Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: Kan Yasuda
@article{DBLP:journals/joc/AndreevaBDLMNTY24, author = {Elena Andreeva and Andrey Bogdanov and Nilanjan Datta and Atul Luykx and Bart Mennink and Mridul Nandi and Elmar Tischhauser and Kan Yasuda}, title = {The {COLM} Authenticated Encryption Scheme}, journal = {J. Cryptol.}, volume = {37}, number = {2}, pages = {15}, year = {2024}, url = {https://doi.org/10.1007/s00145-024-09492-8}, doi = {10.1007/S00145-024-09492-8}, timestamp = {Tue, 19 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/joc/AndreevaBDLMNTY24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/latincrypt/NakagawaFNTXY23, author = {Kohei Nakagawa and Atsushi Fujioka and Akira Nagai and Junichi Tomida and Keita Xagawa and Kan Yasuda}, editor = {Abdelrahaman Aly and Mehdi Tibouchi}, title = {Making the Identity-Based Diffie-Hellman Key Exchange Efficiently Revocable}, booktitle = {Progress in Cryptology - {LATINCRYPT} 2023 - 8th International Conference on Cryptology and Information Security in Latin America, {LATINCRYPT} 2023, Quito, Ecuador, October 3-6, 2023, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {14168}, pages = {171--191}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-44469-2\_9}, doi = {10.1007/978-3-031-44469-2\_9}, timestamp = {Fri, 06 Oct 2023 18:13:29 +0200}, biburl = {https://dblp.org/rec/conf/latincrypt/NakagawaFNTXY23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/HosoyamadaITY22, author = {Akinori Hosoyamada and Takanori Isobe and Yosuke Todo and Kan Yasuda}, editor = {Shweta Agrawal and Dongdai Lin}, title = {A Modular Approach to the Incompressibility of Block-Cipher-Based AEADs}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2022 - 28th International Conference on the Theory and Application of Cryptology and Information Security, Taipei, Taiwan, December 5-9, 2022, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {13792}, pages = {585--619}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-22966-4\_20}, doi = {10.1007/978-3-031-22966-4\_20}, timestamp = {Fri, 10 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/asiacrypt/HosoyamadaITY22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/0001S0Y22, author = {Yusuke Naito and Yu Sasaki and Takeshi Sugawara and Kan Yasuda}, editor = {Heng Yin and Angelos Stavrou and Cas Cremers and Elaine Shi}, title = {The Multi-User Security of Triple Encryption, Revisited: Exact Security, Strengthening, and Application to {TDES}}, booktitle = {Proceedings of the 2022 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2022, Los Angeles, CA, USA, November 7-11, 2022}, pages = {2323--2336}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3548606.3560674}, doi = {10.1145/3548606.3560674}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/0001S0Y22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/SibleyrasSTHY22, author = {Ferdinand Sibleyras and Yu Sasaki and Yosuke Todo and Akinori Hosoyamada and Kan Yasuda}, editor = {Chen{-}Mou Cheng and Mitsuaki Akiyama}, title = {Birthday-Bound Slide Attacks on TinyJAMBU's Keyed-Permutations for All Key Sizes}, booktitle = {Advances in Information and Computer Security - 17th International Workshop on Security, {IWSEC} 2022, Tokyo, Japan, August 31 - September 2, 2022, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {13504}, pages = {107--127}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-15255-9\_6}, doi = {10.1007/978-3-031-15255-9\_6}, timestamp = {Thu, 18 Aug 2022 14:32:38 +0200}, biburl = {https://dblp.org/rec/conf/iwsec/SibleyrasSTHY22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/HosoyamadaITY22, author = {Akinori Hosoyamada and Takanori Isobe and Yosuke Todo and Kan Yasuda}, title = {A Modular Approach to the Incompressibility of Block-Cipher-Based AEADs}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1253}, year = {2022}, url = {https://eprint.iacr.org/2022/1253}, timestamp = {Sat, 22 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/HosoyamadaITY22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosc/ChakrabortiNTY20, author = {Avik Chakraborti and Mridul Nandi and Suprita Talnikar and Kan Yasuda}, title = {On the Composition of Single-Keyed Tweakable Even-Mansour for Achieving {BBB} Security}, journal = {{IACR} Trans. Symmetric Cryptol.