Special Section on Cryptography and Information Security
スポンサーリンク
概要
- 論文の詳細を見る
- 社団法人電子情報通信学会の論文
- 1997-01-25
著者
-
Sakurai Kouichi
Kyushu Univ. Fukuoka‐shi Jpn
-
Sakurai Kouichi
Kyushu Univ. Fukuoka Jpn
-
Miyano Hiroshi
Telecommunication Advanced Organization
-
MATSUI Mitsuru
Mitsubishi Electric Corporation
-
Sakurai Kouichi
Kyushu University
-
Itoh Toshiya
Tokyo Inst. Technol. Tokyo Jpn
-
Itoh Toshiya
Tokyo Institute Of Technology
-
Kaneko Toshinobu
Science University of Tokyo
-
KOYAMA Kenji
NTT Communication Science Laboratories
-
Nakao Koji
Kdd Laboratories
-
Kamitake Takashi
Toshiba Corporation
-
Mambo Masahiro
Japan Advanced Institute of Science and Technology
-
Tanaka Hatsukazu
IEEE
-
Itoh Toshiya
Tokyo Inst. Of Technol. Tokyo Jpn
-
Tanaka Hatsukazu
Ieee:iacr
関連論文
- ESS-FH: Enhanced Security Scheme for Fast Handover in Hierarchical Mobile IPv6
- A study on worms using search engine to spread (情報通信システムセキュリティ)
- A New Secret Sharing Scheme Based on the Multi-Dealer
- Analysis of Program Obfuscation Schemes with Variable Encoding Technique
- Reliable Key Distribution Scheme for Lossy Channels
- On Effectiveness of Clock Control in Stream Ciphers(Information Theory and Its Applications)
- Experimental Analysis of Guess-and-Determine Attacks on Clock-Controlled Stream Ciphers(Cryptography and Information Security, Information Theory and Its Applications)
- ESS-FH : Enhanced Security Scheme for Fast Handover in Hierarchical Mobile IPv6
- An Enhanced Security Protocol for Fast Mobile IPv6
- A Security Analysis on Kempf-Koodli's Security Scheme for Fast Mobile IPv6
- Modeling Security Bridge Certificate Authority Architecture
- An Adaptive Reputation-Based Algorithm for Grid Virtual Organization Formation
- Linear Cryptanalysis by Linear Sieve Method (Special Section on Cryptography and Information Security)
- The 128-Bit Block Cipher Camellia(Special Section on Cryptography and Information Security)
- Linear Cryptanalysis of FEAL (Special Section on Cryptography and Information Security)
- Performance Analysis and Parallel Implementation of Dedicated Hash Functions on Pentium III(Special Section on Cryptography and Information Security)
- FOREWORD (Special Section on Cryptography and Information Security)
- Analysis of Program Obfuscation Schemes with Variable Encoding Technique
- Approximation Algorithms for the Highway Problem under the Coupon Model
- Approximation Preserving Reductions among Item Pricing Problems
- FOREWORD
- FOREWORD
- Economic-inspired truthful reputation feedback mechanism in P2P networks
- On securing open networks through trust and reputation-architecture, challenges and solutions
- The Security of an RDES Cryptosystem against Linear Cryptanalysis (Special Section on Cryptography and Information Security)
- Distributed Noise Generation for Density Estimation Based Clustering without Trusted Third Party
- Security and Correctness Analysis on Privacy-Preserving k-Means Clustering Schemes
- Private Data Clustering based on Secure Approximation
- A MAC Forgery Attack on SOBER-128(Discrete Mathematics and Its Applications)
- Special Section on Cryptography and Information Security
- 1-out-of-L E-voting System with Efficient Computational Complexity Based on r-th Residue Encryption
- Demonstrating Possession without Revealing Factors (Special Section on Cryptography and Information Security)
- Efficient Context-Sensitive Intrusion Detection Based on State Transition Table
- Improved Subset Difference Method with Ternary Tree
- Two Discrete Log Algorithms for Super-Anomalous Elliptic Curves and Their Applications(Special Section on Cryptography and Information Security)
- Efficient Cryptosystems over Elliptic Curves Based on a Product of Form-Free Primes (Special Section on Information Theory and Its Applications)
- A New RSA-Type Scheme Based on Singular Cubic Curves y^2≡x^3+bx^2 (mod n)
- Dynamic Swapping Schemes and Differential Cryptanalysis (Special Section on Information Theory and Its Applications)
- An Efficient Interpolation Attack(Special Section on Cryptography and Information Security)
- A New Version of FEAL, Stronger against Differential Cryptanalysis (Special Section on Cryptography and Information Security)
- Trends and Security Issues for Contactless Smart Cards
- A New RSA-Type Scheme Based on Singular Cubic Curves (y-αx)(y-βx )≡x^3 (mod n) (Special Section on Cryptography and Information Security)
- Improved Higher Order Differential Attack and Its Application to Nyberg-Knudsen's Designed Block Cipher
- Fast Exponentiation Algorithms Based on Batch-Processing and Precomputation (Special Section on Cryptography and Information Security)
- A Signed Binary Window Method for Fast Computing over Elliptic Curves (Special Section on Cryptography and Information Security)
- Improved Approximation Algorithms for Item Pricing with Bounded Degree and Valuation
- Elliptic Curve Cryptosystems and Their Applications
- Diffretial Cryptanalysis of CAST-256 Reduced to Nine Quad-Rounds(Special Section on Fundamentals of Information and Communications)
- On the Solutions of the Diophantine Equation x^3+y^3+z^3=n
- How to Strengthen DES-like Cryptosystems against Differential Cryptanalysis (Special Section on Cryptography and Information Security)
- Improved Lower Bounds for Competitive Ratio of Multi-Queue Switches in QoS Networks(Discrete Mathematics and Its Applications)
- Optimization of Group Key Management Structure with a Client Join-Leave Mechanism
- Fast Implementation of KCipher-2 for Software and Hardware
- Optimization of Group Key Management Structure with a Client Join-Leave Mechanism
- Improved Elliptic Curve Methods for Factoring and Their Performance (Special Section on Cryptography and Information Security)