Engineering Sciences/NOLTA-Information Security(Date:1997/12/19)

Presentation
表紙

,  

[Date]1997/12/19
[Paper #]
目次

,  

[Date]1997/12/19
[Paper #]
[CATALOG]

,  

[Date]1997/12/19
[Paper #]
Implementation of Schoof's Algorithm modified by Atkin-Elkies

Jun KOGURE,  Tetsuya IZU,  Kazuhiro YOKOYAMA,  

[Date]1997/12/19
[Paper #]ISEC97-53
Public Key Cryptosystems with C_ Curve (1)

Seigo Arita,  

[Date]1997/12/19
[Paper #]ISEC97-54
A New Public-Key Cryptosystem as Secure as Factoring

Shigenori UCHIYAMA,  Tatsuaki OKAMOTO,  

[Date]1997/12/19
[Paper #]ISEC97-55
A Non-Interactive Identity-Based Cryptosystem

Tatsuaki OKAMOTO,  Shigenori UCHIYAMA,  

[Date]1997/12/19
[Paper #]ISEC97-56
A sufficient condition for unforgeability problem for the receipt of any message to be decidable

Maki Yoshida,  Toru Fujiwara,  

[Date]1997/12/19
[Paper #]ISEC97-57
Access Control Infrastructure with Attributes

Kouji Yamaoka,  Hiroyuki Masumoto,  

[Date]1997/12/19
[Paper #]ISEC97-58
On Constructing Tamper Resistant Software

Akiteru KAMOSHIDA,  Tsutomu MATSUMOTO,  Shingo INOUE,  

[Date]1997/12/19
[Paper #]ISEC97-59
On computing and using Look-Up Tables in Time-Memory Trade-Off Cryptanalysis

Iljun KIM,  Takashi HARA,  Tsutomu MATSUMOTO,  

[Date]1997/12/19
[Paper #]ISEC97-60
Cryptanalysis of Discrete Logarithm Cryptosystems Using Timing Attacks

Masaoki ISHIKAWA,  Eiji OKAMOTO,  

[Date]1997/12/19
[Paper #]ISEC97-61
On Algeblaic Degree and Security of Generalized PURE Ciphers

Yasuyoshi Kaneko,  Toshinobu Kaneko,  

[Date]1997/12/19
[Paper #]ISEC97-62
Higher Order Differential Attack of a CAST Cipher (I)

Shiho Moriai,  Takeshi Shimoyama,  Toshinobu Kaneko,  

[Date]1997/12/19
[Paper #]ISEC97-63
A Report on CRYPTO'97

Eiichiro Fujisaki,  Masahiro Mambo,  Shiho Moriaki,  

[Date]1997/12/19
[Paper #]ISEC97-64
[OTHERS]

,  

[Date]1997/12/19
[Paper #]