Engineering Sciences/NOLTA-Information Security(Date:1994/05/20)

Presentation
表紙

,  

[Date]1994/5/20
[Paper #]
目次

,  

[Date]1994/5/20
[Paper #]
Hardware-oriented modular-multiplication method with quotient modification

Masayuki Abe,  Hikaru Morita,  

[Date]1994/5/20
[Paper #]ISEC94-1
Low exponent attack against elliptic curve RSA

Kaoru Kurosawa,  Shigeo Tsujii,  

[Date]1994/5/20
[Paper #]ISEC94-2
Undeniable Electronic Anonymous Biddig Protocol

Toru Nakanishi,  Hajime Watanabe,  Toru Fujiwara,  Tadao Kasami,  

[Date]1994/5/20
[Paper #]ISEC94-3
Breaking the Tanaka-Kobayashi partially super-increasing knapsack cryptosystem

Atsushi Tomioka,  Hideo Shimizu,  Akira Hayashi,  

[Date]1994/5/20
[Paper #]ISEC94-4
Linear Cryptanalysis of the Fast Data Encipherment Algorithm

Kazuo Ohta,  Kazumaro Aoki,  

[Date]1994/5/20
[Paper #]ISEC94-5
Linear Cryptanalysis of FEAL-8(Experimentation Report)

Kazumaro Aoki,  Kazuo Ohta,  Shiho Araki,  Mitsuru Matsui,  

[Date]1994/5/20
[Paper #]ISEC94-6
A Server-Aided RSA Computation Protocol In Two Rounds

Shin-ichi Kawamura,  

[Date]1994/5/20
[Paper #]ISEC94-7
[OTHERS]

,  

[Date]1994/5/20
[Paper #]