Titles of Bachelor, Master and Ph.D Thesis
Current Bachelor's, Master's, and Doctor's Theme
2024.4-2025.3
| Nasratullah Ghafoori A Study on Differential Cryptanalysis of Salsa 20 and ChaCha Stream Ciphers |
Doctor | 【Abstract】 |
| Wei Pengxuan A study of Generic Construction of Forward-Secure Chameleon Hash Function |
Master | 【Abstract】 |
| Kenta Okada Investigation of Defense Methods Against Membership Inference Attacks |
Master | 【Abstract】 |
| Naoki Kawahara Investigation of Defense Methods Against Membership Inference Attacks |
Master | 【Abstract】 |
| Katsuhiro Sato Proposal for a flexible multi-signature scheme with a function of adding signers |
Master | 【Abstract】 |
| Kosuke Tamura Analysis of Extension of Kannan's embedding for Module-LWE Problem |
Master | 【Abstract】 |
| Atsuki Nagai Towards Precise Theoretical Evaluation of Linear Bias in ChaCha: A Refined Analytical Model |
Master | 【Abstract】 |
| Kodai Hayashida Propose of Compact Multi-siganture with Message flexibility and Order verifaiblility |
Master | 【Abstract】 |
| Ryunosuke Higashi Build a threat analysis model for medical institutions based on vulnerability measures |
Master | 【Abstract】 |
| Kenjiro Hirose Proposal of an Attack on Ring-LWE Using a Variable-Block BKW Algorithm |
Master | 【Abstract】 |
| Sosuke Funatsu Security Analysis of the χ2-Attack on the Module-LWE Problem in the Dual Space |
Master | 【Abstract】 |
| Yuki Asai Threat Validation of Model Inversion Attacks Using Intermediate Features In Split Computing |
Bachelor | 【Abstract】 |
| Asahi Oishi Improved Linear Bias of Stream Cipher Salsa20 |
Bachelor | 【Abstract】 |
| Shogo Kuramoto Improved modular inversion algorithm with side-channel attack resistance |
Bachelor | 【Abstract】 |
| Ryota Sakai Validation of NIDS using data imbalance solution with GAN |
Bachelor | 【Abstract】 |
| Sayumi Shibata On the Verification of the Security of Ring-LWE over Function Fields |
Bachelor | 【Abstract】 |
| Towa Tsujimura Key-Value Commitments with indistinguishability insert and update operations |
Bachelor | 【Abstract】 |
| Yuto Tsujimoto A proposed privacy-preserving data shaping method for machine learning |
Bachelor | 【Abstract】 |
Current Bachelor's, Master's, and Doctor's Theme
2023.4-2024.3
| Po-Chu Hsu Scalable and Public Verifiable M+1st-Price Auction on Smart Contract |
Doctor | 【Abstract】 |
| Hideaki Miyaji Secure and efficient post-quantum commitment scheme and its application |
Doctor | 【Abstract】 |
| Kai Izumi Improved Key Recovery Attacks on the Stream Cipher ChaCha |
Master | 【Abstract】 |
| Satoshi Uesugi The Extension of a Solution for Post-Quantum Secure Ring-LWE Problem |
Master | 【Abstract】 |
| Yudai Tagawa Security Analysis of MP-LWE Problem |
Master | 【Abstract】 |
| Seishiro Terada Security Analysis of Lattice-Based Cryptography using Ideal Lattices |
Master | 【Abstract】 |
| Katsuya Nakashima The efficiency of lattice cryptanalysis by iterative LLL for lattice basis vectors |
Master | 【Abstract】 |
| Yuta Maeno Lattice-based Accumulator with constant time list update and constant time verification |
Master | 【Abstract】 |
| Shintaro Yamashita Proposal of Methods to Detect Backdoor Attacks Using Signature Embedding Techniques |
Master | 【Abstract】 |
| Tatsuta Yamatsuki Data processing methods for high-performance Privacy-Preserving Machine Learning |
Master | 【Abstract】 |
| He Bingchang Accuracy-Enhancement Techniques in Privacy-Preserving Machine Learning Models |
Master | 【Abstract】 |
| Yurie Okada On Theoretical Analysis of Stream Cipher ChaCha |
Bachelor | 【Abstract】 |
