Engineering Sciences/NOLTA-Information Security(Date:2012/12/05)

Presentation
表紙

,  

[Date]2012/12/5
[Paper #]
目次

,  

[Date]2012/12/5
[Paper #]
Notes on Secure and Smooth Typing Password Generation Method using Markov Process

Takuto Tamai,  Hiroyuki Inaba,  

[Date]2012/12/5
[Paper #]ISEC2012-72
An Extention of Reputation System with Secrecy for Negative Feedbacks

Tomoya Nomura,  Toru Nakanishi,  Kan Watanabe,  Nobuo Funabiki,  

[Date]2012/12/5
[Paper #]ISEC2012-73
Implementation and Evaluation of a Method for Preventing Unauthorized Data Transmission

Masato Hata,  Masato Tanabe,  Katsunari Yoshioka,  Tsutomu Matsumoto,  

[Date]2012/12/5
[Paper #]ISEC2012-74
Generating elliptic curves having efficient endomorphisms suitable for pairing computation and scalar multiplication

Naoki Kanayama,  Eiji Okamoto,  Kazutaka Saito,  

[Date]2012/12/5
[Paper #]ISEC2012-75
The YNU's Method for Acquiring Power-Consumption Traces Developed for DPA Contest v3

Tsutomu Matsumoto,  Takeshi Kishikawa,  Hitoshi Ono,  Shohei Saito,  Yuu Tsuchiya,  Akihiko Sasaki,  Tsuyoshi Toyama,  

[Date]2012/12/5
[Paper #]ISEC2012-76
A Report on CRYPTO 2012

Shiho Moriai,  

[Date]2012/12/5
[Paper #]ISEC2012-77
Breaking and Repairing GCM Security Proofs (from CRYPTO 2012)

Tetsu Iwata,  Keisuke Ohashi,  Kazuhiko Minematsu,  

[Date]2012/12/5
[Paper #]ISEC2012-78
[Invited Talk] On the Impossibility of Constructing Efficient Key Encapsulation and Programmable Hash Functions in Prime Order

Goichiro HANAOKA,  Takahiro MATSUDA,  Jacob C.N. SCHULDT,  

[Date]2012/12/5
[Paper #]ISEC2012-79
複写される方へ

,  

[Date]2012/12/5
[Paper #]
Notice for photocopying

,  

[Date]2012/12/5
[Paper #]
奥付

,  

[Date]2012/12/5
[Paper #]
裏表紙

,  

[Date]2012/12/5
[Paper #]