1 | -- | 0 | Koji Nakao. Foreword |
2 | -- | 9 | Satoshi Hada. A Note on Transformations of Interactive Proofs that Preserve the Prover s Complexity |
10 | -- | 17 | Koh-ichi Nagao, Shigenori Uchiyama, Naoki Kanayama, Kazuto Matsuo. Analysis of Baby-Step Giant-Step Algorithms for Non-uniform Distributions |
18 | -- | 27 | Yasuo Hatano, Hidema Tanaka, Toshinobu Kaneko. Optimization for the Algebraic Method and Its Application to an Attack of MISTY1 |
28 | -- | 36 | Masahiko Takenaka, Takeshi Shimoyama, Takeshi Koshiba. Theoretical Analysis of chi:::2::: Attack on RC6 |
37 | -- | 45 | Dai Watanabe, Soichi Furuya, Hirotaka Yoshida, Kazuo Takaragi, Bart Preneel. A New Keystream Generator MUGI |
46 | -- | 52 | Kaoru Kurosawa, Tetsu Iwata. TMAC: Two-Key CBC MAC |
54 | -- | 59 | Swee-Huay Heng, Kaoru Kurosawa. Square Hash with a Small Key Size |
60 | -- | 66 | Tetsu Iwata, Kaoru Kurosawa. On the Universal Hash Functions in Luby-Rackoff Cipher |
67 | -- | 74 | Toshihiko Matsuo, Kaoru Kurosawa. On Parallel Hash Functions Based on Block-Ciphers |
75 | -- | 84 | Katsuyuki Okeya, Tsuyoshi Takagi. SCA-Resistant and Fast Elliptic Scalar Multiplication Based on wNAF |
85 | -- | 93 | Tetsuya Izu, Tsuyoshi Takagi. Fast Elliptic Curve Multiplications with SIMD Operations |
94 | -- | 101 | Tsuyoshi Takagi. A Fast RSA-Type Public-Key Primitive Modulo p:::k:::q Using Hensel Lifting |
102 | -- | 109 | Masao Kasahara, Ryuichi Sakai. A Construction of Public Key Cryptosystem for Realizing Ciphertext of Size 100 Bit and Digital Signature Scheme |
110 | -- | 119 | Yuichi Komano, Kazuo Ohta. OAEP-ES - Methodology of Universal Padding Technique |
120 | -- | 130 | Goichiro Hanaoka, Junji Shikata, Yuliang Zheng, Hideki Imai. Efficient Unconditionally Secure Digital Signatures |
131 | -- | 140 | Masayuki Abe, Miyako Ohkubo, Koutarou Suzuki. 1-out-of-n Signatures from a Variety of Keys |
141 | -- | 146 | Kaoru Kurosawa, Quang Viet Duong. How to Design Efficient Multiple-Use 1-out-n Oblivious Transfer |
147 | -- | 151 | Wakaha Ogata, Ryota Sasahara. k out of n Oblivious Transfer without Random Oracles |
152 | -- | 159 | Jun Anzai, Tsutomu Matsumoto. Interaction Key Generation Schemes |
160 | -- | 172 | Goichiro Hanaoka, Kazuto Ogawa, Itsuro Murota, Go Ohtake, Keigo Majima, Seiichi Gohshi, Kimiyuki Oyamada, Seiichi Namba, Hideki Imai. Managing Encryption and Key Publication Independently in Digital Rights Management Systems |
173 | -- | 181 | Koji Chida, Kunio Kobayashi, Hikaru Morita. An Auction Protocol Preserving Privacy of Losing Bids with a Secure Value Comparison Scheme |
182 | -- | 189 | Akira Yamada, Shinsaku Kiyomoto, Toshiaki Tanaka, Koji Nakao. New Time-Stamping Scheme Using Mutual Communications with Pseudonymous Clients |
190 | -- | 203 | Masakazu Soshi, Mamoru Maekawa, Eiji Okamoto. The Dynamic-Typed Access Matrix Model and Decidability of the Safety Problem |
204 | -- | 211 | Kenji Imamoto, Kouichi Sakurai. Analysis and Design for Private Message Board Systems |
212 | -- | 220 | Jun Furukawa. Secure Detection of Watermarks |
221 | -- | 223 | Tetsuya Izu. A Note on the Lattice Factoring Method |
224 | -- | 225 | Kazuhiro Hattanda, Shuichi Ichikawa. The Evaluation of Davidson s Digital Signature Scheme |
226 | -- | 227 | Chik-How Tan. Key Substitution Attacks on Some Provably Secure Signature Schemes |
228 | -- | 230 | Dong Jin Kwak, Sang-Jae Moon. A Distributed Sign-and-Encryption for Anonymity |
231 | -- | 242 | Wen-Bin Lin, Bin-Da Liu. Coefficients Generation for the 4th-Order Leapfrog Sigma-Delta A/D Converters |
243 | -- | 250 | Tae Hoon Lee, Won Sang Ra, Seung Hee Jin, Tae Sung Yoon, Jin Bae Park. Robust Extended Kalman Filtering via Krein Space Estimation |
251 | -- | 257 | Yuya Matsumoto, Yuichi Tanji, Mamoru Tanaka. Sparse Realization of Passive Reduced-Order Interconnect Models via PRIMA |
258 | -- | 269 | Donghyun Kim, Lee-Sup Kim. An Efficient Fragment Processing Technique in A-Buffer Implementation |
270 | -- | 274 | Jonah Gamba, Tetsuya Shimamura. A New Method of Noise Variance Estimation from Low-Order Yule-Walker Equations |
275 | -- | 279 | Pei-Yin Chen. VLSI Architecture for 2-D 3-Level Lifting-Based Discrete Wavelet Transform |
280 | -- | 281 | Shoichi Hirose, Susumu Yoshida. An Approximate Scheme of Oblivious Transfer with Probabilistic Receipt |
282 | -- | 285 | Shu-Chuan Chu, John F. Roddick, Zhe-Ming Lu, Jeng-Shyang Pan. A Digital Image Watermarking Method Based on Labeled Bisecting Clustering Algorithm |
286 | -- | 291 | Takafumi Hayashi. A Generalization of Binary Zero-Correlation Zone Sequence Sets Constructed from Hadamard Matrices |