| Keyword : cryptography
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
|
Generalized Construction of Boolean Function with Maximum Algebraic Immunity Using Univariate Polynomial Representation Shaojing FU Chao LI Longjiang QU | Publication: IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2013/01/01
Vol. E96-A
No. 1 ;
pp. 360-362
Type of Manuscript:
LETTER
Category: Cryptography and Information Security Keyword: cryptography, Boolean function, algebraic immunity, | | Summary | Full Text:PDF(82.9KB) | |
| |
| |
| |
| |
|
Lightweight One-Time Signature for Short Messages Dae Hyun YUM Pil Joong LEE | Publication: IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2011/07/01
Vol. E94-A
No. 7 ;
pp. 1567-1575
Type of Manuscript:
PAPER
Category: Cryptography and Information Security Keyword: cryptography, digital signature, one-time signature, | | Summary | Full Text:PDF(268.3KB) | |
| |
| |
| |
|
Several Classes of Even-Variable Balanced Boolean Functions with Optimal Algebraic Immunity Chik-How TAN Siong-Thye GOH | Publication: IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2011/01/01
Vol. E94-A
No. 1 ;
pp. 165-171
Type of Manuscript:
Special Section PAPER (Special Section on Cryptography and Information Security)
Category: Mathematics Keyword: cryptography, boolean function, optimal algebraic immunity, nonlinearity, | | Summary | Full Text:PDF(357.3KB) | |
| |
| |
| |
|
An Optimized Gateway-Oriented Password-Based Authenticated Key Exchange Protocol Eun-Jun YOON Kee-Young YOO | Publication: IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2010/04/01
Vol. E93-A
No. 4 ;
pp. 850-853
Type of Manuscript:
LETTER
Category: Reliability, Maintainability and Safety Analysis Keyword: cryptography, authentication, password, key exchange, cryptanalysis, | | Summary | Full Text:PDF(299.6KB) | |
| |
| |
| |
| |
| |
|
Privacy-Preserving RFID Authentication Using Public Exponent Three RSA Algorithm Yoonjeong KIM SeongYong OHM Kang YI | Publication: IEICE TRANSACTIONS on Information and Systems
Publication Date: 2009/03/01
Vol. E92-D
No. 3 ;
pp. 545-547
Type of Manuscript:
LETTER
Category: Application Information Security Keyword: cryptography, security, security of data, | | Summary | Full Text:PDF(166.4KB) | |
| |
| |
|
On the Security of Provably Secure Multi-Receiver ID-Based Signcryption Scheme Chik-How TAN | Publication: IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2008/07/01
Vol. E91-A
No. 7 ;
pp. 1836-1838
Type of Manuscript:
LETTER
Category: Cryptography and Information Security Keyword: cryptography, identity-based signcryption, | | Summary | Full Text:PDF(76.6KB) | |
| |
| |
|
Forgery of Provable Secure Short Signcryption Scheme Chik-How TAN | Publication: IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2007/09/01
Vol. E90-A
No. 9 ;
pp. 1879-1880
Type of Manuscript:
Special Section LETTER (Special Section on Information Theory and Its Applications)
Category: Keyword: cryptography, signcryption, | | Summary | Full Text:PDF(62KB) | |
| |
| |
| |
|
On Waters' Signature Scheme Chik-How TAN | Publication: IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2006/10/01
Vol. E89-A
No. 10 ;
pp. 2684-2685
Type of Manuscript:
Special Section LETTER (Special Section on Information Theory and Its Applications)
Category: Cryptography Keyword: cryptography, signature, key substitution attacks, | | Summary | Full Text:PDF(70.2KB) | |
| |
| |
|
Signature Scheme in Multi-User Setting Chik-How TAN | Publication: IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2006/05/01
Vol. E89-A
No. 5 ;
pp. 1339-1345
Type of Manuscript:
Special Section PAPER (Special Section on Discrete Mathematics and Its Applications)
Category: Keyword: cryptography, bilinear map, signatures, | | Summary | Full Text:PDF(166.6KB) | |
| |
| |
| |
| |
|
Security Analysis of Signcryption Scheme from q-Diffie-Hellman Problems Chik-How TAN | Publication: IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2006/01/01
Vol. E89-A
No. 1 ;
pp. 206-208
Type of Manuscript:
Special Section LETTER (Special Section on Cryptography and Information Security)
Category: Public Key Cryptography Keyword: cryptography, signcryption, | | Summary | Full Text:PDF(77KB) | |
| |
| |
| |
| |
|
Strong Identification Based on a Hard-on-Average Problem Pino CABALLERO-GIL | Publication: IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2005/05/01
Vol. E88-A
No. 5 ;
pp. 1117-1121
Type of Manuscript:
Special Section PAPER (Special Section on Discrete Mathematics and Its Applications)
Category: Keyword: cryptography, computational complexity, algorithms, discrete mathematics, | | Summary | Full Text:PDF(101.3KB) | |
|
Zero-Knowledge Proof for the Independent Set Problem Pino CABALLERO-GIL | Publication: IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2005/05/01
Vol. E88-A
No. 5 ;
pp. 1301-1302
Type of Manuscript:
Special Section LETTER (Special Section on Discrete Mathematics and Its Applications)
Category: Keyword: cryptography, computational complexity, algorithms, discrete mathematics, | | Summary | Full Text:PDF(61.1KB) | |
| |
|
On the Security of Signcryption Scheme with Key Privacy Chik-How TAN | Publication: IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2005/04/01
Vol. E88-A
No. 4 ;
pp. 1093-1095
Type of Manuscript:
LETTER
Category: Information Security Keyword: cryptography, signcryption, | | Summary | Full Text:PDF(69.9KB) | |
|
Key Substitution Attacks on Provably Secure Short Signature Schemes Chik-How TAN | Publication: IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2005/02/01
Vol. E88-A
No. 2 ;
pp. 611-612
Type of Manuscript:
LETTER
Category: Information Security Keyword: cryptography, key substitution attacks, | | Summary | Full Text:PDF(59.8KB) | |
|
Attacks on the Shen et al.'s Timestamp-Based Password Authentication Scheme Using Smart Cards Eun-Jun YOON Eun-Kyung RYU Kee-Young YOO | Publication: IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2005/01/01
Vol. E88-A
No. 1 ;
pp. 319-321
Type of Manuscript:
Special Section LETTER (Special Section on Cryptography and Information Security)
Category: Keyword: cryptography, password, authentication, security, smart card, | | Summary | Full Text:PDF(63.4KB) | |
| |
| |
| |
|
A Note on a User Friendly Remote Authentication Scheme with Smart Cards Shyi-Tsong WU Bin-Chang CHIEU | Publication: IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2004/08/01
Vol. E87-A
No. 8 ;
pp. 2180-2181
Type of Manuscript:
LETTER
Category: Information Security Keyword: cryptography, smart card, remote authentication, | | Summary | Full Text:PDF(59.5KB) | |
| |
| |
| |
| |
| |
| |
|
On Diffie-Hellman Problems in 3rd Order Shift Register Chik-How TAN Xun YI Chee-Kheong SIEW | Publication: IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2004/05/01
Vol. E87-A
No. 5 ;
pp. 1206-1208
Type of Manuscript:
Special Section LETTER (Special Section on Discrete Mathematics and Its Applications)
Category: Keyword: cryptography, shift register, Diffie-Hellman problems, | | Summary | Full Text:PDF(96.4KB) | |
|
Security of Kuwakado-Tanaka Transitive Signature Scheme for Directed Trees Xun YI Chik-How TAN Eiji OKAMOTO | Publication: IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2004/04/01
Vol. E87-A
No. 4 ;
pp. 955-957
Type of Manuscript:
LETTER
Category: Information Security Keyword: cryptography, transitive signature, forgery attack, | | Summary | Full Text:PDF(68.8KB) | |
| |
|
Key Substitution Attacks on Some Provably Secure Signature Schemes Chik-How TAN | Publication: IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2004/01/01
Vol. E87-A
No. 1 ;
pp. 226-227
Type of Manuscript:
Special Section LETTER (Special Section on Cryptography and Information Security)
Category: Keyword: cryptography, key substitution attacks, | | Summary | Full Text:PDF(107.8KB) | |
| |
| |
|
TMAC: Two-Key CBC MAC Kaoru KUROSAWA Tetsu IWATA | Publication: IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2004/01/01
Vol. E87-A
No. 1 ;
pp. 46-53
Type of Manuscript:
Special Section PAPER (Special Section on Cryptography and Information Security)
Category: Symmetric Cipher Keyword: cryptography, CBC MAC, block cipher, provable security, | | Summary | Full Text:PDF(277.9KB) | |
| |
|
A New Provably Secure Signature Scheme Chik-How TAN Xun YI Chee-Kheong SIEW | Publication: IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2003/10/01
Vol. E86-A
No. 10 ;
pp. 2633-2635
Type of Manuscript:
Special Section LETTER (Special Section on Information Theory and Its Applications)
