Engineering Sciences/NOLTA-Information Security(Date:1996/07/22)

Presentation
表紙

,  

[Date]1996/7/22
[Paper #]
目次

,  

[Date]1996/7/22
[Paper #]
Provable Security of DES-like Ciphers Depending on its Rounds

Yasuyoshi KANEKO,  

[Date]1996/7/22
[Paper #]ISEC96-8
Pseudorandomness of a Block Cipher MISTY

Makoto Sugita,  

[Date]1996/7/22
[Paper #]ISEC96-9
Linear Approximation Probability of Addition upon the Addend Dependency

Hiroshi MIYANO,  

[Date]1996/7/22
[Paper #]ISEC96-10
Block Encryption Algorithm MISTY

Mitsuru MATSUI,  

[Date]1996/7/22
[Paper #]ISEC96-11
On the (n-2) round method of Linear Cryptanalysis on DES-MAC

Souichi FURUYA,  Fumihiko SANO,  Kouichi SAKURAI,  

[Date]1996/7/22
[Paper #]ISEC96-12
Characteristic Search for DES Considering Effect of Adjacent S-boxes

Kazumaro AOKI,  Kazuyuki SHODOH,  

[Date]1996/7/22
[Paper #]ISEC96-13
A message recovery signature scheme equivalent to DSA

Atsuko Miyaji,  

[Date]1996/7/22
[Paper #]ISEC96-14
A Message Verification Scheme Based on Trapdoor One-Way Ring Homomorphisms

Eikoh Chida,  Motoji Ohmori,  Hiroki Shizuya,  Takao Nishizeki,  

[Date]1996/7/22
[Paper #]ISEC96-15
Scheme of Visual Secret Sharing as Digital Watermark

Ryujiro SHIBUYA,  Yuichi KAJI,  Tadao KASAMI,  

[Date]1996/7/22
[Paper #]ISEC96-16
The Transformability of Digital Signatures and Its Application to Solving the Oracle Problem

Masahiro MAMBO,  Kouichi SAKURAI,  Eiji OKAMOTO,  

[Date]1996/7/22
[Paper #]ISEC96-17
Efficient construction algorithms of secure hyperelliptic discrete logarithm problems

Nori Matsuda,  Jinhui Chao,  Shigeo Tsujii,  

[Date]1996/7/22
[Paper #]ISEC96-18
Computationally Secure ID-NIKS

Atsunori FUJIKAWA,  Yasuyuki MURAKAMI,  Masao KASAHARA,  

[Date]1996/7/22
[Paper #]ISEC96-19
Speeding up for Quadratic Sieve Method

Kunikatsu KOBAYASHI,  Qian Li,  Shinichi HOMMA,  

[Date]1996/7/22
[Paper #]ISEC96-20
Extension of Rabin Cryptosystem to Eisenstein Field

Tsuyoshi TAKAGI,  Shozo NAITO,  

[Date]1996/7/22
[Paper #]ISEC96-21
Extension of RSA Cryptosystem to Algebraic Field and Hastad Attack

Tsuyoshi TAKAGI,  Shozo NAITO,  

[Date]1996/7/22
[Paper #]ISEC96-22
[OTHERS]

,  

[Date]1996/7/22
[Paper #]