サイト内の現在位置

NECの研究者

2024年12月3日

峯松 一彦 (Kazuhiko Minematsu)

峯松 一彦の写真

主席研究員
博士(理学)
ブロック暗号モードによる暗号化と認証に関する研究, 2008年. 早稲田大学理工学術院

研究分野

  • 共通鍵暗号の理論と応用

論文

査読付き国際学会

  • Shoichi Hirose and Kazuhiko Minematsu:
    A Formal treatment of envelope encryption. ICISC 2024.
  • Akiko Inoue, Ashwin Jha, Bart Mennink, Kazuhiko Minematsu:
    Generic Security of GCM-SST. ACNS 2025 (to appear)
  • Rei Ueno, Hiromichi Haneda, Naofumi Homma, Akiko Inoue, Kazuhiko Minematsu:
    Crystalor: Recoverable Memory Encryption Mechanism with Optimized Metadata Structure. ACM CCS 2024.
  • Zhenzhen Bao, Seongha Hwang, Akiko Inoue, ByeongHak Lee, Jooyoung Lee, Kazuhiko Minematsu:
    XOCB: Beyond-Birthday-Bound Secure Authenticated Encryption Mode with Rate-One Computation. EUROCRYPT (4) 2023: 532-561
  • Isamu Furuya, Hayato Kasahara, Akiko Inoue, Kazuhiko Minematsu, Tetsu Iwata:
    PMACrx: A Vector-Input MAC for High-Dimensional Vectors with BBB Security. IWSEC 2023: 77-97
  • Shoichi Hirose, Kazuhiko Minematsu:
    Compactly Committing Authenticated Encryption Using Encryptment and Tweakable Block Cipher. SAC 2023: 233-252
  • Daichi Aoki, Kazuhiko Minematsu, Toshihiko Okamura, Tsuyoshi Takagi:
    Efficient Word Size Modular Multiplication over Signed Integers.
    29th IEEE Symposium on Computer Arithmetic, ARITH 2022.
  • Akiko Inoue, Tetsu Iwata, Kazuhiko Minematsu:
    Analyzing the Provable Security Bounds of GIFT-COFB and Photon-Beetle. ACNS 2022: 67-84
  • Kazuhiko Minematsu:
    Property-Preserving Hash Functions and Combinatorial Group Testing. ITC 2022: 2:1-2:14
  • Alexandre Adomnicai, Kazuhiko Minematsu, Maki Shigeri:
    Fast Skinny-128 SIMD Implementations for Sequential Modes of Operation. ACISP 2022.
  • Takanori Isobe, Ryoma Ito, Kazuhiko Minematsu:
    Security Analysis of SFrame. ESORICS (2) 2021: 127-146
  • Kazuhiko Minematsu, Akiko Inoue, Katsuya Moriwaki, Maki Shigeri, Hiroyasu Kubo:
    Parallel Verification of Serial MAC and AE Modes. SAC 2021: 200-219
  • Rintaro Fujita, Takanori Isobe, Kazuhiko Minematsu:
    ACE in Chains: How Risky Is CBC Encryption of Binary Executable Files? ACNS (1) 2020: 187-207
  • Maya Oda, Rei Ueno, Akiko Inoue, Kazuhiko Minematsu, Naofumi Homma:
    PMAC++: Incremental MAC Scheme Adaptable to Lightweight Block Ciphers. ISCAS 2020: 1-4
  • Subhadeep Banik, Zhenzhen Bao, Takanori Isobe, Hiroyasu Kubo, Fukang Liu, Kazuhiko Minematsu, Kosei Sakamoto, Nao Shibata, Maki Shigeri:
    WARP : Revisiting GFN for Lightweight 128-Bit Block Cipher. SAC 2020: 535-564
  • Zhenzhen Bao, Jian Guo, Tetsu Iwata, Kazuhiko Minematsu:
    ZOCB and ZOTR: Tweakable Blockcipher Modes for Authenticated Encryption with Full Absorption.
    IACR Transactions on Symmetric Cryptology 2019(2): 1-54 (2019)
