Engineering Sciences/NOLTA-Information Security(Date:1999/07/22)

Presentation
表紙

,  

[Date]1999/7/22
[Paper #]
目次

,  

[Date]1999/7/22
[Paper #]
[CATALOG]

,  

[Date]1999/7/22
[Paper #]
Efficient Attack Algorithms on Power-Product Type 10-NIKS

Masafumi KUSAKAWA,  Yasuyuki MURAKAMI,  Masao KASAHARA,  

[Date]1999/7/22
[Paper #]ISEC99-11
Reusable Secret Sharing Schemes

Kiyoko KATAYANAGI,  Yasuyuki MURAKAMI,  Ryuuichi SAKAI,  Masao KASAHARA,  

[Date]1999/7/22
[Paper #]ISEC99-12
New Probabilistic IDNIKS and Its Analysis

Ryuichi SAKAI,  Yasuyuki Murakami,  Masao KASAHARA,  

[Date]1999/7/22
[Paper #]ISEC99-13
Common-key Sharing Scheme Based on Double Exponential Function

Masao KASAHARA,  Yasuyuki MURAKAMI,  Shigeo TSUJII,  

[Date]1999/7/22
[Paper #]ISEC99-14
Fast Multiplicative Public Cryptosystems

Shinya KIUCHI,  Yasuyuki MURAKAMI,  Masao KASAHARA,  

[Date]1999/7/22
[Paper #]ISEC99-15
New Public-Key Cryptosystems

Masao KASAHARA,  Yasuyuki MURAKAMI,  

[Date]1999/7/22
[Paper #]ISEC99-16
A Report on the Second AES Conferernce and the Sixth FSE Conference

Mitsuru MATSUI,  Toshio TOKITA,  

[Date]1999/7/22
[Paper #]ISEC99-17
Linear Approximate Characteristic Probability of E2

Yasuyoshi Kaneko,  

[Date]1999/7/22
[Paper #]ISEC99-18
Differential Path Search of the Block Cipher E2

Mitsuru MATSUI,  

[Date]1999/7/22
[Paper #]ISEC99-19
Security of E2 against Truncated Differential Cryptanalysis

Shiho Moriai,  Makoto Sugita,  Kazumaro Aoki,  Masayuki Kanda,  

[Date]1999/7/22
[Paper #]ISEC99-20
Truncated Differential Search Using Graph Algorithms

Miyako Ohkubo,  Shiho Moriai,  

[Date]1999/7/22
[Paper #]ISEC99-21
Differential Attack on CRYPTON

Haruki SEKI,  Toshinobu KANEKO,  

[Date]1999/7/22
[Paper #]ISEC99-22
Strength of Round Function in RC6 against Higher Order Differential Attac

Hiroshi TANAKA,  Hidema TANAKA,  Toshinobu KANEKO,  

[Date]1999/7/22
[Paper #]ISEC99-23
Cryptanalysis of M8 : a registered encryption algorithm in ISO9979(No.20)

Toshio TOKITA,  

[Date]1999/7/22
[Paper #]ISEC99-24
On the Weak Keys in M8 Encryption System

Toshinobu Kaneko,  

[Date]1999/7/22
[Paper #]ISEC99-25
[OTHERS]

,  

[Date]1999/7/22
[Paper #]