Global Site
Breadcrumb navigation
Our Researchers
December 3, 2024
Kazuhiko Minematsu
Research Fellow
Ph.D.
A Study on Block cipher Modes for Encryption and Authentication. 2008 Waseda University
Research area
- Theory and practice on symmetric-key cryptography
Publication
Refereed International Conference
- Shoichi Hirose and Kazuhiko Minematsu:
A Formal treatment of envelope encryption. ICISC 2024. - Akiko Inoue, Ashwin Jha, Bart Mennink, Kazuhiko Minematsu:
Generic Security of GCM-SST. ACNS 2025 (to appear) - Rei Ueno, Hiromichi Haneda, Naofumi Homma, Akiko Inoue, Kazuhiko Minematsu:
Crystalor: Recoverable Memory Encryption Mechanism with Optimized Metadata Structure. ACM CCS 2024. - Zhenzhen Bao, Seongha Hwang, Akiko Inoue, ByeongHak Lee, Jooyoung Lee, Kazuhiko Minematsu:
XOCB: Beyond-Birthday-Bound Secure Authenticated Encryption Mode with Rate-One Computation. EUROCRYPT (4) 2023: 532-561 - Isamu Furuya, Hayato Kasahara, Akiko Inoue, Kazuhiko Minematsu, Tetsu Iwata:
PMACrx: A Vector-Input MAC for High-Dimensional Vectors with BBB Security. IWSEC 2023: 77-97 - Shoichi Hirose, Kazuhiko Minematsu:
Compactly Committing Authenticated Encryption Using Encryptment and Tweakable Block Cipher. SAC 2023: 233-252 - Daichi Aoki, Kazuhiko Minematsu, Toshihiko Okamura, Tsuyoshi Takagi:
Efficient Word Size Modular Multiplication over Signed Integers.
29th IEEE Symposium on Computer Arithmetic, ARITH 2022. - Akiko Inoue, Tetsu Iwata, Kazuhiko Minematsu:
Analyzing the Provable Security Bounds of GIFT-COFB and Photon-Beetle. ACNS 2022: 67-84 - Kazuhiko Minematsu:
Property-Preserving Hash Functions and Combinatorial Group Testing. ITC 2022: 2:1-2:14 - Alexandre Adomnicai, Kazuhiko Minematsu, Maki Shigeri:
Fast Skinny-128 SIMD Implementations for Sequential Modes of Operation. ACISP 2022 - Takanori Isobe, Ryoma Ito, Kazuhiko Minematsu:
Security Analysis of SFrame. ESORICS (2) 2021: 127-146 - Kazuhiko Minematsu, Akiko Inoue, Katsuya Moriwaki, Maki Shigeri, Hiroyasu Kubo:
Parallel Verification of Serial MAC and AE Modes. SAC 2021: 200-219 - Rintaro Fujita, Takanori Isobe, Kazuhiko Minematsu:
ACE in Chains: How Risky Is CBC Encryption of Binary Executable Files? ACNS (1) 2020: 187-207 - Maya Oda, Rei Ueno, Akiko Inoue, Kazuhiko Minematsu, Naofumi Homma:
PMAC++: Incremental MAC Scheme Adaptable to Lightweight Block Ciphers. ISCAS 2020: 1-4 - Subhadeep Banik, Zhenzhen Bao, Takanori Isobe, Hiroyasu Kubo, Fukang Liu, Kazuhiko Minematsu, Kosei Sakamoto, Nao Shibata, Maki Shigeri:
WARP : Revisiting GFN for Lightweight 128-Bit Block Cipher. SAC 2020: 535-564
- Zhenzhen Bao, Jian Guo, Tetsu Iwata, Kazuhiko Minematsu:
ZOCB and ZOTR: Tweakable Blockcipher Modes for Authenticated Encryption with Full Absorption.
IACR Transactions on Symmetric Cryptology 2019(2): 1-54 (2019) - Akiko Inoue, Tetsu Iwata, Kazuhiko Minematsu, Bertram Poettering:
Cryptanalysis of OCB2: Attacks on Authenticity and Confidentiality. CRYPTO (1) 2019: 3-31 (BEST PAPER AWARD) - Kazuhiko Minematsu, Norifumi Kamiya:
Symmetric-Key Corruption Detection: When XOR-MACs Meet Combinatorial Group Testing.
