Engineering Sciences/NOLTA-Information Security(Date:2002/07/12)

Presentation
表紙

,  

[Date]2002/7/12
[Paper #]
目次

,  

[Date]2002/7/12
[Paper #]
Proposal of Next-Generation Building Security System

Masaki FUJIKAWA,  Hiroshi DOI,  Shigeo TSUJII,  

[Date]2002/7/12
[Paper #]ISEC2002-34
A Note on an Anonymous Loan System

Rie SHIGETOMI,  Akira OTSUKA,  Takahide OGAWA,  Hideki IMAI,  

[Date]2002/7/12
[Paper #]ISEC2002-35
Proposal of Certified E-mail in consideration of Authentication and Scalability

Kenji IMAMOTO,  Kouichi SAKURAI,  

[Date]2002/7/12
[Paper #]ISEC2002-36
An English Auction Protocol with Proxy Bidding

Toru SHIOTSUKI,  Atuko MIYAJI,  

[Date]2002/7/12
[Paper #]ISEC2002-37
Key Management System for Digital Content Protection : Generalized Tree Pattern Division Scheme

Toshihisa NAKANO,  Natsume MATSUZAKI,  Makoto TATEBAYASHI,  

[Date]2002/7/12
[Paper #]ISEC2002-38
The Implementation of The Block Cipher SC2000 (III)

Masahiko TAKENAKA,  Helger Lipmaa,  Naoya TORII,  

[Date]2002/7/12
[Paper #]ISEC2002-39
Risks for Raw-key Masking : the Security of 2-key XCBC MAC-generation scheme

Soichi FURUYA,  Kouichi SAKURAI,  

[Date]2002/7/12
[Paper #]ISEC2002-40
An Attack of 6-round MISTY1 without FL functions

Hidema TANAKA,  Toshinobu KANEKO,  

[Date]2002/7/12
[Paper #]ISEC2002-41
Differential and Linear cryptanalysis of CIPHERUNICORN-A

Yukiyasu TSUNOO,  Hiroyasu KUBO,  Maki YAMADA,  Tomoyasu SUZAKI,  Hiroshi MIYAUCHI,  

[Date]2002/7/12
[Paper #]ISEC2002-42
A Design of Cryptographic Hash Function Group with Variable Output-Length Based on SHA-1

Yong-Sork HER,  Kouichi SAKURAI,  

[Date]2002/7/12
[Paper #]ISEC2002-43
Secret sharing scheme in World Wide master key system

Shuichi SUZUKI,  

[Date]2002/7/12
[Paper #]ISEC2002-44
Discussions on Unconditionally Secure VSS Robust against Dishonest Majority

Akira OTSUKA,  Junji SHIKATA,  Hideki IMAI,  

[Date]2002/7/12
[Paper #]ISEC2002-45
Locally PVSS Based on Unconditional Security

Daisuke KITO,  Akira OTSUKA,  Hideki IMAI,  

[Date]2002/7/12
[Paper #]ISEC2002-46
Digital Signature Schemes with Anonymous Signers

Hidenori KUWAKADO,  Hatsukazu TANAKA,  

[Date]2002/7/12
[Paper #]ISEC2002-47
A Digital Signature Scheme that can Verify Signing Hardware

Masashi UNE,  Tsutomu MATSUMOTO,  

[Date]2002/7/12
[Paper #]ISEC2002-48
A Method for Evaluating Reliability of Digital Signature Schemes with Linking Structure

Kunihiko MIYAZAKI,  Hiroshi YOSHIURA,  Mitsuru IWAMURA,  Tsutomu MATSUMOTO,  Ryoichi SASAKI,  

[Date]2002/7/12
[Paper #]ISEC2002-49
An extension of traitor tracing scheme using Weil-pairing on elliptic curves

Shigeo MITSUNARI,  Hideyuki WATANABE,  Maki YOSHIDA,  Ryuichi SAKAI,  Masao KASAHARA,  

[Date]2002/7/12
[Paper #]ISEC2002-50
Efficient exponentiation of Montgomery-type elliptic curves (2)

Yuichi FUTA,  Motoji OHMORI,  

[Date]2002/7/12
[Paper #]ISEC2002-51
12>> 1-20hit(26hit)