Shiho Moriai

According to our database1, Shiho Moriai authored at least 43 papers between 1995 and 2022.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2022
Privacy-Preserving Federated Learning for Detecting Fraudulent Financial Transactions in Japanese Banks.
J. Inf. Process., 2022

Cache-22: A Highly Deployable End-To-End Encrypted Cache System with Post-Quantum Security.
IACR Cryptol. ePrint Arch., 2022

2021
Foreword.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2021

2020
Advances in security research in the Asiacrypt region.
Commun. ACM, 2020

Enhanced Secure Comparison Schemes Using Homomorphic Encryption.
Proceedings of the Advances in Networked-Based Information Systems, 2020

Cache-22: A Highly Deployable Encrypted Cache System.
Proceedings of the International Symposium on Information Theory and Its Applications, 2020

2019
Editor's Message to Special Issue of Computer Security Technologies for Digital Transformation.
J. Inf. Process., 2019

Privacy-Preserving Deep Learning via Additively Homomorphic Encryption.
Proceedings of the 26th IEEE Symposium on Computer Arithmetic, 2019

2018
Privacy-Preserving Deep Learning via Additively Homomorphic Encryption.
IEEE Trans. Inf. Forensics Secur., 2018

2017
Related-Key Attacks on Reduced-Round Hierocrypt-L1.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2017

Privacy preserving extreme learning machine using additively homomorphic encryption.
Proceedings of the 2017 IEEE Symposium Series on Computational Intelligence, 2017

LINCOS: A Storage System Providing Long-Term Integrity, Authenticity, and Confidentiality.
Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security, 2017

Privacy-Preserving Deep Learning: Revisited and Enhanced.
Proceedings of the Applications and Techniques in Information Security, 2017

2016
On the security of CBC Mode in SSL3.0 and TLS1.0.
J. Internet Serv. Inf. Secur., 2016

LINCOS - A Storage System Providing Long-Term Integrity, Authenticity, and Confidentiality (Full Paper).
IACR Cryptol. ePrint Arch., 2016

Unbreakable distributed storage with quantum key distribution network and password-authenticated secret sharing.
CoRR, 2016

Toward securing tire pressure monitoring systems: A case of PRESENT-based implementation.
Proceedings of the 2016 International Symposium on Information Theory and Its Applications, 2016

2015
Highly Secure Network Switches with Quantum Key Distribution Systems.
Int. J. Netw. Secur., 2015

Can We Securely Use CBC Mode in TLS1.0?
Proceedings of the Information and Communication Technology, 2015

A Secure Automobile Information Sharing System.
Proceedings of the 1st ACM Workshop on IoT Privacy, Trust, and Security, 2015

POSTER: PRINCESS: A Secure Cloud File Storage System for Managing Data with Hierarchical Levels of Sensitivity.
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015

2014
Differential and Impossible Differential Related-Key Attacks on Hierocrypt-L1.
Proceedings of the Information Security and Privacy - 19th Australasian Conference, 2014

2012
Lightweight Cryptography for the Cloud: Exploit the Power of Bitslice Implementation.
Proceedings of the Cryptographic Hardware and Embedded Systems - CHES 2012, 2012

2011
The 128-Bit Blockcipher CLEFIA.
RFC, March, 2011

2007
The 128-Bit Blockcipher CLEFIA (Extended Abstract).
Proceedings of the Fast Software Encryption, 14th International Workshop, 2007

2005
The Camellia Cipher Algorithm and Its Use With IPsec.
RFC, December, 2005

Addition of Camellia Cipher Suites to Transport Layer Security (TLS).
RFC, July, 2005

2004
A Description of the Camellia Encryption Algorithm.
RFC, April, 2004

Use of the Camellia Encryption Algorithm in Cryptographic Message Syntax (CMS).
RFC, January, 2004

2002
Impossible Differential Cryptanalysis of Zodiac.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2002

The 128-Bit Block Cipher <i>Camellia</i>.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2002

2001
Efficient Algorithms for Computing Differential Properties of Addition.
IACR Cryptol. ePrint Arch., 2001

2000
Camellia: A 128-Bit Block Cipher Suitable for Multiple Platforms - Design and Analysis.
Proceedings of the Selected Areas in Cryptography, 7th Annual International Workshop, 2000

On the Pseudorandomness of Top-Level Schemes of Block Ciphers.
Proceedings of the Advances in Cryptology, 2000

1999
Security of E2 against Truncated Differential Cryptanalysis.
Proceedings of the Selected Areas in Cryptography, 6th Annual International Workshop, 1999

Interpolation Attacks of the Block Cipher: SNAKE.
Proceedings of the Fast Software Encryption, 6th International Workshop, 1999

1998
Higher Order Differential Attack Using Chosen Higher Order Differences.
Proceedings of the Selected Areas in Cryptography '98, 1998

Higher Order Differential Attak of CAST Cipher.
Proceedings of the Fast Software Encryption, 5th International Workshop, 1998

1997
Improving the Higher Order Differential Attack and Cryptanalysis of the <i>KN</i> Cipher.
Proceedings of the Information Security, First International Workshop, 1997

Improved fast software implementation of block ciphers.
Proceedings of the Information and Communication Security, First International Conference, 1997

On strict estimation method of provable security against differential and linear cryptanalysis.
Proceedings of the Information and Communication Security, First International Conference, 1997

Best Differential Characteristic Search of FEAL.
Proceedings of the Fast Software Encryption, 4th International Workshop, 1997

1995
Improving the Search Algorithm for the Best Linear Expression.
Proceedings of the Advances in Cryptology, 1995


  Loading...