Eiji OKAMOTO


Provably Secure Gateway Threshold Password-Based Authenticated Key Exchange Secure against Undetectable On-Line Dictionary Attack
Yukou KOBAYASHI Naoto YANAI Kazuki YONEYAMA Takashi NISHIDE Goichiro HANAOKA Kwangjo KIM Eiji OKAMOTO 
Publication:   
Publication Date: 2017/12/01
Vol. E100-A  No. 12  pp. 2991-3006
Type of Manuscript:  PAPER
Category: Cryptography and Information Security
Keyword: 
password-based authenticated key exchange (PAKE)threshold cryptography
 Summary | Full Text:PDF(2.1MB) | (Errata[Uploaded on January 1,2018])

Card-Based Protocols Using Regular Polygon Cards
Kazumasa SHINAGAWA Takaaki MIZUKI Jacob C.N. SCHULDT Koji NUIDA Naoki KANAYAMA Takashi NISHIDE Goichiro HANAOKA Eiji OKAMOTO 
Publication:   
Publication Date: 2017/09/01
Vol. E100-A  No. 9  pp. 1900-1909
Type of Manuscript:  Special Section PAPER (Special Section on Discrete Mathematics and Its Applications)
Category: 
Keyword: 
card-based protocolregular polygon cards
 Summary | Full Text:PDF(1.3MB)

Application of Non-Orthogonal Multiple Access Scheme for Satellite Downlink in Satellite/Terrestrial Integrated Mobile Communication System with Dual Satellites
Eiji OKAMOTO Hiroyuki TSUJI 
Publication:   IEICE TRANSACTIONS on Communications
Publication Date: 2016/10/01
Vol. E99-B  No. 10  pp. 2146-2155
Type of Manuscript:  Special Section PAPER (Special Section on Satellite Communication Technologies in Conjunction with Main Topics of JC-SAT2015)
Category: 
Keyword: 
satellite/terrestrial integrated mobile communication systemmulti-satellitenon-orthogonal multiple accessproportional fair schedulingdownlink
 Summary | Full Text:PDF(2.1MB)

Radio Access Technologies for Fifth Generation Mobile Communications System: Review of Recent Research and Developments in Japan
Hidekazu MURATA Eiji OKAMOTO Manabu MIKAMI Akihiro OKAZAKI Satoshi SUYAMA Takamichi INOUE Jun MASHINO Tetsuya YAMAMOTO Makoto TAROMARU 
Publication:   IEICE TRANSACTIONS on Communications
Publication Date: 2016/08/01
Vol. E99-B  No. 8  pp. 1638-1647
Type of Manuscript:  INVITED PAPER (Special Section on Advanced Information and Communication Technologies and Services in Conjunction with Main Topics of APCC2015)
Category: Terrestrial Wireless Communication/Broadcasting Technologies
Keyword: 
fifth generation mobile communication systemshigher frequency bandmassive MIMOC-Plane/U-Plane splittingC-RAN
 Summary | Full Text:PDF(2.9MB)

Secure Computation Protocols Using Polarizing Cards
Kazumasa SHINAGAWA Takaaki MIZUKI Jacob C. N. SCHULDT Koji NUIDA Naoki KANAYAMA Takashi NISHIDE Goichiro HANAOKA Eiji OKAMOTO 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2016/06/01
Vol. E99-A  No. 6  pp. 1122-1131
Type of Manuscript:  Special Section PAPER (Special Section on Discrete Mathematics and Its Applications)
Category: 
Keyword: 
card-based protocolspolarizing cardssecure computationboolean circuitsrecreational cryptography
 Summary | Full Text:PDF(1.7MB)

An Accurate Indoor-Localization Scheme with NLOS Detection and Elimination Exploiting Stochastic Characteristics
Manato HORIBA Eiji OKAMOTO Toshiko SHINOHARA Katsuhiko MATSUMURA 
Publication:   IEICE TRANSACTIONS on Communications
Publication Date: 2015/09/01
Vol. E98-B  No. 9  pp. 1758-1767
Type of Manuscript:  Special Section PAPER (Special Section on Emerging Technologies on Ambient Sensor Networks toward Future Generation)
Category: 
Keyword: 
sensor networkindoor localizationNLOS environmentiterative minimum residual schemestochastic characteristic
 Summary | Full Text:PDF(2.8MB)

