Engineering Sciences/NOLTA-Information Security(Date:2007/08/31)

Presentation
表紙

,  

[Date]2007/8/31
[Paper #]
目次

,  

[Date]2007/8/31
[Paper #]
An Extension of Fast Threshold Schemes Using XOR Operations (1)

Jun KURIHARA,  Shinsaku KIYOMOTO,  Kazuhide FUKUSHIMA,  Toshiaki TANAKA,  

[Date]2007/8/31
[Paper #]ISEC2007-74
An Extension of Fast Threshold Schemes Using XOR Operations (2)

Jun KURIHARA,  Shinsaku KIYOMOTO,  Kazuhide FUKUSHIMA,  Toshiaki TANAKA,  

[Date]2007/8/31
[Paper #]ISEC2007-75
A Study on Hierarchical Secret Sharing Schemes Using Product and Concatenated Codes

Chigusa KAWASHIMA,  Takahiro YOSHIDA,  Tomoko K. MATSUSHIMA,  

[Date]2007/8/31
[Paper #]ISEC2007-76
Visual Cryptography Schemes with Tree Access Structure for Many Images

Miyuki UNO,  Mikio KANO,  

[Date]2007/8/31
[Paper #]ISEC2007-77
A construction of light weight Panama-like keystream generator

Dai WATANABE,  Toshinobu KANEKO,  

[Date]2007/8/31
[Paper #]ISEC2007-78
How To Find Many Collisions of 3-Pass HAVAL

Kazuhiro SUZUKI,  Kaoru KUROSAWA,  

[Date]2007/8/31
[Paper #]ISEC2007-79
Sender Authenticated Key Agreements Without Random Oracles

Chifumi SATO,  Takeshi OKAMOTO,  Eiji OKAMOTO,  

[Date]2007/8/31
[Paper #]ISEC2007-80
A New Class of Public Key Cryptosystem Constructed on the Basis of Multivariate Polynomials Randomly Generated

Masao KASAHARA,  

[Date]2007/8/31
[Paper #]ISEC2007-81
A Consideration on 3SAT Problem

Kunikatsu KOBAYASHI,  

[Date]2007/8/31
[Paper #]ISEC2007-82
An Implementation of a Pairing-Based Group Signature Scheme with Verifier-Local Revocation

Yuta HIRA,  Hidehiro KATO,  Toru NAKANISHI,  Yasuyuki NOGAMI,  Nobuo FUNABIKI,  Yoshitaka MORIKAWA,  

[Date]2007/8/31
[Paper #]ISEC2007-83
CAIRN3 : An FPGA Implementation of the Sieving Step with the Lattice Sieving

Takeshi SHIMOYAMA,  Tetsuya IZU,  Jun KOGURE,  

[Date]2007/8/31
[Paper #]ISEC2007-84
Tardos's Fingerprinting Codes Shortened by Optimizing Code Generation Probabilities and Improving Tracing Algorithm

Taichi ISOGAI,  Hirofumi MURATANI,  

[Date]2007/8/31
[Paper #]ISEC2007-85
On the Implementation of Asymmetric Fingerprinting Protocol

Shinya YAMANE,  Minoru KURIBAYASHI,  Masakatu MORII,  

[Date]2007/8/31
[Paper #]ISEC2007-86
An Approach to Duality in Public Key Cryptosystems

Kazuo OHTA,  Yuichi KOMANO,  Yutaka KAWAI,  Shinichi KAWAMURA,  

[Date]2007/8/31
[Paper #]ISEC2007-87
A Study on Extended Multi-Recipient Encryption : Security Notion and Constructions

Yasuo HATANO,  Kunihiko MIYAZAKI,  Toshinobu KANEKO,  

[Date]2007/8/31
[Paper #]ISEC2007-88
複写される方へ

,  

[Date]2007/8/31
[Paper #]
Notice for Photocopying

,  

[Date]2007/8/31
[Paper #]
奥付

,  

[Date]2007/8/31
[Paper #]