Engineering Sciences/NOLTA-Information Security(Date:2009/05/15)

Presentation
表紙

,  

[Date]2009/5/15
[Paper #]
目次

,  

[Date]2009/5/15
[Paper #]
A random number generation by Logistic Map : To generate and manage the identification number

Jiguo DONG,  

[Date]2009/5/15
[Paper #]ISEC2009-1
Corrected Non-overlapping Template Matching Test

Yuichi TAKEDA,  Mituaki HUZII,  Toshinari KAMAKURA,  Norio WATANABE,  Takakazu SUGIYAMA,  

[Date]2009/5/15
[Paper #]ISEC2009-2
Estimation of CPA attack for AES using Simulation method

Kimihiro YAMAKOSHI,  Akihiro YAMAGISHI,  

[Date]2009/5/15
[Paper #]ISEC2009-3
Generalized Zero-offset Power Analyses for Restricted Masking Scheme

Yuichi KOMANO,  Hideo SHIMIZU,  Hanae NOZAKI,  Atsushi SHIMBO,  

[Date]2009/5/15
[Paper #]ISEC2009-4
A Novel Construction Method for Visual Secret Sharing Schemes Allowing Rotation of Shares

Yang LI,  Mitsugu IWAMOTO,  Kazuo OHTA,  Kazuo SAKIYAMA,  

[Date]2009/5/15
[Paper #]ISEC2009-5
An Implementation of a Group Signature Scheme with Efficient Verifier-Local Revocation Check

Amang SUDARSONO,  Toru NAKANISHI,  Yumi SAKEMI,  Yasuyuki NOGAMI,  Nobuo FUNABIKI,  

[Date]2009/5/15
[Paper #]ISEC2009-6
Joint Sparse Forms with Twelve Precomputed Points

Katsuyuki OKEYA,  

[Date]2009/5/15
[Paper #]ISEC2009-7
A Consideration on Generating Ordinary Pairing Friendly Curve of Composite Order That Has Two Large Prime Factors

Kazushi NISHII,  Yumi SAKEMI,  Yasuyuki NOGAMI,  Yoshitaka MORIKAWA,  

[Date]2009/5/15
[Paper #]ISEC2009-8
An Improvement of Cyclic Vector Multiplication Algorithm based on Gauss period Normal Basis

Erika YANAGI,  Kenta NEKADO,  Yasuyuki NOGAMI,  Yoshiktaka MORIKAWA,  

[Date]2009/5/15
[Paper #]ISEC2009-9
Another Experimental Security Analysis of OTU2000 through Attacks Based on Lattice Theory

Daewoo KIM,  Masahiro MAMBO,  Eiji OKAMOTO,  

[Date]2009/5/15
[Paper #]ISEC2009-10
A Pairing-based Group Key Exchange with an Edge-based Tree

Atsuko MIYAJI,  Yvo DESMEDT,  

[Date]2009/5/15
[Paper #]ISEC2009-11
Digital Signature Using Knapsack Problem

Kunikatsu KOBAYASHI,  Kotaro HONDA,  

[Date]2009/5/15
[Paper #]ISEC2009-12
New Classes of Product-Sum Type Public Key Cryptosystems and Fuzzy Vault Scheme Constructed Based on Error-Correcting Codes

Masao KASAHARA,  

[Date]2009/5/15
[Paper #]ISEC2009-13
Cryptanalysis on 2 Dimensional Subset-sum Public Key Cryptosystem

Ryuichi SAKAI,  

[Date]2009/5/15
[Paper #]ISEC2009-14
複写される方へ

,  

[Date]2009/5/15
[Paper #]
Notice for photocopying

,  

[Date]2009/5/15
[Paper #]
奥付

,  

[Date]2009/5/15
[Paper #]