The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Shiho Moriai: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Shiho Moriai, Serge Vaudenay
    On the Pseudorandomness of Top-Level Schemes of Block Ciphers. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 2000, pp:289-302 [Conf]
  2. Kazuo Ohta, Shiho Moriai, Kazumaro Aoki
    Improving the Search Algorithm for the Best Linear Expression. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1995, pp:157-170 [Conf]
  3. Deukjo Hong, Jaechul Sung, Shiho Moriai, Sangjin Lee, Jongin Lim
    Impossible Differential Cryptanalysis of Zodiac. [Citation Graph (0, 0)][DBLP]
    FSE, 2001, pp:300-311 [Conf]
  4. Kazumaro Aoki, Kunio Kobayashi, Shiho Moriai
    Best Differential Characteristic Search of FEAL. [Citation Graph (0, 0)][DBLP]
    Fast Software Encryption, 1997, pp:41-53 [Conf]
  5. Helger Lipmaa, Shiho Moriai
    Efficient Algorithms for Computing Differential Properties of Addition. [Citation Graph (0, 0)][DBLP]
    FSE, 2001, pp:336-350 [Conf]
  6. Shiho Moriai, Takeshi Shimoyama, Toshinobu Kaneko
    Higher Order Differential Attak of CAST Cipher. [Citation Graph (0, 0)][DBLP]
    Fast Software Encryption, 1998, pp:17-31 [Conf]
  7. Shiho Moriai, Takeshi Shimoyama, Toshinobu Kaneko
    Interpolation Attacks of the Block Cipher: SNAKE. [Citation Graph (0, 0)][DBLP]
    Fast Software Encryption, 1999, pp:275-289 [Conf]
  8. Yasuyoshi Kaneko, Shiho Moriai, Kazuo Ohta
    On strict estimation method of provable security against differential and linear cryptanalysis. [Citation Graph (0, 0)][DBLP]
    ICICS, 1997, pp:258-268 [Conf]
  9. Takeshi Shimoyama, Seiichi Amada, Shiho Moriai
    Improved fast software implementation of block ciphers. [Citation Graph (0, 0)][DBLP]
    ICICS, 1997, pp:269-273 [Conf]
  10. Takeshi Shimoyama, Shiho Moriai, Toshinobu Kaneko
    Improving the Higher Order Differential Attack and Cryptanalysis of the KN Cipher. [Citation Graph (0, 0)][DBLP]
    ISW, 1997, pp:32-42 [Conf]
  11. Shiho Moriai, Makoto Sugita, Kazumaro Aoki, Masayuki Kanda
    Security of E2 against Truncated Differential Cryptanalysis. [Citation Graph (0, 0)][DBLP]
    Selected Areas in Cryptography, 1999, pp:106-117 [Conf]
  12. Shiho Moriai, Takeshi Shimoyama, Toshinobu Kaneko
    Higher Order Differential Attack Using Chosen Higher Order Differences. [Citation Graph (0, 0)][DBLP]
    Selected Areas in Cryptography, 1998, pp:106-117 [Conf]
  13. Kazumaro Aoki, Tetsuya Ichikawa, Masayuki Kanda, Mitsuru Matsui, Shiho Moriai, Junko Nakajima, Toshio Tokita
    Camellia: A 128-Bit Block Cipher Suitable for Multiple Platforms - Design and Analysis. [Citation Graph (0, 0)][DBLP]
    Selected Areas in Cryptography, 2000, pp:39-56 [Conf]
  14. Taizo Shirai, Kyoji Shibutani, Toru Akishita, Shiho Moriai, Tetsu Iwata
    The 128-Bit Blockcipher CLEFIA (Extended Abstract). [Citation Graph (0, 0)][DBLP]
    FSE, 2007, pp:181-195 [Conf]

Search in 0.013secs, Finished in 0.014secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002