Engineering Sciences/NOLTA-Information Security(Date:2007/12/12)

Presentation
表紙

,  

[Date]2007/12/12
[Paper #]
目次

,  

[Date]2007/12/12
[Paper #]
Tests of Random Number and Autocorrelation Test for Cryptographic Applications

Yuichi TAKEDA,  Mituaki HUZII,  Toshinari KAMAKURA,  Norio WATANABE,  Takakazu SUGIYAMA,  

[Date]2007/12/12
[Paper #]ISEC2007-112
Verification of DPA against XOR in hardware implementation of AES

Yohei TSUJI,  Keisuke IWAI,  Takakazu KUROKAWA,  

[Date]2007/12/12
[Paper #]ISEC2007-113
How to design tables for power-analyses resistance of Table-network-based FPGA implementations of AES

Makoto TORIKOSHI,  Yoshio TAKAHASHI,  Tsutomu MATSUMOTO,  

[Date]2007/12/12
[Paper #]ISEC2007-114
An Integration Method of Incomplete Cryptographic System and Spread Spectrum Encoder

Ta MINH THANH,  Munetoshi IWAKIRI,  

[Date]2007/12/12
[Paper #]ISEC2007-115
An Applied Method of AES algorithm to Incomplete Cryptographic System

Ta MINH THANH,  Munetoshi IWAKIRI,  

[Date]2007/12/12
[Paper #]ISEC2007-116
A Study on Quantitative Evaluation Method of System Security

Daisaku HORIE,  

[Date]2007/12/12
[Paper #]ISEC2007-117
New Classes of Public Key Cryptosystem Constructed on the Basis of Multivariate Polynomials and Random Coding

Masao KASAHARA,  

[Date]2007/12/12
[Paper #]ISEC2007-118
A Knapsack Cryptosystem Using Two Operations

Atsushi IGARASHI,  Kunikatsu KOBAYASHI,  

[Date]2007/12/12
[Paper #]ISEC2007-119
A Consideration on Hitting Set Problem and Incidence Matrix

Kunikatsu KOBAYASHI,  

[Date]2007/12/12
[Paper #]ISEC2007-120
Efficiency Analysis of Multi-Scalar Multiplication using Direct Computation Method

Hisashi YAMADA,  Tsuyoshi TAKAGI,  Kouichi SAKURAI,  

[Date]2007/12/12
[Paper #]ISEC2007-121
Generalized EBRIP

Atsuko MIYAJI,  

[Date]2007/12/12
[Paper #]ISEC2007-122
An Implementation of a Privacy Enhancing SSL/TLS Protocol Based on Group Signatures

Hiroki OBAYASHI,  Toru NAKANISHI,  Jun KAWASHIMA,  Nobuo FUNABIKI,  

[Date]2007/12/12
[Paper #]ISEC2007-123
A Study of IBE to PKE Proxy Re-Encryption

Takeo MIZUNO,  Hiroshi DOI,  

[Date]2007/12/12
[Paper #]ISEC2007-124
Attribute-Based Encryption with Partially Hidden Ciphertext Policies

Takashi NISHIDE,  Kazuki YONEYAMA,  Kazuo OHTA,  

[Date]2007/12/12
[Paper #]ISEC2007-125
A Lossless Image Authentication Scheme for Tamper-Proofing

Tomoya TANAKA,  Koki ABE,  

[Date]2007/12/12
[Paper #]ISEC2007-126
A Classification and Feature Extraction based on the Static Analysis on the Computer Virus Codes

Kazuki IWAMOTO,  Katsumi WASAKI,  

[Date]2007/12/12
[Paper #]ISEC2007-127
Evaluation of a Detection System against Fuzzing Attacks on the SIP Protocol

Masaya OZAWA,  Eric Y. CHEN,  Mitsutaka ITOH,  Mitsutoshi HATORI,  

[Date]2007/12/12
[Paper #]ISEC2007-128
複写される方へ

,  

[Date]2007/12/12
[Paper #]
12>> 1-20hit(22hit)