Tetsu Iwata
Orcid: 0000-0002-4729-0979
According to our database1,
Tetsu Iwata
authored at least 99 papers
between 1998 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
Key Recovery, Universal Forgery, and Committing Attacks against Revised Rocca: How Finalization Affects Security.
IACR Trans. Symmetric Cryptol., 2024
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2024
IACR Cryptol. ePrint Arch., 2024
2023
Proceedings of the Advances in Information and Computer Security, 2023
2022
IACR Trans. Symmetric Cryptol., 2022
IACR Trans. Symmetric Cryptol., 2022
Inf. Process. Lett., 2022
On the (im)possibility of improving the round diffusion of generalized Feistel structures.
Inf. Process. Lett., 2022
IACR Cryptol. ePrint Arch., 2022
2021
IACR Trans. Symmetric Cryptol., 2021
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2021
IACR Cryptol. ePrint Arch., 2021
2020
Beyond-Birthday-Bound Secure Cryptographic Permutations from Ideal Ciphers with Long Keys.
IACR Trans. Symmetric Cryptol., 2020
IACR Trans. Symmetric Cryptol., 2020
J. Cryptol., 2020
2019
IACR Trans. Symmetric Cryptol., 2019
ZOCB and ZOTR: Tweakable Blockcipher Modes for Authenticated Encryption with Full Absorption.
IACR Trans. Symmetric Cryptol., 2019
IACR Cryptol. ePrint Arch., 2019
IACR Cryptol. ePrint Arch., 2019
Quantum Attacks Against Type-1 Generalized Feistel Ciphers and Applications to CAST-256.
Proceedings of the Progress in Cryptology - INDOCRYPT 2019, 2019
Proceedings of the Advances in Cryptology - ASIACRYPT 2019, 2019
2018
On the Design Rationale of SIMON Block Cipher: Integral Attacks and Impossible Differential Attacks against SIMON Variants.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2018
IACR Cryptol. ePrint Arch., 2018
IACR Cryptol. ePrint Arch., 2018
2017
IACR Trans. Symmetric Cryptol., 2017
On the Security of Schnorr Signatures, DSA, and ElGamal Signatures against Related-Key Attacks.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2017
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2017
IACR Cryptol. ePrint Arch., 2017
Analyzing Key Schedule of Simon: Iterative Key Differences and Application to Related-Key Impossible Differentials.
Proceedings of the Advances in Information and Computer Security, 2017
2016
On the Design Rationale of SIMON Block Cipher: Integral Attacks and Impossible Differential Attacks against SIMON Variants.
IACR Cryptol. ePrint Arch., 2016
IACR Cryptol. ePrint Arch., 2016
2015
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2015
IACR Cryptol. ePrint Arch., 2015
2014
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2014
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2014
IACR Cryptol. ePrint Arch., 2014
2013
Improving the Permutation Layer of Type 1, Type 3, Source-Heavy, and Target-Heavy Generalized Feistel Structures.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2013
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2013
IACR Cryptol. ePrint Arch., 2013
Proceedings of the Fast Software Encryption - 20th International Workshop, 2013
2012
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2012
Proceedings of the Applied Cryptography and Network Security, 2012
2011
Proceedings of the Cryptography and Coding - 13th IMA International Conference, 2011
On Permutation Layer of Type 1, Source-Heavy, and Target-Heavy Generalized Feistel Structures.
Proceedings of the Cryptology and Network Security - 10th International Conference, 2011
2010
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2010
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2010
2009
BTM: A Single-Key, Inverse-Cipher-Free Mode for Deterministic Authenticated Encryption.
Proceedings of the Selected Areas in Cryptography, 16th Annual International Workshop, 2009
Proceedings of the Fast Software Encryption, 16th International Workshop, 2009
2008
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2008
Bounds on Fixed Input/Output Length Post-processing Functions for Biased Physical Random Number Generators.
Proceedings of the Selected Areas in Cryptography, 15th International Workshop, SAC 2008, 2008
Proceedings of the Progress in Cryptology, 2008
2007
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2007
Proceedings of the Fast Software Encryption, 14th International Workshop, 2007
Proceedings of the Symmetric Cryptography, 07.01. - 12.01.2007, 2007
2006
The Advanced Encryption Standard-Cipher-based Message Authentication Code-Pseudo-Random Function-128 (AES-CMAC-PRF-128) Algorithm for the Internet Key Exchange Protocol (IKE).
RFC, August, 2006
IACR Cryptol. ePrint Arch., 2006
2005
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2005
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2005
Proceedings of the Fast Software Encryption: 12th International Workshop, 2005
2004
IEEE Trans. Inf. Theory, 2004
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2004
IACR Cryptol. ePrint Arch., 2004
Proceedings of the Information Security and Privacy: 9th Australasian Conference, 2004
2003
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2003
IACR Cryptol. ePrint Arch., 2003
On the Correctness of Security Proofs for the 3GPP Confidentiality and Integrity Algorithms.
Proceedings of the Cryptography and Coding, 2003
Proceedings of the Information Security and Cryptology, 2003
2002
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2002
Proceedings of the Information Security and Cryptology, 2002
2000
Proceedings of the Selected Areas in Cryptography, 7th Annual International Workshop, 2000
Proceedings of the Fast Software Encryption, 7th International Workshop, 2000
1999
Proceedings of the Advances in Cryptology, 1999
Proceedings of the Advances in Cryptology, 1999
1998
Proceedings of the Sequences and their Applications, 1998