}, volume = {2020}, number = {2}, pages = {1--39}, year = {2020}, url = {https://doi.org/10.13154/tosc.v2020.i2.1-39}, doi = {10.13154/TOSC.V2020.I2.1-39}, timestamp = {Tue, 04 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tosc/ChakrabortiNTY20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dagstuhl-reports/LeanderMNY20, author = {Nils Gregor Leander and Bart Mennink and Kaisa Nyberg and Kan Yasuda}, title = {Symmetric Cryptography (Dagstuhl Seminar 20041)}, journal = {Dagstuhl Reports}, volume = {10}, number = {1}, pages = {130--143}, year = {2020}, url = {https://doi.org/10.4230/DagRep.10.1.130}, doi = {10.4230/DAGREP.10.1.130}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dagstuhl-reports/LeanderMNY20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/amco/DattaDNY19, author = {Nilanjan Datta and Avijit Dutta and Mridul Nandi and Kan Yasuda}, title = {sfDWCDM+: {A} {BBB} secure nonce based {MAC}}, journal = {Adv. Math. Commun.}, volume = {13}, number = {4}, pages = {705--732}, year = {2019}, url = {https://doi.org/10.3934/amc.2019042}, doi = {10.3934/AMC.2019042}, timestamp = {Mon, 26 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/amco/DattaDNY19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/SasakiY19, author = {Yu Sasaki and Kan Yasuda}, title = {Optimizing Online Permutation-Based {AE} Schemes for Lightweight Applications}, journal = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.}, volume = {102-A}, number = {1}, pages = {35--47}, year = {2019}, url = {https://doi.org/10.1587/transfun.E102.A.35}, doi = {10.1587/TRANSFUN.E102.A.35}, timestamp = {Sat, 11 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieicet/SasakiY19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/joc/JovanovicLMSY19, author = {Philipp Jovanovic and Atul Luykx and Bart Mennink and Yu Sasaki and Kan Yasuda}, title = {Beyond Conventional Security in Sponge-Based Authenticated Encryption Modes}, journal = {J. Cryptol.}, volume = {32}, number = {3}, pages = {895--940}, year = {2019}, url = {https://doi.org/10.1007/s00145-018-9299-7}, doi = {10.1007/S00145-018-9299-7}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/joc/JovanovicLMSY19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tches/ChakrabortiDNY18, author = {Avik Chakraborti and Nilanjan Datta and Mridul Nandi and Kan Yasuda}, title = {Beetle Family of Lightweight and Secure Authenticated Encryption Ciphers}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2018}, number = {2}, pages = {218--241}, year = {2018}, url = {https://doi.org/10.13154/tches.v2018.i2.218-241}, doi = {10.13154/TCHES.V2018.I2.218-241}, timestamp = {Thu, 06 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tches/ChakrabortiDNY18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/HosoyamadaY18, author = {Akinori Hosoyamada and Kan Yasuda}, editor = {Thomas Peyrin and Steven D. Galbraith}, title = {Building Quantum-One-Way Functions from Block Ciphers: Davies-Meyer and Merkle-Damg{\aa}rd Constructions}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2018 - 24th International Conference on the Theory and Application of Cryptology and Information Security, Brisbane, QLD, Australia, December 2-6, 2018, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {11272}, pages = {275--304}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-03326-2\_10}, doi = {10.1007/978-3-030-03326-2\_10}, timestamp = {Mon, 16 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/asiacrypt/HosoyamadaY18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/DattaDNY18, author = {Nilanjan Datta and Avijit Dutta and Mridul Nandi and Kan Yasuda}, editor = {Hovav Shacham and Alexandra Boldyreva}, title = {Encrypt or Decrypt? To Make a Single-Key Beyond Birthday Secure Nonce-Based {MAC}}, booktitle = {Advances in Cryptology - {CRYPTO} 2018 - 38th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 19-23, 2018, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {10991}, pages = {631--661}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-96884-1\_21}, doi = {10.1007/978-3-319-96884-1\_21}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/DattaDNY18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/iwsec/2018, editor = {Atsuo Inomata and Kan Yasuda}, title = {Advances in Information and Computer Security - 13th International Workshop on Security, {IWSEC} 2018, Sendai, Japan, September 3-5, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11049}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-97916-8}, doi = {10.1007/978-3-319-97916-8}, isbn = {978-3-319-97915-1}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iwsec/2018.