Print edition: ISSN 0913-5685 Online edition: ISSN 2432-6380
[TOP] | [2008] | [2009] | [2010] | [2011] | [2012] | [2013] | [2014] | [Japanese] / [English]
EMM2011-8
Carrier Screen Images Decoding with an Ordinary Digital Camera
Rui Shogenji, Junji Ohtsubo (Shizuoka Univ.)
pp. 1 - 6
EMM2011-9
Recovery of Tampered Pixels for Statistical Fragile Watermarking
Maki Yoshida, Kazuya Ohkita, Toru Fujiwara (Osaka Univ.)
pp. 7 - 12
EMM2011-10
Bias Equalizer for Tracing Algorithm of Binary Fingerprinting Codes
Minoru Kuribayashi (Kobe Univ.)
pp. 13 - 18
EMM2011-11
Proposal of 3D Visualization Method for IDS Considering Order Relation of IP addresses
Shunichi Mizoguchi, Hiroyuki Inaba (KIT)
pp. 19 - 24
EMM2011-12
Study on person profile about coping behavior under virus infected situation
Hiroaki Kanda, Noriaki Yoshikai, Shun-ichi Kurino (Nihon University)
pp. 25 - 30
EMM2011-13
Cloud Computing Market Expansion and Risk management in U.S. and an analysis of the consensus building factors
-- from the perspective of networking incentive of actors --
Ema Tanaka (FMMC)
pp. 31 - 38
EMM2011-14
Matsumoto-Imai Signature by Dual Perturbation
-- Two new Modifiers --
Masahito Gotaishi, Shigeo Tsujii (Chuo Univ.)
pp. 79 - 83
EMM2011-15
A Note on Security of (u|u+v) Σ PKC against Low-Density Attack
Yasuyuki Murakami (Osaka Electro-Comm. Univ.), Masao Kasahara (Osaka Gakuin Univ.)
pp. 85 - 90
EMM2011-16
A Low Density Multiple Choice Knapsack Cryptosystem
Akira Hayashi, Toshihiro Koike (KIT)
pp. 91 - 96
EMM2011-17
The proposal of the evaluation for decryption failure about GGH series
Yosuke Todo, Masakatu Morii (Kobe Univ.)
pp. 97 - 102
EMM2011-18
Security Evaluation of HyRAL against Saturation Cryptanalysis(II)
Naoki Shibayama, Yasutaka Igarashi, Toshinobu Kaneko, Seiichiro Hangai (Tokyo Univ. of Science)
pp. 103 - 109
EMM2011-19
Strongly Asymmetric Public Key Agreement Algorithms
Luigi Accardi (Roma II Univ.), Satoshi Iriyama (Tokyo Univ. of Science), Massimo Regoli (Roma II Univ.), Masanori Ohya (Tokyo Univ. of Science)
pp. 111 - 114
EMM2011-20
Strongly Asymmetric PKD Cryptographic Algorithms
-- an implementation using the matrix model --
Luigi Accardi (Roma II Univ.), Satoshi Iriyama (Tokyo Univ. of Science), Massimo Regoli (Roma II Univ.), Masanori Ohya (Tokyo Univ. of Science)
pp. 115 - 121
EMM2011-21
On Usage of Practical Web Application Source Code for Learning Support on Secure Coding
Ryosuke Miyaji, Seikoh Nishita (Takushoku Univ)
pp. 123 - 129
EMM2011-22
Public Key Cryptosystems Constructed Based on Cyclic Codes, Realizing Coding Rate of Exactly 1.0, K(XI)SE(g)PKC and K(XII)SE(g)PKC
Masao Kasahara (Osaka Gakuin Univ.)
pp. 131 - 136
EMM2011-23
Construction of New Classes of Product-Sum Type Public Key Cryptosystem, K(IV)ΣPKC and K(I)ΣΠPKC
Masao Kasahara (Osaka Gakuin Univ)
pp. 137 - 144
EMM2011-24
Memory saving implementation of Cyclic Vector Multiplication Algorithm
Ryosuke Takahashi, Kenta Nekado, Yusuke Takai, Yasuyuki Nogami, Hiroto Kagotani (Okayama Univ.), Takashi Narita (TEL)
pp. 145 - 150
EMM2011-25
Solving DLP with Auxiliary Input over an Elliptic Curve Used in TinyTate Library (Part II)
Yumi Sakemi, Tetsuya Izu, Masahiko Takenaka, Masaya Yasuda (Fujitsu Labs)
pp. 151 - 158
Note: Each article is a technical report without peer review, and its polished version will be published elsewhere.