Kazuhiko MINEMATSU


Security of Related-Key Differential Attacks on TWINE, Revisited
Kosei SAKAMOTO Kazuhiko MINEMATSU Nao SHIBATA Maki SHIGERI Hiroyasu KUBO Yuki FUNABIKI Takanori ISOBE 
Publication:   
Publication Date: 2020/01/01
Vol. E103-A  No. 1  pp. 212-214
Type of Manuscript:  Special Section LETTER (Special Section on Cryptography and Information Security)
Category: 
Keyword: 
block cipherrelated-key securityactive sboxMILP
 Summary | Full Text:PDF(143.9KB)

Security Analysis and Countermeasures of an End-to-End Encryption Scheme of LINE
Takanori ISOBE Kazuhiko MINEMATSU 
Publication:   
Publication Date: 2020/01/01
Vol. E103-A  No. 1  pp. 313-324
Type of Manuscript:  PAPER
Category: Cryptography and Information Security
Keyword: 
E2EELINEkey exchangegroup messageauthenticated encryption
 Summary | Full Text:PDF(931.4KB)

Optimality of Tweak Functions in CLOC
Hayato KOBAYASHI Kazuhiko MINEMATSU Tetsu IWATA 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2015/10/01
Vol. E98-A  No. 10  pp. 2152-2164
Type of Manuscript:  PAPER
Category: Cryptography and Information Security
Keyword: 
authenticated encryption schemeCLOCtweak functionsoptimalityCAESAR competition
 Summary | Full Text:PDF(1.1MB)

Generalization and Extension of XEX* Mode
Kazuhiko MINEMATSU Toshiyasu MATSUSHIMA 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2009/02/01
Vol. E92-A  No. 2  pp. 517-524
Type of Manuscript:  PAPER
Category: Cryptography and Information Security
Keyword: 
tweakable block cipherXEXOCB 2.0
 Summary | Full Text:PDF(219.4KB)

Improved MACs from Differentially-Uniform Permutations
Kazuhiko MINEMATSU Toshiyasu MATSUSHIMA 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2007/12/01
Vol. E90-A  No. 12  pp. 2908-2915
Type of Manuscript:  PAPER
Category: Information Security
Keyword: 
MACblock cipherAESdifferentially-uniform permutation
 Summary | Full Text:PDF(241.7KB)