Engineering Sciences/NOLTA-Information Security(Date:2014/08/29)

Presentation
表紙

,  

[Date]2014/8/29
[Paper #]
目次

,  

[Date]2014/8/29
[Paper #]
New Classes of Multivariate Public Key Cryptosystem, K(X)RSE(2)PKC and K_M(X)RSE(2)PKC Constructed based on Reed-Solomon Code, along with K(XI)RSE(2)PKC

Masao KASAHARA,  

[Date]2014/8/29
[Paper #]ISEC2014-47
Problem with Interpretation of Trace Distance as Failure Probability in Quantum Key Distribution : Part II

Takehisa IWAKOSHI,  

[Date]2014/8/29
[Paper #]ISEC2014-48
Fail-Stop Signature Scheme with TTP and Its UC-Security

Masahiro NOMURA,  Katsuhiro NAKAMURA,  

[Date]2014/8/29
[Paper #]ISEC2014-49
Efficient Proofs for Monotone Formulas on Attributes Excluding Restriction in Anonymous Credential System

Shahidatul SADIAH,  Toru NAKANISHI,  Nobuo FUNABIKI,  

[Date]2014/8/29
[Paper #]ISEC2014-50
Computer Simulation of Garbled Searchable Symmetric Encryption Scheme

Keisuke SASAKI,  Kaoru KUROSAWA,  

[Date]2014/8/29
[Paper #]ISEC2014-51
GPU implementation of Ciphers using Schematic to Program Translator (SPT)

Masashi WATANABE,  Keisuke IWAI,  Hidema TANAKA,  Takakazu KUROKAWA,  

[Date]2014/8/29
[Paper #]ISEC2014-52
A Report on EUROCRYPT 2014

Ryotaro HAYASHI,  

[Date]2014/8/29
[Paper #]ISEC2014-53
Dual System Encryption via Doubly Selective Security : A Generic Framework for Fully-Secure Predicate Encryption

Nuttapong ATTRAPADUNG,  

[Date]2014/8/29
[Paper #]ISEC2014-54
Parallelizable Rate-1 Authenticated Encryption from Pseudorandom Functions

Kazuhiko MINEMATSU,  

[Date]2014/8/29
[Paper #]ISEC2014-55
複写される方へ

,  

[Date]2014/8/29
[Paper #]
Notice for Photocopying

,  

[Date]2014/8/29
[Paper #]
奥付

,  

[Date]2014/8/29
[Paper #]
裏表紙

,  

[Date]2014/8/29
[Paper #]