Print edition: ISSN 0913-5685 Online edition: ISSN 2432-6380
[TOP] | [2006] | [2007] | [2008] | [2009] | [2010] | [2011] | [2012] | [Japanese] / [English]
ISEC2009-71
The feedback period length of Bijective function
Toru Ito (NETCOMSEC)
pp. 1 - 6
ISEC2009-72
Beyond the Shannon limit by quantum stream cipher Y-00 and Holevo-Sohma-Hirota theorem
-- General proof --
Osamu Hirota (Tamagawa Univ.)
pp. 7 - 14
ISEC2009-73
Constructive Codes Achieving the Secrecy Capacity of Wiretap Channels
Mitsuru Hamada (Tamagawa Univ.)
pp. 15 - 22
ISEC2009-74
On Viterbi search for the maximum differential characteristic probability of a cipher with certain Feistel structure
Yasutaka Igarashi, Toshinobu Kaneko (Tokyo Univ. of Science)
pp. 23 - 27
ISEC2009-75
Electro Magnetic Analysis and Local Information of Cryptographic Hardware
Hidekazu Morita, Yoshio Takahashi, Tsutomu Matsumoto, Junji Shikata (Yokohama National Univ.))
pp. 29 - 35
ISEC2009-76
GLV Method for Non-Supersingular Paring-Friendly Curves of Embedding Degree 1
Shoichi Takeuchi, Tetsuya Izuta, Yumi Sakemi, Kazushi Nishii, Yasuyuki Nogami, Yoshitaka Morikawa (Okayama Univ.)
pp. 37 - 41
ISEC2009-77
A Construction Method of Basis Conversion Matrix by Using Small Multiplicative Group for Cryptographic Applications
Hidehiro Kato, Yasuyuki Nogami (Okayama Univ.), Satoshi Uehara (The Univ. of Kitakyushu), Yoshitaka Morikawa (Okayama Univ.)
pp. 43 - 50
ISEC2009-78
Improvement of the Internal Perturbation Modifier
-- An example of Perturbed Matsumoto-Imai --
Masahito Gotaishi, Shigeo Tsujii (Chuo Univ.)
pp. 51 - 55
ISEC2009-79
Redesigning of a role hierarchy for role-based access control
Yoshiharu Asakura (NEC/Univ. of Hyogo), Yukikazu Nakamoto (Univ. of Hyogo)
pp. 57 - 63
Note: Each article is a technical report without peer review, and its polished version will be published elsewhere.