Engineering Sciences/NOLTA-Information Security(Date:2000/07/18)

Presentation
表紙

,  

[Date]2000/7/18
[Paper #]
目次

,  

[Date]2000/7/18
[Paper #]
A modular exponentiation coprocessor for mobile telecommunication terminals

Jun Anzai,  Satoru Ito,  Natsume Matsuzaki,  Takehiko Kato,  

[Date]2000/7/18
[Paper #]ISEC2000-23
An Implementation of Cryptography on MPEG-4 IPMP System

Satoru Wakao,  Keiichi Iwamura,  Tsutomu Ando,  

[Date]2000/7/18
[Paper #]ISEC2000-24
Proposal of the anonymous handwriting function of an "on-door" communication system

Norihisa Segawa,  Hiromi Gondo,  Yasunari Nakamoto,  Shinji Yamane,  Yuko Murayama,  Masatoshi Miyazaki,  

[Date]2000/7/18
[Paper #]ISEC2000-25
Authentication system of PrivacyMark on the Internet : Methods of authenticating the graphic date on the Internet

Hiroyuki Kitano,  Mitsugu Sekimoto,  

[Date]2000/7/18
[Paper #]ISEC2000-26
A Digital Watermark using Clustering and Multiresolution Analysis of Image with Wavelet Transform

Kenji Murakami,  Yoshito Ueno,  

[Date]2000/7/18
[Paper #]ISEC2000-27
Watermarking Technique for Audio Data by Frequency Hopping Method

Munetoshi IWAKIRI,  Kineo MATSUI,  

[Date]2000/7/18
[Paper #]ISEC2000-28
A discussion on the redundancy of the programs

Naoki NAKAMURA,  Masakatsu NISHIGAKI,  Masakazu SOGA,  Akio TAKUBO,  

[Date]2000/7/18
[Paper #]ISEC2000-29
Alteration Detection Method in FinPri.txt

Ichiro Murase,  Kyoko Makino,  Ken-ichiro Akai,  Tsutomu Matsumoto,  

[Date]2000/7/18
[Paper #]ISEC2000-30
Surveillance after Key Escrow : Historical Analysis

Shinji Yamane,  Tooru Aiba,  Yuko Murayama,  

[Date]2000/7/18
[Paper #]ISEC2000-31
Discrete Logarithm Problem over Composite Modulus and Its Application to Cryptography

Koichi MATSUKAWA,  Takahiro HAYATA,  Kunikatsu KOBAYASHI,  

[Date]2000/7/18
[Paper #]ISEC2000-32
ISEC2000-33 On Counting the Rational Points on Hyperelliptic Curves of genus 2 over Finite Fields

Hisayoshi SATO,  Masashi TAKAHASHI,  

[Date]2000/7/18
[Paper #]ISEC2000-33
ISEC2000-34 秘密鍵を特定できない暗号

,  

[Date]2000/7/18
[Paper #]ISEC2000-34
Differential Attack on CAST-256

Haruki SEKI,  Toshinobu KANEKO,  

[Date]2000/7/18
[Paper #]ISEC2000-35
Differential Cryptanalysis of GOST(2)

Haruki SEKI,  Toshinobu KANEKO,  

[Date]2000/7/18
[Paper #]ISEC2000-36
A Study on the Upper Bounds of the Maximum Differential/Linear Characteristic Probabilities of Feistel ciphers with SPN round function

Masayuki KANDA,  

[Date]2000/7/18
[Paper #]ISEC2000-37
ISEC2000-38 Cryptanalysis of Twofish (II)

Shiho Moriai,  Yiqun Lisa Yin,  

[Date]2000/7/18
[Paper #]ISEC2000-38
On the Block Cipher Guidebook

Hideo Shimizu,  Haruki Seki,  Yoshiyasu Kaneko,  Hiroshi Miyano,  Toshinobu Kaneko,  

[Date]2000/7/18
[Paper #]ISEC2000-39
Next generation visual password tool : GATESCNE -The Image Password-

Kazunori Kashima,  

[Date]2000/7/18
[Paper #]ISEC2000-40
12>> 1-20hit(39hit)