Skip to main content

previous disabled Page of 2
and
  1. No Access

    Chapter and Conference Paper

    Enhanced Secure Comparison Schemes Using Homomorphic Encryption

    Comparing two integers under the encrypted form is useful for privacy-preserving data mining, secure auction, and so on. Based on the ring-learning with errors (ring-LWE) assumption, Saha and Koshiba proposed ...

    Lihua Wang, Tushar Kanti Saha in Advances in Networked-Based Information Sy… (2021)

  2. No Access

    Book and Conference Proceedings

    Advances in Cryptology – ASIACRYPT 2020

    26th International Conference on the Theory and Application of Cryptology and Information Security, Daejeon, South Korea, December 7–11, 2020, Proceedings, Part II

    Shiho Moriai, Huaxiong Wang in Lecture Notes in Computer Science (2020)

  3. No Access

    Book and Conference Proceedings

    Advances in Cryptology – ASIACRYPT 2020

    26th International Conference on the Theory and Application of Cryptology and Information Security, Daejeon, South Korea, December 7–11, 2020, Proceedings, Part III

    Shiho Moriai, Huaxiong Wang in Lecture Notes in Computer Science (2020)

  4. No Access

    Book and Conference Proceedings

    Advances in Cryptology – ASIACRYPT 2020

    26th International Conference on the Theory and Application of Cryptology and Information Security, Daejeon, South Korea, December 7–11, 2020, Proceedings, Part I

    Shiho Moriai, Huaxiong Wang in Lecture Notes in Computer Science (2020)

  5. No Access

    Book and Conference Proceedings

    Advances in Cryptology – ASIACRYPT 2019

    25th International Conference on the Theory and Application of Cryptology and Information Security, Kobe, Japan, December 8–12, 2019, Proceedings, Part I

    Steven D. Galbraith, Shiho Moriai in Lecture Notes in Computer Science (2019)

  6. No Access

    Book and Conference Proceedings

    Advances in Cryptology – ASIACRYPT 2019

    25th International Conference on the Theory and Application of Cryptology and Information Security, Kobe, Japan, December 8–12, 2019, Proceedings, Part II

    Steven D. Galbraith, Shiho Moriai in Lecture Notes in Computer Science (2019)

  7. No Access

    Book and Conference Proceedings

    Advances in Cryptology – ASIACRYPT 2019

    25th International Conference on the Theory and Application of Cryptology and Information Security, Kobe, Japan, December 8–12, 2019, Proceedings, Part III

    Steven D. Galbraith, Shiho Moriai in Lecture Notes in Computer Science (2019)

  8. No Access

    Chapter and Conference Paper

    Privacy-Preserving Deep Learning: Revisited and Enhanced

    We build a privacy-preserving deep learning system in which many learning participants perform neural network-based deep learning over a combined dataset of all, without actually revealing the participants’ lo...

    Le Trieu Phong, Yoshinori Aono in Applications and Techniques in Information… (2017)

  9. Chapter and Conference Paper

    Can We Securely Use CBC Mode in TLS1.0?

    Currently, TLS1.0 is one of the most widely deployed protocol versions for SSL/TLS. In TLS1.0, there are only two choices for the bulk encryption, i.e., RC4 or block ciphers in the CBC mode, which have been cr...

    Takashi Kurokawa, Ryo Nojima, Shiho Moriai in Information and Communication Technology (2015)

  10. No Access

    Book and Conference Proceedings

    Fast Software Encryption

    20th International Workshop, FSE 2013, Singapore, March 11-13, 2013. Revised Selected Papers

    Shiho Moriai in Lecture Notes in Computer Science (2014)

  11. No Access

    Chapter and Conference Paper

    Differential and Impossible Differential Related-Key Attacks on Hierocrypt-L1

    Hierocrypt-L1 is one of the Japanese e-Government Recommended Ciphers listed by CRYPTREC in 2003, and its security was reconfirmed as secure by CRYPTREC in 2013. In this paper we first find differential charac...

