close
1.

図書

図書
今井秀樹著
出版情報: 東京 : 裳華房, 1998.7  iv, 118p ; 19cm
シリーズ名: ポピュラーサイエンス
所蔵情報: loading…
2.

図書

図書
Hideki Imai, Yuliang Zheng (eds.)
出版情報: Berlin : Springer, c1998  xi, 262 p. ; 24 cm
シリーズ名: Lecture notes in computer science ; 1431
所蔵情報: loading…
目次情報: 続きを見る
Invited Talks
Distributed public key cryptosystems / Yair Frankel ; Moti Yung
How (not) to design RSA signature schemes / Jean-Francois Misarsky
Overview of elliptic curve cryptography / Kiyomichi Araki ; Takakazu Satoh ; Shinji Miura
Special Talk
Lattices and cryptography: An overview / Jacques Stern
Regular Contributions
A signcryption scheme with signature directly verifiable by public key / Feng Bao ; Robert H. Deng
Guaranteed correct sharing of integer factorization with off-line shareholders / Wenbo Mao
Lower bounds on term-based divisible cash systems / Tatsuaki Okamoto
Certifying trust / Ilari Lehti ; Pekka Nikander
On the security of server-aided RSA protocols / Johannes Merkle ; Ralph Werchner
On the security of ElGamal-based encryption / Yiannis Tsiounis
An authenticated Diffie-Hellman key agreement protocol secure against active attacks / Shouichi Hirose ; Susumu Yoshida
On the security of Girault's identification scheme / Shahrokh Saeednia ; Rei Safavi-Naini
A scheme for obtaining a message from the digital multisignature / Chin-Chen Chang ; Jyh-Jong Leu ; Pai-Cheng Huang ; Wei-Bin Lee
Secure hyperelliptic cryptosystems and their performance / Yasuyuki Sakai ; Kouichi Sakurai ; Hirokazu Ishizuka
A practical implementation of elliptic curve cryptosystems over GF(p) on a 16 bit microcomputer / Toshio Hasegawa ; Junko Nakajima ; Mitsuru Matsui
Two efficient algorithms for arithmetic of elliptic curves using Frobenius map / Jung Hee Cheon ; Sungmo Park ; Sangwoo Park ; Daeho Kim
Public-key cryptosystems using the modular group / Akihiro Yamamura
A cellular automaton based fast one-way hash function suitable for hardware implementation / Miodrag Mihaljević ; Yuliang Zheng ; Hideki Imai
A new hash function based on MDx-family and its application to MAC / Sang Uk Shin ; Kyung Hyune Rhee ; Dae Hyun Ryu ; Sang Jin Lee
Recent Results
Security issues for contactless smart cards / Michael W. David
Parameters for secure elliptic curve cryptosystem - improvements on Schoof's algorithm / Tetsuya Izu ; Jun Kogure ; Masayuki Noro ; Kazuhiro Yokoyama
A note on the complexity of breaking Okamoto-Tanaka ID-based key exchange scheme / Masahiro Mambo ; Hiroki Shizuya
Author Index
Invited Talks
Distributed public key cryptosystems / Yair Frankel ; Moti Yung
How (not) to design RSA signature schemes / Jean-Francois Misarsky
3.

図書

図書
Hideki Imai, Yuliang Zheng (eds.)
出版情報: Berlin : Springer, c1999  ix, 326 p. ; 24 cm
シリーズ名: Lecture notes in computer science ; 1560
所蔵情報: loading…
目次情報: 続きを見る
A New Type of "Magic Ink" Signatures - Towards Transcript-Irrelevant Anonymity Revocation / Feng Bao ; Robert H. Deng
A New Aspect of Dual Basis for Efficient Field Arithmetic / Chang-Hyi Lee ; Jong-In Lim
On the Security of Random Sources / Jean-Sébastien Coron
Anonymous Fingerprinting Based on Committed Oblivious Transfer / Josep Domingo-Ferrer
How to Enhance the Security of Public-Key Encryption at Minimum Cost / Eiichiro Fujisaki ; Tatsuaki Okamoto
Encrypted Message Authentication by Firewalls / Chandana Gamage ; Jussipekka Leiwo ; Yuliang Zheng
A Relationship between One-Wayness and Correlation Intractability / Satoshi Hada ; Toshiaki Tanaka
Message Recovery Fair Blind Signature / Hyung-Woo Lee ; Tai-Yun Kim
On Quorum Controlled Asymmetric Proxy Re-encryption / Markus Jakobsson
Mini-Cash: A Minimalistic Approach to E-Commerce
Preserving Privacy in Distributed Delegation with Fast Certificates / Pekka Nikander ; Yki Kortesniemi ; Jonna Partanen
Unknown Key-Share Attacks on the Station-to-Station (STS) Protocol / Simon Blake-Wilson ; Alfred Menezes
Toward Fair International Key Escrow - An Attempt by Distributed Trusted Third Agencies with Threshold Cryptography - / Shingo Miyazaki ; Ikuko Kuroda ; Kouichi Sakurai
How to Copyright a Function ? / David Naccache ; Adi Shamir ; Julien P. Stern
On the Security of RSA Screening
The Effectiveness of Lattice Attacks Against Low-Exponent RSA / Christophe Coupé ; Phong Nguyen ; Jacques Stern
A Trapdoor Permutation Equivalent to Factoring / Pascal Paillier
Low-Cost Double-Size Modular Exponentiation or How to Stretch Your Cryptoprocessor
Evaluating Differential Fault Analysis of Unknown Cryptosystems
Removing Interoperability Barriers Between the X.509 and EDIFACT Public Key Infrastructures: The DEDICA Project / Montse Rubia ; Juan Carlos Cruellas ; Manel Medina
Hash Functions and the MAC Using All-or-Nothing Property / Sang Uk Shin ; Kyung Hyune Rhee ; Jae Woo Yoon
Decision Oracles are Equivalent to Matching Oracles / Helena Handschuh ; Yiannis Tsiounis ; Moti Yung
Shared Generation of Random Number with Timestamp: How to Cope with the Leakage of the CA's Secret / Yuji Watanabe ; Hideki Imai
Auto-Recoverable Cryptosystems with Faster Initialization and the Escrow Hierarchy / Adam Young
A Secure Pay-per-View Scheme for Web-Based Video Service / Jianying Zhou ; Kwok-Yan Lam
Author Index
A New Type of "Magic Ink" Signatures - Towards Transcript-Irrelevant Anonymity Revocation / Feng Bao ; Robert H. Deng
A New Aspect of Dual Basis for Efficient Field Arithmetic / Chang-Hyi Lee ; Jong-In Lim
On the Security of Random Sources / Jean-Sébastien Coron
4.

図書

図書
Hideki Imai, Ronald L. Rivest, Tsutomu Matsumoto (eds.)
出版情報: Berlin ; Tokyo : Springer-Verlag, c1993  x, 498 p. ; 24 cm
シリーズ名: Lecture notes in computer science ; 739
所蔵情報: loading…
5.

図書

図書
今井秀樹, 松浦幹太共著
出版情報: 東京 : 昭晃堂, 1999.3  2, 2, 4, 200p ; 21cm
シリーズ名: 情報セキュリティシリーズ ; 第6巻
所蔵情報: loading…
6.

図書

図書
今井秀樹著 ; 電子情報通信学会編
出版情報: 東京 : 電子情報通信学会 , 東京 : コロナ社 (発売), 1990.3  xiv, 341p ; 22cm
所蔵情報: loading…
文献の複写および貸借の依頼を行う
 文献複写・貸借依頼