Engineering Sciences/NOLTA-Information Security(Date:2000/09/21)

Presentation
表紙

,  

[Date]2000/9/21
[Paper #]
目次

,  

[Date]2000/9/21
[Paper #]
Information Hiding using Rigidly-Partitioned Rectangles, Part 1

Takashi Mano,  

[Date]2000/9/21
[Paper #]ISEC2000-58
Artifact-metric Systems

Hiroyuki MATSUMOTO,  Tsutomu MATSUMOTO,  

[Date]2000/9/21
[Paper #]ISEC2000-59
A Scheme of Meta Public Key Cryptosystem

Shigeo TSUJII,  Kazuto MATSUO,  

[Date]2000/9/21
[Paper #]ISEC2000-60
Efficient Signature Schemes Based on Factoring

Takeshi Okamoto,  Mitsuru Tada,  Atsuko Miyaji,  

[Date]2000/9/21
[Paper #]ISEC2000-61
Blind Group Signature

Kousetsu Sai,  Hiroaki Kikuchi,  Shohatiro Nakanishi,  

[Date]2000/9/21
[Paper #]ISEC2000-62
An approximate scheme of oblivious transfer with probabilistic receipt

Shouichi Hirose,  Susumu Yoshida,  

[Date]2000/9/21
[Paper #]ISEC2000-63
On Security Notions for Public-Key Encryption Schemes under Circumstances with Quasi-Random Resources : Semantic Security and Indistinguishability

Takeshi Koshiba,  

[Date]2000/9/21
[Paper #]ISEC2000-64
Public-Key Cryptosystem HIME

MOTOTSUGU NISHIOKA,  HISAYOSHI SATO,  YOICHI SETO,  

[Date]2000/9/21
[Paper #]ISEC2000-65
Public-key Encryption Schemes : EPOC-3 and PSEC-3

Tatsuaki Okamoto,  David Pointcheval,  

[Date]2000/9/21
[Paper #]ISEC2000-66
New explicit conditions of elliptic curve traces for FR-reductions

Atsuko Miyaji,  Masaki Nakabayashi,  Shunzou Takano,  

[Date]2000/9/21
[Paper #]ISEC2000-67
[OTHERS]

,  

[Date]2000/9/21
[Paper #]