default search action
Akiko Inoue
Person information
SPARQL queries
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j8]Rei Ueno, Naofumi Homma, Akiko Inoue, Kazuhiko Minematsu:
Fallen Sanctuary: A Higher-Order and Leakage-Resilient Rekeying Scheme. IACR Trans. Cryptogr. Hardw. Embed. Syst. 2024(1): 264-308 (2024) - [c10]Rei Ueno, Hiromichi Haneda, Naofumi Homma, Akiko Inoue, Kazuhiko Minematsu:
Crystalor: Recoverable Memory Encryption Mechanism with Optimized Metadata Structure. CCS 2024: 228-242 - [i14]Akiko Inoue, Tetsu Iwata, Kazuhiko Minematsu:
Comprehensive Robustness Analysis of GCM, CCM, and OCB3. IACR Cryptol. ePrint Arch. 2024: 1339 (2024) - [i13]Akiko Inoue, Ashwin Jha, Bart Mennink, Kazuhiko Minematsu:
Generic Security of GCM-SST. IACR Cryptol. ePrint Arch. 2024: 1928 (2024) - [i12]Rei Ueno, Naofumi Homma, Akiko Inoue, Kazuhiko Minematsu:
SoK: Pseudorandom Generation for Masked Cryptographic Implementation. IACR Cryptol. ePrint Arch. 2024: 1968 (2024) - 2023
- [j7]Akiko Inoue, Chun Guo, Kazuhiko Minematsu:
Nonce-misuse resilience of Romulus-N and GIFT-COFB. IET Inf. Secur. 17(3): 468-484 (2023) - [j6]Yu Long Chen, Antonio Flórez-Gutiérrez, Akiko Inoue, Ryoma Ito, Tetsu Iwata, Kazuhiko Minematsu, Nicky Mouha, Yusuke Naito, Ferdinand Sibleyras, Yosuke Todo:
Key Committing Security of AEZ and More. IACR Trans. Symmetric Cryptol. 2023(4): 452-488 (2023) - [c9]Zhenzhen Bao, Seongha Hwang, Akiko Inoue, ByeongHak Lee, Jooyoung Lee, Kazuhiko Minematsu:
XOCB: Beyond-Birthday-Bound Secure Authenticated Encryption Mode with Rate-One Computation. EUROCRYPT (4) 2023: 532-561 - [c8]Isamu Furuya, Hayato Kasahara, Akiko Inoue, Kazuhiko Minematsu, Tetsu Iwata:
PMACrx: A Vector-Input MAC for High-Dimensional Vectors with BBB Security. IWSEC 2023: 77-97 - [i11]Zhenzhen Bao, Seongha Hwang, Akiko Inoue, ByeongHak Lee, Jooyoung Lee, Kazuhiko Minematsu:
XOCB: Beyond-Birthday-Bound Secure Authenticated Encryption Mode with Rate-One Computation (Full Version). IACR Cryptol. ePrint Arch. 2023: 253 (2023) - [i10]Rei Ueno, Naofumi Homma, Akiko Inoue, Kazuhiko Minematsu:
Fallen Sanctuary: A Higher-Order and Leakage-Resilient Rekeying Scheme. IACR Cryptol. ePrint Arch. 2023: 1213 (2023) - [i9]Rei Ueno, Hiromichi Haneda, Naofumi Homma, Akiko Inoue, Kazuhiko Minematsu:
Crystalor: Persistent Memory Encryption Mechanism with Optimized Metadata Structure and Fast Crash Recovery. IACR Cryptol. ePrint Arch. 2023: 1630 (2023) - 2022
- [j5]Akiko Inoue:
Beyond full-bit secure authenticated encryption without input-length limitation. IET Inf. Secur. 16(4): 253-261 (2022) - [j4]Akiko Inoue, Kazuhiko Minematsu, Maya Oda, Rei Ueno, Naofumi Homma:
ELM: A Low-Latency and Scalable Memory Encryption Scheme. IEEE Trans. Inf. Forensics Secur. 17: 2628-2643 (2022) - [j3]Akinori Hosoyamada, Akiko Inoue, Ryoma Ito, Tetsu Iwata, Kazuhiko Minematsu, Ferdinand Sibleyras, Yosuke Todo:
Cryptanalysis of Rocca and Feasibility of Its Security Claim. IACR Trans. Symmetric Cryptol. 2022(3): 123-151 (2022) - [c7]Akiko Inoue, Tetsu Iwata, Kazuhiko Minematsu:
Analyzing the Provable Security Bounds of GIFT-COFB and Photon-Beetle. ACNS 2022: 67-84 - [i8]Akiko Inoue, Tetsu Iwata, Kazuhiko Minematsu:
Analyzing the Provable Security Bounds of GIFT-COFB and Photon-Beetle. IACR Cryptol. ePrint Arch. 2022: 1 (2022) - [i7]Akiko Inoue, Kazuhiko Minematsu:
Parallelizable Authenticated Encryption with Small State Size. IACR Cryptol. ePrint Arch. 2022: 331 (2022) - [i6]Akiko Inoue, Chun Guo, Kazuhiko Minematsu:
Nonce-Misuse Resilience of Romulus-N and GIFT-COFB. IACR Cryptol. ePrint Arch. 2022: 1012 (2022) - 2021
- [c6]Kazuhiko Minematsu, Akiko Inoue, Katsuya Moriwaki, Maki Shigeri, Hiroyasu Kubo:
Parallel Verification of Serial MAC and AE Modes. SAC 2021: 200-219 - [i5]Akiko Inoue, Kazuhiko Minematsu:
GIFT-COFB is Tightly Birthday Secure with Encryption Queries. IACR Cryptol. ePrint Arch. 2021: 737 (2021) - [i4]Kazuhiko Minematsu, Akiko Inoue, Katsuya Moriwaki, Maki Shigeri, Hiroyasu Kubo:
Parallel Verification of Serial MAC and AE Modes. IACR Cryptol. ePrint Arch. 2021: 1283 (2021) - 2020
- [j2]Akiko Inoue, Tetsu Iwata, Kazuhiko Minematsu, Bertram Poettering:
Cryptanalysis of OCB2: Attacks on Authenticity and Confidentiality. J. Cryptol. 33(4): 1871-1913 (2020) - [j1]Wonseok Choi, Akiko Inoue, ByeongHak Lee, Jooyoung Lee, Eik List, Kazuhiko Minematsu, Yusuke Naito:
Highly Secure Nonce-based MACs from the Sum of Tweakable Block Ciphers. IACR Trans. Symmetric Cryptol. 2020(4): 39-70 (2020) - [c5]Maya Oda, Rei Ueno, Akiko Inoue, Kazuhiko Minematsu, Naofumi Homma:
PMAC++: Incremental MAC Scheme Adaptable to Lightweight Block Ciphers. ISCAS 2020: 1-4 - [c4]Batnyam Enkhtaivan, Akiko Inoue:
Mediating Data Trustworthiness by Using Trusted Hardware between IoT Devices and Blockchain. SmartIoT 2020: 314-318 - [i3]Akiko Inoue, Kazuhiko Minematsu, Maya Oda, Rei Ueno, Naofumi Homma:
ELM : A Low-Latency and Scalable Memory Encryption Scheme. IACR Cryptol. ePrint Arch. 2020: 1374 (2020)
2010 – 2019
- 2019
- [c3]Akiko Inoue, Tetsu Iwata, Kazuhiko Minematsu, Bertram Poettering:
Cryptanalysis of OCB2: Attacks on Authenticity and Confidentiality. CRYPTO (1) 2019: 3-31 - [c2]Akiko Inoue, Kazuhiko Minematsu:
Parallelizable Authenticated Encryption with Small State Size. SAC 2019: 618-644 - [i2]Akiko Inoue, Tetsu Iwata, Kazuhiko Minematsu, Bertram Poettering:
Cryptanalysis of OCB2: Attacks on Authenticity and Confidentiality. IACR Cryptol. ePrint Arch. 2019: 311 (2019) - 2018
- [i1]Akiko Inoue, Kazuhiko Minematsu:
Cryptanalysis of OCB2. IACR Cryptol. ePrint Arch. 2018: 1040 (2018) - 2017
- [c1]Yutaro Kiyomura, Akiko Inoue, Yuto Kawahara, Masaya Yasuda, Tsuyoshi Takagi, Tetsutaro Kobayashi:
Secure and Efficient Pairing at 256-Bit Security Level. ACNS 2017: 59-79
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-21 00:03 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint