Engineering Sciences/NOLTA-Information Security(Date:1998/07/31)

Presentation
表紙

,  

[Date]1998/7/31
[Paper #]
目次

,  

[Date]1998/7/31
[Paper #]
ID-NIKS Based on RSA Cryptosystem Is Not Secure

TOSHIYA ITOH,  

[Date]1998/7/31
[Paper #]ISEC98-20
Notes on Some ID Based Non-Interactive Key Sharing Schemes

Yasuyuki MURAKAMI,  Yoshizo SATO,  Masao KASAHARA,  Shigeo TSUJII,  

[Date]1998/7/31
[Paper #]ISEC98-21
Notes on Methods for Generating Primes

Yoshizo SATO,  Yasuyuki MURAKAMI,  Masao KASAHARA,  

[Date]1998/7/31
[Paper #]ISEC98-22
A Remark on Frey-Ruck Attack.

,  

[Date]1998/7/31
[Paper #]ISEC98-23
Notes on Finding Elliptic Curve with Prime Order and the Amount of Calculation

Keiji HORIUCHI,  Yuuiti FUTA,  Ryuuichi SAKAI,  Masao KASAHARA,  

[Date]1998/7/31
[Paper #]ISEC98-24
On Fast Implementations for Elliptic Curve Cryptosystem

Kiyoshi OHGISHI,  Ryuichi SAKAI,  Masao KASAHARA,  

[Date]1998/7/31
[Paper #]ISEC98-25
High Rate Multiplicative Knapsack Cryptosystem

Masaya KIUCHI,  Yasuyuki MURAKAMI,  Masao KASAHARA,  

[Date]1998/7/31
[Paper #]ISEC98-26
A Note on the Discrete Logarithm Problem on Elliptic Curves of Trace Two

Shigenori UCHIYAMA,  Taiichi SAITOH,  

[Date]1998/7/31
[Paper #]ISEC98-27
[OTHERS]

,  

[Date]1998/7/31
[Paper #]