FOREWORD (Special Section on Cryptography and Information Security)
スポンサーリンク
概要
- 論文の詳細を見る
- 社団法人電子情報通信学会の論文
- 1996-01-25
著者
-
MATSUMOTO Tsutomu
Yokohama National University
-
Miyano Hiroshi
Telecommunication Advanced Organization
-
Akiyama Ryota
Fujitsu Laboratories Ltd.
-
MATSUI Mitsuru
Mitsubishi Electric Corporation
-
Itoh Shuichi
University Of Electro-communications
-
Itoh Toshiya
Tokyo Inst. Technol. Tokyo Jpn
-
Itoh Toshiya
Tokyo Institute Of Technology
-
Shizuya Hiroki
Tohoku University
-
Kaneko Toshinobu
Science University of Tokyo
-
Miyano Hiroshi
NEC Corporation
-
Ohta Kazuo
Nippon Telegraph and Telephone Corporation
-
Tatebayashi Makoto
Matsushita Electric Industrial Company Ltd
-
Okamoto Eiji
Information Science in JAIST (Japan Advanced Institute of Science and Technology)
-
Itoh Toshiya
Tokyo Inst. Of Technol. Tokyo Jpn
-
Matsumoto Tsutomu
Yokohama National Univ. Yokohama‐shi Jpn
-
Shizuya Hiroki
Tohoku Univ. Sendai‐shi Jpn
関連論文
- E2-A New 128-Bit Block Cipher(Special Section on Cryptography and Information Security)
- Digitally Signed Document Sanitizing Scheme with Disclosure Condition Control(Application)(Cryptography and Information Security)
- On the security of Feistel Ciphers with SPN Round Function against Differential, Linear, and Truncated Differential Cryptanalysis(Special Section on Cryptography and Information Security)
- Multi-Pass Malware Sandbox Analysis with Controlled Internet Connection
- Linear Cryptanalysis by Linear Sieve Method (Special Section on Cryptography and Information Security)
- The 128-Bit Block Cipher Camellia(Special Section on Cryptography and Information Security)
- Linear Cryptanalysis of FEAL (Special Section on Cryptography and Information Security)
- Performance Analysis and Parallel Implementation of Dedicated Hash Functions on Pentium III(Special Section on Cryptography and Information Security)
- FOREWORD (Special Section on Cryptography and Information Security)
- Approximation Algorithms for the Highway Problem under the Coupon Model
- Approximation Preserving Reductions among Item Pricing Problems
- The Security of an RDES Cryptosystem against Linear Cryptanalysis (Special Section on Cryptography and Information Security)
- A MAC Forgery Attack on SOBER-128(Discrete Mathematics and Its Applications)
- Your Sandbox is Blinded: Impact of Decoy Injection to Public Malware Analysis Systems
- Special Section on Cryptography and Information Security
- Dynamic Swapping Schemes and Differential Cryptanalysis (Special Section on Information Theory and Its Applications)
- An Efficient Interpolation Attack(Special Section on Cryptography and Information Security)
- Improved Higher Order Differential Attack and Its Application to Nyberg-Knudsen's Designed Block Cipher
- Improved Approximation Algorithms for Item Pricing with Bounded Degree and Valuation
- Information-Flow-Based Access Control for Web Browsers
- Effectiveness of Outline Measures of Strength against Differential and Linear Cryptanalysis (Special Section on Cryptography and Information Security)
- Diffretial Cryptanalysis of CAST-256 Reduced to Nine Quad-Rounds(Special Section on Fundamentals of Information and Communications)
- Improved Lower Bounds for Competitive Ratio of Multi-Queue Switches in QoS Networks(Discrete Mathematics and Its Applications)
- Malware Sandbox Analysis with Efficient Observation of Herder's Behavior
- Malware Sandbox Analysis with Efficient Observation of Herder's Behavior
- Catching the Behavioral Differences between Multiple Executions for Malware Detection
- FOREWORD
- Catching the Behavioral Differences between Multiple Executions for Malware Detection