Kazuhiko Minematsu

Orcid: 0000-0002-3427-6772

According to our database1, Kazuhiko Minematsu authored at least 94 papers between 2005 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Preface to Volume 2024, Issue 1.
IACR Trans. Symmetric Cryptol., 2024

Fallen Sanctuary: A Higher-Order and Leakage-Resilient Rekeying Scheme.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2024

Gleeok: A Family of Low-Latency PRFs and its Applications to Authenticated Encryption.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2024

2023
Nonce-misuse resilience of Romulus-N and GIFT-COFB.
IET Inf. Secur., May, 2023

Cubicle: A family of space-hard ciphers for IoT.
IET Inf. Secur., January, 2023

Key Committing Security of AEZ and More.
IACR Trans. Symmetric Cryptol., 2023

Areion: Highly-Efficient Permutations and Its Applications to Hash Functions for Short Input.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2023

Cryptanalysis on End-to-End Encryption Schemes of Communication Tools and Its Research Trend.
J. Inf. Process., 2023

Crystalor: Persistent Memory Encryption Mechanism with Optimized Metadata Structure and Fast Crash Recovery.
IACR Cryptol. ePrint Arch., 2023

Areion: Highly-Efficient Permutations and Its Applications (Extended Version).
IACR Cryptol. ePrint Arch., 2023

A Formal Treatment of Envelope Encryption.
IACR Cryptol. ePrint Arch., 2023

XOCB: Beyond-Birthday-Bound Secure Authenticated Encryption Mode with Rate-One Computation (Full Version).
IACR Cryptol. ePrint Arch., 2023

Authenticated Encryption for Very Short Inputs.
IACR Cryptol. ePrint Arch., 2023

Tight lower bounds and optimal constructions of anonymous broadcast encryption and authentication.
Des. Codes Cryptogr., 2023

Anonymous Broadcast Authentication With One-to-Many Transmission to Control IoT Devices.
IEEE Access, 2023

PMACrx: A Vector-Input MAC for High-Dimensional Vectors with BBB Security.
Proceedings of the Advances in Information and Computer Security, 2023

XOCB: Beyond-Birthday-Bound Secure Authenticated Encryption Mode with Rate-One Computation.
Proceedings of the Advances in Cryptology - EUROCRYPT 2023, 2023

2022
Cryptanalysis of Rocca and Feasibility of Its Security Claim.
IACR Trans. Symmetric Cryptol., 2022

ELM: A Low-Latency and Scalable Memory Encryption Scheme.
IEEE Trans. Inf. Forensics Secur., 2022

Integral and impossible-differential attacks on the reduced-round Lesamnta-LW-BC.
IET Inf. Secur., 2022

Matching attacks on Romulus-M.
IET Inf. Secur., 2022

New indifferentiability security proof of MDPH hash function.
IET Inf. Secur., 2022

Design of a Linear Layer for a Block Cipher Based on Type-2 Generalized Feistel Network with 32 Branches.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2022

Property-Preserving Hash Functions and Combinatorial Group Testing.
IACR Cryptol. ePrint Arch., 2022

Parallelizable Authenticated Encryption with Small State Size.
IACR Cryptol. ePrint Arch., 2022

Analyzing the Provable Security Bounds of GIFT-COFB and Photon-Beetle.
IACR Cryptol. ePrint Arch., 2022

Compactly Committing Authenticated Encryption Using Encryptment and Tweakable Block Cipher.
IACR Cryptol. ePrint Arch., 2022

Fast Skinny-128 SIMD Implementations for Sequential Modes of Operation.
IACR Cryptol. ePrint Arch., 2022

Efficient Word Size Modular Multiplication over Signed Integers.
Proceedings of the 29th IEEE Symposium on Computer Arithmetic, 2022

2021
Practical Integral Distinguishers on SNOW 3G and KCipher-2.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2021

MILP-Aided Security Evaluation of Differential Attacks on KCipher-2.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2021

