Engineering Sciences/NOLTA-Information Theory(Date:2003/03/20)

Presentation
表紙

,  

[Date]2003/3/20
[Paper #]
目次

,  

[Date]2003/3/20
[Paper #]
Power Analysis attack on AES and countermeasure

Suguru NAKASHIMA,  Mitsuhiko FUJIO,  

[Date]2003/3/20
[Paper #]IT2002-78,ISEC2002-136,SST2002-184,ITS2002-161
S-Box-and-Bit-Sliced Analysis of DES (V) : Dual Representation of 2-round DES Characteristics for Information-Theoretic SenSitivity Analysis of DES key

Tohru KOHDA,  Shoji SHIBA,  Hiroshi ISHIHARA,  Takayuki TURUTA,  Nobuoki EJIMA,  

[Date]2003/3/20
[Paper #]IT2002-79,ISEC2002-137,SST2002-185,ITS2002-162
S-Box-and-Bit-Sliced Analysis of DES (VI) : Information-Theoretic Sensitivity Analysis of last-round-key of DES using Maximum Likelihood Estimators for i.i.d. sequence

Tohru KOHDA,  Takayuki TURUTA,  Hiroshi ISIHARA,  Shoji SHIBA,  Nobuoki EJIMA,  

[Date]2003/3/20
[Paper #]IT2002-80,ISEC2002-138,SST2002-186,ITS2002-163
A Distinguishing Attack of SNOW 2.O with Linear Masking Method

Dai WATANABE,  Alex BIRYUKOX,  Cristophe DE CANNIERE,  Bart PRENEEL,  

[Date]2003/3/20
[Paper #]IT2002-81,ISEC2002-139,SST2002-187,ITS2002-164
Study and Evaluation of the Encryption with Multi-Dimensional Space Rotation, MDSR^<[○!R]>

Keiichi KANEKO,  

[Date]2003/3/20
[Paper #]IT2002-82,ISEC2002-140,SST2002-188,ITS2002-165
Implementation of Cipher Key Generator on Realtime Communication System

Akio HASEGAWA,  Song-Ju KIM,  Ken UMENO,  

[Date]2003/3/20
[Paper #]IT2002-83,ISEC2002-141,SST2002-189,ITS2002-166
Randomness Evaluation and Hardware Implementation of Cell Automaton-based Stream Cipher

Song-Ju KIM,  Akio HASEGAWA,  Ken UMENO,  

[Date]2003/3/20
[Paper #]IT2002-84,ISEC2002-142,SST2002-190,ITS2002-167
Efficient Computations of the Tate Pairing for the Large MOV Degrees

Tetsuya IZU,  Tsuyoshi TAKAGI,  

[Date]2003/3/20
[Paper #]IT2002-85,ISEC2002-143,SST2002-191,ITS2002-168
Construction of Elliptic Curves with a suitable Embedding Degree

Tarou HIRAI,  Atsuko MIYAJI,  

[Date]2003/3/20
[Paper #]IT2002-86,ISEC2002-144,SST2002-192,ITS2002-169
Efiicient exponentiation on Genus TWO Hyperelliptic Curves(II)

Naoyuki TAKAHASHI,  Hiroaki MORIMOTO,  Atsuko MIYAJI,  

[Date]2003/3/20
[Paper #]IT2002-87,ISEC2002-145,SST2002-193,ITS2002-170
Notes on ID based Cryptosystems with Pairing over Elliptic Curve

Ryuichi SAKAI,  Masao KASAHARA,  

[Date]2003/3/20
[Paper #]IT2002-88,ISEC2002-146,SST2002-194,ITS2002-171
A note on Decoding method for Digitalwatermark based on Error Correcting Codes and Cryptography

Noriaki MINAMI,  Masao KASAHARA,  

[Date]2003/3/20
[Paper #]IT2002-89,ISEC2002-147,SST2002-195,ITS2002-172
XOAEPX-** : The possibility of modification on OAEP

Yuichi KOMANO,  Taro YAMAZAKI,  Kazuo OHTA,  

[Date]2003/3/20
[Paper #]IT2002-90,ISEC2002-148,SST2002-196,ITS2002-173
REACT-ES & OAEP++-ES : More Efficient Universal Padding Techniques for Multiplicative Trapdoor Permutation

Yuichi KOMANO,  Kazuo OHTA,  

[Date]2003/3/20
[Paper #]IT2002-91,ISEC2002-149,SST2002-197,ITS2002-174
A Forward-Secure Digital Signatule Scheme Using Previous Signatures for Renewing the Signing-Key

Tomofumi TAKAHASHI,  Junji SHIKATA,  Tsutomu MATSUMOTO,  

[Date]2003/3/20
[Paper #]IT2002-92,ISEC2002-150,SST2002-198,ITS2002-175
An Authentication method that protects user anonymity using ring signatute

Yasuhiro IIDA,  Masami UENO,  Yuji AGAWA,  

[Date]2003/3/20
[Paper #]IT2002-93,ISEC2002-151,SST2002-199,ITS2002-176
On the security of Mix-net with anonymity revocation

Koji CHIDA,  Hiroyuki KITO,  Masayuki ABE,  

[Date]2003/3/20
[Paper #]IT2002-94,ISEC2002-152,SST2002-200,ITS2002-177
A Study on Implementation of the V-PEACE Scheme Using a General-Purpose Wireless LAN System : An Inter-vehicle Communication System Using IEEE802.11a

Tomotaka NAGAOSA,  Kazuo MORI,  Hideo KOBAYASHI,  

[Date]2003/3/20
[Paper #]IT2002-95,ISEC2002-153,SST2002-201,ITS2002-178
12>> 1-20hit(39hit)