Print edition: ISSN 0913-5685 Online edition: ISSN 2432-6380
[TOP] | [2006] | [2007] | [2008] | [2009] | [2010] | [2011] | [2012] | [Japanese] / [English]
ISEC2007-74
An Extension of Fast Threshold Schemes Using XOR Operations (1)
Jun Kurihara, Shinsaku Kiyomoto, Kazuhide Fukushima, Toshiaki Tanaka (KDDI R&D Labs.)
pp. 1 - 8
ISEC2007-75
An Extension of Fast Threshold Schemes Using XOR Operations (2)
Jun Kurihara, Shinsaku Kiyomoto, Kazuhide Fukushima, Toshiaki Tanaka (KDDI R&D Labs.)
pp. 9 - 15
ISEC2007-76
A Study on Hierarchical Secret Sharing Schemes Using Product and Concatenated Codes
Chigusa Kawashima (Polytechnic Univ.), Takahiro Yoshida (Waseda Univ.), Tomoko K. Matsushima (Polytechnic Univ.)
pp. 17 - 23
ISEC2007-77
visual cryptography schemes with tree access structure for many images
Miyuki Uno, Mikio Kano (Ibaraki Univ.)
pp. 25 - 31
ISEC2007-78
A construction of light weight Panama-like keystream generator
Dai Watanabe (Hitachi), Toshinobu Kaneko (TUS)
pp. 33 - 40
ISEC2007-79
How To Find Many Collisions of 3-Pass HAVAL
Kazuhiro Suzuki, Kaoru Kurosawa (Ibaraki Univ.)
pp. 41 - 48
ISEC2007-80
Sender Authenticated Key Agreements Without Random Oracles
Chifumi Sato (C4 Technology), Takeshi Okamoto, Eiji Okamoto (Univ. of Tsukuba)
pp. 49 - 55
ISEC2007-81
A New Class of Public Key Cryptosystem Constructed on the Basis of Multivariate Polynomials Rndomly Gererated
Masao Kasahara (Osaka Gakuin Univ.)
pp. 57 - 63
ISEC2007-82
A Consideration on 3-SAT Problem
Kunikatsu Kobayashi (Yamagata Univ.)
pp. 65 - 67
ISEC2007-83
An Implementation of a Pairing-Based Group Signature Scheme with Verifier-Local Revocation
Yuta Hira, Hidehiro Kato, Toru Nakanishi, Yasuyuki Nogami, Nobuo Funabiki, Yoshitaka Morikawa (Okayama Univ.)
pp. 69 - 76
ISEC2007-84
CAIRN3: An FPGA Implementation of the Sieving Step with the Lattice Sieving
Takeshi Shimoyama, Tetsuya Izu, Jun Kogure (FUJITSU)
pp. 77 - 83
ISEC2007-85
Tardos's Fingerprinting Codes Shortened by Optimizing Code Generation Probabilities and Improving Tracing Algorithm
Taichi Isogai, Hirofumi Muratani (Toshiba)
pp. 85 - 90
ISEC2007-86
On the Implementation of Asymmetric Fingerprinting Protocol
Shinya Yamane, Minoru Kuribayashi, Masakatu Morii (Kobe Univ.)
pp. 91 - 98
ISEC2007-87
An Approach to Duality in Public Key Cryptosystems
Kazuo Ohta (UEC), Yuichi Komano (Toshiba), Yutaka Kawai (UEC), Shinichi Kawamura (Toshiba)
pp. 99 - 106
ISEC2007-88
A Study on Extended Multi-Recipient Encryption
-- Security Notion and Constructions --
Yasuo Hatano (Hitachi/Tokyo Univ. of Science), Kunihiko Miyazaki (Hitachi), Toshinobu Kaneko (TUS)
pp. 107 - 114
Note: Each article is a technical report without peer review, and its polished version will be published elsewhere.