ESORICS (1) 2019: 595-615 - Rei Ueno, Naofumi Homma, Tomonori Iida, Kazuhiko Minematsu:
High Throughput/Gate FN-Based Hardware Architectures for AES-OTR. ISCAS 2019: 1-4< - Kosei Sakamoto, Kazuhiko Minematsu, Nao Shibata, Maki Shigeri, Hiroyasu Kubo, Yuki Funabiki, Andrey Bogdanov, Sumio Morioka, Takanori Isobe:
Tweakable TWINE: Building a Tweakable Block Cipher on Generalized Feistel Structure. IWSEC 2019: 129-145 - Akiko Inoue and Kazuhiko Minematsu : Parallelizable Authenticated Encryption with Small State Size.
SAC 2019 - Kazuhiko Minematsu : A Lightweight Alternative to PMAC. SAC 2019
- Takanori Isobe and Kazuhiko Minematsu : Plaintext Recovery Attacks against XTS Beyond Collisions.
SAC 2019 - Takanori Isobe, Kazuhiko Minematsu:
Breaking Message Integrity of an End-to-End Encryption Scheme of LINE. ESORICS (2) 2018: 249-268 - Kazuhiko Minematsu, Kentarou Sasaki, Yuki Tanaka:
Count-then-Permute: A Precision-Free Alternative to Inversion Sampling. CT-RSA 2018: 264-278 - Kazuhiko Minematsu, Tetsu Iwata:
Cryptanalysis of PMACx, PMAC2x, and SIVx. IACR Transaction on Symmetric Cryptology 2018 - Ashwin Jha, Sweta Mishra, Eik List, Kazuhiko Minematsu, and Mridul Nandi.
XHX -- A Framework for Optimally Secure Tweakable Block Ciphers from Classical Block Ciphers and Universal Hashing. LATINCRYPT 2017 - Tetsu Iwata, Kazuhiko Minematsu, Thomas Peyrin, Yannick Seurin:
ZMAC: A Fast Tweakable Block Cipher Mode for Highly Secure Message Authentication. CRYPTO 2017 - Avik Chakraborti, Tetsu Iwata, Kazuhiko Minematsu, Mridul Nandi:
Blockcipher-Based Authenticated Encryption: How Small Can We Go? CHES 2017: 277-298 - Tetsu Iwata, Kazuhiko Minematsu:
Stronger Security Variants of GCM-SIV. IACR Transaction on Symmetric Cryptology 2017 - Kazuya Imamura, Kazuhiko Minematsu, Tetsu Iwata: Integrity Analysis of Authenticated Encryption Based on Stream Ciphers. ProvSec 2016: 257-276
- Kazuhiko Minematsu:
Authenticated Encryption with Small Stretch (or, How to Accelerate AERO). ACISP 2016: 347-362 - Subhadeep Banik, Andrey Bogdanov, Kazuhiko Minematsu:
Low-area hardware implementations of CLOC, SILC and AES-OTR. HOST 2016: 71-74 - Kazuhiko Minematsu:
Efficient Message Authentication Codes with Combinatorial Group Testing. ESORICS 2015: 185-202 - Kazuhiko Minematsu, Tetsu Iwata:
Tweak-Length Extension for Tweakable Blockciphers. IMA Int. Conf. 2015: 77-93 - Yuichi Niwa, Keisuke Ohashi, Kazuhiko Minematsu, Tetsu Iwata:
GCM Security Bounds Reconsidered. FSE 2015: 385-407
(BEST PAPER AWARD) - Noritaka Yamashita, Kazuhiko Minematsu, Toshihiko Okamura, Yukiyasu Tsunoo:
A smaller and faster variant of RSM. DATE 2014: 1-6 - Kazuhiko Minematsu:
Parallelizable Rate-1 Authenticated Encryption from Pseudorandom Functions. EUROCRYPT 2014: 275-292 - Tetsu Iwata, Kazuhiko Minematsu, Jian Guo, Sumio Morioka:
CLOC: Authenticated Encryption for Short Input. FSE 2014: 149-167 - Kazuhiko Minematsu, Stefan Lucks, Hiraku Morita, Tetsu Iwata:
Attacks and Security Proofs of EAX-Prime. FSE 2013: 327-347 - Kazuhiko Minematsu, Stefan Lucks, Tetsu Iwata:
Improved Authenticity Bound of EAX, and Refinements. ProvSec 2013: 184-201 - Kazuhiko Minematsu:
A Short Universal Hash Function from Bit Rotation, and Applications to Blockcipher Modes. ProvSec 2013: 221-238 - Tetsu Iwata, Keisuke Ohashi, Kazuhiko Minematsu:
Breaking and Repairing GCM Security Proofs. CRYPTO 2012: 31-49 - Tomoyasu Suzaki, Kazuhiko Minematsu, Sumio Morioka, Eita Kobayashi:
TWINE: A Lightweight Block Cipher for Multiple Platforms. Selected Areas in Cryptography 2012: 339-354 - Tomoyasu Suzaki, Kazuhiko Minematsu, Sumio Morioka, Eita Kobayashi:
TWINE: A Lightweight, Versatile Block Cipher. ECRYPT Workshop on Lightweight Cryptography 2011. - Kazuhiko Minematsu, Tomoyasu Suzaki, Maki Shigeri:
On Maximum Differential Probability of Generalized Feistel. ACISP 2011: 89-105 - Kazuhiko Minematsu, Tetsu Iwata:
Building Blockcipher from Tweakable Blockcipher: Extending FSE 2009 Proposal. IMA Int. Conf. 2011: 391-412 - Tomoyasu Suzaki, Kazuhiko Minematsu:
Improving the Generalized Feistel. FSE 2010: 19-39 - Kazuhiko Minematsu:
How to Thwart Birthday Attacks against MACs via Small Randomness. FSE 2010: 230-249 - Kazuhiko Minematsu:
Beyond-Birthday-Bound Security Based on Tweakable Block Cipher. FSE 2009: 308-326 2007 - Kazuhiko Minematsu, Toshiyasu Matsushima:
New Bounds for PMAC, TMAC, and XCBC. FSE 2007: 434-451 - Kazuhiko Minematsu, Toshiyasu Matsushima:
Tweakable Enciphering Schemes from Hash-Sum-Expansion. INDOCRYPT 2007: 252-267 2006 - Kazuhiko Minematsu, Yukiyasu Tsunoo:
Provably Secure MACs from Differentially-Uniform Permutations and AES-Based Implementations. FSE 2006: 226-241 - Kazuhiko Minematsu:
Improved Security Analysis of XEX and LRW Modes. Selected Areas in Cryptography 2006: 96-113 2005 - Kazuhiko Minematsu, Yukiyasu Tsunoo:
Hybrid Symmetric Encryption Using Known-Plaintext Attack-Secure Components. ICISC 2005: 242-260 - Kazuhiko Minematsu, Yukiyasu Tsunoo:
Expanding Weak PRF with Small Key Size. ICISC 2005: 284-298
International Journal
- Rei Ueno, Naofumi Homma, Akiko Inoue, Kazuhiko Minematsu:
Fallen Sanctuary: A Higher-Order and Leakage-Resilient Rekeying Scheme. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2024(1): 264-308 (2024) - Ravi Anand, Subhadeep Banik, Andrea Caforio, Tatsuya Ishikawa, Takanori Isobe, Fukang Liu, Kazuhiko Minematsu, Mostafizar Rahman, Kosei Sakamoto:
Gleeok: A Family of Low-Latency PRFs and its Applications to Authenticated Encryption. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2024(2): 545-587 (2024) - Rentaro Shiba, Ravi Anand, Kazuhiko Minematsu, Takanori Isobe:
Cubicle: A family of space-hard ciphers for IoT. IET Inf. Secur. 17(1): 131-146 (2023) - Akiko Inoue, Chun Guo, Kazuhiko Minematsu:
Nonce-misuse resilience of Romulus-N and GIFT-COFB. IET Inf. Secur. 17(3): 468-484 (2023) - Takanori Isobe, Ryoma Ito, Kazuhiko Minematsu:
Cryptanalysis on End-to-End Encryption Schemes of Communication Tools and Its Research Trend. J. Inf. Process. 31: 523-536 (2023) - Takanori Isobe, Ryoma Ito, Fukang Liu, Kazuhiko Minematsu, Motoki Nakahashi, Kosei Sakamoto, Rentaro Shiba:
Areion: Highly-Efficient Permutations and Its Applications to Hash Functions for Short Input. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2023(2): 115-154 (2023) - Yu Long Chen, Antonio Flórez-Gutiérrez, Akiko Inoue, Ryoma Ito, Tetsu Iwata, Kazuhiko Minematsu, Nicky Mouha, Yusuke Naito, Ferdinand Sibleyras, Yosuke Todo:
Key Committing Security of AEZ and More. IACR Trans. Symmetric Cryptol. 2023(4): 452-488 (2023) - Akiko Inoue, Kazuhiko Minematsu, Maya Oda, Rei Ueno, Naofumi Homma:
ELM: A Low-Latency and Scalable Memory Encryption Scheme. IEEE Trans. Inf. Forensics Secur. 17: 2628-2643 (2022) - Chun Guo, Tetsu Iwata, Kazuhiko Minematsu:
New indifferentiability security proof of MDPH hash function. IET Inf. Secur. 16(4): 262-281 (2022) - Rentaro Shiba, Kosei Sakamoto, Fukang Liu, Kazuhiko Minematsu, Takanori Isobe:
Integral and impossible-differential attacks on the reduced-round Lesamnta-LW-BC. IET Inf. Secur. 16(2): 75-85 (2022) - Kosei Sakamoto, Kazuhiko Minematsu, Nao Shibata, Maki Shigeri, Hiroyasu Kubo, Takanori Isobe:
Design of a Linear Layer for a Block Cipher Based on Type-2 Generalized Feistel Network with 32 Branches. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 105-A(3): 278-288 (2022) - Makoto Habu, Kazuhiko Minematsu, Tetsu Iwata:
Matching Attacks on Romulus-M. IET Inf. Secur. (2022) - Jin Hoki, Kosei Sakamoto, Fukang Liu, Kazuhiko Minematsu, Takanori Isobe:
MILP-Aided Security Evaluation of Differential Attacks on KCipher-2. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 104-A(1): 203-212 (2021) - Jin Hoki, Kosei Sakamoto, Kazuhiko Minematsu, Takanori Isobe:
Practical Integral Distinguishers on SNOW 3G and KCipher-2. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 104-A(11): 1603-1611 (2021) - Subhadeep Banik, Takanori Isobe, Fukang Liu, Kazuhiko Minematsu, Kosei Sakamoto:
Orthros: A Low-Latency PRF. IACR Trans. Symmetric Cryptol. 2021(1): 37-77 (2021) - Kosei Sakamoto, Kazuhiko Minematsu, Nao Shibata, Maki Shigeri, Hiroyasu Kubo, Yuki Funabiki, Takanori Isobe:
Security of Related-Key Differential Attacks on TWINE, Revisited. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 103-A(1): 212-214 (2020) - Takanori Isobe, Kazuhiko Minematsu:
Security Analysis and Countermeasures of an End-to-End Encryption Scheme of LINE. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 103-A(1): 313-324 (2020) - Kosei Sakamoto, Kazuhiko Minematsu, Nao Shibata, Maki Shigeri, Hiroyasu Kubo, Yuki Funabiki, Andrey Bogdanov, Sumio Morioka, Takanori Isobe:
Tweakable TWINE: Building a Tweakable Block Cipher on Generalized Feistel Structure. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 103-A(12): 1629-1639 (2020) - Avik Chakraborti, Tetsu Iwata, Kazuhiko Minematsu, Mridul Nandi:
Blockcipher-Based Authenticated Encryption: How Small Can We Go? J. Cryptol. 33(3): 703-741 (2020) - Akiko Inoue, Tetsu Iwata, Kazuhiko Minematsu, Bertram Poettering:
Cryptanalysis of OCB2: Attacks on Authenticity and Confidentiality. J. Cryptol. 33(4): 1871-1913 (2020) - Tetsu Iwata, Mustafa Khairallah, Kazuhiko Minematsu, Thomas Peyrin:
Duel of the Titans: The Romulus and Remus Families of Lightweight AEAD Algorithms. IACR Trans. Symmetric Cryptol. 2020(1): 43-120 (2020) - Kazuhiko Minematsu:
Fast Decryption: a New Feature of Misuse-Resistant AE. IACR Trans. Symmetric Cryptol. 2020(3): 87-118 (2020) - Wonseok Choi, Akiko Inoue, ByeongHak Lee, Jooyoung Lee, Eik List, Kazuhiko Minematsu, Yusuke Naito:
Highly Secure Nonce-based MACs from the Sum of Tweakable Block Ciphers. IACR Trans. Symmetric Cryptol. 2020(4): 39-70 (2020) - Jooyoung Lee, Atul Luykx, Bart Mennink, Kazuhiko Minematsu.
