Kan Yasuda

According to our database1, Kan Yasuda authored at least 46 papers between 2006 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
The COLM Authenticated Encryption Scheme.
J. Cryptol., June, 2024

2023
Making the Identity-Based Diffie-Hellman Key Exchange Efficiently Revocable.
Proceedings of the Progress in Cryptology - LATINCRYPT 2023, 2023

2022
A Modular Approach to the Incompressibility of Block-Cipher-Based AEADs.
IACR Cryptol. ePrint Arch., 2022

Birthday-Bound Slide Attacks on TinyJAMBU's Keyed-Permutations for All Key Sizes.
Proceedings of the Advances in Information and Computer Security, 2022

The Multi-User Security of Triple Encryption, Revisited: Exact Security, Strengthening, and Application to TDES.
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022

2020
On the Composition of Single-Keyed Tweakable Even-Mansour for Achieving BBB Security.
IACR Trans. Symmetric Cryptol., 2020

Symmetric Cryptography (Dagstuhl Seminar 20041).
Dagstuhl Reports, 2020

2019
Beyond Conventional Security in Sponge-Based Authenticated Encryption Modes.
J. Cryptol., 2019

Optimizing Online Permutation-Based AE Schemes for Lightweight Applications.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2019

sfDWCDM+: A BBB secure nonce based MAC.
Adv. Math. Commun., 2019

2018
Beetle Family of Lightweight and Secure Authenticated Encryption Ciphers.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2018

Building Quantum-One-Way Functions from Block Ciphers: Davies-Meyer and Merkle-Damgård Constructions.
IACR Cryptol. ePrint Arch., 2018

Encrypt or Decrypt? To Make a Single-Key Beyond Birthday Secure Nonce-Based MAC.
IACR Cryptol. ePrint Arch., 2018

2017
Message-Recovery MACs and Verification-Unskippable AE.
IACR Cryptol. ePrint Arch., 2017

Rate-One AE with Security Under RUP.
Proceedings of the Information Security - 20th International Conference, 2017

2016
New Bounds for Keyed Sponges with Extendable Output: Independence between Capacity and Message Length.
IACR Cryptol. ePrint Arch., 2016

A MAC Mode for Lightweight Block Ciphers.
IACR Cryptol. ePrint Arch., 2016

On the Influence of Message Length in PMAC's Security Bounds.
IACR Cryptol. ePrint Arch., 2016

2015
A New Mode of Operation for Incremental Authenticated Encryption with Associated Data.
Proceedings of the Selected Areas in Cryptography - SAC 2015, 2015

How to Incorporate Associated Data in Sponge-Based Authenticated Encryption.
Proceedings of the Topics in Cryptology, 2015

Generalizing PMAC Under Weaker Assumptions.
Proceedings of the Information Security and Privacy - 20th Australasian Conference, 2015

2014
How to Securely Release Unverified Plaintext in Authenticated Encryption.
IACR Cryptol. ePrint Arch., 2014

COBRA: A Parallelizable Authenticated Online Cipher Without Block Cipher Inverse.
Proceedings of the Fast Software Encryption - 21st International Workshop, 2014

2013
A Parallelizable PRF-Based MAC Algorithm: Well beyond the Birthday Bound.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2013

Parallelizable and Authenticated Online Ciphers.
IACR Cryptol. ePrint Arch., 2013

APE: Authenticated Permutation-Based Encryption for Lightweight Cryptography.
IACR Cryptol. ePrint Arch., 2013

The Security of the OCB Mode of Operation without the SPRP Assumption.
Proceedings of the Provable Security - 7th International Conference, 2013

Generic State-Recovery and Forgery Attacks on ChopMD-MAC and on NMAC/HMAC.
Proceedings of the Advances in Information and Computer Security, 2013

2012
PMAC with Parity: Minimizing the Query-Length Influence.
Proceedings of the Topics in Cryptology - CT-RSA 2012 - The Cryptographers' Track at the RSA Conference 2012, San Francisco, CA, USA, February 27, 2012

The Security and Performance of "GCM" when Short Multiplications Are Used Instead.
Proceedings of the Information Security and Cryptology - 8th International Conference, 2012

2011
On the Full MAC Security of a Double-Piped Mode of Operation.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2011

Known-Key Distinguishers on 11-Round Feistel and Collision Attacks on Its Hashing Modes.
Proceedings of the Fast Software Encryption - 18th International Workshop, 2011

A New Variant of PMAC: Beyond the Birthday Bound.
Proceedings of the Advances in Cryptology - CRYPTO 2011, 2011

2010
Merkle-Damgård Hash Functions with Split Padding.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2010

The Sum of CBC MACs Is a Secure PRF.
Proceedings of the Topics in Cryptology, 2010

2009
BTM: A Single-Key, Inverse-Cipher-Free Mode for Deterministic Authenticated Encryption.
Proceedings of the Selected Areas in Cryptography, 16th Annual International Workshop, 2009

HMAC without the "Second" Key.
Proceedings of the Information Security, 12th International Conference, 2009

HBS: A Single-Key Mode of Operation for Deterministic Authenticated Encryption.
Proceedings of the Fast Software Encryption, 16th International Workshop, 2009

A Double-Piped Mode of Operation for MACs, PRFs and PROs: Security beyond the Birthday Barrier.
Proceedings of the Advances in Cryptology, 2009

2008
A Single-Key Domain Extender for Privacy-Preserving MACs and PRFs.
Proceedings of the Information Security and Cryptology, 2008

A One-Pass Mode of Operation for Deterministic Message Authentication- Security beyond the Birthday Barrier.
Proceedings of the Fast Software Encryption, 15th International Workshop, 2008

How to Fill Up Merkle-Damgård Hash Functions.
Proceedings of the Advances in Cryptology, 2008

2007
Multilane HMAC - Security beyond the Birthday Limit.
Proceedings of the Progress in Cryptology, 2007

Boosting Merkle-Damgård Hashing for Message Authentication.
Proceedings of the Advances in Cryptology, 2007

"Sandwich" Is Indeed Secure: How to Authenticate a Message with Just One Hashing.
Proceedings of the Information Security and Privacy, 12th Australasian Conference, 2007

2006
Forward-Secure Authenticated-Encryption in Multi-Receiver Setting.
Proceedings of the SECRYPT 2006, 2006


  Loading...