Tetsu Iwata
Orcid: 0000-0002-4729-0979
According to our database1,
Tetsu Iwata
authored at least 103 papers
between 1998 and 2026.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2026
2025
IACR Cryptol. ePrint Arch., 2025
Type-2 Generalized Feistel Structures Based on Tweakable Block Ciphers, Reconsidered.
IACR Commun. Cryptol., 2025
Proceedings of the Topics in Cryptology - CT-RSA 2025, 2025
Proceedings of the Advances in Cryptology - CRYPTO 2025, 2025
Poster: An Improved Quantum Attack on the Two-round Even-Mansour Cipher with Independent Permutations and Keys.
Proceedings of the 2025 ACM SIGSAC Conference on Computer and Communications Security, 2025
2024
Key Recovery, Universal Forgery, and Committing Attacks against Revised Rocca: How Finalization Affects Security.
IACR Trans. Symmetric Cryptol., 2024
2023
Proceedings of the Advances in Information and Computer Security, 2023
Proceedings of the Cryptography and Coding - 19th IMA International Conference, 2023
2022
IACR Trans. Symmetric Cryptol., 2022
IACR Trans. Symmetric Cryptol., 2022
Inf. Process. Lett., 2022
On the (im)possibility of improving the round diffusion of generalized Feistel structures.
Inf. Process. Lett., 2022
Proceedings of the Applied Cryptography and Network Security, 2022
2021
IACR Cryptol. ePrint Arch., 2021
Proceedings of the Advances in Cryptology - CRYPTO 2021, 2021
2020
Beyond-Birthday-Bound Secure Cryptographic Permutations from Ideal Ciphers with Long Keys.
IACR Trans. Symmetric Cryptol., 2020
IACR Cryptol. ePrint Arch., 2020
2019
IACR Trans. Symmetric Cryptol., 2019
IACR Cryptol. ePrint Arch., 2019
IACR Cryptol. ePrint Arch., 2019
IACR Cryptol. ePrint Arch., 2019
ZOCB and ZOTR: Tweakable Blockcipher Modes for Authenticated Encryption with Full Absorption.
IACR Cryptol. ePrint Arch., 2019
Quantum Attacks Against Type-1 Generalized Feistel Ciphers and Applications to CAST-256.
Proceedings of the Progress in Cryptology - INDOCRYPT 2019, 2019
Proceedings of the Topics in Cryptology - CT-RSA 2019, 2019
Proceedings of the Topics in Cryptology - CT-RSA 2019, 2019
Proceedings of the Advances in Cryptology - CRYPTO 2019, 2019
Proceedings of the Advances in Cryptology - ASIACRYPT 2019, 2019
2018
On the Design Rationale of SIMON Block Cipher: Integral Attacks and Impossible Differential Attacks against SIMON Variants.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2018
2017
On the Security of Schnorr Signatures, DSA, and ElGamal Signatures against Related-Key Attacks.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2017
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2017
Analyzing Key Schedule of Simon: Iterative Key Differences and Application to Related-Key Impossible Differentials.
Proceedings of the Advances in Information and Computer Security, 2017
Proceedings of the Advances in Cryptology - CRYPTO 2017, 2017
Proceedings of the Cryptographic Hardware and Embedded Systems - CHES 2017, 2017
2016
Proceedings of the Provable Security, 2016
On the Design Rationale of Simon Block Cipher: Integral Attacks and Impossible Differential Attacks against Simon Variants.
Proceedings of the Applied Cryptography and Network Security, 2016
2015
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2015
Proceedings of the Cryptography and Coding - 15th IMA International Conference, 2015
Proceedings of the Information Security and Cryptology - ICISC 2015, 2015
Proceedings of the Fast Software Encryption - 22nd International Workshop, 2015
2014
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2014
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2014
Proceedings of the Fast Software Encryption - 21st International Workshop, 2014
Proceedings of the Fast Software Encryption - 21st International Workshop, 2014
2013
Improving the Permutation Layer of Type 1, Type 3, Source-Heavy, and Target-Heavy Generalized Feistel Structures.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2013
Proceedings of the Provable Security - 7th International Conference, 2013
Proceedings of the Fast Software Encryption - 20th International Workshop, 2013
2012
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2012
Proceedings of the Advances in Cryptology - CRYPTO 2012, 2012
Proceedings of the Applied Cryptography and Network Security, 2012
2011
Proceedings of the Cryptography and Coding - 13th IMA International Conference, 2011
Proceedings of the Cryptography and Coding - 13th IMA International Conference, 2011
On Permutation Layer of Type 1, Source-Heavy, and Target-Heavy Generalized Feistel Structures.
Proceedings of the Cryptology and Network Security - 10th International Conference, 2011
2010
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2010
2009
BTM: A Single-Key, Inverse-Cipher-Free Mode for Deterministic Authenticated Encryption.
Proceedings of the Selected Areas in Cryptography, 16th Annual International Workshop, 2009
Proceedings of the Fast Software Encryption, 16th International Workshop, 2009
2008
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2008
Bounds on Fixed Input/Output Length Post-processing Functions for Biased Physical Random Number Generators.
Proceedings of the Selected Areas in Cryptography, 15th International Workshop, SAC 2008, 2008
Proceedings of the Provable Security, Second International Conference, 2008
Proceedings of the Progress in Cryptology, 2008
2007
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2007
Proceedings of the Fast Software Encryption, 14th International Workshop, 2007
Proceedings of the Symmetric Cryptography, 07.01. - 12.01.2007, 2007
2006
The Advanced Encryption Standard-Cipher-based Message Authentication Code-Pseudo-Random Function-128 (AES-CMAC-PRF-128) Algorithm for the Internet Key Exchange Protocol (IKE).
RFC, August, 2006
Proceedings of the Fast Software Encryption, 13th International Workshop, 2006
2005
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2005
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2005
Proceedings of the Fast Software Encryption: 12th International Workshop, 2005
Proceedings of the Security and Privacy in Ad-hoc and Sensor Networks, 2005
2004
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2004
Proceedings of the Fast Software Encryption, 11th International Workshop, 2004
Proceedings of the Information Security and Privacy: 9th Australasian Conference, 2004
2003
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2003
Proceedings of the Progress in Cryptology, 2003
On the Correctness of Security Proofs for the 3GPP Confidentiality and Integrity Algorithms.
Proceedings of the Cryptography and Coding, 2003
Proceedings of the Information Security and Cryptology, 2003
Proceedings of the Fast Software Encryption, 10th International Workshop, 2003
Proceedings of the Information Security and Privacy, 8th Australasian Conference, 2003
2002
Proceedings of the Information Security and Cryptology, 2002
Proceedings of the Fast Software Encryption, 9th International Workshop, 2002
2001
Proceedings of the Selected Areas in Cryptography, 8th Annual International Workshop, 2001
Proceedings of the Fast Software Encryption, 8th International Workshop, 2001
2000
Proceedings of the Selected Areas in Cryptography, 7th Annual International Workshop, 2000
Proceedings of the Fast Software Encryption, 7th International Workshop, 2000
1999
Proceedings of the Advances in Cryptology, 1999
Proceedings of the Advances in Cryptology, 1999
1998
Proceedings of the Sequences and their Applications, 1998