close
1.

図書

図書
Hideki Imai, Yuliang Zheng (eds.)
出版情報: Berlin : Springer, c1999  ix, 326 p. ; 24 cm
シリーズ名: Lecture notes in computer science ; 1560
所蔵情報: loading…
目次情報: 続きを見る
A New Type of "Magic Ink" Signatures - Towards Transcript-Irrelevant Anonymity Revocation / Feng Bao ; Robert H. Deng
A New Aspect of Dual Basis for Efficient Field Arithmetic / Chang-Hyi Lee ; Jong-In Lim
On the Security of Random Sources / Jean-Sébastien Coron
Anonymous Fingerprinting Based on Committed Oblivious Transfer / Josep Domingo-Ferrer
How to Enhance the Security of Public-Key Encryption at Minimum Cost / Eiichiro Fujisaki ; Tatsuaki Okamoto
Encrypted Message Authentication by Firewalls / Chandana Gamage ; Jussipekka Leiwo ; Yuliang Zheng
A Relationship between One-Wayness and Correlation Intractability / Satoshi Hada ; Toshiaki Tanaka
Message Recovery Fair Blind Signature / Hyung-Woo Lee ; Tai-Yun Kim
On Quorum Controlled Asymmetric Proxy Re-encryption / Markus Jakobsson
Mini-Cash: A Minimalistic Approach to E-Commerce
Preserving Privacy in Distributed Delegation with Fast Certificates / Pekka Nikander ; Yki Kortesniemi ; Jonna Partanen
Unknown Key-Share Attacks on the Station-to-Station (STS) Protocol / Simon Blake-Wilson ; Alfred Menezes
Toward Fair International Key Escrow - An Attempt by Distributed Trusted Third Agencies with Threshold Cryptography - / Shingo Miyazaki ; Ikuko Kuroda ; Kouichi Sakurai
How to Copyright a Function ? / David Naccache ; Adi Shamir ; Julien P. Stern
On the Security of RSA Screening
The Effectiveness of Lattice Attacks Against Low-Exponent RSA / Christophe Coupé ; Phong Nguyen ; Jacques Stern
A Trapdoor Permutation Equivalent to Factoring / Pascal Paillier
Low-Cost Double-Size Modular Exponentiation or How to Stretch Your Cryptoprocessor
Evaluating Differential Fault Analysis of Unknown Cryptosystems
Removing Interoperability Barriers Between the X.509 and EDIFACT Public Key Infrastructures: The DEDICA Project / Montse Rubia ; Juan Carlos Cruellas ; Manel Medina
Hash Functions and the MAC Using All-or-Nothing Property / Sang Uk Shin ; Kyung Hyune Rhee ; Jae Woo Yoon
Decision Oracles are Equivalent to Matching Oracles / Helena Handschuh ; Yiannis Tsiounis ; Moti Yung
Shared Generation of Random Number with Timestamp: How to Cope with the Leakage of the CA's Secret / Yuji Watanabe ; Hideki Imai
Auto-Recoverable Cryptosystems with Faster Initialization and the Escrow Hierarchy / Adam Young
A Secure Pay-per-View Scheme for Web-Based Video Service / Jianying Zhou ; Kwok-Yan Lam
Author Index
A New Type of "Magic Ink" Signatures - Towards Transcript-Irrelevant Anonymity Revocation / Feng Bao ; Robert H. Deng
A New Aspect of Dual Basis for Efficient Field Arithmetic / Chang-Hyi Lee ; Jong-In Lim
On the Security of Random Sources / Jean-Sébastien Coron
2.

図書

図書
今井秀樹, 松浦幹太共著
出版情報: 東京 : 昭晃堂, 1999.3  2, 2, 4, 200p ; 21cm
シリーズ名: 情報セキュリティシリーズ ; 第6巻
所蔵情報: loading…
3.

