Engineering Sciences/NOLTA-Information Security(Date:1999/07/23)

Presentation
表紙

,  

[Date]1999/7/23
[Paper #]
目次

,  

[Date]1999/7/23
[Paper #]
Efficient construction of elliptic curves over optimal extension field

Yuichi Futa,  Atsuko Miyaji,  

[Date]1999/7/23
[Paper #]ISEC99-26
A remark on the MOV algorithm

Taiichi SAITO,  Shigenori UCHIYAMA,  

[Date]1999/7/23
[Paper #]ISEC99-27
Tracing and Masking Traitors

Maki YOSHIDA,  Toru FUJIWARA,  

[Date]1999/7/23
[Paper #]ISEC99-28
Anonymnous Communication Using Multicasting

Daisuke INOUE,  Tsutomu MATSUMOTO,  

[Date]1999/7/23
[Paper #]ISEC99-29
Efficient sealed-bid auction with quarntitative competition using one-way functions

Kunio Kobayashi,  Hikaru Morita,  

[Date]1999/7/23
[Paper #]ISEC99-30
Optimal Construction of ID-Based Key Sharing Scheme for Large-Scale Networks

Gochiro HANAOKA,  Tsuyoshi NISHIOKA,  Hideki IMAI,  

[Date]1999/7/23
[Paper #]ISEC99-31
Cryptograplay using a multi-affine key system

Shuichi Suzuki,  

[Date]1999/7/23
[Paper #]ISEC99-32
Time-Memory Thade-Off Cryptanalysis with Bitslice Implementation

Tsutomu MATSUMOTO,  Daiki KATO,  

[Date]1999/7/23
[Paper #]ISEC99-33
Safety-Provable Steganography

Shin Natori,  Hiroshi Imai,  

[Date]1999/7/23
[Paper #]ISEC99-34
Analysis of Authentication Protocols by Parametarized BAN Logic

Takamichi SAITO,  Wu WEN,  Fumio MIZOGUCHI,  

[Date]1999/7/23
[Paper #]ISEC99-35
Probabilistic Analysis on Proactive Security against Latent Virus Attacks

Yuji Watanabe,  Hideki Imai,  

[Date]1999/7/23
[Paper #]ISEC99-36
A Report of EUROCRYPT'99

Masayuki Abe,  Tetsutaro Kobayashi,  

[Date]1999/7/23
[Paper #]ISEC99-37
[OTHERS]

,  

[Date]1999/7/23
[Paper #]