Engineering Sciences/NOLTA-Information Security(Date:2005/07/15)

Presentation
表紙

,  

[Date]2005/7/15
[Paper #]
目次

,  

[Date]2005/7/15
[Paper #]
A Group Key Management Scheme for Secure Multicast Increasing Efficiency of Key Distribution in Leave Operation

Alireza NEMANEYPOUR,  Kazuya KUMEKAWA,  Toshihiko KATO,  Shuichi ITOH,  

[Date]2005/7/15
[Paper #]ISEC2005-43
Murakami-Kasahara ID-based Key Sharing Scheme Revisited : In Comparison with Maurer-Yacobi Schemes

Yasuyuki MURAKAMI,  Masao KASAHARA,  

[Date]2005/7/15
[Paper #]ISEC2005-44
Efficient N-Party Password-based Authenticated Key Exchange Protocol

SeongHan SHIN,  Kazukuni KOBARA,  Hideki IMAI,  

[Date]2005/7/15
[Paper #]ISEC2005-45
Relations Among Notions of Security for Identity Based Encryption Schemes

Peng Yang,  Goichiro Hanaoka,  Yang Cui,  Rui Zhang,  Attrapadung Nuttapong,  Kanta Matsuura,  Hideki Imai,  

[Date]2005/7/15
[Paper #]ISEC2005-46
On a secure circuit evaluation protocol using ElGamal encryption

Go YAMAMOTO,  Koji CHIDA,  Anderson NASCIMENT,  Kouratou SUZUKI,  Shigenori UCHIYAMA,  

[Date]2005/7/15
[Paper #]ISEC2005-47
An efficiently-verifiable zero-knowledge argument for proofs of knowledge

Go YAMAMOTO,  Eiichiro FUJISAKI,  Masayuki ABE,  

[Date]2005/7/15
[Paper #]ISEC2005-48
Development of a certificate path cache method for Certificate Validation Service

Yoko HASHIMOTO,  Takahiro FUJISHIRO,  Tadashi KAJI,  Shingo HANE,  Satoru TEZUKA,  

[Date]2005/7/15
[Paper #]ISEC2005-49
A Status Detection of Secure Communication in Secure Service Platform

Osamu TAKATA,  Yuko SAWAI,  Kazuyoshi HOSHINO,  Tadashi KAJI,  Keisuke TAKEUCHI,  Takahiro FUJISHIRO,  Satoru TEZUKA,  

[Date]2005/7/15
[Paper #]ISEC2005-50
Development of Combined Authentication System

Shinji HIRATA,  Masahiro MIMURA,  Kenta TAKAHASHI,  Yoshiak ISOBE,  

[Date]2005/7/15
[Paper #]ISEC2005-51
A Framework of Remote Biometric Authentication with Assuring Validity of Personal Repository

Yoshifumi UESHIGE,  Kouichi SAKURAI,  

[Date]2005/7/15
[Paper #]ISEC2005-52
On Shared Attribute Certification

Tsutomu MATSUMOTO,  Junji SHIKATA,  Takenobu SEITO,  Takahiro FURUE,  Makiko UEYAMA,  

[Date]2005/7/15
[Paper #]ISEC2005-53
Critical cryptoanalysis for Y-00

Kentaro IMAFUKU,  Hideki IMAI,  Tsuyoshi NISHIOKA,  Toshio HASEGAWA,  Hirokazu ISHIZUKA,  

[Date]2005/7/15
[Paper #]ISEC2005-54
Cheater Identifiable Quantum Secret Sharing Schemes

Yumiko MURAKAMI,  Masaki NAKANISHI,  Shigeru YAMASHITA,  Katsumasa WATANABE,  

[Date]2005/7/15
[Paper #]ISEC2005-55
Improvement of the Security against Photon Number Splitting Attacks

Yoshifumi NISHIDA,  Hidenori KUWAKADO,  Masakatu MORII,  Hatsukazu TANAKA,  

[Date]2005/7/15
[Paper #]ISEC2005-56
Analysis on the Clockwise Transposition Routing for Dedicated Factoring Devices

Tetsuya IZU,  Noboru KUNIHIRO,  Kazuo OHTA,  Takeshi SHIMOYAMA,  

[Date]2005/7/15
[Paper #]ISEC2005-57
Improved Collision Attack on MD4 with Probability Almost 1

Yusuke NAITO,  Yu SASAKI,  Noboru KUNIHIRO,  Kazuo OHTA,  

[Date]2005/7/15
[Paper #]ISEC2005-58
1-out-of-L E-voting System with Efficient Computational Complexity Based on r-th Residue Encryption

Yong Sork HER,  Kenji IMAMOTO,  Kouichi SAKURAI,  

[Date]2005/7/15
[Paper #]ISEC2005-59
New Construction of Anonymous Communication Scheme with Return Receipt

Shinji YAMANAKA,  

[Date]2005/7/15
[Paper #]ISEC2005-60
12>> 1-20hit(38hit)