Engineering Sciences/NOLTA-Information Security(Date:2014/05/02)

Presentation
表紙

,  

[Date]2014/5/2
[Paper #]
目次

,  

[Date]2014/5/2
[Paper #]
A New Class of Public Key Cryptosystems Constructed Based on Reed-Solomon Codes K(XV)SE(1)PKC

Masao KASAHARA,  

[Date]2014/5/2
[Paper #]ISEC2014-1
An Interorganizational Cryptosystem Using RSA PKC

Yasuyuki MURAKAMI,  Masao KASAHARA,  

[Date]2014/5/2
[Paper #]ISEC2014-2
New Negative Biases in Long-Term Glimpse of RC4

Ryoma ITO,  Atsuko MIYAJI,  

[Date]2014/5/2
[Paper #]ISEC2014-3
A Study of IDS using Discrete Fourier Transform

Enkhbold CHIMEDTSEREN,  Keisuke IWAI,  Hidema TANAKA,  Takakazu KUROKAWA,  

[Date]2014/5/2
[Paper #]ISEC2014-4
Verification of secure cloud quantum computing

Tomoyuki MORIMAE,  

[Date]2014/5/2
[Paper #]ISEC2014-5
A Robust DWT Watermarking for Image using Quantized Domain Based on q-logarithm Function

Ta Minh Thanh,  Ta Minh Tam,  

[Date]2014/5/2
[Paper #]ISEC2014-6
A Report on ASIACRYPT2013

Kazuki YONEYAMA,  

[Date]2014/5/2
[Paper #]ISEC2014-7
Generic Key Recovery Attack on Feistel Scheme

Takanori ISOBE,  Kyoji SHIBUTANI,  

[Date]2014/5/2
[Paper #]ISEC2014-8
Limited-Birthday Distinguishers for Hash Functions : Collisions beyond the Birthday Bound Can Be Meaningful

Mitsugu IWAMOTO,  Yu SASAKI,  

[Date]2014/5/2
[Paper #]ISEC2014-9
複写される方へ

,  

[Date]2014/5/2
[Paper #]
Notice for Photocopying

,  

[Date]2014/5/2
[Paper #]
奥付

,  

[Date]2014/5/2
[Paper #]
裏表紙

,  

[Date]2014/5/2
[Paper #]