {Nilanjan Datta and
                  Avijit Dutta and
                  Mridul Nandi and
                  Kan Yasuda},
  title        = {Encrypt or Decrypt? To Make a Single-Key Beyond Birthday Secure Nonce-Based
                  {MAC}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {500},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/500},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DattaDNY18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ChakrabortiDNY18,
  author       = {Avik Chakraborti and
                  Nilanjan Datta and
                  Mridul Nandi and
                  Kan Yasuda},
  title        = {Beetle Family of Lightweight and Secure Authenticated Encryption Ciphers},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {805},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/805},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ChakrabortiDNY18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HosoyamadaY18,
  author       = {Akinori Hosoyamada and
                  Kan Yasuda},
  title        = {Building Quantum-One-Way Functions from Block Ciphers: Davies-Meyer
                  and Merkle-Damg{\aa}rd Constructions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {841},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/841},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/HosoyamadaY18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ispec/SasakiY17,
  author       = {Yu Sasaki and
                  Kan Yasuda},
  editor       = {Joseph K. Liu and
                  Pierangela Samarati},
  title        = {Optimizing Online Permutation-Based {AE} Schemes for Lightweight Applications},
  booktitle    = {Information Security Practice and Experience - 13th International
                  Conference, {ISPEC} 2017, Melbourne, VIC, Australia, December 13-15,
                  2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10701},
  pages        = {217--236},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-72359-4\_13},
  doi          = {10.1007/978-3-319-72359-4\_13},
  timestamp    = {Tue, 14 May 2019 10:00:40 +0200},
  biburl       = {https://dblp.org/rec/conf/ispec/SasakiY17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isw/HiroseSY17,
  author       = {Shoichi Hirose and
                  Yu Sasaki and
                  Kan Yasuda},
  editor       = {Phong Q. Nguyen and
                  Jianying Zhou},
  title        = {Rate-One {AE} with Security Under {RUP}},
  booktitle    = {Information Security - 20th International Conference, {ISC} 2017,
                  Ho Chi Minh City, Vietnam, November 22-24, 2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10599},
  pages        = {3--20},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-69659-1\_1},
  doi          = {10.1007/978-3-319-69659-1\_1},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/isw/HiroseSY17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HiroseSY17,
  author       = {Shoichi Hirose and
                  Yu Sasaki and
                  Kan Yasuda},
  title        = {Message-Recovery MACs and Verification-Unskippable {AE}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {260},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/260},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/HiroseSY17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/LuykxPSY16,
  author       = {Atul Luykx and
                  Bart Preneel and
                  Alan Szepieniec and
                  Kan Yasuda},
  editor       = {Marc Fischlin and
                  Jean{-}S{\'{e}}bastien Coron},
  title        = {On the Influence of Message Length in PMAC's Security Bounds},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2016 - 35th Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Vienna, Austria, May 8-12, 2016, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9665},
  pages        = {596--621},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-662-49890-3\_23},
  doi          = {10.1007/978-3-662-49890-3\_23},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/LuykxPSY16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/NaitoY16,
  author       = {Yusuke Naito and
                  Kan Yasuda},
  editor       = {Thomas Peyrin},
  title        = {New Bounds for Keyed Sponges with Extendable Output: Independence
                  Between Capacity and Message Length},
  booktitle    = {Fast Software Encryption - 23rd International Conference, {FSE} 2016,
                  Bochum, Germany, March 20-23, 2016, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {9783},
  pages        = {3--22},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-662-52993-5\_1},
  doi          = {10.1007/978-3-662-52993-5\_1},
  timestamp    = {Fri, 27 Mar 2020 08:58:25 +0100},
  biburl       = {https://dblp.org/rec/conf/fse/NaitoY16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/LuykxPTY16,
  author       = {Atul Luykx and
                  Bart Preneel and
                  Elmar Tischhauser and
                  Kan Yasuda},
  editor       = {Thomas Peyrin},
  title        = {A {MAC} Mode for Lightweight Block Ciphers},
  booktitle    = {Fast Software Encryption - 23rd International Conference, {FSE} 2016,
