[Journals] [Conferences and Workshops] [Invited Talks] [Technical Reports]

Journals

  1. Yuichi Komano and Shoichi Hirose, Re-Keying Scheme Revisited: Security Model and Instantiations, Applied Sciences, vol. 9, no. 5, Mar. 2019, 1002nd (13 pages). doi: 10.3390/app9051002.
  2. Shingo Sato, Shoichi Hirose and Junji Shikata, Sequential Aggregate MACs from Any MACs: Aggregation and Detecting Functionality, Journal of Internet Services and Information Security (JISIS), vol. 9, no. 1, Feb. 2019, pp. 2--23. doi: 10.22667/JISIS.2019.02.28.002.
  3. Shoichi Hirose, The PRF Security of Compression-Function-Based MAC Functions in the Multi-user Setting, IEICE Transactions on Fundamentals, vol. E102-A, no. 1, Jan. 2019, pp. 270--277. doi: 10.1587/transfun.E102.A.270. (pdf, copyright © 2019 IEICE, IEICE Transactions Online)
  4. Shoichi Hirose, Sequential Hashing with Minimum Padding, Cryptography, vol. 2, no. 2, June 2018, 11th (23 pages). doi: 10.3390/cryptography2020011.
  5. Shoichi Hirose, Hidenori Kuwakado and Hirotaka Yoshida, A Pseudorandom-Function Mode Based on Lesamnta-LW and the MDP Domain Extension and Its Applications, IEICE Transactions on Fundamentals, vol. E101-A, no. 1, Jan. 2018, pp. 110--118. doi: 10.1587/transfun.E101.A.110. (pdf, copyright © 2018 IEICE, IEICE Transactions Online)
  6. S. Hirose, Generic Construction of Audit Logging Schemes with Forward Privacy and Authenticity, IPSI BgD Transactions on Internet Research: Special issue on Advances in Cryptology and Information Security, vol. 12, no. 2, Jul. 2016, pp. 1--8. (pdf)
  7. Jiageng Chen, S. Hirose, Hidenori Kuwakado and Atsuko Miyaji, A Collision Attack on a Double-Block-Length Compression Function Instantiated with 8-/9-Round AES-256, IEICE Transactions on Fundamentals, vol. E99-A, no. 1, Jan. 2016, pp. 14--21. pdf, copyright © 2016 IEICE, IEICE Transactions Online)
  8. Hidenori Kuwakado and S. Hirose, Multilane Hashing Mode Suitable for Parallel Processing, IEICE Transactions on Fundamentals, vol. E96-A, no. 12, Dec. 2013, pp. 2434--2442.
  9. Tetsuya Kobayashi and S. Hirose, Collision Attack on Double-Block-Length Compression Function Using Round-Reduced PRESENT, IEICE Transactions on Fundamentals (Japanese Edition), vol. J96-A, no. 8, Aug. 2013, pp. 541--550 (In Japanese).
  10. S. Hirose, Je Hong Park and Aaram Yun, A Simple Variant of the Merkle-Damgård Scheme with a Permutation, Journal of Cryptology, vol. 25, no. 2, 2012, pp. 271-309. doi: 10.1007/s00145-010-9095-5.
