


default search action
Shiho Moriai
Person information
SPARQL queries 
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2022
- [j10]Sachiko Kanamori, Taeko Abe, Takuma Ito, Keita Emura, Lihua Wang, Shuntaro Yamamoto, Le Trieu Phong, Kaien Abe, Sangwook Kim, Ryo Nojima, Seiichi Ozawa, Shiho Moriai:
Privacy-Preserving Federated Learning for Detecting Fraudulent Financial Transactions in Japanese Banks. J. Inf. Process. 30: 789-795 (2022) - [i10]Keita Emura, Shiho Moriai, Takuma Nakajima, Masato Yoshimi:
Cache-22: A Highly Deployable End-To-End Encrypted Cache System with Post-Quantum Security. IACR Cryptol. ePrint Arch. 2022: 220 (2022) - 2021
- [j9]Shiho Moriai:
Foreword. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 104-A(1): 1 (2021) - 2020
- [j8]Raphael C.-W. Phan, Masayuki Abe, Lynn Batten, Jung Hee Cheon, Ed Dawson, Steven D. Galbraith
, Jian Guo, Lucas C. K. Hui, Kwangjo Kim, Xuejia Lai, Dong Hoon Lee, Mitsuru Matsui, Tsutomu Matsumoto, Shiho Moriai, Phong Q. Nguyen, Dingyi Pei, Duong Hieu Phan
, Josef Pieprzyk
, Huaxiong Wang, Hank Wolfe, Duncan S. Wong, Tzong-Chen Wu, Bo-Yin Yang, Siu-Ming Yiu, Yu Yu, Jianying Zhou
:
Advances in security research in the Asiacrypt region. Commun. ACM 63(4): 76-81 (2020) - [c26]Keita Emura, Shiho Moriai, Takuma Nakajima, Masato Yoshimi:
Cache-22: A Highly Deployable Encrypted Cache System. ISITA 2020: 465-469 - [c25]Lihua Wang, Tushar Kanti Saha
, Yoshinori Aono, Takeshi Koshiba
, Shiho Moriai:
Enhanced Secure Comparison Schemes Using Homomorphic Encryption. NBiS 2020: 211-224 - [e8]Shiho Moriai, Huaxiong Wang
:
Advances in Cryptology - ASIACRYPT 2020 - 26th International Conference on the Theory and Application of Cryptology and Information Security, Daejeon, South Korea, December 7-11, 2020, Proceedings, Part I. Lecture Notes in Computer Science 12491, Springer 2020, ISBN 978-3-030-64836-7 [contents] - [e7]Shiho Moriai, Huaxiong Wang
:
Advances in Cryptology - ASIACRYPT 2020 - 26th International Conference on the Theory and Application of Cryptology and Information Security, Daejeon, South Korea, December 7-11, 2020, Proceedings, Part II. Lecture Notes in Computer Science 12492, Springer 2020, ISBN 978-3-030-64833-6 [contents] - [e6]Shiho Moriai, Huaxiong Wang
:
Advances in Cryptology - ASIACRYPT 2020 - 26th International Conference on the Theory and Application of Cryptology and Information Security, Daejeon, South Korea, December 7-11, 2020, Proceedings, Part III. Lecture Notes in Computer Science 12493, Springer 2020, ISBN 978-3-030-64839-8 [contents]
2010 – 2019
- 2019
- [j7]Shiho Moriai:
Editor's Message to Special Issue of Computer Security Technologies for Digital Transformation. J. Inf. Process. 27: 507 (2019) - [c24]Shiho Moriai:
Privacy-Preserving Deep Learning via Additively Homomorphic Encryption. ARITH 2019: 198 - [e5]Steven D. Galbraith, Shiho Moriai:
Advances in Cryptology - ASIACRYPT 2019 - 25th International Conference on the Theory and Application of Cryptology and Information Security, Kobe, Japan, December 8-12, 2019, Proceedings, Part I. Lecture Notes in Computer Science 11921, Springer 2019, ISBN 978-3-030-34577-8 [contents] - [e4]Steven D. Galbraith, Shiho Moriai:
Advances in Cryptology - ASIACRYPT 2019 - 25th International Conference on the Theory and Application of Cryptology and Information Security, Kobe, Japan, December 8-12, 2019, Proceedings, Part II. Lecture Notes in Computer Science 11922, Springer 2019, ISBN 978-3-030-34620-1 [contents] - [e3]Steven D. Galbraith, Shiho Moriai:
