Breadcrumb navigation

Our Researchers

December 3, 2024

Kazuhiko Minematsu

Kazuhiko Minematsu

Research Fellow
Ph.D.
A Study on Block cipher Modes for Encryption and Authentication. 2008 Waseda University

Research area

  • Theory and practice on symmetric-key cryptography

Publication

Refereed International Conference

  • Shoichi Hirose and Kazuhiko Minematsu:
    A Formal treatment of envelope encryption. ICISC 2024.
  • Akiko Inoue, Ashwin Jha, Bart Mennink, Kazuhiko Minematsu:
    Generic Security of GCM-SST. ACNS 2025 (to appear)
  • Rei Ueno, Hiromichi Haneda, Naofumi Homma, Akiko Inoue, Kazuhiko Minematsu:
    Crystalor: Recoverable Memory Encryption Mechanism with Optimized Metadata Structure. ACM CCS 2024.
  • Zhenzhen Bao, Seongha Hwang, Akiko Inoue, ByeongHak Lee, Jooyoung Lee, Kazuhiko Minematsu:
    XOCB: Beyond-Birthday-Bound Secure Authenticated Encryption Mode with Rate-One Computation. EUROCRYPT (4) 2023: 532-561
  • Isamu Furuya, Hayato Kasahara, Akiko Inoue, Kazuhiko Minematsu, Tetsu Iwata:
    PMACrx: A Vector-Input MAC for High-Dimensional Vectors with BBB Security. IWSEC 2023: 77-97
  • Shoichi Hirose, Kazuhiko Minematsu:
    Compactly Committing Authenticated Encryption Using Encryptment and Tweakable Block Cipher. SAC 2023: 233-252
  • Daichi Aoki, Kazuhiko Minematsu, Toshihiko Okamura, Tsuyoshi Takagi:
    Efficient Word Size Modular Multiplication over Signed Integers.
    29th IEEE Symposium on Computer Arithmetic, ARITH 2022.
  • Akiko Inoue, Tetsu Iwata, Kazuhiko Minematsu:
    Analyzing the Provable Security Bounds of GIFT-COFB and Photon-Beetle. ACNS 2022: 67-84
  • Kazuhiko Minematsu:
    Property-Preserving Hash Functions and Combinatorial Group Testing. ITC 2022: 2:1-2:14
  • Alexandre Adomnicai, Kazuhiko Minematsu, Maki Shigeri:
    Fast Skinny-128 SIMD Implementations for Sequential Modes of Operation. ACISP 2022
  • Takanori Isobe, Ryoma Ito, Kazuhiko Minematsu:
    Security Analysis of SFrame. ESORICS (2) 2021: 127-146
  • Kazuhiko Minematsu, Akiko Inoue, Katsuya Moriwaki, Maki Shigeri, Hiroyasu Kubo:
    Parallel Verification of Serial MAC and AE Modes. SAC 2021: 200-219
  • Rintaro Fujita, Takanori Isobe, Kazuhiko Minematsu:
    ACE in Chains: How Risky Is CBC Encryption of Binary Executable Files? ACNS (1) 2020: 187-207
  • Maya Oda, Rei Ueno, Akiko Inoue, Kazuhiko Minematsu, Naofumi Homma:
    PMAC++: Incremental MAC Scheme Adaptable to Lightweight Block Ciphers. ISCAS 2020: 1-4
  • Subhadeep Banik, Zhenzhen Bao, Takanori Isobe, Hiroyasu Kubo, Fukang Liu, Kazuhiko Minematsu, Kosei Sakamoto, Nao Shibata, Maki Shigeri:
    WARP : Revisiting GFN for Lightweight 128-Bit Block Cipher. SAC 2020: 535-564
  • Zhenzhen Bao, Jian Guo, Tetsu Iwata, Kazuhiko Minematsu:
    ZOCB and ZOTR: Tweakable Blockcipher Modes for Authenticated Encryption with Full Absorption.
    IACR Transactions on Symmetric Cryptology 2019(2): 1-54 (2019)
  • Akiko Inoue, Tetsu Iwata, Kazuhiko Minematsu, Bertram Poettering:
    Cryptanalysis of OCB2: Attacks on Authenticity and Confidentiality. CRYPTO (1) 2019: 3-31 (BEST PAPER AWARD)
  • Kazuhiko Minematsu, Norifumi Kamiya:
    Symmetric-Key Corruption Detection: When XOR-MACs Meet Combinatorial Group Testing.
    ESORICS (1) 2019: 595-615
  • Rei Ueno, Naofumi Homma, Tomonori Iida, Kazuhiko Minematsu:
    High Throughput/Gate FN-Based Hardware Architectures for AES-OTR. ISCAS 2019: 1-4<
  • Kosei Sakamoto, Kazuhiko Minematsu, Nao Shibata, Maki Shigeri, Hiroyasu Kubo, Yuki Funabiki, Andrey Bogdanov, Sumio Morioka, Takanori Isobe:
    Tweakable TWINE: Building a Tweakable Block Cipher on Generalized Feistel Structure. IWSEC 2019: 129-145
  • Akiko Inoue and Kazuhiko Minematsu : Parallelizable Authenticated Encryption with Small State Size.
    SAC 2019
  • Kazuhiko Minematsu : A Lightweight Alternative to PMAC. SAC 2019
  • Takanori Isobe and Kazuhiko Minematsu : Plaintext Recovery Attacks against XTS Beyond Collisions.
    SAC 2019
  • Takanori Isobe, Kazuhiko Minematsu:
    Breaking Message Integrity of an End-to-End Encryption Scheme of LINE. ESORICS (2) 2018: 249-268
  • Kazuhiko Minematsu, Kentarou Sasaki, Yuki Tanaka:
    Count-then-Permute: A Precision-Free Alternative to Inversion Sampling. CT-RSA 2018: 264-278
