Engineering Sciences/NOLTA-Information Security(Date:1995/12/14)

Presentation
表紙

,  

[Date]1995/12/14
[Paper #]
目次

,  

[Date]1995/12/14
[Paper #]
On the Cardinality of Elements each with a Given Order in Z^*_n

Hideo Suzuki,  Tadao Nakamura,  

[Date]1995/12/14
[Paper #]ISEC95-31
On the Reduced Recognition of a Primitive Element in Z^*_n

Hideo Suzuki,  Tadao Nakamura,  Tetsuo Ikeda,  

[Date]1995/12/14
[Paper #]ISEC95-32
A Uniquely Decipherable Rabin-type Scheme over Elliptic Curves

Hidenori Kuwakado,  Kenji Koyama,  

[Date]1995/12/14
[Paper #]ISEC95-33
New attacks on non-interactive ID-based key sharing scheme of power operations and multiplications

Atsunori FUJIKAWA,  Yasuyuki MURAKAMI,  Masao KASAHARA,  

[Date]1995/12/14
[Paper #]ISEC95-34
Weakness in Message recovery signature schemes based on discrete logarithm problems 2

Atsuko Miyaji,  

[Date]1995/12/14
[Paper #]ISEC95-35
Known Difference Attack of A Public Key Cryptosystem

Tsutomu Matsumoto,  

[Date]1995/12/14
[Paper #]ISEC95-36
Extensions of the Linear Cryptanalysis

Makoto Sugita,  

[Date]1995/12/14
[Paper #]ISEC95-37
On Evaluating the Security of Message Authentication Codes: An Experimental Analysis

Nobuhiro AKAHOSHI,  Souichi FURUYA,  Kohichi SAKURAI,  

[Date]1995/12/14
[Paper #]ISEC95-38