  11. S. Hirose, Kota Ideguchi, Hidenori Kuwakado, Toru Owada, Bart Preneel, Hirotaka Yoshida, An AES Based 256-bit Hash Function for Lightweight Applications: Lesamnta-LW, IEICE Transactions on Fundamentals, vol. E95-A, no. 1, Jan. 2012, pp. 89--99. (pdf, copyright © 2012 IEICE, IEICE Transactions Online)
  12. S. Hirose and Hidenori Kuwakado, Collision Resistance of Hash Functions in a Weak Ideal Cipher Model, IEICE Transactions on Fundamentals, vol. E95-A, no. 1, Jan. 2012, pp. 252--255. (pdf, copyright © 2012 IEICE, IEICE Transactions Online)
  13. S. Hirose, A Note on Practical Key Derivation Functions, IEICE Transactions on Fundamentals, vol. E94-A, no. 8, Aug. 2011, pp. 1764--1767. (pdf, copyright © 2011 IEICE, IEICE Transactions Online)
  14. Goichiro Hanaoka, S. Hirose, Atsuko Miyaji, Kunihiko Miyazaki, Bagus Santoso and Peng Yang, Sequential Bitwise Sanitizable Signature Schemes, IEICE Transactions on Fundamentals, vol. E94-A, no. 1, Jan. 2011, pp. 392--404. (pdf, copyright © 2011 IEICE, IEICE Transactions Online)
  15. S. Hirose and Hidenori Kuwakado, Efficient Pseudorandom-Function Modes of a Block-Cipher-Based Hash Function, IEICE Transactions on Fundamentals, vol. E92-A, no. 10, Oct. 2009, pp. 2447--2453. (pdf, copyright © 2009 IEICE, IEICE Transactions Online)
  16. Hidenori Kuwakado and S. Hirose, Differentiability of four prefix-free PGV hash functions, IEICE Electronics Express, vol. 6, no. 13, July 2009, pp. 955--958. (link)
  17. Praveen Gauravaram, S. Hirose and Suganya Annadurai, An Update on the Analysis and Design of NMAC and HMAC Functions, International Journal of Network Security, vol.7, no.1, July 2008, pp. 49--60.
  18. S. Hirose, Collision Resistance of Double-Block-Length Hash Function against Free-Start Attack, IEICE Transactions on Fundamentals, vol. E91-A, no. 1, Jan. 2008, pp. 74--82.(pdf, copyright © 2008 IEICE, IEICE Transactions Online)
  19. S. Hirose, A Security Analysis of Double-Block-Length Hash Functions with the Rate 1, IEICE Transactions on Fundamentals, vol. E89-A, no. 10, Oct. 2006, pp. 2575--2582. (pdf, copyright © 2006 IEICE, 07RB0085, IEICE Transactions Online)
  20. Mitsuhiro Hattori, S. Hirose and Susumu Yoshida, Complexity of Differential Attacks on SHA-0 with Various Message Schedules, IEICE Transactions on Fundamentals, vol. E88-A, no. 12, Dec. 2005, pp. 3668--3671. (pdf, copyright © 2005 IEICE, 06RB0122, IEICE Transactions Online)
  21. S. Hirose, Weak Security Notions of Cryptographic Unkeyed Hash Functions and Their Amplifiability, IEICE Transactions on Fundamentals, vol. E88-A, no. 1, Jan. 2005, pp. 33--38. (pdf, copyright © 2005 IEICE, 06RB0123, IEICE Transactions Online)
  22. S. Hirose, A Note on the Strength of Weak Collision Resistance, IEICE Transactions on Fundamentals, vol. E87-A, no. 5, May 2004, pp. 1092--1097. (pdf, copyright © 2004 IEICE, 06RB0124, IEICE Transactions Online)
  23. S. Hirose and Susumu Yoshida, An Approximate Scheme of Oblivious Transfer with Probabilistic Receipt, IEICE Transactions on Fundamentals, vol. E87-A, no. 1, Jan. 2004, pp. 280--281. (pdf, copyright © 2004 IEICE, 06RB0125, IEICE Transactions Online)
  24. S. Hirose and Kanta Matsuura, Key Agreement Protocols Resistant to a Denial-of-Service Attack, IEICE Trans. on Information and Systems, vol. E84-D, no. 4, Apr. 2001, pp. 477--484. (pdf, copyright © 2001 IEICE, 06RB0126, IEICE Transactions Online)
  25. S. Hirose and Katsuo Ikeda, A Conference Key Distribution System for the Star Configuration Based on the Discrete Logarithm Problem, Information Processing Letters, vol. 62, no. 4, May 1997, pp. 189--192.