図書

図書
Hideki Imai, Yuliang Zheng (eds.)
出版情報: Berlin : Springer, c2000  xi, 483 p. ; 24 cm
シリーズ名: Lecture notes in computer science ; 1751
所蔵情報: loading…
目次情報: 続きを見る
A Practical and Secure Fault-Tolerant Conference-Key Agreement Protocol / Wen-Guey Tzeng
An Efficient NICE-Schnorr-Type Signature Scheme / Detlef Huhnlein ; Johannes Merkle
Identification of Bad Signatures in Batches / Jaros$law Pastuszak ; Dariusz Michalek ; Josef Pieprzyk ; Jennifer Seberry
Some Remarks on a Fair Exchange Protocol / Jianying Zhou ; Robert Deng ; Feng Bao
An Identification Scheme Based on Sparse Polynomials / Seigo Arita ; William D. Banks ; Daniel Lieman ; Igor E. Shparlinski
A State-Based Model for Certificate Management Systems / Chuchang Liu ; Maris A. Ozols ; Marie Henderson ; Tony Cant
Confidence Valuation in a Public-Key Infrastructure Based on Uncertain Evidence / Reto Kohlas ; Ueli Maurer
The Composite Discrete Logarithm and Secure Authentication / David Pointcheval
Chosen-Ciphertext Security for Any One-Way Cryptosystem
Short Proofs of Knowledge for Factoring / Guillaume Poupard ; Jacques Stern
Secure and Practical Tree-Structure Signature Schemes Based on Discrete Logarithms / X.Y.Wang ; L.C.Hui ; K.P.Chow ; W.W.Tsang ; C.F.Chong ; H.W.Chan
All-or-Nothing Transform and Remotely Keyed Encryption Protocols / Sang Uk Shin ; Weon Shin ; Kyung Hyune Rhee
Security of Public Key Certificate Based Authentication Protocols / Wu Wen ; Takamichi Saito ; Fumio Mizoguchi
Efficient Implementation of Schoof's Algorithm in Case of Characteristic 2 / Tetsuya Izu ; Jun Kogure ; Kazuhiro Yokoyama
Key Recovery in Third Generation Wireless Communication Systems / Juanma González Nieto ; DongGook Park ; Colin Boyd ; Ed Dawson
Elliptic Curves with the Montgomery-Form and Their Cryptographic Applications / Katsuyuki Okeya ; Hiroyuki Kurumatani ; Kouichi Sakurai
Certificates of Recoverability with Scalable Recovery Agent Security / Eric R. Verheul
Design Validations for Discrete Logarithm Based Signature Schemes / Ernest Brickell ; Serge Vaudenay ; Moti Yung
Optimally Efficient Accountable Time-Stamping / Ahto Buldas ; HelgerLipmaa ; Berry Schoenmakers
"Pseudorandom Intermixing": A Tool for Shared Cryptography / YairFankel ; Philip MacKenzie
RSA-Based Auto-recoverable Cryptosystems / Adam Young
Efficient and Fresh Certification / Irene Gassko ; Peter S. Gemmell
Efficient Zero-Knowledge Proofs of Knowledge Without Intractability Assumptions / Ronald Cramer ; ard
Cryptographic Approaches to Privacy in Forensic DNA Databases / Philip Bohannon ; Markus Jakobsson ; Sukamol Srikwan
Making Hash Functions from Block Ciphers Secure and Efficient by Using Convolutional Codes / Toru Inoue
An Auction Protocol Which Hides Bids of Losers / Chae Hoon Lim ; Hyo Sun Hwang ; Kazue Sako
Forward Secrecy and Its Application to Future Mobile Communications Security / Sang-Jae Moon
Selecting Cryptographic Key Sizes / Arjen K. Lenstra
A Structured ElGamal-Type Multisignature Scheme / Mike Burmester ; Yvo Desmedt ; Hiroshi Doi ; Masahiro Mambo ; Eiji Okamoto ; Mitsuru Tada ; Yuko Yoshifuji
Author Index
A Practical and Secure Fault-Tolerant Conference-Key Agreement Protocol / Wen-Guey Tzeng
An Efficient NICE-Schnorr-Type Signature Scheme / Detlef Huhnlein ; Johannes Merkle
Identification of Bad Signatures in Batches / Jaros$law Pastuszak ; Dariusz Michalek ; Josef Pieprzyk ; Jennifer Seberry
4.

図書

図書
R.W.Hamming著 ; 宮川洋, 今井秀樹訳
出版情報: 東京 : 科学技術出版社, 1980.7  xii, 230p ; 22cm
所蔵情報: loading…
5.

図書

図書
Hideki Imai, Ronald L. Rivest, Tsutomu Matsumoto (eds.)
出版情報: Berlin ; Tokyo : Springer-Verlag, c1993  x, 498 p. ; 24 cm
シリーズ名: Lecture notes in computer science ; 739
所蔵情報: loading…
6.

