Search
International Association for Cryptologic Research
What's new
Archive
Best Papers
Videos
Authors
Coauthors
By year
By conference
All Committees
Most Committees
Report errors
Maps
About
Tetsu Iwata
Search web for home page
Program Committees
1
2013
FSE
pc
2
2012
Eurocrypt
pc
3
2012
Asiacrypt
pc
4
2011
FSE
pc
5
2010
FSE
pc chair
6
2009
FSE
pc
7
2009
Asiacrypt
pc
8
2008
FSE
pc
9
2007
Asiacrypt
pc
10
2007
FSE
pc
11
2006
Eurocrypt
pc
Publications
year
title
booktitle
pages
1
2012
Breaking and Repairing GCM Security Proofs
crypto
31-49
2
2010
Fast Software Encryption, 17th International Workshop, FSE 2010, Seoul, Korea, February 7-10, 2010, Revised Selected Papers
fse
3
2009
HBS: A Single-Key Mode of Operation for Deterministic Authenticated Encryption
fse
394-415
4
2007
The 128-Bit Blockcipher CLEFIA (Extended Abstract)
fse
181-195
5
2006
New Blockcipher Modes of Operation with Beyond the Birthday Bound Security
fse
online
6
2006
New Blockcipher Modes of Operation with Beyond the Birthday Bound Security
eprint
online
7
2005
How to Enhance the Security of the 3GPP Confidentiality and Integrity Algorithms
fse
online
8
2004
New Security Proofs for the 3GPP Confidentiality and Integrity Algorithms
fse
427-445
9
2004
New Security Proofs for the 3GPP Confidentiality and Integrity Algorithms
eprint
online
10
2003
Stronger Security Bounds for OMAC, TMAC and XCBC
eprint
online
11
2003
On the Pseudorandomness of KASUMI Type Permutations
eprint
online
12
2003
OMAC: One-Key CBC MAC
fse
online
13
2002
Non-cryptographic Primitive for Pseudorandom Permutation
fse
online
14
2002
TMAC: Two-Key CBC MAC
eprint
online
15
2002
New covering radius of Reed-Muller codes for $t$-resilient functions
eprint
online
16
2002
OMAC: One-Key CBC MAC
eprint
online
17
2001
Round Security and Super-Pseudorandomness of MISTY Type Structure
fse
233-247
18
2000
On the Pseudorandomness of the AES Finalists - RC6 and Serpent
fse
231-243
19
1999
Probabilistic Higher Order Differential Attack and Higher Order Bent Functions
asiacrypt
62-74
20
1999
On Cryptographically Secure Vectorial Boolean Functions
asiacrypt
20-28
Coauthors of Tetsu Iwata
Toru Akishita
Seokhie Hong
Tadayoshi Kohno
Kaoru Kurosawa
Kazuhiko Minematsu
Shiho Moriai
Keisuke Ohashi
Takashi Satoh
Kyoji Shibutani
Taizo Shirai
Tohru Yagi
Kan Yasuda
Tomonobu Yoshino
Takayuki Yoshiwara
Tomohiro Yuasa