Engineering Sciences/NOLTA-Information Security(Date:2002/11/07)

Presentation
表紙

,  

[Date]2002/11/7
[Paper #]
目次

,  

[Date]2002/11/7
[Paper #]
A note on extending Kedlaya's order counting method

Joe SUZUKI,  

[Date]2002/11/7
[Paper #]ISEC2002-71
Efficient Jacobian Group Arithmetic on Algebraic Curves

Ryuichi HARASAWA,  

[Date]2002/11/7
[Paper #]ISEC2002-72
A key agreement scheme based on a ring with mutually commutative actions of semi-groups

Go YAMAMOTO,  Shigenori UCHIYAMA,  

[Date]2002/11/7
[Paper #]ISEC2002-73
OAEP Reconsidered+

Yuichi KOMANO,  Kazuo OHTA,  

[Date]2002/11/7
[Paper #]ISEC2002-74
A Fast Forward-Secure Signature Scheme based on DL with Unlimited Number of Key-Updating

Eiichiro FUJISAKI,  

[Date]2002/11/7
[Paper #]ISEC2002-75
Weak Collision-Resistance for Variable Input Length Can Imply Collision-Resistance for Fixed Input Length

Shoichi HIROSE,  

[Date]2002/11/7
[Paper #]ISEC2002-76
Analysis of Hash Function Collision for MicroMint Schemes

Satoshi AOKI,  Kazuo OHTA,  Junko FUKUSHIMA,  

[Date]2002/11/7
[Paper #]ISEC2002-77
Several New Methods for Protecting Digital Rights : Proposals from the Standpoints of Information Security

Masao KASAHARA,  

[Date]2002/11/7
[Paper #]ISEC2002-78
A New Public-Key Traitor Tracing Scheme

Masafumi KUSAKAWA,  Taizo SHIRAI,  Jouji ABE,  

[Date]2002/11/7
[Paper #]ISEC2002-79
Proposal and Its Implementation of Secure Time Synchronization Protocol

Akira YAMADA,  Shinsaku KIYOMOTO,  Toshiaki TANAKA,  Koji NAKAO,  

[Date]2002/11/7
[Paper #]ISEC2002-80
An Impersonation Attack on One-Time Password Authentication Protocol OSPA

Takasuke TSUJI,  Akihiro SHIMIZU,  

[Date]2002/11/7
[Paper #]ISEC2002-81
The damage and its measures of "SPAM mails" in Japan

Masataka SAWAKI,  Masahiko OKADA,  Kazuko KATASE,  

[Date]2002/11/7
[Paper #]ISEC2002-82
[OTHERS]

,  

[Date]2002/11/7
[Paper #]