Engineering Sciences/NOLTA-Information Security(Date:2006/09/06)

Presentation
表紙

,  

[Date]2006/9/6
[Paper #]
目次

,  

[Date]2006/9/6
[Paper #]
正誤表

,  

[Date]2006/9/6
[Paper #]
Asymmetric watermarking system with Disclosed Detector for Authentication in open Area

Li CONG,  Kazuo OHZEKI,  

[Date]2006/9/6
[Paper #]ISEC2006-72
A Method of Shortening Tardos' Fingerprinting Code Length by Optimizing Parameters

Taichi ISOGAI,  Hirofumi MURATANI,  Kenichiro FURUTA,  

[Date]2006/9/6
[Paper #]ISEC2006-73
The Real-Time Steganography Based on Audio-to-Audio Data Bit Stream

Xuping HUANG,  Ryota KAWASHIMA,  Norihisa SEGAWA,  Yoshihiko ABE,  

[Date]2006/9/6
[Paper #]ISEC2006-74
Analyisis of initial data in a pseodorandom number generator utilizing a one dimensional mapping

Makoto HOMMA,  Chigak ITOI,  Fumiko OKIHARU,  Ryusuke WATASE,  Yoshinori SAKAMOTO,  

[Date]2006/9/6
[Paper #]ISEC2006-75
共通鍵暗号 HyRAL16

,  

[Date]2006/9/6
[Paper #]ISEC2006-76
Verification of MRSL based S-BOX in AES as a countermeasure against DPA

Minoru SASAKI,  Keisuke IWAI,  Takakazu KUROKAWA,  

[Date]2006/9/6
[Paper #]ISEC2006-77
Collision Resistance of Double-Block-Length Hash Function against Free-Start Attack

Shoichi HIROSE,  

[Date]2006/9/6
[Paper #]ISEC2006-78
Side Channel Attacks against HMACs with Design for Hash Functions

Katsuyuki OKEYA,  

[Date]2006/9/6
[Paper #]ISEC2006-79
Black-Box Traitor Revocable Broadcast Encryption with Short Private Keys

Jun FURUKAWA,  Nuttapong ATTRAPADUNG,  Satoshi OBANA,  

[Date]2006/9/6
[Paper #]ISEC2006-80
Re-Encryption Schemes with Applications to Data Storage : Investigation of achieving preventative from collusion operating over the torsion subgroup in an elliptic curve

Hirokazu OUGI,  

[Date]2006/9/6
[Paper #]ISEC2006-81
A Method of Software Dynamic Birthmarks Using History of API Function Calls

Osamu Moriyama,  Takahiro Furue,  Tsuyoshi Toyama,  Tsutomu Matsumoto,  

[Date]2006/9/6
[Paper #]ISEC2006-82
Constructions of K_・SE(g)PKC on the basis of K-construction with hidden location noise(HLN)

Masao KASAHARA,  

[Date]2006/9/6
[Paper #]ISEC2006-83
A Conditional Knapsack Cryptosystem Using a High Density Sequence

Kunikatsu KOBAYASHI,  

[Date]2006/9/6
[Paper #]ISEC2006-84
Key Predistribution Schemes for Sensor Networks Using Lines and Points over a Finite Geometry

Ritsuko MATSUMOTO,  Hisashi MOHRI,  Yuichi KAJI,  

[Date]2006/9/6
[Paper #]ISEC2006-85
A Study on Error Correction in Secret Key Agreement Scheme Using ESPAR Antenna

Kenya HORAI,  Hisato IWAI,  Hideichi SASAOKA,  Takashi OHIRA,  

[Date]2006/9/6
[Paper #]ISEC2006-86
Unconditional Security of Key Establishment System Using a Variable Directional Antenna

Kirill MOROZOV,  Kazukuni KOBARA,  Hideki IMAI,  

[Date]2006/9/6
[Paper #]ISEC2006-87
複写される方へ

,  

[Date]2006/9/6
[Paper #]
12>> 1-20hit(22hit)