Category: Information Security Keyword: cryptography, digital signature, strong RSA assumption, | | Summary | Full Text:PDF(142.4KB) | |
| |
| |
| |
| |
|
Cryptanalysis and Restriction of an Automatic Signature Scheme in Distributed Systems Yuh-Min TSENG | Publication: IEICE TRANSACTIONS on Communications
Publication Date: 2003/05/01
Vol. E86-B
No. 5 ;
pp. 1679-1681
Type of Manuscript:
LETTER
Category: Fundamental Theories Keyword: cryptography, cryptanalysis, signature, computer viruses, | | Summary | Full Text:PDF(116.1KB) | |
| |
|
On the n-th Order Shift Register Based Discrete Logarithm Chik-How TAN Xun YI Chee-Kheong SIEW | Publication: IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2003/05/01
Vol. E86-A
No. 5 ;
pp. 1213-1216
Type of Manuscript:
Special Section LETTER (Special Section on Discrete Mathematics and Its Applications)
Category: Keyword: cryptography, shift registers, discrete logarithm, | | Summary | Full Text:PDF(148.1KB) | |
| |
|
Robust Digital Signature Scheme with Subliminal Channels Narn-Yih LEE Dai-Rui LIN | Publication: IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2003/01/01
Vol. E86-A
No. 1 ;
pp. 187-188
Type of Manuscript:
Special Section LETTER (Special Section on Cryptography and Information Security)
Category: Keyword: cryptography, security, digital signature, subliminal channel, | | Summary | Full Text:PDF(103.3KB) | |
| |
| |
| |
| |
| |
|
Cryptanalysis and Improvement of Two Access Control Schemes with User Authentication in a Distributed Computer Network Narn-Yih LEE | Publication: IEICE TRANSACTIONS on Information and Systems
Publication Date: 2002/02/01
Vol. E85-D
No. 2 ;
pp. 386-391
Type of Manuscript:
PAPER
Category: Applications of Information Security Techniques Keyword: cryptography, cryptanalysis, access control, user authentication, | | Summary | Full Text:PDF(204.5KB) | |
| |
| |
|
Formal Analysis of E-Commerce Protocols Mauricio PAPA Oliver BREMER John HALE Sujeet SHENOI | Publication: IEICE TRANSACTIONS on Information and Systems
Publication Date: 2001/10/01
Vol. E84-D
No. 10 ;
pp. 1313-1323
Type of Manuscript:
Special Section PAPER (IEICE/IEEE Joint Special Issue on Autonomous Decentralized Systems and Systems' Assurance)
Category: Electronic Commerce Keyword: formal method, cryptography, e-commerce, | | Summary | Full Text:PDF(747.7KB) | |
| |
| |
|
On the Randomness of Chambers and Gollmann Keystream Generator Fumio SATO Kaoru KUROSAWA | Publication: IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2001/01/01
Vol. E84-A
No. 1 ;
pp. 303-310
Type of Manuscript:
Special Section PAPER (Special Section on Cryptography and Information Security)
Category: Keyword: cryptography, stream cipher, self-decimation system, | | Summary | Full Text:PDF(231.6KB) | |
| |
|
A Practical (t,n) Multi-Secret Sharing Scheme Hung-Yu CHIEN Jinn-Ke JAN Yuh-Min TSENG | Publication: IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2000/12/25
Vol. E83-A
No. 12 ;
pp. 2762-2765
Type of Manuscript:
LETTER
Category: Information Security Keyword: cryptography, secret sharing, | | Summary | Full Text:PDF(132.5KB) | |
| |
| |
| |
|
New Subliminal Channel Embedded in the ESIGN Hidenori KUWAKADO Hatsukazu TANAKA | Publication: IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 1999/10/25
Vol. E82-A
No. 10 ;
pp. 2167-2171
Type of Manuscript:
Special Section PAPER (Special Section on Information Theory and Its Applications)
Category: Security Keyword: cryptography, digital signature, subliminal channel, ESIGN, | | Summary | Full Text:PDF(424.2KB) | |
|
An Improvement of Novel Cryptographic Key Assignment Scheme for Dynamic Access Control in a Hierarchy Min-Shiang HWANG | Publication: IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 1999/03/25
Vol. E82-A
No. 3 ;
pp. 548-550
Type of Manuscript:
LETTER
Category: Information Security Keyword: cryptography, access control, user hierarchy, | | Summary | Full Text:PDF(76.7KB) | |
|
Construct Message Authentication Code with One-Way Hash Functions and Block Ciphers Yi-Shiung YEH Chan-Chi WANG | Publication: IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 1999/02/25
Vol. E82-A
No. 2 ;
pp. 390-393
Type of Manuscript:
PAPER
Category: Information Security Keyword: cryptography, MAC, one-way hash function, block cipher, | | Summary | Full Text:PDF(340.7KB) | |
| |
| |
| |
|
One-Time Digital Signature and Pseudo k-Time Digital Signature Hiroshi MIYANO | Publication: IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 1998/01/25
Vol. E81-A
No. 1 ;
pp. 48-55
Type of Manuscript:
Special Section PAPER (Special Section on Cryptography and Information Security)
Category: Keyword: cryptography, digital signature, one-way function, directed acyclic graph, | | Summary | Full Text:PDF(664KB) | |
|
High Performance Nonce-Based Authentication and Key Distribution Protocols against Password Guessing Attacks Sung-Ming YEN Meng-Tzung LIU | Publication: IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 1997/11/25
Vol. E80-A
No. 11 ;
pp. 2209-2217
Type of Manuscript:
Special Section PAPER (Special Section on Information Theory and Its Applications)
Category: Security Keyword: authentication, challenge-response, cryptography, key distribution, nonce, off-line dictionary attack, on-line attack, password, trusted third-party, verifiable text attack, | | Summary | Full Text:PDF(782.7KB) | |
| |
| |
| |
| |
| |
| |
| |
| |
|
An Electronic Retail Payment System with Distributed Control--A Conceptual Design-- Tsutomu MATSUMOTO | Publication: IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 1995/01/25
Vol. E78-A
No. 1 ;
pp. 67-76
Type of Manuscript:
Special Section PAPER (Special Section on Cryptography and Information Security)
Category: Keyword: electronic payment, funds transfer, cash, wallet, card, cryptography, security, | | Summary | Full Text:PDF(788.2KB) | |
| |
|
A New RSA-Type Scheme Based on Singular Cubic Curves y2 x3+bx2 (mod n) Hidenori KUWAKADO Kenji KOYAMA Yukio TSURUOKA | Publication: IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 1995/01/25
Vol. E78-A
No. 1 ;
pp. 27-33
Type of Manuscript:
Special Section PAPER (Special Section on Cryptography and Information Security)
Category: Keyword: cryptography, RSA cryptosystem, cubic curve, | | Summary | Full Text:PDF(576.1KB) | |
| |
|
Efficient Cryptosystems over Elliptic Curves Based on a Product of Form-Free Primes Hidenori KUWAKADO Kenji KOYAMA | Publication: IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 1994/08/25
Vol. E77-A
No. 8 ;
pp. 1309-1318
Type of Manuscript:
Special Section PAPER (Special Section on Information Theory and Its Applications)
Category: Keyword: cryptography, public-key, elliptic curves, factorization, | | Summary | Full Text:PDF(830.8KB) | |
| |
| |
|
Secure Addition Sequence and Its Application on the Server-Aided Secret Computation Protocols Chi-Sung LAIH Sung-Ming YEN | Publication: IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 1994/01/25
Vol. E77-A
No. 1 ;
pp. 81-88
Type of Manuscript:
Special Section PAPER (Special Section on Cryptography and Information Security)
Category: Keyword: addition sequence, cryptography, RSA, SASC, protocols, secure computations, | | Summary | Full Text:PDF(675.2KB) | |
| |
|
Improving the Performance of Enciphered B+-Trees Thomas HARDJONO Tadashi ARAKI Tetsuya CHIKARAISHI | Publication: IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 1993/01/25
Vol. E76-A
No. 1 ;
pp. 104-111
Type of Manuscript:
Special Section PAPER (Special Section on Cryptography and Information Security)
Category: Keyword: information security, cryptography, | | Summary | Full Text:PDF(761.6KB) | |
| |
|
The Sibling Intractable Function Family (SIFF): Notion, Construction and Applications Yuliang ZHENG Thomas HARDJONO Josef PIEPRZYK | Publication: IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 1993/01/25
Vol. E76-A
No. 1 ;
pp. 4-13
Type of Manuscript:
Special Section PAPER (Special Section on Cryptography and Information Security)
Category: Keyword: information, security, cryptography, | | Summary | Full Text:PDF(983.9KB) | |
|
Net Structure and Cryptography Hisao SHIZUKA Yutaka MOURI | Publication: IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 1992/10/25
Vol. E75-A
No. 10 ;
pp. 1422-1428
Type of Manuscript:
Special Section PAPER (Special Section on Application of Petri Nets to Concurrent System Design)
Category: Keyword: petri net, cryptography, T-invariant, bit, marking, | | Summary | Full Text:PDF(565.4KB) | |
|
|