  26. S. Hirose and Katsuo Ikeda, Complexity of Boolean Functions Satisfying the Propagation Criterion, IEICE Trans. on Fundamentals, vol. E78-A, no. 4, Apr. 1995, pp. 470--478. (pdf, copyright © 1995 IEICE, 06RB0127, IEICE Transactions Online)
  27. S. Hirose and Katsuo Ikeda, Relationships among Nonlinearity Criteria of Boolean Functions, IEICE Trans. on Fundamentals, vol. E78-A, no. 2, Feb. 1995, pp. 235--243. (pdf, copyright © 1995 IEICE, 06RB0129, IEICE Transactions Online)
  28. S. Hirose and Katsuo Ikeda, Propagation Characteristics of Boolean Functions and Their Balancedness, IEICE Trans. on Fundamentals, vol. E78-A, no. 1, Jan. 1995, pp. 11--18. (pdf, copyright © 1995 IEICE, 06RB0128, IEICE Transactions Online)

Conferences and Workshops

  1. Shoichi Hirose, Hidenori Kuwakado and Hirotaka Yoshida, Authenticated Encryption Based on Lesamnta-LW Hashing Mode, The 22nd International Conference on Information Security and Cryptology (ICISC 2019), Seoul, Dec. 2019, Lecture Notes in Computer Science 11975, pp. 52--69. doi: 10.1007/978-3-030-40921-0_3.
  2. Shingo Sato, Shoichi Hirose and Junji Shikata, Sequential Aggregate MACs with Detecting Functionality Revisited, The 13th International Conference on Network and System Security (NSS 2019), Sapporo, Dec. 2019, Lecture Notes in Computer Science 11928, pp. 387--407. doi: 10.1007/978-3-030-36938-5_23.
  3. Shoichi Hirose and Junji Shikata, Provable Security of the Ma-Tsudik Forward-Secure Sequential Aggregate MAC Scheme, The 6th International Workshop on Information and Communication Security (WICS '19), Nagasaki, Nov. 2019, pp. 327--332. doi: 10.1109/CANDARW.2019.00064.
  4. Shoichi Hirose and Junji Shikata, History-Free Sequential Aggregate MAC Revisited, The 13th International Conference on Provable Security (ProvSec 2019), Cairns, Oct. 2019, Lecture Notes in Computer Science 11821, pp. 77--93. doi: 10.1007/978-3-030-31919-9_5.
  5. Hidenori Kuwakado, Shoichi Hirose and Masahiro Mambo, Parallelizable Message Preprocessing for Merkle-Damgård Hash Functions, 2018 International Symposium on Information Theory and Its Applications (ISITA 2018), Singapore, Oct. 2018, pp. 457--461. doi: 10.23919/ISITA.2018.8664401.
  6. Shingo Sato, Shoichi Hirose and Junji Shikata, Generic Construction of Sequential Aggregate MACs from Any MACs, The 12th International Conference on Provable Security (ProvSec 2018), Jeju, Oct. 2018, Lecture Notes in Computer Science 11192, pp. 295--312. doi: 10.1007/978-3-030-01446-9_17.
  7. Shoichi Hirose and Junji Shikata, Non-adaptive Group-Testing Aggregate MAC Scheme, The 14th International Conference on Information Security Practice and Experience (ISPEC 2018), Tokyo, Sep. 2018, Lecture Notes in Computer Science 11125, pp. 357--372. doi: 10.1007/978-3-319-99807-7_22.
  8. Shoichi Hirose, Yu Sasaki and Kan Yasuda, Rate-One AE with Security Under RUP, The 20th Information Security Conference (ISC 2017), Ho Chi Minh, Nov. 2017, Lecture Notes in Computer Science 10599, pp. 3--20. doi: 10.1007/978-3-319-69659-1_1.
  9. Praveen Gauravaram, Shoichi Hirose and Douglas Stebila, Security Analysis of a Design Variant of Randomized Hashing, The 8th International Conference on Applications and Technologies in Information Security (ATIS 2017), Auckland, Jul. 2017, Communications in Computer and Information Science (CCIS) 719, pp. 14--22. doi: 10.1007/978-981-10-5421-1_2.
  10. Cheikh Thiécoumba Gueye, Jean Belo Klamti and S. Hirose, Generalization of BJMM-ISD Using May-Ozerov Nearest Neighbor Algorithm over an Arbitrary Finite Field \(\mathbb{F}_{q}\), The 2nd International Conference on Codes, Cryptology and Information Security (C2SI2017), Rabat, Apr. 2017, Lecture Notes in Computer Science 10194, pp. 96--109. doi: 10.1007/978-3-319-55589-8_7.
