[go: up one dir, main page]

Follow
Yusuke Naito
Yusuke Naito
Mitsubishi Electric Corporation
Verified email at ce.MitsubishiElectric.co.jp
Title
Cited by
Cited by
Year
Blockcipher-based MACs: beyond the birthday bound without message length
Y Naito
International Conference on the Theory and Application of Cryptology and …, 2017
582017
Improved collision attack on MD5
Y Sasaki, Y Naito, N Kunihiro, K Ohta
Cryptology ePrint Archive, 2005
552005
SAEB: A lightweight blockcipher-based AEAD mode of operation
Y Naito, M Matsui, T Sugawara, D Suzuki
Cryptology ePrint Archive, 2019
512019
Full PRF-secure message authentication code based on tweakable block cipher
Y Naito
International Conference on Provable Security, 167-182, 2015
502015
Improved collision attack on MD4 with probability almost 1
Y Naito, Y Sasaki, N Kunihiro, K Ohta
International Conference on Information Security and Cryptology, 129-145, 2005
462005
Minalpher v1
Y Sasaki, Y Todo, K Aoki, Y Naito, T Sugawara, Y Murakami, M Matsui, ...
CAESAR Round 1, 2014
442014
Lightweight authenticated encryption mode suitable for threshold implementation
Y Naito, Y Sasaki, T Sugawara
Annual International Conference on the Theory and Applications of …, 2020
402020
Lightweight authenticated encryption mode of operation for tweakable block ciphers
Y Naito, T Sugawara
IACR Transactions on Cryptographic Hardware and Embedded Systems, 66-94, 2020
322020
Tweakable blockciphers for efficient authenticated encryptions with beyond the birthday-bound security
Y Naito
Cryptology ePrint Archive, 2017
322017
Improved collision search for SHA-0
Y Naito, Y Sasaki, T Shimoyama, J Yajima, N Kunihiro, K Ohta
International Conference on the Theory and Application of Cryptology and …, 2006
292006
Generic state-recovery and forgery attacks on ChopMD-MAC and on NMAC/HMAC
Y Naito, Y Sasaki, L Wang, K Yasuda
International Workshop on Security, 83-98, 2013
252013
How to construct sufficient condition in searching collisions of MD5
Y Sasaki, Y Naito, J Yajima, T Shimoyama, N Kunihiro, K Ohta
Cryptology ePrint Archive, 2006
252006
New bounds for keyed sponges with extendable output: Independence between capacity and message length
Y Naito, K Yasuda
International Conference on Fast Software Encryption, 3-22, 2016
232016
Improved collision attacks on MD4 and MD5
Y Sasaki, Y Naito, N Kunihiro, K Ohta
IEICE transactions on fundamentals of electronics, communications and …, 2007
222007
A new strategy for finding a differential path of SHA-1
J Yajima, Y Sasaki, Y Naito, T Iwasaki, T Shimoyama, N Kunihiro, K Ohta
Australasian Conference on Information Security and Privacy, 45-58, 2007
212007
Secret can be public: low-memory AEAD mode for high-order masking
Y Naito, Y Sasaki, T Sugawara
Annual International Cryptology Conference, 315-345, 2022
192022
Key committing security of AEZ and more
YL Chen, A Flórez-Gutiérrez, A Inoue, R Ito, T Iwata, K Minematsu, ...
IACR Transactions on Symmetric Cryptology 2023 (4), 452-488, 2023
172023
Optimally indifferentiable double-block-length hashing without post-processing and with support for longer key than single block
Y Naito
International Conference on Cryptology and Information Security in Latin …, 2019
172019
Committing security of ascon: Cryptanalysis on primitive and proof on mode
Y Naito, Y Sasaki, T Sugawara
IACR Transactions on Symmetric Cryptology 2023 (4), 420-451, 2023
162023
Improved Indifferentiable Security Analysis of PHOTON
Y Naito, K Ohta
International Conference on Security and Cryptography for Networks, 340-357, 2014
162014
The system can't perform the operation now. Try again later.
Articles 1–20