| Ryosuke Kido Fast and Secure Scalar Multiplication on Elliptic Curve GLS254 |
Bachelor | 【Abstract】 |
| Akira Fujimoto Improved defense against backdoor attacks on machine learning |
Bachelor | 【Abstract】 |
| Toshiyuki Mineta Efficient Key-Value Commitments with batch update and verification |
Bachelor | 【Abstract】 |
| Ryoto Morizono Performance evaluation of post-quantum dijital signature schemes |
Bachelor | 【Abstract】 |
| Tomoshi Yagishita On Privacy Mechanism to Discreat Data fit for Machine Learning |
Bachelor | 【Abstract】 |
| Rintaro Yamada Consideration on Diffinition Field for Efficient Ring-LWE Problem |
Bachelor | 【Abstract】 |
2022.4-2023.3
| Jin Yaoan |
Doctor | 【Abstract】 |
| Hayato Arai Secure against side-channel attack and fast post-quantum crypto system CSIDH |
Master | 【Abstract】 |
| Shingo Uehara Proposal of Forward-Secure Ring Signature Scheme with Claimability and Repudiation |
Master | 【Abstract】 |
| Yuya Okubo A Proposal of defining fields for Efficient Ring-LWE Based Cryptography |
Master | 【Abstract】 |
| Junpei Ozaki Proposal for operation verification framework and debugger for eBPF | Master | 【Abstract】 |
| Fumiya Saitou Design and implementation of Trusted shell on TEE | Master | 【Abstract】 |
| Tomoka Takahashi Vulnerability of Ring-LWE problem due to error bias | Master | 【Abstract】 |
| Yoshitaka Nagao Privacy Preserving Threshold Data Integration Protocol | Master | 【Abstract】 |
| Koki Matsubara Proposal for a hash function with keys that reduces the risk of secret key leakage | Master | 【Abstract】 |
| Ryo Watanabe Improved differential linear analysis for the symmetric key cipher ChaCha | Master | 【Abstract】 |
| Wang Yusen Dealer-less Threshold Signature Schemes based on Isogeny | Master | 【Abstract】 |
| Li Jun Ru Security Analysis on Stream Cipher Salsa20 | Master | 【Abstract】 |
| Gao Yue Security Anslysis of Scalar multiplication Algorithm on GLS254 | Master | 【Abstract】 |
| Kenta Okada Privacy-Preserving Federated Learning via Homomorphic Encryption | Bachelor | 【Abstract】 |
| Hajime Kawada Attacks on Module-LWE problem by using χ2 test | Bachelor | 【Abstract】 |
| Naoki Kawahara Proposal for a privacy-preserving frequency estimation method | Bachelor | 【Abstract】 |
| Katsuhiro Satou Proof of Security in pqe-based cryptosystems | Bachelor | 【Abstract】 |
| Kosuke Tamura Safety Analysis for Post-quantum Module-LWE Problem on Subfield in Cyclotomic Field | Bachelor | 【Abstract】 |
| Atsuki Nagai Improvement of the linear approximation of the stream cipher ChaCha and its application to differential-linear analysis | Bachelor | 【Abstract】 |
| Ryunosuke Higashi On a Threshold Ring Signature Scheme for Generating Efficiently Sized Signatures | Bachelor | 【Abstract】 |
| Sosuke Funatsu Expanding Underlying Number Fields Reducing from Module-LWE to Ring-LWE | Bachelor | 【Abstract】 |
| Paul Kunal Digital Watermarks in Text-to-Image Generation Models | Bachelor | 【Abstract】 |
2021.4-2022.3
| tomoaki Mimoto A study on Utility-aware Privacy-preseving Techniques |
Doctor | |
| Hector Bjoljahn Hougaard Study on post-quantum group key exchanges and generalization |
Doctor | |
| Takuya Inomoto Threshold Signature Scheme Suitable for a Short Message |
Master | 【Abstract】 |
| Kohei Hosoya Implementation and Verification of Network Functions in Rust | Master | 【Abstract】 |
| Liu Xiaolong Design and Implementation of Session Types-based Socket Communication Protocols |
Master | 【Abstract】 |
| Kai Izumi Analysis of the Stream Cipher ChaCha Using Higher Order Differentials |
Bachelor | 【Abstract】 |
