Engineering Sciences/NOLTA-Information Security(Date:1998/05/15)

Presentation
表紙

,  

[Date]1998/5/15
[Paper #]
目次

,  

[Date]1998/5/15
[Paper #]
A Consideration on Factoring Using Floor Functions

Kunikatsu KOBAYASHI,  Hideyuki SAITO,  Shinnichi HOMMA,  Qian LI,  

[Date]1998/5/15
[Paper #]
Fast Correlation Attacks on a Nonlinear Filter Generator with a Modular LFSR

Kouichi SUGIMOTO,  Takashi SATOH,  Kaoru KUROSAWA,  

[Date]1998/5/15
[Paper #]
A round function structure consisting of few s-boxes (Part III)

Masayuki KANDA,  Youichi TAKASHIMA,  Tsutomu MATSUMOTO,  Kazumaro AOKI,  Kazuo OHTA,  

[Date]1998/5/15
[Paper #]
Higher Order Differential Attack of Block Ciphers MISTY1, 2

Makoto Sugita,  

[Date]1998/5/15
[Paper #]
Higher Order Differential Attack of MISTY without FL functions

Hidema TANAKA,  Kazuyuki HISAMATU,  Toshinobu KANEKO,  

[Date]1998/5/15
[Paper #]
Efficient Private Information Retrieval

TOSHIYA ITOH,  

[Date]1998/5/15
[Paper #]
An Interactive Protocol for Image Fingerprinting

Kensuke BABA,  Kazukuni KOBARA,  Keiichi IWAMURA,  Yuliang ZHENG,  Hideki IMAI,  

[Date]1998/5/15
[Paper #]
A Construction Method of CMP(Crypto Microprocessor)and Its Applications

Toshinare SUEMATSU,  Hideki IMAI,  

[Date]1998/5/15
[Paper #]
Report on Second International Conference Financial Cryptography '98

Shingo MIYAZAKI,  Ryuutarou YOSHIDA,  Go NAGASUE,  Kouichi SAKURAI,  

[Date]1998/5/15
[Paper #]
[OTHERS]

,  

[Date]1998/5/15
[Paper #]