  11. Asraf Akhimullah and S. Hirose, Lightweight Hashing Using Lesamnta-LW Compression Function Mode and MDP Domain Extension, The 3rd International Workshop on Information and Communication Security (WICS '16), Hiroshima, Nov. 2016. doi: 10.1109/CANDAR.2016.0107. (Best Paper Award)
  12. S. Hirose, Hidenori Kuwakado and Hirotaka Yoshida, A Pseudorandom-Function Mode Based on Lesamnta-LW and the MDP Domain Extension and Its Application, NIST Lightweight Cryptography Workshop 2016, Gaithersburg, Oct. 2016.
  13. S. Hirose, Sequential Hashing with Minimum Padding, NIST Lightweight Cryptography Workshop 2016, Gaithersburg, Oct. 2016.
  14. S. Hirose, Yusuke Naito and Takeshi Sugawara, Output Masking of Tweakable Even-Mansour can be Eliminated for Message Authentication Code, The 23rd Workshop on Selected Areas in Cryptography (SAC 2016), St. John's, Aug. 2016.
  15. S. Hirose, May-Ozerov Algorithm for Nearest-Neighbor Problem over \(\mathbb{F}_{q}\) and Its Application to Information Set Decoding, The 9th International Conference on Security for Information Technology and Communications (SECITC 2016), Bucharest, Jun. 2016, Lecture Notes in Computer Science 10006, pp. 115--126. doi: 10.1007/978-3-319-47238-6_8.
  16. S. Hirose and Atsushi Yabumoto, A Tweak for a PRF Mode of a Compression Function and Its Applications, The 9th International Conference on Security for Information Technology and Communications (SECITC 2016), Bucharest, Jun. 2016, Lecture Notes in Computer Science 10006, pp. 103--114. doi: 10.1007/978-3-319-47238-6_7.
  17. S. Hirose, Generic Construction of Audit Logging Schemes with Forward Privacy and Authenticity, The 17th International Conference on Information and Communications Security (ICICS 2015), Beijing, Dec. 2015, Lecture Notes in Computer Science 9543, pp. 125--140.
  18. Jiageng Chen, S. Hirose, Hidenori Kuwakado and Atsuko Miyaji, A Collision Attack on a Double-Block-Length Compression Function Instantiated with Round-Reduced AES-256, The 17th International Conference on Information Security and Cryptology (ICISC 2014), Seoul, Dec. 2014, Lecture Notes in Computer Science 8949, pp. 271--285. doi: 10.1007/978-3-319-15943-0_17.
  19. S. Hirose and Hidenori Kuwakado, A Block-Cipher-Based Hash Function Using an MMO-Type Double-Block Compression Function, The 8th International Conference on Provable Security (ProvSec 2014), Hong Kong, Oct. 2014, Lecture Notes in Computer Science 8782, pp. 71--86. doi: 10.1007/978-3-319-12475-9_6.
  20. S. Hirose and Hidenori Kuwakado, Forward-Secure Sequential Aggregate Message Authentication Revisited, The 8th International Conference on Provable Security (ProvSec 2014), Hong Kong, Oct. 2014, Lecture Notes in Computer Science 8782, pp. 87--102. doi: 10.1007/978-3-319-12475-9_7.
  21. Hidenori Kuwakado and S. Hirose, Hashing Mode Using a Lightweight Blockcipher, The 14th IMA International Conference on Cryptography and Coding, (IMACC 2013), Oxford, Dec. 2013, Lecture Notes in Computer Science 8308, pp. 213--231. doi: 10.1007/978-3-642-45239-0_13.
  22. S. Hirose and Hidenori Kuwakado, Redactable Signature Scheme for Tree-Structured Data Based on Merkle Tree, Proceedings of the 10th International Conference on Security and Cryptography (SECRYPT 2013), Reykjavík, Jul. 2013, pp. 313--320.
  23. S. Hirose, Hidenori Kuwakado and Hirotaka Yoshida, Compression Functions Using a Dedicated Blockcipher for Lightweight Hashing, The 14th International Conference on Information Security and Cryptology (ICISC 2011), Seoul, Dec. 2011, Lecture Notes in Computer Science 7259, pp. 346--364. doi: 10.1007/978-3-642-31912-9_23.