                  Bochum, Germany, March 20-23, 2016, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {9783},
  pages        = {43--59},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-662-52993-5\_3},
  doi          = {10.1007/978-3-662-52993-5\_3},
  timestamp    = {Tue, 29 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/fse/LuykxPTY16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LuykxPSY16,
  author       = {Atul Luykx and
                  Bart Preneel and
                  Alan Szepieniec and
                  Kan Yasuda},
  title        = {On the Influence of Message Length in PMAC's Security Bounds},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {185},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/185},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LuykxPSY16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LuykxPTY16,
  author       = {Atul Luykx and
                  Bart Preneel and
                  Elmar Tischhauser and
                  Kan Yasuda},
  title        = {A {MAC} Mode for Lightweight Block Ciphers},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {190},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/190},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LuykxPTY16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/NaitoY16,
  author       = {Yusuke Naito and
                  Kan Yasuda},
  title        = {New Bounds for Keyed Sponges with Extendable Output: Independence
                  between Capacity and Message Length},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {292},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/292},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/NaitoY16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/DattaY15,
  author       = {Nilanjan Datta and
                  Kan Yasuda},
  editor       = {Ernest Foo and
                  Douglas Stebila},
  title        = {Generalizing {PMAC} Under Weaker Assumptions},
  booktitle    = {Information Security and Privacy - 20th Australasian Conference, {ACISP}
                  2015, Brisbane, QLD, Australia, June 29 - July 1, 2015, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9144},
  pages        = {433--450},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-19962-7\_25},
  doi          = {10.1007/978-3-319-19962-7\_25},
  timestamp    = {Tue, 14 May 2019 10:00:46 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/DattaY15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ctrsa/SasakiY15,
  author       = {Yu Sasaki and
                  Kan Yasuda},
  editor       = {Kaisa Nyberg},
  title        = {How to Incorporate Associated Data in Sponge-Based Authenticated Encryption},
  booktitle    = {Topics in Cryptology - {CT-RSA} 2015, The Cryptographer's Track at
                  the {RSA} Conference 2015, San Francisco, CA, USA, April 20-24, 2015.
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9048},
  pages        = {353--370},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-16715-2\_19},
  doi          = {10.1007/978-3-319-16715-2\_19},
  timestamp    = {Thu, 14 Oct 2021 10:27:48 +0200},
  biburl       = {https://dblp.org/rec/conf/ctrsa/SasakiY15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sacrypt/SasakiY15,
  author       = {Yu Sasaki and
                  Kan Yasuda},
  editor       = {Orr Dunkelman and
                  Liam Keliher},
  title        = {A New Mode of Operation for Incremental Authenticated Encryption with
                  Associated Data},
  booktitle    = {Selected Areas in Cryptography - {SAC} 2015 - 22nd International Conference,
                  Sackville, NB, Canada, August 12-14, 2015, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {9566},
  pages        = {397--416},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-31301-6\_23},
  doi          = {10.1007/978-3-319-31301-6\_23},
  timestamp    = {Tue, 20 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sacrypt/SasakiY15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/AndreevaBLMMY14,
  author       = {Elena Andreeva and
                  Andrey Bogdanov and
                  Atul Luykx and
                  Bart Mennink and
                  Nicky Mouha and
                  Kan Yasuda},
  editor       = {Palash Sarkar and
                  Tetsu Iwata},
  title        = {How to Securely Release Unverified Plaintext in Authenticated Encryption},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2014 - 20th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Kaoshiung, Taiwan, R.O.C., December 7-11, 2014. Proceedings, Part
                  {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {8873},
  pages        = {105--125},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-662-45611-8\_6},
  doi          = {10.1007/978-3-662-45611-8\_6},
  timestamp    = {Tue, 14 May 2019 10:00:40 +0200},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/AndreevaBLMMY14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/AndreevaBBLMMY14,
  author       = {Elena Andreeva and
                  Beg{\"{u}}l Bilgin and
                  Andrey Bogdanov and
                  Atul Luykx and
                  Bart Mennink and
                  Nicky Mouha and
                  Kan Yasuda},
  editor       = {Carlos Cid and
                  Christian Rechberger},