  • Akiko Inoue, Tetsu Iwata, Kazuhiko Minematsu, Bertram Poettering:
    Cryptanalysis of OCB2: Attacks on Authenticity and Confidentiality. CRYPTO (1) 2019: 3-31 (BEST PAPER AWARD)
  • Kazuhiko Minematsu, Norifumi Kamiya:
    Symmetric-Key Corruption Detection: When XOR-MACs Meet Combinatorial Group Testing.
    ESORICS (1) 2019: 595-615
  • Rei Ueno, Naofumi Homma, Tomonori Iida, Kazuhiko Minematsu:
    High Throughput/Gate FN-Based Hardware Architectures for AES-OTR. ISCAS 2019: 1-4
  • Kosei Sakamoto, Kazuhiko Minematsu, Nao Shibata, Maki Shigeri, Hiroyasu Kubo, Yuki Funabiki, Andrey Bogdanov, Sumio Morioka, Takanori Isobe:
    Tweakable TWINE: Building a Tweakable Block Cipher on Generalized Feistel Structure. IWSEC 2019: 129-145
  • Akiko Inoue and Kazuhiko Minematsu : Parallelizable Authenticated Encryption with Small State Size.
    SAC 2019
  • Kazuhiko Minematsu : A Lightweight Alternative to PMAC. SAC 2019
  • Takanori Isobe and Kazuhiko Minematsu : Plaintext Recovery Attacks against XTS Beyond Collisions.
    SAC 2019
  • Takanori Isobe, Kazuhiko Minematsu:
    Breaking Message Integrity of an End-to-End Encryption Scheme of LINE. ESORICS (2) 2018: 249-268
  • Kazuhiko Minematsu, Kentarou Sasaki, Yuki Tanaka:
    Count-then-Permute: A Precision-Free Alternative to Inversion Sampling. CT-RSA 2018: 264-278
  • Kazuhiko Minematsu, Tetsu Iwata:
    Cryptanalysis of PMACx, PMAC2x, and SIVx. IACR Transaction on Symmetric Cryptology 2018
  • Ashwin Jha, Sweta Mishra, Eik List, Kazuhiko Minematsu, and Mridul Nandi.
    XHX -- A Framework for Optimally Secure Tweakable Block Ciphers
    from Classical Block Ciphers and Universal Hashing. LATINCRYPT 2017
  • Tetsu Iwata, Kazuhiko Minematsu, Thomas Peyrin, Yannick Seurin:
    ZMAC: A Fast Tweakable Block Cipher Mode for Highly Secure Message Authentication. CRYPTO 2017
  • Avik Chakraborti, Tetsu Iwata, Kazuhiko Minematsu, Mridul Nandi:
    Blockcipher-Based Authenticated Encryption: How Small Can We Go? CHES 2017: 277-298
  • Tetsu Iwata, Kazuhiko Minematsu:
    Stronger Security Variants of GCM-SIV. IACR Transaction on Symmetric Cryptology 2017
  • Kazuya Imamura, Kazuhiko Minematsu, Tetsu Iwata:
    Integrity Analysis of Authenticated Encryption Based on Stream Ciphers. ProvSec 2016: 257-276
    (BEST STUDENT PAPER AWARD)
  • Kazuhiko Minematsu:
    Authenticated Encryption with Small Stretch (or, How to Accelerate AERO). ACISP 2016: 347-362
  • Subhadeep Banik, Andrey Bogdanov, Kazuhiko Minematsu:
    Low-area hardware implementations of CLOC, SILC and AES-OTR. HOST 2016: 71-74
  • Kazuhiko Minematsu:
    Efficient Message Authentication Codes with Combinatorial Group Testing. ESORICS 2015: 185-202
  • Kazuhiko Minematsu, Tetsu Iwata:
    Tweak-Length Extension for Tweakable Blockciphers. IMA Int. Conf. 2015: 77-93
