1. Evaluation of the Immunity against Peeping Attacks on the Challenge-Response Type Human Identification Scheme. 2. Visual Cryptography and Its Application. 3. Evaluation of the Property of Subliminal Channels 4. Provably Secure Public-Key Cryptos・・・
- 資金種別
- 競争的資金
1. Evaluation of the Immunity against Peeping Attacks on the
Challenge-Response Type Human Identification Scheme.
2. Visual Cryptography and Its Application.
3. Evaluation of the Property of Subliminal Channels
4. Provably Secure Public-Key Cryptosystems Based on the
Decoding Problem of a Linear Code
Challenge-Response Type Human Identification Scheme.
2. Visual Cryptography and Its Application.
3. Evaluation of the Property of Subliminal Channels
4. Provably Secure Public-Key Cryptosystems Based on the
Decoding Problem of a Linear Code