What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Kazuhiko Minematsu
Google Scholar
69
publications in security and cryptology related venues
Year
Venue
Title
2025
journals/tches
Cymric: Short-tailed but Mighty Beyond-birthday-bound Secure Authenticated Encryption for Short Inputs.
Alexandre Adomnicai
Wonseok Choi
Yeongmin Lee
Kazuhiko Minematsu
Yusuke Naito
2025
journals/tches
All You Need is XOR-Convolution: A Generalized Higher-Order Side-Channel Attack with Application to XEX/XE-based Encryptions.
Rei Ueno
Akira Ito
Yosuke Todo
Akiko Inoue
Kazuhiko Minematsu
Hibiki Ishikawa
Naofumi Homma
2025
journals/istr
Security analysis of SFrame.
Takanori Isobe
Ryoma Ito
Kazuhiko Minematsu
2025
journals/tosc
Preface to Volume 2025, Issue 1.
Christoph Dobraunig
Kazuhiko Minematsu
2025
conf/acns
Generic Security of GCM-SST.
Akiko Inoue
Ashwin Jha
Bart Mennink
Kazuhiko Minematsu
2025
conf/ctrsa
Comprehensive Robustness Analysis of GCM, CCM, and OCB3.
Akiko Inoue
Tetsu Iwata
Kazuhiko Minematsu
2025
conf/crypto
Cryptographic Treatment of Key Control Security - In Light of NIST SP 800-108.
Ritam Bhaumik
Avijit Dutta
Akiko Inoue
Tetsu Iwata
Ashwin Jha
Kazuhiko Minematsu
Mridul Nandi
Yu Sasaki
Meltem Sönmez Turan
Stefano Tessaro
2025
conf/eurosp
Not in The Prophecies: Practical Attacks on Nostr.
Hayato Kimura
Ryoma Ito
Kazuhiko Minematsu
Shogo Shiraki
Takanori Isobe
2025
journals/tosc
Revisiting Vector-Input MACs.
Isamu Furuya
Kazuhiko Minematsu
2024
journals/tches
Fallen Sanctuary: A Higher-Order and Leakage-Resilient Rekeying Scheme.
Rei Ueno
Naofumi Homma
Akiko Inoue
Kazuhiko Minematsu
2024
journals/tches
Gleeok: A Family of Low-Latency PRFs and its Applications to Authenticated Encryption.
Ravi Anand
Subhadeep Banik
Andrea Caforio
Tatsuya Ishikawa
Takanori Isobe
Fukang Liu
Kazuhiko Minematsu
Mostafizar Rahman
Kosei Sakamoto
2024
journals/tosc
Preface to Volume 2024, Issue 1.
Christina Boura
Kazuhiko Minematsu
2024
conf/ccs
Crystalor: Recoverable Memory Encryption Mechanism with Optimized Metadata Structure.
Rei Ueno
Hiromichi Haneda
Naofumi Homma
Akiko Inoue
Kazuhiko Minematsu
2024
conf/icisc
A Formal Treatment of Envelope Encryption.
Shoichi Hirose
Kazuhiko Minematsu
2023
journals/tches
Areion: Highly-Efficient Permutations and Its Applications to Hash Functions for Short Input.
Takanori Isobe
Ryoma Ito
Fukang Liu
Kazuhiko Minematsu
Motoki Nakahashi
Kosei Sakamoto
Rentaro Shiba
2023
journals/tosc
Key Committing Security of AEZ and More.
Yu Long Chen
Antonio Flórez-Gutiérrez
Akiko Inoue
Ryoma Ito
Tetsu Iwata
Kazuhiko Minematsu
Nicky Mouha
Yusuke Naito
Ferdinand Sibleyras
Yosuke Todo
2023
conf/ctrsa
Authenticated Encryption for Very Short Inputs.
Alexandre Adomnicai
Kazuhiko Minematsu
Junji Shikata
2023
conf/iwsec
PMACrx: A Vector-Input MAC for High-Dimensional Vectors with BBB Security.
