Engineering Sciences/NOLTA-Information Security(Date:2006/12/06)

Presentation
表紙

,  

[Date]2006/12/6
[Paper #]
目次

,  

[Date]2006/12/6
[Paper #]
正誤表

,  

[Date]2006/12/6
[Paper #]
Autocorrelation Test of Binary Sequence for Cryptographic Applications

Yuichi TAKEDA,  Mituaki HUZII,  Toshinari KAMAKURA,  Norio WATANABE,  Takakazu SUGIYAMA,  

[Date]2006/12/6
[Paper #]ISEC2006-101
Improved Collision Attack on Reduced Versions of Tiger

Hirotaka YOSHIDA,  Dai WATANABE,  Bart PRENEEL,  

[Date]2006/12/6
[Paper #]ISEC2006-102
On Formalization of Concurrent General Composition of Witness Indistinguishability

Hirofumi MURATANI,  

[Date]2006/12/6
[Paper #]ISEC2006-103
ID-based Encryption Scheme with Two Dimensional Hierarchical Structure Based on the l-BDHE Assumption

Kousuke MIYASHITA,  Wataru KISHIMOTO,  

[Date]2006/12/6
[Paper #]ISEC2006-104
Key Generation Schemes for the ID base Public Key Cyrptosystems

Ryuichi SAKAI,  

[Date]2006/12/6
[Paper #]ISEC2006-105
Proposal for an improvement of computing Twisted Ate pairing

Seiichi MATSUDA,  Naoki KANAYAMA,  Takeshi OKAMOTO,  Eiji OKAMOTO,  

[Date]2006/12/6
[Paper #]ISEC2006-106
A note on digital signature using knapsack public key cryptosystem

Hiraku SUGAWARA,  Tsutomu ANSAI,  

[Date]2006/12/6
[Paper #]ISEC2006-107
On experimental study on the application of point tripling formulas for elliptic curve cryptosystems

Kazuya OKAMOTO,  Akira HAYASHI,  

[Date]2006/12/6
[Paper #]ISEC2006-108
A Proposal of a Group Siganture Scheme with Membership Revocation Using Prime Numbers and Its Implementation

Naoto HAMADA,  Takuya NAKAYAMA,  Toru NAKANISHI,  Nobuo FUNABIKI,  

[Date]2006/12/6
[Paper #]ISEC2006-109
Visual Cryptography Schemes with Dihedral Group Access Structure for Many Images

Miyuki UNO,  Mikio KANO,  

[Date]2006/12/6
[Paper #]ISEC2006-110
A Technique to Distinguish the New Software using the Exection File

Chikako ISHIZAWA,  Makoto NISHIDA,  

[Date]2006/12/6
[Paper #]ISEC2006-111
A Study of Identifier Naming Conventions Suitable for User Authentication

Megumi Nogita,  Yoshiaki Kasahara,  Eisuke Itoh,  Takahiko Suzuki,  

[Date]2006/12/6
[Paper #]ISEC2006-112
A Fixed IV Value Independent Key Recovery Attack against WEP

Yoshiaki FUJIKAWA,  Toshihiro OHIGASHI,  Hidenori KUWAKDO,  Masakatu MORII,  

[Date]2006/12/6
[Paper #]ISEC2006-113
A Practical Key Recovery Attack against Py

Takanori ISOBE,  Toshihiro OHIGASHI,  Hidenori KUWAKADO,  Masakatu MORII,  

[Date]2006/12/6
[Paper #]ISEC2006-114
複写される方へ

,  

[Date]2006/12/6
[Paper #]
Notice about photocopying

,  

[Date]2006/12/6
[Paper #]
奥付

,  

[Date]2006/12/6
[Paper #]