default search action
Shoichi Hirose
Person information
- affiliation: University of Fukui, Japan
- affiliation (PhD 1995): Kyoto University, Japan
SPARQL queries
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j30]Shoichi Hirose, Hidenori Kuwakado:
Quantum Collision Resistance of Double-Block-Length Hashing. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 107(9): 1478-1487 (2024) - 2023
- [c42]Shoichi Hirose, Junji Shikata:
Group-Testing Aggregate Entity Authentication. ITW 2023: 227-231 - [c41]Shoichi Hirose, Kazuhiko Minematsu:
Compactly Committing Authenticated Encryption Using Encryptment and Tweakable Block Cipher. SAC 2023: 233-252 - [i9]Shoichi Hirose, Kazuhiko Minematsu:
A Formal Treatment of Envelope Encryption. IACR Cryptol. ePrint Arch. 2023: 1727 (2023) - 2022
- [j29]Shoichi Hirose:
Foreword. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 105-A(3): 142 (2022) - [c40]Shoichi Hirose:
Collision-Resistant and Pseudorandom Hash Function Using Tweakable Block Cipher. WISA 2022: 3-15 - [i8]Shoichi Hirose, Kazuhiko Minematsu:
Compactly Committing Authenticated Encryption Using Encryptment and Tweakable Block Cipher. IACR Cryptol. ePrint Arch. 2022: 1670 (2022) - 2021
- [j28]Shoichi Hirose, Yu Sasaki, Hirotaka Yoshida:
Update on Analysis of Lesamnta-LW and New PRF Mode LRF. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 104-A(9): 1304-1320 (2021) - [j27]Shoichi Hirose, Hidenori Kuwakado, Hirotaka Yoshida:
Provable-Security Analysis of Authenticated Encryption Based on Lesamnta-LW in the Ideal Cipher Model. IEICE Trans. Inf. Syst. 104-D(11): 1894-1901 (2021) - [j26]Kazuki Nakamura, Koji Hori, Shoichi Hirose:
Algebraic Fault Analysis of SHA-256 Compression Function and Its Application. Inf. 12(10): 433 (2021) - [c39]Shoichi Hirose:
Collision-Resistant and Pseudorandom Function Based on Merkle-Damgård Hash Function. ICISC 2021: 325-338 - [c38]Shoichi Hirose, Hidenori Kuwakado:
A Note on Quantum Collision Resistance of Double-Block-Length Compression Functions. IMACC 2021: 161-175 - [i7]Shoichi Hirose:
Another Algebraic Decomposition Method for Masked Implementation. IACR Cryptol. ePrint Arch. 2021: 369 (2021) - [i6]Hidenori Kuwakado, Shoichi Hirose, Masahiro Mambo:
White-Box Encryption Scheme Using a Quantum Memory. IACR Cryptol. ePrint Arch. 2021: 589 (2021) - 2020
- [j25]Shoichi Hirose, Junji Shikata:
Aggregate Message Authentication Code Capable of Non-Adaptive Group-Testing. IEEE Access 8: 216116-216126 (2020) - [c37]Shoichi Hirose, Yu Sasaki, Hirotaka Yoshida:
Lesamnta-LW Revisited: Improved Security Analysis of Primitive and New PRF Mode. ACNS (1) 2020: 89-109 - [c36]Shoichi Hirose:
Compactly Committing Authenticated Encryption Using Tweakable Block Cipher. NSS 2020: 187-206
2010 – 2019
- 2019
- [j24]Shoichi Hirose:
The PRF Security of Compression-Function-Based MAC Functions in the Multi-User Setting. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 102-A(1): 270-277 (2019) - [j23]Shingo Sato, Shoichi Hirose, Junji Shikata:
Sequential Aggregate MACs from Any MACs: Aggregation and Detecting Functionality. J. Internet Serv. Inf. Secur. 9(1): 2-23 (2019) - [c35]Shoichi Hirose, Junji Shikata:
Provable Security of the Ma-Tsudik Forward-Secure Sequential Aggregate MAC Scheme. CANDAR Workshops 2019: 327-332 - [c34]Shoichi Hirose, Hidenori Kuwakado, Hirotaka Yoshida:
