Skip to main content

and
  1. No Access

    Book and Conference Proceedings

    Advances in Cryptology – ASIACRYPT 2020

    26th International Conference on the Theory and Application of Cryptology and Information Security, Daejeon, South Korea, December 7–11, 2020, Proceedings, Part II

    Shiho Moriai, Huaxiong Wang in Lecture Notes in Computer Science (2020)

  2. No Access

    Book and Conference Proceedings

    Advances in Cryptology – ASIACRYPT 2020

    26th International Conference on the Theory and Application of Cryptology and Information Security, Daejeon, South Korea, December 7–11, 2020, Proceedings, Part III

    Shiho Moriai, Huaxiong Wang in Lecture Notes in Computer Science (2020)

  3. No Access

    Book and Conference Proceedings

    Advances in Cryptology – ASIACRYPT 2020

    26th International Conference on the Theory and Application of Cryptology and Information Security, Daejeon, South Korea, December 7–11, 2020, Proceedings, Part I

    Shiho Moriai, Huaxiong Wang in Lecture Notes in Computer Science (2020)

  4. No Access

    Book and Conference Proceedings

    Advances in Cryptology – ASIACRYPT 2019

    25th International Conference on the Theory and Application of Cryptology and Information Security, Kobe, Japan, December 8–12, 2019, Proceedings, Part II

    Steven D. Galbraith, Shiho Moriai in Lecture Notes in Computer Science (2019)

  5. No Access

    Book and Conference Proceedings

    Advances in Cryptology – ASIACRYPT 2019

    25th International Conference on the Theory and Application of Cryptology and Information Security, Kobe, Japan, December 8–12, 2019, Proceedings, Part III

    Steven D. Galbraith, Shiho Moriai in Lecture Notes in Computer Science (2019)

  6. Chapter and Conference Paper

    Can We Securely Use CBC Mode in TLS1.0?

    Currently, TLS1.0 is one of the most widely deployed protocol versions for SSL/TLS. In TLS1.0, there are only two choices for the bulk encryption, i.e., RC4 or block ciphers in the CBC mode, which have been cr...

    Takashi Kurokawa, Ryo Nojima, Shiho Moriai in Information and Communication Technology (2015)

  7. Chapter and Conference Paper

    Camellia: A 128-Bit Block Cipher Suitable for Multiple Platforms — Design andAnalysis

    We present a new 128-bit block cipher called Camellia. Camellia supports 128-bit block size and 128-, 192-, and 256-bit keys, i.e., the same interface specifications as the Advanced Encryption Standard (AES). Eff...

    Kazumaro Aoki, Tetsuya Ichikawa, Masayuki Kanda in Selected Areas in Cryptography (2001)

  8. Chapter and Conference Paper

    Security of E2 against Truncated Differential Cryptanalysis

    This paper studies the security offered by the block cipher E2 against truncated differential cryptanalysis. At FSE’99 Matsui and Tokita showed a possible attack on an 8-round variant of E2 without IT-Function (t...

    Shiho Moriai, Makoto Sugita, Kazumaro Aoki in Selected Areas in Cryptography (2000)

  9. Chapter and Conference Paper

    On the Pseudorandomness of Top-Level Schemes of Block Ciphers

    Block ciphers are usually basedon one top-level scheme into which we plug “roundf unctions”. To analyze security, it is important to study the intrinsic security provided by the top-level scheme from the viewp...

    Shiho Moriai, Serge Vaudenay in Advances in Cryptology — ASIACRYPT 2000 (2000)

  10. Chapter and Conference Paper

    Higher Order Differential Attack Using Chosen Higher Order Differences

    This paper introduces an improved higher order differential attack using chosen higher order differences. We can find a lower order of the higher order differential by choosing higher order differences. It fol...

    Shiho Moriai, Takeshi Shimoyama, Toshinobu Kaneko in Selected Areas in Cryptography (1999)

  11. No Access

    Chapter and Conference Paper

    Improving the higher order differential attack and cryptanalysis of the KN cipher

    Since the proposal of differential cryptanalysis and linear cryptanalysis in 1991 and 1993, respectively, the resistance to these cryptanalyses have been studied for many cryptosystems. Moreover, some block ci...

    Takeshi Shimoyama, Shiho Moriai, Toshinobu Kaneko in Information Security (1998)

  12. No Access

    Chapter and Conference Paper

    Improved fast software implementation of block ciphers (Extended abstract)

    This paper improves the fast DES implementation in software proposed by Biham at the 4-th Fast Software Encryption Workshop. That is, we propose a new algorithm which reduces the number of instructions for com...

    Takeshi Shimoyama, Seiichi Amada, Shiho Moriai in Information and Communications Security (1997)

  13. No Access

    Chapter and Conference Paper

    On strict estimation method of provable security against differential and linear cryptanalysis

    We give stricter upper bounds to the probabilities of differential and linear hull of DES-like ciphers than the previous results. The previous results in [6, 7] said that every r-round differential (or linear ...

    Yasuyoshi Kaneko, Shiho Moriai, Kazuo Ohta in Information and Communications Security (1997)

  14. Chapter and Conference Paper

    Improving the Search Algorithm for the Best Linear Expression

    It is important to find the best linear expression to estimate the vulnerability of crytosystems to Linear Cryptanalysis. This paper presents a method to improve Matsui’s search algorithm which determines the ...

    Kazuo Ohta, Shiho Moriai, Kazumaro Aoki in Advances in Cryptology — CRYPT0’ 95 (1995)