Engineering Sciences/NOLTA-Information Security(Date:2010/02/25)

Presentation
A Note on Practical Key Derivation Functions

Shoichi HIROSE,  

[Date]2010/2/25
[Paper #]IT2009-130,ISEC2009-138,WBS2009-109
Collision Attack on DM Compression Function Using Reduced AES-256

Tetsuya KOBAYASHI,  Shoichi HIROSE,  

[Date]2010/2/25
[Paper #]IT2009-131,ISEC2009-139,WBS2009-110
Reducing Disclosed Credentials in Automated Trust Negotiation Using Preference

Taichi HANAOKA,  Yoshimichi ITO,  Noboru BABAGUCHI,  

[Date]2010/2/25
[Paper #]IT2009-132,ISEC2009-140,WBS2009-111
Bio-metric Authentication using Motion Image of Speakers Face

Mari OZAKI,  Ryuichi SAKAI,  

[Date]2010/2/25
[Paper #]IT2009-133,ISEC2009-141,WBS2009-112
Existing Probability of Gauss Period Normal Basis

Kenta NEKADO,  Yasuyuki NOGAMI,  Yoshitaka MORIKAWA,  

[Date]2010/2/25
[Paper #]IT2009-134,ISEC2009-142,WBS2009-113
On Constant Weight Codes with Large Linear Complexity from Cyclic Difference Set

Takayasu KAIDA,  

[Date]2010/2/25
[Paper #]IT2009-135,ISEC2009-143,WBS2009-114
On the Redundancy Rate of FF and VF Source Codes for General Sources

Mitsuharu ARIMURA,  Ken-ichi IWATA,  

[Date]2010/2/25
[Paper #]IT2009-136,ISEC2009-144,WBS2009-115
Constructions of A Large Class of Optimum Linear Codes for Small Number of Information Symbols

Masao KASAHARA,  Shigeichi HIRASAWA,  

[Date]2010/2/25
[Paper #]IT2009-137,ISEC2009-145,WBS2009-116
Secure Key Rate of the BB84 Protocol using Finite Sample Bits

Yousuke SANO,  Ryutaroh MATSUMOTO,  Tomohiko UYEMATSU,  

[Date]2010/2/25
[Paper #]IT2009-138,ISEC2009-146,WBS2009-117
Bit Transmission Probability Maximizing the Key Rate of the BB84 Protocol

Sonny LUMBANTORUAN,  Ryutaroh MATSUMOTO,  Tomohiko UYEMATSU,  

[Date]2010/2/25
[Paper #]IT2009-139,ISEC2009-147,WBS2009-118
On the Capacity of the AND Anti-Collusion Fingerprinting Codes

Hiroki KOGA,  

[Date]2010/2/25
[Paper #]IT2009-140,ISEC2009-148,WBS2009-119
On Access Structures of Secret Sharing Scheme based on Bivariate Polynomial Interpolation Scheme

Hideaki KASHIWAGURA,  Mikihiko NISHIARA,  

[Date]2010/2/25
[Paper #]IT2009-141,ISEC2009-149,WBS2009-120
Secure Linear Network Coding using Surplus Resources

Tomoki KUBO,  Kunihiko HARADA,  Hirosuke YAMAMOTO,  

[Date]2010/2/25
[Paper #]IT2009-142,ISEC2009-150,WBS2009-121
Vulnerability of MRD-Code-based Universal Secure Network Coding against Stronger Eavesdroppers

Eitaro SHIOJI,  Ryutaroh MATSUMOTO,  Tomohiko UYEMATSU,  

[Date]2010/2/25
[Paper #]IT2009-143,ISEC2009-151,WBS2009-122
Construction of wiretap codes from ordinary channel codes

Masahito HAYASHI,  Ryutaroh MATSUMOTO,  

[Date]2010/2/25
[Paper #]IT2009-144,ISEC2009-152,WBS2009-123
Basics of Design and Analysis of Codes for Wiretap Channels

Mitsuru Hamada,  

[Date]2010/2/25
[Paper #]IT2009-145,ISEC2009-153,WBS2009-124
複写される方へ

,  

[Date]2010/2/25
[Paper #]
奥付

,  

[Date]2010/2/25
[Paper #]
<<1234 61-78hit(78hit)