Engineering Sciences/NOLTA-Information Security(Date:2005/09/09)

Presentation
表紙

,  

[Date]2005/9/9
[Paper #]
目次

,  

[Date]2005/9/9
[Paper #]
Are attacks on Y-00 (Optical Communication Quantum Cryptography) the true attacks? Part-II

Osamu HIROTA,  Kentaro KATO,  

[Date]2005/9/9
[Paper #]ISEC2005-76
Influence of Random Numbers in a DPA Data Masking Countermeasure

Hanae NOZAKI,  Shinichi YASUDA,  Koichi FUJISAKI,  Atsushi SHIMBO,  Shinobu FUJITA,  

[Date]2005/9/9
[Paper #]ISEC2005-77
On the collision search and the sufficient conditions of MD5

Jun YAJIMA,  Takeshi SHIMOYAMA,  

[Date]2005/9/9
[Paper #]ISEC2005-78
A Note on Provably Secure Double-Block-Length Hash Functions in a Black-Box Model

Shoichi HIROSE,  

[Date]2005/9/9
[Paper #]ISEC2005-79
IP Security Policy and Authentication Information Distribution Mechanism using Smart Card

Manabu HIRANO,  Suguru YAMAGUCHI,  

[Date]2005/9/9
[Paper #]ISEC2005-80
The wide area network storage system based on secret sharing threshold scheme

Yutaka YONAMINE,  Horonobu YONAHA,  Tomokazu NAGATA,  Shiro TAMAKI,  

[Date]2005/9/9
[Paper #]ISEC2005-81
A Construction Method of Secure Cryptographic Location-Based Services

Jun Anzai,  Tsutomu Matsumoto,  

[Date]2005/9/9
[Paper #]ISEC2005-82
Privacy-preserving Interactive Protocol for K-means Clustering

Chunhua SU,  Kouichi SAKURAI,  

[Date]2005/9/9
[Paper #]ISEC2005-83
A New Decoding Algorithm for Secret Sharing Scheme : Along with New Secret Sharing Schemes

Masao KASAHARA,  

[Date]2005/9/9
[Paper #]ISEC2005-84
Precise Tardos Bound for Fingerprinting Codes

Taichi ISOGAI,  Hirofumi MURATANI,  

[Date]2005/9/9
[Paper #]ISEC2005-85
The Vanstone-Zuccherato schemes for modulus of the form p^rq

Naoki KANAYAMA,  Shigenori UCHIYAMA,  

[Date]2005/9/9
[Paper #]ISEC2005-86
A privacy-enhanced group signature scheme based on a modified Nyberg-Rueppel signature

Kozue UMEDA,  Atsuko MIYAJI,  

[Date]2005/9/9
[Paper #]ISEC2005-87
A Report on The 32nd International Colloquium on Automata, Languages and Programming (ICALP2005), and The Second Workshop on Automated Reasoning for Security Protocol Analysis (ARSPA2005)

Kenji IMAMOTO,  Kouichi SAKURAI,  

[Date]2005/9/9
[Paper #]ISEC2005-88
複写される方へ

,  

[Date]2005/9/9
[Paper #]
Notice about photocopying

,  

[Date]2005/9/9
[Paper #]
奥付

,  

[Date]2005/9/9
[Paper #]