Engineering Sciences/NOLTA-Information Security(Date:2010/05/14)

Presentation
表紙

,  

[Date]2010/5/14
[Paper #]
目次

,  

[Date]2010/5/14
[Paper #]
The Suggestion of Corrected Non-overlapping Template Matching Test

Yuichi TAKEDA,  Mituaki HUZII,  Toshinari KAMAKURA,  Norio WATANABE,  Takakazu SUGIYAMA,  

[Date]2010/5/14
[Paper #]ISEC2010-1
Side-channel Analysis and Countermeasures of Stream Cipher K2

Matt HENRICKSEN,  Wun-she YAP,  Chee-hoo YIAN,  Yuto NAKANO,  Kazuhide FUKUSHIMA,  Shinsaku KIYOMOTO,  Toshiaki TANAKA,  

[Date]2010/5/14
[Paper #]ISEC2010-2
A Study on Non Linear Function and cryptanalysis of K2

Takashi OHSHIMA,  Munetoshi IWAKIRI,  

[Date]2010/5/14
[Paper #]ISEC2010-3
Comparing with feature of quantum stream cipher Y-00 and CPPM : Cipher with randomization of chiphertext

Masaki SOHMA,  Osamu HIROTA,  

[Date]2010/5/14
[Paper #]ISEC2010-4
Formal verification method for Dynamic Segregation of Duties which is based Functional Role

Michinobu OCHI,  Satoshi ONO,  

[Date]2010/5/14
[Paper #]ISEC2010-5
An Improvement of Attribute-based Encryption

Hiroki KUNITAKE,  Masahiro MAMBO,  Eiji OKAMOTO,  

[Date]2010/5/14
[Paper #]ISEC2010-6
New Class of Public Key Cryptosystems Constructed Based on Error-Correcting Codes, Using K(III) Scheme : Appendix: Proposal of K(IX)SE(g)PKC

Masao KASAHARA,  

[Date]2010/5/14
[Paper #]ISEC2010-7
Consideration of Surface in Algebraic Surface Cryptosystems

Yuichi KOMANO,  Koichiro AKIYAMA,  Yoshikazu HANATANI,  Hideyuki MIYAKE,  Yasuhiro GOTO,  

[Date]2010/5/14
[Paper #]ISEC2010-8
Applying Numerical Analysis Technique To Prime Factorization

Masaaki SHIRASE,  

[Date]2010/5/14
[Paper #]ISEC2010-9
複写される方へ

,  

[Date]2010/5/14
[Paper #]
奥付

,  

[Date]2010/5/14
[Paper #]
裏表紙

,  

[Date]2010/5/14
[Paper #]