[Journals] [Conferences and Workshops] [Invited Talks] [Technical Reports] [Miscellaneous]

Journals

  1. Jiageng Chen, S. Hirose, Hidenori Kuwakado and Atsuko Miyaji, A Collision Attack on a Double-Block-Length Compression Function Instantiated with 8-/9-Round AES-256, IEICE Transactions on Fundamentals, vol. E99-A, no. 1, Jan. 2016, pp. 14--21. pdf, copyright © 2016 IEICE, IEICE Transactions Online)
  2. Hidenori Kuwakado and S. Hirose, Multilane Hashing Mode Suitable for Parallel Processing, IEICE Transactions on Fundamentals, vol. E96-A, no. 12, Dec. 2013, pp. 2434--2442.
  3. Tetsuya Kobayashi and S. Hirose, Collision Attack on Double-Block-Length Compression Function Using Round-Reduced PRESENT, IEICE Transactions on Fundamentals (Japanese Edition), vol. J96-A, no. 8, Aug. 2013, pp. 541--550 (In Japanese).
  4. S. Hirose, Je Hong Park and Aaram Yun, A Simple Variant of the Merkle-Damgård Scheme with a Permutation, Journal of Cryptology, vol. 25, no. 2, 2012, pp. 271-309. doi: 10.1007/s00145-010-9095-5.
  5. S. Hirose, Kota Ideguchi, Hidenori Kuwakado, Toru Owada, Bart Preneel, Hirotaka Yoshida, An AES Based 256-bit Hash Function for Lightweight Applications: Lesamnta-LW, IEICE Transactions on Fundamentals, vol. E95-A, no. 1, Jan. 2012, pp. 89--99. (pdf, copyright © 2012 IEICE, IEICE Transactions Online)
  6. S. Hirose and Hidenori Kuwakado, Collision Resistance of Hash Functions in a Weak Ideal Cipher Model, IEICE Transactions on Fundamentals, vol. E95-A, no. 1, Jan. 2012, pp. 252--255. (pdf, copyright © 2012 IEICE, IEICE Transactions Online)
  7. S. Hirose, A Note on Practical Key Derivation Functions, IEICE Transactions on Fundamentals, vol. E94-A, no. 8, Aug. 2011, pp. 1764--1767. (pdf, copyright © 2011 IEICE, IEICE Transactions Online)
  8. Goichiro Hanaoka, S. Hirose, Atsuko Miyaji, Kunihiko Miyazaki, Bagus Santoso and Peng Yang, Sequential Bitwise Sanitizable Signature Schemes, IEICE Transactions on Fundamentals, vol. E94-A, no. 1, Jan. 2011, pp. 392--404. (pdf, copyright © 2011 IEICE, IEICE Transactions Online)
  9. S. Hirose and Hidenori Kuwakado, Efficient Pseudorandom-Function Modes of a Block-Cipher-Based Hash Function, IEICE Transactions on Fundamentals, vol. E92-A, no. 10, Oct. 2009, pp. 2447--2453. (pdf, copyright © 2009 IEICE, IEICE Transactions Online)
  10. Hidenori Kuwakado and S. Hirose, Differentiability of four prefix-free PGV hash functions, IEICE Electronics Express, vol. 6, no. 13, July 2009, pp. 955--958. (link)
  11. Praveen Gauravaram, S. Hirose and Suganya Annadurai, An Update on the Analysis and Design of NMAC and HMAC Functions, International Journal of Network Security, vol.7, no.1, July 2008, pp. 49--60.
  12. S. Hirose, Collision Resistance of Double-Block-Length Hash Function against Free-Start Attack, IEICE Transactions on Fundamentals, vol. E91-A, no. 1, Jan. 2008, pp. 74--82.(pdf, copyright © 2008 IEICE, IEICE Transactions Online)
  13. S. Hirose, A Security Analysis of Double-Block-Length Hash Functions with the Rate 1, IEICE Transactions on Fundamentals, vol. E89-A, no. 10, Oct. 2006, pp. 2575--2582. (pdf, copyright © 2006 IEICE, 07RB0085, IEICE Transactions Online)
  14. Mitsuhiro Hattori, S. Hirose and Susumu Yoshida, Complexity of Differential Attacks on SHA-0 with Various Message Schedules, IEICE Transactions on Fundamentals, vol. E88-A, no. 12, Dec. 2005, pp. 3668--3671. (pdf, copyright © 2005 IEICE, 06RB0122, IEICE Transactions Online)
  15. S. Hirose, Weak Security Notions of Cryptographic Unkeyed Hash Functions and Their Amplifiability, IEICE Transactions on Fundamentals, vol. E88-A, no. 1, Jan. 2005, pp. 33--38. (pdf, copyright © 2005 IEICE, 06RB0123, IEICE Transactions Online)
  16. S. Hirose, A Note on the Strength of Weak Collision Resistance, IEICE Transactions on Fundamentals, vol. E87-A, no. 5, May 2004, pp. 1092--1097. (pdf, copyright © 2004 IEICE, 06RB0124, IEICE Transactions Online)
  17. S. Hirose and Susumu Yoshida, An Approximate Scheme of Oblivious Transfer with Probabilistic Receipt, IEICE Transactions on Fundamentals, vol. E87-A, no. 1, Jan. 2004, pp. 280--281. (pdf, copyright © 2004 IEICE, 06RB0125, IEICE Transactions Online)
  18. S. Hirose and Kanta Matsuura, Key Agreement Protocols Resistant to a Denial-of-Service Attack, IEICE Trans. on Information and Systems, vol. E84-D, no. 4, Apr. 2001, pp. 477--484. (pdf, copyright © 2001 IEICE, 06RB0126, IEICE Transactions Online)
  19. S. Hirose and Katsuo Ikeda, A Conference Key Distribution System for the Star Configuration Based on the Discrete Logarithm Problem, Information Processing Letters, vol. 62, no. 4, May 1997, pp. 189--192.
  20. S. Hirose and Katsuo Ikeda, Complexity of Boolean Functions Satisfying the Propagation Criterion, IEICE Trans. on Fundamentals, vol. E78-A, no. 4, Apr. 1995, pp. 470--478. (pdf, copyright © 1995 IEICE, 06RB0127, IEICE Transactions Online)
  21. S. Hirose and Katsuo Ikeda, Relationships among Nonlinearity Criteria of Boolean Functions, IEICE Trans. on Fundamentals, vol. E78-A, no. 2, Feb. 1995, pp. 235--243. (pdf, copyright © 1995 IEICE, 06RB0129, IEICE Transactions Online)
  22. S. Hirose and Katsuo Ikeda, Propagation Characteristics of Boolean Functions and Their Balancedness, IEICE Trans. on Fundamentals, vol. E78-A, no. 1, Jan. 1995, pp. 11--18. (pdf, copyright © 1995 IEICE, 06RB0128, IEICE Transactions Online)