  • Kazuhiko Minematsu, Tetsu Iwata:
    Cryptanalysis of PMACx, PMAC2x, and SIVx. IACR Transaction on Symmetric Cryptology 2018
  • Ashwin Jha, Sweta Mishra, Eik List, Kazuhiko Minematsu, and Mridul Nandi.
    XHX -- A Framework for Optimally Secure Tweakable Block Ciphers from Classical Block Ciphers and Universal Hashing. LATINCRYPT 2017
  • Tetsu Iwata, Kazuhiko Minematsu, Thomas Peyrin, Yannick Seurin:
    ZMAC: A Fast Tweakable Block Cipher Mode for Highly Secure Message Authentication. CRYPTO 2017
  • Avik Chakraborti, Tetsu Iwata, Kazuhiko Minematsu, Mridul Nandi:
    Blockcipher-Based Authenticated Encryption: How Small Can We Go? CHES 2017: 277-298
  • Tetsu Iwata, Kazuhiko Minematsu:
    Stronger Security Variants of GCM-SIV. IACR Transaction on Symmetric Cryptology 2017
  • Kazuya Imamura, Kazuhiko Minematsu, Tetsu Iwata: Integrity Analysis of Authenticated Encryption Based on Stream Ciphers. ProvSec 2016: 257-276
  • Kazuhiko Minematsu:
    Authenticated Encryption with Small Stretch (or, How to Accelerate AERO). ACISP 2016: 347-362
  • Subhadeep Banik, Andrey Bogdanov, Kazuhiko Minematsu:
    Low-area hardware implementations of CLOC, SILC and AES-OTR. HOST 2016: 71-74
  • Kazuhiko Minematsu:
    Efficient Message Authentication Codes with Combinatorial Group Testing. ESORICS 2015: 185-202
  • Kazuhiko Minematsu, Tetsu Iwata:
    Tweak-Length Extension for Tweakable Blockciphers. IMA Int. Conf. 2015: 77-93
  • Yuichi Niwa, Keisuke Ohashi, Kazuhiko Minematsu, Tetsu Iwata:
    GCM Security Bounds Reconsidered. FSE 2015: 385-407
    (BEST PAPER AWARD)
  • Noritaka Yamashita, Kazuhiko Minematsu, Toshihiko Okamura, Yukiyasu Tsunoo:
    A smaller and faster variant of RSM. DATE 2014: 1-6
  • Kazuhiko Minematsu:
    Parallelizable Rate-1 Authenticated Encryption from Pseudorandom Functions. EUROCRYPT 2014: 275-292
  • Tetsu Iwata, Kazuhiko Minematsu, Jian Guo, Sumio Morioka:
    CLOC: Authenticated Encryption for Short Input. FSE 2014: 149-167
  • Kazuhiko Minematsu, Stefan Lucks, Hiraku Morita, Tetsu Iwata:
    Attacks and Security Proofs of EAX-Prime. FSE 2013: 327-347
  • Kazuhiko Minematsu, Stefan Lucks, Tetsu Iwata:
    Improved Authenticity Bound of EAX, and Refinements. ProvSec 2013: 184-201
  • Kazuhiko Minematsu:
    A Short Universal Hash Function from Bit Rotation, and Applications to Blockcipher Modes. ProvSec 2013: 221-238
  • Tetsu Iwata, Keisuke Ohashi, Kazuhiko Minematsu:
    Breaking and Repairing GCM Security Proofs. CRYPTO 2012: 31-49
  • Tomoyasu Suzaki, Kazuhiko Minematsu, Sumio Morioka, Eita Kobayashi:
    TWINE: A Lightweight Block Cipher for Multiple Platforms. Selected Areas in Cryptography 2012: 339-354
  • Tomoyasu Suzaki, Kazuhiko Minematsu, Sumio Morioka, Eita Kobayashi:
    TWINE: A Lightweight, Versatile Block Cipher. ECRYPT Workshop on Lightweight Cryptography 2011.
  • Kazuhiko Minematsu, Tomoyasu Suzaki, Maki Shigeri:
    On Maximum Differential Probability of Generalized Feistel. ACISP 2011: 89-105
  • Kazuhiko Minematsu, Tetsu Iwata:
    Building Blockcipher from Tweakable Blockcipher: Extending FSE 2009 Proposal. IMA Int. Conf. 2011: 391-412
  • Tomoyasu Suzaki, Kazuhiko Minematsu:
    Improving the Generalized Feistel. FSE 2010: 19-39
  • Kazuhiko Minematsu:
    How to Thwart Birthday Attacks against MACs via Small Randomness. FSE 2010: 230-249
  • Kazuhiko Minematsu:
    Beyond-Birthday-Bound Security Based on Tweakable Block Cipher. FSE 2009: 308-326 2007
  • Kazuhiko Minematsu, Toshiyasu Matsushima:
    New Bounds for PMAC, TMAC, and XCBC. FSE 2007: 434-451
  • Kazuhiko Minematsu, Toshiyasu Matsushima:
    Tweakable Enciphering Schemes from Hash-Sum-Expansion. INDOCRYPT 2007: 252-267 2006
  • Kazuhiko Minematsu, Yukiyasu Tsunoo:
    Provably Secure MACs from Differentially-Uniform Permutations and AES-Based Implementations. FSE 2006: 226-241
  • Kazuhiko Minematsu:
    Improved Security Analysis of XEX and LRW Modes. Selected Areas in Cryptography 2006: 96-113 2005
  • Kazuhiko Minematsu, Yukiyasu Tsunoo:
    Hybrid Symmetric Encryption Using Known-Plaintext Attack-Secure Components. ICISC 2005: 242-260
  • Kazuhiko Minematsu, Yukiyasu Tsunoo:
    Expanding Weak PRF with Small Key Size. ICISC 2005: 284-298

