Presentation | 2015-03-04 Flexible Constructions of Hash Chains and Their Key Generation Shoki NISHIYAMA, Masakazu SOSHI, |
---|---|
PDF Download Page | PDF download Page Link |
Abstract(in Japanese) | (See Japanese page) |
Abstract(in English) | We have proposed simple and efficient authentication schemes with several novel elaborate hash chains. In this paper we discuss key generation scheme based on our hash chain constructions. |
Keyword(in Japanese) | (See Japanese page) |
Keyword(in English) | hash chain / authentication / protocol / security |
Paper # | ICSS2014-98 |
Date of Issue |
Conference Information | |
Committee | ICSS |
---|---|
Conference Date | 2015/2/24(1days) |
Place (in Japanese) | (See Japanese page) |
Place (in English) | |
Topics (in Japanese) | (See Japanese page) |
Topics (in English) | |
Chair | |
Vice Chair | |
Secretary | |
Assistant |
Paper Information | |
Registration To | Information and Communication System Security (ICSS) |
---|---|
Language | JPN |
Title (in Japanese) | (See Japanese page) |
Sub Title (in Japanese) | (See Japanese page) |
Title (in English) | Flexible Constructions of Hash Chains and Their Key Generation |
Sub Title (in English) | |
Keyword(1) | hash chain |
Keyword(2) | authentication |
Keyword(3) | protocol |
Keyword(4) | security |
1st Author's Name | Shoki NISHIYAMA |
1st Author's Affiliation | Faculty of Information Sciences, Hiroshima City University() |
2nd Author's Name | Masakazu SOSHI |
2nd Author's Affiliation | Faculty of Information Sciences, Hiroshima City University |
Date | 2015-03-04 |
Paper # | ICSS2014-98 |
Volume (vol) | vol.114 |
Number (no) | 489 |
Page | pp.pp.- |
#Pages | 6 |
Date of Issue |