IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences

Archive Index

Online ISSN : 1745-1337
Volume E93-A No.6  (Publication Date:2010/06/01)
Previous | 
Next
Special Section on Discrete Mathematics and Its Applications

pp.999-999  FOREWORD
FOREWORD
Seiichi TANI  
Summary | Full Text:PDF (140.5KB) >>Buy this Article

pp.1000-1007  PAPER-Graphs and Networks
The Planar Hajós Calculus for Bounded Degree Graphs
Kazuo IWAMA  Kazuhisa SETO  Suguru TAMAKI  
Summary | Full Text:PDF (898.7KB) >>Buy this Article

pp.1008-1015  PAPER-Circuit Complexity
NPN-Representatives of a Set of Optimal Boolean Formulas
Hideaki FUKUHARA  Eiji TAKIMOTO  Kazuyuki AMANO  
Summary | Full Text:PDF (2.1MB) >>Buy this Article

pp.1016-1023  PAPER-Communication Theory and Signals
Design of Multicarrier OFDM Modulator/Demodulator Based on Discrete Hartley Transform
Muh-Tian SHIUE  Chin-Kuo JAO  Pei-Shin CHEN  
Summary | Full Text:PDF (2.4MB) >>Buy this Article

pp.1024-1031  PAPER-Coding Theory
A Note on a Sampling Theorem for Functions over GF(q)n Domain
Yoshifumi UKITA  Tomohiko SAITO  Toshiyasu MATSUSHIMA  Shigeichi HIRASAWA  
Summary | Full Text:PDF (584.7KB) >>Buy this Article

pp.1032-1038  PAPER-Cryptography and Information Security
Pairing-Friendly Elliptic Curves with Various Discriminants
Woo Sug KANG  Ki Taek KIM  
Summary | Full Text:PDF (353.9KB) >>Buy this Article

pp.1039-1051  PAPER-Cryptography and Information Security
Efficient Provider Authentication for Bidirectional Broadcasting Service
Go OHTAKE  Goichiro HANAOKA  Kazuto OGAWA  
Summary | Full Text:PDF (792.7KB) >>Buy this Article

pp.1052-1057  PAPER-Cryptography and Information Security
A Note on Parameters of Random Substitutions by γ-Diagonal Matrices
Ju-Sung KANG  
Summary | Full Text:PDF (1.7MB) >>Buy this Article

pp.1058-1065  PAPER-Cryptography and Information Security
New Conditions for Secure Knapsack Schemes against Lattice Attack
Noboru KUNIHIRO  
Summary | Full Text:PDF (241.4KB) >>Buy this Article

pp.1066-1077  PAPER-Cryptography and Information Security
New Analysis Based on Correlations of RC4 PRGA with Nonzero-Bit Differences
Atsuko MIYAJI  Masahiro SUKEGAWA  
Summary | Full Text:PDF (1018.7KB) >>Buy this Article

pp.1078-1085  PAPER-Cryptography and Information Security
Dually-Perturbed Matsumoto-Imai Signature (DPMS) Scheme
Masahito GOTAISHI  Kohtaro TADAKI  Ryo FUJITA  Shigeo TSUJII  
Summary | Full Text:PDF (650.6KB) >>Buy this Article

pp.1086-1101  PAPER-Cryptography and Information Security
An RSA-Based Leakage-Resilient Authenticated Key Exchange Protocol Secure against Replacement Attacks, and Its Extensions
SeongHan SHIN  Kazukuni KOBARA  Hideki IMAI  
Summary | Full Text:PDF (7.4MB) >>Buy this Article

pp.1102-1110  PAPER-Cryptography and Information Security
Key-Generation Algorithms for Linear Piece In Hand Matrix Method
Kohtaro TADAKI  Shigeo TSUJII  
Summary | Full Text:PDF (371.2KB) >>Buy this Article

pp.1111-1121  PAPER-Cryptography and Information Security
Key Generation for Fast Inversion of the Paillier Encryption Function
Takato HIRANO  Keisuke TANAKA  
Summary | Full Text:PDF (388.9KB) >>Buy this Article

pp.1122-1131  PAPER-Cryptography and Information Security
Extension of Secret Handshake Protocols with Multiple Groups in Monotone Condition
Yutaka KAWAI  Shotaro TANNO  Takahiro KONDO  Kazuki YONEYAMA  Kazuo OHTA  Noboru KUNIHIRO  
Summary | Full Text:PDF (1.3MB) >>Buy this Article

pp.1132-1139  PAPER-Cryptography and Information Security
Construction of Pairing-Friendly Hyperelliptic Curves Based on the Closed Formulae of the Order of the Jacobian Group
Aya COMUTA  Mitsuru KAWAZOE  Tetsuya TAKAHASHI  Isamu YOSHIZAWA  
Summary | Full Text:PDF (589.4KB) >>Buy this Article

pp.1140-1147  PAPER-Cryptography and Information Security
Sole Inversion Precomputation for Elliptic Curve Scalar Multiplications
Erik DAHMEN  Katsuyuki OKEYA  
Summary | Full Text:PDF (374.2KB) >>Buy this Article

pp.1148-1152  LETTER-Algorithms and Data Structures
Non-closure Properties of 1-Inkdot Nondeterministic Turing Machines and Alternating Turing Machines with Only Universal States Using Small Space
Tsunehiro YOSHINAGA  Jianliang XU  Makoto SAKAMOTO  
Summary | Full Text:PDF (103KB) >>Buy this Article

Regular Section

pp.1153-1162  PAPER-Digital Signal Processing
Error Analysis and Numerical Stabilization of the Fast H Filter
Tomonori KATSUMATA  Kiyoshi NISHIYAMA  Katsuaki SATOH  
Summary | Full Text:PDF (570.7KB) >>Buy this Article

pp.1163-1170  PAPER-Digital Signal Processing
Irregular Sampling on Shift Invariant Spaces
Kil Hyun KWON  Jaekyu LEE  
Summary | Full Text:PDF (372.3KB) >>Buy this Article

pp.1171-1180  PAPER-Systems and Control
Integrated Sliding Mode Controller Design for Autopilot and Roll Stabilizer of Ship
Abbas HARIFI  Ghasem ALIZADEH  Sohrab KHANMOHAMMADI  Iraj HASSANZADEH  
Summary | Full Text:PDF (1.8MB) >>Buy this Article

pp.1181-1189  PAPER-Nonlinear Problems
Robust Wavelet Sliding-Mode Control via Time-Variant Sliding Function
Majid YARAHMADI  Seyed-Mehdi KARBASSI  Ahmad MIRZAEI  
Summary | Full Text:PDF (3MB) >>Buy this Article

pp.1190-1195  PAPER-Circuit Theory
Application of Similarity in Fault Diagnosis of Power Electronics Circuits
Wang RONGJIE  Zhan YIJU  Chen MEIQIAN  Zhou HAIFENG  Guo KEWEI  
Summary | Full Text:PDF (4.7MB) >>Buy this Article

pp.1196-1203  PAPER-VLSI Design Technology and CAD
Efficient Power Network Analysis with Modeling of Inductive Effects
Shan ZENG  Wenjian YU  Xianlong HONG  Chung-Kuan CHENG  
Summary | Full Text:PDF (678.4KB) >>Buy this Article

pp.1204-1214  PAPER-VLSI Design Technology and CAD
Stochastic Sparse-Grid Collocation Algorithm for Steady-State Analysis of Nonlinear System with Process Variations
Jun TAO  Xuan ZENG  Wei CAI  Yangfeng SU  Dian ZHOU  
Summary | Full Text:PDF (929.8KB) >>Buy this Article

pp.1215-1225  PAPER-VLSI Design Technology and CAD
A Performance/Energy Analysis and Optimization of Multi-Core Architectures with Voltage Scaling Techniques
Jeong-Gun LEE  Wook SHIN  Suk-Jin KIM  Eun-Gu JUNG  
Summary | Full Text:PDF (2.5MB) >>Buy this Article

pp.1226-1231  PAPER-Cryptography and Information Security
On Feedback Functions of Maximum Length Nonlinear Feedback Shift Registers
Çağdaş ÇALIK  Meltem SÖNMEZ TURAN  Ferruh ÖZBUDAK  
Summary | Full Text:PDF (477.6KB) >>Buy this Article

pp.1232-1243  PAPER-Mobile Information Network and Personal Communications
Reducing the Handover Delay in FMIPv6 Using Proactive Care-of Address Scheme
Yong LI  Depeng JIN  Li SU  Lieguang ZENG  
Summary | Full Text:PDF (1.9MB) >>Buy this Article

pp.1244-1247  LETTER-Digital Signal Processing
MIMO-OC Scheme to Suppress Co-channel Interference
Wei Jiong ZHANG  Xi Lang ZHOU  Rong Hong JIN  
Summary | Full Text:PDF (7.8MB) >>Buy this Article

pp.1248-1250  LETTER-Digital Signal Processing
Time Delay Estimator Based on Frequency Estimation Approach
Kenneth Wing Kin LUI  Hing Cheung SO  
Summary | Full Text:PDF (108.8KB) >>Buy this Article

pp.1251-1253  LETTER-Digital Signal Processing
Low-Cost Implementation of Single Frequency Estimation Scheme Using Auto-Correlation Function
Hyun YANG  Young-Hwan YOU  
Summary | Full Text:PDF (144.4KB) >>Buy this Article

pp.1254-1259  LETTER-Analog Signal Processing
Enhanced Cancelable Biometrics for Online Signature Verification
Daigo MURAMATSU  Manabu INUMA  Junji SHIKATA  Akira OTSUKA  
Summary | Full Text:PDF (434.6KB) >>Buy this Article

pp.1260-1265  LETTER-Systems and Control
Observer-Based Robust Stabilizing Controllers Based on the Trajectory for Polytopic Uncertain Systems
Hiroki WADA  Hidetoshi OYA  Kojiro HAGINO  Yasumitsu EBINUMA  
Summary | Full Text:PDF (116.8KB) >>Buy this Article

pp.1266-1268  LETTER-Circuit Theory
Low Power Pulse Generator Design Using Hybrid Logic
Jin-Fa LIN  Yin-Tsung HWANG  Ming-Hwa SHEU  
Summary | Full Text:PDF (1.1MB) >>Buy this Article

pp.1269-1273  LETTER-Cryptography and Information Security
Analysis of Hu-Huang-Fan Practical Hierarchical Identity-Based Encryption Scheme
Jong Hwan PARK  Dong Hoon LEE  
Summary | Full Text:PDF (96.7KB) >>Buy this Article

pp.1274-1276  LETTER-Communication Theory and Signals
Sensor Localization Based on AOA-Assisted NLOS Identification
Takahiro ASO  Teruyuki MIYAJIMA  
Summary | Full Text:PDF (228.3KB) >>Buy this Article

Previous | 
Next
go to Page Top