Isamu Furuya
Hayato Kasahara
Akiko Inoue
Kazuhiko Minematsu
Tetsu Iwata
2023
conf/eurocrypt
XOCB: Beyond-Birthday-Bound Secure Authenticated Encryption Mode with Rate-One Computation.
Zhenzhen Bao
Seongha Hwang
Akiko Inoue
ByeongHak Lee
Jooyoung Lee
Kazuhiko Minematsu
2023
conf/sacrypt
Compactly Committing Authenticated Encryption Using Encryptment and Tweakable Block Cipher.
Shoichi Hirose
Kazuhiko Minematsu
2022
journals/tosc
Cryptanalysis of Rocca and Feasibility of Its Security Claim.
Akinori Hosoyamada
Akiko Inoue
Ryoma Ito
Tetsu Iwata
Kazuhiko Minematsu
Ferdinand Sibleyras
Yosuke Todo
2022
journals/tifs
ELM: A Low-Latency and Scalable Memory Encryption Scheme.
Akiko Inoue
Kazuhiko Minematsu
Maya Oda
Rei Ueno
Naofumi Homma
2022
conf/acisp
Fast Skinny-128 SIMD Implementations for Sequential Modes of Operation.
Alexandre Adomnicai
Kazuhiko Minematsu
Maki Shigeri
2022
conf/acns
Analyzing the Provable Security Bounds of GIFT-COFB and Photon-Beetle.
Akiko Inoue
Tetsu Iwata
Kazuhiko Minematsu
2021
journals/tosc
Orthros: A Low-Latency PRF.
Subhadeep Banik
Takanori Isobe
Fukang Liu
Kazuhiko Minematsu
Kosei Sakamoto
2021
conf/esorics
Security Analysis of SFrame.
Takanori Isobe
Ryoma Ito
Kazuhiko Minematsu
2021
conf/sacrypt
Parallel Verification of Serial MAC and AE Modes.
Kazuhiko Minematsu
Akiko Inoue
Katsuya Moriwaki
Maki Shigeri
Hiroyasu Kubo
2020
journals/tosc
Fast Decryption: a New Feature of Misuse-Resistant AE.
Kazuhiko Minematsu
2020
journals/tosc
Highly Secure Nonce-based MACs from the Sum of Tweakable Block Ciphers.
Wonseok Choi
Akiko Inoue
ByeongHak Lee
Jooyoung Lee
Eik List
Kazuhiko Minematsu
Yusuke Naito
2020
journals/tosc
Duel of the Titans: The Romulus and Remus Families of Lightweight AEAD Algorithms.
Tetsu Iwata
Mustafa Khairallah
Kazuhiko Minematsu
Thomas Peyrin
2020
journals/joc
Blockcipher-Based Authenticated Encryption: How Small Can We Go?
Avik Chakraborti
Tetsu Iwata
Kazuhiko Minematsu
Mridul Nandi
2020
journals/joc
Cryptanalysis of OCB2: Attacks on Authenticity and Confidentiality.
Akiko Inoue
Tetsu Iwata
Kazuhiko Minematsu
Bertram Poettering
2020
conf/acns
ACE in Chains: How Risky Is CBC Encryption of Binary Executable Files?
Rintaro Fujita
Takanori Isobe
Kazuhiko Minematsu
2020
conf/sacrypt
WARP : Revisiting GFN for Lightweight 128-Bit Block Cipher.
Subhadeep Banik
Zhenzhen Bao
Takanori Isobe
Hiroyasu Kubo
Fukang Liu
Kazuhiko Minematsu
Kosei Sakamoto
Nao Shibata
Maki Shigeri
2019
journals/tosc
ZOCB and ZOTR: Tweakable Blockcipher Modes for Authenticated Encryption with Full Absorption.
Zhenzhen Bao
Jian Guo
Tetsu Iwata
Kazuhiko Minematsu
2019
conf/crypto
Cryptanalysis of OCB2: Attacks on Authenticity and Confidentiality.
Akiko Inoue
Tetsu Iwata
Kazuhiko Minematsu
Bertram Poettering
2019
conf/esorics
Symmetric-Key Corruption Detection: When XOR-MACs Meet Combinatorial Group Testing.