    Bungo Taga, Shiho Moriai, Kazumaro Aoki in Information Security and Privacy (2014)

  12. Chapter and Conference Paper

    Lightweight Cryptography for the Cloud: Exploit the Power of Bitslice Implementation

    This paper shows the great potential of lightweight cryptography in fast and timing-attack resistant software implementations in cloud computing by exploiting bitslice implementation. This is demonstrated by b...

    Seiichi Matsuda, Shiho Moriai in Cryptographic Hardware and Embedded Systems – CHES 2012 (2012)

  13. Chapter and Conference Paper

    The 128-Bit Blockcipher CLEFIA (Extended Abstract)

    We propose a new 128-bit blockcipher CLEFIA supporting key lengths of 128, 192 and 256 bits, which is compatible with AES. CLEFIA achieves enough immunity against known attacks and flexibility for efficient im...

    Taizo Shirai, Kyoji Shibutani, Toru Akishita, Shiho Moriai in Fast Software Encryption (2007)

  14. Chapter and Conference Paper

    Impossible Differential Cryptanalysis of Zodiac

    We discuss the impossible differential cryptanalysis of the block cipher Zodiac [7]. The main design principles of Zodiac are simplicity and efficiency. However the diffusion layer in its round function is too si...

    Deukjo Hong, Jaechul Sung, Shiho Moriai, Sang** Lee in Fast Software Encryption (2002)

  15. Chapter and Conference Paper

    Efficient Algorithms for Computing Differential Properties of Addition

    In this paper we systematically study the differential properties of addition modulo 2n. We derive Θ(logn)-time algorithms for most of the properties, including differential probability of addition. We also prese...

    Helger Lipmaa, Shiho Moriai in Fast Software Encryption (2002)

  16. Chapter and Conference Paper

    Camellia: A 128-Bit Block Cipher Suitable for Multiple Platforms — Design andAnalysis

    We present a new 128-bit block cipher called Camellia. Camellia supports 128-bit block size and 128-, 192-, and 256-bit keys, i.e., the same interface specifications as the Advanced Encryption Standard (AES). Eff...

    Kazumaro Aoki, Tetsuya Ichikawa, Masayuki Kanda in Selected Areas in Cryptography (2001)

  17. Chapter and Conference Paper

    Security of E2 against Truncated Differential Cryptanalysis

    This paper studies the security offered by the block cipher E2 against truncated differential cryptanalysis. At FSE’99 Matsui and Tokita showed a possible attack on an 8-round variant of E2 without IT-Function (t...

    Shiho Moriai, Makoto Sugita, Kazumaro Aoki in Selected Areas in Cryptography (2000)

  18. Chapter and Conference Paper

    On the Pseudorandomness of Top-Level Schemes of Block Ciphers

    Block ciphers are usually basedon one top-level scheme into which we plug “roundf unctions”. To analyze security, it is important to study the intrinsic security provided by the top-level scheme from the viewp...

    Shiho Moriai, Serge Vaudenay in Advances in Cryptology — ASIACRYPT 2000 (2000)

  19. Chapter and Conference Paper

    Higher Order Differential Attack Using Chosen Higher Order Differences

    This paper introduces an improved higher order differential attack using chosen higher order differences. We can find a lower order of the higher order differential by choosing higher order differences. It fol...

    Shiho Moriai, Takeshi Shimoyama, Toshinobu Kaneko in Selected Areas in Cryptography (1999)

  20. Chapter and Conference Paper

    Interpolation Attacks of the Block Cipher: SNAKE

    This paper presents an efficient interpolation attack using a computer algebra system. The interpolation attack proposed by Jakobsen and Knudsen was shown to be effective for attacking ciphers that use simple ...

    Shiho Moriai, Takeshi Shimoyama, Toshinobu Kaneko in Fast Software Encryption (1999)

previous disabled Page of 2