  24. S. Hirose, Kota Ideguchi, Hidenori Kuwakado, Toru Owada, Bart Preneel and Hirotaka Yoshida, A Lightweight 256-bit Hash for Hardware and Low-end Devices: Lesamnta-LW, The 13th International Conference on Information Security and Cryptology (ICISC 2010), Seoul, Dec. 2010, Lecture Notes in Computer Science 6829, pp. 151--168. doi: 10.1007/978-3-642-24209-0_10.
  25. Hidenori Kuwakado and S. Hirose, Pseudorandom-Function Property of the Step-Reduced SHA-2 Compression Function, The 9th International Workshop on Information Security Applications (WISA 2008), Jeju Island, Sep. 2008, Lecture Notes in Computer Science 5379, pp. 174--189. doi: 10.1007/978-3-642-00306-6_13.
  26. S. Hirose, Security Analysis of DRBG Using HMAC in NIST SP 800-90, The 9th International Workshop on Information Security Applications (WISA 2008), Jeju Island, Sep. 2008, Lecture Notes in Computer Science 5379, pp. 278--291. doi: 10.1007/978-3-642-00306-6_21.
  27. S. Hirose and Hidenori Kuwakado, A Scheme to base a Hash Function on a Block Cipher, The 15th Workshop on Selected Areas in Cryptography (SAC 2008), Sackville, Aug. 2008, Lecture Notes in Computer Science 5381, pp. 262--275. doi: 10.1007/978-3-642-04159-4_17.
  28. S. Hirose, Je Hong Park and Aaram Yun, A Simple Variant of the Merkle-Damgård Scheme with a Permutation, ASIACRYPT 2007, Kuching, Dec. 2007, Lecture Notes in Computer Science 4833, pp. 113--129. doi: 10.1007/978-3-540-76900-2_7.
  29. S. Hirose, How to Construct Double-Block-Length Hash Functions, The Second Cryptographic Hash Workshop, Santa Barbara, Aug. 2006, 14 pages. (paper, presentation)
  30. S. Hirose, Some Plausible Constructions of Double-Block-Length Hash Functions, The 13th Fast Software Encryption Workshop (FSE 2006), Graz, Mar. 2006, Lecture Notes in Computer Science 4047, pp. 210--225. doi: 10.1007/11799313_14.
  31. S. Hirose, Provably Secure Double-Block-Length Hash Functions in a Black-Box Model, The 7th International Conference on Information Security and Cryptology (ICISC 2004), Seoul, Dec. 2004, Lecture Notes in Computer Science 3506, pp. 330--342. doi: 10.1007/11496618_24.
  32. Mitsuhiro Hattori, S. Hirose and Susumu Yoshida, Analysis of Double Block Length Hash Functions, 9th IMA International Conference on Cryptography and Coding, Cirencester, Dec. 2003, Lecture Notes in Computer Science 2898, pp. 290--302. doi: 10.1007/978-3-540-40974-8_23.
  33. S. Hirose, Yet Another Definition of Weak Collision Resistance and Its Analysis, The 6th International Conference on Information Security and Cryptology (ICISC 2003), Seoul, Nov. 2003, Lecture Notes in Computer Science 2971, pp. 87--96. doi: 10.1007/978-3-540-24691-6_8.
  34. S. Hirose and Susumu Yoshida, Weak Collision Resistance for Variable Input Length Can Imply Collision Resistance for Fixed Input Length, International Workshop on Coding and Cryptography (WCC 2003), Versailles, Mar. 2003, pp. 253--263.
  35. S. Hirose, Secure Block Ciphers Are Not Sufficient for One-Way Hash Functions in the Preneel-Govaerts-Vandewalle Model, The 9th Workshop on Selected Areas in Cryptography (SAC 2002), St. John's, Aug. 2002, Lecture Notes in Computer Science 2595, pp. 339--352. doi: 10.1007/3-540-36492-7_22.
  36. S. Hirose and Susumu Yoshida, A User Authentication Scheme with Identity and Location Privacy, 6th Australasian Conference on Information Security and Privacy (ACISP'01), Sydney, Jul. 2001, Lecture Notes in Computer Science 2119, pp. 235--246. doi: 10.1007/3-540-47719-5_20.
  37. S. Hirose and Kanta Matsuura, Enhancing the Resistance of a Provably Secure Key Agreement Protocol to a Denial-of-Service Attack, 2nd International Conference on Information and Communication Security (ICICS'99), Sydney, Nov. 1999, Lecture Notes in Computer Science no. 1726, pp. 169--182. doi: 10.1007/978-3-540-47942-0_15.