| Satoshi Uesugi On Safety Analysis for the Post-quantum Ring-LWE Problem on Subfield in Cyclotomic Field |
Bachelor | 【Abstract】 |
| Tetsuhiro Kawaguchi Development of Validation / Synthesis System for Stack Snwinding Information on AArch64 |
Bachelor | 【Abstract】 |
| Yuta Maeno Research on quantum-safe accumulator with efficient update function |
Bachelor | 【Abstract】 |
| Shintaro Yamashita Research on efficient signature generation |
Bachelor | 【Abstract】 |
| Tatsuta Yamatsuki Proposal for Scalable Local Differential Privacy |
Bachelor | 【Abstract】 |
2020.4-2021.3
| Yasuhisa Okumura Crypto Analysis for The Post-quantum Ring-LWE Problem |
Master | 【Abstract】 |
| Motoki Takenaka A Study of Deceptive Defense System |
Master | 【Abstract】 |
| Shotaro Miyashita Analysis of Salsa20 and ChaCha |
Master | 【Abstract】 |
| Akifumi Muroi Experimental Analysis for Decision Ring-LWE Problem with Sublattice Attack |
Master | |
| Sai Veerya Mahadevan PRSafe: Primitive Recursive Function based Domain Specific Language using LLVM |
Master | 【Abstract】 |
| Wang Zhaobo Fast Multiparty Threshold ECDSA With Robustness |
Master | 【Abstract】 |
| Hayato Arai Security analysis for the post-quantum cryptography CSIDH |
Bachelor | 【Abstract】 |
| Yuya Okubo searching for fields in Ring-LWE |
Bachelor | 【Abstract】 |
| Junpei Ozaki A Test Flamework of Dynamic Memory Allocator for Rust |
Bachelor | 【Abstract】 |
| Fumiya Saito Design and Implementation of Software Switch using Formal Methods |
Bachelor | 【Abstract】 |
| Tomoteru Nakamura An Improvement of Linear Algebraic Attack on Post-Quantum Cryptosystem Giophantus+ |
Bachelor | 【Abstract】 |
| Yoshitaka Nagao Privacy Preserving Data Integration Protocol |
Bachelor | 【Abstract】 |
| Koki Matsubara Proposal for a Hash Function with Revocation for Blockchain |
Bachelor | 【Abstract】 |
| Ryo Watanabe Study on a New Linear Bias in the Stream Cipher Salsa20 |
Bachelor | 【Abstract】 |
| Hajime Kawata Research on GUI of Private Set Intersection |
Bachelor |
2019.4-2020.3
| Ryoma Ito A Study on Statistical Cryptanalysis of Stream Ciphers |
Doctor | 【Abstract】 |
| Yuki Sugitani Proposal of safe second-price auction using smart contract |
Master | 【Abstract】 |
| Hideaki Miyaji Commitment method with low output locality |
Master | 【Abstract】 |
| Tomoya Nishiguchi Design and implementation of database access control system using session type |
Master | 【Abstract】 |
| Yaoan Jin Safe and fast elliptic curve scalar multiplication/td> | Master | 【Abstract】 |
| Motoi Hayashi Realization method of privacy policy in electronic service and its application/td> | Master | 【Abstract】 |
| Yusuke Matsuoka Security analysis of stream cipher Salsa20/ChaCha20 |
Master | 【Abstract】 |
| Ou Chenyu 4-High-speed implementation of Curve25519 by parallelization |
Master | 【Abstract】 |
| Kohei Hosoya Design and implementation of verifiable network functions |
Bachelor | 【Abstract】 |
| Daiki Oka Lisp-based extensions to ZoKrates domain-specific languages and Variant type suggestions |
Bachelor | 【Abstract】 |
| Takuya Inomoto Improvement of threshold signature with anonymity |
Bachelor | 【Abstract】 |
| Tomoya Ikeda Improvement of fast and constant time inverse element calculation method |
Bachelor | 【Abstract】 |
| Takaaki Ishimura Study on extension of Ring-LWE definition |
Bachelor | 【Abstract】 |
2018.4-2019.3
| Ki GIE Secure Comparisonl based on Quasi-Cyclic Code |
Master | 【Abstract】 |
| Hideto NAKANO An Experimental Analysis using plural Ideals against Decision Ring-LWE over Decomposition Fields |
Master | 【Abstract】 |
| Yohei MAEZAWA An algebraic attack against LRPC code-based cryptography |