  • Yuichi Niwa, Keisuke Ohashi, Kazuhiko Minematsu, Tetsu Iwata:
    GCM Security Bounds Reconsidered. FSE 2015: 385-407
    (BEST PAPER AWARD)
  • Noritaka Yamashita, Kazuhiko Minematsu, Toshihiko Okamura, Yukiyasu Tsunoo:
    A smaller and faster variant of RSM. DATE 2014: 1-6
  • Kazuhiko Minematsu:
    Parallelizable Rate-1 Authenticated Encryption from Pseudorandom Functions. EUROCRYPT 2014: 275-292
  • Tetsu Iwata, Kazuhiko Minematsu, Jian Guo, Sumio Morioka:
    CLOC: Authenticated Encryption for Short Input. FSE 2014: 149-167
  • Kazuhiko Minematsu, Stefan Lucks, Hiraku Morita, Tetsu Iwata:
    Attacks and Security Proofs of EAX-Prime. FSE 2013: 327-347
  • Kazuhiko Minematsu, Stefan Lucks, Tetsu Iwata:
    Improved Authenticity Bound of EAX, and Refinements. ProvSec 2013: 184-201
  • Kazuhiko Minematsu:
    A Short Universal Hash Function from Bit Rotation, and Applications to Blockcipher Modes. ProvSec 2013: 221-238
  • Tetsu Iwata, Keisuke Ohashi, Kazuhiko Minematsu:
    Breaking and Repairing GCM Security Proofs. CRYPTO 2012: 31-49
  • Tomoyasu Suzaki, Kazuhiko Minematsu, Sumio Morioka, Eita Kobayashi:
    TWINE : A Lightweight Block Cipher for Multiple Platforms. Selected Areas in Cryptography 2012: 339-354
  • Tomoyasu Suzaki, Kazuhiko Minematsu, Sumio Morioka, Eita Kobayashi:
    TWINE: A Lightweight, Versatile Block Cipher. ECRYPT Workshop on Lightweight Cryptography 2011.
  • Kazuhiko Minematsu, Tomoyasu Suzaki, Maki Shigeri:
    On Maximum Differential Probability of Generalized Feistel. ACISP 2011: 89-105
  • Kazuhiko Minematsu, Tetsu Iwata:
    Building Blockcipher from Tweakable Blockcipher: Extending FSE 2009 Proposal. IMA Int. Conf. 2011: 391-412
  • Tomoyasu Suzaki, Kazuhiko Minematsu:
    Improving the Generalized Feistel. FSE 2010: 19-39
  • Kazuhiko Minematsu:
    How to Thwart Birthday Attacks against MACs via Small Randomness. FSE 2010: 230-249
  • Kazuhiko Minematsu:
    Beyond-Birthday-Bound Security Based on Tweakable Block Cipher. FSE 2009: 308-326 2007
  • Kazuhiko Minematsu, Toshiyasu Matsushima:
    New Bounds for PMAC, TMAC, and XCBC. FSE 2007: 434-451
  • Kazuhiko Minematsu, Toshiyasu Matsushima:
    Tweakable Enciphering Schemes from Hash-Sum-Expansion. INDOCRYPT 2007: 252-267 2006
  • Kazuhiko Minematsu, Yukiyasu Tsunoo:
    Provably Secure MACs from Differentially-Uniform Permutations and AES-Based Implementations. FSE 2006: 226-241
  • Kazuhiko Minematsu:
    Improved Security Analysis of XEX and LRW Modes. Selected Areas in Cryptography 2006: 96-113 2005
  • Kazuhiko Minematsu, Yukiyasu Tsunoo:
    Hybrid Symmetric Encryption Using Known-Plaintext Attack-Secure Components. ICISC 2005: 242-260
  • Kazuhiko Minematsu, Yukiyasu Tsunoo:
    Expanding Weak PRF with Small Key Size. ICISC 2005: 284-298