  title        = {{APE:} Authenticated Permutation-Based Encryption for Lightweight
                  Cryptography},
  booktitle    = {Fast Software Encryption - 21st International Workshop, {FSE} 2014,
                  London, UK, March 3-5, 2014. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8540},
  pages        = {168--186},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-662-46706-0\_9},
  doi          = {10.1007/978-3-662-46706-0\_9},
  timestamp    = {Tue, 20 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/AndreevaBBLMMY14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/AndreevaLMY14,
  author       = {Elena Andreeva and
                  Atul Luykx and
                  Bart Mennink and
                  Kan Yasuda},
  editor       = {Carlos Cid and
                  Christian Rechberger},
  title        = {{COBRA:} {A} Parallelizable Authenticated Online Cipher Without Block
                  Cipher Inverse},
  booktitle    = {Fast Software Encryption - 21st International Workshop, {FSE} 2014,
                  London, UK, March 3-5, 2014. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8540},
  pages        = {187--204},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-662-46706-0\_10},
  doi          = {10.1007/978-3-662-46706-0\_10},
  timestamp    = {Tue, 20 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/AndreevaLMY14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AndreevaBLMMY14,
  author       = {Elena Andreeva and
                  Andrey Bogdanov and
                  Atul Luykx and
                  Bart Mennink and
                  Nicky Mouha and
                  Kan Yasuda},
  title        = {How to Securely Release Unverified Plaintext in Authenticated Encryption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {144},
  year         = {2014},
  url          = {http://eprint.iacr.org/2014/144},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AndreevaBLMMY14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/Yasuda13,
  author       = {Kan Yasuda},
  title        = {A Parallelizable PRF-Based {MAC} Algorithm: Well beyond the Birthday
                  Bound},
  journal      = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.},
  volume       = {96-A},
  number       = {1},
  pages        = {237--241},
  year         = {2013},
  url          = {https://doi.org/10.1587/transfun.E96.A.237},
  doi          = {10.1587/TRANSFUN.E96.A.237},
  timestamp    = {Sat, 11 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieicet/Yasuda13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/AndreevaBLMTY13,
  author       = {Elena Andreeva and
                  Andrey Bogdanov and
                  Atul Luykx and
                  Bart Mennink and
                  Elmar Tischhauser and
                  Kan Yasuda},
  editor       = {Kazue Sako and
                  Palash Sarkar},
  title        = {Parallelizable and Authenticated Online Ciphers},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2013 - 19th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Bengaluru, India, December 1-5, 2013, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {8269},
  pages        = {424--443},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-42033-7\_22},
  doi          = {10.1007/978-3-642-42033-7\_22},
  timestamp    = {Tue, 29 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/AndreevaBLMTY13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/NaitoSWY13,
  author       = {Yusuke Naito and
                  Yu Sasaki and
                  Lei Wang and
                  Kan Yasuda},
  editor       = {Kazuo Sakiyama and
                  Masayuki Terada},
  title        = {Generic State-Recovery and Forgery Attacks on ChopMD-MAC and on {NMAC/HMAC}},
  booktitle    = {Advances in Information and Computer Security - 8th International
                  Workshop on Security, {IWSEC} 2013, Okinawa, Japan, November 18-20,
                  2013, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8231},
  pages        = {83--98},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-41383-4\_6},
  doi          = {10.1007/978-3-642-41383-4\_6},
  timestamp    = {Tue, 14 May 2019 10:00:52 +0200},
  biburl       = {https://dblp.org/rec/conf/iwsec/NaitoSWY13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/provsec/AokiY13,
  author       = {Kazumaro Aoki and
                  Kan Yasuda},
  editor       = {Willy Susilo and
                  Reza Reyhanitabar},
  title        = {The Security of the {OCB} Mode of Operation without the {SPRP} Assumption},
  booktitle    = {Provable Security - 7th International Conference, ProvSec 2013, Melaka,
                  Malaysia, October 23-25, 2013. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8209},
  pages        = {202--220},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-41227-1\_12},
  doi          = {10.1007/978-3-642-41227-1\_12},
  timestamp    = {Tue, 14 May 2019 10:00:45 +0200},
  biburl       = {https://dblp.org/rec/conf/provsec/AokiY13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AndreevaBLMTY13,
  author       = {Elena Andreeva and
                  Andrey Bogdanov and
                  Atul Luykx and
                  Bart Mennink and
