Engineering Sciences/NOLTA-Information Security(Date:1999/11/09)

Presentation
表紙

,  

[Date]1999/11/9
[Paper #]
目次

,  

[Date]1999/11/9
[Paper #]
Modifying an Authentication Scheme to Compensate for Instability of Clone Resistant Modules

Kenji YAMAMOTOYA,  Hiroyuki MATSUMOTO,  Tsutomu MATSUMOTO,  

[Date]1999/11/9
[Paper #]ISEC99-65
On the Hierarchical Structure of Trusted Authority for Key Predistribution System

Yohei Shibuya,  Goichiro Hanaoka,  Hideki Imai,  

[Date]1999/11/9
[Paper #]ISEC99-66
Efficient Sealed-bid Auction by Sequentially Revealable Commitment

Koutarou SUZUKI,  

[Date]1999/11/9
[Paper #]ISEC99-67
Designated Confirmer Signature Scheme by Encrypting Signatures

Naoya Nakayama,  Shouichi Hirose,  Susumu Yoshida,  

[Date]1999/11/9
[Paper #]ISEC99-68
Do there exist 3-Round Zero-Knowledge Interactive Protocols?

Takeshi Koshiba,  

[Date]1999/11/9
[Paper #]ISEC99-69
Constraints on Making Has Functions from Block Ciphers Secure

Toru INOUE,  Kouichi SAKURAI,  

[Date]1999/11/9
[Paper #]ISEC99-70
Security of Generalized E2-like Transformations

Makoto Sugita,  Kazuhiro Uehara,  Shuji Kubota,  

[Date]1999/11/9
[Paper #]ISEC99-71
On the Diffusion Layer of Block Ciphers

Hideo Shimizu,  Toshinobu Kaneko,  

[Date]1999/11/9
[Paper #]ISEC99-72
Impossible Differential Attack to SAFER+

Hitoshi Imai,  Toshinobu Kaneko,  

[Date]1999/11/9
[Paper #]ISEC99-73
[OTHERS]

,  

[Date]1999/11/9
[Paper #]