Kan Yasuda
According to our database1,
Kan Yasuda
authored at least 46 papers
between 2006 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
2023
Proceedings of the Progress in Cryptology - LATINCRYPT 2023, 2023
2022
IACR Cryptol. ePrint Arch., 2022
Proceedings of the Advances in Information and Computer Security, 2022
The Multi-User Security of Triple Encryption, Revisited: Exact Security, Strengthening, and Application to TDES.
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022
2020
On the Composition of Single-Keyed Tweakable Even-Mansour for Achieving BBB Security.
IACR Trans. Symmetric Cryptol., 2020
2019
J. Cryptol., 2019
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2019
2018
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2018
Building Quantum-One-Way Functions from Block Ciphers: Davies-Meyer and Merkle-Damgård Constructions.
IACR Cryptol. ePrint Arch., 2018
IACR Cryptol. ePrint Arch., 2018
2017
IACR Cryptol. ePrint Arch., 2017
Proceedings of the Information Security - 20th International Conference, 2017
2016
New Bounds for Keyed Sponges with Extendable Output: Independence between Capacity and Message Length.
IACR Cryptol. ePrint Arch., 2016
IACR Cryptol. ePrint Arch., 2016
2015
A New Mode of Operation for Incremental Authenticated Encryption with Associated Data.
Proceedings of the Selected Areas in Cryptography - SAC 2015, 2015
Proceedings of the Topics in Cryptology, 2015
Proceedings of the Information Security and Privacy - 20th Australasian Conference, 2015
2014
IACR Cryptol. ePrint Arch., 2014
Proceedings of the Fast Software Encryption - 21st International Workshop, 2014
2013
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2013
IACR Cryptol. ePrint Arch., 2013
Proceedings of the Provable Security - 7th International Conference, 2013
Proceedings of the Advances in Information and Computer Security, 2013
2012
Proceedings of the Topics in Cryptology - CT-RSA 2012 - The Cryptographers' Track at the RSA Conference 2012, San Francisco, CA, USA, February 27, 2012
Proceedings of the Information Security and Cryptology - 8th International Conference, 2012
2011
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2011
Known-Key Distinguishers on 11-Round Feistel and Collision Attacks on Its Hashing Modes.
Proceedings of the Fast Software Encryption - 18th International Workshop, 2011
Proceedings of the Advances in Cryptology - CRYPTO 2011, 2011
2010
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2010
2009
BTM: A Single-Key, Inverse-Cipher-Free Mode for Deterministic Authenticated Encryption.
Proceedings of the Selected Areas in Cryptography, 16th Annual International Workshop, 2009
Proceedings of the Information Security, 12th International Conference, 2009
Proceedings of the Fast Software Encryption, 16th International Workshop, 2009
A Double-Piped Mode of Operation for MACs, PRFs and PROs: Security beyond the Birthday Barrier.
Proceedings of the Advances in Cryptology, 2009
2008
Proceedings of the Information Security and Cryptology, 2008
A One-Pass Mode of Operation for Deterministic Message Authentication- Security beyond the Birthday Barrier.
Proceedings of the Fast Software Encryption, 15th International Workshop, 2008
Proceedings of the Advances in Cryptology, 2008
2007
Proceedings of the Progress in Cryptology, 2007
Proceedings of the Advances in Cryptology, 2007
Proceedings of the Information Security and Privacy, 12th Australasian Conference, 2007
2006
Forward-Secure Authenticated-Encryption in Multi-Receiver Setting.
Proceedings of the SECRYPT 2006, 2006