Engineering Sciences/NOLTA-Information Security(Date:1998/11/20)

Presentation
表紙

,  

[Date]1998/11/20
[Paper #]
目次

,  

[Date]1998/11/20
[Paper #]
[CATALOG]

,  

[Date]1998/11/20
[Paper #]
A study on the collision search of MD5

Naoki TAJIMA,  Akihiro OHKAWA,  Toshinobu KANEKO,  

[Date]1998/11/20
[Paper #]ISEC98-36
On an attack to MISTY1 without FL functions using 6th order differentials

Hidema TANAKA,  Kazuyuki HISAMATU,  Toshinobu KANEKO,  

[Date]1998/11/20
[Paper #]ISEC98-37
A study of E2 higher order differential attack

Yuji HORI,  Toshinobu KANEKO,  

[Date]1998/11/20
[Paper #]ISEC98-38
Higher Order Differential of the Round Function of SERPENT : An AES Candidate

Jun YAJIMA,  Takeshi SHIMOYAMA,  Shigeo TSUJII,  

[Date]1998/11/20
[Paper #]ISEC98-39
Experimental results of cryptanalysis of RC5 (1)

Hiroki MITSUYA,  Takeshi SHIMOYAMA,  Shigeo TSUJI,  

[Date]1998/11/20
[Paper #]ISEC98-40
AES Report

Shinichi Kawamura,  

[Date]1998/11/20
[Paper #]ISEC98-41
A Method for Voting Protocols with regards to Privacy

Shigeo Tsujii,  Hiroshi Yamaguchi,  Atsushi Kitazawa,  Kaoru Kurosawa,  

[Date]1998/11/20
[Paper #]ISEC98-42
A Signature Protocol Using ESIGN Signature Scheme with Shared Plaintext

Hideyuki SAITO,  Kunikatsu KOBAYASHI,  

[Date]1998/11/20
[Paper #]ISEC98-43
An Authentication Scheme that Automatically Updates Secret Data Stored in a Verifier

Hiromi KUBOTA,  Tsutomu MATSUMOTO,  

[Date]1998/11/20
[Paper #]ISEC98-44
Classification and Security of Off-line Electronic Money Systems

Shingo MIYAZAKI,  Kouichi SAKURAI,  

[Date]1998/11/20
[Paper #]ISEC98-45
How to Enhance the Security of Public-Key Encryption at Minimum Cost

Eiichiro FUJISAKI,  Tatsuaki OKAMOTO,  

[Date]1998/11/20
[Paper #]ISEC98-46
A Report on Fifth Annual Workshop on Selected Areas in Cryptography (SAC'98) and CRYPTO'98

Masayuki Kanda,  Takeshi Shimiyama,  

[Date]1998/11/20
[Paper #]ISEC98-47
[OTHERS]

,  

[Date]1998/11/20
[Paper #]