What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Kan Yasuda
Google Scholar
34
publications in security and cryptology related venues
Year
Venue
Title
2024
journals/joc
The COLM Authenticated Encryption Scheme.
Elena Andreeva
Andrey Bogdanov
Nilanjan Datta
Atul Luykx
Bart Mennink
Mridul Nandi
Elmar Tischhauser
Kan Yasuda
2023
conf/latincrypt
Making the Identity-Based Diffie-Hellman Key Exchange Efficiently Revocable.
Kohei Nakagawa
Atsushi Fujioka
Akira Nagai
Junichi Tomida
Keita Xagawa
Kan Yasuda
2022
conf/ccs
The Multi-User Security of Triple Encryption, Revisited: Exact Security, Strengthening, and Application to TDES.
Yusuke Naito
Yu Sasaki
Takeshi Sugawara
Kan Yasuda
2022
conf/iwsec
Birthday-Bound Slide Attacks on TinyJAMBU's Keyed-Permutations for All Key Sizes.
Ferdinand Sibleyras
Yu Sasaki
Yosuke Todo
Akinori Hosoyamada
Kan Yasuda
2022
conf/asiacrypt
A Modular Approach to the Incompressibility of Block-Cipher-Based AEADs.
Akinori Hosoyamada
Takanori Isobe
Yosuke Todo
Kan Yasuda
2020
journals/tosc
On the Composition of Single-Keyed Tweakable Even-Mansour for Achieving BBB Security.
Avik Chakraborti
Mridul Nandi
Suprita Talnikar
Kan Yasuda
2019
journals/joc
Beyond Conventional Security in Sponge-Based Authenticated Encryption Modes.
Philipp Jovanovic
Atul Luykx
Bart Mennink
Yu Sasaki
Kan Yasuda
2018
journals/tches
Beetle Family of Lightweight and Secure Authenticated Encryption Ciphers.
Avik Chakraborti
Nilanjan Datta
Mridul Nandi
Kan Yasuda
2018
conf/crypto
Encrypt or Decrypt? To Make a Single-Key Beyond Birthday Secure Nonce-Based MAC.
Nilanjan Datta
Avijit Dutta
Mridul Nandi
Kan Yasuda
2018
conf/asiacrypt
Building Quantum-One-Way Functions from Block Ciphers: Davies-Meyer and Merkle-Damgård Constructions.
Akinori Hosoyamada
Kan Yasuda
2016
conf/fse
New Bounds for Keyed Sponges with Extendable Output: Independence Between Capacity and Message Length.
Yusuke Naito
Kan Yasuda
2016
conf/fse
A MAC Mode for Lightweight Block Ciphers.
Atul Luykx
Bart Preneel
Elmar Tischhauser
Kan Yasuda
2016
conf/eurocrypt
On the Influence of Message Length in PMAC's Security Bounds.
Atul Luykx
Bart Preneel
Alan Szepieniec
Kan Yasuda
2015
conf/acisp
Generalizing PMAC Under Weaker Assumptions.
Nilanjan Datta
Kan Yasuda
2015
conf/ctrsa
How to Incorporate Associated Data in Sponge-Based Authenticated Encryption.
Yu Sasaki
Kan Yasuda
2015
conf/sacrypt
A New Mode of Operation for Incremental Authenticated Encryption with Associated Data.
Yu Sasaki
Kan Yasuda
2014
conf/fse
COBRA: A Parallelizable Authenticated Online Cipher Without Block Cipher Inverse.
Elena Andreeva
Atul Luykx
Bart Mennink
Kan Yasuda
2014
conf/fse
APE: Authenticated Permutation-Based Encryption for Lightweight Cryptography.
Elena Andreeva
Begül Bilgin
Andrey Bogdanov
Atul Luykx
Bart Mennink
Nicky Mouha
Kan Yasuda
2014
conf/asiacrypt
How to Securely Release Unverified Plaintext in Authenticated Encryption.
Elena Andreeva
Andrey Bogdanov
Atul Luykx
Bart Mennink
Nicky Mouha
Kan Yasuda
2013
conf/provsec
The Security of the OCB Mode of Operation without the SPRP Assumption.
Kazumaro Aoki
Kan Yasuda
2013
conf/iwsec
Generic State-Recovery and Forgery Attacks on ChopMD-MAC and on NMAC/HMAC.
Yusuke Naito
Yu Sasaki
Lei Wang
Kan Yasuda
2013
conf/asiacrypt
Parallelizable and Authenticated Online Ciphers.
Elena Andreeva
Andrey Bogdanov
Atul Luykx
Bart Mennink
Elmar Tischhauser
Kan Yasuda
2012
conf/ctrsa
PMAC with Parity: Minimizing the Query-Length Influence.
Kan Yasuda
2011
conf/fse
Known-Key Distinguishers on 11-Round Feistel and Collision Attacks on Its Hashing Modes.
Yu Sasaki
Kan Yasuda
2011
conf/crypto
A New Variant of PMAC: Beyond the Birthday Bound.
Kan Yasuda
2010
conf/ctrsa
The Sum of CBC MACs Is a Secure PRF.
Kan Yasuda
2009
conf/fse
HBS: A Single-Key Mode of Operation for Deterministic Authenticated Encryption.
Tetsu Iwata
Kan Yasuda
2009
conf/eurocrypt
A Double-Piped Mode of Operation for MACs, PRFs and PROs: Security beyond the Birthday Barrier.
Kan Yasuda
2009
conf/sacrypt
BTM: A Single-Key, Inverse-Cipher-Free Mode for Deterministic Authenticated Encryption.
Tetsu Iwata
Kan Yasuda
2008
conf/fse
A One-Pass Mode of Operation for Deterministic Message Authentication- Security beyond the Birthday Barrier.
Kan Yasuda
2008
conf/icisc
A Single-Key Domain Extender for Privacy-Preserving MACs and PRFs.
Kan Yasuda
2008
conf/asiacrypt
How to Fill Up Merkle-Damgård Hash Functions.
Kan Yasuda
2007
conf/acisp
"Sandwich" Is Indeed Secure: How to Authenticate a Message with Just One Hashing.
Kan Yasuda
2007
conf/asiacrypt
Boosting Merkle-Damgård Hashing for Message Authentication.
Kan Yasuda
Coauthors
Akinori Hosoyamada
(3)
Akira Nagai
(1)
Alan Szepieniec
(1)
Andrey Bogdanov
(4)
Atsushi Fujioka
(1)
Atul Luykx
(8)
Avijit Dutta
(1)
Avik Chakraborti
(2)
Bart Mennink
(6)
Bart Preneel
(2)
Begül Bilgin
(1)
Elena Andreeva
(5)
Elmar Tischhauser
(3)
Ferdinand Sibleyras
(1)
Junichi Tomida
(1)
Kan Yasuda
(34)
Kazumaro Aoki
(1)
Keita Xagawa
(1)
Kohei Nakagawa
(1)
Lei Wang
(1)
Mridul Nandi
(4)
Nicky Mouha
(2)
Nilanjan Datta
(4)
Philipp Jovanovic
(1)
Suprita Talnikar
(1)
Takanori Isobe
(1)
Takeshi Sugawara
(1)
Tetsu Iwata
(2)
Yosuke Todo
(2)
Yu Sasaki
(7)
Yusuke Naito
(3)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to