Engineering Sciences/NOLTA-Information Security(Date:2009/03/02)

Presentation
Theoretical analysis of RC4 PRGA by Using Nonzero Bit Differences with pseudo-colliding key pair (2)

Mitsuki AJIRO,  Masahiro SUKEGAWA,  Atsuko MIYAJI,  

[Date]2009/3/2
[Paper #]IT2008-81,ISEC2008-139,WBS2008-94
The Distinguishing Attack on the Stream Cipher Consisting of the SPN Structure

Rei ONGA,  Ryoichi TERAMURA,  Masakatu MORII,  

[Date]2009/3/2
[Paper #]IT2008-82,ISEC2008-140,WBS2008-95
Bit Slice Cryptanalysis of Simplified K2 Stream Cipher

Takashi OHSHIMA,  Munetoshi IWAKIRI,  

[Date]2009/3/2
[Paper #]IT2008-83,ISEC2008-141,WBS2008-96
Improvement of LFSR Initial State Reconstruction Algorithm in Fast Correlation Attack Using Dynamically Constructed Parity Check Equations

Hiroaki SAITOH,  Masami MOHRI,  Youji FUKUTA,  Yoshiaki SHIRAISHI,  

[Date]2009/3/2
[Paper #]IT2008-84,ISEC2008-142,WBS2008-97
A Note on the Security of Cryptographic Hash Functions

Shoichi HIROSE,  

[Date]2009/3/2
[Paper #]IT2008-85,ISEC2008-143,WBS2008-98
Formalizing Security of Hash Functions Against Length-Extension Attacks

Hidenori KUWAKADO,  Shoichi HIROSE,  

[Date]2009/3/2
[Paper #]IT2008-86,ISEC2008-144,WBS2008-99
AURORA: A Cryptographic Hash Algorithm Family

Tetsu IWATA,  Kyoji SHIBUTANI,  Taizo SHIRAI,  Shiho MORIAI,  Toru AKISHITA,  

[Date]2009/3/2
[Paper #]IT2008-87,ISEC2008-145,WBS2008-100
Hardware Implementations of the Cryptographic Hash Function Family AURORA

Toru AKISHITA,  Tadaoki YAMAMOTO,  Hiroyuki ABE,  

[Date]2009/3/2
[Paper #]IT2008-88,ISEC2008-146,WBS2008-101
Composition of functionalities in UC framework

Tadashi ARARAGI,  Chunhua SU,  Kouichi SAKURAI,  

[Date]2009/3/2
[Paper #]IT2008-89,ISEC2008-147,WBS2008-102
Multi-receiver Authentication Codes with Secrecy and Revocation Capability for Multiple Message Transmissions

Shinpei CHIBA,  Takahiro YOSHIDA,  Nuttapong ATTRAPADUNG,  Hideki IMAI,  

[Date]2009/3/2
[Paper #]IT2008-90,ISEC2008-148,WBS2008-103
A Study of Multicast Encryption Key Management Suitable for Frequent Member Replacement

Harumine YOSHIBA,  Hidehiko TANAKA,  

[Date]2009/3/2
[Paper #]IT2008-91,ISEC2008-149,WBS2008-104
On incident forecasting using independent component analysis

Eisuke NISHINO,  Jun'ichi TAKEUCHI,  Katsunari YOSHIOKA,  Daisuke INOUE,  Masashi ETO,  Koji NAKAO,  

[Date]2009/3/2
[Paper #]IT2008-92,ISEC2008-150,WBS2008-105
A study of incident detection based on correlation analysis between network traffic time series

Jnu'ya KITAGAWA,  Jnu'ichi TAKEUCHI,  Katsunari YOSHIOKA,  Daisuke INOUE,  Masashi ETO,  Koji NAKAO,  

[Date]2009/3/2
[Paper #]IT2008-93,ISEC2008-151,WBS2008-106
Detecting anomalies by monitoring terminals in Home Network

Kengo KUNIYOSHI,  Masakatu MORII,  

[Date]2009/3/2
[Paper #]IT2008-94,ISEC2008-152,WBS2008-107
Traffic Data Visualization of a Campus-wide Network

Shun MATSUMOTO,  Takao MIYAMOTO,  Shigeki AOKI,  Motoi IWATA,  Akira SHIOZAKI,  

[Date]2009/3/2
[Paper #]IT2008-95,ISEC2008-153,WBS2008-108
A proof of universality of the source coding by most frequent match

Yangao LIN,  Tomohiko UYEMATSU,  Ryutaroh MATSUMOTO,  

[Date]2009/3/2
[Paper #]IT2008-96,ISEC2008-154,WBS2008-109
A Necessary and Sufficient Condition for the Existence of a Universal Fixed-Rate Lossless Code

Shigeaki KUZUOKA,  

[Date]2009/3/2
[Paper #]IT2008-97,ISEC2008-155,WBS2008-110
Universal Lossless Source Coding Based on Sequential Grammar Transforms

Masaki JONO,  Tomohiko UYEMATSU,  Ryutaroh MATSUMOTO,  

[Date]2009/3/2
[Paper #]IT2008-98,ISEC2008-156,WBS2008-111
Adaptive Antidictionary Data Compression Using a Set of Restricted Length of Minimal Forbidden Words

Takahiro OTA,  Hiroyoshi MORITA,  

[Date]2009/3/2
[Paper #]IT2008-99,ISEC2008-157,WBS2008-112
Closed Forms of the Achievable Rate Region for Wyner's Source Coding Systems

Tetsunao MATSUTA,  Tomohiko UYEMATSU,  Ryutaroh MATSUMOTO,  

[Date]2009/3/2
[Paper #]IT2008-100,ISEC2008-158,WBS2008-113
<<12345>> 41-60hit(93hit)