Master | 【Abstract】 |
| Motoki TAKENAKA A Framework for Building Deception Networks |
Bachelor | 【Abstract】 |
| Akihumi MUROI A Distinguish Attack Evaluating at t = 1 for Indeterminate Equation Scheme based on IE-LWE |
Bachelor | 【Abstract】 |
| Kotaro YAMAGUCHI Proposal of Online Pachinko using smart contract |
Bachelor | 【Abstract】 |
2017.4-2018.3
| Karin SUMONGKAYOTHIN Improving bandwidth cost of Oblivious Random Access Machine by using matrix based storage structure |
Doctor | 【Abstract】 |
| Rashed MAZUMDER Study on Secure Message Encryption and Authentication |
Doctor | 【Abstract】 |
| Shunsuke OTSUKA HIBE based on Universal Sampler |
Master | 【Abstract】 |
| Katsunari SHISHIDO Efficient and quasi-Accurate Private Multiset Union |
Master | 【Abstract】 |
| Kenta KODERA Complexity analysis of solving elliptic curve discrete logarithm problem |
Master | 【Abstract】 |
| Yuki SUGITANI Modeling Worm Propagation using Dynamic Patching |
Bachelor | 【Abstract】 |
| Shota TERADA On the Security of Ring-LWE with Homomorphic Encryption |
Bachelor | 【Abstract】 |
| Tomoya NISHIGUCHI solving polynomial system with set algorithm |
Bachelor | 【Abstract】 |
| Taichi NISHINO The spread and the containment of virus in random network model |
Bachelor | 【Abstract】 |
| Motoki HAYASHI Improvement of Multi-party Private Set Intersection |
Bachelor | 【Abstract】 |
| Yusuke MATSUOKA Safety evaluation of stream cipher, Salsa20/ChaCha20 by redesign of diffusion |
Bachelor | 【Abstract】 |
2016.4-2017.3
| Hiroshi Nomaguchi On Secure Pseudo-Random Number Generator for IoT devices |
Master | 【Abstract】 |
| Takatoshi Yoshida On Privacy-preserving Statistic Computation for Multiple Database |
Master | 【Abstract】 |
| STEWART, Gavin Lynn Study on obfuscation of symmetric key cipher |
Master | 【Abstract】 |
| Tatsuhiko Kono secure and efficient elliptic curve cryptography for side channel attack |
Bachelor | 【Abstract】 |
| Kenta Kodera Security evaluation of elliptic curve cryptosystems with special addition formula |
Bachelor | 【Abstract】 |
| Satoru Takano Anonymous Oblivious RAM for Multi-user Environment |
Bachelor | 【Abstract】 |
| Ryohei Morishima Security evaluation of elliptic curve cryptosystems with special addition formula (2) |
Bachelor | 【Abstract】 |
2015.4-2016.3
| SUMONGKAYOTHIN Karin The Oblivious Random Access Memory (ORAM) |
【Abstract】 |
| MAZUMDER Rashed Provable Security of Cryptographic Hash |
【Abstract】 |
| Sumiyo Ishige A Study on Network Coding |
【Abstract】 |
| Keisuke Kito Optimization of Elliptic Curve Cryptography for Embedded Systems |
【Abstract】 |
| Daiki Michihiro A Study on Symmetric Cipher |
【Abstract】 |
| Takatoshi Yoshida Research on Private Set Intersection Protocol |
【Abstract】 |
2014.4-2015.3
| Hiroyuki Sato Studies on the safety of the pseudo-random number |
【Abstract】 |
| Ryota Takahashi A study on Efficient Elliptic Curve Scalar Multiplication |
【Abstract】 |
| Takaya Asano A study on network coding for detecting pollution attack |
【Abstract】 |
| MAZUMDER Rashed A Study of Cryptographic Hash Function |
【Abstract】 |
| Mohammad S.I. MAMUN Studies on cryptographic solutions to secure applications |
【Abstract】 |
2013.4-2014.3
| Tomoaki Mimoto A Study on Multi-Party Private Set Intersection Protocol |
【Abstract】 |
2012.4-2013.3
| YU Ichimaru A Study on Safety of Symmetric Cipher |
【Abstract】 |
| Tsuyoshi Sawada A Study on Safety of hash function |
【Abstract】 |
| SHI, Xiaonan A study on the relation between trace,definition field,embedding degree and class number |
|
| YANG, Cuinan A Study on Efficient Scalar Multiplications for Elliptic Curve Cryptosystems |