図書

図書
Hideki Imai, Yuliang Zheng (eds.)
出版情報: Berlin : Springer, c1998  xi, 262 p. ; 24 cm
シリーズ名: Lecture notes in computer science ; 1431
所蔵情報: loading…
目次情報: 続きを見る
Invited Talks
Distributed public key cryptosystems / Yair Frankel ; Moti Yung
How (not) to design RSA signature schemes / Jean-Francois Misarsky
Overview of elliptic curve cryptography / Kiyomichi Araki ; Takakazu Satoh ; Shinji Miura
Special Talk
Lattices and cryptography: An overview / Jacques Stern
Regular Contributions
A signcryption scheme with signature directly verifiable by public key / Feng Bao ; Robert H. Deng
Guaranteed correct sharing of integer factorization with off-line shareholders / Wenbo Mao
Lower bounds on term-based divisible cash systems / Tatsuaki Okamoto
Certifying trust / Ilari Lehti ; Pekka Nikander
On the security of server-aided RSA protocols / Johannes Merkle ; Ralph Werchner
On the security of ElGamal-based encryption / Yiannis Tsiounis
An authenticated Diffie-Hellman key agreement protocol secure against active attacks / Shouichi Hirose ; Susumu Yoshida
On the security of Girault's identification scheme / Shahrokh Saeednia ; Rei Safavi-Naini
A scheme for obtaining a message from the digital multisignature / Chin-Chen Chang ; Jyh-Jong Leu ; Pai-Cheng Huang ; Wei-Bin Lee
Secure hyperelliptic cryptosystems and their performance / Yasuyuki Sakai ; Kouichi Sakurai ; Hirokazu Ishizuka
A practical implementation of elliptic curve cryptosystems over GF(p) on a 16 bit microcomputer / Toshio Hasegawa ; Junko Nakajima ; Mitsuru Matsui
Two efficient algorithms for arithmetic of elliptic curves using Frobenius map / Jung Hee Cheon ; Sungmo Park ; Sangwoo Park ; Daeho Kim
Public-key cryptosystems using the modular group / Akihiro Yamamura
A cellular automaton based fast one-way hash function suitable for hardware implementation / Miodrag Mihaljević ; Yuliang Zheng ; Hideki Imai
A new hash function based on MDx-family and its application to MAC / Sang Uk Shin ; Kyung Hyune Rhee ; Dae Hyun Ryu ; Sang Jin Lee
Recent Results
Security issues for contactless smart cards / Michael W. David
Parameters for secure elliptic curve cryptosystem - improvements on Schoof's algorithm / Tetsuya Izu ; Jun Kogure ; Masayuki Noro ; Kazuhiro Yokoyama
A note on the complexity of breaking Okamoto-Tanaka ID-based key exchange scheme / Masahiro Mambo ; Hiroki Shizuya
Author Index
Invited Talks
Distributed public key cryptosystems / Yair Frankel ; Moti Yung
How (not) to design RSA signature schemes / Jean-Francois Misarsky
7.

図書

図書
宮川洋, 岩垂好裕, 今井秀樹共著
出版情報: 東京 : 電子情報通信学会 , 東京 : コロナ社 (発売), 2001.10  2, 7, 577p ; 21cm
シリーズ名: 名著復刻シリーズ
所蔵情報: loading…
8.

図書

図書
伊豆哲也 [ほか] 著
出版情報: 東京 : 日刊工業新聞社, 2010.4  158p ; 21cm
シリーズ名: B&Tブックス ; . 今日からモノ知りシリーズ||キョウ カラ モノシリ シリーズ
所蔵情報: loading…
9.

図書

図書
今井秀樹著
出版情報: 東京 : オーム社, 2014.9  ix, 238p ; 21cm
所蔵情報: loading…
目次情報: 続きを見る
第1章 : 序論
第2章 : 情報理論の問題
第3章 : 情報源と通信路のモデル
第4章 : 情報源符号化とその限界
第5章 : 情報量とひずみ
第6章 : 通信路符号化の限界
第7章 : 通信路符号化法
第8章 : アナログ情報源とアナログ通信路
第1章 : 序論
第2章 : 情報理論の問題
第3章 : 情報源と通信路のモデル
10.

図書

図書
電子情報通信学会編 ; 今井秀樹著
出版情報: 東京 : コロナ社, 2004.10  viii, 209p ; 26cm
シリーズ名: 電子情報通信レクチャーシリーズ / 電子情報通信学会編 ; C-1
所蔵情報: loading…
文献の複写および貸借の依頼を行う
 文献複写・貸借依頼