By: Ryo Sugihara
Published in: Symposium on Cryptography and Information Security(in Japanese), Japan, unknown in 2000
Please obtain a copy of this paper from your local library. IBM cannot distribute this paper externally.
Questions about this service can be mailed to reports@us.ibm.com .