IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences

Archive Index

Online ISSN : 1745-1337
Volume E92-A No.1  (Publication Date:2009/01/01)
Previous | 
Next
Special Section on Cryptography and Information Security

pp.1-2  FOREWORD
FOREWORD
Kazuo OHTA  
Summary | Full Text:PDF (46.2KB) >>Buy this Article

pp.3-10  PAPER-Symmetric Cryptography
Higher Order Differential Attack on 6-Round MISTY1
Yukiyasu TSUNOO  Teruo SAITO  Hiroki NAKASHIMA  Maki SHIGERI  
Summary | Full Text:PDF (305.2KB) >>Buy this Article

pp.11-21  PAPER-Symmetric Cryptography
Time-Memory-Data Trade-Off Attack on Stream Ciphers Based on Maiorana-McFarland Functions
Khoongming KHOO  Guanhan CHEW  Guang GONG  Hian-Kiat LEE  
Summary | Full Text:PDF (242.4KB) >>Buy this Article

pp.22-32  PAPER-Public Key Cryptography
Attribute-Based Encryption with Partially Hidden Ciphertext Policies
Takashi NISHIDE  Kazuki YONEYAMA  Kazuo OHTA  
Summary | Full Text:PDF (255.5KB) >>Buy this Article

pp.33-41  PAPER-Public Key Cryptography
Small Secret Key Attack on a Takagi's Variant of RSA
Kouichi ITOH  Noboru KUNIHIRO  Kaoru KUROSAWA  
Summary | Full Text:PDF (294KB) >>Buy this Article

pp.42-52  PAPER-Public Key Cryptography
Tag-KEM from Set Partial Domain One-Way Permutations
Masayuki ABE  Yang CUI  Hideki IMAI  Kaoru KUROSAWA  
Summary | Full Text:PDF (282.9KB) >>Buy this Article

pp.53-66  PAPER-Digital Signature
Formal Security Treatments for IBE-to-Signature Transformation: Relations among Security Notions
Yang CUI  Eiichiro FUJISAKI  Goichiro HANAOKA  Hideki IMAI  Rui ZHANG  
Summary | Full Text:PDF (449.3KB) >>Buy this Article

pp.67-75  PAPER-Digital Signature
Forgery Attacks on Time-Stamp, Signed PDF and X.509 Certificate
Kouichi ITOH  Tetsuya IZU  Wakaha OGATA  Takeshi SHIMOYAMA  Masahiko TAKENAKA  
Summary | Full Text:PDF (458KB) >>Buy this Article

pp.76-86  PAPER-Hash Function
Near-Collision Attacks on MD4: Applied to MD4-Based Protocols
Lei WANG  Kazuo OHTA  Noboru KUNIHIRO  
Summary | Full Text:PDF (287.3KB) >>Buy this Article

pp.87-95  PAPER-Hash Function
A Strict Evaluation on the Number of Conditions for SHA-1 Collision Search
Jun YAJIMA  Terutoshi IWASAKI  Yusuke NAITO  Yu SASAKI  Takeshi SHIMOYAMA  Thomas PEYRIN  Noboru KUNIHIRO  Kazuo OHTA  
Summary | Full Text:PDF (330.1KB) >>Buy this Article

pp.96-104  PAPER-Hash Function
Extended Password Recovery Attacks against APOP, SIP, and Digest Authentication
Yu SASAKI  Lei WANG  Kazuo OHTA  Noboru KUNIHIRO  
Summary | Full Text:PDF (230.4KB) >>Buy this Article

pp.105-112  PAPER-Secure Protocol
Almost Secure (1-Round, n-Channel) Message Transmission Scheme
Kaoru KUROSAWA  Kazuhiro SUZUKI  
Summary | Full Text:PDF (178.2KB) >>Buy this Article

pp.113-121  PAPER-Secure Protocol
Does Secure Password-Based Authenticated Key Exchange against Leakage of Internal States Exist?
Kazuki YONEYAMA  
Summary | Full Text:PDF (217.7KB) >>Buy this Article

pp.122-136  PAPER-Secure Protocol
A New 'On the Fly' Identification Scheme: An Asymptoticity Trade-Off between ZK and Correctness
Bagus SANTOSO  Kazuo OHTA  
Summary | Full Text:PDF (335.1KB) >>Buy this Article

pp.137-146  PAPER-Secure Protocol
Multiparty Computation from El Gamal/Paillier Conversion
Koji CHIDA  Hiroaki KIKUCHI  Keiichi HIROTA  Gembu MOROHASHI  
Summary | Full Text:PDF (276.2KB) >>Buy this Article

pp.147-165  PAPER-Secure Protocol
k-Times Anonymous Authentication
Isamu TERANISHI  Jun FURUKAWA  Kazue SAKO  
Summary | Full Text:PDF (888.1KB) >>Buy this Article

pp.166-172  PAPER-Mathematics
A New Randomness Test Based on Linear Complexity Profile
Kenji HAMANO  Fumio SATO  Hirosuke YAMAMOTO  
Summary | Full Text:PDF (247.6KB) >>Buy this Article

pp.173-181  PAPER-Mathematics
A Multiplication Algorithm in Fpm Such That p>m with a Special Class of Gauss Period Normal Bases
Hidehiro KATO  Yasuyuki NOGAMI  Tomoki YOSHIDA  Yoshitaka MORIKAWA  
Summary | Full Text:PDF (217KB) >>Buy this Article

pp.182-189  PAPER-Mathematics
Scalar Multiplication Using Frobenius Expansion over Twisted Elliptic Curve for Ate Pairing Based Cryptography
Yasuyuki NOGAMI  Yumi SAKEMI  Takumi OKIMOTO  Kenta NEKADO  Masataka AKANE  Yoshitaka MORIKAWA  
Summary | Full Text:PDF (574.7KB) >>Buy this Article

pp.190-196  PAPER-Application
The Unknown Computer Viruses Detection Based on Similarity
Zhongda LIU  Naoshi NAKAYA  Yuuji KOUI  
Summary | Full Text:PDF (284.6KB) >>Buy this Article

pp.197-206  PAPER-Application
An Efficient 2-Secure and Short Random Fingerprint Code and Its Security Evaluation
Koji NUIDA  Satoshi FUJITSU  Manabu HAGIWARA  Hideki IMAI  Takashi KITAGAWA  Kazuto OGAWA  Hajime WATANABE  
Summary | Full Text:PDF (528.7KB) >>Buy this Article

pp.207-216  PAPER-Application
Fingerprinting Codes for Multimedia Data against Averaging Attack
Hideki YAGI  Toshiyasu MATSUSHIMA  Shigeichi HIRASAWA  
Summary | Full Text:PDF (260.7KB) >>Buy this Article

pp.217-221  LETTER
Symmetricity of the Protocols Related to Oblivious Transfer
Daisuke INOUE  Keisuke TANAKA  
Summary | Full Text:PDF (123.4KB) >>Buy this Article

pp.222-225  LETTER
Flexible Timed-Release Encryption
Maki YOSHIDA  Toru FUJIWARA  
Summary | Full Text:PDF (223.3KB) >>Buy this Article

Regular Section

pp.226-234  PAPER-Speech and Hearing
A Subtractive-Type Speech Enhancement Using the Perceptual Frequency-Weighting Function
Seiji HAYASHI  Hiroyuki INUKAI  Masahiro SUGUIMOTO  
Summary | Full Text:PDF (1.3MB) >>Buy this Article

pp.235-243  PAPER-Digital Signal Processing
High-Accuracy Estimation of Image Rotation Using 1D Phase-Only Correlation
Sei NAGASHIMA  Koichi ITO  Takafumi AOKI  Hideaki ISHII  Koji KOBAYASHI  
Summary | Full Text:PDF (960KB) >>Buy this Article

pp.244-251  PAPER-Digital Signal Processing
A Variable Step Size Algorithm for Speech Noise Reduction Method Based on Noise Reconstruction System
Naoto SASAOKA  Masatoshi WATANABE  Yoshio ITOH  Kensaku FUJII  
Summary | Full Text:PDF (487.7KB) >>Buy this Article

pp.252-262  PAPER-Systems and Control
Sliding Mode Control of a Class of Uncertain Nonlinear Time-Delay Systems Using LMI and TS Recurrent Fuzzy Neural Network
Tung-Sheng CHIANG  Chian-Song CHIU  
Summary | Full Text:PDF (499.4KB) >>Buy this Article

pp.263-269  PAPER-Nonlinear Problems
Link of Data Synchronization to Self-Organizing Map Algorithm
Takaya MIYANO  Takako TSUTSUI  
Summary | Full Text:PDF (231.3KB) >>Buy this Article

pp.270-278  PAPER-Nonlinear Problems
Transitional Dynamics and Quasi-Periodic Solution Observed in Two Asymmetrical Coupled Oscillators
Kuniyasu SHIMIZU  Tetsuro ENDO  Takuya YOSHIMURA  
Summary | Full Text:PDF (829KB) >>Buy this Article

pp.279-290  PAPER-VLSI Design Technology and CAD
VLSI Implementation of a VC-1 Main Profile Decoder for HD Video Applications
Jinhyun CHO  Doowon LEE  Sangyong YOON  Sanggyu PARK  Soo-Ik CHAE  
Summary | Full Text:PDF (2.8MB) >>Buy this Article

pp.291-297  PAPER-Coding Theory
New Families of Binary Sequences with Low Correlation and Large Size
Zhengchun ZHOU  Xiaohu TANG  
Summary | Full Text:PDF (167.6KB) >>Buy this Article

pp.298-306  PAPER-Spread Spectrum Technologies and Applications
Interference Canceller Based on Cycle-and-Add Property for Single User Detection in DS-CDMA
Ranga HETTIARACHCHI  Mitsuo YOKOYAMA  Hideyuki UEHARA  Takashi OHIRA  
Summary | Full Text:PDF (963.9KB) >>Buy this Article

pp.307-310  LETTER-Digital Signal Processing
A Design Method for Separable-Denominator 2D IIR Filters with a Necessary and Sufficient Stability Check
Toma MIYATA  Naoyuki AIKAWA  Yasunori SUGITA  Toshinori YOSHIKAWA  
Summary | Full Text:PDF (543.8KB) >>Buy this Article

pp.311-314  LETTER-Digital Signal Processing
A Variable Error Data Normalized Step-Size LMS Adaptive Filter Algorithm: Analysis and Simulations
Chee-Hyun PARK  Kwang-Seok HONG  
Summary | Full Text:PDF (154.4KB) >>Buy this Article

pp.315-317  LETTER-Systems and Control
A New Steering Law with Designated Direction Escape (DDE) for Control Moment Gyros
Seung-Mok LEE  Seung-Wu RHEE  
Summary | Full Text:PDF (163.2KB) >>Buy this Article

pp.318-321  LETTER-Circuit Theory
Serial-Parallel Content Addressable Memory with a Conditional Driver (SPCwCD)
Mingu KANG  Seong-Ook JUNG  
Summary | Full Text:PDF (202.3KB) >>Buy this Article

pp.322-325  LETTER-Cryptography and Information Security
Analysis of Revocable-iff-Linked Ring Signature Scheme
Ik Rae JEONG  Jeong Ok KWON  Dong Hoon LEE  
Summary | Full Text:PDF (88KB) >>Buy this Article

pp.326-328  LETTER-Cryptography and Information Security
Simple Remarks on Carmichael Numbers
Shigenori UCHIYAMA  
Summary | Full Text:PDF (71.3KB) >>Buy this Article

pp.329-331  LETTER-Cryptography and Information Security
Security Analysis of a Multi-Receiver Identity-Based Key Encapsulation Mechanism
Jong Hwan PARK  Dong Hoon LEE  
Summary | Full Text:PDF (78.5KB) >>Buy this Article

pp.332-336  LETTER-Communication Theory and Signals
A Simple Expression of BER Performance in COFDM Systems over Fading Channels
Fumihito SASAMORI  Yuya ISHIKAWA  Shiro HANDA  Shinjiro OSHITA  
Summary | Full Text:PDF (218KB) >>Buy this Article

pp.337-341  LETTER-Communication Theory and Signals
A Robust Detection in the Case of Strong Narrowband Jammer with Unknown Nonstationary Power
Victor GOLIKOV  Olga LEBEDEVA  
Summary | Full Text:PDF (278.4KB) >>Buy this Article

pp.342-345  LETTER-Spread Spectrum Technologies and Applications
On Some Properties of M-Ary Sidel'nikov Sequences
Jung-Soo CHUNG  Young-Sik KIM  Tae-Hyung LIM  Jong-Seon NO  Habong CHUNG  
Summary | Full Text:PDF (87.9KB) >>Buy this Article

Previous | 
Next
go to Page Top