Engineering Sciences/NOLTA-Information Security(Date:2001/05/10)

Presentation
表紙

,  

[Date]2001/5/10
[Paper #]
目次

,  

[Date]2001/5/10
[Paper #]
Historical Perspective on the Cryptography Technology : Its Primordial Form in Classical Sanskrit Literature

Tooru Aibai,  Shinji Yamane,  

[Date]2001/5/10
[Paper #]ISEC2001-1
A Method to Improve the Robustness of Video Watermarking

Koichi Kamijo,  

[Date]2001/5/10
[Paper #]ISEC2001-2
A few considerations on factoring algorithms

Tsutomu ANSAI,  Takahiro HAYATA,  Kunikatsu KOBAYASHI,  

[Date]2001/5/10
[Paper #]ISEC2001-3
A Simple Approach to Secretly Sharing a Factoring Witness in Publicly-Verifiable manner

Eiichiro Fujisaki,  

[Date]2001/5/10
[Paper #]ISEC2001-4
Clone Discovery Scheme Using Random Numbers (3)

Jun Anzai,  Natsume Matsuzaki,  Tsutomu Matsumoto,  

[Date]2001/5/10
[Paper #]ISEC2001-5
Security Notions of Unconditionally Secure Signature Schemes

Junji SHIKATA,  Goichiro HANAOKA,  Yuliang ZHENG,  Hideki IMAI,  

[Date]2001/5/10
[Paper #]ISBC2001-6
A Note of Collision of Pseudorandom Number Sequences

Hiroshi DOI,  Eiji OKAMOTO,  Shigeo TSUJII,  

[Date]2001/5/10
[Paper #]ISEC2001-7
A Keystream Generator Suitable for Software Implementation

Dai WATANABE,  Soichi FURUYA,  Yoichi SETO,  Kazuo TAKARAGI,  

[Date]2001/5/10
[Paper #]ISEC2001-8
A Study on Strength of Camellia against Higher Order Differential Attack

Takeshi KAWABATA,  Yasuhiro OHGAKI,  Toshinobu KANEKO,  

[Date]2001/5/10
[Paper #]ISEC2001-9
Differential/Linear Characteristics of the SC2000 Block Cipher (II)

Hitoshi Yanami,  Takashi Shimoyama,  

[Date]2001/5/10
[Paper #]ISEC2001-10
Pseudorandomness of SC2000

Jun Yajima,  Masahiko Takenaka,  Takeshi Koshiba,  Naoya Torii,  

[Date]2001/5/10
[Paper #]ISEC2001-11
[OTHERS]

,  

[Date]2001/5/10
[Paper #]