Conferences and Workshops

  1. S. Hirose, Generic Construction of Audit Logging Schemes with Forward Privacy and Authenticity, The 17th International Conference on Information and Communications Security (ICICS 2015), 2015.
  2. Jiageng Chen, S. Hirose, Hidenori Kuwakado and Atsuko Miyaji, A Collision Attack on a Double-Block-Length Compression Function Instantiated with Round-Reduced AES-256, The 17th International Conference on Information Security and Cryptology (ICISC 2014), Seoul, Dec. 2014, Lecture Notes in Computer Science 8949, pp. 271--285. doi: 10.1007/978-3-319-15943-0_17.
  3. S. Hirose and Hidenori Kuwakado, A Block-Cipher-Based Hash Function Using an MMO-Type Double-Block Compression Function, The 8th International Conference on Provable Security (ProvSec 2014), Hong Kong, Oct. 2014, Lecture Notes in Computer Science 8782, pp. 71--86. doi: 10.1007/978-3-319-12475-9_6.
  4. S. Hirose and Hidenori Kuwakado, Forward-Secure Sequential Aggregate Message Authentication Revisited, The 8th International Conference on Provable Security (ProvSec 2014), Hong Kong, Oct. 2014, Lecture Notes in Computer Science 8782, pp. 87--102. doi: 10.1007/978-3-319-12475-9_7.
  5. Hidenori Kuwakado and S. Hirose, Hashing Mode Using a Lightweight Blockcipher, The 14th IMA International Conference on Cryptography and Coding, (IMACC 2013), Oxford, Dec. 2013, Lecture Notes in Computer Science 8308, pp. 213--231. doi: 10.1007/978-3-642-45239-0_13.
  6. S. Hirose and Hidenori Kuwakado, Redactable Signature Scheme for Tree-Structured Data Based on Merkle Tree, Proceedings of the 10th International Conference on Security and Cryptography (SECRYPT 2013), Reykjavík, Jul. 2013, pp. 313--320.
  7. S. Hirose, Hidenori Kuwakado and Hirotaka Yoshida, Compression Functions Using a Dedicated Blockcipher for Lightweight Hashing, The 14th International Conference on Information Security and Cryptology (ICISC 2011), Seoul, Dec. 2011, Lecture Notes in Computer Science 7259, pp. 346--364. doi: 10.1007/978-3-642-31912-9_23.
  8. S. Hirose, Kota Ideguchi, Hidenori Kuwakado, Toru Owada, Bart Preneel and Hirotaka Yoshida, A Lightweight 256-bit Hash for Hardware and Low-end Devices: Lesamnta-LW, The 13th International Conference on Information Security and Cryptology (ICISC 2010), Seoul, Dec. 2010, Lecture Notes in Computer Science 6829, pp. 151--168. doi: 10.1007/978-3-642-24209-0_10.
  9. Hidenori Kuwakado and S. Hirose, Pseudorandom-Function Property of the Step-Reduced SHA-2 Compression Function, The 9th International Workshop on Information Security Applications (WISA 2008), Jeju Island, Sep. 2008, Lecture Notes in Computer Science 5379, pp. 174--189. doi: 10.1007/978-3-642-00306-6_13.
  10. S. Hirose, Security Analysis of DRBG Using HMAC in NIST SP 800-90, The 9th International Workshop on Information Security Applications (WISA 2008), Jeju Island, Sep. 2008, Lecture Notes in Computer Science 5379, pp. 278--291. doi: 10.1007/978-3-642-00306-6_21.
  11. S. Hirose and Hidenori Kuwakado, A Scheme to base a Hash Function on a Block Cipher, The 15th Workshop on Selected Areas in Cryptography (SAC 2008), Sackville, Aug. 2008, Lecture Notes in Computer Science 5381, pp. 262--275. doi: 10.1007/978-3-642-04159-4_17.
