Engineering Sciences/NOLTA-Information Security(Date:1995/11/16)

Presentation
表紙

,  

[Date]1995/11/16
[Paper #]
目次

,  

[Date]1995/11/16
[Paper #]
0n sufficient conditions for secure iterated one way hash functions

Shouichi HIROSE,  Katsuo IKEDA,  

[Date]1995/11/16
[Paper #]ISEC95-24
How to make a software program hard to understand

Takanori MURAYAMA,  Masahiro MAMBO,  Eiji OKAMOTO,  Tomohiko UYEMATSU,  

[Date]1995/11/16
[Paper #]ISEC95-25
A Note on Communication Complexity of a Zeroknowledge Interactive Proof System for a Promise Problem

Masahiro MAMBO,  Eiji OKAMOTO,  

[Date]1995/11/16
[Paper #]ISEC95-26
A Cryptographic Approach to Copyright Protection of Digital Data

Tsutomu Matsumoto,  

[Date]1995/11/16
[Paper #]ISEC95-27
Protecting Privacy in Key Escrow Systems

Yoshinori YAMANE,  Kouichi SAKURAI,  

[Date]1995/11/16
[Paper #]ISEC95-28
Can Correlation-Immune Functions Resist Correlation Attack?

Guo-Zhen Xiao,  

[Date]1995/11/16
[Paper #]ISEC95-29
A Note on LC-Profiles and Correlations as Periodic Sequences of Complementary Pairs

Satoshi UEHARA,  kyoki IMAMURA,  

[Date]1995/11/16
[Paper #]ISEC95-30
[OTHERS]

,  

[Date]1995/11/16
[Paper #]