Engineering Sciences/NOLTA-Information Security(Date:1993/05/14)

Presentation
目次

,  

[Date]1993/5/14
[Paper #]
On a cipher evaluation method based on differential cryptanalysis

Tohru Sorimachi,  Mitsuru Matsui,  

[Date]1993/5/14
[Paper #]ISEC93-1
Secret sharing scheme and combinatorial Design

Youjin Song,  Shigeo Tsujii,  

[Date]1993/5/14
[Paper #]ISEC93-2
On preventing abuses of quited votes in Multi-Round secret voting schemes

Nobuhiro Tagashira,  Tsutomu Matsumoto,  Hideki Imai,  

[Date]1993/5/14
[Paper #]ISEC93-3
Breaking the Kobayashi-Fujinami-Tamura Linear Cryptosystem

Hideo Shimizu,  Akira Hayashi,  

[Date]1993/5/14
[Paper #]ISEC93-4
An extension of elliptic curve crypto systems over ring Zn.

Hidenori Kuwakado,  Kenji Koyama,  

[Date]1993/5/14
[Paper #]ISEC93-5
On the considerations to a collusion problem of a new type of ID- based key sharing system with different encryption and decryption keys

Shigeo Tsujii,  Kazuo Tanada,  Kiyomichi Araki,  Toshiaki Hasumi,  

[Date]1993/5/14
[Paper #]ISEC93-6
Nonlinear Pseudo-Random Sequence Generator with Dynamic Structure and Its Properties

Takashi Moriyasu,  Masakatsu Morii,  Masao Kasahara,  

[Date]1993/5/14
[Paper #]ISEC93-7
On ElGamal Cryptosystem with Fast Encoding and Decoding Algorithms.

Kenji Satake,  Masao Kasahara,  

[Date]1993/5/14
[Paper #]ISEC93-8
[OTHERS]

,  

[Date]1993/5/14
[Paper #]