  12. S. Hirose, Je Hong Park and Aaram Yun, A Simple Variant of the Merkle-Damgård Scheme with a Permutation, ASIACRYPT 2007, Kuching, Dec. 2007, Lecture Notes in Computer Science 4833, pp. 113--129. doi: 10.1007/978-3-540-76900-2_7.
  13. S. Hirose, How to Construct Double-Block-Length Hash Functions, The Second Cryptographic Hash Workshop, Santa Barbara, Aug. 2006, 14 pages. (paper, presentation)
  14. S. Hirose, Some Plausible Constructions of Double-Block-Length Hash Functions, The 13th Fast Software Encryption Workshop (FSE 2006), Graz, Mar. 2006, Lecture Notes in Computer Science 4047, pp. 210--225. doi: 10.1007/11799313_14.
  15. S. Hirose, Provably Secure Double-Block-Length Hash Functions in a Black-Box Model, The 7th International Conference on Information Security and Cryptology (ICISC 2004), Seoul, Dec. 2004, Lecture Notes in Computer Science 3506, pp. 330--342. doi: 10.1007/11496618_24.
  16. Mitsuhiro Hattori, S. Hirose and Susumu Yoshida, Analysis of Double Block Length Hash Functions, 9th IMA International Conference on Cryptography and Coding, Cirencester, Dec. 2003, Lecture Notes in Computer Science 2898, pp. 290--302. doi: 10.1007/978-3-540-40974-8_23.
  17. S. Hirose, Yet Another Definition of Weak Collision Resistance and Its Analysis, The 6th International Conference on Information Security and Cryptology (ICISC 2003), Seoul, Nov. 2003, Lecture Notes in Computer Science 2971, pp. 87--96. doi: 10.1007/978-3-540-24691-6_8.
  18. S. Hirose and Susumu Yoshida, Weak Collision Resistance for Variable Input Length Can Imply Collision Resistance for Fixed Input Length, International Workshop on Coding and Cryptography (WCC 2003), Versailles, Mar. 2003, pp. 253--263.
  19. S. Hirose, Secure Block Ciphers Are Not Sufficient for One-Way Hash Functions in the Preneel-Govaerts-Vandewalle Model, The 9th Workshop on Selected Areas in Cryptography (SAC 2002), St. John's, Aug. 2002, Lecture Notes in Computer Science 2595, pp. 339--352. doi: 10.1007/3-540-36492-7_22.
  20. S. Hirose and Susumu Yoshida, A User Authentication Scheme with Identity and Location Privacy, 6th Australasian Conference on Information Security and Privacy (ACISP'01), Sydney, Jul. 2001, Lecture Notes in Computer Science 2119, pp. 235--246. doi: 10.1007/3-540-47719-5_20.
  21. S. Hirose and Kanta Matsuura, Enhancing the Resistance of a Provably Secure Key Agreement Protocol to a Denial-of-Service Attack, 2nd International Conference on Information and Communication Security (ICICS'99), Sydney, Nov. 1999, Lecture Notes in Computer Science no. 1726, pp. 169--182. doi: 10.1007/978-3-540-47942-0_15.
  22. S. Hirose and Susumu Yoshida, Transformations of a Provably Secure Key Agreement Protocol Improving Its Efficiency, The 3rd International Symposium on Multi-Dimensional Mobile Communications (MDMC'98), Sep. 1998, pp. 262--266.
  23. S. Hirose and Susumu Yoshida, An Authenticated Diffie-Hellman Key Agreement Protocol Secure against Active Attacks, 1998 International Workshop on Practice and Theory in Public Key Cryptography (PKC'98), Yokohama, Feb. 1998, Lecture Notes in Computer Science 1431, pp. 135--148. doi: 10.1007/BFb0054020.

