Engineering Sciences/NOLTA-Information Security(Date:1997/09/12)

Presentation
表紙

,  

[Date]1997/9/12
[Paper #]
目次

,  

[Date]1997/9/12
[Paper #]
Improving the Higher Order Differential Attack and Cryptanalysis of the KN Cipher

Takeshi Shimoyama,  Shiho Moriai,  Toshinobu Kaneko,  

[Date]1997/9/12
[Paper #]ISEC97-29
Design of Cryptosystems Based on Abelian Varieties over Extension Fields

Kazuto MATSUO,  Jinhui CHAO,  Shigeo TSUJII,  

[Date]1997/9/12
[Paper #]ISEC97-30
Factoring problem in bounded arithmetic

Mitsuru Tada,  

[Date]1997/9/12
[Paper #]ISEC97-31
On the Complexity of Languages Associated with Discrete Log Cryptosystems

Takaharu Oomi,  Hiroki Shizuya,  Takao Nishizeki,  

[Date]1997/9/12
[Paper #]ISEC97-32
An international approach to the TTP-based Key Escrow : Ecrowing government versus Non-Ecrowing government

Shingo MIYAZAKI,  Kouichi SAKURAI,  

[Date]1997/9/12
[Paper #]ISEC97-33
A design for commercial key recovery systems

Seiichi Domyo,  Hisashi Umeki,  

[Date]1997/9/12
[Paper #]ISEC
Blind Fingerprinting

Keiichi Iwamura,  Kouichi Sakurai,  Hideki Imai,  

[Date]1997/9/12
[Paper #]ISEC97-35
A Watermarking System that Prevents Server's Corruption with Small Communication Cost

Nobuharu Miura,  Sigeyuki Oonisi,  Hajime Watanabe,  Tadao Kasami,  

[Date]1997/9/12
[Paper #]ISEC97-36
A secure authenticated DiHie-Hellman key agreement protocol and its application to conference key distribution

Shouichi Hirose,  Susumu Yoshida,  

[Date]1997/9/12
[Paper #]ISEC97-37
[OTHERS]

,  

[Date]1997/9/12
[Paper #]