Parallel Verification of Serial MAC and AE Modes.
IACR Cryptol. ePrint Arch., 2021

Security Analysis of SFrame.
IACR Cryptol. ePrint Arch., 2021

GIFT-COFB is Tightly Birthday Secure with Encryption Queries.
IACR Cryptol. ePrint Arch., 2021

Orthros: A Low-Latency PRF.
IACR Cryptol. ePrint Arch., 2021

2020
Fast Decryption: a New Feature of Misuse-Resistant AE.
IACR Trans. Symmetric Cryptol., 2020

Highly Secure Nonce-based MACs from the Sum of Tweakable Block Ciphers.
IACR Trans. Symmetric Cryptol., 2020

Cryptanalysis of OCB2: Attacks on Authenticity and Confidentiality.
J. Cryptol., 2020

Blockcipher-Based Authenticated Encryption: How Small Can We Go?
J. Cryptol., 2020

Tweakable TWINE: Building a Tweakable Block Cipher on Generalized Feistel Structure.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2020

Security of Related-Key Differential Attacks on TWINE, Revisited.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2020

Security Analysis and Countermeasures of an End-to-End Encryption Scheme of LINE.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2020

ACE in Chains : How Risky is CBC Encryption of Binary Executable Files ?
IACR Cryptol. ePrint Arch., 2020

GIFT-COFB.
IACR Cryptol. ePrint Arch., 2020

WARP : Revisiting GFN for Lightweight 128-bit Block Cipher.
IACR Cryptol. ePrint Arch., 2020

PMAC++: Incremental MAC Scheme Adaptable to Lightweight Block Ciphers.
Proceedings of the IEEE International Symposium on Circuits and Systems, 2020

2019
Symmetric-key Corruption Detection : When XOR-MACs Meet Combinatorial Group Testing.
IACR Cryptol. ePrint Arch., 2019

Efficient Message Authentication Codes with Combinatorial Group Testing.
IACR Cryptol. ePrint Arch., 2019

Duel of the Titans: The Romulus and Remus Families of Lightweight AEAD Algorithms.
IACR Cryptol. ePrint Arch., 2019

Plaintext Recovery Attacks against XTS Beyond Collisions.
IACR Cryptol. ePrint Arch., 2019

ZOCB and ZOTR: Tweakable Blockcipher Modes for Authenticated Encryption with Full Absorption.
IACR Cryptol. ePrint Arch., 2019

A Lightweight Alternative to PMAC.
Proceedings of the Selected Areas in Cryptography - SAC 2019, 2019

High Throughput/Gate FN-Based Hardware Architectures for AES-OTR.
Proceedings of the IEEE International Symposium on Circuits and Systems, 2019

2018
Integrity analysis of authenticated encryption based on stream ciphers.
Int. J. Inf. Sec., 2018

Breaking Message Integrity of an End-to-End Encryption Scheme of LINE.
IACR Cryptol. ePrint Arch., 2018

Cryptanalysis of OCB2.
IACR Cryptol. ePrint Arch., 2018

Connecting tweakable and multi-key blockcipher security.
Des. Codes Cryptogr., 2018

Count-then-Permute: A Precision-Free Alternative to Inversion Sampling.
Proceedings of the Topics in Cryptology - CT-RSA 2018, 2018

2017
Cryptanalysis of PMACx, PMAC2x, and SIVx.
IACR Cryptol. ePrint Arch., 2017

XHX - A Framework for Optimally Secure Tweakable Block Ciphers from Classical Block Ciphers and Universal Hashing.
IACR Cryptol. ePrint Arch., 2017

ZMAC: A Fast Tweakable Block Cipher Mode for Highly Secure Message Authentication.
IACR Cryptol. ePrint Arch., 2017

2016
Stronger Security Variants of GCM-SIV.
IACR Cryptol. ePrint Arch., 2016

Low-area hardware implementations of CLOC, SILC and AES-OTR.
Proceedings of the 2016 IEEE International Symposium on Hardware Oriented Security and Trust, 2016

