Engineering Sciences/NOLTA-Information Theory(Date:2006/07/13)

Presentation
表紙

,  

[Date]2006/7/13
[Paper #]
目次

,  

[Date]2006/7/13
[Paper #]
正誤表

,  

[Date]2006/7/13
[Paper #]
A Translation Matrix between Two Isomorphic Extension Fields via Optimal Normal Basis Representation

Ryo NAMBA,  Yasuyuki NOGAMI,  Yoshitaka MORIKAWA,  

[Date]2006/7/13
[Paper #]ISEC2006-9,SITE2006-6
Square Root Calculation Algorithm over Type-II All One Polynomial Field

Hidehiro KATOU,  FENG Wang,  Yasuyuki NOGAMI,  Yoshitaka MORIKAWA,  

[Date]2006/7/13
[Paper #]ISEC2006-10,SITE2006-7
Pairing Computation with MNT Curve over All One Polynomial Field

Masataka AKANE,  Takumi OKIMOTO,  Ysuyuki NOGAMI,  Yoshitaka MORIKAWA,  

[Date]2006/7/13
[Paper #]ISEC2006-11,SITE2006-8
Efficient Algorithm for Tate Pairing

Masaaki SHIRASE,  Tsuyoshi TAKAGI,  Eiji OKAMOTO,  

[Date]2006/7/13
[Paper #]ISEC2006-12,SITE2006-9
A Survey on Dedicated Factoring Devices (Sieving Step)

Tetsuya IZU,  Noboru KUNIHIRO,  Takeshi SHIMOYAMA,  

[Date]2006/7/13
[Paper #]ISEC2006-13,SITE2006-10
A Proposal to Hi-Tech Pollution Based on the Criterion of "Relationism-First" : A Principle Experiment of EM Environment around VDT and Its Basic Theory

Yoshifumi FUJITA,  Mitsuo OHTA,  

[Date]2006/7/13
[Paper #]ISEC2006-14,SITE2006-11
Copyright and Property Protection System of Using Information Filter and Information Capsule

Kota YAMADA,  Hirotsugu KINOSHITA,  Tetsuya MORIZUMI,  

[Date]2006/7/13
[Paper #]ISEC2006-15,SITE2006-12
Balance between Security and Privacy : A Case of EU Derivative on Communications Data Retention

Yasutoshi Ishizaki,  

[Date]2006/7/13
[Paper #]ISEC2006-16,SITE2006-13
A Study on Dynamic Risk Analysis Corresponding to Environmental Changes

Hideaki KAWANISHI,  Koichi KATO,  Tatsuaki TAKAHASHI,  CACERES Guillermo Horacio RAMIREZ,  Yoshimi TESHIGAWARA,  

[Date]2006/7/13
[Paper #]ISEC2006-17,SITE2006-14
Survey and Analysis on Data Delete in PC for Internet Auction

Satsuki Sato,  Yuki Ashino,  Uehara U,  Ryoichi Sasaki,  

[Date]2006/7/13
[Paper #]ISEC2006-18,SITE2006-15
Development of Internet Watchdog Systems for Children Protection

Tatsumi UEDA,  Yoshiaki TAKAI,  

[Date]2006/7/13
[Paper #]ISEC2006-19,SITE2006-16
Secure Exponentiation with High Flexibility

Camille VUILLAUME,  Katsuyuki OKEYA,  

[Date]2006/7/13
[Paper #]ISEC2006-20,SITE2006-17
Double-Size Montgomery Multiplication of a Crypto-Coprocessor

Masayuki YOSHINO,  Katsuyuki OKEYA,  Camille VUILLAUME,  

[Date]2006/7/13
[Paper #]ISEC2006-21,SITE2006-18
An Improved Mehtod for the Table Lookup Multiplication Algorithm over GF (2^m)

Yoichi HADAMA,  Daisuke NAKAMURA,  Masanori HIROTOMO,  Masakatu MORII,  

[Date]2006/7/13
[Paper #]ISEC2006-22,SITE2006-19
Fast Generation of Safe Primes using Deterministic Primality Tests based on Maurer Method

Hidehiro Kumakyu,  Akito Niwa,  

[Date]2006/7/13
[Paper #]ISEC2006-23,SITE2006-20
A Method for Generating Elliptic Curves suitable for Implementing an Efficient Group Signature scheme

Norikazu KUBOTERA,  Jun FURUKAWA,  Kazue SAKO,  

[Date]2006/7/13
[Paper #]ISEC2006-24,SITE2006-21
Batch Processing of Interactive Proofs

Go YAMAMOTO,  Koji CHIDA,  

[Date]2006/7/13
[Paper #]ISEC2006-25,SITE2006-22
12>> 1-20hit(37hit)