Engineering Sciences/NOLTA-Information Security(Date:1996/09/06)

Presentation
表紙

,  

[Date]1996/9/6
[Paper #]
目次

,  

[Date]1996/9/6
[Paper #]
A Secret Voting Protocol Using a Group Signature Scheme

Toru Nakanishi,  Toru Fujiwara,  Hajime Watanabe,  

[Date]1996/9/6
[Paper #]ISEC-96-23
Identification bypasses on TRMs

Kazukuni Kobara,  Hideki Imai,  

[Date]1996/9/6
[Paper #]ISEC-96-24
On Increasing the Number of Shares of Visual Secret Sharing Scheme

Taku KATOH,  Hideki IMAI,  

[Date]1996/9/6
[Paper #]ISEC-96-
Computation of the k-Error Linear Complexity of Binary Sequences with Period 2^n

Takayasu Kaida,  Satoshi Uehara,  Kyoki Imamura,  

[Date]1996/9/6
[Paper #]ISEC-96-26
On Function Interface of Software Cryptographic Toolkit

Hidenori Ohta,  Takeshi Chikazawa,  Mitsuru Matsui,  

[Date]1996/9/6
[Paper #]ISEC-96-27
On Design of a Benchmark Program for Secret Key Ciphers

Yasuyuki Sakai,  Mitsuru Matsui,  

[Date]1996/9/6
[Paper #]ISEC-96-28
On the power of probabilistic counting in linear cryptanalysis of LOKI91

Souichi FURUYA,  Kouichi SAKURAI,  

[Date]1996/9/6
[Paper #]ISEC-96-29
Product Style Approximation Cryptanalysis of DES

Akihisa TERASHIMA,  Toshinobu KANEKO,  

[Date]1996/9/6
[Paper #]ISEC-96-30
Best Differential Characteristic Search of FEAL

Kazumaro AOKI,  Kunio Kobayashi,  Shiho MORIAI,  

[Date]1996/9/6
[Paper #]ISEC-96-31
On a Cipher Evaluation Method of RC5 (II)

Tohru SORIMACHI,  Mitsuru MATSUI,  

[Date]1996/9/6
[Paper #]ISEC-96-32
[OTHERS]

,  

[Date]1996/9/6
[Paper #]