International Journal

  • Rei Ueno, Naofumi Homma, Akiko Inoue, Kazuhiko Minematsu:
    Fallen Sanctuary: A Higher-Order and Leakage-Resilient Rekeying Scheme. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2024(1): 264-308 (2024)
  • Ravi Anand, Subhadeep Banik, Andrea Caforio, Tatsuya Ishikawa, Takanori Isobe, Fukang Liu, Kazuhiko Minematsu, Mostafizar Rahman, Kosei Sakamoto:
    Gleeok: A Family of Low-Latency PRFs and its Applications to Authenticated Encryption. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2024(2): 545-587 (2024)
  • Rentaro Shiba, Ravi Anand, Kazuhiko Minematsu, Takanori Isobe:
    Cubicle: A family of space-hard ciphers for IoT. IET Inf. Secur. 17(1): 131-146 (2023)
  • Akiko Inoue, Chun Guo, Kazuhiko Minematsu:
    Nonce-misuse resilience of Romulus-N and GIFT-COFB. IET Inf. Secur. 17(3): 468-484 (2023)
  • Takanori Isobe, Ryoma Ito, Kazuhiko Minematsu:
    Cryptanalysis on End-to-End Encryption Schemes of Communication Tools and Its Research Trend. J. Inf. Process. 31: 523-536 (2023)
  • Takanori Isobe, Ryoma Ito, Fukang Liu, Kazuhiko Minematsu, Motoki Nakahashi, Kosei Sakamoto, Rentaro Shiba:
    Areion: Highly-Efficient Permutations and Its Applications to Hash Functions for Short Input. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2023(2): 115-154 (2023)
  • Yu Long Chen, Antonio Flórez-Gutiérrez, Akiko Inoue, Ryoma Ito, Tetsu Iwata, Kazuhiko Minematsu, Nicky Mouha, Yusuke Naito, Ferdinand Sibleyras, Yosuke Todo:
    Key Committing Security of AEZ and More. IACR Trans. Symmetric Cryptol. 2023(4): 452-488 (2023)
  • Akiko Inoue, Kazuhiko Minematsu, Maya Oda, Rei Ueno, Naofumi Homma:
    ELM: A Low-Latency and Scalable Memory Encryption Scheme. IEEE Trans. Inf. Forensics Secur. 17: 2628-2643 (2022)
  • Chun Guo, Tetsu Iwata, Kazuhiko Minematsu:
    New indifferentiability security proof of MDPH hash function. IET Inf. Secur. 16(4): 262-281 (2022)
  • Rentaro Shiba, Kosei Sakamoto, Fukang Liu, Kazuhiko Minematsu, Takanori Isobe:
    Integral and impossible-differential attacks on the reduced-round Lesamnta-LW-BC. IET Inf. Secur. 16(2): 75-85 (2022)
  • Kosei Sakamoto, Kazuhiko Minematsu, Nao Shibata, Maki Shigeri, Hiroyasu Kubo, Takanori Isobe:
    Design of a Linear Layer for a Block Cipher Based on Type-2 Generalized Feistel Network with 32 Branches. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 105-A(3): 278-288 (2022)
  • Makoto Habu, Kazuhiko Minematsu, Tetsu Iwata:
    Matching Attacks on Romulus-M. IET Inf. Secur. (2022)
  • Jin Hoki, Kosei Sakamoto, Fukang Liu, Kazuhiko Minematsu, Takanori Isobe:
    MILP-Aided Security Evaluation of Differential Attacks on KCipher-2. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 104-A(1): 203-212 (2021)
  • Jin Hoki, Kosei Sakamoto, Kazuhiko Minematsu, Takanori Isobe:
    Practical Integral Distinguishers on SNOW 3G and KCipher-2. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 104-A(11): 1603-1611 (2021)
