Akiko Inoue

Orcid: 0000-0002-0173-7245

According to our database1, Akiko Inoue authored at least 26 papers between 2017 and 2025.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2025
All You Need is XOR-Convolution: A Generalized Higher-Order Side-Channel Attack with Application to XEX/XE-based Encryptions.
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2025

Comprehensive Robustness Analysis of GCM, CCM, and OCB3.
Proceedings of the Topics in Cryptology - CT-RSA 2025, 2025

Cryptographic Treatment of Key Control Security - In Light of NIST SP 800-108.
Proceedings of the Advances in Cryptology - CRYPTO 2025, 2025

Generic Security of GCM-SST.
Proceedings of the Applied Cryptography and Network Security, 2025

2024
SoK: Pseudorandom Generation for Masked Cryptographic Implementation.
IACR Cryptol. ePrint Arch., 2024

Crystalor: Recoverable Memory Encryption Mechanism with Optimized Metadata Structure.
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, 2024

2023
Key Committing Security of AEZ and More.
IACR Trans. Symmetric Cryptol., 2023

Fallen Sanctuary: A Higher-Order and Leakage-Resilient Rekeying Scheme.
IACR Cryptol. ePrint Arch., 2023

Crystalor: Persistent Memory Encryption Mechanism with Optimized Metadata Structure and Fast Crash Recovery.
IACR Cryptol. ePrint Arch., 2023

XOCB: Beyond-Birthday-Bound Secure Authenticated Encryption Mode with Rate-One Computation (Full Version).
IACR Cryptol. ePrint Arch., 2023

PMACrx: A Vector-Input MAC for High-Dimensional Vectors with BBB Security.
Proceedings of the Advances in Information and Computer Security, 2023

XOCB: Beyond-Birthday-Bound Secure Authenticated Encryption Mode with Rate-One Computation.
Proceedings of the Advances in Cryptology - EUROCRYPT 2023, 2023

2022
Cryptanalysis of Rocca and Feasibility of Its Security Claim.
IACR Trans. Symmetric Cryptol., 2022

ELM: A Low-Latency and Scalable Memory Encryption Scheme.
IEEE Trans. Inf. Forensics Secur., 2022

Beyond full-bit secure authenticated encryption without input-length limitation.
IET Inf. Secur., 2022

Nonce-Misuse Resilience of Romulus-N and GIFT-COFB.
IACR Cryptol. ePrint Arch., 2022

Analyzing the Provable Security Bounds of GIFT-COFB and Photon-Beetle.
Proceedings of the Applied Cryptography and Network Security, 2022

2021
GIFT-COFB is Tightly Birthday Secure with Encryption Queries.
IACR Cryptol. ePrint Arch., 2021

Parallel Verification of Serial MAC and AE Modes.
Proceedings of the Selected Areas in Cryptography - 28th International Conference, 2021

2020
Highly Secure Nonce-based MACs from the Sum of Tweakable Block Ciphers.
IACR Trans. Symmetric Cryptol., 2020

Mediating Data Trustworthiness by Using Trusted Hardware between IoT Devices and Blockchain.
Proceedings of the 2020 IEEE International Conference on Smart Internet of Things, 2020

PMAC++: Incremental MAC Scheme Adaptable to Lightweight Block Ciphers.
Proceedings of the IEEE International Symposium on Circuits and Systems, 2020

2019
Parallelizable Authenticated Encryption with Small State Size.
Proceedings of the Selected Areas in Cryptography - SAC 2019, 2019

Cryptanalysis of OCB2: Attacks on Authenticity and Confidentiality.
Proceedings of the Advances in Cryptology - CRYPTO 2019, 2019

2018
Cryptanalysis of OCB2.
IACR Cryptol. ePrint Arch., 2018

2017
Secure and Efficient Pairing at 256-Bit Security Level.
Proceedings of the Applied Cryptography and Network Security, 2017


  Loading...