IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences

Archive Index

Online ISSN : 1745-1337
Volume E94-A No.1  (Publication Date:2011/01/01)
Previous | 
Next
Special Section on Cryptography and Information Security

pp.1-2  FOREWORD
FOREWORD
Toru FUJIWARA  
Summary | Full Text:PDF (145KB) >>Buy this Article

pp.3-9  PAPER-Symmetric Cryptography
Related-Key Boomerang Attack on Block Cipher SQUARE
Bonwook KOO  Yongjin YEOM  Junghwan SONG  
Summary | Full Text:PDF (3MB) >>Buy this Article

pp.10-18  PAPER-Symmetric Cryptography
Generalized Classes of Weak Keys on RC4 Using Predictive State
Ryoichi TERAMURA  Toshihiro OHIGASHI  Hidenori KUWAKADO  Masakatu MORII  
Summary | Full Text:PDF (630.7KB) >>Buy this Article

pp.19-27  PAPER-Public Key Cryptography
Small Secret CRT-Exponent Attacks on Takagi's RSA
Naoyuki SHINOHARA  Tetsuya IZU  Noboru KUNIHIRO  
Summary | Full Text:PDF (485.9KB) >>Buy this Article

pp.28-35  PAPER-Public Key Cryptography
A Fully Secure Spatial Encryption Scheme
Daisuke MORIYAMA  Hiroshi DOI  
Summary | Full Text:PDF (376.9KB) >>Buy this Article

pp.36-44  PAPER-Public Key Cryptography
Secure and Efficient IBE-PKE Proxy Re-Encryption
Takeo MIZUNO  Hiroshi DOI  
Summary | Full Text:PDF (385.4KB) >>Buy this Article

pp.45-56  PAPER-Public Key Cryptography
Anonymous Hierarchical Identity-Based Encryption with Short Ciphertexts
Jae Hong SEO  Tetsutaro KOBAYASHI  Miyako OHKUBO  Koutarou SUZUKI  
Summary | Full Text:PDF (669.6KB) >>Buy this Article

pp.57-70  PAPER-Public Key Cryptography
Security of Cryptosystems Using Merkle-Damgård in the Random Oracle Model
Yusuke NAITO  Kazuki YONEYAMA  Lei WANG  Kazuo OHTA  
Summary | Full Text:PDF (657.3KB) >>Buy this Article

pp.71-83  PAPER-Identification
Efficient Convertible Undeniable Signatures with Delegatable Verification
Jacob C. N. SCHULDT  Kanta MATSUURA  
Summary | Full Text:PDF (428.3KB) >>Buy this Article

pp.84-91  PAPER-Identification
On the Full MAC Security of a Double-Piped Mode of Operation
Kan YASUDA  
Summary | Full Text:PDF (539.1KB) >>Buy this Article

pp.92-103  PAPER-Identification
An Efficient Authentication for Lightweight Devices by Perfecting Zero-Knowledgeness
Bagus SANTOSO  Kazuo OHTA  Kazuo SAKIYAMA  Goichiro HANAOKA  
Summary | Full Text:PDF (736.7KB) >>Buy this Article

pp.104-109  PAPER-Hash Function
The Security of Abreast-DM in the Ideal Cipher Model
Jooyoung LEE  Daesung KWON  
Summary | Full Text:PDF (5.3MB) >>Buy this Article

pp.110-120  PAPER-Hash Function
Preimage Attack on 23-Step Tiger
Lei WANG  Yu SASAKI  
Summary | Full Text:PDF (5.8MB) >>Buy this Article

pp.121-128  PAPER-Hash Function
Cryptanalyses of Double-Mix Merkle-Damgård Mode in the Original Version of AURORA-512
Yu SASAKI  
Summary | Full Text:PDF (535.9KB) >>Buy this Article

pp.129-138  PAPER-Secure Protocol
Efficient and Secure Authenticated Key Exchange Protocols in the eCK Model
Jooyoung LEE  Je Hong PARK  
Summary | Full Text:PDF (3.4MB) >>Buy this Article

pp.139-149  PAPER-Secure Protocol
Provably Secure On-Line Secret Sharing Scheme
Tatsumi OBA  Wakaha OGATA  
Summary | Full Text:PDF (389.9KB) >>Buy this Article

pp.150-155  PAPER-Mathematics
Faster MapToPoint on Supersingular Elliptic Curves in Characteristic 3
Yuto KAWAHARA  Tetsutaro KOBAYASHI  Gen TAKAHASHI  Tsuyoshi TAKAGI  
Summary | Full Text:PDF (588.1KB) >>Buy this Article

pp.156-164  PAPER-Mathematics
Universal Construction of a 12th Degree Extension Field for Asymmetric Pairing
Masaaki SHIRASE  
Summary | Full Text:PDF (268.5KB) >>Buy this Article

pp.165-171  PAPER-Mathematics
Several Classes of Even-Variable Balanced Boolean Functions with Optimal Algebraic Immunity
Chik-How TAN  Siong-Thye GOH  
Summary | Full Text:PDF (357.3KB) >>Buy this Article

pp.172-179  PAPER-Mathematics
Cyclic Vector Multiplication Algorithm and Existence Probability of Gauss Period Normal Basis
Kenta NEKADO  Yasuyuki NOGAMI  Hidehiro KATO  Yoshitaka MORIKAWA  
Summary | Full Text:PDF (788.7KB) >>Buy this Article

pp.180-190  PAPER-Implementation
A High Speed IC Truly Random Number Generator Based on Chaotic Sampling of Regular Waveform
Salih ERGUN  Ulkuhan GULER  Kunihiro ASADA  
Summary | Full Text:PDF (2.3MB) >>Buy this Article

pp.191-199  PAPER-Implementation
Power Analysis against a DPA-Resistant S-Box Implementation Based on the Fourier Transform
Yang LI  Kazuo SAKIYAMA  Shinichi KAWAMURA  Kazuo OHTA  
Summary | Full Text:PDF (2.1MB) >>Buy this Article

pp.200-210  PAPER-Implementation
How to Decide Selection Functions for Power Analysis: From the Viewpoint of Hardware Architecture of Block Ciphers
Daisuke SUZUKI  Minoru SAEKI  Koichi SHIMIZU  Tsutomu MATSUMOTO  
Summary | Full Text:PDF (1.6MB) >>Buy this Article

pp.211-222  PAPER-Implementation
How to Maximize the Potential of FPGA-Based DSPs for Modular Exponentiation
Daisuke SUZUKI  Tsutomu MATSUMOTO  
Summary | Full Text:PDF (1.1MB) >>Buy this Article

pp.223-232  PAPER-Digital Fingerprinting
A Digital Fingerprinting Code Based on a Projective Plane and Its Identifiability of All Malicious Users
Hiroki KOGA  Yusuke MINAMI  
Summary | Full Text:PDF (523.1KB) >>Buy this Article

pp.233-244  PAPER-Biometrics
Cancelable Biometrics with Provable Security and Its Application to Fingerprint Verification
Kenta TAKAHASHI  Shinji HIRATA  
Summary | Full Text:PDF (861KB) >>Buy this Article

pp.245-254  PAPER-Network Security
O-means: An Optimized Clustering Method for Analyzing Spam Based Attacks
Jungsuk SONG  Daisuke INOUE  Masashi ETO  Hyung Chan KIM  Koji NAKAO  
Summary | Full Text:PDF (1023.4KB) >>Buy this Article

pp.255-264  PAPER-Network Security
Efficient Context-Sensitive Intrusion Detection Based on State Transition Table
Jingyu HUA  Mingchu LI  Yizhi REN  Kouichi SAKURAI  
Summary | Full Text:PDF (2MB) >>Buy this Article

pp.265-267  LETTER
Construction of Odd-Variable Resilient Boolean Functions with Optimal Degree
Shaojing FU  Chao LI  Kanta MATSUURA  Longjiang QU  
Summary | Full Text:PDF (93.1KB) >>Buy this Article

pp.268-269  LETTER
Analysis of an Identity-Based Signcryption Scheme in the Standard Model
Fagen LI  Yongjian LIAO  Zhiguang QIN  
Summary | Full Text:PDF (78.7KB) >>Buy this Article

pp.270-272  LETTER
Toward Digital Watermarking for Cryptographic Data
Maki YOSHIDA  Toru FUJIWARA  
Summary | Full Text:PDF (85.7KB) >>Buy this Article

Regular Section

pp.273-281  PAPER-Engineering Acoustics
Improving Power Spectra Estimation in 2-Dimensional Areas Using Number of Active Sound Sources
Yusuke HIOKA  Ken'ichi FURUYA  Yoichi HANEDA  Akitoshi KATAOKA  
Summary | Full Text:PDF (3.7MB) >>Buy this Article

pp.282-289  PAPER-Nonlinear Problems
Chaos-Based Communications Using Open-Plus-Closed-Loop Control
Takaya MIYANO  Kazuhiro NISHIMURA  Yusuke YOSHIDA  
Summary | Full Text:PDF (1.3MB) >>Buy this Article

pp.290-299  PAPER-Nonlinear Problems
A Domain Partition Model Approach to the Online Fault Recovery of FPGA-Based Reconfigurable Systems
Lihong SHANG  Mi ZHOU  Yu HU  Erfu YANG  
Summary | Full Text:PDF (2.6MB) >>Buy this Article

pp.300-314  PAPER-Nonlinear Problems
A Self-Organizing Pulse-Coupled Network of Sub-Threshold Oscillating Spiking Neurons
Kai KINOSHITA  Hiroyuki TORIKAI  
Summary | Full Text:PDF (1.2MB) >>Buy this Article

pp.315-323  PAPER-VLSI Design Technology and CAD
A Low-Cost Continuous-Flow Parallel Memory-Based FFT Processor for UWB Applications
Chin-Long WEY  Shin-Yo LIN  Hsu-Sheng WANG  Hung-Lieh CHEN  Chun-Ming HUANG  
Summary | Full Text:PDF (1.2MB) >>Buy this Article

pp.324-331  PAPER-VLSI Design Technology and CAD
VLSI Implementation of a Scalable Pipeline MMSE MIMO Detector for a 44 MIMO-OFDM Receiver
Shingo YOSHIZAWA  Hirokazu IKEUCHI  Yoshikazu MIYANAGA  
Summary | Full Text:PDF (1.6MB) >>Buy this Article

pp.332-341  PAPER-VLSI Design Technology and CAD
Low Power Bus Binding Exploiting Optimal Substructure
Ji-Hyung KIM  Jun-Dong CHO  
Summary | Full Text:PDF (881.2KB) >>Buy this Article

pp.342-351  PAPER-VLSI Design Technology and CAD
Memory Allocation for Window-Based Image Processing on Multiple Memory Modules with Simple Addressing Functions
Hasitha Muthumala WAIDYASOORIYA  Masanori HARIYAMA  Michitaka KAMEYAMA  
Summary | Full Text:PDF (2MB) >>Buy this Article

pp.352-361  PAPER-VLSI Design Technology and CAD
Design Methodology for Yield Enhancement of Switched-Capacitor Analog Integrated Circuits
Pei-Wen LUO  Jwu-E CHEN  Chin-Long WEY  
Summary | Full Text:PDF (6.5MB) >>Buy this Article

pp.362-366  PAPER-Cryptography and Information Security
Constructing Even-Variable Symmetric Boolean Functions with High Algebraic Immunity
Yuan LI  Hui WANG  Haibin KAN  
Summary | Full Text:PDF (468.6KB) >>Buy this Article

pp.367-382  PAPER-Cryptography and Information Security
An Efficient Adaptive-Deniable-Concurrent Non-malleable Commitment Scheme
Seiko ARITA  
Summary | Full Text:PDF (2.5MB) >>Buy this Article

pp.383-391  PAPER-Cryptography and Information Security
Fast Verification of Hash Chains with Reduced Storage
Dae Hyun YUM  Jin Seok KIM  Pil Joong LEE  Sung Je HONG  
Summary | Full Text:PDF (1.1MB) >>Buy this Article

pp.392-404  PAPER-Cryptography and Information Security
Sequential Bitwise Sanitizable Signature Schemes
Goichiro HANAOKA  Shoichi HIROSE  Atsuko MIYAJI  Kunihiko MIYAZAKI  Bagus SANTOSO  Peng YANG  
Summary | Full Text:PDF (645.5KB) >>Buy this Article

pp.405-409  PAPER-Mobile Information Network and Personal Communications
Analysis of Fine Frequency Synchronization for OFDM in Time-Varying Channels
Hyun YANG  Young-Hwan YOU  
Summary | Full Text:PDF (451.3KB) >>Buy this Article

pp.410-419  PAPER-Intelligent Transport System
Mobile Terminal Substitution of Vehicular Collision Avoidance Support System (VCASS) for Non-VCASS Vehicles: S-VCASS
Tomotaka WADA  Shinji NAKAI  Tetsuya MARUOKA  Haokun WANG  Hiromi OKADA  
Summary | Full Text:PDF (5.6MB) >>Buy this Article

pp.420-423  LETTER-Digital Signal Processing
A General Construction of ZCZ Sequence Set with Large Family Size and Long Period
Xuan ZHANG  Qiaoyan WEN  Jie ZHANG  
Summary | Full Text:PDF (95.5KB) >>Buy this Article

pp.424-429  LETTER-Systems and Control
A Complete Solution to a Simple Case of Dynamic Observer Error Linearization: New Approach to Observer Error Linearization
Jongwook YANG  Juhoon BACK  Jin H. SEO  
Summary | Full Text:PDF (122.6KB) >>Buy this Article

pp.430-433  LETTER-Nonlinear Problems
Growing Particle Swarm Optimizers for Multi-Objective Problems in Design of DC-AC Inverters
Katsuma ONO  Kenya JIN'NO  Toshimichi SAITO  
Summary | Full Text:PDF (1.4MB) >>Buy this Article

pp.434-439  LETTER-VLSI Design Technology and CAD
A Neuro Fuzzy Solution in the Design of Analog Circuits
Pedro MIRANDA-ROMAGNOLI  Norberto HERNANDEZ-ROMERO  Juan C. SECK-TUOH-MORA  
Summary | Full Text:PDF (4.9MB) >>Buy this Article

pp.440-442  LETTER-Graphs and Networks
A Two-Stage Spatiotemporal Approach for Mining Traffic Flows across Multiple Networks
Weisong HE  Guangmin HU  Yingjie ZHOU  Haiyan JIN  
Summary | Full Text:PDF (199KB) >>Buy this Article

pp.443-447  LETTER-Cryptography and Information Security
On Generalized Cyclotomic Sequence of Order d and Period pq
Zheng YANG  Pinhui KE  
Summary | Full Text:PDF (93.3KB) >>Buy this Article

pp.448-451  LETTER-Image
Improved Global Motion Estimation Based on Iterative Least-Squares with Adaptive Variable Block Size
Leiqi ZHU  Dongkai YANG  Qishan ZHANG  
Summary | Full Text:PDF (1.4MB) >>Buy this Article

pp.452-456  LETTER-Image
Spatially Adaptive Noise Removal Algorithm Using Local Statistics
Tuan-Anh NGUYEN  Won-Seon SONG  Min-Cheol HONG  
Summary | Full Text:PDF (617KB) >>Buy this Article

pp.457-460  LETTER-Image
Graph-Spectral Filter for Removing Mixture of Gaussian and Random Impulsive Noise
Yu QIU  Zenggang DU  Kiichi URAHAMA  
Summary | Full Text:PDF (1.2MB) >>Buy this Article

pp.461-463  LETTER-Measurement Technology
A Dynamic Phasor-Based Method for Measuring the Apparent Impedance of a Single-Line-to-Ground Fault
Chi-Shan YU  
Summary | Full Text:PDF (288.6KB) >>Buy this Article

pp.464-467  LETTER-General Fundamentals and Boundaries
Integrating Algorithms for Integrable Affine Constraints
Tatsuya KAI  
Summary | Full Text:PDF (94.4KB) >>Buy this Article

Previous | 
Next
go to Page Top