Engineering Sciences/NOLTA-Information Security(Date:2009/12/09)

Presentation
表紙

,  

[Date]2009/12/9
[Paper #]
目次

,  

[Date]2009/12/9
[Paper #]
The feedback period length of Bijective function

Toru ITO,  

[Date]2009/12/9
[Paper #]ISEC2009-71
Beyond the Shannon limit by quantum stream cipher Y-00 and Holevo-Sohma-Hirota theorem : General proof

Osamu HIROTA,  

[Date]2009/12/9
[Paper #]ISEC2009-72
Constructive Codes Achieving the Secrecy Capacity of Wiretap Channels

Mitsuru Hamada,  

[Date]2009/12/9
[Paper #]ISEC2009-73
On Viterbi search for the maximum differential characteristic probability of a cipher with certain Feistel structure

Yasutaka IGARASHI,  Toshinobu KANEKO,  

[Date]2009/12/9
[Paper #]ISEC2009-74
Electro Magnetic Analysis and Local Information of Cryptographic Hardware

Hidekazu MORITA,  Yoshio TAKAHASHI,  Tsutomu MATSUMOTO,  Junji SHIKATA,  

[Date]2009/12/9
[Paper #]ISEC2009-75
GLV Method for Non-Supersingular Paring-Friendly Curves of Embedding Degree 1

Shoichi TAKEUCHI,  Tetsuya IZUTA,  Yumi SAKEMI,  Kazushi NISHII,  Yasuyuki NOGAMI,  Yoshitaka MORIKAWA,  

[Date]2009/12/9
[Paper #]ISEC2009-76
A Construction Method of Basis Conversion Matrix by Using Small Multiplicative Group for Cryptographic Applications

Hidehiro KATO,  Yasuyuki NOGAMI,  Satoshi UEHARA,  Yoshitaka MORIKAWA,  

[Date]2009/12/9
[Paper #]ISEC2009-77
Improvement of the Internal Perturbation Modifier : An example of Perturbed Matsumoto-Imai

Masahito GOTAISHI,  Shigeo TSUJII,  

[Date]2009/12/9
[Paper #]ISEC2009-78
Redesigning of a role hierarchy for role-based access control

Yoshiharu ASAKURA,  Yukikazu NAKAMOTO,  

[Date]2009/12/9
[Paper #]ISEC2009-79
複写される方へ

,  

[Date]2009/12/9
[Paper #]
奥付

,  

[Date]2009/12/9
[Paper #]