【Abstract】 |
| Yoshio KAWAMO A Study on Efficient Scalar Multiplications for Elliptic Curve Cryptosystems |
【Abstract】 |
| TRAN PHUONG VIET XUAN On the Construction of Constant Ciphertext Length in Attribute Based Encryption |
【Abstract】 |
| RATEMO, Alice Harriet Mwango On the Construction of Constant Ciphertext Length in Attribute Based Encryption |
【Abstract】 |
2011.4-2012.3
| Jiageng Chen Cryptoanalysis of Stream Cipher |
【Abstract】 |
| Mohammad Shahriar Rahman A Study on Privacy-preserving Technologies |
【Abstract】 |
| Kazuya Izawa A Study on Efficient Data Agreegation in Wireless Sensor Networks |
【Abstract】 |
| Yiren Mo A Study on Efficient Scalar Multiplication on Elliptic Curves 【Abstract】 |
【Abstract】 |
2010.4-2011.3
| Tatsuro Iida Proactive co-Operative Link Self-Healing for Wireless Sensor Networks |
【Abstract】 |
| Kazuho Kakiwaki A Study on Safety of Symmetric Cipher |
【Abstract】 |
| Taiki Sasahara A study on a fast method of scalar multiplication over elliptic curves |
【Abstract】 |
| Takashi Sato Research on Group Key Agreement |
【Abstract】 |
2009.4-2010.3
| Keita Emura A Research on Anonymous Attribute-based Cryptosystems |
【Abstract】 |
| Mitsuki Ajiro Theoretical analysis of RC4 PRGA by Using Nonzero Bit Differences with pseudo colliding key pair |
【Abstract】 |
| Hisashige Ito A Research on Key Management in Wireless Sensor Network |
【Abstract】 |
| Tetsuya Hatano A study on Efficient Tree based Group Key Agreement |
【Abstract】 |
| Hiroyuki Yokogawa A study on Elliptic Curve Scalar Multiplication |
【Abstract】 |
| Tomoyoshi NAGATA Efficient Elliptic Curve Scalar Multiplication |
【Abstract】 |
2008.4-2009.3
| Shojiro HIRASAWA Constructing Paring-Friendly Elliptic Curve with Embedding Degree k<20 td=""> |
【Abstract】 |
| Masahiro SUKEGAWA Statical Cryptanalysis against Symmetric-key Ciphers |
【Abstract】 |
| Mohammad Shahriar RAHMAN An Efficient RFID Privacy Scheme |
【Abstract】 |
| Katsuhiko Yoshida A Study on Efficient Broadcast Encryption Scheme |
【Abstract】 |
2007.4-2008.3
| Takeshi Suzuki Constructing Elliptic Curve Suitable for Elliptic Curve Cryptography |
【Abstract】 |
| Yuta Imaya Statical Cryptanalysis against Symmetric-key Ciphers |
【Abstract】 |
| Yasuharu Sugano A Study on Security and Efficiency of Digital Signature |
【Abstract】 |
| Tomoyuki Karasawa Research for Distributed Denial of Service Attacks |
【Abstract】 |
| Toshiaki Kamei Efficient and Secure Elliptic Curve Scalar Multiplication |
【Abstract】 |
2006.4-2007.3
| Atsushi Waseda A Study on Quantum Secret Sharing |
【Abstract】 |
| Takayuki Takagi A Study on Quantum Secret Sharing |
【Abstract】 |
| Hideki Takemoto A study about an anti-denial of service attack method |
【Abstract】 |
| Chen jiageng Efficient ID-Based Signature Scheme |
【Abstract】 |
| Nao Nomura A Study on Efficient Group Signature Scheme |
【Abstract】 |
| Wataru Hasegawa A Study on Mobile Agent Security |
【Abstract】 |
| Kenji Mizosoe Research on efficient Elliptic Curve Cryptosystems |
【Abstract】 |
| Takaomi Wada Statical Cryptanalysis against Symmetric-key Ciphers |
【Abstract】 |
2005.4-2006.3
| Kozue Umeda Privacy-Enhanced Group signature Scheme with CRL-based Revocation |
【Abstract】 |
| Takeaki Terada Reserch for Denial of Service attacks |
【Abstract】 |
| Takeshi Kiyomiya Reserch for Countermeasure of Side Channel Analysis on Elliptic Curve Cryptography |
【Abstract】 |
| Jun Jikeya Research on Application of Digital Signatures |
【Abstract】 |
| Daiji Tanaka Reserch for Group Signature suitable for Application |
【Abstract】 |
