Engineering Sciences/NOLTA-Information Security(Date:2004/09/10)

Presentation
表紙

,  

[Date]2004/9/10
[Paper #]
目次

,  

[Date]2004/9/10
[Paper #]
Study of a Security Protocol Analyzer Based on Provable Security

Shinsaku KIYOMOTO,  Haruki OTA,  Toshiaki TANAKA,  

[Date]2004/9/10
[Paper #]ISEC2004-67
A trial of GNFS implementation (Part VI) : lattice sieve

Kazumaro AOKI,  Yuji KIDA,  Hiroki UEDA,  

[Date]2004/9/10
[Paper #]ISEC2004-68
A Countermeasure against Side Channel Attack using Mask Logic Elements

Hideo SHIMIZU,  

[Date]2004/9/10
[Paper #]ISEC2004-69
Provably Secure Double Block Length Hash Functions with Rate 1/2

Shoichi HIROSE,  

[Date]2004/9/10
[Paper #]ISEC2004-70
Action Research for Timestamp Interoperability : ChallengePKI 2003 Project

Yo Ishigaki,  Yasushi MATSUMOTO,  

[Date]2004/9/10
[Paper #]ISEC2004-71
Improvement of Subset Difference Method Using One-way Function

Mai NAKAGAWA,  

[Date]2004/9/10
[Paper #]ISEC2004-72
Trade-off Traitor Tracing

Goichiro HANAOKA,  Kazuto OGAWA,  Arisa FUJII,  Go OHTAKE,  Keigo MAJIMA,  Kimiyuki OYAMADA,  Hideki IMAI,  

[Date]2004/9/10
[Paper #]ISEC2004-73
Proposal of MOCHIGOMA (Piece in Hand) Concept for Multivariate Type Public Key Cryptosystem

Shigeo TSUJII,  Ryou FUJITA,  Kohtaro TADAKI,  

[Date]2004/9/10
[Paper #]ISEC2004-74
On the Security of the Full-Domain Hash variant of Chaum's Undeniable Signature schemes

Yoshinari KOBAYASHI,  Taiichi SAITO,  Shigeo TSUJII,  

[Date]2004/9/10
[Paper #]ISEC2004-75
New Notions of Security for Public-Key Cryptosystems with Adversarial Random Oracles (Survey)

Mototsugu NISHIOKA,  

[Date]2004/9/10
[Paper #]ISEC2004-76
ID-based Encryption for Directed Acyclic Graph Hierarchies and Applications to Key-evolving Encryption Primitives

Nuttapong ATTRAPADUNG,  Goichiro HANAOKA,  Kazukuni KOBARA,  Hideki IMAI,  

[Date]2004/9/10
[Paper #]ISEC2004-77
複写される方へ

,  

[Date]2004/9/10
[Paper #]
奥付

,  

[Date]2004/9/10
[Paper #]