Engineering Sciences/NOLTA-Information Security(Date:1993/08/30)

Presentation
表紙

,  

[Date]1993/8/30
[Paper #]
目次

,  

[Date]1993/8/30
[Paper #]
[CATALOG]

,  

[Date]1993/8/30
[Paper #]
A cryptosystem on Elliptic Curves and its Properties(2)

Ryuichi Sakai,  Masao Kasahara,  

[Date]1993/8/30
[Paper #]ISE93-23
Practical Secret Voting Schemes Using Polling Places

Eiichiro Fujisaki,  Kazuo Ohta,  Tatsuaki Okamoto,  

[Date]1993/8/30
[Paper #]ISEC93-24
Non-Interactive Protocols for Global Coin Tossing and Shared Pseudo-Random Secrets Generation

Manuel Cerecedo,  Tsutomu Matsumoto,  Hideki Imai,  

[Date]1993/8/30
[Paper #]ISEC93-25
A Credit System that Prevents from Granting a Credit over Consumers′ Abilities

Kenji Yamamotoya,  Tsutomu Matsumoto,  Hideki Imai,  

[Date]1993/8/30
[Paper #]ISEC93-26
A Method of Discretionary Access Control Preventing Indirect Information Leakage

Hyung Suck Kang,  Tsutomu Matsumoto,  Hideki Imai,  

[Date]1993/8/30
[Paper #]ISEC93-27
A Note on the Security of an Implicit Asking Protocol for Block- Based Fingerprint Verification

Satoshi Ozaki,  Tsutomu Matsumoto,  Hideki Imai,  

[Date]1993/8/30
[Paper #]ISEC93-28
Practical Cryptosystems Using Quadratic Residue Pseudo-Random Number Generators and Block Ciphers

Takahisa Yamamoto,  Keiichi Iwamura,  Tsutomu Matsumoto,  Hideki Imai,  

[Date]1993/8/30
[Paper #]ISEC93-29
On the Security of Secret Key Block Ciphers

Hikaru Morita,  Masao Aoyama,  Shoji Miyaguchi,  

[Date]1993/8/30
[Paper #]ISEC93-30
CRYPTO'93 Program(Preliminary)

Toshiya Itoh,  

[Date]1993/8/30
[Paper #]ISEC93-31
[OTHERS]

,  

[Date]1993/8/30
[Paper #]