Engineering Sciences/NOLTA-Information Security(Date:1999/09/24)

Presentation
表紙

,  

[Date]1999/9/24
[Paper #]
目次

,  

[Date]1999/9/24
[Paper #]
A Method for Masked Sharing of Group Keys (III)

Jun Anzai,  Natsume Matsuzaki,  Tsutomu Matsumoto,  

[Date]1999/9/24
[Paper #]ISEC99-38
A Remark on Solving the ECDLP Efficiently by Quantum Computing

Junji SHIKATA,  Joe SUZUKI,  Hideki IMAI,  

[Date]1999/9/24
[Paper #]ISEC99-39
共通鍵暗号 nMBAL16

,  

[Date]1999/9/24
[Paper #]ISEC99-40
Cryptanalysis of M8 (2) : a registered encryption algorithm in ISO9979 (No.20)

Toshio TOKITA,  

[Date]1999/9/24
[Paper #]ISEC99-41
On the Weakness in M8 Encryption Algorithm

Fumihiko SANO,  Tsutomu MATSUMOTO,  

[Date]1999/9/24
[Paper #]ISEC99-42
Two New Classes of Simple ID-based Cryptosystems

Masao KASAHARA,  

[Date]1999/9/24
[Paper #]ISEC99-43
New ID-NIKSs Using Non-Symmetric Matrices

Yasuyuki Murakami,  Ryuichi SAKAI,  Masao KASAHARA,  

[Date]1999/9/24
[Paper #]ISEC99-44
Several Methods for Realizing New Public Key Cryptosystems

Masao KASAHARA,  Yasuyuki MURAKAMI,  

[Date]1999/9/24
[Paper #]ISEC99-45
Notes on Product-Sum Type Public Key Cryptosystem

Ryuichi SAKAI,  Yasuyuki Murakami,  Masao KASAHARA,  

[Date]1999/9/24
[Paper #]ISEC99-46
Propose of a Fast Public Key Encryption Protocol

Takayuki UCHIHIRA,  Shunsuke ARAKI,  Takeru MIYAZAKI,  

[Date]1999/9/24
[Paper #]ISEC99-47
Integration of DLP-based cryptosystems

Atsuko Miyaji,  Hiroki Shizuya,  

[Date]1999/9/24
[Paper #]ISEC99-48
Crypto Library for Smart Cards

Masanobu Koike,  Fumihiko Sano,  Shinichi Kawamura,  Masue Shiba,  

[Date]1999/9/24
[Paper #]ISEC99-49
ビット位置攪乱通信方式 : 2値情報の存在秘匿による情報隠蔽転送

,  

[Date]1999/9/24
[Paper #]ISEC99-50
Report on International Workshop on Cryptographic Techniques & E-Commerce

Yasushi KAWAKURA,  Kouichi SAKURAI,  

[Date]1999/9/24
[Paper #]ISEC99-51
[OTHERS]

,  

[Date]1999/9/24
[Paper #]