Engineering Sciences/NOLTA-Information Security(Date:2004/03/09)

Presentation
A Method for Analyzing Attacks Based on the Formal Description of Cryptographic Protocols

Takane UMAYAMA,  Maki YOSHIDA,  Toru FUJIWARA,  

[Date]2004/3/9
[Paper #]IT2003-111,ISEC2003-151,WBS2003-229
A trial of GNFS implementation (Part II) : mini-factoring & mini-primality test

Kazumaro AOKI,  Tetsuya IZU,  Hiroki UEDA,  Takeshi SHIMOYAMA,  

[Date]2004/3/9
[Paper #]IT2003-112,ISEC2003-152,WBS2003-230
A trial of GNFS implementation (Part III) : Filtering

Hiroki UEDA,  Kazumaro AOKI,  Yuji KIDA,  

[Date]2004/3/9
[Paper #]IT2003-113,ISEC2003-153,WBS2003-231
A trial of GNFS implementation (Part IV) : Matrix

Takeshi SHIMOYAMA,  Kazumaro AOKI,  Hiroki UEDA,  Yuji KIDA,  

[Date]2004/3/9
[Paper #]IT2003-114,ISEC2003-154,WBS2003-232
複写される方へ

,  

[Date]2004/3/9
[Paper #]
奥付

,  

[Date]2004/3/9
[Paper #]
<<123 41-46hit(46hit)