Engineering Sciences/NOLTA-Information Security(Date:2004/07/13)

Presentation
表紙

,  

[Date]2004/7/13
[Paper #]
目次

,  

[Date]2004/7/13
[Paper #]
A Method for Checking the Parity of (#E-1)/2

Mayumi OBARA,  Yasuyuki NOGAMI,  Yoshitaka MORIKAWA,  

[Date]2004/7/13
[Paper #]ISEC2004-13
A Fast Square Root Computation in Some Finite Fields

Feng WANG,  Yasuyuki NOGAMI,  Yoshitaka MORIKAWA,  

[Date]2004/7/13
[Paper #]ISEC2004-14
A Hardware Organization of High-Radix Modular Multiplication for RSA Cryptosystem

Yi GE,  Takao SAKURAI,  Koki ABE,  Shuichi SAKAI,  

[Date]2004/7/13
[Paper #]ISEC2004-15
Secure Double Block Length Hash Functions Based on Abreast/Tandem Davies-Meyer

Shoichi HIROSE,  

[Date]2004/7/13
[Paper #]ISEC2004-16
A More Efficient Modification of KASUMI Type Pseudorandom Permutations

Wonil LEE,  Kouichi SAKURAI,  Seokhie HONG,  Sangjin LEE,  

[Date]2004/7/13
[Paper #]ISEC2004-17
Some Extentions of Multi-Variate Public Key Crytptosystems

Ryuichi SAKAI,  Masao KASAHARA,  

[Date]2004/7/13
[Paper #]ISEC2004-18
A Construction of Public Key Cryptosystem based on Random Singular and Non-singular Simultaneous Equations over Extension Field

Masao KASAHARA,  Ryuichi SAKAI,  

[Date]2004/7/13
[Paper #]ISEC2004-19
An Attack against the Traveling Salesman Cryptosystem

Akira HAYASHI,  

[Date]2004/7/13
[Paper #]ISEC2004-20
A note on a decryption problem for some type of generic conversion method to secute encryption

Eiichiro FUJISAKI,  

[Date]2004/7/13
[Paper #]ISEC2004-21
Optimal Security Proof for PFDH under Existential Unforgeability against Strong Adaptive Chosen Message Attack

Bagus SANTOSO,  Kazuo OHTA,  Noboru KUNIHIRO,  

[Date]2004/7/13
[Paper #]ISEC2004-22
A Feasibility Analysis of the Factoring Device TWIRL (Part I)

Tetsuya IZU,  Kouichi ITOH,  Jun KOGURE,  Kiyoshi KOHIYAMA,  Takeshi SHIMOYAMA,  Masahiko TAKENAKA,  Naoya TORII,  Shoichi MASUI,  Kenji MUKAIDA,  

[Date]2004/7/13
[Paper #]ISEC2004-23
A Feasibility Analysis of the Factoring Device TWIRL (Part II)

Tetsuya IZU,  Kouichi ITOH,  Jun KOGURE,  Kiyoshi KOHIYAMA,  Takeshi SHIMOYAMA,  Masahiko TAKENAKA,  Naoya TORII,  Shoichi MASUI,  Kenji MUKAIDA,  

[Date]2004/7/13
[Paper #]ISEC2004-24
A trial of GNFS implementation (Part V) : Speeding up sieving using bucket sort

Kazumaro AOKI,  Hiroki UEDA,  

[Date]2004/7/13
[Paper #]ISEC2004-25
On Validation Tests for Block Cipher Modules

Jun YAJIMA,  Masahiko TAKENAKA,  Takeshi SHIMOYAMA,  

[Date]2004/7/13
[Paper #]ISEC2004-26
Implementation of Damage Prediction System of Unlawful Access by Event Dependent Model

Ryoji HASUI,  Yoshiaki SHIRAISHI,  Masakatu MORII,  

[Date]2004/7/13
[Paper #]ISEC2004-27
An Assessment of Wireless Location Privacy Risks in High Precision Positioning System

Leping Huang,  Kaoru Sezaki,  

[Date]2004/7/13
[Paper #]ISEC2004-28
A Proposal of Congestion DoS Attack Avoidance System to which Mobile IPv6 Technology Applied

Takayoshi KUSAKA,  Masataka KADO,  Tatsuya BABA,  Tsutomu INADA,  

[Date]2004/7/13
[Paper #]ISEC2004-29
A Pollcy based Autonomous Handling Mechanism for Network Security Events

Shin SHIRAHATA,  Masaki MINAMI,  Jun MURAI,  

[Date]2004/7/13
[Paper #]ISEC2004-30
12>> 1-20hit(32hit)