Engineering Sciences/NOLTA-Information Security(Date:2011/05/06)

Presentation
表紙

,  

[Date]2011/5/6
[Paper #]
目次

,  

[Date]2011/5/6
[Paper #]
Revisited: Security of multivariate polynomial signatures over non-commutative rings

Takanori YASUDA,  Kouichi SAKURAI,  

[Date]2011/5/6
[Paper #]ISEC2011-1
A note on the reduction of the size of keys of Rainbow

Takanori YASUDA,  Kouichi SAKURAI,  Tsuyoshi TAKAGI,  

[Date]2011/5/6
[Paper #]ISEC2011-2
Fast Implementation and Experimentation of Multivariate Polynomial Cryptosystems on GPU

Satoshi TANAKA,  Kouichi SAKURAI,  

[Date]2011/5/6
[Paper #]ISEC2011-3
What is the Information? : A Case of Disaster Information to be Processed in Logical Network Layer to Generate Direct Actions

Kimiaki Tokumaru,  

[Date]2011/5/6
[Paper #]ISEC2011-4
On the Impossibility of d-Multiplicative Non-perfect Secret Sharing

Maki YOSHIDA,  Toru FUJIWARA,  

[Date]2011/5/6
[Paper #]ISEC2011-5
Order of Elliptic Curve y^2=x^3+2^i3^j Over Barreto-Naehrig Field

Masaaki SHIRASE,  

[Date]2011/5/6
[Paper #]ISEC2011-6
S-box Design with Variable Operation Parameters

Eiji FUKUTOMI,  Masahiro FUKUMOTO,  

[Date]2011/5/6
[Paper #]ISEC2011-7
A Study on Side Channel Cryptanalysis of RSA Hardware Focused on Operands for Multiple-precision Multiplication

Takeshi KISHIKAWA,  Tsutomu MATSUMOTO,  

[Date]2011/5/6
[Paper #]ISEC2011-8
複写される方へ

,  

[Date]2011/5/6
[Paper #]
Notice for Photocopying

,  

[Date]2011/5/6
[Paper #]
奥付

,  

[Date]2011/5/6
[Paper #]
裏表紙

,  

[Date]2011/5/6
[Paper #]