2008 |
31 | EE | Tetsu Iwata:
Authenticated Encryption Mode for Beyond the Birthday Bound Security.
AFRICACRYPT 2008: 125-142 |
30 | EE | Atsushi Mitsuda,
Tetsu Iwata:
Tweakable Pseudorandom Permutation from Generalized Feistel Structure.
ProvSec 2008: 22-37 |
29 | EE | Tetsu Iwata,
Tohru Yagi,
Kaoru Kurosawa:
Security of the Five-Round Kasumi Type Permutation.
IEICE Transactions 91-A(1): 30-38 (2008) |
2007 |
28 | EE | Taizo Shirai,
Kyoji Shibutani,
Toru Akishita,
Shiho Moriai,
Tetsu Iwata:
The 128-Bit Blockcipher CLEFIA (Extended Abstract).
FSE 2007: 181-195 |
27 | EE | Tetsu Iwata:
Tightness of the Security Bound of CENC.
Symmetric Cryptography 2007 |
26 | EE | Tetsu Iwata,
Kaoru Kurosawa:
How to Construct Super-Pseudorandom Permutations with Short Keys.
IEICE Transactions 90-A(1): 2-13 (2007) |
2006 |
25 | EE | Tetsu Iwata:
New Blockcipher Modes of Operation with Beyond the Birthday Bound Security.
FSE 2006: 310-327 |
2005 |
24 | EE | Katsuyuki Okeya,
Tetsu Iwata:
Side Channel Attacks on Message Authentication Codes.
ESAS 2005: 205-217 |
23 | EE | Tetsu Iwata,
Kaoru Kurosawa:
How to Enhance the Security of the 3GPP Confidentiality and Integrity Algorithms.
FSE 2005: 268-283 |
22 | EE | Tetsu Iwata,
Kaoru Kurosawa:
On the Security of a MAC by Mitchell.
IEICE Transactions 88-A(1): 25-32 (2005) |
21 | EE | Kaoru Kurosawa,
Tetsu Iwata,
Quang Viet Duong:
How to Improve Interpolation Attack.
IEICE Transactions 88-A(1): 9-15 (2005) |
2004 |
20 | EE | Tetsu Iwata,
Kaoru Kurosawa:
How to Re-use Round Function in Super-Pseudorandom Permutation.
ACISP 2004: 224-235 |
19 | EE | Tetsu Iwata,
Tadayoshi Kohno:
New Security Proofs for the 3GPP Confidentiality and Integrity Algorithms.
FSE 2004: 427-445 |
18 | | Kaoru Kurosawa,
Tetsu Iwata,
Takayuki Yoshiwara:
New covering radius of Reed-Muller codes for t-resilient functions.
IEEE Transactions on Information Theory 20(3): 468-475 (2004) |
17 | EE | Kaoru Kurosawa,
Tetsu Iwata:
TMAC: Two-Key CBC MAC.
IEICE Transactions 87-A(1): 46-52 (2004) |
16 | EE | Tetsu Iwata,
Kaoru Kurosawa:
On the Universal Hash Functions in Luby-Rackoff Cipher.
IEICE Transactions 87-A(1): 60-66 (2004) |
2003 |
15 | EE | Tetsu Iwata,
Tohru Yagi,
Kaoru Kurosawa:
On the Pseudorandomness of KASUMI Type Permutations.
ACISP 2003: 130-141 |
14 | EE | Kaoru Kurosawa,
Tetsu Iwata:
TMAC: Two-Key CBC MAC.
CT-RSA 2003: 33-49 |
13 | EE | Tetsu Iwata,
Kaoru Kurosawa:
OMAC: One-Key CBC MAC.
FSE 2003: 129-153 |
12 | EE | Tetsu Iwata,
Kaoru Kurosawa:
On the Security of a New Variant of OMAC.
ICISC 2003: 67-78 |
11 | EE | Tetsu Iwata,
Kaoru Kurosawa:
On the Correctness of Security Proofs for the 3GPP Confidentiality and Integrity Algorithms.
IMA Int. Conf. 2003: 306-318 |
10 | EE | Tetsu Iwata,
Kaoru Kurosawa:
Stronger Security Bounds for OMAC, TMAC, and XCBC.
INDOCRYPT 2003: 402-415 |
9 | EE | Tetsu Iwata,
Tomonobu Yoshino,
Kaoru Kurosawa:
Non-cryptographic primitive for pseudorandom permutation.
Theor. Comput. Sci. 306(1-3): 139-154 (2003) |
2002 |
8 | EE | Tetsu Iwata,
Tomonobu Yoshino,
Kaoru Kurosawa:
Non-cryptographic Primitive for Pseudorandom Permutation.
FSE 2002: 149-163 |
7 | EE | Tetsu Iwata,
Kaoru Kurosawa:
On the Universal Hash Functionsin Luby-Rackoff Cipher.
ICISC 2002: 226-236 |
2001 |
6 | EE | Tetsu Iwata,
Tomonobu Yoshino,
Tomohiro Yuasa,
Kaoru Kurosawa:
Round Security and Super-Pseudorandomness of MISTY Type Structure.
FSE 2001: 233-247 |
5 | EE | Tetsu Iwata,
Takayuki Yoshiwara,
Kaoru Kurosawa:
New Covering Radius of Reed-Muller Codes for t-Resilient Functions.
Selected Areas in Cryptography 2001: 75-86 |
2000 |
4 | EE | Tetsu Iwata,
Kaoru Kurosawa:
On the Pseudorandomness of the AES Finalists - RC6 and Serpent.
FSE 2000: 231-243 |
3 | EE | Kaoru Kurosawa,
Tetsu Iwata,
Quang Viet Duong:
Root Finding Interpolation Attack.
Selected Areas in Cryptography 2000: 303-314 |
1999 |
2 | | Takashi Satoh,
Tetsu Iwata,
Kaoru Kurosawa:
On Cryptographically Secure Vectorial Boolean Functions.
ASIACRYPT 1999: 20-28 |
1 | | Tetsu Iwata,
Kaoru Kurosawa:
Probabilistic Higher Order Differential Attack and Higher Order Bent Functions.
ASIACRYPT 1999: 62-74 |