Engineering Sciences/NOLTA-Information Security(Date:1994/03/18)

Presentation
表紙

,  

[Date]1994/3/18
[Paper #]
目次

,  

[Date]1994/3/18
[Paper #]
An efficient search algorithm for the best best expression on linear cryptanalysis

Toshio Tokita,  Tohru Sorimachi,  Mitsuru Matsui,  

[Date]1994/3/18
[Paper #]ISEC93-97
Two algorithms for modular exponentiation using nonstandard arithmetics

Vassil Dimitrov,  Todor Cooklev,  

[Date]1994/3/18
[Paper #]ISEC93-98
Verification of Unsecure Paths in Access Matrixes with AI Approach

Tetsuya Morizumi,  Hisao Suzuki,  Keisuke Usuda,  Shigeo Tsujii,  

[Date]1994/3/18
[Paper #]ISEC93-99
On Secure Elliptic Curves against the "Reduction Attack"and their Design Strategy

Jinhui Chao,  Kazuo Tanada,  Shigeo Tsujii,  

[Date]1994/3/18
[Paper #]ISEC93-100
A note on the DES-like cipher system with swapping structure

Toshiyuki Kikuchi,  Shinji Hata,  Hideo Nakano,  

[Date]1994/3/18
[Paper #]ISEC93-101
Internet and security

Hideo Nakano,  

[Date]1994/3/18
[Paper #]ISEC93-102
[OTHERS]

,  

[Date]1994/3/18
[Paper #]