Authenticated Encryption with Small Stretch (or, How to Accelerate AERO).
Proceedings of the Information Security and Privacy - 21st Australasian Conference, 2016

2015
Optimality of Tweak Functions in CLOC.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2015

GCM Security Bounds Reconsidered.
IACR Cryptol. ePrint Arch., 2015

Tweak-Length Extension for Tweakable Blockciphers.
IACR Cryptol. ePrint Arch., 2015

Authenticated Encryption without Tag Expansion (or, How to Accelerate AERO).
IACR Cryptol. ePrint Arch., 2015

Building blockcipher from small-block tweakable blockcipher.
Des. Codes Cryptogr., 2015

2014
CLOC: Authenticated Encryption for Short Input.
IACR Cryptol. ePrint Arch., 2014

Parallelizable Rate-1 Authenticated Encryption from Pseudorandom Functions.
Proceedings of the Advances in Cryptology - EUROCRYPT 2014, 2014

A smaller and faster variant of RSM.
Proceedings of the Design, Automation & Test in Europe Conference & Exhibition, 2014

2013
Improved Authenticity Bound of EAX, and Refinements.
IACR Cryptol. ePrint Arch., 2013

Parallelizable Authenticated Encryption from Functions.
IACR Cryptol. ePrint Arch., 2013

A Short Universal Hash Function from Bit Rotation, and Applications to Blockcipher Modes.
Proceedings of the Provable Security - 7th International Conference, 2013

Attacks and Security Proofs of EAX-Prime.
Proceedings of the Fast Software Encryption - 20th International Workshop, 2013

2012
Cryptanalysis of EAXprime.
IACR Cryptol. ePrint Arch., 2012

Breaking and Repairing GCM Security Proofs.
IACR Cryptol. ePrint Arch., 2012

$\textnormal{\textsc{TWINE}}$ : A Lightweight Block Cipher for Multiple Platforms.
Proceedings of the Selected Areas in Cryptography, 19th International Conference, 2012

2011
Building Blockcipher from Tweakable Blockcipher: Extending FSE 2009 Proposal.
Proceedings of the Cryptography and Coding - 13th IMA International Conference, 2011

On Maximum Differential Probability of Generalized Feistel.
Proceedings of the Information Security and Privacy - 16th Australasian Conference, 2011

2010
Improving the Generalized Feistel.
Proceedings of the Fast Software Encryption, 17th International Workshop, 2010

How to Thwart Birthday Attacks against MACs via Small Randomness.
Proceedings of the Fast Software Encryption, 17th International Workshop, 2010

2009
Generalization and Extension of XEX<sup>*</sup> Mode.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2009

Beyond-Birthday-Bound Security Based on Tweakable Block Cipher.
Proceedings of the Fast Software Encryption, 16th International Workshop, 2009

2007
Improved MACs from Differentially-Uniform Permutations.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2007

Tweakable Enciphering Schemes from Hash-Sum-Expansion.
Proceedings of the Progress in Cryptology, 2007

New Bounds for PMAC, TMAC, and XCBC.
Proceedings of the Fast Software Encryption, 14th International Workshop, 2007

2006
Improving cache attacks by considering cipher structure.
Int. J. Inf. Sec., 2006

Improved Security Analysis of XEX and LRW Modes.
Proceedings of the Selected Areas in Cryptography, 13th International Workshop, 2006

Provably Secure MACs from Differentially-Uniform Permutations and AES-Based Implementations.
Proceedings of the Fast Software Encryption, 13th International Workshop, 2006

2005
Shorter bit sequence is enough to break stream cipher LILI-128.
IEEE Trans. Inf. Theory, 2005

Expanding Weak PRF with Small Key Size.
Proceedings of the Information Security and Cryptology, 2005

Hybrid Symmetric Encryption Using Known-Plaintext Attack-Secure Components.
Proceedings of the Information Security and Cryptology, 2005


  Loading...