The SCEAS System
| |||||||

## Search the dblp DataBase
Shiho Moriai:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
## Publications of Author- Shiho Moriai, Serge Vaudenay
**On the Pseudorandomness of Top-Level Schemes of Block Ciphers.**[Citation Graph (0, 0)][DBLP] ASIACRYPT, 2000, pp:289-302 [Conf] - Kazuo Ohta, Shiho Moriai, Kazumaro Aoki
**Improving the Search Algorithm for the Best Linear Expression.**[Citation Graph (0, 0)][DBLP] CRYPTO, 1995, pp:157-170 [Conf] - Deukjo Hong, Jaechul Sung, Shiho Moriai, Sangjin Lee, Jongin Lim
**Impossible Differential Cryptanalysis of Zodiac.**[Citation Graph (0, 0)][DBLP] FSE, 2001, pp:300-311 [Conf] - Kazumaro Aoki, Kunio Kobayashi, Shiho Moriai
**Best Differential Characteristic Search of FEAL.**[Citation Graph (0, 0)][DBLP] Fast Software Encryption, 1997, pp:41-53 [Conf] - Helger Lipmaa, Shiho Moriai
**Efficient Algorithms for Computing Differential Properties of Addition.**[Citation Graph (0, 0)][DBLP] FSE, 2001, pp:336-350 [Conf] - Shiho Moriai, Takeshi Shimoyama, Toshinobu Kaneko
**Higher Order Differential Attak of CAST Cipher.**[Citation Graph (0, 0)][DBLP] Fast Software Encryption, 1998, pp:17-31 [Conf] - Shiho Moriai, Takeshi Shimoyama, Toshinobu Kaneko
**Interpolation Attacks of the Block Cipher: SNAKE.**[Citation Graph (0, 0)][DBLP] Fast Software Encryption, 1999, pp:275-289 [Conf] - Yasuyoshi Kaneko, Shiho Moriai, Kazuo Ohta
**On strict estimation method of provable security against differential and linear cryptanalysis.**[Citation Graph (0, 0)][DBLP] ICICS, 1997, pp:258-268 [Conf] - Takeshi Shimoyama, Seiichi Amada, Shiho Moriai
**Improved fast software implementation of block ciphers.**[Citation Graph (0, 0)][DBLP] ICICS, 1997, pp:269-273 [Conf] - Takeshi Shimoyama, Shiho Moriai, Toshinobu Kaneko
**Improving the Higher Order Differential Attack and Cryptanalysis of the**[Citation Graph (0, 0)][DBLP]*KN*Cipher. ISW, 1997, pp:32-42 [Conf] - Shiho Moriai, Makoto Sugita, Kazumaro Aoki, Masayuki Kanda
**Security of E2 against Truncated Differential Cryptanalysis.**[Citation Graph (0, 0)][DBLP] Selected Areas in Cryptography, 1999, pp:106-117 [Conf] - Shiho Moriai, Takeshi Shimoyama, Toshinobu Kaneko
**Higher Order Differential Attack Using Chosen Higher Order Differences.**[Citation Graph (0, 0)][DBLP] Selected Areas in Cryptography, 1998, pp:106-117 [Conf] - Kazumaro Aoki, Tetsuya Ichikawa, Masayuki Kanda, Mitsuru Matsui, Shiho Moriai, Junko Nakajima, Toshio Tokita
**Camellia: A 128-Bit Block Cipher Suitable for Multiple Platforms - Design and Analysis.**[Citation Graph (0, 0)][DBLP] Selected Areas in Cryptography, 2000, pp:39-56 [Conf] - Taizo Shirai, Kyoji Shibutani, Toru Akishita, Shiho Moriai, Tetsu Iwata
**The 128-Bit Blockcipher CLEFIA (Extended Abstract).**[Citation Graph (0, 0)][DBLP] FSE, 2007, pp:181-195 [Conf]
Search in 0.013secs, Finished in 0.014secs | |||||||

| |||||||

| |||||||

System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002 for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002 |