Engineering Sciences/NOLTA-Information Security(Date:1998/07/30)

Presentation
表紙

,  

[Date]1998/7/30
[Paper #]
目次

,  

[Date]1998/7/30
[Paper #]
Delayed Dynamics for Encryption

Toru Ohira,  

[Date]1998/7/30
[Paper #]ISEC98-10
Block Encryption Algorithm MKC1

Koichi MATSUKAWA,  Kunikatsu KOBAYASHI,  

[Date]1998/7/30
[Paper #]ISEC98-11
A New 128-bit Block Cipher E2

Masayuki KANDA,  Shiho MORIAI,  Kazumaro AOKI,  Hiroki UEDA,  Miyako OHKUBO,  Youichi TAKASHIMA,  Kazuo OHTA,  Tsutomu MATSUMOTO,  

[Date]1998/7/30
[Paper #]ISEC98-12
S-box design considering the security against known attacks on block ciphers

Shiho Moriai,  Kazumaro Aoki,  Masayuki Kanda,  Youichi Takashima,  Kazuo Ohta,  

[Date]1998/7/30
[Paper #]ISEC98-13
A Complete Cyclic Analysis of RSA Cryptosystem, II

Hideo Suzuki,  

[Date]1998/7/30
[Paper #]ISEC98-14
Unforgeability Problem for a Class of Protocols Using Signatures

Maki YOSHIDA,  Toru FUJIWARA,  

[Date]1998/7/30
[Paper #]ISEC98-15
An International Key Escrow System with Distributed Trusted Third Agencies

Shingo MIYAZAKI,  Ikuko KURODA,  Kouichi SAKURAI,  

[Date]1998/7/30
[Paper #]ISEC98-16
Distributed Time-Key Protocol Based On Boneh and Franklin's Shared RSA Keys Method

Michiharu Kudo,  

[Date]1998/7/30
[Paper #]ISEC98-17
Proactive Secret Sharing without A Mutually Trusted Party : An application for key registry

Masayuki Numao,  

[Date]1998/7/30
[Paper #]ISEC98-18
a Report on Fast software Encryption Workshop '98

Shiho Moriai,  Takeshi Shimoyama,  Masayuki Kanda,  Fumihiko Sano,  Mitsuru Matsui,  

[Date]1998/7/30
[Paper #]ISEC98-19
[OTHERS]

,  

[Date]1998/7/30
[Paper #]