Connecting tweakable and multi-key blockcipher security. Design, Codes and Cryptography 2017. - Kazuhiko Minematsu:
Building blockcipher from small-block tweakable blockcipher. Des. Codes Cryptography 74(3): 645-663 (2015) - Hayato Kobayashi, Kazuhiko Minematsu, Tetsu Iwata:
Optimality of Tweak Functions in CLOC. IEICE Transactions 98-A(10): 2152-2164 (2015) - Kazuhiko Minematsu, Toshiyasu Matsushima:
Generalization and Extension of XEX* Mode. IEICE Transactions 92-A(2): 517-524 (2009) - Kazuhiko Minematsu, Toshiyasu Matsushima:
Improved MACs from Differentially-Uniform Permutations. IEICE Transactions 90-A(12): 2908-2915 (2007) - Yukiyasu Tsunoo, Etsuko Tsujihara, Maki Shigeri, Hiroyasu Kubo, Kazuhiko Minematsu:
Improving cache attacks by considering cipher structure. Int. J. Inf. Sec. 5(3): 166-176 (2006) - Yukiyasu Tsunoo, Teruo Saito, Maki Shigeri, Hiroyasu Kubo, Kazuhiko Minematsu:
Shorter bit sequence is enough to break stream cipher LILI-128. IEEE Trans. Information Theory 51(12): 4312-4319 (2005)
Awards
- Support Center for Advanced Telecommunications Technology Research (SCAT) Chairman Award, 2020
- SCIS* 2019 innovation paper award
- CRYPTO 2019 Best paper award
- SCIS* 2018 innovation paper award
- FSE 2015 Best paper award
- ProvSec 2016 Best student paper award
- *Symposium on Cryptography and Information Security
Services
- IACR Transactions on Symmetric Cryptology (ToSC), Co-Editors-in-Chief, 2024-2025
- 19th International Workshop on Security, IWSEC 2024, Program Co-Chairs
- CRYPTREC Cryptographic Technology Evaluation Committee 2000-2020
- CRYPTREC Lightweight Cryptography Working Group 2013-2017
Invited Talks
- Symmetric-key Cryptography for Memory Encryption, Keynote talk, Information Security Conference (ISC) 2024, 2024
- Symmetric-key Cryptography for Memory Encryption, Seminar talk, Georgia Institute of Technology, 2024
- Practical modes under practical constraints. Lorentz Center Workshop, 2024
- XOCB: Beyond-Birthday-Bound Secure Authenticated Encryption Mode with Rate-One Computation, Workshop on Cryptography and Information Security (WCIS) 2023
- On recent research direction on NIST Lightweight Cryptography. Hardware Security Forum 2023, Japan, 2023
- Revisiting Vector-input MAC (joint work with Isamu Furuya), Dagstuhl Seminar 24041 Symmetric Cryptography, 2024
- Symmetric-key cryptography research in NEC. NIST Seminar, 2022
- Cryptanalysis of OCB2: the Attacks and the Story behind. Invited talk, FSE 2020, 2020
- Accelerating MRAE, Dagstuhl Seminar 20041 Symmetric Cryptography, 2020
- On cryptanalysis of OCB2 authenticated encryption scheme, SCAT Award presentation 2020
- An analysis of parallelizable authenticated encryption. Asian Symmetric-key Workshop (ASK) 2018, Kolkata, India.
- Forgery and Impersonation Attacks against of LINE’s End-to-End Encryption Schemes. Tokyo Crypto Day, 2018 On the security of LINE messaging application (Joint work with Takanori Isobe). Dagstuhl Seminar 2018
- On randomized encryption beyond IV collision. Early Symmetric-key Conference, Luxemburg, 2017
- CLOC, SILC and OTR. Recent Advances in Authenticated Encryption, ISI Kolkata, India, 2016
- On security notions and constructions of authenticated encryption Cryptology Frontier Group, Japan Advanced Institute of Science and Technology, 2015 (in Japanese)
- Trends and recent results on Symmetric-key cryptography. Waseda University, 2015 (in Japanese)
- Design tools for blockcipher modes. Denmark Technical University, 2014
- Efficient Message Authentication Codes with Combinatorial Group Testing. The Fifth Asian Workshop on Symmetric Key Cryptography, ASK 2015, Singapore.
- Design approaches to efficient blockcipher modes. The Fourth Asian Workshop on Symmetric Key Cryptography, ASK 2014, India.
- Applications of CBC mode for authentication: CBC-MAC and its variants. Jimbo-cho Crypto workshop 2013 (in Japanese)