Invited Talks

  1. S. Hirose, Application-Specific Cryptographic Schemes Based on Symmetric-Key Primitives, The Fourth Asian Workshop on Symmetric Key Cryptography (ASK 2014), Chennai, Dec. 2014. (pdf)
  2. S. Hirose, Security Reductions of Cryptographic Hash Functions, The First Asian Workshop on Symmetric Key Cryptography (ASK 2011), Singapore, Aug. 2011. (pdf)

Technical Reports

  1. Mitsuhiro Hattori, S. Hirose and Susumu Yoshida, Complexity of the Collision and Near-Collision Attack on SHA-0 with Different Message Schedules, Cryptology ePrint Archive: Report 2004/325, Nov. 2004.
  2. S. Hirose and K. Ikeda, Unateness, Symmetry and Self-Duality of Boolean Functions Satisfying the Propagation Criterion, KUIS Technical Report, KUIS-95-0009, 1995. (ps, pdf)
  3. S. Hirose and K. Ikeda, Nonlinearity criteria of Boolean functions, KUIS Technical Report, KUIS-94-0002, 1994. (ps, pdf)

Miscellaneous

  1. S. Hirose and S. Yoshida, An authenticated Diffie-Hellman key agreement protocol, A Submission to IEEE P1363a: Standard Specifications for Public-Key Cryptography: Additional Techniques, Nov. 1998.