Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
WBS, ISEC, IT, RCC |
2025-03-05 09:50 |
Osaka |
Nakanoshima Center, Osaka University |
Distinguishing Attacks against Docked Double Decker Takahiro Kaneko, Tetsu Iwata (Nagoya Univ.) IT2024-73 ISEC2024-87 WBS2024-70 RCC2024-75 |
Docked Double Decker is a tweakable wide block cipher based on the four-round Feistel structure. It applies two hash fun... [more] |
IT2024-73 ISEC2024-87 WBS2024-70 RCC2024-75 pp.1-7 |
RCC, ISEC, IT, WBS |
2023-03-15 16:10 |
Yamaguchi |
(Primary: On-site, Secondary: Online) |
Active S-box Number Analysis with MILP of Type-2 Generalized Feistel Structure Using Sub-Block Dividing Masaya Okazaki, Tetsu Iwata (Nagoya Univ.) IT2022-134 ISEC2022-113 WBS2022-131 RCC2022-131 |
Type-2 Generalized Feistel Structures (GFSs) are a well-known structure for constructing secure block ciphers. At Indocr... [more] |
IT2022-134 ISEC2022-113 WBS2022-131 RCC2022-131 pp.419-426 |
ISEC, SITE, LOIS |
2022-11-18 14:55 |
Online |
Online |
Active S-box Number Analysis with MILP of Type-2 Generalized Feistel Structure Consisting of Multiple SP Layers F-function Masaya Okazaki, Tetsu Iwata (Nagoya Univ.) ISEC2022-36 SITE2022-40 LOIS2022-20 |
Type-2 Generalized Feistel Structure (GFS) is known as a way to construct a secure block cipher. It is a $dm$-bit ($d ge... [more] |
ISEC2022-36 SITE2022-40 LOIS2022-20 pp.32-38 |
BioX, ISEC, SITE, ICSS, EMM, HWS, IPSJ-CSEC, IPSJ-SPT [detail] |
2021-07-20 14:50 |
Online |
Online |
Differential Path Search Using MILP against ForkSkinny Masaya Okazaki (Nagoya Univ.), Yu Sasaki (NTT), Tetsu Iwata (Nagoya Univ.) ISEC2021-35 SITE2021-29 BioX2021-36 HWS2021-35 ICSS2021-40 EMM2021-40 |
ForkSkinny is a symmetric key primitive desgined based on a tweakable block cipher called SKINNY, and it outputs two cip... [more] |
ISEC2021-35 SITE2021-29 BioX2021-36 HWS2021-35 ICSS2021-40 EMM2021-40 pp.153-160 |
ISEC |
2021-05-19 13:50 |
Online |
Online |
Distinguishing and Forgery Attacks against Romulus-N and Romulus-M Makoto Habu (Nagoya Univ.), Kazuhiko Minematsu (NEC), Tetsu Iwata (Nagoya Univ.) ISEC2021-6 |
Romulus is an authenticated encryption scheme based on a tweakable block cipher. It was submitted to the NIST Lightweigh... [more] |
ISEC2021-6 pp.25-31 |
WBS, IT, ISEC |
2021-03-04 09:25 |
Online |
Online |
Four-Block Type-2 Feistel Cipher from Tweakable Block Ciphers Kazuki Nakaya, Tetsu Iwata (Nagoya Univ.) IT2020-118 ISEC2020-48 WBS2020-37 |
A secure block cipher can be obtained from tweakable block ciphers (TBCs). In this paper, by using a TBC with $n$-bit bl... [more] |
IT2020-118 ISEC2020-48 WBS2020-37 pp.37-44 |
SITE, ISEC, HWS, EMM, BioX, IPSJ-CSEC, IPSJ-SPT, ICSS [detail] |
2020-07-20 15:45 |
Online |
Online |
Quantum Attacks on the Sum of Even-Mansour Pseudorandom Function Kazuo Shinagawa, Tetsu Iwata (Nagoya Univ.) ISEC2020-21 SITE2020-18 BioX2020-24 HWS2020-14 ICSS2020-8 EMM2020-18 |
At CRYPTO~2019, a method to construct a pseudorandom function from public random permutations was presented. In this pap... [more] |
ISEC2020-21 SITE2020-18 BioX2020-24 HWS2020-14 ICSS2020-8 EMM2020-18 pp.47-51 |
ISEC |
2020-05-20 10:10 |
Online |
Online |
Distinguishing, Forgery, and Plaintext Recovery Attacks against Google Adiantum Makoto Habu, Tetsu Iwata (Nagoya Univ.) ISEC2020-2 |
[more] |
ISEC2020-2 pp.7-14 |
ISEC, IT, WBS |
2020-03-11 10:20 |
Hyogo |
University of Hyogo (Cancelled but technical report was issued) |
Security Proof of Cryptographic Permutation Based on Ideal Ciphers Ryota Nakamichi, Tetsu Iwata (Nagoya Univ.) IT2019-110 ISEC2019-106 WBS2019-59 |
Coron et al. proved the security of an iterative construction of a $2n$-bit cryptographic permutation that uses $3$ idea... [more] |
IT2019-110 ISEC2019-106 WBS2019-59 pp.135-141 |
ISEC |
2017-09-04 16:00 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
[Invited Talk]
ZMAC: A Fast Tweakable Block Cipher Mode for Highly Secure Message Authentication Tetsu Iwata (Nagoya Univ.), Kazuhiko Minematsu (NEC), Thomas Peyrin (NTU), Yannick Seurin (ANSSI) ISEC2017-47 |
[more] |
ISEC2017-47 p.43 |
ISEC, WBS, IT |
2017-03-09 10:50 |
Tokyo |
TOKAI University |
The Security of 3-Round RSA-OAEP against Related-Key Attacks Gembu Ito, Hiraku Morita, Tetsu Iwata (Nagoya Univ.) IT2016-101 ISEC2016-91 WBS2016-77 |
In 2013, Jia et al. proved that RSA-OAEP is secure against related-key attacks with respect to affine functions.In relat... [more] |
IT2016-101 ISEC2016-91 WBS2016-77 pp.15-22 |