Information and Systems-Software Science(Date:2003/03/20)

Presentation
表紙

,  

[Date]2003/3/20
[Paper #]
目次

,  

[Date]2003/3/20
[Paper #]
Power Analysis attack on AES and countermeasure

Suguru NAKASHIMA,  Mitsuhiko FUJIO,  

[Date]2003/3/20
[Paper #]SST2002-184
S-Box-and-Bit-Sliced Analysis of DBS (V) : Dual Representation of 2-round DES Characteristics for Information-Theoretic Sensitivity Analysis of DES key

Tohru KOHDA,  Shoji SHIBA,  Hiroshi ISHIHARA,  Takayuki TURUTA,  Nobuoki EJIMA,  

[Date]2003/3/20
[Paper #]SST2002-185
S-Box-and-Bit-Sliced Analysis of DBS (VI) : Information-Theoretic Sensitivity Analysis of last-round-key of DES using Maximum Likelihood Estimators for i.i.d. sequence

Tohru KOHDA,  Takayuki TURUTA,  Hiroshi ISHIHARA,  Shoji SHIBA,  Nobuoki EJIMA,  

[Date]2003/3/20
[Paper #]SST2002-186
A Distinguishing Attack of SNOW 2.0 with Linear Masking Method

Dai WATANABE,  Alex BIRYUKOV,  Christophe DE CANNIERE,  Bart PRENEEL,  

[Date]2003/3/20
[Paper #]SST2002-187
Study and Evaluation of the Encryption with Multi-Dimensional Space Rotation, MDSR^<[○!R]>

Keiichi KANEKO,  

[Date]2003/3/20
[Paper #]SST2002-188
Implementation of Cipher Key Generator on Realtime Communication System

Akio HASEGAWA,  Song-Ju KIM,  Ken UMENO,  

[Date]2003/3/20
[Paper #]SST2002-189
Randomness Evaluation and Hardware Implementation of Cell Automaton-based Stream Cipher

Song-Ju KIM,  Akio HASEGAWA,  Ken UMENO,  

[Date]2003/3/20
[Paper #]SST2002-190
Efficient Computations of the Tate Pairing for the Large MOV Degrees

Tetsuya IZU,  Tsuyoshi TAKAGI,  

[Date]2003/3/20
[Paper #]SST2002-191
Construction of Elliptic Curves with a suitable Embedding Degree

Tarou HIRAI,  Atsuko MIYAJI,  

[Date]2003/3/20
[Paper #]SST2002-192
Efficient exponentiation on Genus Two Hyperelliptic Curves(II)

Naoyuki TAKAHASHI,  Hiroaki MORIMOTO,  Atsuko MIYAJI,  

[Date]2003/3/20
[Paper #]SST2002-193
Notes on ID based Cryptosystems with Pairing over Elliptic Curve

Ryuichi SAKAI,  Masao KASAHARA,  

[Date]2003/3/20
[Paper #]SST2002-194
A note on Decoding method for Digitalwatermark based on Error Correcting Codes and Cryptography

Noriaki MINAMI,  Masao KASAHARA,  

[Date]2003/3/20
[Paper #]SST2002-195
XOAEPX-** : The possibility of modification on OAEP

Yuichi KOMANO,  Taro YAMAZAKI,  Kazuo OHTA,  

[Date]2003/3/20
[Paper #]SST2002-196
REACT-ES & OAEP++-ES : More Efficient Universal Padding Techniques for Multiplicative Trapdoor Permutation

Yuichi KOMANO,  Kazuo OHTA,  

[Date]2003/3/20
[Paper #]SST2002-197
A Forward-Secure Digital Signature Scheme Using Previous Signatures for Renewing the Signing-Key

Tomofumi TAKAHASHI,  Junji SHIKATA,  Tsutomu MATSUMOTO,  

[Date]2003/3/20
[Paper #]SST2002-198
An Authentication method that protects user anonymity using ring signature

Yasuhiro IIDA,  Masami UENO,  Yuji AGAWA,  

[Date]2003/3/20
[Paper #]SST2002-199
On the security of Mix-net with anonymity revocation

Koji CHIDA,  Hiroyuki KITO,  Masayuki ABE,  

[Date]2003/3/20
[Paper #]SST2002-200
A Study on Implementation of the V-PEACE Scheme Using General-Purpose Wireless LAN System : An Inter-vehicle Communication System Using IEEE802.11a

Tomotaka NAGAOSA,  Kazuo MORI,  Hideo KOBAYASHI,  

[Date]2003/3/20
[Paper #]SST2002-201
12>> 1-20hit(39hit)