                  Elmar Tischhauser and
                  Kan Yasuda},
  title        = {Parallelizable and Authenticated Online Ciphers},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {790},
  year         = {2013},
  url          = {http://eprint.iacr.org/2013/790},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AndreevaBLMTY13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AndreevaBBLMMY13,
  author       = {Elena Andreeva and
                  Beg{\"{u}}l Bilgin and
                  Andrey Bogdanov and
                  Atul Luykx and
                  Bart Mennink and
                  Nicky Mouha and
                  Kan Yasuda},
  title        = {{APE:} Authenticated Permutation-Based Encryption for Lightweight
                  Cryptography},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {791},
  year         = {2013},
  url          = {http://eprint.iacr.org/2013/791},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AndreevaBBLMMY13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cisc/AokiY12,
  author       = {Kazumaro Aoki and
                  Kan Yasuda},
  editor       = {Miroslaw Kutylowski and
                  Moti Yung},
  title        = {The Security and Performance of "GCM" when Short Multiplications
                  Are Used Instead},
  booktitle    = {Information Security and Cryptology - 8th International Conference,
                  Inscrypt 2012, Beijing, China, November 28-30, 2012, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7763},
  pages        = {225--245},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-38519-3\_15},
  doi          = {10.1007/978-3-642-38519-3\_15},
  timestamp    = {Tue, 14 May 2019 10:00:52 +0200},
  biburl       = {https://dblp.org/rec/conf/cisc/AokiY12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ctrsa/Yasuda12,
  author       = {Kan Yasuda},
  editor       = {Orr Dunkelman},
  title        = {{PMAC} with Parity: Minimizing the Query-Length Influence},
  booktitle    = {Topics in Cryptology - {CT-RSA} 2012 - The Cryptographers' Track at
                  the {RSA} Conference 2012, San Francisco, CA, USA, February 27 - March
                  2, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7178},
  pages        = {203--214},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-27954-6\_13},
  doi          = {10.1007/978-3-642-27954-6\_13},
  timestamp    = {Tue, 14 May 2019 10:00:52 +0200},
  biburl       = {https://dblp.org/rec/conf/ctrsa/Yasuda12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/Yasuda11,
  author       = {Kan Yasuda},
  title        = {On the Full {MAC} Security of a Double-Piped Mode of Operation},
  journal      = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.},
  volume       = {94-A},
  number       = {1},
  pages        = {84--91},
  year         = {2011},
  url          = {https://doi.org/10.1587/transfun.E94.A.84},
  doi          = {10.1587/TRANSFUN.E94.A.84},
  timestamp    = {Sat, 11 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieicet/Yasuda11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/Yasuda11,
  author       = {Kan Yasuda},
  editor       = {Phillip Rogaway},
  title        = {A New Variant of {PMAC:} Beyond the Birthday Bound},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2011 - 31st Annual Cryptology Conference,
                  Santa Barbara, CA, USA, August 14-18, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6841},
  pages        = {596--609},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-22792-9\_34},
  doi          = {10.1007/978-3-642-22792-9\_34},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/Yasuda11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/SasakiY11,
  author       = {Yu Sasaki and
                  Kan Yasuda},
  editor       = {Antoine Joux},
  title        = {Known-Key Distinguishers on 11-Round Feistel and Collision Attacks
                  on Its Hashing Modes},
  booktitle    = {Fast Software Encryption - 18th International Workshop, {FSE} 2011,
                  Lyngby, Denmark, February 13-16, 2011, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {6733},
  pages        = {397--415},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-21702-9\_23},
  doi          = {10.1007/978-3-642-21702-9\_23},
  timestamp    = {Tue, 14 May 2019 10:00:54 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/SasakiY11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/Yasuda10,
  author       = {Kan Yasuda},
  title        = {Merkle-Damg{\aa}rd Hash Functions with Split Padding},
  journal      = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.},
  volume       = {93-A},
  number       = {1},
  pages        = {76--83},
  year         = {2010},
  url          = {https://doi.org/10.1587/transfun.E93.A.76},
  doi          = {10.1587/TRANSFUN.E93.A.76},
  timestamp    = {Sat, 11 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieicet/Yasuda10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ctrsa/Yasuda10,
  author       = {Kan Yasuda},
  editor       = {Josef Pieprzyk},
  title        = {The Sum of {CBC} MACs Is a Secure {PRF}},
  booktitle    = {Topics in Cryptology - {CT-RSA} 2010, The Cryptographers' Track at
                  the {RSA} Conference 2010, San Francisco, CA, USA, March 1-5, 2010.
