Search the dblp DataBase
Kan Yasuda :
[Publications ]
[Author Rank by year ]
[Co-authors ]
[Prefers ]
[Cites ]
[Cited by ]
Publications of Author
Kan Yasuda , Kazumaro Aoki , Eiichiro Fujisaki , Atsushi Fujioka Forward-Secure Authenticated-Encryption in Multi-Receiver Setting. [Citation Graph (0, 0)][DBLP ] SECRYPT, 2006, pp:141-148 [Conf ] Kan Yasuda "Sandwich" Is Indeed Secure: How to Authenticate a Message with Just One Hashing. [Citation Graph (0, 0)][DBLP ] ACISP, 2007, pp:355-369 [Conf ] Kan Yasuda Boosting Merkle-Damgård Hashing for Message Authentication. [Citation Graph (0, 0)][DBLP ] ASIACRYPT, 2007, pp:216-231 [Conf ] How to Fill Up Merkle-Damgård Hash Functions. [Citation Graph (, )][DBLP ] The Sum of CBC MACs Is a Secure PRF. [Citation Graph (, )][DBLP ] A Double-Piped Mode of Operation for MACs, PRFs and PROs: Security beyond the Birthday Barrier. [Citation Graph (, )][DBLP ] HBS: A Single-Key Mode of Operation for Deterministic Authenticated Encryption. [Citation Graph (, )][DBLP ] A One-Pass Mode of Operation for Deterministic Message Authentication- Security beyond the Birthday Barrier. [Citation Graph (, )][DBLP ] A Single-Key Domain Extender for Privacy-Preserving MACs and PRFs. [Citation Graph (, )][DBLP ] Multilane HMAC - Security beyond the Birthday Limit. [Citation Graph (, )][DBLP ] HMAC without the "Second" Key. [Citation Graph (, )][DBLP ] BTM: A Single-Key, Inverse-Cipher-Free Mode for Deterministic Authenticated Encryption. [Citation Graph (, )][DBLP ] Search in 0.001secs, Finished in 0.002secs