Advances in Cryptology - ASIACRYPT 2019 - 25th International Conference on the Theory and Application of Cryptology and Information Security, Kobe, Japan, December 8-12, 2019, Proceedings, Part III. Lecture Notes in Computer Science 11923, Springer 2019, ISBN 978-3-030-34617-1 [contents] - 2018
- [j6]Le Trieu Phong
, Yoshinori Aono, Takuya Hayashi
, Lihua Wang
, Shiho Moriai:
Privacy-Preserving Deep Learning via Additively Homomorphic Encryption. IEEE Trans. Inf. Forensics Secur. 13(5): 1333-1345 (2018) - 2017
- [j5]Bungo Taga, Shiho Moriai, Kazumaro Aoki:
Related-Key Attacks on Reduced-Round Hierocrypt-L1. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 100-A(1): 126-137 (2017) - [c23]Le Trieu Phong, Yoshinori Aono, Takuya Hayashi
, Lihua Wang, Shiho Moriai:
Privacy-Preserving Deep Learning: Revisited and Enhanced. ATIS 2017: 100-110 - [c22]Johannes Braun, Johannes Buchmann, Denise Demirel, Matthias Geihs, Mikio Fujiwara, Shiho Moriai, Masahide Sasaki, Atsushi Waseda:
LINCOS: A Storage System Providing Long-Term Integrity, Authenticity, and Confidentiality. AsiaCCS 2017: 461-468 - [c21]Shohei Kuri, Takuya Hayashi
, Toshiaki Omori, Seiichi Ozawa, Yoshinori Aono, Le Trieu Phong, Lihua Wang, Shiho Moriai:
Privacy preserving extreme learning machine using additively homomorphic encryption. SSCI 2017: 1-8 - [i9]Le Trieu Phong, Yoshinori Aono, Takuya Hayashi, Lihua Wang, Shiho Moriai:
Privacy-Preserving Deep Learning via Additively Homomorphic Encryption. IACR Cryptol. ePrint Arch. 2017: 715 (2017) - 2016
- [j4]Takashi Kurokawa, Ryo Nojima, Shiho Moriai:
On the security of CBC Mode in SSL3.0 and TLS1.0. J. Internet Serv. Inf. Secur. 6(1): 2-19 (2016) - [c20]Keita Emura, Takuya Hayashi, Shiho Moriai:
Toward securing tire pressure monitoring systems: A case of PRESENT-based implementation. ISITA 2016: 403-407 - [i8]Mikio Fujiwara, Atsushi Waseda, Ryo Nojima, Shiho Moriai, Wakaha Ogata, Masahide Sasaki:
Unbreakable distributed storage with quantum key distribution network and password-authenticated secret sharing. CoRR abs/1607.00468 (2016) - [i7]Johannes Braun, Johannes Buchmann, Denise Demirel, Mikio Fujiwara, Matthias Geihs, Shiho Moriai, Masahide Sasaki, Atsushi Waseda:
LINCOS - A Storage System Providing Long-Term Integrity, Authenticity, and Confidentiality (Full Paper). IACR Cryptol. ePrint Arch. 2016: 742 (2016) - 2015
- [j3]Mikio Fujiwara, Tomoyasu Domeki, Shiho Moriai, Masahide Sasaki:
Highly Secure Network Switches with Quantum Key Distribution Systems. Int. J. Netw. Secur. 17(1): 34-39 (2015) - [c19]Lihua Wang, Ryo Nojima, Shiho Moriai:
A Secure Automobile Information Sharing System. IoTPTS@AsiaCCS 2015: 19-26 - [c18]Lihua Wang, Takuya Hayashi
, Sachiko Kanamori, Atsushi Waseda, Ryo Nojima, Shiho Moriai:
POSTER: PRINCESS: A Secure Cloud File Storage System for Managing Data with Hierarchical Levels of Sensitivity. CCS 2015: 1684-1686 - [c17]Takashi Kurokawa, Ryo Nojima, Shiho Moriai:
Can We Securely Use CBC Mode in TLS1.0? ICT-EurAsia/CONFENIS 2015: 151-160 - 2014
- [c16]Bungo Taga, Shiho Moriai, Kazumaro Aoki:
Differential and Impossible Differential Related-Key Attacks on Hierocrypt-L1. ACISP 2014: 17-33 - [e2]Shiho Moriai, Trent Jaeger, Kouichi Sakurai:
9th ACM Symposium on Information, Computer and Communications Security, ASIA CCS '14, Kyoto, Japan - June 03 - 06, 2014. ACM 2014, ISBN 978-1-4503-2800-5 [contents] - [e1]Shiho Moriai:
Fast Software Encryption - 20th International Workshop, FSE 2013, Singapore, March 11-13, 2013. Revised Selected Papers. Lecture Notes in Computer Science 8424, Springer 2014, ISBN 978-3-662-43932-6 [contents] - 2012
- [c15]Seiichi Matsuda, Shiho Moriai:
Lightweight Cryptography for the Cloud: Exploit the Power of Bitslice Implementation. CHES 2012: 408-425 - 2011
- [i6]Masanobu Katagi, Shiho Moriai:
The 128-Bit Blockcipher CLEFIA. RFC 6114: 1-33 (2011)
2000 – 2009
- 2007
- [c14]Taizo Shirai, Kyoji Shibutani, Toru Akishita, Shiho Moriai, Tetsu Iwata:
The 128-Bit Blockcipher CLEFIA (Extended Abstract). FSE 2007: 181-195 - 2005
- [i5]Shiho Moriai, Akihiro Kato, Masayuki Kanda:
Addition of Camellia Cipher Suites to Transport Layer Security (TLS). RFC 4132: 1-7 (2005) - [i4]Akihiro Kato, Shiho Moriai, Masayuki Kanda:
The Camellia Cipher Algorithm and Its Use With IPsec. RFC 4312: 1-8 (2005) - 2004
- [i3]Shiho Moriai, Akihiro Kato:
Use of the Camellia Encryption Algorithm in Cryptographic Message Syntax (CMS). RFC 3657: 1-14 (2004) - [i2]Mitsuru Matsui, Junko Nakajima, Shiho Moriai:
A Description of the Camellia Encryption Algorithm. RFC 3713: 1-15 (2004) - 2002
- [j2]Kazumaro Aoki, Tetsuya Ichikawa, Masayuki Kanda, Mitsuru Matsui, Shiho Moriai, Junko Nakajima, Toshio Tokita:
The 128-Bit Block Cipher Camellia. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 85-A(1): 11-24 (2002) - [j1]Deukjo Hong, Jaechul Sung, Shiho Moriai, Sangjin Lee, Jongin Lim:
Impossible Differential Cryptanalysis of Zodiac. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 85-A(1): 38-43 (2002) - 2001
- [c13]Deukjo Hong, Jaechul Sung
, Shiho Moriai, Sangjin Lee, Jongin Lim:
Impossible Differential Cryptanalysis of Zodiac. FSE 2001: 300-311 - [c12]Helger Lipmaa, Shiho Moriai:
Efficient Algorithms for Computing Differential Properties of Addition. FSE 2001: 336-350 - [i1]Helger Lipmaa, Shiho Moriai:
Efficient Algorithms for Computing Differential Properties of Addition. IACR Cryptol. ePrint Arch. 2001: 1 (2001) - 2000
- [c11]Shiho Moriai, Serge Vaudenay:
On the Pseudorandomness of Top-Level Schemes of Block Ciphers. ASIACRYPT 2000: 289-302 - [c10]Kazumaro Aoki, Tetsuya Ichikawa, Masayuki Kanda, Mitsuru Matsui, Shiho Moriai, Junko Nakajima, Toshio Tokita:
Camellia: A 128-Bit Block Cipher Suitable for Multiple Platforms - Design and Analysis. Selected Areas in Cryptography 2000: 39-56
1990 – 1999
- 1999
- [c9]Shiho Moriai, Takeshi Shimoyama, Toshinobu Kaneko:
Interpolation Attacks of the Block Cipher: SNAKE. FSE 1999: 275-289 - [c8]Shiho Moriai, Makoto Sugita, Kazumaro Aoki, Masayuki Kanda:
Security of E2 against Truncated Differential Cryptanalysis. Selected Areas in Cryptography 1999: 106-117 - 1998
- [c7]Shiho Moriai, Takeshi Shimoyama, Toshinobu Kaneko:
Higher Order Differential Attak of CAST Cipher. FSE 1998: 17-31 - [c6]Shiho Moriai, Takeshi Shimoyama, Toshinobu Kaneko:
Higher Order Differential Attack Using Chosen Higher Order Differences. Selected Areas in Cryptography 1998: 106-117 - 1997
- [c5]Kazumaro Aoki, Kunio Kobayashi, Shiho Moriai:
Best Differential Characteristic Search of FEAL. FSE 1997: 41-53 - [c4]Yasuyoshi Kaneko, Shiho Moriai, Kazuo Ohta:
On strict estimation method of provable security against differential and linear cryptanalysis. ICICS 1997: 258-268 - [c3]Takeshi Shimoyama, Seiichi Amada, Shiho Moriai:
Improved fast software implementation of block ciphers. ICICS 1997: 269-273 - [c2]Takeshi Shimoyama, Shiho Moriai, Toshinobu Kaneko:
Improving the Higher Order Differential Attack and Cryptanalysis of the KN Cipher. ISW 1997: 32-42 - 1995
- [c1]Kazuo Ohta, Shiho Moriai, Kazumaro Aoki:
Improving the Search Algorithm for the Best Linear Expression. CRYPTO 1995: 157-170
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-20 22:52 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint