Personal information

No personal information available

Activities

Employment (1)

NEC Corporation (Japan): Kawasaki, JP

2017-04-01 to present (Security Research Laboratories)
Employment
Source: Self-asserted source
Akiko Inoue

Works (10)

Crystalor: Recoverable Memory Encryption Mechanism with Optimized Metadata Structure

2024-12-02 | Conference paper
Contributors: Rei Ueno; Hiromichi Haneda; Naofumi Homma; Akiko Inoue; Kazuhiko Minematsu
Source: check_circle
Crossref

PMAC$$r$$x: A Vector-Input MAC for High-Dimensional Vectors with BBB Security

2023 | Book chapter
Contributors: Isamu Furuya; Hayato Kasahara; Akiko Inoue; Kazuhiko Minematsu; Tetsu Iwata
Source: check_circle
Crossref

XOCB: Beyond-Birthday-Bound Secure Authenticated Encryption Mode with Rate-One Computation

2023 | Book chapter
Contributors: Zhenzhen Bao; Seongha Hwang; Akiko Inoue; Byeonghak Lee; Jooyoung Lee; Kazuhiko Minematsu
Source: check_circle
Crossref

Nonce‐misuse resilience of Romulus‐N and GIFT‐COFB

IET Information Security
2023-05 | Journal article
Contributors: Akiko Inoue; Chun Guo; Kazuhiko Minematsu
Source: check_circle
Crossref

ELM: A Low-Latency and Scalable Memory Encryption Scheme

IEEE Transactions on Information Forensics and Security
2022 | Journal article
Contributors: Akiko Inoue; Kazuhiko Minematsu; Maya Oda; Rei Ueno; Naofumi Homma
Source: check_circle
Crossref

Parallel Verification of Serial MAC and AE Modes

2022 | Book chapter
Contributors: Kazuhiko Minematsu; Akiko Inoue; Katsuya Moriwaki; Maki Shigeri; Hiroyasu Kubo
Source: check_circle
Crossref

Beyond full‐bit secure authenticated encryption without input‐length limitation

IET Information Security
2022-07 | Journal article
Contributors: Akiko Inoue
Source: check_circle
Crossref

Cryptanalysis of OCB2: Attacks on Authenticity and Confidentiality

Journal of Cryptology
2020-10 | Journal article
Contributors: Akiko Inoue; Tetsu Iwata; Kazuhiko Minematsu; Bertram Poettering
Source: check_circle
Crossref

Cryptanalysis of OCB2: Attacks on Authenticity and Confidentiality

CRYPTO (1)
2019 | Conference paper
Source: Self-asserted source
Akiko Inoue

Secure and Efficient Pairing at 256-Bit Security Level

ACNS
2017 | Conference paper
Source: Self-asserted source
Akiko Inoue