Engineering Sciences/NOLTA-Information Security(Date:2011/09/02)

Presentation
表紙

,  

[Date]2011/9/2
[Paper #]
目次

,  

[Date]2011/9/2
[Paper #]
Construction of Voting Schemes using DNA

Kei Ebana,  Masahiro Mambo,  

[Date]2011/9/2
[Paper #]ISEC2011-27
Can Pilot Lamps Serve as Side Channels?

Tsutomu MATSUMOTO,  Shohei SAITO,  

[Date]2011/9/2
[Paper #]ISEC2011-28
A proposal of identification system using mobile phone

Kimihiro YAMAKOSHI,  Hideaki YAMAMOTO,  Tetsushi MORITA,  Takeshi SUGANUMA,  

[Date]2011/9/2
[Paper #]ISEC2011-29
Determining All Traces of Elliptic Curves y^2=x^3±2^i3^j over BN Field

Toshiya NAKAJIMA,  

[Date]2011/9/2
[Paper #]ISEC2011-30
Public Key Cryptosystems Constructed Based on Reed-Solomon Codes and Pseudo Cyclic Codes, K(IX)SE(1)PKC and K(X)SE(1)PKC, Realizing Coding Rate of Exactly 1.0

Masao KASAHARA,  

[Date]2011/9/2
[Paper #]ISEC2011-31
Experimental results of the low density attack on the high density knapsack cryptosystem

Yuichi OOKI,  Shogo TAKAI,  Akira HAYASHI,  

[Date]2011/9/2
[Paper #]ISEC2011-32
On the security of the fully-homomorphic encryption scheme based on ideal lattices

Masaya YASUDA,  Jun YAJIMA,  Takeshi SHIMOYAMA,  Jun KOGURE,  

[Date]2011/9/2
[Paper #]ISEC2011-33
複写される方へ

,  

[Date]2011/9/2
[Paper #]
Notice for Photocopying

,  

[Date]2011/9/2
[Paper #]
奥付

,  

[Date]2011/9/2
[Paper #]
裏表紙

,  

[Date]2011/9/2
[Paper #]