国際論文誌

  • Rei Ueno, Naofumi Homma, Akiko Inoue, Kazuhiko Minematsu:
    Fallen Sanctuary: A Higher-Order and Leakage-Resilient Rekeying Scheme. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2024(1): 264-308 (2024)
  • Ravi Anand, Subhadeep Banik, Andrea Caforio, Tatsuya Ishikawa, Takanori Isobe, Fukang Liu, Kazuhiko Minematsu, Mostafizar Rahman, Kosei Sakamoto:
    Gleeok: A Family of Low-Latency PRFs and its Applications to Authenticated Encryption. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2024(2): 545-587 (2024)
  • Rentaro Shiba, Ravi Anand, Kazuhiko Minematsu, Takanori Isobe:
    Cubicle: A family of space-hard ciphers for IoT. IET Inf. Secur. 17(1): 131-146 (2023)
  • Akiko Inoue, Chun Guo, Kazuhiko Minematsu:
    Nonce-misuse resilience of Romulus-N and GIFT-COFB. IET Inf. Secur. 17(3): 468-484 (2023)
  • Takanori Isobe, Ryoma Ito, Kazuhiko Minematsu:
    Cryptanalysis on End-to-End Encryption Schemes of Communication Tools and Its Research Trend. J. Inf. Process. 31: 523-536 (2023)
  • Takanori Isobe, Ryoma Ito, Fukang Liu, Kazuhiko Minematsu, Motoki Nakahashi, Kosei Sakamoto, Rentaro Shiba:
    Areion: Highly-Efficient Permutations and Its Applications to Hash Functions for Short Input. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2023(2): 115-154 (2023)
  • Yu Long Chen, Antonio Flórez-Gutiérrez, Akiko Inoue, Ryoma Ito, Tetsu Iwata, Kazuhiko Minematsu, Nicky Mouha, Yusuke Naito, Ferdinand Sibleyras, Yosuke Todo:
    Key Committing Security of AEZ and More. IACR Trans. Symmetric Cryptol. 2023(4): 452-488 (2023)
  • Akiko Inoue, Kazuhiko Minematsu, Maya Oda, Rei Ueno, Naofumi Homma:
    ELM: A Low-Latency and Scalable Memory Encryption Scheme. IEEE Trans. Inf. Forensics Secur. 17: 2628-2643 (2022)
  • Chun Guo, Tetsu Iwata, Kazuhiko Minematsu:
    New indifferentiability security proof of MDPH hash function. IET Inf. Secur. 16(4): 262-281 (2022)
  • Rentaro Shiba, Kosei Sakamoto, Fukang Liu, Kazuhiko Minematsu, Takanori Isobe:
    Integral and impossible-differential attacks on the reduced-round Lesamnta-LW-BC. IET Inf. Secur. 16(2): 75-85 (2022)
  • Kosei Sakamoto, Kazuhiko Minematsu, Nao Shibata, Maki Shigeri, Hiroyasu Kubo, Takanori Isobe:
    Design of a Linear Layer for a Block Cipher Based on Type-2 Generalized Feistel Network with 32 Branches. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 105-A(3): 278-288 (2022)
  • Makoto Habu, Kazuhiko Minematsu, Tetsu Iwata:
    Matching Attacks on Romulus-M. IET Inf. Secur. (2022)
  • Jin Hoki, Kosei Sakamoto, Fukang Liu, Kazuhiko Minematsu, Takanori Isobe:
    MILP-Aided Security Evaluation of Differential Attacks on KCipher-2. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 104-A(1): 203-212 (2021)
  • Jin Hoki, Kosei Sakamoto, Kazuhiko Minematsu, Takanori Isobe:
    Practical Integral Distinguishers on SNOW 3G and KCipher-2. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 104-A(11): 1603-1611 (2021)
  • Subhadeep Banik, Takanori Isobe, Fukang Liu, Kazuhiko Minematsu, Kosei Sakamoto:
    Orthros: A Low-Latency PRF. IACR Trans. Symmetric Cryptol. 2021(1): 37-77 (2021)
  • Kosei Sakamoto, Kazuhiko Minematsu, Nao Shibata, Maki Shigeri, Hiroyasu Kubo, Yuki Funabiki, Takanori Isobe:
    Security of Related-Key Differential Attacks on TWINE, Revisited. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 103-A(1): 212-214 (2020)
  • Takanori Isobe, Kazuhiko Minematsu:
    Security Analysis and Countermeasures of an End-to-End Encryption Scheme of LINE. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 103-A(1): 313-324 (2020)
  • Kosei Sakamoto, Kazuhiko Minematsu, Nao Shibata, Maki Shigeri, Hiroyasu Kubo, Yuki Funabiki, Andrey Bogdanov, Sumio Morioka, Takanori Isobe:
    Tweakable TWINE: Building a Tweakable Block Cipher on Generalized Feistel Structure. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 103-A(12): 1629-1639 (2020)
  • Avik Chakraborti, Tetsu Iwata, Kazuhiko Minematsu, Mridul Nandi:
    Blockcipher-Based Authenticated Encryption: How Small Can We Go? J. Cryptol. 33(3): 703-741 (2020)
  • Akiko Inoue, Tetsu Iwata, Kazuhiko Minematsu, Bertram Poettering:
    Cryptanalysis of OCB2: Attacks on Authenticity and Confidentiality. J. Cryptol. 33(4): 1871-1913 (2020)
  • Tetsu Iwata, Mustafa Khairallah, Kazuhiko Minematsu, Thomas Peyrin:
    Duel of the Titans: The Romulus and Remus Families of Lightweight AEAD Algorithms. IACR Trans. Symmetric Cryptol. 2020(1): 43-120 (2020)
  • Kazuhiko Minematsu:
    Fast Decryption: a New Feature of Misuse-Resistant AE. IACR Trans. Symmetric Cryptol. 2020(3): 87-118 (2020)
  • Wonseok Choi, Akiko Inoue, ByeongHak Lee, Jooyoung Lee, Eik List, Kazuhiko Minematsu, Yusuke Naito:
    Highly Secure Nonce-based MACs from the Sum of Tweakable Block Ciphers. IACR Trans. Symmetric Cryptol. 2020(4): 39-70 (2020)
  • Jooyoung Lee, Atul Luykx, Bart Mennink, Kazuhiko Minematsu.
    Connecting tweakable and multi-key blockcipher security. Design, Codes and Cryptography 2017.
  • Kazuhiko Minematsu:
    Building blockcipher from small-block tweakable blockcipher. Des. Codes Cryptography 74(3): 645-663 (2015)
  • Hayato Kobayashi, Kazuhiko Minematsu, Tetsu Iwata:
    Optimality of Tweak Functions in CLOC. IEICE Transactions 98-A(10): 2152-2164 (2015)
  • Kazuhiko Minematsu, Toshiyasu Matsushima:
    Generalization and Extension of XEX* Mode. IEICE Transactions 92-A(2): 517-524 (2009)
  • Kazuhiko Minematsu, Toshiyasu Matsushima:
    Improved MACs from Differentially-Uniform Permutations. IEICE Transactions 90-A(12): 2908-2915 (2007)
  • Yukiyasu Tsunoo, Etsuko Tsujihara, Maki Shigeri, Hiroyasu Kubo, Kazuhiko Minematsu:
    Improving cache attacks by considering cipher structure. Int. J. Inf. Sec. 5(3): 166-176 (2006)
  • Yukiyasu Tsunoo, Teruo Saito, Maki Shigeri, Hiroyasu Kubo, Kazuhiko Minematsu:
    Shorter bit sequence is enough to break stream cipher LILI-128. IEEE Trans. Information Theory 51(12): 4312-4319 (2005)

