Engineering Sciences/NOLTA-Information Security(Date:2002/09/13)

Presentation
表紙

,  

[Date]2002/9/13
[Paper #]
目次

,  

[Date]2002/9/13
[Paper #]
A Fast Cryptographically Strong Pseudorandom Generator Based on the Discrete Logarithm Problem

Takeshi KOSHIBA,  

[Date]2002/9/13
[Paper #]ISEC2002-57
On a Generalized Security Proof of Luby-Rackoff Cipher

Kazuhiko MINEMATSU,  Yukiyasu TSUNOO,  

[Date]2002/9/13
[Paper #]ISEC2002-58
Address-bit Differential Power Analysis of OK-ECDH and OK-ECDSA

Kouichi ITOH,  Tetsuya IZU,  Masahiko TAKENAKA,  

[Date]2002/9/13
[Paper #]ISEC2002-59
A DPA Attack Breaks a Window-based Countermeasure against Side Channel Attacks

Katsuyuki OKEYA,  Kouichi SAKURAI,  

[Date]2002/9/13
[Paper #]ISEC2002-60
A study for an evaluation method of performance of ciphers implemented on a PDA (Personal Digital Assistant) platform

Hiroyuki NOMIYAMA,  Toshikiyo TANAKA,  Akira SHIRAISHI,  Seiichi HASEGAWA,  Masahiro NAKAGAWA,  

[Date]2002/9/13
[Paper #]ISEC2002-61
偶数次拡大体上の種数2超楕円曲線暗号に対するWeil descent attackについて

Seigo ARITA,  

[Date]2002/9/13
[Paper #]ISEC2002-62
Cryptographic Schemes based on Pairing over Elliptic Curve(Part3)

Ryuichi SAKAI,  Masao KASAHARA,  

[Date]2002/9/13
[Paper #]ISEC2002-63
Notes on group signature schemes with pairing over elliptic curves

Hiroyuki OKAZAKI,  Ryuich SAKAI,  Kiyoshi SHIBAYAMA,  Masao KASAHARA,  

[Date]2002/9/13
[Paper #]ISEC2002-64
Inseparable Multiplex Transmission Scheme Using the Pairing on Elliptic Curves

Maki YOSHIDA,  Shigeo MITSUNARI,  Toru FUJIWARA,  

[Date]2002/9/13
[Paper #]ISEC2002-65
An Attack against a Traitor Tracing Based on Pairing and a Public Key Scheme

Goichiro HANAOKA,  Junji SHIKATA,  Hideki IMAI,  

[Date]2002/9/13
[Paper #]ISEC2002-66
A Construction of A New Public Key Cryptosystems on the Basis of Multivariate Polynomials of High Degree : A Method Yielding Short Public Key Cryptosystem and Short Digital Signature Scheme

Masao KASAHARA,  Ryuichi SAKAI,  

[Date]2002/9/13
[Paper #]ISEC2002-67
How to Deal with Key Exposure in Identity-Based Schemes

Yumiko HANAOKA,  Goichiro HANAOKA,  Junji SHIKATA,  Hideki IMAI,  

[Date]2002/9/13
[Paper #]ISEC2002-68
The (Im)Possibility of Asymmetric Authentication Codes with Dishonest Arbiters

Goichiro HANAOKA,  Junji SHIKATA,  Yumiko HANAOKA,  Hideki IMAI,  

[Date]2002/9/13
[Paper #]ISEC2002-69
Proposal of Copyrights Protection Method not Specify the Terminal to Use

Masaki INAMURA,  Toshiaki TANAKA,  Koji NAKAO,  Shinsaku KIYOMOTO,  

[Date]2002/9/13
[Paper #]ISEC2002-70
[OTHERS]

,  

[Date]2002/9/13
[Paper #]