Shoichi Hirose
Orcid: 0000-0001-6723-722XAffiliations:
- University of Fukui, Japan
- Kyoto University, Japan (PhD 1995)
According to our database1,
Shoichi Hirose
authored at least 76 papers
between 1994 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2024
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2024
2023
Proceedings of the IEEE Information Theory Workshop, 2023
2022
Compactly Committing Authenticated Encryption Using Encryptment and Tweakable Block Cipher.
IACR Cryptol. ePrint Arch., 2022
Proceedings of the Information Security Applications - 23rd International Conference, 2022
2021
Inf., 2021
Provable-Security Analysis of Authenticated Encryption Based on Lesamnta-LW in the Ideal Cipher Model.
IEICE Trans. Inf. Syst., 2021
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2021
IACR Cryptol. ePrint Arch., 2021
Proceedings of the Cryptography and Coding - 18th IMA International Conference, 2021
Proceedings of the Information Security and Cryptology - ICISC 2021, 2021
2020
IEEE Access, 2020
Proceedings of the Network and System Security - 14th International Conference, 2020
Proceedings of the Applied Cryptography and Network Security, 2020
2019
J. Internet Serv. Inf. Secur., 2019
The PRF Security of Compression-Function-Based MAC Functions in the Multi-User Setting.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2019
Proceedings of the Provable Security, 2019
Proceedings of the Network and System Security - 13th International Conference, 2019
Proceedings of the Information Security and Cryptology - ICISC 2019, 2019
Proceedings of the Seventh International Symposium on Computing and Networking Workshops, 2019
2018
A Pseudorandom-Function Mode Based on Lesamnta-LW and the MDP Domain Extension and Its Applications.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2018
Proceedings of the Provable Security, 2018
Proceedings of the International Symposium on Information Theory and Its Applications, 2018
2017
IACR Cryptol. ePrint Arch., 2017
Proceedings of the Information Security - 20th International Conference, 2017
Generalization of BJMM-ISD Using May-Ozerov Nearest Neighbor Algorithm over an Arbitrary Finite Field \mathbb F_q.
Proceedings of the Codes, Cryptology and Information Security, 2017
Proceedings of the Applications and Techniques in Information Security, 2017
2016
A Collision Attack on a Double-Block-Length Compression Function Instantiated with 8-/9-Round AES-256.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2016
IACR Cryptol. ePrint Arch., 2016
May-Ozerov Algorithm for Nearest-Neighbor Problem over 𝔽<sub>q</sub> and Its Application to Information Set Decoding.
IACR Cryptol. ePrint Arch., 2016
Output Masking of Tweakable Even-Mansour Can Be Eliminated for Message Authentication Code.
Proceedings of the Selected Areas in Cryptography - SAC 2016, 2016
Lightweight Hashing Using Lesamnta-LW Compression Function Mode and MDP Domain Extension.
Proceedings of the Fourth International Symposium on Computing and Networking, 2016
2015
Proceedings of the Information and Communications Security - 17th International Conference, 2015
2014
Proceedings of the Provable Security - 8th International Conference, 2014
A Block-Cipher-Based Hash Function Using an MMO-Type Double-Block Compression Function.
Proceedings of the Provable Security - 8th International Conference, 2014
A Collision Attack on a Double-Block-Length Compression Function Instantiated with Round-Reduced AES-256.
Proceedings of the Information Security and Cryptology - ICISC 2014, 2014
2013
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2013
Proceedings of the SECRYPT 2013, 2013
Proceedings of the Cryptography and Coding - 14th IMA International Conference, 2013
2012
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2012
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2012
2011
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2011
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2011
Proceedings of the Information Security and Cryptology - ICISC 2011 - 14th International Conference, Seoul, Korea, November 30, 2011
2010
Proceedings of the Information Security and Cryptology - ICISC 2010, 2010
2009
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2009
IEICE Electron. Express, 2009
2008
Int. J. Netw. Secur., 2008
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2008
Pseudorandom-Function Property of the Step-Reduced Compression Functions of SHA-256 and SHA-512.
Proceedings of the Information Security Applications, 9th International Workshop, 2008
Proceedings of the Information Security Applications, 9th International Workshop, 2008
Proceedings of the Selected Areas in Cryptography, 15th International Workshop, SAC 2008, 2008
2006
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2006
Proceedings of the Fast Software Encryption, 13th International Workshop, 2006
2005
Cancellation Moderating Factor Control for DS-CDMA Non-linear Interference Canceller with Antenna Diversity Reception.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2005
Weak Security Notions of Cryptographic Unkeyed Hash Functions and Their Amplifiability.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2005
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2005
2004
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2004
Complexity of the Collision and Near-Collision Attack on SHA-0 with Different Message Schedules.
IACR Cryptol. ePrint Arch., 2004
Proceedings of the Information Security and Cryptology, 2004
2003
Multistage Interference Canceller Combined with Adaptive Array Antenna for DS-CDMA System.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2003
Proceedings of the Cryptography and Coding, 2003
Proceedings of the Information Security and Cryptology, 2003
2002
Secure Block Ciphers Are Not Sufficient for One-Way Hash Functions in the Preneel-Govaerts-Vandewalle Model.
Proceedings of the Selected Areas in Cryptography, 2002
2001
Proceedings of the 54th IEEE Vehicular Technology Conference, 2001
Proceedings of the Information Security and Privacy, 6th Australasian Conference, 2001
1999
Enhancing the Resistence of a Provably Secure Key Agreement Protocol to a Denial-of-Service Attack.
Proceedings of the Information and Communication Security, Second International Conference, 1999
1998
An Authenticated Diffie-Hellman Key Agreement Protocol Secure Against Active Attacks.
Proceedings of the Public Key Cryptography, 1998
1997
A Conference Key Distribution System for the Star Configuration Based on the Discrete Logarithm Problem.
Inf. Process. Lett., 1997
1995
1994
Syst. Comput. Jpn., 1994