  • Subhadeep Banik, Takanori Isobe, Fukang Liu, Kazuhiko Minematsu, Kosei Sakamoto:
    Orthros: A Low-Latency PRF. IACR Trans. Symmetric Cryptol. 2021(1): 37-77 (2021)
  • Kosei Sakamoto, Kazuhiko Minematsu, Nao Shibata, Maki Shigeri, Hiroyasu Kubo, Yuki Funabiki, Takanori Isobe:
    Security of Related-Key Differential Attacks on TWINE, Revisited. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 103-A(1): 212-214 (2020)
  • Takanori Isobe, Kazuhiko Minematsu:
    Security Analysis and Countermeasures of an End-to-End Encryption Scheme of LINE. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 103-A(1): 313-324 (2020)
  • Kosei Sakamoto, Kazuhiko Minematsu, Nao Shibata, Maki Shigeri, Hiroyasu Kubo, Yuki Funabiki, Andrey Bogdanov, Sumio Morioka, Takanori Isobe:
    Tweakable TWINE: Building a Tweakable Block Cipher on Generalized Feistel Structure. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 103-A(12): 1629-1639 (2020)
  • Avik Chakraborti, Tetsu Iwata, Kazuhiko Minematsu, Mridul Nandi:
    Blockcipher-Based Authenticated Encryption: How Small Can We Go? J. Cryptol. 33(3): 703-741 (2020)
  • Akiko Inoue, Tetsu Iwata, Kazuhiko Minematsu, Bertram Poettering:
    Cryptanalysis of OCB2: Attacks on Authenticity and Confidentiality. J. Cryptol. 33(4): 1871-1913 (2020)
  • Tetsu Iwata, Mustafa Khairallah, Kazuhiko Minematsu, Thomas Peyrin:
    Duel of the Titans: The Romulus and Remus Families of Lightweight AEAD Algorithms. IACR Trans. Symmetric Cryptol. 2020(1): 43-120 (2020)
  • Kazuhiko Minematsu:
    Fast Decryption: a New Feature of Misuse-Resistant AE. IACR Trans. Symmetric Cryptol. 2020(3): 87-118 (2020)
  • Wonseok Choi, Akiko Inoue, ByeongHak Lee, Jooyoung Lee, Eik List, Kazuhiko Minematsu, Yusuke Naito:
    Highly Secure Nonce-based MACs from the Sum of Tweakable Block Ciphers. IACR Trans. Symmetric Cryptol. 2020(4): 39-70 (2020)
  • Jooyoung Lee, Atul Luykx, Bart Mennink, Kazuhiko Minematsu.
    Connecting tweakable and multi-key blockcipher security. Design, Codes and Cryptography 2017.
  • Kazuhiko Minematsu:
    Building blockcipher from small-block tweakable blockcipher. Des. Codes Cryptography 74(3): 645-663 (2015)
  • Hayato Kobayashi, Kazuhiko Minematsu, Tetsu Iwata:
    Optimality of Tweak Functions in CLOC. IEICE Transactions 98-A(10): 2152-2164 (2015)
  • Kazuhiko Minematsu, Toshiyasu Matsushima:
    Generalization and Extension of XEX* Mode. IEICE Transactions 92-A(2): 517-524 (2009)
  • Kazuhiko Minematsu, Toshiyasu Matsushima:
    Improved MACs from Differentially-Uniform Permutations. IEICE Transactions 90-A(12): 2908-2915 (2007)
  • Yukiyasu Tsunoo, Etsuko Tsujihara, Maki Shigeri, Hiroyasu Kubo, Kazuhiko Minematsu:
    Improving cache attacks by considering cipher structure. Int. J. Inf. Sec. 5(3): 166-176 (2006)
  • Yukiyasu Tsunoo, Teruo Saito, Maki Shigeri, Hiroyasu Kubo, Kazuhiko Minematsu:
    Shorter bit sequence is enough to break stream cipher LILI-128. IEEE Trans. Information Theory 51(12): 4312-4319 (2005)