| Hikoichiro Nakamura A Study on Broadcast Encryption Scheme |
【Abstract】 |
| Taro Hattori A Study on the Obfuscation Technique for Tamper-resistant to Dynamic Analysis |
【Abstract】 |
| Tomohiko Hinoue A study on the security of symmetric key cipher |
【Abstract】 |
2004.4-2005.3
| Fumiaki Kanazawa A Study on Broadcast Encryption Scheme |
【Abstract】 |
| Ken Sasaki A Study on Quantum Secret Sharing |
【Abstract】 |
| Yuki Takano A Study on Cryptanalysis against Symmetric Ciphers |
【Abstract】 |
| Hideyo Mamiya Reserch for Optimaization of Hyperelliptic Curve Cryptography |
【Abstract】 |
| Masayuki Mori A Study on Mobile Agent Security |
【Abstract】 |
2003.4-2004.3
| Takashi Matsunaka A study on the security of a symmetric cipher |
【Abstract】 |
| Hiroaki Morimoto A study on hyperelliptic curve cryptosystems |
【Abstract】 |
| Yuko Tamura Study on Electronic Commerce with High Security |
【Abstract】 |
2002.4-2003.3
| Norihisa Isogai A study on Cryptanalysis Regarding Block Ciphers |
【Abstract】 |
| Yuusuke Sakabe A study on the Java Obfuscation |
【Abstract】 |
| Tooru Shiotsuki A study on Electronic Auction |
【Abstract】 |
| Naoyuki Takahashi A study on Hyperefficient Elliptic Curve Exponentiation |
【Abstract】 |
| Taro Hirai A study on Constructing Elliptic Curves with arbitrary Embedding Degrees |
【Abstract】 |
| Sayaka Fukuda A study on Security of Quantum Cryptography |
【Abstract】 |
2001.4-2002.3
| Kozue Umeda Efficient Group Signature Scheme with Revocation |
【Abstract】 |
| Toshio Ogiso A study on Tamper-Resistant Software |
【Abstract】 |
| Kei Kawauchi A study on provably secure multi-signature schemes with signers' intentions |
【Abstract】 |
| Takeaki Terada Visual Secret Sharing Scheme with Optional Access Structure at Efficient Number of Subpixels |
【Abstract】 |
| Masao Nonaka A study on the Security of Block Chipers RC5 and RC6 |
【Abstract】 |
| Hideyuki Miyake A study on Efficient Elliptic Curve Exponentiation |
【Abstract】 |
| Atsushi Waseda A study on Modeling of the Collusion Problem and its Evaluation |
【Abstract】 |
| Kazumasa Omote A study on An Electronic Auction |
【Abstract】 |
| Takeshi Okamoto Design and Analysis of Practical Digital Signature Scheme |
【Abstract】 |
| Yuko Tamura A study on A Signature Scheme with a Guarantee |
【Abstract】 |
2000.4-2001.3
| Ayako Maeda Unconditionally secure threshold scheme with verifiability and threshold changeability |
【Abstract】 |
| Norio Terauchi How to construct more secure ciphers by the original cipher |
【Abstract】 |
| Yuko Tamura Interactive Signature Scheme between Confirmer and Signer |
【Abstract】 |
| Yoshinori Takii Improved Correlation Attack on RC5 |
【Abstract】 |
| Ryo Otomura The Digital Signature Schemes for Mobile Agents Delegated by Multiple Users |
【Abstract】 |
| Takeshi Okamoto Studies for fast signature schemes |
【Abstract】 |
| Hiroshi Minato Multi-signature Schemes with Singers' Intentions |
【Abstract】 |
| Shigeki Kitazawa Study on Anonymous Communication with Agent Technology |
【Abstract】 |
1999.4-2000.3
| Masaki Inamura Study on provision of flexible service over Mobile IP |
【Abstract】 |
| Atsushi Koide Linkable Off-line Anonymous E-cash |
【Abstract】 |
| Syunzou Takano Analysis for the security of elliptic curve cryptosystem |
【Abstract】 |
| Emi Tominaga Algebraic examination for e-voting |
【Abstract】 |
| Satoru Nagano, Shigeki Kitazawa Protecting Anonymity and Location Privacy with Cyclic Routes |
【Abstract】 |
| Shirou Mitomi A multisignature with flexibility for message and order |
【Abstract】 |
| Tatsuya Yamada Study on an effective renewal of public key cryptosystem modules |
【Abstract】 |