受賞等

  • Support Center for Advanced Telecommunications Technology Research (SCAT) Chairman Award, 2020
  • SCIS 2019 イノベーション論文賞
  • CRYPTO 2019 Best paper award
  • SCIS 2018 イノベーション論文賞
  • FSE 2015 Best paper award
  • ProvSec 2016 Best student paper award
  • Symposium on Cryptography and Information Security

略歴

1998年
早稲田大学理工学部 経営システム工学科 修士課程修了
1998年
NEC入社 中央研究所 (現在に至る)
2006年-2008年
早稲田大学大学院 理工学研究科 博士後期課程 修了(博士 理学)
2010年-2012年
早稲田大学大学院 理工学研究科 非常勤講師

新聞・雑誌掲載

  • つながるクルマ用認証、NEC、サイバー防衛技術(日経新聞 2018年1月16日)
  • IoTサイバー防衛急ぐ、接続機器守る技術続々(日経新聞 2019年10月14日)
  • 実用化が始まったNECの認証暗号、国際コンペの2次審査も通過 日経テクノロジーonline(2017年1月4日)
  • NEC, IoT向け暗号 計算量を半分に 日本経済新聞(2015年07月20日)
  • NEC, ビッグデータ用 暗号技術を開発 日本経済新聞(2012年08月21日)

WEB掲載

  • 学会発表/国際会議

プレスリリース

委員

  • IACR Transactions on Symmetric Cryptology (ToSC), Co-Editors-in-Chief, 2024-2025
  • 19th International Workshop on Security, IWSEC 2024, Program Co-Chairs
  • CRYPTREC 暗号解析評価WG 委員 2019-2021
  • CRYPTREC軽量暗号WG 委員 2013-2017

標準化

講演実績 (招待講演)

  • Symmetric-key Cryptography for Memory Encryption, Keynote talk, Information Security Conference (ISC) 2024, 2024
  • Symmetric-key Cryptography for Memory Encryption, Seminar talk, Georgia Institute of Technology, 2024
  • Practical modes under practical constraints. Lorentz Center Workshop, 2024
  • XOCB: Beyond-Birthday-Bound Secure Authenticated Encryption Mode with Rate-One Computation, 暗号と情報セキュリティワークショップ WCIS 2023
  • NIST Lightweight Cryptographyと軽量暗号の研究動向. ハードウェアセキュリティフォーラム2023
  • Revisiting Vector-input MAC (joint work with Isamu Furuya), Dagstuhl Seminar 24041 Symmetric Cryptography, 2024
  • Symmetric-key cryptography research in NEC. NIST Seminar, 2022
  • Cryptanalysis of OCB2: the Attacks and the Story behind. Invited talk, FSE 2020, 2020
  • Accelerating MRAE, Dagstuhl Seminar 20041 Symmetric Cryptography, 2020
  • On cryptanalysis of OCB2 authenticated encryption scheme, SCAT Award presentation 2020
  • An analysis of parallelizable authenticated encryption. Asian Symmetric-key Workshop (ASK) 2018, Kolkata, India.
  • 認証暗号:技術的概要とその応用について. JEITAハードウェアセキュリティ技術分科会 2018年
  • Forgery and Impersonation Attacks against of LINE’s End-to-End Encryption Schemes. Tokyo Crypto Day, 2018 On the security of LINE messaging application (Joint work with Takanori Isobe). Dagstuhl Seminar 2018
  • On randomized encryption beyond IV collision. Early Symmetric-key Conference, Luxemburg, 2017
  • CLOC, SILC and OTR. Recent Advances in Authenticated Encryption, ISI Kolkata, India, 2016
  • 認証暗号の構成方法と安全性の概念について. 暗号フロンティア研究会. 北陸先端科学技術大学, 2015
  • 共通鍵暗号の研究動向と最近の研究成果について. 早稲田大学理工学術院, 2015
  • Design tools for blockcipher modes. Denmark Technical University, 2014
  • Efficient Message Authentication Codes with Combinatorial Group Testing. The Fifth Asian Workshop on Symmetric Key Cryptography, ASK 2015, Singapore.
  • Design approachs to efficient blockcipher modes. The Fourth Asian Workshop on Symmetric Key Cryptography, ASK 2014, India.
  • CBCモードのMACへの応用: CBC-MACとその安全性. 第3回神保町暗号ワークショップ. 2013.

お問い合わせ