dblp.uni-trier.dewww.uni-trier.de

Shiho Moriai

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeer - CSB - Google - MSN - Yahoo

2007
14EETaizo Shirai, Kyoji Shibutani, Toru Akishita, Shiho Moriai, Tetsu Iwata: The 128-Bit Blockcipher CLEFIA (Extended Abstract). FSE 2007: 181-195
2001
13EEDeukjo Hong, Jaechul Sung, Shiho Moriai, Sangjin Lee, Jongin Lim: Impossible Differential Cryptanalysis of Zodiac. FSE 2001: 300-311
12EEHelger Lipmaa, Shiho Moriai: Efficient Algorithms for Computing Differential Properties of Addition. FSE 2001: 336-350
2000
11EEShiho Moriai, Serge Vaudenay: On the Pseudorandomness of Top-Level Schemes of Block Ciphers. ASIACRYPT 2000: 289-302
10EEKazumaro Aoki, Tetsuya Ichikawa, Masayuki Kanda, Mitsuru Matsui, Shiho Moriai, Junko Nakajima, Toshio Tokita: Camellia: A 128-Bit Block Cipher Suitable for Multiple Platforms - Design and Analysis. Selected Areas in Cryptography 2000: 39-56
1999
9EEShiho Moriai, Takeshi Shimoyama, Toshinobu Kaneko: Interpolation Attacks of the Block Cipher: SNAKE. FSE 1999: 275-289
8EEShiho Moriai, Makoto Sugita, Kazumaro Aoki, Masayuki Kanda: Security of E2 against Truncated Differential Cryptanalysis. Selected Areas in Cryptography 1999: 106-117
1998
7EEShiho Moriai, Takeshi Shimoyama, Toshinobu Kaneko: Higher Order Differential Attak of CAST Cipher. FSE 1998: 17-31
6EEShiho Moriai, Takeshi Shimoyama, Toshinobu Kaneko: Higher Order Differential Attack Using Chosen Higher Order Differences. Selected Areas in Cryptography 1998: 106-117
1997
5EEKazumaro Aoki, Kunio Kobayashi, Shiho Moriai: Best Differential Characteristic Search of FEAL. FSE 1997: 41-53
4 Yasuyoshi Kaneko, Shiho Moriai, Kazuo Ohta: On strict estimation method of provable security against differential and linear cryptanalysis. ICICS 1997: 258-268
3 Takeshi Shimoyama, Seiichi Amada, Shiho Moriai: Improved fast software implementation of block ciphers. ICICS 1997: 269-273
2 Takeshi Shimoyama, Shiho Moriai, Toshinobu Kaneko: Improving the Higher Order Differential Attack and Cryptanalysis of the KN Cipher. ISW 1997: 32-42
1995
1EEKazuo Ohta, Shiho Moriai, Kazumaro Aoki: Improving the Search Algorithm for the Best Linear Expression. CRYPTO 1995: 157-170

Coauthor Index

1Toru Akishita [14]
2Seiichi Amada [3]
3Kazumaro Aoki [1] [5] [8] [10]
4Deukjo Hong [13]
5Tetsuya Ichikawa [10]
6Tetsu Iwata [14]
7Masayuki Kanda [8] [10]
8Toshinobu Kaneko [2] [6] [7] [9]
9Yasuyoshi Kaneko [4]
10Kunio Kobayashi [5]
11Sangjin Lee [13]
12Jongin Lim (Jong In Lim) [13]
13Helger Lipmaa [12]
14Mitsuru Matsui [10]
15Junko Nakajima [10]
16Kazuo Ohta [1] [4]
17Kyoji Shibutani [14]
18Takeshi Shimoyama [2] [3] [6] [7] [9]
19Taizo Shirai [14]
20Makoto Sugita [8]
21Jaechul Sung [13]
22Toshio Tokita [10]
23Serge Vaudenay [11]

Colors in the list of coauthors

Copyright © Sun May 17 03:24:02 2009 by Michael Ley (ley@uni-trier.de)