close
1.

図書

図書
Kazuo Ohta, Dingyi Pei (eds.)
出版情報: Berlin ; Tokyo : Springer, c1998  xii, 436 p. ; 24 cm
シリーズ名: Lecture notes in computer science ; 1514
所蔵情報: loading…
2.

図書

図書
Josef Pieprzyk, Reihanah Safavi-Naini (eds.)
出版情報: Berlin ; Tokyo : Springer-Verlag, c1995  xii, 430 p. ; 24 cm
シリーズ名: Lecture notes in computer science ; 917
所蔵情報: loading…
3.

図書

図書
Kwangjo Kim, Tsutomu Matsumoto (eds.)
出版情報: Berlin ; Tokyo : Springer-Verlag, c1996  xii, 394 p. ; 24 cm
シリーズ名: Lecture notes in computer science ; 1163
所蔵情報: loading…
4.

図書

図書
Hideki Imai, Ronald L. Rivest, Tsutomu Matsumoto (eds.)
出版情報: Berlin ; Tokyo : Springer-Verlag, c1993  x, 498 p. ; 24 cm
シリーズ名: Lecture notes in computer science ; 739
所蔵情報: loading…
5.

図書

図書
Yuliang Zheng (ed.)
出版情報: Berlin ; Tokyo : Springer, c2002  xiii, 578 p. ; 24 cm
シリーズ名: Lecture notes in computer science ; 2501
所蔵情報: loading…
6.

図書

図書
Tatsuaki Okamoto (ed.)
出版情報: Berlin ; New York : Springer, c2000  xii, 630 p. ; 24 cm
シリーズ名: Lecture notes in computer science ; 1976
所蔵情報: loading…
7.

図書

図書
Xuejia Lai, Kefei Chen (eds.)
出版情報: Berlin : Springer, c2006  xiv, 468 p. ; 24 cm
シリーズ名: Lecture notes in computer science ; 4284
所蔵情報: loading…
8.

図書

図書
Bimal Roy (ed.)
出版情報: Berlin : Springer, c2005  xiv, 701 p. ; 24 cm
シリーズ名: Lecture notes in computer science ; 3788
所蔵情報: loading…
9.

図書

図書
Pil Joong Lee (ed.)
出版情報: Berlin ; Tokyo : Springer, c2004  xvi, 546 p. ; 24 cm
シリーズ名: Lecture notes in computer science ; 3329
所蔵情報: loading…
10.

図書

図書
Kwok Yan Lam, Eiji Okamoto, Chaoping Xing (eds.)
出版情報: Berlin : Springer, c1999  xi, 414 p. ; 24 cm
シリーズ名: Lecture notes in computer science ; 1716
所蔵情報: loading…
目次情報: 続きを見る
Invited Talk
Modulus Search for Elliptic Curve Cryptosystems / K. Koyama ; Y. Tsuruoka ; N. Kunihiro
Asymmetric Key Cryptosystems
On the Lai-Massey Scheme / S. Vaudenay
On Cryptographically Secure Vectorial Boolean Functions / T. Satoh ; T. Iwata ; K. Kurosawa
Analysis
Equivalent Keys of HPC / C. D'Halluin ; G. Bijnens ; B. Preneel ; V. Rijmen
Cryptanalysis of Five Rounds of CRYPTON Using Impossible Differentials / H. Seki ; T. Kaneko
Cryptanalysis of Two Cryptosystems Based on Group Actions / S. R. Blackburn ; S. D. Galbraith
Probabilistic Higher Order Differential Attack and Higher Order Bent Functions
Elliptic Curve Cryptosystems
Fast Algorithms for Elliptic Curve Cryptosystems over Binary Finite Field / Y. F. Han ; P.-C. Leong ; P.-C. Tan ; J. Zhang
Optimizing the Menezes-Okamoto-Vanstone (MOV) Algorithm for Non-supersingular Elliptic Curves / J. Shikata ; Y. Zheng ; J. Suzuki ; H. Imai
Speeding up the Discrete Log Computation on Curves with Automorphisms / I. Duursma ; P. Gaudry ; F. Morain
ECC: Do We Need to Count? / J.-S. Coron ; H. Handschuh ; D. Naccache
Elliptic Scalar Multiplication Using Point Halving / E. W. Knudsen
Public Key Cryptosystems
On the Design of RSA with Short Secret Exponent / H.-M. Sun ; W.-C. Yang ; C.-S. Laih
Efficient Public-Key Cryptosystems Provably Secure Against Active Adversaries / P. Paillier ; D. Pointcheval
Adaptively-Secure Optimal-Resilience Proactive RSA / Y. Frankel ; P. MacKenzie ; M. Yung
Integers and Computation
Factorization of RSA-140 Using the Number Field Sieve / S. Cavallar ; B. Dodson ; A. Lenstra ; P. Leyland ; W. Lioen ; P. L. Montgomery ; B. Murphy ; H. te Riele ; P. Zimmermann
How to Prove that a Committed Number Is Prime / T. V. Le ; K. Q. Nguyen ; V. Varadharajan
Reducing Logarithms in Totally Non-maximal Imaginary Quadratic Orders to Logarithms in Finite Fields / D. Huhnlein ; T. Takagi
General Adversaries in Unconditional Multi-party Computation / M. Fitzi ; M. Hirt ; U. Maurer
Network Security
Approximation Hardness and Secure Communication in Broadcast Channels / Y. Desmedt ; Y. Wang
Mix-Networks on Permutation Networks / M. Abe
Secure Communication in an Unknown Network Using Certificates / M. Burmester
Random Number
Linear Complexity versus Pseudorandomness: On Beth and Dai's Result
A Class of Explicit Perfect Multi-sequences / C. P. Xing ; K. Y. Lam ; Z. H. Wei
Cryptanalysis of LFSR-Encrypted Codes with Unknown Combining Function / S. Palit ; B. K. Roy
Key Management
Doing More with Fewer Bits / A. E. Brouwer ; R. Pellikaan ; E. R. Verheul
A Quick Group Key Distribution Scheme with "Entity Revocation" / J. Anzai ; N. Matsuzaki ; T. Matsumoto
An Efficient Hierachical Identity-Based Key-Sharing Method Resistant Against Collusion-Attacks / G. Hanaoka ; T. Nishioka
Periodical Multi-secret Threshold Cryptosystems / M. Numao
Authentication
A Signature Scheme with Message Recovery as Secure as Discrete Logarithm / T. Okamoto
Broadcast Authentication in Group Communication / Y. J. Wang ; R. Safavi-Naini ; H. X. Wang
Author Index
Invited Talk
Modulus Search for Elliptic Curve Cryptosystems / K. Koyama ; Y. Tsuruoka ; N. Kunihiro
Asymmetric Key Cryptosystems
文献の複写および貸借の依頼を行う
 文献複写・貸借依頼