Author of the publication

LINCOS: A Storage System Providing Long-Term Integrity, Authenticity, and Confidentiality.

, , , , , , , and . AsiaCCS, page 461-468. ACM, (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

No persons found for author name Moriai, Shiho
add a person with the name Moriai, Shiho
 

Other publications of authors with the same name

Camellia: A 128-Bit Block Cipher Suitable for Multiple Platforms - Design and Analysis., , , , , , and . Selected Areas in Cryptography, volume 2012 of Lecture Notes in Computer Science, page 39-56. Springer, (2000)Related-Key Attacks on Reduced-Round Hierocrypt-L1., , and . IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 100-A (1): 126-137 (2017)Toward securing tire pressure monitoring systems: A case of PRESENT-based implementation., , and . ISITA, page 403-407. IEEE, (2016)Privacy-Preserving Deep Learning via Additively Homomorphic Encryption., , , , and . IACR Cryptology ePrint Archive, (2017)Highly Secure Network Switches with Quantum Key Distribution Systems., , , and . Int. J. Netw. Secur., 17 (1): 34-39 (2015)Impossible Differential Cryptanalysis of Zodiac., , , , and . IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 85-A (1): 38-43 (2002)Privacy-Preserving Deep Learning via Additively Homomorphic Encryption., , , , and . IEEE Trans. Inf. Forensics Secur., 13 (5): 1333-1345 (2018)A Description of the Camellia Encryption Algorithm., , and . RFC, (April 2004)Improved fast software implementation of block ciphers., , and . ICICS, volume 1334 of Lecture Notes in Computer Science, page 269-273. Springer, (1997)Best Differential Characteristic Search of FEAL., , and . FSE, volume 1267 of Lecture Notes in Computer Science, page 41-53. Springer, (1997)