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DattaDNY18, author = {Nilanjan Datta and Avijit Dutta and Mridul Nandi and Kan Yasuda}, title = {Encrypt or Decrypt? To Make a Single-Key Beyond Birthday Secure Nonce-Based {MAC}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {500}, year = {2018}, url = {https://eprint.iacr.org/2018/500}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DattaDNY18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ChakrabortiDNY18, author = {Avik Chakraborti and Nilanjan Datta and Mridul Nandi and Kan Yasuda}, title = {Beetle Family of Lightweight and Secure Authenticated Encryption Ciphers}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {805}, year = {2018}, url = {https://eprint.iacr.org/2018/805}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ChakrabortiDNY18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/HosoyamadaY18, author = {Akinori Hosoyamada and Kan Yasuda}, title = {Building Quantum-One-Way Functions from Block Ciphers: Davies-Meyer and Merkle-Damg{\aa}rd Constructions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {841}, year = {2018}, url = {https://eprint.iacr.org/2018/841}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/HosoyamadaY18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ispec/SasakiY17, author = {Yu Sasaki and Kan Yasuda}, editor = {Joseph K. Liu and Pierangela Samarati}, title = {Optimizing Online Permutation-Based {AE} Schemes for Lightweight Applications}, booktitle = {Information Security Practice and Experience - 13th International Conference, {ISPEC} 2017, Melbourne, VIC, Australia, December 13-15, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10701}, pages = {217--236}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-72359-4\_13}, doi = {10.1007/978-3-319-72359-4\_13}, timestamp = {Tue, 14 May 2019 10:00:40 +0200}, biburl = {https://dblp.org/rec/conf/ispec/SasakiY17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isw/HiroseSY17, author = {Shoichi Hirose and Yu Sasaki and Kan Yasuda}, editor = {Phong Q. Nguyen and Jianying Zhou}, title = {Rate-One {AE} with Security Under {RUP}}, booktitle = {Information Security - 20th International Conference, {ISC} 2017, Ho Chi Minh City, Vietnam, November 22-24, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10599}, pages = {3--20}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-69659-1\_1}, doi = {10.1007/978-3-319-69659-1\_1}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/isw/HiroseSY17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/HiroseSY17, author = {Shoichi Hirose and Yu Sasaki and Kan Yasuda}, title = {Message-Recovery MACs and Verification-Unskippable {AE}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {260}, year = {2017}, url = {http://eprint.iacr.org/2017/260}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/HiroseSY17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/LuykxPSY16, author = {Atul Luykx and Bart Preneel and Alan Szepieniec and Kan Yasuda}, editor = {Marc Fischlin and Jean{-}S{\'{e}}bastien Coron}, title = {On the Influence of Message Length in PMAC's Security Bounds}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2016 - 35th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Vienna, Austria, May 8-12, 2016, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {9665}, pages = {596--621}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-49890-3\_23}, doi = {10.1007/978-3-662-49890-3\_23}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/LuykxPSY16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/NaitoY16, author = {Yusuke Naito and Kan Yasuda}, editor = {Thomas Peyrin}, title = {New Bounds for Keyed Sponges with Extendable Output: Independence Between Capacity and Message Length}, booktitle = {Fast Software Encryption - 23rd International Conference, {FSE} 2016, Bochum, Germany, March 20-23, 2016, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9783}, pages = {3--22}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-52993-5\_1}, doi = {10.1007/978-3-662-52993-5\_1}, timestamp = {Fri, 27 Mar 2020 08:58:25 +0100}, biburl = {https://dblp.org/rec/conf/fse/NaitoY16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/LuykxPTY16, author = {Atul Luykx and Bart Preneel and Elmar Tischhauser and Kan Yasuda}, editor = {Thomas Peyrin}, title = {A {MAC} Mode for Lightweight Block Ciphers}, booktitle = {Fast Software Encryption - 23rd International Conference, {FSE} 2016, Bochum, Germany, March 20-23, 2016, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9783}, pages = {43--59}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-52993-5\_3}, doi = {10.1007/978-3-662-52993-5\_3}, timestamp = {Tue, 29 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/fse/LuykxPTY16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LuykxPSY16, author = {Atul Luykx and Bart Preneel and Alan Szepieniec and Kan Yasuda}, title = {On the Influence of Message Length in PMAC's Security Bounds}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {185}, year = {2016}, url = {http://eprint.iacr.org/2016/185}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LuykxPSY16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LuykxPTY16, author = {Atul Luykx and Bart Preneel and Elmar Tischhauser and Kan Yasuda}, title = {A {MAC} Mode for Lightweight Block Ciphers}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {190}, year = {2016}, url = {http://eprint.iacr.org/2016/190}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LuykxPTY16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/NaitoY16, author = {Yusuke Naito and Kan Yasuda}, title = {New Bounds for Keyed Sponges with Extendable Output: Independence between Capacity and Message Length}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {292}, year = {2016}, url = {http://eprint.iacr.org/2016/292}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/NaitoY16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/DattaY15, author = {Nilanjan Datta and Kan Yasuda}, editor = {Ernest Foo and Douglas Stebila}, title = {Generalizing {PMAC} Under Weaker Assumptions}, booktitle = {Information Security and Privacy - 20th Australasian Conference, {ACISP} 2015, Brisbane, QLD, Australia, June 29 - July 1, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9144}, pages = {433--450}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-19962-7\_25}, doi = {10.1007/978-3-319-19962-7\_25}, timestamp = {Tue, 14 May 2019 10:00:46 +0200}, biburl = {https://dblp.org/rec/conf/acisp/DattaY15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ctrsa/SasakiY15, author = {Yu Sasaki and Kan Yasuda}, editor = {Kaisa Nyberg}, title = {How to Incorporate Associated Data in Sponge-Based Authenticated Encryption}, booktitle = {Topics in Cryptology - {CT-RSA} 2015, The Cryptographer's Track at the {RSA} Conference 2015, San Francisco, CA, USA, April 20-24, 2015. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9048}, pages = {353--370}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-16715-2\_19}, doi = {10.1007/978-3-319-16715-2\_19}, timestamp = {Thu, 14 Oct 2021 10:27:48 +0200}, biburl = {https://dblp.org/rec/conf/ctrsa/SasakiY15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacrypt/SasakiY15, author = {Yu Sasaki and Kan Yasuda}, editor = {Orr Dunkelman and Liam Keliher}, title = {A New Mode of Operation for Incremental Authenticated Encryption with Associated Data}, booktitle = {Selected Areas in Cryptography - {SAC} 2015 - 22nd International Conference, Sackville, NB, Canada, August 12-14, 2015, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9566}, pages = {397--416}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-31301-6\_23}, doi = {10.1007/978-3-319-31301-6\_23}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sacrypt/SasakiY15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/AndreevaBLMMY14, author = {Elena Andreeva and Andrey Bogdanov and Atul Luykx and Bart Mennink and Nicky Mouha and Kan Yasuda}, editor = {Palash Sarkar and Tetsu Iwata}, title = {How to Securely Release Unverified Plaintext in Authenticated Encryption}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2014 - 20th International Conference on the Theory and Application of Cryptology and Information Security, Kaoshiung, Taiwan, R.O.C., December 7-11, 2014. Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {8873}, pages = {105--125}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-662-45611-8\_6}, doi = {10.1007/978-3-662-45611-8\_6}, timestamp = {Tue, 14 May 2019 10:00:40 +0200}, biburl = {https://dblp.org/rec/conf/asiacrypt/AndreevaBLMMY14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/AndreevaBBLMMY14, author = {Elena Andreeva and Beg{\"{u}}l Bilgin and Andrey Bogdanov and Atul Luykx and Bart Mennink and Nicky Mouha and Kan Yasuda}, editor = {Carlos Cid and Christian Rechberger}, title = {{APE:} Authenticated Permutation-Based Encryption for Lightweight Cryptography}, booktitle = {Fast Software Encryption - 21st International Workshop, {FSE} 2014, London, UK, March 3-5, 2014. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8540}, pages = {168--186}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-662-46706-0\_9}, doi = {10.1007/978-3-662-46706-0\_9}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/AndreevaBBLMMY14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/AndreevaLMY14, author = {Elena Andreeva and Atul Luykx and Bart Mennink and Kan Yasuda}, editor = {Carlos Cid and Christian Rechberger}, title = {{COBRA:} {A} Parallelizable Authenticated Online Cipher Without Block Cipher Inverse}, booktitle = {Fast Software Encryption - 21st International Workshop, {FSE} 2014, London, UK, March 3-5, 2014. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8540}, pages = {187--204}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-662-46706-0\_10}, doi = {10.1007/978-3-662-46706-0\_10}, timestamp = {Tue, 20 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fse/AndreevaLMY14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AndreevaBLMMY14, author = {Elena Andreeva and Andrey Bogdanov and Atul Luykx and Bart Mennink and Nicky Mouha and Kan Yasuda}, title = {How to Securely Release Unverified Plaintext in Authenticated Encryption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {144}, year = {2014}, url = {http://eprint.iacr.org/2014/144}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AndreevaBLMMY14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/Yasuda13, author = {Kan Yasuda}, title = {A Parallelizable PRF-Based {MAC} Algorithm: Well beyond the Birthday Bound}, journal = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.}, volume = {96-A}, number = {1}, pages = {237--241}, year = {2013}, url = {https://doi.org/10.1587/transfun.E96.A.237}, doi = {10.1587/TRANSFUN.E96.A.237}, timestamp = {Sat, 11 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieicet/Yasuda13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/AndreevaBLMTY13, author = {Elena Andreeva and Andrey Bogdanov and Atul Luykx and Bart Mennink and Elmar Tischhauser and Kan Yasuda}, editor = {Kazue Sako and Palash Sarkar}, title = {Parallelizable and Authenticated Online Ciphers}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2013 - 19th International Conference on the Theory and Application of Cryptology and Information Security, Bengaluru, India, December 1-5, 2013, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {8269}, pages = {424--443}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-42033-7\_22}, doi = {10.1007/978-3-642-42033-7\_22}, timestamp = {Tue, 29 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/asiacrypt/AndreevaBLMTY13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/NaitoSWY13, author = {Yusuke Naito and Yu Sasaki and Lei Wang and Kan Yasuda}, editor = {Kazuo Sakiyama and Masayuki Terada}, title = {Generic State-Recovery and Forgery Attacks on ChopMD-MAC and on {NMAC/HMAC}}, booktitle = {Advances in Information and Computer Security - 8th International Workshop on Security, {IWSEC} 2013, Okinawa, Japan, November 18-20, 2013, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8231}, pages = {83--98}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-41383-4\_6}, doi = {10.1007/978-3-642-41383-4\_6}, timestamp = {Tue, 14 May 2019 10:00:52 +0200}, biburl = {https://dblp.org/rec/conf/iwsec/NaitoSWY13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/provsec/AokiY13, author = {Kazumaro Aoki and Kan Yasuda}, editor = {Willy Susilo and Reza Reyhanitabar}, title = {The Security of the {OCB} Mode of Operation without the {SPRP} Assumption}, booktitle = {Provable Security - 7th International Conference, ProvSec 2013, Melaka, Malaysia, October 23-25, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8209}, pages = {202--220}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-41227-1\_12}, doi = {10.1007/978-3-642-41227-1\_12}, timestamp = {Tue, 14 May 2019 10:00:45 +0200}, biburl = {https://dblp.org/rec/conf/provsec/AokiY13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AndreevaBLMTY13, author = {Elena Andreeva and Andrey Bogdanov and Atul Luykx and Bart Mennink and Elmar Tischhauser and Kan Yasuda}, title = {Parallelizable and Authenticated Online Ciphers}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {790}, year = {2013}, url = {http://eprint.iacr.org/2013/790}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AndreevaBLMTY13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AndreevaBBLMMY13, author = {Elena Andreeva and Beg{\"{u}}l Bilgin and Andrey Bogdanov and Atul Luykx and Bart Mennink and Nicky Mouha and Kan Yasuda}, title = {{APE:} Authenticated Permutation-Based Encryption for Lightweight Cryptography}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {791}, year = {2013}, url = {http://eprint.iacr.org/2013/791}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AndreevaBBLMMY13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisc/AokiY12, author = {Kazumaro Aoki and Kan Yasuda}, editor = {Miroslaw Kutylowski and Moti Yung}, title = {The Security and Performance of "GCM" when Short Multiplications Are Used Instead}, booktitle = {Information Security and Cryptology - 8th International Conference, Inscrypt 2012, Beijing, China, November 28-30, 2012, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7763}, pages = {225--245}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-38519-3\_15}, doi = {10.1007/978-3-642-38519-3\_15}, timestamp = {Tue, 14 May 2019 10:00:52 +0200}, biburl = {https://dblp.org/rec/conf/cisc/AokiY12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ctrsa/Yasuda12, author = {Kan Yasuda}, editor = {Orr Dunkelman}, title = {{PMAC} with Parity: Minimizing the Query-Length Influence}, booktitle = {Topics in Cryptology - {CT-RSA} 2012 - The Cryptographers' Track at the {RSA} Conference 2012, San Francisco, CA, USA, February 27 - March 2, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7178}, pages = {203--214}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-27954-6\_13}, doi = {10.1007/978-3-642-27954-6\_13}, timestamp = {Tue, 14 May 2019 10:00:52 +0200}, biburl = {https://dblp.org/rec/conf/ctrsa/Yasuda12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/Yasuda11, author = {Kan Yasuda}, title = {On the Full {MAC} Security of a Double-Piped Mode of Operation}, journal = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.}, volume = {94-A}, number = {1}, pages = {84--91}, year = {2011}, url = {https://doi.org/10.1587/transfun.E94.A.84}, doi = {10.1587/TRANSFUN.E94.A.84}, timestamp = {Sat, 11 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieicet/Yasuda11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/Yasuda11, author = {Kan Yasuda}, editor = {Phillip Rogaway}, title = {A New Variant of {PMAC:} Beyond the Birthday Bound}, booktitle = {Advances in Cryptology - {CRYPTO} 2011 - 31st Annual Cryptology Conference, Santa Barbara, CA, USA, August 14-18, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6841}, pages = {596--609}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-22792-9\_34}, doi = {10.1007/978-3-642-22792-9\_34}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/crypto/Yasuda11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/SasakiY11, author = {Yu Sasaki and Kan Yasuda}, editor = {Antoine Joux}, title = {Known-Key Distinguishers on 11-Round Feistel and Collision Attacks on Its Hashing Modes}, booktitle = {Fast Software Encryption - 18th International Workshop, {FSE} 2011, Lyngby, Denmark, February 13-16, 2011, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {6733}, pages = {397--415}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-21702-9\_23}, doi = {10.1007/978-3-642-21702-9\_23}, timestamp = {Tue, 14 May 2019 10:00:54 +0200}, biburl = {https://dblp.org/rec/conf/fse/SasakiY11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/Yasuda10, author = {Kan Yasuda}, title = {Merkle-Damg{\aa}rd Hash Functions with Split Padding}, journal = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.