|
|
All Technical Committee Conferences (Searched in: All Years)
|
|
Search Results: Conference Papers |
Conference Papers (Available on Advance Programs) (Sort by: Date Descending) |
|
Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
ISEC |
2023-05-17 14:20 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
Equivalent Secret Key-Recovery Attack on Knapsack Public Key Cryptosystem Ryuichi Sakai, Yasuyuki Murakami (OECU) ISEC2023-9 |
Shamir proposed an attack on Merkle-Hellman’s knapsack public key cryptosystem. This attack uses integer programming to ... [more] |
ISEC2023-9 pp.49-53 |
EMM, ISEC, SITE, ICSS, IPSJ-CSEC, IPSJ-SPT [detail] |
2013-07-19 10:15 |
Hokkaido |
|
A Knapsack Cryptosystem Using Super-Decreasing Sequence Shinsuke Hamasho, Yasuyuki Murakami (Osaka Electro-Comm. Univ.) ISEC2013-37 SITE2013-32 ICSS2013-42 EMM2013-39 |
Merkle-Hellman proposed a knapsack public-key cryptosystem(MH scheme). However, MH scheme was broken by Shamir’s attack ... [more] |
ISEC2013-37 SITE2013-32 ICSS2013-42 EMM2013-39 pp.263-268 |
IT, ISEC, WBS |
2013-03-07 15:30 |
Osaka |
Kwansei Gakuin Univ., Osaka-Umeda Campus |
A knapsack cryptosystem with a randomly signed key Akira Hayashi (Kanazawa Inst. of Tech.) IT2012-83 ISEC2012-101 WBS2012-69 |
The knapsack cryptosystem invented by Merkle and Hellman is broken with high probability by Shamir's attack. A novel cr... [more] |
IT2012-83 ISEC2012-101 WBS2012-69 pp.139-141 |
IT, ISEC, WBS |
2012-03-02 11:40 |
Kanagawa |
|
Computer experiments on Shamir's attack against knapsack cryptosystems Jun Hashimoto, Akira Hayashi (KIT) IT2011-72 ISEC2011-99 WBS2011-73 |
The knapsack cryptosystem invented by Merkle and Hellman is known to be insecure against the low density attack of Lagar... [more] |
IT2011-72 ISEC2011-99 WBS2011-73 pp.163-169 |
ISEC |
2008-12-17 14:15 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
A Knapsack Cryptosystem Resisting Wellknown Attacks Kunikatsu Kobayashi (Yamagata Univ,) ISEC2008-96 |
We propose a knapsack cryptosystem resisting well-known attacks which use LLL algorithm and Shamir's algorithm. [more] |
ISEC2008-96 pp.41-44 |
|
|
|
Copyright and reproduction :
All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)
|
[Return to Top Page]
[Return to IEICE Web Page]
|