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5985},
  pages        = {366--381},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-11925-5\_25},
  doi          = {10.1007/978-3-642-11925-5\_25},
  timestamp    = {Sun, 02 Jun 2019 21:22:43 +0200},
  biburl       = {https://dblp.org/rec/conf/ctrsa/Yasuda10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/Yasuda09,
  author       = {Kan Yasuda},
  editor       = {Antoine Joux},
  title        = {A Double-Piped Mode of Operation for MACs, PRFs and PROs: Security
                  beyond the Birthday Barrier},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2009, 28th Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Cologne, Germany, April 26-30, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5479},
  pages        = {242--259},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-01001-9\_14},
  doi          = {10.1007/978-3-642-01001-9\_14},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/Yasuda09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/IwataY09,
  author       = {Tetsu Iwata and
                  Kan Yasuda},
  editor       = {Orr Dunkelman},
  title        = {{HBS:} {A} Single-Key Mode of Operation for Deterministic Authenticated
                  Encryption},
  booktitle    = {Fast Software Encryption, 16th International Workshop, {FSE} 2009,
                  Leuven, Belgium, February 22-25, 2009, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {5665},
  pages        = {394--415},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-03317-9\_24},
  doi          = {10.1007/978-3-642-03317-9\_24},
  timestamp    = {Tue, 14 May 2019 10:00:54 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/IwataY09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isw/Yasuda09,
  author       = {Kan Yasuda},
  editor       = {Pierangela Samarati and
                  Moti Yung and
                  Fabio Martinelli and
                  Claudio A. Ardagna},
  title        = {{HMAC} without the "Second" Key},
  booktitle    = {Information Security, 12th International Conference, {ISC} 2009, Pisa,
                  Italy, September 7-9, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5735},
  pages        = {443--458},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-04474-8\_35},
  doi          = {10.1007/978-3-642-04474-8\_35},
  timestamp    = {Mon, 21 Mar 2022 18:09:53 +0100},
  biburl       = {https://dblp.org/rec/conf/isw/Yasuda09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sacrypt/IwataY09,
  author       = {Tetsu Iwata and
                  Kan Yasuda},
  editor       = {Michael J. Jacobson Jr. and
                  Vincent Rijmen and
                  Reihaneh Safavi{-}Naini},
  title        = {{BTM:} {A} Single-Key, Inverse-Cipher-Free Mode for Deterministic
                  Authenticated Encryption},
  booktitle    = {Selected Areas in Cryptography, 16th Annual International Workshop,
                  {SAC} 2009, Calgary, Alberta, Canada, August 13-14, 2009, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {5867},
  pages        = {313--330},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-05445-7\_20},
  doi          = {10.1007/978-3-642-05445-7\_20},
  timestamp    = {Tue, 14 May 2019 10:00:38 +0200},
  biburl       = {https://dblp.org/rec/conf/sacrypt/IwataY09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/Yasuda08,
  author       = {Kan Yasuda},
  editor       = {Josef Pieprzyk},
  title        = {How to Fill Up Merkle-Damg{\aa}rd Hash Functions},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2008, 14th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Melbourne, Australia, December 7-11, 2008. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5350},
  pages        = {272--289},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-89255-7\_17},
  doi          = {10.1007/978-3-540-89255-7\_17},
  timestamp    = {Sun, 02 Jun 2019 21:16:53 +0200},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/Yasuda08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/Yasuda08,
  author       = {Kan Yasuda},
  editor       = {Kaisa Nyberg},
  title        = {A One-Pass Mode of Operation for Deterministic Message Authentication-
                  Security beyond the Birthday Barrier},
  booktitle    = {Fast Software Encryption, 15th International Workshop, {FSE} 2008,