Kazuhiko Minematsu
Norifumi Kamiya
2019
conf/iwsec
Tweakable TWINE: Building a Tweakable Block Cipher on Generalized Feistel Structure.
Kosei Sakamoto
Kazuhiko Minematsu
Nao Shibata
Maki Shigeri
Hiroyasu Kubo
Yuki Funabiki
Andrey Bogdanov
Sumio Morioka
Takanori Isobe
2019
conf/sacrypt
A Lightweight Alternative to PMAC.
Kazuhiko Minematsu
2019
conf/sacrypt
Plaintext Recovery Attacks Against XTS Beyond Collisions.
Takanori Isobe
Kazuhiko Minematsu
2019
conf/sacrypt
Parallelizable Authenticated Encryption with Small State Size.
Akiko Inoue
Kazuhiko Minematsu
2018
conf/esorics
Breaking Message Integrity of an End-to-End Encryption Scheme of LINE.
Takanori Isobe
Kazuhiko Minematsu
2018
conf/ctrsa
Count-then-Permute: A Precision-Free Alternative to Inversion Sampling.
Kazuhiko Minematsu
Kentarou Sasaki
Yuki Tanaka
2017
journals/tosc
Cryptanalysis of PMACx, PMAC2x, and SIVx.
Kazuhiko Minematsu
Tetsu Iwata
2017
conf/latincrypt
XHX - A Framework for Optimally Secure Tweakable Block Ciphers from Classical Block Ciphers and Universal Hashing.
Ashwin Jha
Eik List
Kazuhiko Minematsu
Sweta Mishra
Mridul Nandi
2017
conf/crypto
ZMAC: A Fast Tweakable Block Cipher Mode for Highly Secure Message Authentication.
Tetsu Iwata
Kazuhiko Minematsu
Thomas Peyrin
Yannick Seurin
2017
conf/ches
Blockcipher-Based Authenticated Encryption: How Small Can We Go?
Avik Chakraborti
Tetsu Iwata
Kazuhiko Minematsu
Mridul Nandi
2016
journals/tosc
Stronger Security Variants of GCM-SIV.
Tetsu Iwata
Kazuhiko Minematsu
2016
conf/acisp
Authenticated Encryption with Small Stretch (or, How to Accelerate AERO).
Kazuhiko Minematsu
2016
conf/provsec
Integrity Analysis of Authenticated Encryption Based on Stream Ciphers.
Kazuya Imamura
Kazuhiko Minematsu
Tetsu Iwata
2016
conf/host
Low-area hardware implementations of CLOC, SILC and AES-OTR.
Subhadeep Banik
Andrey Bogdanov
Kazuhiko Minematsu
2015
conf/fse
GCM Security Bounds Reconsidered.
Yuichi Niwa
Keisuke Ohashi
Kazuhiko Minematsu
Tetsu Iwata
2015
conf/esorics
Efficient Message Authentication Codes with Combinatorial Group Testing.
Kazuhiko Minematsu
2014
conf/fse
CLOC: Authenticated Encryption for Short Input.
Tetsu Iwata
Kazuhiko Minematsu
Jian Guo
Sumio Morioka
2014
conf/eurocrypt
Parallelizable Rate-1 Authenticated Encryption from Pseudorandom Functions.
Kazuhiko Minematsu
2013
conf/fse
Attacks and Security Proofs of EAX-Prime.
Kazuhiko Minematsu
Stefan Lucks
Hiraku Morita
Tetsu Iwata
2013
conf/provsec
Improved Authenticity Bound of EAX, and Refinements.
Kazuhiko Minematsu
Stefan Lucks
Tetsu Iwata
2013
conf/provsec
A Short Universal Hash Function from Bit Rotation, and Applications to Blockcipher Modes.
Kazuhiko Minematsu
2012
conf/crypto
Breaking and Repairing GCM Security Proofs.
Tetsu Iwata
Keisuke Ohashi
Kazuhiko Minematsu
2012
conf/sacrypt
$\textnormal{\textsc{TWINE}}$ : A Lightweight Block Cipher for Multiple Platforms.
