Naito, Yusuke
693  results:
Search for persons X
?
3

KIVR: Committing Authenticated Encryption Using Redundancy ..:

, In: Applied Cryptography and Network Security; Lecture Notes in Computer Science,
Naito, Yusuke ; Sasaki, Yu ; Sugawara, Takeshi - p. 318-347 , 2024
 
?
4

The Multi-user Security of MACs via Universal Hashing in th..:

, In: Topics in Cryptology – CT-RSA 2024; Lecture Notes in Computer Science,
Naito, Yusuke - p. 51-77 , 2024
 
?
6

The Exact Multi-user Security of 2-Key Triple DES:

, In: Topics in Cryptology – CT-RSA 2024; Lecture Notes in Computer Science,
Naito, Yusuke ; Sasaki, Yu ; Sugawara, Takeshi - p. 112-135 , 2024
 
?
8

The Exact Multi-user Security of (Tweakable) Key Alternatin..:

, In: Lecture Notes in Computer Science; Advances in Cryptology – EUROCRYPT 2024,
Naito, Yusuke ; Sasaki, Yu ; Sugawara, Takeshi - p. 97-127 , 2024
 
?
11

Key Committing Security of AEZ and More:

Chen, Yu Long ; Flórez-Gutiérrez, Antonio ; Inoue, Akiko...
IACR Transactions on Symmetric Cryptology.  2023 (2023)  4 - p. 452-488 , 2023
 
?
14

Permutation-Based Deterministic Authenticated Encryption wi..:

, In: Lecture Notes in Computer Science; Information Security,
Hiraga, Yukihito ; Naito, Yusuke ; Sasaki, Yu. - p. 351-371 , 2023
 
1-15