Search the dblp DataBase
Tetsu Iwata :
[Publications ]
[Author Rank by year ]
[Co-authors ]
[Prefers ]
[Cites ]
[Cited by ]
Publications of Author
Tetsu Iwata , Kaoru Kurosawa How to Re-use Round Function in Super-Pseudorandom Permutation. [Citation Graph (0, 0)][DBLP ] ACISP, 2004, pp:224-235 [Conf ] Tetsu Iwata , Tohru Yagi , Kaoru Kurosawa On the Pseudorandomness of KASUMI Type Permutations. [Citation Graph (0, 0)][DBLP ] ACISP, 2003, pp:130-141 [Conf ] Tetsu Iwata , Kaoru Kurosawa Probabilistic Higher Order Differential Attack and Higher Order Bent Functions. [Citation Graph (0, 0)][DBLP ] ASIACRYPT, 1999, pp:62-74 [Conf ] Takashi Satoh , Tetsu Iwata , Kaoru Kurosawa On Cryptographically Secure Vectorial Boolean Functions. [Citation Graph (0, 0)][DBLP ] ASIACRYPT, 1999, pp:20-28 [Conf ] Kaoru Kurosawa , Tetsu Iwata TMAC: Two-Key CBC MAC. [Citation Graph (0, 0)][DBLP ] CT-RSA, 2003, pp:33-49 [Conf ] Katsuyuki Okeya , Tetsu Iwata Side Channel Attacks on Message Authentication Codes. [Citation Graph (0, 0)][DBLP ] ESAS, 2005, pp:205-217 [Conf ] Tetsu Iwata , Kaoru Kurosawa On the Pseudorandomness of the AES Finalists - RC6 and Serpent. [Citation Graph (0, 0)][DBLP ] FSE, 2000, pp:231-243 [Conf ] Tetsu Iwata , Kaoru Kurosawa OMAC: One-Key CBC MAC. [Citation Graph (0, 0)][DBLP ] FSE, 2003, pp:129-153 [Conf ] Tetsu Iwata , Tadayoshi Kohno New Security Proofs for the 3GPP Confidentiality and Integrity Algorithms. [Citation Graph (0, 0)][DBLP ] FSE, 2004, pp:427-445 [Conf ] Tetsu Iwata , Kaoru Kurosawa How to Enhance the Security of the 3GPP Confidentiality and Integrity Algorithms. [Citation Graph (0, 0)][DBLP ] FSE, 2005, pp:268-283 [Conf ] Tetsu Iwata , Tomonobu Yoshino , Kaoru Kurosawa Non-cryptographic Primitive for Pseudorandom Permutation. [Citation Graph (0, 0)][DBLP ] FSE, 2002, pp:149-163 [Conf ] Tetsu Iwata , Tomonobu Yoshino , Tomohiro Yuasa , Kaoru Kurosawa Round Security and Super-Pseudorandomness of MISTY Type Structure. [Citation Graph (0, 0)][DBLP ] FSE, 2001, pp:233-247 [Conf ] Tetsu Iwata New Blockcipher Modes of Operation with Beyond the Birthday Bound Security. [Citation Graph (0, 0)][DBLP ] FSE, 2006, pp:310-327 [Conf ] Tetsu Iwata , Kaoru Kurosawa On the Universal Hash Functionsin Luby-Rackoff Cipher. [Citation Graph (0, 0)][DBLP ] ICISC, 2002, pp:226-236 [Conf ] Tetsu Iwata , Kaoru Kurosawa On the Security of a New Variant of OMAC. [Citation Graph (0, 0)][DBLP ] ICISC, 2003, pp:67-78 [Conf ] Tetsu Iwata , Kaoru Kurosawa On the Correctness of Security Proofs for the 3GPP Confidentiality and Integrity Algorithms. [Citation Graph (0, 0)][DBLP ] IMA Int. Conf., 2003, pp:306-318 [Conf ] Tetsu Iwata , Kaoru Kurosawa Stronger Security Bounds for OMAC, TMAC, and XCBC. [Citation Graph (0, 0)][DBLP ] INDOCRYPT, 2003, pp:402-415 [Conf ] Tetsu Iwata , Takayuki Yoshiwara , Kaoru Kurosawa New Covering Radius of Reed-Muller Codes for t-Resilient Functions. [Citation Graph (0, 0)][DBLP ] Selected Areas in Cryptography, 2001, pp:75-86 [Conf ] Kaoru Kurosawa , Tetsu Iwata , Quang Viet Duong Root Finding Interpolation Attack. [Citation Graph (0, 0)][DBLP ] Selected Areas in Cryptography, 2000, pp:303-314 [Conf ] Kaoru Kurosawa , Tetsu Iwata TMAC: Two-Key CBC MAC. [Citation Graph (0, 0)][DBLP ] IEICE Transactions, 2004, v:87, n:1, pp:46-52 [Journal ] Kaoru Kurosawa , Tetsu Iwata , Quang Viet Duong How to Improve Interpolation Attack. [Citation Graph (0, 0)][DBLP ] IEICE Transactions, 2005, v:88, n:1, pp:9-15 [Journal ] Tetsu Iwata , Kaoru Kurosawa On the Universal Hash Functions in Luby-Rackoff Cipher. [Citation Graph (0, 0)][DBLP ] IEICE Transactions, 2004, v:87, n:1, pp:60-66 [Journal ] Tetsu Iwata , Kaoru Kurosawa On the Security of a MAC by Mitchell. [Citation Graph (0, 0)][DBLP ] IEICE Transactions, 2005, v:88, n:1, pp:25-32 [Journal ] Tetsu Iwata , Tomonobu Yoshino , Kaoru Kurosawa Non-cryptographic primitive for pseudorandom permutation. [Citation Graph (0, 0)][DBLP ] Theor. Comput. Sci., 2003, v:306, n:1-3, pp:139-154 [Journal ] Kaoru Kurosawa , Tetsu Iwata , Takayuki Yoshiwara New covering radius of Reed-Muller codes for t-resilient functions. [Citation Graph (0, 0)][DBLP ] IEEE Transactions on Information Theory, 2004, v:20, n:3, pp:468-475 [Journal ] Taizo Shirai , Kyoji Shibutani , Toru Akishita , Shiho Moriai , Tetsu Iwata The 128-Bit Blockcipher CLEFIA (Extended Abstract). [Citation Graph (0, 0)][DBLP ] FSE, 2007, pp:181-195 [Conf ] Tightness of the Security Bound of CENC. [Citation Graph (, )][DBLP ] HBS: A Single-Key Mode of Operation for Deterministic Authenticated Encryption. [Citation Graph (, )][DBLP ] Bounds on Fixed Input/Output Length Post-processing Functions for Biased Physical Random Number Generators. [Citation Graph (, )][DBLP ] BTM: A Single-Key, Inverse-Cipher-Free Mode for Deterministic Authenticated Encryption. [Citation Graph (, )][DBLP ] Tweakable Pseudorandom Permutation from Generalized Feistel Structure. [Citation Graph (, )][DBLP ] Authenticated Encryption Mode for Beyond the Birthday Bound Security. [Citation Graph (, )][DBLP ] Search in 0.002secs, Finished in 0.305secs