Engineering Sciences/NOLTA-Information Security(Date:2007/07/13)

Presentation
表紙

,  

[Date]2007/7/13
[Paper #]
目次

,  

[Date]2007/7/13
[Paper #]
A Simple Countermeasure to DPA against FPGA Implementation of Cryptographic Device

Jang-hoon SONG,  Koki ABE,  

[Date]2007/7/13
[Paper #]ISEC2007-45
Analysis on the Key-Scheduling Algorithm of MICKEY

Yoshiaki FUJIKAWA,  Toshihiro OHIGASHI,  Hidenori KUWAKADO,  Masakatu MORII,  

[Date]2007/7/13
[Paper #]ISEC2007-46
A Study on the Tews-Weinmann-Pyshkin Attack against WEP

Yuko OZASA,  Yoshiaki FUJIKAWA,  Toshihiro OHIGASHI,  Hidenori KUWAKADO,  Masakatu MORII,  

[Date]2007/7/13
[Paper #]ISEC2007-47
On Construction of Block Cipher with Variable Security Parameter

Yasumasa HIRAI,  Shin'ichiro MATSUO,  Wakaha OGATA,  

[Date]2007/7/13
[Paper #]ISEC2007-48
Hardware Implementations of the 128-bit Blockcipher CLEFIA

Taizo SHIRAI,  Kyoji SHIBUTANI,  Toru AKISHITA,  Shiho MORIAI,  Tetsu IWATA,  

[Date]2007/7/13
[Paper #]ISEC2007-49
Proposal for the quantitative method of searching characteristics of node

Hirofumi NAKAKOJI,  Masato TERADA,  Seiichi SUSAKI,  

[Date]2007/7/13
[Paper #]ISEC2007-50
Orthogonal expansion of port-scan packets

Tomohiro KOBORI,  Hiroaki KIKUCHI,  Masato TERADA,  

[Date]2007/7/13
[Paper #]ISEC2007-51
Consideration from the Viewpoint of Social Layer about the Distribution of Malicious Hosts on the Internet

Tetsuro KITO,  Hirofumi NAKAKOJI,  Masato TERADA,  Hiroaki KIKUCHI,  

[Date]2007/7/13
[Paper #]ISEC2007-52
Exploring the required conditions for malware to run for behavior analysis

Yuji HOSHIZAWA,  Kouichirou OKADA,  Motoaki YAMAMURA,  Takayoshi SHIIGI,  

[Date]2007/7/13
[Paper #]ISEC2007-53
Automatic malware classification

Yuji HOSHIZAWA,  Tsuyoshi TACHIKAWA,  Motoaki YAMAMURA,  

[Date]2007/7/13
[Paper #]ISEC2007-54
A Factoring Algorithm Searching Squares

Kunikatsu KOBAYASHI,  

[Date]2007/7/13
[Paper #]ISEC2007-55
A Construction Method of Nonlinear Piece In Hand Matrix for Universally Enhancing the Security of Various Multivariate Public Key Cryptosystems

Shigeo TSUJII,  Kohtaro TADAKI,  Ryou FUJITA,  

[Date]2007/7/13
[Paper #]ISEC2007-56
Affine Precomputation with Sole Inversion in Elliptic Curve Cryptography

Erik DAHMEN,  Katsuyuki OKEYA,  Daniel SCHEPERS,  

[Date]2007/7/13
[Paper #]ISEC2007-57
A Generalized Merkle Signature Scheme

Erik DAHMEN,  Camille VUILLAUME,  Katsuyuki OKEYA,  Elena KLINTSEVICH,  Johannes BUCHMANN,  

[Date]2007/7/13
[Paper #]ISEC2007-58
Examination for secure client architecture based on thin client architecture

Kunio MIYAMOTO,  Hidehiko TANAKA,  

[Date]2007/7/13
[Paper #]ISEC2007-59
A Design and Evaluation of Filtering Method of Image Spam in Bayesian Filter

MASAHIRO UEMURA,  TOSHIHIRO TABATA,  

[Date]2007/7/13
[Paper #]ISEC2007-60
Qualitative Characteristics of spam-mails Accoring to the Change of Their Keywords

Yosuke ARAGANE,  Kazutoshi SANO,  Osamu SHIONOIRI,  Atsushi KANAI,  

[Date]2007/7/13
[Paper #]ISEC2007-61
A Study of Spam Mail Combined with Social Engineering

Kensuke SHIBATA,  Itaru KAMIYA,  Kazutoshi SANO,  Yosuke ARAGANE,  Osamu SHIONOIRI,  Atsushi KANAI,  

[Date]2007/7/13
[Paper #]ISEC2007-62
12>> 1-20hit(33hit)