IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences

Archive Index

Online ISSN : 1745-1337
Volume E91-A No.1  (Publication Date:2008/01/01)
Previous | 
Next
Special Section on Cryptography and Information Security

pp.1-2  FOREWORD
FOREWORD
Mitsuru MATSUI  
Summary | Full Text:PDF (68.4KB) >>Buy this Article

pp.3-11  PAPER-Symmetric Cryptography
New Weakness in the Key-Scheduling Algorithm of RC4
Toshihiro OHIGASHI  Yoshiaki SHIRAISHI  Masakatu MORII  
Summary | Full Text:PDF (308.7KB) >>Buy this Article

pp.12-21  PAPER-Symmetric Cryptography
An Unequal Secure Encryption Scheme for H.264/AVC Video Compression Standard
Yibo FAN  Jidong WANG  Takeshi IKENAGA  Yukiyasu TSUNOO  Satoshi GOTO  
Summary | Full Text:PDF (2.2MB) >>Buy this Article

pp.22-29  PAPER-Symmetric Cryptography
Linearization Method and Linear Complexity
Hidema TANAKA  
Summary | Full Text:PDF (167KB) >>Buy this Article

pp.30-38  PAPER-Symmetric Cryptography
Security of the Five-Round KASUMI Type Permutation
Tetsu IWATA  Tohru YAGI  Kaoru KUROSAWA  
Summary | Full Text:PDF (262.5KB) >>Buy this Article

pp.39-45  PAPER-Hash Functions
Birthday Paradox for Multi-Collisions
Kazuhiro SUZUKI  Dongvu TONIEN  Kaoru KUROSAWA  Koji TOYOTA  
Summary | Full Text:PDF (246.8KB) >>Buy this Article

pp.46-54  PAPER-Hash Functions
Improved Collision Search for Hash Functions: New Advanced Message Modification
Yusuke NAITO  Kazuo OHTA  Noboru KUNIHIRO  
Summary | Full Text:PDF (302.9KB) >>Buy this Article

pp.55-63  PAPER-Hash Functions
New Message Differences for Collision Attacks on MD4 and MD5
Yu SASAKI  Lei WANG  Noboru KUNIHIRO  Kazuo OHTA  
Summary | Full Text:PDF (265KB) >>Buy this Article

pp.64-73  PAPER-Hash Functions
Classification of Hash Functions Suitable for Real-Life Systems
Yasumasa HIRAI  Takashi KUROKAWA  Shin'ichiro MATSUO  Hidema TANAKA  Akihiro YAMAMURA  
Summary | Full Text:PDF (290.5KB) >>Buy this Article

pp.74-82  PAPER-Hash Functions
Collision Resistance of Double-Block-Length Hash Function against Free-Start Attack
Shoichi HIROSE  
Summary | Full Text:PDF (186.5KB) >>Buy this Article

pp.83-93  PAPER-Signatures
Traceable Ring Signature
Eiichiro FUJISAKI  Koutarou SUZUKI  
Summary | Full Text:PDF (234KB) >>Buy this Article

pp.94-106  PAPER-Signatures
General Conversion for Obtaining Strongly Existentially Unforgeable Signatures
Isamu TERANISHI  Takuro OYAMA  Wakaha OGATA  
Summary | Full Text:PDF (283.6KB) >>Buy this Article

pp.107-118  PAPER-Signatures
Provably Secure Multisignatures in Formal Security Model and Their Optimality
Yuichi KOMANO  Kazuo OHTA  Atsushi SHIMBO  Shinichi KAWAMURA  
Summary | Full Text:PDF (346.7KB) >>Buy this Article

pp.119-126  PAPER-Protocols
Efficient Fair Exchange from Identity-Based Signature
Dae Hyun YUM  Pil Joong LEE  
Summary | Full Text:PDF (210.4KB) >>Buy this Article

pp.127-138  PAPER-Protocols
A Fast (3,n)-Threshold Secret Sharing Scheme Using Exclusive-OR Operations
Jun KURIHARA  Shinsaku KIYOMOTO  Kazuhide FUKUSHIMA  Toshiaki TANAKA  
Summary | Full Text:PDF (367.5KB) >>Buy this Article

pp.139-149  PAPER-Protocols
A Secure Authenticated Key Exchange Protocol for Credential Services
SeongHan SHIN  Kazukuni KOBARA  Hideki IMAI  
Summary | Full Text:PDF (266.1KB) >>Buy this Article

pp.150-159  PAPER-Protocols
Batch Processing for Proofs of Partial Knowledge and Its Applications
Koji CHIDA  Go YAMAMOTO  
Summary | Full Text:PDF (230.5KB) >>Buy this Article

pp.160-167  PAPER-Side Channel Attacks
Prevention of Information Leakage by Photo-Coupling in Smart Card
Sung-Shiou SHEN  Jung-Hui CHIU  
Summary | Full Text:PDF (682.6KB) >>Buy this Article

pp.168-175  PAPER-Side Channel Attacks
Side Channel Attacks against Hash-Based MACs with PGV Compression Functions
Katsuyuki OKEYA  
Summary | Full Text:PDF (202.4KB) >>Buy this Article

pp.176-183  PAPER-Side Channel Attacks
Security Evaluations of MRSL and DRSL Considering Signal Delays
Minoru SAEKI  Daisuke SUZUKI  
Summary | Full Text:PDF (352.5KB) >>Buy this Article

pp.184-192  PAPER-Side Channel Attacks
An Analysis of Leakage Factors for Dual-Rail Pre-Charge Logic Style
Daisuke SUZUKI  Minoru SAEKI  
Summary | Full Text:PDF (584.6KB) >>Buy this Article

pp.193-202  PAPER-Side Channel Attacks
A High-Resolution Phase-Based Waveform Matching and Its Application to Side-Channel Attacks
Naofumi HOMMA  Sei NAGASHIMA  Takeshi SUGAWARA  Takafumi AOKI  Akashi SATOH  
Summary | Full Text:PDF (1.2MB) >>Buy this Article

pp.203-210  PAPER-Implementation
Montgomery Multiplication with Twice the Bit-Length of Multipliers
Masayuki YOSHINO  Katsuyuki OKEYA  Camille VUILLAUME  
Summary | Full Text:PDF (236.2KB) >>Buy this Article

pp.211-220  PAPER-Implementation
Diversification of Processors Based on Redundancy in Instruction Set
Shuichi ICHIKAWA  Takashi SAWADA  Hisashi HATA  
Summary | Full Text:PDF (241.5KB) >>Buy this Article

pp.221-228  PAPER-Implementation
Some Efficient Algorithms for the Final Exponentiation of ηT Pairing
Masaaki SHIRASE  Tsuyoshi TAKAGI  Eiji OKAMOTO  
Summary | Full Text:PDF (252.8KB) >>Buy this Article

pp.229-235  PAPER-Implementation
A Multi-Application Smart Card System with Authentic Post-Issuance Program Modification
Mohammad Mesbah UDDIN  Yasunobu NOHARA  Daisuke IKEDA  Hiroto YASUURA  
Summary | Full Text:PDF (737.7KB) >>Buy this Article

pp.236-243  PAPER-Implementation
New Hardware Architecture for Multiplication over GF(2m) and Comparisons with Normal and Polynomial Basis Multipliers for Elliptic Curve Cryptography
Soonhak KWON  Taekyoung KWON  Young-Ho PARK  
Summary | Full Text:PDF (298.2KB) >>Buy this Article

pp.244-261  PAPER-Security Notions
Relationship between Standard Model Plaintext Awareness and Message Hiding
Isamu TERANISHI  Wakaha OGATA  
Summary | Full Text:PDF (324.8KB) >>Buy this Article

pp.262-271  PAPER-Security Notions
Universally Composable Identity-Based Encryption
Ryo NISHIMAKI  Yoshifumi MANABE  Tatsuaki OKAMOTO  
Summary | Full Text:PDF (240.5KB) >>Buy this Article

pp.272-282  PAPER-Security Notions
On the Definitions of Anonymity for Ring Signatures
Miyako OHKUBO  Masayuki ABE  
Summary | Full Text:PDF (213.9KB) >>Buy this Article

pp.283-297  PAPER-Security Notions
On the Equivalence of Several Security Notions of KEM and DEM
Waka NAGAO  Yoshifumi MANABE  Tatsuaki OKAMOTO  
Summary | Full Text:PDF (286.4KB) >>Buy this Article

pp.298-305  PAPER-Biometrics
A Dental Radiograph Recognition System Using Phase-Only Correlation for Human Identification
Koichi ITO  Akira NIKAIDO  Takafumi AOKI  Eiko KOSUGE  Ryota KAWAMATA  Isamu KASHIMA  
Summary | Full Text:PDF (2MB) >>Buy this Article

pp.306-315  PAPER-Cryptanalysis
Factorization of Square-Free Integers with High Bits Known
Bagus SANTOSO  Noboru KUNIHIRO  Naoki KANAYAMA  Kazuo OHTA  
Summary | Full Text:PDF (332.9KB) >>Buy this Article

pp.316-329  PAPER-Cryptanalysis
Analysis of Program Obfuscation Schemes with Variable Encoding Technique
Kazuhide FUKUSHIMA  Shinsaku KIYOMOTO  Toshiaki TANAKA  Kouichi SAKURAI  
Summary | Full Text:PDF (377.1KB) >>Buy this Article

pp.330-337  PAPER-Cryptanalysis
Making Cryptographic Primitives Harder
Shingo HASEGAWA  Hiroyuki HATANAKA  Shuji ISOBE  Eisuke KOIZUMI  Hiroki SHIZUYA  
Summary | Full Text:PDF (308.7KB) >>Buy this Article

pp.338-341  LETTER
Powered Tate Pairing Computation
Bo Gyeong KANG  Je Hong PARK  
Summary | Full Text:PDF (82.9KB) >>Buy this Article

pp.342-344  LETTER
NPMV-Complete Functions That Compute Discrete Logarithms and Integer Factorization
Shingo HASEGAWA  Shuji ISOBE  Hiroki SHIZUYA  
Summary | Full Text:PDF (78.6KB) >>Buy this Article

Regular Section

pp.345-356  PAPER-Engineering Acoustics
Enhanced Vertical Perception through Head-Related Impulse Response Customization Based on Pinna Response Tuning in the Median Plane
Ki Hoon SHIN  Youngjin PARK  
Summary | Full Text:PDF (2.1MB) >>Buy this Article

pp.357-364  PAPER-Systems and Control
Discrete Modelling of Continuous-Time Systems Having Interval Uncertainties Using Genetic Algorithms
Chen-Chien HSU  Tsung-Chi LU  Heng-Chou CHEN  
Summary | Full Text:PDF (219.8KB) >>Buy this Article

pp.365-374  PAPER-VLSI Design Technology and CAD
GDME: Grey Relational Clustering Applied to a Clock Tree Construction with Zero Skew and Minimal Delay
Chia-Chun TSAI  Jan-Ou WU  Trong-Yen LEE  
Summary | Full Text:PDF (1.6MB) >>Buy this Article

pp.375-382  PAPER-VLSI Design Technology and CAD
An ILP Approach to the Simultaneous Application of Operation Scheduling and Power Management
Shih-Hsu HUANG  Chun-Hua CHENG  
Summary | Full Text:PDF (231KB) >>Buy this Article

pp.383-391  PAPER-Algorithms and Data Structures
An Optimal Parallel Algorithm for Finding All Hinge Vertices of a Circular-Arc Graph
Hirotoshi HONMA  Shigeru MASUYAMA  
Summary | Full Text:PDF (390.2KB) >>Buy this Article

pp.392-402  PAPER-Cryptography and Information Security
Invisibly Sanitizable Digital Signature Scheme
Kunihiko MIYAZAKI  Goichiro HANAOKA  Hideki IMAI  
Summary | Full Text:PDF (358.5KB) >>Buy this Article

pp.403-408  PAPER-Spread Spectrum Technologies and Applications
PAPR Reduction for PCC-OFDM Systems Using Neural Phase Rotator
Masaya OHTA  Hideyuki YAMADA  Katsumi YAMASHITA  
Summary | Full Text:PDF (281KB) >>Buy this Article

pp.409-412  LETTER-VLSI Design Technology and CAD
Injection-Locked Clock Recovery Using a Multiplexed Oscillator for Half-Rate Data-Recovered Applications
Ching-Yuan YANG  Ken-Hao CHANG  
Summary | Full Text:PDF (574.9KB) >>Buy this Article

pp.413-416  LETTER-Reliability, Maintainability and Safety Analysis
Fault-Tolerance for the Mobile Ad-Hoc Environment
Taesoon PARK  Kwangho KIM  
Summary | Full Text:PDF (234.5KB) >>Buy this Article

pp.417-421  LETTER-Coding Theory
New Family of Binary Sequences with Low Correlation
Wenfeng JIANG  Lei HU  Xiangyong ZENG  
Summary | Full Text:PDF (101.1KB) >>Buy this Article

pp.422-425  LETTER-Communication Theory and Signals
An Adaptive SLM Scheme Based on Peak Observation for PAPR Reduction of OFDM Signals
Suckchel YANG  Yoan SHIN  
Summary | Full Text:PDF (292KB) >>Buy this Article

pp.426-429  LETTER-Communication Theory and Signals
Asymptotic Performance Analysis of Orthogonal Space-Time Block Codes in Spatially Correlated Rician Fading Channel
Kyung Seung AHN  
Summary | Full Text:PDF (163.7KB) >>Buy this Article

pp.430-432  LETTER-Spread Spectrum Technologies and Applications
A Simple Asynchronous UWB Position Location Algorithm Based on Single Round-Trip Transmission
Suckchel YANG  Dongwoo KANG  Young NAMGOONG  Yoan SHIN  
Summary | Full Text:PDF (128.6KB) >>Buy this Article

pp.433-436  LETTER-Intelligent Transport System
Research on the Road Network Extraction from Satellite Imagery
Lili YUN  Keiichi UCHIMURA  
Summary | Full Text:PDF (304.8KB) >>Buy this Article

Previous | 
Next
go to Page Top