Engineering Sciences/NOLTA-Information Security(Date:1998/12/11)

Presentation
表紙

,  

[Date]1998/12/11
[Paper #]
CONTENTS

,  

[Date]1998/12/11
[Paper #]
Provable Security of Practical Public-Key Encryption Systems

Tatsuaki Okamoto,  

[Date]1998/12/11
[Paper #]ISEC98-56
An Electronic Exchange Check with Prevention of Double-Spending

Oun Seong Hwang,  Dan Hyung Lee,  Chang Soon Park,  

[Date]1998/12/11
[Paper #]ISEC98-57
Secure Access Control Agent for Distributed Files

Shigeki KITAZAWA,  Eiji OKAMOTO,  Masahiro MAMBO,  

[Date]1998/12/11
[Paper #]ISEC98-58
Secure Agent-Mediated Mobile Payment

Xiao Feng Wang,  Kwok Yan Lam,  Xun Yi,  

[Date]1998/12/11
[Paper #]ISEC98-59
Finite Fields for Software Implementation of Elliptic Curve Cryptosystems

Qiao Guopei,  Kwok-Yan Lam,  

[Date]1998/12/11
[Paper #]ISEC98-60
An Implementation of KPS with Distributed Trust

Goichiro Hanaoka,  Kanta Matsuura,  Hidenori Shida,  Hideki Imai,  

[Date]1998/12/11
[Paper #]ISEC98-61
Distributed Generation of RSA-Key for Three or More Parties

Maki YOSHIDA,  Toru FUJIWARA,  

[Date]1998/12/11
[Paper #]ISEC98-62
The Algeblaic Degree and Security of Generalized PURE Ciphers

Yasuyoshi Kaneko,  Toshinobu Kaneko,  

[Date]1998/12/11
[Paper #]ISEC98-63
How to identify all cheaters in Pinch's scheme

Chan Yeob Yeun,  Chris J. Mitchell,  

[Date]1998/12/11
[Paper #]ISEC98-64
[OTHERS]

,  

[Date]1998/12/11
[Paper #]