Cryptographers' World
 

Tetsu Iwata


Author's Web Page Link

16 papers in database with 357 citations Star

H-number: 10

Conference Papers

[Sort papers chronologically] [Sort papers by citations count]

1. Tetsu Iwata,  Kan Yasuda,  HBS: A Single-Key Mode of Operation for Deterministic Authenticated Encryption, pp. 394 - 415, FSE 2009.

[Electronic Edition][Cited 5 times ]

2. Tetsu Iwata,  Authenticated Encryption Mode for Beyond the Birthday Bound Security, pp. 125 - 142, AFRICACRYPT 2008.

[Electronic Edition][Cited 1 times ]

3. Taizo Shirai,  Kyoji Shibutani,  Toru Akishita,  Shiho Moriai,  Tetsu Iwata,  The 128-Bit Blockcipher CLEFIA (Extended Abstract), pp. 181 - 195, FSE 2007.

[Electronic Edition][Cited 34 times ]

4. Tetsu Iwata,  New Blockcipher Modes of Operation with Beyond the Birthday Bound Security, pp. 310 - 327, FSE 2006.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 7 times ]

5. Tetsu Iwata,  Kaoru Kurosawa,  How to Enhance the Security of the 3GPP Confidentiality and Integrity Algorithms, pp. 268 - 283, FSE 2005.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 1 times ]

6. Tetsu Iwata,  Tadayoshi Kohno,  New Security Proofs for the 3GPP Confidentiality and Integrity Algorithms, pp. 427 - 445, FSE 2004.

[Electronic Edition][Cited 15 times ]

7. Tetsu Iwata,  Kaoru Kurosawa,  Stronger Security Bounds for OMAC, TMAC, and XCBC, pp. 402 - 415, INDOCRYPT 2003.

[Electronic Edition][Cited 15 times ]

8. Kaoru Kurosawa,  Tetsu Iwata,  TMAC: Two-Key CBC MAC, pp. 33 - 49, CT-RSA 2003.

[Electronic Edition][Cited 49 times ]

9. Tetsu Iwata,  Kaoru Kurosawa,  OMAC: One-Key CBC MAC, pp. 129 - 153, FSE 2003.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 134 times Red StarRed Star]

10. Tetsu Iwata,  Tomonobu Yoshino,  Kaoru Kurosawa,  Non-cryptographic Primitive for Pseudorandom Permutation, pp. 149 - 163, FSE 2002.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 6 times ]

11. Tetsu Iwata,  Takayuki Yoshiwara,  Kaoru Kurosawa,  New Covering Radius of Reed-Muller Codes for t-Resilient Functions, pp. 75 - 86, SAC 2001.

[Electronic Edition][Cited 17 times ]

12. Tetsu Iwata,  Tomonobu Yoshino,  Tomohiro Yuasa,  Kaoru Kurosawa,  Round Security and Super-Pseudorandomness of MISTY Type Structure, pp. 233 - 247, FSE 2001.

[Electronic Edition][Cited 20 times ]

13. Kaoru Kurosawa,  Tetsu Iwata,  Quang Viet Duong,  Root Finding Interpolation Attack, pp. 303 - 314, SAC 2000.

[Electronic Edition][Cited 4 times ]

14. Tetsu Iwata,  Kaoru Kurosawa,  On the Pseudorandomness of the AES Finalists - RC6 and Serpent, pp. 231 - 243, FSE 2000.

[Electronic Edition][Cited 15 times ]

15. Takashi Satoh,  Tetsu Iwata,  Kaoru Kurosawa,  On Cryptographically Secure Vectorial Boolean Functions, pp. 20 - 28, ASIACRYPT 1999.

[Electronic Edition][Cited 12 times ]

16. Tetsu Iwata,  Kaoru Kurosawa,  Probabilistic Higher Order Differential Attack and Higher Order Bent Functions, pp. 62 - 74, ASIACRYPT 1999.

[Electronic Edition][Cited 22 times ]



Database status:
3755 authors,
5428 conference papers from 177 conference proceedings,
559 journal papers from 8 journals
Highly Cited...