Tomoyasu Suzaki
Kazuhiko Minematsu
Sumio Morioka
Eita Kobayashi
2011
conf/acisp
On Maximum Differential Probability of Generalized Feistel.
Kazuhiko Minematsu
Tomoyasu Suzaki
Maki Shigeri
2010
conf/fse
How to Thwart Birthday Attacks against MACs via Small Randomness.
Kazuhiko Minematsu
2010
conf/fse
Improving the Generalized Feistel.
Tomoyasu Suzaki
Kazuhiko Minematsu
2009
conf/fse
Beyond-Birthday-Bound Security Based on Tweakable Block Cipher.
Kazuhiko Minematsu
2007
conf/fse
New Bounds for PMAC, TMAC, and XCBC.
Kazuhiko Minematsu
Toshiyasu Matsushima
2006
conf/fse
Provably Secure MACs from Differentially-Uniform Permutations and AES-Based Implementations.
Kazuhiko Minematsu
Yukiyasu Tsunoo
2006
conf/sacrypt
Improved Security Analysis of XEX and LRW Modes.
Kazuhiko Minematsu
2005
conf/icisc
Expanding Weak PRF with Small Key Size.
Kazuhiko Minematsu
Yukiyasu Tsunoo
2005
conf/icisc
Hybrid Symmetric Encryption Using Known-Plaintext Attack-Secure Components.
Kazuhiko Minematsu
Yukiyasu Tsunoo
Coauthors
Akiko Inoue
(17)
Akinori Hosoyamada
(1)
Akira Ito
(1)
Alexandre Adomnicai
(3)
Andrea Caforio
(1)
Andrey Bogdanov
(2)
Antonio Flórez-Gutiérrez
(1)
Ashwin Jha
(3)
Avijit Dutta
(1)
Avik Chakraborti
(2)
Bart Mennink
(1)
Bertram Poettering
(2)
ByeongHak Lee
(2)
Christina Boura
(1)
Christoph Dobraunig
(1)
Eik List
(2)
Eita Kobayashi
(1)
Ferdinand Sibleyras
(2)
Fukang Liu
(4)
Hayato Kasahara
(1)
Hayato Kimura
(1)
Hibiki Ishikawa
(1)
Hiraku Morita
(1)
Hiromichi Haneda
(1)
Hiroyasu Kubo
(3)
Isamu Furuya
(2)
Jian Guo
(2)
Jooyoung Lee
(2)
Junji Shikata
(1)
Katsuya Moriwaki
(1)
Kazuhiko Minematsu
(69)
Kazuya Imamura
(1)
Keisuke Ohashi
(2)
Kentarou Sasaki
(1)
Kosei Sakamoto
(5)
Maki Shigeri
(5)
Maya Oda
(1)
Meltem Sönmez Turan
(1)
Mostafizar Rahman
(1)
Motoki Nakahashi
(1)
Mridul Nandi
(4)
Mustafa Khairallah
(1)
Nao Shibata
(2)
Naofumi Homma
(4)
Nicky Mouha
(1)
Norifumi Kamiya
(1)
Ravi Anand
(1)
Rei Ueno
(4)
Rentaro Shiba
(1)
Rintaro Fujita
(1)
Ritam Bhaumik
(1)
Ryoma Ito
(6)
Seongha Hwang
(1)
Shogo Shiraki
(1)
Shoichi Hirose
(2)
Stefan Lucks
(2)
Stefano Tessaro
(1)
Subhadeep Banik
(4)
Sumio Morioka
(3)
Sweta Mishra
(1)
Takanori Isobe
(11)
Tatsuya Ishikawa
(1)
Tetsu Iwata
(21)
Thomas Peyrin
(2)
Tomoyasu Suzaki
(3)
Toshiyasu Matsushima
(1)
Wonseok Choi
(2)
Yannick Seurin
(1)
Yeongmin Lee
(1)
Yosuke Todo
(3)
Yu Long Chen
(1)
Yu Sasaki
(1)
Yuichi Niwa
(1)
Yuki Funabiki
(1)
Yuki Tanaka
(1)
Yukiyasu Tsunoo
(3)
Yusuke Naito
(3)
Zhenzhen Bao
(3)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to