Engineering Sciences/NOLTA-Information Security(Date:2013/05/16)

Presentation
表紙

,  

[Date]2013/5/16
[Paper #]
目次

,  

[Date]2013/5/16
[Paper #]
Using KCV with CTR Mode and CENC

Kazuma IKI,  Tetsu IWATA,  

[Date]2013/5/16
[Paper #]ISEC2013-1
Timed-Release Identity-Based Encryption

Toru OSHIKIRI,  Taiichi SAITO,  

[Date]2013/5/16
[Paper #]ISEC2013-2
Information theoretical analysis of side-channel attack (2)

Hiroaki MIZUNO,  Keisuke IWAI,  Hidema TANAKA,  Takakazu KUROKAWA,  

[Date]2013/5/16
[Paper #]ISEC2013-3
Car2Cloud Communication Enhanced by In-Vehicle Implicit Asking

Tsutomu MATSUMOTO,  Hikotaro SUZUKI,  Katsunari YOSHIOKA,  Yosuke MAEKAWA,  Hisashi OGUMA,  

[Date]2013/5/16
[Paper #]ISEC2013-4
A New Class of Public Key Cryptosystems Constructed Based on Reed-Solomon Codes K(XII)SE(1)PKC

Masao KASAHARA,  

[Date]2013/5/16
[Paper #]ISEC2013-5
A Consideration on Pairing Inversion Problem of Pairing Based Cryptography with BN Curve

Yasuyuki NOGAMI,  Yuki KONO,  Shoichi AKAGI,  

[Date]2013/5/16
[Paper #]ISEC2013-6
Improvement in Addition formula on Elliptic Curves

Yoshitaka NAGAI,  Tetsuya IZU,  Masaaki SHIRASE,  

[Date]2013/5/16
[Paper #]ISEC2013-7
A Report on ASIACRYPT 2012

Takahiro MATSUDA,  

[Date]2013/5/16
[Paper #]ISEC2013-8
The Five-Card Trick Can Be Done with Four Cards (from ASIACRYPT 2012)

Takaaki MIZUKI,  

[Date]2013/5/16
[Paper #]ISEC2013-9
Investigating Fundamental Security Requirements on Whirlpool : Improved Preimage and Collision Attacks

Yu SASAKI,  

[Date]2013/5/16
[Paper #]ISEC2013-10
複写される方へ

,  

[Date]2013/5/16
[Paper #]
Notice for Photocopying

,  

[Date]2013/5/16
[Paper #]
奥付

,  

[Date]2013/5/16
[Paper #]
裏表紙

,  

[Date]2013/5/16
[Paper #]