Author of the publication

Parallelizable Authenticated Encryption with Small State Size.

, and . SAC, volume 11959 of Lecture Notes in Computer Science, page 618-644. Springer, (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Generalization and Extension of XEX* Mode., and . IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 92-A (2): 517-524 (2009)Integrity analysis of authenticated encryption based on stream ciphers., , and . Int. J. Inf. Sec., 17 (5): 493-511 (2018)Fast Decryption: a New Feature of Misuse-Resistant AE.. IACR Trans. Symmetric Cryptol., 2020 (3): 87-118 (2020)Stronger Security Variants of GCM-SIV., and . IACR Trans. Symmetric Cryptol., 2016 (1): 134-157 (2016)A smaller and faster variant of RSM., , , and . DATE, page 1-6. European Design and Automation Association, (2014)XOCB: Beyond-Birthday-Bound Secure Authenticated Encryption Mode with Rate-One Computation., , , , , and . EUROCRYPT (4), volume 14007 of Lecture Notes in Computer Science, page 532-561. Springer, (2023)Integrity Analysis of Authenticated Encryption Based on Stream Ciphers., , and . ProvSec, volume 10005 of Lecture Notes in Computer Science, page 257-276. (2016)Blockcipher-Based Authenticated Encryption: How Small Can We Go?, , , and . CHES, volume 10529 of Lecture Notes in Computer Science, page 277-298. Springer, (2017)On Maximum Differential Probability of Generalized Feistel., , and . ACISP, volume 6812 of Lecture Notes in Computer Science, page 89-105. Springer, (2011)Expanding Weak PRF with Small Key Size., and . ICISC, volume 3935 of Lecture Notes in Computer Science, page 284-298. Springer, (2005)