Shiho Moriai
According to our database1,
Shiho Moriai
authored at least 43 papers
between 1995 and 2022.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2022
Privacy-Preserving Federated Learning for Detecting Fraudulent Financial Transactions in Japanese Banks.
J. Inf. Process., 2022
Cache-22: A Highly Deployable End-To-End Encrypted Cache System with Post-Quantum Security.
IACR Cryptol. ePrint Arch., 2022
2021
2020
Proceedings of the Advances in Networked-Based Information Systems, 2020
Proceedings of the International Symposium on Information Theory and Its Applications, 2020
2019
Editor's Message to Special Issue of Computer Security Technologies for Digital Transformation.
J. Inf. Process., 2019
Proceedings of the 26th IEEE Symposium on Computer Arithmetic, 2019
2018
IEEE Trans. Inf. Forensics Secur., 2018
2017
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2017
Proceedings of the 2017 IEEE Symposium Series on Computational Intelligence, 2017
LINCOS: A Storage System Providing Long-Term Integrity, Authenticity, and Confidentiality.
Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security, 2017
Proceedings of the Applications and Techniques in Information Security, 2017
2016
J. Internet Serv. Inf. Secur., 2016
LINCOS - A Storage System Providing Long-Term Integrity, Authenticity, and Confidentiality (Full Paper).
IACR Cryptol. ePrint Arch., 2016
Unbreakable distributed storage with quantum key distribution network and password-authenticated secret sharing.
CoRR, 2016
Toward securing tire pressure monitoring systems: A case of PRESENT-based implementation.
Proceedings of the 2016 International Symposium on Information Theory and Its Applications, 2016
2015
Int. J. Netw. Secur., 2015
Proceedings of the Information and Communication Technology, 2015
Proceedings of the 1st ACM Workshop on IoT Privacy, Trust, and Security, 2015
POSTER: PRINCESS: A Secure Cloud File Storage System for Managing Data with Hierarchical Levels of Sensitivity.
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015
2014
Proceedings of the Information Security and Privacy - 19th Australasian Conference, 2014
2012
Lightweight Cryptography for the Cloud: Exploit the Power of Bitslice Implementation.
Proceedings of the Cryptographic Hardware and Embedded Systems - CHES 2012, 2012
2011
2007
Proceedings of the Fast Software Encryption, 14th International Workshop, 2007
2005
RFC, July, 2005
2004
RFC, January, 2004
2002
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2002
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2002
2001
IACR Cryptol. ePrint Arch., 2001
2000
Camellia: A 128-Bit Block Cipher Suitable for Multiple Platforms - Design and Analysis.
Proceedings of the Selected Areas in Cryptography, 7th Annual International Workshop, 2000
Proceedings of the Advances in Cryptology, 2000
1999
Proceedings of the Selected Areas in Cryptography, 6th Annual International Workshop, 1999
Proceedings of the Fast Software Encryption, 6th International Workshop, 1999
1998
Proceedings of the Selected Areas in Cryptography '98, 1998
Proceedings of the Fast Software Encryption, 5th International Workshop, 1998
1997
Improving the Higher Order Differential Attack and Cryptanalysis of the <i>KN</i> Cipher.
Proceedings of the Information Security, First International Workshop, 1997
Proceedings of the Information and Communication Security, First International Conference, 1997
On strict estimation method of provable security against differential and linear cryptanalysis.
Proceedings of the Information and Communication Security, First International Conference, 1997
Proceedings of the Fast Software Encryption, 4th International Workshop, 1997
1995
Proceedings of the Advances in Cryptology, 1995