}, volume = {93-A}, number = {1}, pages = {76--83}, year = {2010}, url = {https://doi.org/10.1587/transfun.E93.A.76}, doi = {10.1587/TRANSFUN.E93.A.76}, timestamp = {Sat, 11 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieicet/Yasuda10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ctrsa/Yasuda10, author = {Kan Yasuda}, editor = {Josef Pieprzyk}, title = {The Sum of {CBC} MACs Is a Secure {PRF}}, booktitle = {Topics in Cryptology - {CT-RSA} 2010, The Cryptographers' Track at the {RSA} Conference 2010, San Francisco, CA, USA, March 1-5, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5985}, pages = {366--381}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-11925-5\_25}, doi = {10.1007/978-3-642-11925-5\_25}, timestamp = {Sun, 02 Jun 2019 21:22:43 +0200}, biburl = {https://dblp.org/rec/conf/ctrsa/Yasuda10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/Yasuda09, author = {Kan Yasuda}, editor = {Antoine Joux}, title = {A Double-Piped Mode of Operation for MACs, PRFs and PROs: Security beyond the Birthday Barrier}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2009, 28th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Cologne, Germany, April 26-30, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5479}, pages = {242--259}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-01001-9\_14}, doi = {10.1007/978-3-642-01001-9\_14}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/Yasuda09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/IwataY09, author = {Tetsu Iwata and Kan Yasuda}, editor = {Orr Dunkelman}, title = {{HBS:} {A} Single-Key Mode of Operation for Deterministic Authenticated Encryption}, booktitle = {Fast Software Encryption, 16th International Workshop, {FSE} 2009, Leuven, Belgium, February 22-25, 2009, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {5665}, pages = {394--415}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-03317-9\_24}, doi = {10.1007/978-3-642-03317-9\_24}, timestamp = {Tue, 14 May 2019 10:00:54 +0200}, biburl = {https://dblp.org/rec/conf/fse/IwataY09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isw/Yasuda09, author = {Kan Yasuda}, editor = {Pierangela Samarati and Moti Yung and Fabio Martinelli and Claudio A. Ardagna}, title = {{HMAC} without the "Second" Key}, booktitle = {Information Security, 12th International Conference, {ISC} 2009, Pisa, Italy, September 7-9, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5735}, pages = {443--458}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-04474-8\_35}, doi = {10.1007/978-3-642-04474-8\_35}, timestamp = {Mon, 21 Mar 2022 18:09:53 +0100}, biburl = {https://dblp.org/rec/conf/isw/Yasuda09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacrypt/IwataY09, author = {Tetsu Iwata and Kan Yasuda}, editor = {Michael J. Jacobson Jr. and Vincent Rijmen and Reihaneh Safavi{-}Naini}, title = {{BTM:} {A} Single-Key, Inverse-Cipher-Free Mode for Deterministic Authenticated Encryption}, booktitle = {Selected Areas in Cryptography, 16th Annual International Workshop, {SAC} 2009, Calgary, Alberta, Canada, August 13-14, 2009, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {5867}, pages = {313--330}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-05445-7\_20}, doi = {10.1007/978-3-642-05445-7\_20}, timestamp = {Tue, 14 May 2019 10:00:38 +0200}, biburl = {https://dblp.org/rec/conf/sacrypt/IwataY09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/Yasuda08, author = {Kan Yasuda}, editor = {Josef Pieprzyk}, title = {How to Fill Up Merkle-Damg{\aa}rd Hash Functions}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2008, 14th International Conference on the Theory and Application of Cryptology and Information Security, Melbourne, Australia, December 7-11, 2008. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5350}, pages = {272--289}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-89255-7\_17}, doi = {10.1007/978-3-540-89255-7\_17}, timestamp = {Sun, 02 Jun 2019 21:16:53 +0200}, biburl = {https://dblp.org/rec/conf/asiacrypt/Yasuda08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/Yasuda08, author = {Kan Yasuda}, editor = {Kaisa Nyberg}, title = {A One-Pass Mode of Operation for Deterministic Message Authentication- Security beyond the Birthday Barrier}, booktitle = {Fast Software Encryption, 15th International Workshop, {FSE} 2008, Lausanne, Switzerland, February 10-13, 2008, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {5086}, pages = {316--333}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-71039-4\_20}, doi = {10.1007/978-3-540-71039-4\_20}, timestamp = {Tue, 14 May 2019 10:00:54 +0200}, biburl = {https://dblp.org/rec/conf/fse/Yasuda08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icisc/Yasuda08, author = {Kan Yasuda}, editor = {Pil Joong Lee and Jung Hee Cheon}, title = {A Single-Key Domain Extender for Privacy-Preserving MACs and PRFs}, booktitle = {Information Security and Cryptology - {ICISC} 2008, 11th International Conference, Seoul, Korea, December 3-5, 2008, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {5461}, pages = {268--285}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-642-00730-9\_17}, doi = {10.1007/978-3-642-00730-9\_17}, timestamp = {Tue, 14 May 2019 10:00:36 +0200}, biburl = {https://dblp.org/rec/conf/icisc/Yasuda08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/Yasuda07, author = {Kan Yasuda}, editor = {Josef Pieprzyk and Hossein Ghodosi and Ed Dawson}, title = {"Sandwich" Is Indeed Secure: How to Authenticate a Message with Just One Hashing}, booktitle = {Information Security and Privacy, 12th Australasian Conference, {ACISP} 2007, Townsville, Australia, July 2-4, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4586}, pages = {355--369}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-73458-1\_26}, doi = {10.1007/978-3-540-73458-1\_26}, timestamp = {Tue, 14 May 2019 10:00:46 +0200}, biburl = {https://dblp.org/rec/conf/acisp/Yasuda07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/Yasuda07, author = {Kan Yasuda}, editor = {Kaoru Kurosawa}, title = {Boosting Merkle-Damg{\aa}rd Hashing for Message Authentication}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2007, 13th International Conference on the Theory and Application of Cryptology and Information Security, Kuching, Malaysia, December 2-6, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4833}, pages = {216--231}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-76900-2\_13}, doi = {10.1007/978-3-540-76900-2\_13}, timestamp = {Tue, 14 May 2019 10:00:40 +0200}, biburl = {https://dblp.org/rec/conf/asiacrypt/Yasuda07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/indocrypt/Yasuda07, author = {Kan Yasuda}, editor = {K. Srinathan and C. Pandu Rangan and Moti Yung}, title = {Multilane {HMAC} - Security beyond the Birthday Limit}, booktitle = {Progress in Cryptology - {INDOCRYPT} 2007, 8th International Conference on Cryptology in India, Chennai, India, December 9-13, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4859}, pages = {18--32}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-77026-8\_3}, doi = {10.1007/978-3-540-77026-8\_3}, timestamp = {Tue, 14 May 2019 10:00:51 +0200}, biburl = {https://dblp.org/rec/conf/indocrypt/Yasuda07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/secrypt/YasudaAFF06, author = {Kan Yasuda and Kazumaro Aoki and Eiichiro Fujisaki and Atsushi Fujioka}, editor = {Manu Malek and Eduardo Fern{\'{a}}ndez{-}Medina and Javier Hernando}, title = {Forward-Secure Authenticated-Encryption in Multi-Receiver Setting}, booktitle = {{SECRYPT} 2006, Proceedings of the International Conference on Security and Cryptography, Set{\'{u}}bal, Portugal, August 7-10, 2006, {SECRYPT} is part of {ICETE} - The International Joint Conference on e-Business and Telecommunications}, pages = {141--148}, publisher = {{INSTICC} Press}, year = {2006}, timestamp = {Thu, 28 Sep 2006 10:10:32 +0200}, biburl = {https://dblp.org/rec/conf/secrypt/YasudaAFF06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.