A Chaos MIMO Transmission Scheme Using Turbo Principle for Secure Channel-Coded Transmission
Eiji OKAMOTO Yuma INABA 
Publication:   IEICE TRANSACTIONS on Communications
Publication Date: 2015/08/01
Vol. E98-B  No. 8  pp. 1482-1491
Type of Manuscript:  Special Section PAPER (Special Section on 5G Radio Access Networks―Part I: Radio Access Technologies and System Design)
Category: 
Keyword: 
chaos communicationMIMOphysical layer securitylog-likelihood ratioturbo decoding
 Summary | Full Text:PDF(1.5MB)

Implementation of an Elliptic Curve Scalar Multiplication Method Using Division Polynomials
Naoki KANAYAMA Yang LIU Eiji OKAMOTO Kazutaka SAITO Tadanori TERUYA Shigenori UCHIYAMA 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2014/01/01
Vol. E97-A  No. 1  pp. 300-302
Type of Manuscript:  Special Section LETTER (Special Section on Cryptography and Information Security)
Category: 
Keyword: 
elliptic curvedivision polynomialscalar multiplicationelliptic net
 Summary | Full Text:PDF(71.2KB)

An Efficient Channel Estimation Scheme Using Walsh Pilots in Bi-directional Wireless OFDM Relay Systems with Analog Network Coding
Yuta KOSHIMIZU Eiji OKAMOTO 
Publication:   IEICE TRANSACTIONS on Communications
Publication Date: 2013/08/01
Vol. E96-B  No. 8  pp. 2119-2130
Type of Manuscript:  PAPER
Category: Wireless Communication Technologies
Keyword: 
channel estimationOFDManalog network codingWalsh code
 Summary | Full Text:PDF(2.8MB)

Performance Improvement of IMR-Based NLOS Detection in Indoor Ultra Wide-Band TOA Localization
Kazutaka FUKUDA Eiji OKAMOTO 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2012/10/01
Vol. E95-A  No. 10  pp. 1658-1666
Type of Manuscript:  Special Section PAPER (Special Section on Advances in Adaptive Signal Processing and Applications)
Category: Sensor Network
Keyword: 
sensor networksUWBTOA-based position estimation systemNLOS environmentIMR method
 Summary | Full Text:PDF(4.1MB)

A Chaos MIMO Transmission Scheme for Channel Coding and Physical-Layer Security
Eiji OKAMOTO 
Publication:   IEICE TRANSACTIONS on Communications
Publication Date: 2012/04/01
Vol. E95-B  No. 4  pp. 1384-1392
Type of Manuscript:  PAPER
Category: Wireless Communication Technologies
Keyword: 
chaos coded modulationMIMOmaximum likelihood decodingconvolutional code
 Summary | Full Text:PDF(1.5MB)

A Note on the Pairing Computation Using Normalized Miller Functions
Naoki OGURA Shigenori UCHIYAMA Naoki KANAYAMA Eiji OKAMOTO 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2012/01/01
Vol. E95-A  No. 1  pp. 196-203
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: Mathematics
Keyword: 
pairingMiller's algorithmrational functionsnormalization
 Summary | Full Text:PDF(357.1KB)

A Markov-Based Satellite-to-Ground Optical Channel Model and Its Effective Coding Scheme
Yoshitoshi YAMASHITA Eiji OKAMOTO Yasunori IWANAMI Yozo SHOJI Morio TOYOSHIMA Yoshihisa TAKAYAMA 
Publication:   IEICE TRANSACTIONS on Communications
Publication Date: 2012/01/01
Vol. E95-B  No. 1  pp. 254-262
Type of Manuscript:  PAPER
Category: Satellite Communications
Keyword: 
optical satellite communicationoptical satellite-to-ground linkMarkov modelLDGM code
 Summary | Full Text:PDF(2.2MB)

Identity-Based Proxy Cryptosystems with Revocability and Hierarchical Confidentialities
Lihua WANG Licheng WANG Masahiro MAMBO Eiji OKAMOTO 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2012/01/01
Vol. E95-A  No. 1  pp. 70-88
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: Public Key Cryptography
Keyword: 
proxy decryptionproxy re-encryptionrevocabilityhierarchical confidentialities
 Summary | Full Text:PDF(901.5KB)

An Effective Downlink Resource Allocation Scheme Based on MIMO-OFDMA-CDM in Cellular System
Yasuhiro FUWA Eiji OKAMOTO Yasunori IWANAMI 
Publication:   IEICE TRANSACTIONS on Communications
Publication Date: 2011/12/01
Vol. E94-B  No. 12  pp. 3550-3558
Type of Manuscript:  PAPER
Category: Wireless Communication Technologies
Keyword: 
OFDMA-CDMMIMOcellular systemresource allocationproportional fairness
 Summary | Full Text:PDF(2.4MB)

Scalar Multiplication on Pairing Friendly Elliptic Curves
Naoki KANAYAMA Tadanori TERUYA Eiji OKAMOTO 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2011/06/01
Vol. E94-A  No. 6  pp. 1285-1292
Type of Manuscript:  Special Section PAPER (Special Section on Discrete Mathematics and Its Applications)
Category: 
Keyword: 
scalar multiplicationAtei pairingoptimal pairingendomorphism
 Summary | Full Text:PDF(323.1KB)

An Evaluation on Throughput Performance for Type II Hybrid-ARQ Using Non-binary Rate-Compatible-Punctured LDPC Codes
Takashi KOZAWA Yasunori IWANAMI Eiji OKAMOTO Ryota YAMADA Naoki OKAMOTO 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2010/11/01
Vol. E93-A  No. 11  pp. 2089-2091
Type of Manuscript:  Special Section LETTER (Special Section on Information Theory and Its Applications)
Category: Coding Theory
Keyword: 
non-binary RCP LDPC codeType II Hybrid-ARQOFDMSymbol-LLR
 Summary | Full Text:PDF(315.2KB)

A Comparative Study on Time Domain Sequential Equalizer with MLD and MLSE Equalizer on MIMO Frequency Selective Channels
Satoshi NAKANOBU Yasunori IWANAMI Eiji OKAMOTO 
Publication:   IEICE TRANSACTIONS on Communications
Publication Date: 2010/11/01
Vol. E93-B  No. 11  pp. 3197-3202
Type of Manuscript:  LETTER
Category: Wireless Communication Technologies
Keyword: 
MIMOISI cancellerMLDMLSETime domain
 Summary | Full Text:PDF(732.7KB)

Forecasting of Information Security Related Incidents: Amount of Spam Messages as a Case Study
Anton ROMANOV Eiji OKAMOTO 
Publication:   IEICE TRANSACTIONS on Communications
Publication Date: 2010/06/01
Vol. E93-B  No. 6  pp. 1411-1421
Type of Manuscript:  Special Section PAPER (Special Section on Quality of Communication Networks and Services)
Category: 
Keyword: 
information security incidentsforecastingplanning
 Summary | Full Text:PDF(1.6MB)

Sender Authenticated Key Agreements without Random Oracles
Chifumi SATO Takeshi OKAMOTO Eiji OKAMOTO 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2009/08/01
Vol. E92-A  No. 8  pp. 1787-1794
Type of Manuscript:  Special Section PAPER (Special Section on Discrete Mathematics and Its Applications)
Category: Theory
Keyword: 
authenticated key agreementsone-way functionsdecision co-bilinear Diffie-Hellman problemsstandard models
 Summary | Full Text:PDF(232.5KB)

Optimised Versions of the Ate and Twisted Ate Pairings
Seiichi MATSUDA Naoki KANAYAMA Florian HESS Eiji OKAMOTO 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2009/07/01
Vol. E92-A  No. 7  pp. 1660-1667
Type of Manuscript:  PAPER
Category: Cryptography and Information Security
Keyword: 
tate pairingeta pairingate pairingtwisted ate pairing
 Summary | Full Text:PDF(245.1KB)

Some Efficient Algorithms for the Final Exponentiation of ηT Pairing
Masaaki SHIRASE Tsuyoshi TAKAGI Eiji OKAMOTO 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2008/01/01
Vol. E91-A  No. 1  pp. 221-228
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: Implementation
Keyword: 
Tate pairingηT pairingfinal exponentiationtorus
 Summary | Full Text:PDF(252.8KB)

An ID-SP-M4M Scheme and Its Security Analysis
Lihua WANG Eiji OKAMOTO Ying MIAO Takeshi OKAMOTO Hiroshi DOI 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2007/01/01
Vol. E90-A  No. 1  pp. 91-100
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: Signatures
Keyword: 
series-parallel multisignaturepairingID-basedBDH assumption
 Summary | Full Text:PDF(316.9KB)

Authorization-Limited Transformation-Free Proxy Cryptosystems and Their Security Analyses
Lihua WANG Zhenfu CAO Takeshi OKAMOTO Ying MIAO Eiji OKAMOTO 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2006/01/01
Vol. E89-A  No. 1  pp. 106-114
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: Protocol
Keyword: 
proxy cryptosystempairingauthorization-limitedtransformation-freeBDH assumption
 Summary | Full Text:PDF(424.3KB)

Application of Wavelet Packet Modulation to Mobile Communication
Eiji OKAMOTO Yasunori IWANAMI Tetsushi IKEGAMI 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2004/10/01
Vol. E87-A  No. 10  pp. 2684-2691
Type of Manuscript:  Special Section PAPER (Special Section on Wide Band Systems)
Category: 
Keyword: 
wavelet packet modulationOFDMmultipath fadingmultimode transmission
 Summary | Full Text:PDF(674.6KB)

A Fast Signature Scheme with New On-line Computation
Takeshi OKAMOTO Hirofumi KATSUNO Eiji OKAMOTO 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2004/05/01
Vol. E87-A  No. 5  pp. 1154-1161
Type of Manuscript:  Special Section LETTER (Special Section on Discrete Mathematics and Its Applications)
Category: 
Keyword: 
digital signatureon-line computationrandom oracle modelprovable security
 Summary | Full Text:PDF(187KB)

Security of Kuwakado-Tanaka Transitive Signature Scheme for Directed Trees
Xun YI Chik-How TAN Eiji OKAMOTO 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2004/04/01
Vol. E87-A  No. 4  pp. 955-957
Type of Manuscript:  LETTER
Category: Information Security
Keyword: 
cryptographytransitive signatureforgery attack
 Summary | Full Text:PDF(68.8KB)

The Dynamic-Typed Access Matrix Model and Decidability of the Safety Problem
Masakazu SOSHI Mamoru MAEKAWA Eiji OKAMOTO 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2004/01/01
Vol. E87-A  No. 1  pp. 190-203
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: Applications
Keyword: 
access controlaccess matrix modelsafety problemcomputational complexitydecidability
 Summary | Full Text:PDF(697.9KB)

A Pilot-Symbol-Assisted Fading and Frequency-Offset Compensation Method Using FFT
Eiji OKAMOTO Huan-Bang LI Tetsushi IKEGAMI 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2002/07/01
Vol. E85-A  No. 7  pp. 1656-1664
Type of Manuscript:  Special Section PAPER (Special Section on Multi-dimensional Mobile Information Networks)
Category: 
Keyword: 
fading and frequency-offset compensationpilot symbolfast Fourier transformfrequency-offset estimator
 Summary | Full Text:PDF(701.9KB)

FOREWORD
Kyoki IMAMURA Eiji OKAMOTO 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2001/10/01
Vol. E84-A  No. 10  pp. 2375-2375
Type of Manuscript:  FOREWORD
Category: 
Keyword: 
 Summary | Full Text:PDF(48.9KB)

Constructing Identity-Based Key Distribution Systems over Elliptic Curves
Hisao SAKAZAKI Eiji OKAMOTO Masahiro MAMBO 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 1998/10/25
Vol. E81-A  No. 10  pp. 2138-2143
Type of Manuscript:  Special Section PAPER (Special Section on Information Theory and Its Applications)
Category: Security
Keyword: 
ID-based key distribution systemselliptic curve message recovery signature
 Summary | Full Text:PDF(530.5KB)

A Simple Parallel Algorithm for the Ziv-Lempel Encoding
Ken-ichi IWATA Masakatu MORII Tomohiko UYEMATSU Eiji OKAMOTO 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 1998/04/25
Vol. E81-A  No. 4  pp. 709-712
Type of Manuscript:  LETTER
Category: Information Theory and Coding Theory
Keyword: 
parallel encodingsliding-window Ziv-Lempel algorithmlongest-matched stringuniversal data compression
 Summary | Full Text:PDF(300.2KB)

Anonymous Public Key Certificates and their Applications
Kazuomi OISHI Masahiro MAMBO Eiji OKAMOTO 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 1998/01/25
Vol. E81-A  No. 1  pp. 56-64
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: 
Keyword: 
public key certificatesone-time certificatesanonymityunlinkability
 Summary | Full Text:PDF(816.5KB)

FOREWORD
Eiji OKAMOTO 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 1998/01/25
Vol. E81-A  No. 1  pp. 1-1
Type of Manuscript:  FOREWORD
Category: 
Keyword: 
 Summary | Full Text:PDF(92.5KB)

Factoring Hard Integers on a Parallel Machine
Rene PERALTA Masahiro MAMBO Eiji OKAMOTO 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 1997/04/25
Vol. E80-A  No. 4  pp. 658-662
Type of Manuscript:  Special Section PAPER (Special Section on Discrete Mathematics and Its Applications)
Category: 
Keyword: 
integer factorizationCunningham projectparallel algorithmsHMPQSnumber-theoretic cryptology
 Summary | Full Text:PDF(444KB)

Proxy Cryptosystems: Delegation of the Power to Decrypt Ciphertexts
Masahiro MAMBO Eiji OKAMOTO 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 1997/01/25
Vol. E80-A  No. 1  pp. 54-63
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: 
Keyword: 
proxy cryptosystemproxyproxy decryptorciphertext transformation
 Summary | Full Text:PDF(897.9KB)

Proxy Signatures: Delegation of the Power to Sign Messages
Masahiro MAMBO Keisuke USUDA Eiji OKAMOTO 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 1996/09/25
Vol. E79-A  No. 9  pp. 1338-1354
Type of Manuscript:  Special Section PAPER (Special Section on Information Theory and Its Applications)
Category: Source Coding/Security
Keyword: 
proxyproxy signatureproxy signerdelegationseal
 Summary | Full Text:PDF(1.5MB)

A Simple Construction of Codes for Identification via Channels under Average Error Criterion
Tomohiko UYEMATSU Kennya NAGANO Eiji OKAMOTO 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 1996/09/25
Vol. E79-A  No. 9  pp. 1440-1443
Type of Manuscript:  Special Section LETTER (Special Section on Information Theory and Its Applications)
Category: Coding Theory
Keyword: 
identification via channelscode constructionidentification capacityerror exponent
 Summary | Full Text:PDF(228.8KB)

Algebraic Properties of Permutation Polynomials
Eiji OKAMOTO Wayne AITKEN George Robert BLAKLEY 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 1996/04/25
Vol. E79-A  No. 4  pp. 494-501
Type of Manuscript:  Special Section PAPER (Special Section on Discrete Mathematics and Its Applications)
Category: 
Keyword: 
finite fieldpermutation polynomialcryptographytranspositioncycle
 Summary | Full Text:PDF(600.3KB)

Faster Factoring of Integers of a Special Form
Rene PERALTA Eiji OKAMOTO 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 1996/04/25
Vol. E79-A  No. 4  pp. 489-493
Type of Manuscript:  Special Section PAPER (Special Section on Discrete Mathematics and Its Applications)
Category: 
Keyword: 
factoringcomputational number theorycryptography, ESIGN
 Summary | Full Text:PDF(404.2KB)

On Ambiguity in Coppersmith' Attacking Method a against NIKS-TAS Scheme
Shigeo TSUJII Kiyomichi ARAKI Masao KASAHARA Eiji OKAMOTO Ryuichi SAKAI Yasuo MAEDA Tomohiko YAGISAWA 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 1996/01/25
Vol. E79-A  No. 1  pp. 66-75
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: 
Keyword: 
modulo degeneracycryptanalysisID-based key sharingNIKS-TAS
 Summary | Full Text:PDF(762.2KB)

Proposal of an Automatic Signature Scheme Using a Compiler
Keisuke USUDA Masahiro MAMBO Tomohiko UYEMATSU Eiji OKAMOTO 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 1996/01/25
Vol. E79-A  No. 1  pp. 94-101
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: 
Keyword: 
computer virusvirus protectiondigital signatureautomatic signature scheme
 Summary | Full Text:PDF(685.5KB)

FOREWORD
Eiji OKAMOTO 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 1996/01/25
Vol. E79-A  No. 1  pp. 1-1
Type of Manuscript:  FOREWORD
Category: 
Keyword: 
 Summary | Full Text:PDF(79.7KB)

Reliability Functions for Concatenated Codes Employing Modular Codes with Maximum Likelihood Decoding
Tomohiko UYEMATSU Junya KAGA Eiji OKAMOTO 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 1995/09/25
Vol. E78-A  No. 9  pp. 1160-1169
Type of Manuscript:  Special Section PAPER (Special Section on Information Theory and Its Applications)
Category: 
Keyword: 
concatenated codealgebraic geometry codereliability functiondiscrete memoryless channel
 Summary | Full Text:PDF(653.3KB)

Permutation Cipher Scheme Using Polynomials over a Field
Eiji OKAMOTO Tomohiko UYEMATSU Masahiro MAMBO 
Publication:   IEICE TRANSACTIONS on Information and Systems
Publication Date: 1995/02/25
Vol. E78-D  No. 2  pp. 138-142
Type of Manuscript:  PAPER
Category: Information Security
Keyword: 
cryptographyinformation securitypermutationReed-Solomon code
 Summary | Full Text:PDF(382.8KB)

A Secure Broadcast Communication Method with Short Messages
Masahiro MAMBO Akinori NISHIKAWA Eiji OKAMOTO Shigeo TSUJII 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 1994/08/25
Vol. E77-A  No. 8  pp. 1319-1327
Type of Manuscript:  Special Section PAPER (Special Section on Information Theory and Its Applications)
Category: 
Keyword: 
secure broadcast communicationmessage length
 Summary | Full Text:PDF(793.9KB)

Optimum Pre-Emphasis for FM Transmission with Frequency-Domain Voice Scrambling
Yoshihiko AKAIWA Eiji OKAMOTO Yukitsuna FURUYA 
Publication:   IEICE TRANSACTIONS (1976-1990)
Publication Date: 1989/05/25
Vol. E72-E  No. 5  pp. 507-513
Type of Manuscript:  Special Section PAPER (Special Issue on Information Theory and Its Applications)
Category: 
Keyword: 
 Summary | Full Text:PDF(464.1KB)

Metric in the Set of Labelled Graphs and Its Applications to Network Theory
Yoji KAJITANI Hidekazu SAKURAI Eiji OKAMOTO 
Publication:   IEICE TRANSACTIONS (1976-1990)
Publication Date: 1976/02/25
Vol. E59-E  No. 2  pp. 7-12
Type of Manuscript:  PAPER
Category: Network Theory
Keyword: 
 Summary | Full Text:PDF(384.6KB)