  38. S. Hirose and Susumu Yoshida, Transformations of a Provably Secure Key Agreement Protocol Improving Its Efficiency, The 3rd International Symposium on Multi-Dimensional Mobile Communications (MDMC'98), Sep. 1998, pp. 262--266.
  39. S. Hirose and Susumu Yoshida, An Authenticated Diffie-Hellman Key Agreement Protocol Secure against Active Attacks, 1998 International Workshop on Practice and Theory in Public Key Cryptography (PKC'98), Yokohama, Feb. 1998, Lecture Notes in Computer Science 1431, pp. 135--148. doi: 10.1007/BFb0054020.

Invited Talks

  1. Shoichi Hirose, A Note on Aggregate MAC Schemes, The 8th Asian Workshop on Symmetric Key Cryptography (ASK 2018), Kolkata, Nov. 2018. (pdf)
  2. Shoichi Hirose, Compression-Function Modes of Operations for Symmetric Cryptography, The 2017 International Symposium for Advanced Computing and Information Technology (ISACIT 2017), Sun Moon Lake, Aug. 2017.
  3. S. Hirose, Sequential Hashing with Minimum Padding, The Sixth Asian Workshop on Symmetric Key Cryptography (ASK 2016), Nagoya, Sep. 2016. (pdf)
  4. S. Hirose, Application-Specific Cryptographic Schemes Based on Symmetric-Key Primitives, The Fourth Asian Workshop on Symmetric Key Cryptography (ASK 2014), Chennai, Dec. 2014. (pdf)
  5. S. Hirose, Security Reductions of Cryptographic Hash Functions, The First Asian Workshop on Symmetric Key Cryptography (ASK 2011), Singapore, Aug. 2011. (pdf)

Technical Reports

  1. Shoichi Hirose and Junji Shikata, Non-adaptive Group-Testing Aggregate MAC Scheme, IACR Cryptology ePrint Archive: Report 2018/448, May 2018.
  2. S. Hirose, Yu Sasaki and Kan Yasuda, Message-Recovery MACs and Verification-Unskippable AE, IACR Cryptology ePrint Archive: Report 2017/260, Mar. 2017.
  3. S. Hirose and Atsushi Yabumoto, A Tweak for a PRF Mode of a Compression Function and Its Applications, IACR Cryptology ePrint Archive: Report 2016/638, Jun. 2016.
  4. S. Hirose, May-Ozerov Algorithm for Nearest-Neighbor Problem over \(\mathbb{F}_{q}\) and Its Application to Information Set Decoding, IACR Cryptology ePrint Archive: Report 2016/237, Mar. 2016.
  5. Yu Sasaki, Yosuke Todo, Kazumaro Aoki, Yusuke Naito, Takeshi Sugawara, Yumiko Murakami, Mitsuru Matsui, and S. Hirose, Minalpher: A Submission to CAESAR (Competition for Authenticated Encryption: Security, Applicability, and Robustness), Mar. 2014. (link)
  6. S. Hirose, Hidenori Kuwakado, Hirotaka Yoshida, SHA-3 Proposal: Lesamnta, A First Round Candidate of NIST Cryptographic Hash Algorithm Competition, Oct. 2008. (link)
  7. Mitsuhiro Hattori, S. Hirose and Susumu Yoshida, Complexity of the Collision and Near-Collision Attack on SHA-0 with Different Message Schedules, Cryptology ePrint Archive: Report 2004/325, Nov. 2004.
  8. S. Hirose and Susumu Yoshida, An authenticated Diffie-Hellman key agreement protocol, A Submission to IEEE P1363a: Standard Specifications for Public-Key Cryptography: Additional Techniques, Nov. 1998.
  9. S. Hirose and Katsuo Ikeda, Unateness, Symmetry and Self-Duality of Boolean Functions Satisfying the Propagation Criterion, KUIS Technical Report, KUIS-95-0009, 1995. (ps, pdf)
  10. S. Hirose and Katsuo Ikeda, Nonlinearity criteria of Boolean functions, KUIS Technical Report, KUIS-94-0002, 1994. (ps, pdf)