Engineering Sciences/NOLTA-Information Security(Date:2004/11/01)

Presentation
表紙

,  

[Date]2004/11/1
[Paper #]
目次

,  

[Date]2004/11/1
[Paper #]
A Twist Technique Based on Third Power Residue and Non Residue

Yoshito HIDAKA,  Mayumi OBARA,  Yasuyuki NOGAMI,  Yoshitaka MORIKAWA,  

[Date]2004/11/1
[Paper #]ISEC2004-78,OIS2004-45
A Reconfigurable Dual-Field Multiplier for GF(P) and GF(2^n)

Ryo NAMBA,  Masaru TAKESUE,  

[Date]2004/11/1
[Paper #]ISEC2004-79,OIS2004-46
An Algebraic Surface Public-key Cryptosystem

Koichiro AKIYAMA,  Yasuhiro GOTO,  

[Date]2004/11/1
[Paper #]ISEC2004-80,OIS2004-47
A Construction of Public-Key Cryptosystem Based on Algebraic Coding and Random Coding Techniques over F_<2^m>

Masao KASAHARA,  

[Date]2004/11/1
[Paper #]ISEC2004-81,OIS2004-48
A Group Signature Scheme with Membership Revocation for Large Groups

Fumiaki KUBOOKA,  Toru NAKANISHI,  Nobuo FUNABIKI,  

[Date]2004/11/1
[Paper #]ISEC2004-82,OIS2004-49
Threshold Cryptosystems Based on the Paillier's Encryption

Takeru ISHIHARA,  Hiroshi AONO,  Sadayuki HONGO,  Junji SHIKATA,  

[Date]2004/11/1
[Paper #]ISEC2004-83,OIS2004-50
How to improve the insecurity of Canetti-Goldreich-Halevi public-key cryptosystems

Yoshinari KOBAYASHI,  Shigeo TSUJI,  

[Date]2004/11/1
[Paper #]ISEC2004-84,OIS2004-51
複写される方へ

,  

[Date]2004/11/1
[Paper #]
奥付

,  

[Date]2004/11/1
[Paper #]