Authenticated Encryption Based on Lesamnta-LW Hashing Mode. ICISC 2019: 52-69 - [c33]Shingo Sato, Shoichi Hirose, Junji Shikata:
Sequential Aggregate MACs with Detecting Functionality Revisited. NSS 2019: 387-407 - [c32]Shoichi Hirose, Junji Shikata:
History-Free Sequential Aggregate MAC Revisited. ProvSec 2019: 77-93 - 2018
- [j22]Shoichi Hirose:
Sequential Hashing with Minimum Padding. Cryptogr. 2(2): 11 (2018) - [j21]Shoichi Hirose, Hidenori Kuwakado, Hirotaka Yoshida:
A Pseudorandom-Function Mode Based on Lesamnta-LW and the MDP Domain Extension and Its Applications. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 101-A(1): 110-118 (2018) - [c31]Hidenori Kuwakado, Shoichi Hirose, Masahiro Mambo:
Parallelizable Message Preprocessing for Merkle-Damgård Hash Functions. ISITA 2018: 457-461 - [c30]Shoichi Hirose, Junji Shikata:
Non-adaptive Group-Testing Aggregate MAC Scheme. ISPEC 2018: 357-372 - [c29]Shingo Sato, Shoichi Hirose, Junji Shikata:
Generic Construction of Sequential Aggregate MACs from Any MACs. ProvSec 2018: 295-312 - [i5]Shoichi Hirose, Junji Shikata:
Non-adaptive Group-Testing Aggregate MAC Scheme. IACR Cryptol. ePrint Arch. 2018: 448 (2018) - 2017
- [c28]Praveen Gauravaram, Shoichi Hirose, Douglas Stebila:
Security Analysis of a Design Variant of Randomized Hashing. ATIS 2017: 14-22 - [c27]Cheikh Thiécoumba Gueye, Jean Belo Klamti, Shoichi Hirose:
Generalization of BJMM-ISD Using May-Ozerov Nearest Neighbor Algorithm over an Arbitrary Finite Field \mathbb F_q. C2SI 2017: 96-109 - [c26]Shoichi Hirose, Yu Sasaki, Kan Yasuda:
Rate-One AE with Security Under RUP. ISC 2017: 3-20 - [i4]Shoichi Hirose, Yu Sasaki, Kan Yasuda:
Message-Recovery MACs and Verification-Unskippable AE. IACR Cryptol. ePrint Arch. 2017: 260 (2017) - 2016
- [j20]Jiageng Chen, Shoichi Hirose, Hidenori Kuwakado, Atsuko Miyaji:
A Collision Attack on a Double-Block-Length Compression Function Instantiated with 8-/9-Round AES-256. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 99-A(1): 14-21 (2016) - [c25]Asraf Akhimullah, Shoichi Hirose:
Lightweight Hashing Using Lesamnta-LW Compression Function Mode and MDP Domain Extension. CANDAR 2016: 590-596 - [c24]Shoichi Hirose, Yusuke Naito, Takeshi Sugawara:
Output Masking of Tweakable Even-Mansour Can Be Eliminated for Message Authentication Code. SAC 2016: 341-359 - [c23]Shoichi Hirose, Atsushi Yabumoto:
A Tweak for a PRF Mode of a Compression Function and Its Applications. SECITC 2016: 103-114 - [c22]Shoichi Hirose:
May-Ozerov Algorithm for Nearest-Neighbor Problem over 𝔽q and Its Application to Information Set Decoding. SECITC 2016: 115-126 - [i3]Shoichi Hirose:
May-Ozerov Algorithm for Nearest-Neighbor Problem over 𝔽q and Its Application to Information Set Decoding. IACR Cryptol. ePrint Arch. 2016: 237 (2016) - [i2]Shoichi Hirose, Atsushi Yabumoto:
A Tweak for a PRF Mode of a Compression Function and Its Applications. IACR Cryptol. ePrint Arch. 2016: 638 (2016) - 2015
- [c21]Shoichi Hirose:
Generic Construction of Audit Logging Schemes with Forward Privacy and Authenticity. ICICS 2015: 125-140 - 2014
- [c20]Jiageng Chen, Shoichi Hirose, Hidenori Kuwakado, Atsuko Miyaji:
A Collision Attack on a Double-Block-Length Compression Function Instantiated with Round-Reduced AES-256. ICISC 2014: 271-285 - [c19]Shoichi Hirose, Hidenori Kuwakado:
A Block-Cipher-Based Hash Function Using an MMO-Type Double-Block Compression Function. ProvSec 2014: 71-86 - [c18]Shoichi Hirose, Hidenori Kuwakado:
Forward-Secure Sequential Aggregate Message Authentication Revisited. ProvSec 2014: 87-102 - 2013
- [j19]Hidenori Kuwakado, Shoichi Hirose:
Multilane Hashing Mode Suitable for Parallel Processing. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 96-A(12): 2434-2442 (2013) - [c17]Hidenori Kuwakado, Shoichi Hirose:
Hashing Mode Using a Lightweight Blockcipher. IMACC 2013: 213-231 - [c16]Shoichi Hirose, Hidenori Kuwakado:
Redactable Signature Scheme for Tree-structured Data based on Merkle Tree. SECRYPT 2013: 313-320 - 2012
- [j18]Shoichi Hirose, Kota Ideguchi, Hidenori Kuwakado, Toru Owada, Bart Preneel, Hirotaka Yoshida:
An AES Based 256-bit Hash Function for Lightweight Applications: Lesamnta-LW. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 95-A(1): 89-99 (2012) - [j17]Shoichi Hirose, Hidenori Kuwakado:
Collision Resistance of Hash Functions in a Weak Ideal Cipher Model. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 95-A(1): 252-255 (2012) - [j16]Shoichi Hirose, Je Hong Park, Aaram Yun:
A Simple Variant of the Merkle-Damgård Scheme with a Permutation. J. Cryptol. 25(2): 271-309 (2012) - 2011
- [j15]Goichiro Hanaoka, Shoichi Hirose, Atsuko Miyaji, Kunihiko Miyazaki, Bagus Santoso, Peng Yang:
Sequential Bitwise Sanitizable Signature Schemes. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 94-A(1): 392-404 (2011) - [j14]Shoichi Hirose:
A Note on Practical Key Derivation Functions. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 94-A(8): 1764-1767 (2011) - [c15]Shoichi Hirose, Hidenori Kuwakado, Hirotaka Yoshida:
Compression Functions Using a Dedicated Blockcipher for Lightweight Hashing. ICISC 2011: 346-364 - 2010
- [c14]Shoichi Hirose, Kota Ideguchi, Hidenori Kuwakado, Toru Owada, Bart Preneel, Hirotaka Yoshida:
A Lightweight 256-Bit Hash Function for Hardware and Low-End Devices: Lesamnta-LW. ICISC 2010: 151-168
2000 – 2009
- 2009
- [j13]Hidenori Kuwakado, Shoichi Hirose:
Differentiability of four prefix-free PGV hash functions. IEICE Electron. Express 6(13): 955-958 (2009) - [j12]Shoichi Hirose, Hidenori Kuwakado:
Efficient Pseudorandom-Function Modes of a Block-Cipher-Based Hash Function. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 92-A(10): 2447-2453 (2009) - 2008
- [j11]Shoichi Hirose:
Collision Resistance of Double-Block-Length Hash Function against Free-Start Attack. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 91-A(1): 74-82 (2008) - [j10]Praveen Gauravaram, Shoichi Hirose, Suganya Annadurai:
An Update on the Analysis and Design of NMAC and HMAC Functions. Int. J. Netw. Secur. 7(1): 49-60 (2008) - [c13]Shoichi Hirose, Hidenori Kuwakado:
A Scheme to Base a Hash Function on a Block Cipher. Selected Areas in Cryptography 2008: 262-275 - [c12]Hidenori Kuwakado, Shoichi Hirose:
Pseudorandom-Function Property of the Step-Reduced Compression Functions of SHA-256 and SHA-512. WISA 2008: 174-189 - [c11]Shoichi Hirose:
Security Analysis of DRBG Using HMAC in NIST SP 800-90. WISA 2008: 278-291 - 2007
- [c10]Shoichi Hirose, Je Hong Park, Aaram Yun:
A Simple Variant of the Merkle-Damgård Scheme with a Permutation. ASIACRYPT 2007: 113-129 - 2006
- [j9]Shoichi Hirose:
A Security Analysis of Double-Block-Length Hash Functions with the Rate 1. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 89-A(10): 2575-2582 (2006) - [c9]Shoichi Hirose:
Some Plausible Constructions of Double-Block-Length Hash Functions. FSE 2006: 210-225 - 2005
- [j8]Shoichi Hirose:
Weak Security Notions of Cryptographic Unkeyed Hash Functions and Their Amplifiability. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 88-A(1): 33-38 (2005) - [j7]Kazuto Yano, Shoichi Hirose, Susumu Yoshida:
Cancellation Moderating Factor Control for DS-CDMA Non-linear Interference Canceller with Antenna Diversity Reception. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 88-A(7): 1921-1930 (2005) - [j6]Mitsuhiro Hattori, Shoichi Hirose, Susumu Yoshida:
Complexity of Differential Attacks on SHA-0 with Various Message Schedules. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 88-A(12): 3668-3671 (2005) - 2004
- [j5]Shoichi Hirose, Susumu Yoshida:
An Approximate Scheme of Oblivious Transfer with Probabilistic Receipt. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 87-A(1): 280-281 (2004) - [c8]Shoichi Hirose:
Provably Secure Double-Block-Length Hash Functions in a Black-Box Model. ICISC 2004: 330-342 - [i1]Mitsuhiro Hattori, Shoichi Hirose, Susumu Yoshida:
Complexity of the Collision and Near-Collision Attack on SHA-0 with Different Message Schedules. IACR Cryptol. ePrint Arch. 2004: 325 (2004) - 2003
- [j4]Kazuto Yano, Shoichi Hirose, Susumu Yoshida:
Multistage Interference Canceller Combined with Adaptive Array Antenna for DS-CDMA System. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 86-A(7): 1603-1610 (2003) - [c7]Shoichi Hirose:
Yet Another Definition of Weak Collision Resistance and Its Analysis. ICISC 2003: 87-96 - [c6]Mitsuhiro Hattori, Shoichi Hirose, Susumu Yoshida:
Analysis of Double Block Length Hash Functions. IMACC 2003: 290-302 - 2002
- [c5]Shoichi Hirose:
Secure Block Ciphers Are Not Sufficient for One-Way Hash Functions in the Preneel-Govaerts-Vandewalle Model. Selected Areas in Cryptography 2002: 339-352 - 2001
- [c4]Shoichi Hirose, Susumu Yoshida:
A User Authentication Scheme with Identity and Location Privacy. ACISP 2001: 235-246 - [c3]Hiroyuki Oka, Kazuto Yano, Shoichi Hirose, Susumu Yoshida:
New integration scheme of adaptive array antenna and MAI canceller for DS-CDMA. VTC Fall 2001: 2447-2451
1990 – 1999
- 1999
- [c2]Shoichi Hirose, Kanta Matsuura:
Enhancing the Resistence of a Provably Secure Key Agreement Protocol to a Denial-of-Service Attack. ICICS 1999: 169-182 - 1998
- [c1]Shoichi Hirose, Susumu Yoshida:
An Authenticated Diffie-Hellman Key Agreement Protocol Secure Against Active Attacks. Public Key Cryptography 1998: 135-148 - 1997
- [j3]Shoichi Hirose, Katsuo Ikeda:
A Conference Key Distribution System for the Star Configuration Based on the Discrete Logarithm Problem. Inf. Process. Lett. 62(4): 189-192 (1997) - 1995
- [j2]Toshikazu Nishimura, Shoichi Hirose, Michihiko Minoh, Katsuo Ikeda:
Tracking the context in man-machine communication. Syst. Comput. Jpn. 26(11): 52-62 (1995) - 1994
- [j1]Shoichi Hirose, Shuzo Yajima:
Circuit complexity of slice functions and homogeneous functions. Syst. Comput. Jpn. 25(6): 23-31 (1994)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 21:18 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint