Engineering Sciences/NOLTA-Information Security(Date:1998/12/12)

Presentation
表紙

,  

[Date]1998/12/12
[Paper #]
CONTENTS

,  

[Date]1998/12/12
[Paper #]
Search for Elliptic Curves of Characteristic 2

Chaoping XING SUFATRIO,  

[Date]1998/12/12
[Paper #]ISEC98-65
Higher Order Diferential Attack of MISTY1 without FL functions

Hidema TANAKA,  Kazuyuki HISAMATSU,  Toshinobu KANEKO,  

[Date]1998/12/12
[Paper #]ISEC98-66
Towards Secure and Fast Hash Functions

Takashi SATOH,  Mio HAGA,  Kaoru KUROSAWA,  

[Date]1998/12/12
[Paper #]ISEC98-67
An Experimental Study of Time-Memory Trade-Off Cryptanalysis with Hashing

Il-Jun Kim,  Tsutomu Matsumoto,  

[Date]1998/12/12
[Paper #]ISEC98-68
Electronic cash scheme for home shopping

JianBao Li,  Kwok Yan Lam,  

[Date]1998/12/12
[Paper #]ISEC98-69
[OTHERS]

,  

[Date]1998/12/12
[Paper #]