Engineering Sciences/NOLTA-Information Security(Date:2000/01/26)

Presentation
表紙

,  

[Date]2000/1/26
[Paper #]
目次

,  

[Date]2000/1/26
[Paper #]
An Image Correction Scheme for Video Watermarking Extraction

Akihiko Kusanagi,  Hideki Imai,  

[Date]2000/1/26
[Paper #]ISEC99-95
A New Encryption Technology:Embedding Textual Document Into Image

Won H. Lee,  Seung W. Shin,  Jung S. Cho,  Jong U. Choi,  

[Date]2000/1/26
[Paper #]ISEC99-96
Fast Verification in Group Hash Timestamp

Jungsoo Byun,  

[Date]2000/1/26
[Paper #]ISEC99-97
A blind signature scheme without requiring random number

Choonsik Park,  Ju-Sung Kang,  

[Date]2000/1/26
[Paper #]ISEC99-98
On the Security of the Okamoto-Tanaka ID-Based Key Exchange Scheme against Active Attacks

Seungjoo Kim,  Masahiro Mambo,  Hiroki Shizuya,  Dongho Won,  

[Date]2000/1/26
[Paper #]ISEC99-99
Anonymity Achieved by Group Communication

Daisuke INOUE,  Tsutomu MATSUMOTO,  

[Date]2000/1/26
[Paper #]ISEC99-100
On the Hierarchical Structure of Trusted Authority for Unconditionally Secure Cryptography

Yohei Shibuya,  Goichiro Hanaoka,  Hideki Imai,  

[Date]2000/1/26
[Paper #]ISEC99-101
Universal Sampling Oracles and 3-Round Zero-Knowledge Protocols

Takeshi Koshiba,  

[Date]2000/1/26
[Paper #]ISEC99-102
[OTHERS]

,  

[Date]2000/1/26
[Paper #]