Shiho MORIAI


Related-Key Attacks on Reduced-Round Hierocrypt-L1
Bungo TAGA Shiho MORIAI Kazumaro AOKI 
Publication:   
Publication Date: 2017/01/01
Vol. E100-A  No. 1  pp. 126-137
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: 
Keyword: 
cryptanalysisHierocrypt-L1key scheduling differentials with probability 1related-key attacksimpossible differentialsCRYPTREC
 Summary | Full Text:PDF(1.1MB)

Impossible Differential Cryptanalysis of Zodiac
Deukjo HONG Jaechul SUNG Shiho MORIAI Sangjin LEE Jongin LIM 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2002/01/01
Vol. E85-A  No. 1  pp. 38-43
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: 
Keyword: 
Zodiacimpossible differential cryptanalysis
 Summary | Full Text:PDF(956.9KB)

The 128-Bit Block Cipher Camellia
Kazumaro AOKI Tetsuya ICHIKAWA Masayuki KANDA Mitsuru MATSUI Shiho MORIAI Junko NAKAJIMA Toshio TOKITA 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2002/01/01
Vol. E85-A  No. 1  pp. 11-24
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: 
Keyword: 
block cipherblock cipher designcryptanalysisCamellia
 Summary | Full Text:PDF(706.7KB)

Security of E2 against Truncated Differential Cryptanalysis
Shiho MORIAI Makoto SUGITA Masayuki KANDA 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2001/01/01
Vol. E84-A  No. 1  pp. 319-325
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: 
Keyword: 
E2truncated differential cryptanalysissearch algorithm
 Summary | Full Text:PDF(477.2KB)

E2--A New 128-Bit Block Cipher
Masayuki KANDA Shiho MORIAI Kazumaro AOKI Hiroki UEDA Youichi TAKASHIMA Kazuo OHTA Tsutomu MATSUMOTO 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2000/01/25
Vol. E83-A  No. 1  pp. 48-59
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: 
Keyword: 
encryption algorithmblock cipherE2AESdesign strategy
 Summary | Full Text:PDF(1.3MB)

An Efficient Interpolation Attack
Shiho MORIAI Takeshi SHIMOYAMA Toshinobu KANEKO 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2000/01/25
Vol. E83-A  No. 1  pp. 39-47
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: 
Keyword: 
cryptanalysisblock cipherinterpolation attackcomputer algebra systemSNAKE
 Summary | Full Text:PDF(512.4KB)

Improved Higher Order Differential Attack and Its Application to Nyberg-Knudsen's Designed Block Cipher
Takeshi SHIMOYAMA Shiho MORIAI Toshinobu KANEKO Shigeo TSUJII 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 1999/09/25
Vol. E82-A  No. 9  pp. 1971-1980
Type of Manuscript:  PAPER
Category: Information Security
Keyword: 
block cipherhigher order differential attackKN cipheralgebraic equation
 Summary | Full Text:PDF(596.5KB)

The Best Differential Characteristic Search of FEAL
Kazumaro AOKI Kunio KOBAYASHI Shiho MORIAI 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 1998/01/25
Vol. E81-A  No. 1  pp. 98-104
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: 
Keyword: 
search algorithmdifferential cryptanalysisbest differential characteristicFEAL
 Summary | Full Text:PDF(558.7KB)

Linear Cryptanalysis of FEAL
Kazumaro AOKI Kazuo OHTA Shiho MORIAI Mitsuru MATSUI 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 1998/01/25
Vol. E81-A  No. 1  pp. 88-97
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: 
Keyword: 
linear cryptanalysis1R-attack2R-attackeffective key bitseffective text bitsFEAL
 Summary | Full Text:PDF(776.8KB)

Key-Dependency of Linear Probability of RC5
Shiho MORIAI Kazumaro AOKI Kazuo OHTA 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 1997/01/25
Vol. E80-A  No. 1  pp. 9-18
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: 
Keyword: 
RC5linear cryptanalysislinear probabilityweak keykey-dependency
 Summary | Full Text:PDF(660.8KB)

The Best Linear Expression Search of FEAL
Shiho MORIAI Kazumaro AOKI Kazuo OHTA 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 1996/01/25
Vol. E79-A  No. 1  pp. 2-11
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: 
Keyword: 
Linear Cryptanalysisbest linear expressionFEALsearch algorithm
 Summary | Full Text:PDF(754.8KB)