IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences

Archive Index

Online ISSN : 1745-1337
Volume E93-A No.1  (Publication Date:2010/01/01)
Previous | 
Next
Special Section on Cryptography and Information Security

pp.1-2  FOREWORD
FOREWORD
Kazuo TAKARAGI  
Summary | Full Text:PDF (63.2KB) >>Buy this Article

pp.3-12  PAPER-Symmetric Cryptography
Compact Architecture for ASIC Implementation of the MISTY1 Block Cipher
Dai YAMAMOTO  Jun YAJIMA  Kouichi ITOH  
Summary | Full Text:PDF (599.3KB) >>Buy this Article

pp.13-21  PAPER-Symmetric Cryptography
Tweakable Pseudorandom Permutation from Generalized Feistel Structure
Atsushi MITSUDA  Tetsu IWATA  
Summary | Full Text:PDF (497.7KB) >>Buy this Article

pp.22-33  PAPER-Public Key Cryptography
Chosen Ciphertext Security with Optimal Ciphertext Overhead
Masayuki ABE  Eike KILTZ  Tatsuaki OKAMOTO  
Summary | Full Text:PDF (259.8KB) >>Buy this Article

pp.34-41  PAPER-Public Key Cryptography
On Patarin's Attack against the IC Scheme
Naoki OGURA  Shigenori UCHIYAMA  
Summary | Full Text:PDF (175.3KB) >>Buy this Article

pp.42-49  PAPER-Public Key Cryptography
A Rational Secret-Sharing Scheme Based on RSA-OAEP
Toshiyuki ISSHIKI  Koichiro WADA  Keisuke TANAKA  
Summary | Full Text:PDF (201.3KB) >>Buy this Article

pp.50-62  PAPER-Digital Signature
Revocable Group Signature Schemes with Constant Costs for Signing and Verifying
Toru NAKANISHI  Hiroki FUJII  Yuta HIRA  Nobuo FUNABIKI  
Summary | Full Text:PDF (286KB) >>Buy this Article

pp.63-75  PAPER-Digital Signature
New RSA-Based (Selectively) Convertible Undeniable Signature Schemes
Le Trieu PHONG  Kaoru KUROSAWA  Wakaha OGATA  
Summary | Full Text:PDF (284.6KB) >>Buy this Article

pp.76-83  PAPER-Hash Function
Merkle-Damgård Hash Functions with Split Padding
Kan YASUDA  
Summary | Full Text:PDF (415.7KB) >>Buy this Article

pp.84-92  PAPER-Hash Function
Practical Password Recovery Attacks on MD4 Based Prefix and Hybrid Authentication Protocols
Yu SASAKI  Lei WANG  Kazuo OHTA  Kazumaro AOKI  Noboru KUNIHIRO  
Summary | Full Text:PDF (339.7KB) >>Buy this Article

pp.93-101  PAPER-Hash Function
MPP Characteristics of Variants of Merkle-Damgård Iterated Hash Functions
Shungo NAKAMURA  Tetsu IWATA  
Summary | Full Text:PDF (198KB) >>Buy this Article

pp.102-115  PAPER-Secure Protocol
Anonymous Password-Authenticated Key Exchange: New Construction and Its Extensions
SeongHan SHIN  Kazukuni KOBARA  Hideki IMAI  
Summary | Full Text:PDF (452.8KB) >>Buy this Article

pp.116-125  PAPER-Secure Protocol
Dual-Policy Attribute Based Encryption: Simultaneous Access Control with Ciphertext and Key Policies
Nuttapong ATTRAPADUNG  Hideki IMAI  
Summary | Full Text:PDF (230.4KB) >>Buy this Article

pp.126-135  PAPER-Secure Protocol
Efficient Almost Secure 1-Round Message Transmission Schemes for 3t+1 Channels
Toshinori ARAKI  Wakaha OGATA  
Summary | Full Text:PDF (206.3KB) >>Buy this Article

pp.136-143  PAPER-Cryptanalysis
Differential Fault Analysis on CLEFIA with 128, 192, and 256-Bit Keys
Junko TAKAHASHI  Toshinori FUKUNAGA  
Summary | Full Text:PDF (285.4KB) >>Buy this Article

pp.144-152  PAPER-Cryptanalysis
Security Analysis of 7-Round MISTY1 against Higher Order Differential Attacks
Yukiyasu TSUNOO  Teruo SAITO  Maki SHIGERI  Takeshi KAWABATA  
Summary | Full Text:PDF (322.6KB) >>Buy this Article

pp.153-163  PAPER-Cryptanalysis
Countermeasures against Power Analysis Attacks for the NTRU Public Key Cryptosystem
Mun-Kyu LEE  Jeong Eun SONG  Dooho CHOI  Dong-Guk HAN  
Summary | Full Text:PDF (625.7KB) >>Buy this Article

pp.164-171  PAPER-Cryptanalysis
Fast WEP-Key Recovery Attack Using Only Encrypted IP Packets
Ryoichi TERAMURA  Yasuo ASAKURA  Toshihiro OHIGASHI  Hidenori KUWAKADO  Masakatu MORII  
Summary | Full Text:PDF (832.3KB) >>Buy this Article

pp.172-179  PAPER-Cryptanalysis
On Clock-Based Fault Analysis Attack for an AES Hardware Using RSL
Kazuo SAKIYAMA  Kazuo OHTA  
Summary | Full Text:PDF (438.1KB) >>Buy this Article

pp.180-187  PAPER-Mathematics
Recursive Double-Size Modular Multiplications from Euclidean and Montgomery Multipliers
Masayuki YOSHINO  Katsuyuki OKEYA  Camille VUILLAUME  
Summary | Full Text:PDF (234.7KB) >>Buy this Article

pp.188-193  PAPER-Mathematics
The Vector Decomposition Problem
Maki YOSHIDA  Shigeo MITSUNARI  Toru FUJIWARA  
Summary | Full Text:PDF (190.9KB) >>Buy this Article

pp.194-201  PAPER-Application
A Cryptographic SoC for Robust Protection of Secret Keys in IPTV DRM Systems
Sanghan LEE  Hae-Yong YANG  Yongjin YEOM  Jongsik PARK  
Summary | Full Text:PDF (788.1KB) >>Buy this Article

pp.202-209  PAPER-Application
High-Speed Passphrase Search System for PGP
Koichi SHIMIZU  Daisuke SUZUKI  Toyohiro TSURUMARU  
Summary | Full Text:PDF (599.6KB) >>Buy this Article

pp.210-218  PAPER-Application
Multi-Pass Malware Sandbox Analysis with Controlled Internet Connection
Katsunari YOSHIOKA  Tsutomu MATSUMOTO  
Summary | Full Text:PDF (1.1MB) >>Buy this Article

Regular Section

pp.219-226  PAPER-Ultrasonics
Ultrasonic Imaging for Boundary Shape Generation by Phase Unwrapping with Singular-Point Elimination Based on Complex-Valued Markov Random Field Model
Tomohiro NISHINO  Ryo YAMAKI  Akira HIROSE  
Summary | Full Text:PDF (1.7MB) >>Buy this Article

pp.227-232  PAPER-Digital Signal Processing
An Instantaneous Frequency Estimator Based on the Symmetric Higher Order Differential Energy Operator
Byeong-Gwan IEM  
Summary | Full Text:PDF (232.3KB) >>Buy this Article

pp.233-242  PAPER-Digital Signal Processing
A Variable Step-Size Proportionate NLMS Algorithm for Identification of Sparse Impulse Response
Ligang LIU  Masahiro FUKUMOTO  Sachio SAIKI  Shiyong ZHANG  
Summary | Full Text:PDF (1MB) >>Buy this Article

pp.243-253  PAPER-Digital Signal Processing
A Novel Filter Dependent CFR Scheme with Waterfilling Based Code Domain Compensation
Hyung Min CHANG  Won Cheol LEE  
Summary | Full Text:PDF (962.6KB) >>Buy this Article

pp.254-260  PAPER-Digital Signal Processing
A Low Complexity Noise Suppressor with Hybrid Filterbanks and Adaptive Time-Frequency Tiling
Osamu SHIMADA  Akihiko SUGIYAMA  Toshiyuki NOMURA  
Summary | Full Text:PDF (537.7KB) >>Buy this Article

pp.261-271  PAPER-Digital Signal Processing
A Single-Chip Speech Dialogue Module and Its Evaluation on a Personal Robot, PaPeRo-Mini
Miki SATO  Toru IWASAWA  Akihiko SUGIYAMA  Toshihiro NISHIZAWA  Yosuke TAKANO  
Summary | Full Text:PDF (1MB) >>Buy this Article

pp.272-280  PAPER-Systems and Control
A New Prediction Algorithm for Embedded Real-Time Applications
Luis GRACIA  Carlos PEREZ-VIDAL  
Summary | Full Text:PDF (1.1MB) >>Buy this Article

pp.281-290  PAPER-Nonlinear Problems
Circuit Design Optimization Using Genetic Algorithm with Parameterized Uniform Crossover
Zhiguo BAO  Takahiro WATANABE  
Summary | Full Text:PDF (614.1KB) >>Buy this Article

pp.291-301  PAPER-Nonlinear Problems
Global Nonlinear Optimization Based on Wave Function and Wave Coefficient Equation
Hideki SATOH  
Summary | Full Text:PDF (633.9KB) >>Buy this Article

pp.302-308  PAPER-Cryptography and Information Security
On the Linear Complexity of Generalized Cyclotomic Binary Sequences with Length 2p2
Jingwei ZHANG  Chang-An ZHAO  Xiao MA  
Summary | Full Text:PDF (186KB) >>Buy this Article

pp.309-315  PAPER-Coding Theory
New Quaternary Sequences with Even Period and Three-Valued Autocorrelation
Jin-Ho CHUNG  Yun Kyoung HAN  Kyeongcheol YANG  
Summary | Full Text:PDF (163.9KB) >>Buy this Article

pp.316-319  LETTER-Speech and Hearing
Discriminative Weight Training for Support Vector Machine-Based Speech/Music Classification in 3GPP2 SMV Codec
Sang-Kyun KIM  Joon-Hyuk CHANG  
Summary | Full Text:PDF (129.3KB) >>Buy this Article

pp.320-323  LETTER-Digital Signal Processing
Harmonic Components Based Post-Filter Design for Residual Echo Suppression
Minwoo LEE  Yoonjae LEE  Kihyeon KIM  Hanseok KO  
Summary | Full Text:PDF (119.4KB) >>Buy this Article

pp.324-326  LETTER-VLSI Design Technology and CAD
CSD-Based Programmable Multiplier Design for Predetermined Coefficient Groups
Yong-Eun KIM  Kyung-Ju CHO  Jin-Gyun CHUNG  Xinming HUANG  
Summary | Full Text:PDF (314.3KB) >>Buy this Article

pp.327-330  LETTER-Cryptography and Information Security
General Impossible Differential Attack on 7-Round AES
Meiling ZHANG  Weiguo ZHANG  Jingmei LIU  Xinmei WANG  
Summary | Full Text:PDF (352KB) >>Buy this Article

pp.331-335  LETTER-Cryptography and Information Security
DWT-Based High Capacity Audio Watermarking
Mehdi FALLAHPOUR  David MEGIAS  
Summary | Full Text:PDF (541.8KB) >>Buy this Article

pp.336-338  LETTER-Coding Theory
The Extended FDH Sequences
WenPing MA  YeFeng HE  Shaohui SUN  
Summary | Full Text:PDF (64.8KB) >>Buy this Article

pp.339-343  LETTER-Communication Theory and Signals
Blind Channel Estimation for SIMO-OFDM Systems without Cyclic Prefix
Shih-Hao FANG  Ju-Ya CHEN  Ming-Der SHIEH  Jing-Shiun LIN  
Summary | Full Text:PDF (185.4KB) >>Buy this Article

pp.344-347  LETTER-Mobile Information Network and Personal Communications
Stochastic Congestion Control in Wireless Sensor Networks
Hyung Seok KIM  Seok LEE  Namhoon KIM  
Summary | Full Text:PDF (147.2KB) >>Buy this Article

pp.348-353  LETTER-Image
Improvement of Ringing Artifact Reduction Using a K-Means Method for Color Moving Pictures
Wonwoo JANG  Hagyong HAN  Wontae CHOI  Gidong LEE  Bongsoon KANG  
Summary | Full Text:PDF (802.4KB) >>Buy this Article

Previous | 
Next
go to Page Top