Engineering Sciences/NOLTA-Information Security(Date:2002/12/09)

Presentation
表紙

,  

[Date]2002/12/9
[Paper #]
目次

,  

[Date]2002/12/9
[Paper #]
Divisible Voting Scheme

Shin'ichiro MATSUO,  Wakaha OGATA,  

[Date]2002/12/9
[Paper #]ISEC2002-96
A Fair Distribution Scheme of Stocks by Using Hash Function in Book-building

Agus Fanar Syukri,  Hikaru MORITA,  Tetsuro SAISHO,  Taiichi SAITO,  

[Date]2002/12/9
[Paper #]ISEC2002-97
Protecting Software Programs by Replacing Instructions at Run-time

Yuichiro KANZAKI,  Akito MONDEN,  Masahide NAKAMURA,  Ken-ichi MATSUMOTO,  

[Date]2002/12/9
[Paper #]ISEC2002-98
Private communications using chaotic neurons with cascade structure.

Yukimasa ABE,  Kiyofumi TSUTSUMI,  Hiroyuki KAMATA,  Tetsuro ENDO,  

[Date]2002/12/9
[Paper #]ISEC2002-99
The Security of RC6 against χ^2-attack

Norihisa ISOGAI,  Atsuko MIYAJI,  

[Date]2002/12/9
[Paper #]ISEC2002-100
Discussion on security of the TSP cryptosystem

Takahiro MINAMI,  Akira HAYASHI,  

[Date]2002/12/9
[Paper #]ISEC2002-101
Efficient exponentiation on Genus Two Hyperelliptic Curves

Naoyuki TAKAHASHI,  Atsuko MIYAJI,  

[Date]2002/12/9
[Paper #]ISEC2002-102
Fast Elliptic Curve Multiplications with SIMD Operations

Tetsuya IZU,  Tsuyoshi TAKAGI,  

[Date]2002/12/9
[Paper #]ISEC2002-103
A Multiple Power Analysis Attack against Side Channel Attack Countermeasure MIST

Katsuyuki OKEYA,  

[Date]2002/12/9
[Paper #]ISEC2002-104
[OTHERS]

,  

[Date]2002/12/9
[Paper #]