Awards

  • Support Center for Advanced Telecommunications Technology Research (SCAT) Chairman Award, 2020
  • SCIS* 2019 innovation paper award
  • CRYPTO 2019 Best paper award
  • SCIS* 2018 innovation paper award
  • FSE 2015 Best paper award
  • ProvSec 2016 Best student paper award
  • *
    Symposium on Cryptography and Information Security

Services

  • IACR Transactions on Symmetric Cryptology (ToSC), Co-Editors-in-Chief, 2024-2025 
  • 19th International Workshop on Security, IWSEC 2024, Program Co-Chairs
  • CRYPTREC Cryptographic Technology Evaluation Committee 2000-2020
  • CRYPTREC Lightweight Cryptography Working Group 2013-2017

Invited Talks

  • Symmetric-key Cryptography for Memory Encryption, Keynote talk, Information Security Conference (ISC) 2024, 2024
  • Symmetric-key Cryptography for Memory Encryption, Seminar talk, Georgia Institute of Technology, 2024
  • Practical modes under practical constraints. Lorentz Center Workshop, 2024
  • XOCB: Beyond-Birthday-Bound Secure Authenticated Encryption Mode with Rate-One Computation, Workshop on Cryptography and Information Security (WCIS) 2023
  • On recent research direction on NIST Lightweight Cryptography. Hardware Security Forum 2023, Japan, 2023
  • Revisiting Vector-input MAC (joint work with Isamu Furuya), Dagstuhl Seminar 24041 Symmetric Cryptography, 2024
  • Symmetric-key cryptography research in NEC. NIST Seminar, 2022
  • Cryptanalysis of OCB2: the Attacks and the Story behind. Invited talk, FSE 2020, 2020
  • Accelerating MRAE, Dagstuhl Seminar 20041 Symmetric Cryptography, 2020
  • On cryptanalysis of OCB2 authenticated encryption scheme, SCAT Award presentation 2020
  • An analysis of parallelizable authenticated encryption. Asian Symmetric-key Workshop (ASK) 2018, Kolkata, India.
  • Forgery and Impersonation Attacks against of LINE’s End-to-End Encryption Schemes. Tokyo Crypto Day, 2018 On the security of LINE messaging application (Joint work with Takanori Isobe). Dagstuhl Seminar 2018
  • On randomized encryption beyond IV collision. Early Symmetric-key Conference, Luxemburg, 2017
  • CLOC, SILC and OTR. Recent Advances in Authenticated Encryption, ISI Kolkata, India, 2016
  • On security notions and constructions of authenticated encryption Cryptology Frontier Group, Japan Advanced Institute of Science and Technology, 2015 (in Japanese)
  • Trends and recent results on Symmetric-key cryptography. Waseda University, 2015 (in Japanese)
  • Design tools for blockcipher modes. Denmark Technical University, 2014
  • Efficient Message Authentication Codes with Combinatorial Group Testing. The Fifth Asian Workshop on Symmetric Key Cryptography, ASK 2015, Singapore.
  • Design approaches to efficient blockcipher modes. The Fourth Asian Workshop on Symmetric Key Cryptography, ASK 2014, India.
  • Applications of CBC mode for authentication: CBC-MAC and its variants. Jimbo-cho Crypto workshop 2013 (in Japanese)