情報セキュリティ学術研究マップ<ISAM>(α版)

The University of Electro-Communications所属の方の論文一覧

論文が13件見つかりました.

  1. An Information Theoretic Perspective on the Differential Fault Analysis against AES, サイドチャネル攻撃, SCIS 2010.
    YangLiThe University of Electro-Communications), ShigetoGomisawaThe University of Electro-Communications), KazuoSakiyamaThe University of Electro-Communications), KazuoOhtaThe University of Electro-Communications
  2. Preimages of Step-Reduced Tiger, ハッシュ関数, SCIS 2010.
    LeiWangThe University of Electro-Communications), YuSasakiNTT Corporation
  3. Improvement of a Lattice Based Cryptosystem Using Polynomial Ring, 格子, SCIS 2009.
    TomotakaHanawaThe University of Electro-Communications), NoboruKunihirothe University of Tokyo
  4. Provably Secure Authenticated Group Key Exchange without PKI, 鍵共有, SCIS 2008.
    HarukiOtaKDDI R&D Laboratories, Inc.), KazukiYoneyamaThe University of Electro-Communications), ShinsakuKiyomotoKDDI R&D Laboratories, Inc.), ToshiakiTanakaKDDI R&D Laboratories, Inc.
  5. A New 'On the Fly' Identification Scheme: A Trade-off of Asymptoticity between ZK and Correctness, 認証技術, SCIS 2008.
    BagusSantosoThe University of Electro-Communications
  6. QIM Audio Watermarking Systems Using LDPC Code with Soft Decoding, 電子透かし, SCIS 2008.
    Martinez-NoriegaRaulThe University of Electro-Communications), NakanoMarikoNational Polytechnic Institute), KurkoskiBrianThe University of Electro-Communications), YamaguchiKazuhikoThe University of Electro-Communications
  7. Password Recovery Attack on Authentication Protocol MD4(Password || Challenge), ハッシュ関数, SCIS 2008.
    LeiWangThe University of Electro-Communications), KazuoOhtaThe University of Electro-Communications
  8. Generalizing Micropayment System based on Probabilistic Polling, 暗号プロトコル, SCIS 2008.
    BagusSantosoThe University of Electro-Communications), YangLiHarbin Engineering University
  9. A Bridge between Standard and Strong Existential Unforgeabilities, 暗号理論, SCIS 2006.
    BagusSantosoThe University of Electro-Communications), KazuoOhtaThe University of Electro-Communications
  10. How to Compare Two Polynomially Shared Secrets Privately, 秘密分散, SCIS 2006.
    TakashiNishideHitachi Software Engineering Co., Ltd.), KazuoOhtaThe University of Electro-Communications
  11. Universally Composable Hierarchical Hybrid Authenticated Key Exchange, 鍵共有, SCIS 2006.
    HarukiOtaKDDI R&D Laboratories, Inc. ), KazukiYoneyamaThe University of Electro-Communications), ShinsakuKiyomotoKDDI R&D Laboratories, Inc. ), ToshiakiTanakaKDDI R&D Laboratories, Inc. ), KazuoOhtaThe University of Electro-Communications
  12. How to Construct Sufficient Condition in Searching Collisions of MD5, ハッシュ関数, SCIS 2006.
    YuSasakiThe University of Electro-Communications), YusukeNaitoThe University of Electro-Communications), JunYajimaFujitsu Laboratories Ltd), TakeshiShimoyamaFujitsu Laboratories Ltd), NoboruKunihiroThe University of Electro-Communications), KazuoOhtaThe University of Electro-Communications
  13. On the Inversion Problem of One-way Functions using NMR Quantum Computers, 量子セキュリティシステム, SCIS 2004.
    SeiyaOkuboThe University of Electro-Communications), TetsuroNishinoThe University of Electro-Communications), NoboruKunihiroThe University of Electro-Communications), KazuoOhtaThe University of Electro-Communications