                  Lausanne, Switzerland, February 10-13, 2008, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {5086},
  pages        = {316--333},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-71039-4\_20},
  doi          = {10.1007/978-3-540-71039-4\_20},
  timestamp    = {Tue, 14 May 2019 10:00:54 +0200},
  biburl       = {https://dblp.org/rec/conf/fse/Yasuda08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icisc/Yasuda08,
  author       = {Kan Yasuda},
  editor       = {Pil Joong Lee and
                  Jung Hee Cheon},
  title        = {A Single-Key Domain Extender for Privacy-Preserving MACs and PRFs},
  booktitle    = {Information Security and Cryptology - {ICISC} 2008, 11th International
                  Conference, Seoul, Korea, December 3-5, 2008, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {5461},
  pages        = {268--285},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-642-00730-9\_17},
  doi          = {10.1007/978-3-642-00730-9\_17},
  timestamp    = {Tue, 14 May 2019 10:00:36 +0200},
  biburl       = {https://dblp.org/rec/conf/icisc/Yasuda08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/Yasuda07,
  author       = {Kan Yasuda},
  editor       = {Josef Pieprzyk and
                  Hossein Ghodosi and
                  Ed Dawson},
  title        = {"Sandwich" Is Indeed Secure: How to Authenticate a Message
                  with Just One Hashing},
  booktitle    = {Information Security and Privacy, 12th Australasian Conference, {ACISP}
                  2007, Townsville, Australia, July 2-4, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4586},
  pages        = {355--369},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-73458-1\_26},
  doi          = {10.1007/978-3-540-73458-1\_26},
  timestamp    = {Tue, 14 May 2019 10:00:46 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/Yasuda07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/Yasuda07,
  author       = {Kan Yasuda},
  editor       = {Kaoru Kurosawa},
  title        = {Boosting Merkle-Damg{\aa}rd Hashing for Message Authentication},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2007, 13th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Kuching, Malaysia, December 2-6, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4833},
  pages        = {216--231},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-76900-2\_13},
  doi          = {10.1007/978-3-540-76900-2\_13},
  timestamp    = {Tue, 14 May 2019 10:00:40 +0200},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/Yasuda07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/indocrypt/Yasuda07,
  author       = {Kan Yasuda},
  editor       = {K. Srinathan and
                  C. Pandu Rangan and
                  Moti Yung},
  title        = {Multilane {HMAC} - Security beyond the Birthday Limit},
  booktitle    = {Progress in Cryptology - {INDOCRYPT} 2007, 8th International Conference
                  on Cryptology in India, Chennai, India, December 9-13, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4859},
  pages        = {18--32},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-77026-8\_3},
  doi          = {10.1007/978-3-540-77026-8\_3},
  timestamp    = {Tue, 14 May 2019 10:00:51 +0200},
  biburl       = {https://dblp.org/rec/conf/indocrypt/Yasuda07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/secrypt/YasudaAFF06,
  author       = {Kan Yasuda and
                  Kazumaro Aoki and
                  Eiichiro Fujisaki and
                  Atsushi Fujioka},
  editor       = {Manu Malek and
                  Eduardo Fern{\'{a}}ndez{-}Medina and
                  Javier Hernando},
  title        = {Forward-Secure Authenticated-Encryption in Multi-Receiver Setting},
  booktitle    = {{SECRYPT} 2006, Proceedings of the International Conference on Security
                  and Cryptography, Set{\'{u}}bal, Portugal, August 7-10, 2006,
                  {SECRYPT} is part of {ICETE} - The International Joint Conference
                  on e-Business and Telecommunications},
  pages        = {141--148},
  publisher    = {{INSTICC} Press},
  year         = {2006},
  timestamp    = {Thu, 28 Sep 2006 10:10:32 +0200},
  biburl       = {https://dblp.org/rec/conf/secrypt/YasudaAFF06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics