IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences

Archive Index

Online ISSN : 1745-1337
Volume E94-A No.6  (Publication Date:2011/06/01)
Previous | 
Next
Special Section on Discrete Mathematics and Its Applications

pp.1221-1221  FOREWORD
FOREWORD
Eiji MIYANO  
Summary | Full Text:PDF (92KB) >>Buy this Article

pp.1222-1229  PAPER
Real-Time Freight Train Driver Rescheduling during Disruption
Keisuke SATO  Naoto FUKUMURA  
Summary | Full Text:PDF (610.8KB) >>Buy this Article

pp.1230-1237  PAPER
A Note on the Linear Programming Decoding of Binary Linear Codes for Multiple-Access Channel
Shunsuke HORII  Toshiyasu MATSUSHIMA  Shigeichi HIRASAWA  
Summary | Full Text:PDF (437.8KB) >>Buy this Article

pp.1238-1241  PAPER
Deciding Shellability of Simplicial Complexes with h-Assignments
Sonoko MORIYAMA  
Summary | Full Text:PDF (144.9KB) >>Buy this Article

pp.1242-1246  PAPER
On Partitioning Colored Points
Takahisa TODA  
Summary | Full Text:PDF (175.5KB) >>Buy this Article

pp.1247-1256  PAPER
Spectral Analysis of Random Sparse Matrices
Tomonori ANDO  Yoshiyuki KABASHIMA  Hisanao TAKAHASHI  Osamu WATANABE  Masaki YAMAMOTO  
Summary | Full Text:PDF (481KB) >>Buy this Article

pp.1257-1262  PAPER
Algorithms to Solve Massively Under-Defined Systems of Multivariate Quadratic Equations
Yasufumi HASHIMOTO  
Summary | Full Text:PDF (188.8KB) >>Buy this Article

pp.1263-1273  PAPER
Universally Composable NBAC-Based Fair Voucher Exchange for Mobile Environments
Kazuki YONEYAMA  Masayuki TERADA  Sadayuki HONGO  Kazuo OHTA  
Summary | Full Text:PDF (419.5KB) >>Buy this Article

pp.1274-1284  PAPER
Solving Generalized Small Inverse Problems
Noboru KUNIHIRO  
Summary | Full Text:PDF (231.2KB) >>Buy this Article

pp.1285-1292  PAPER
Scalar Multiplication on Pairing Friendly Elliptic Curves
Naoki KANAYAMA  Tadanori TERUYA  Eiji OKAMOTO  
Summary | Full Text:PDF (323.1KB) >>Buy this Article

pp.1293-1305  PAPER
How to Shorten a Ciphertext of Reproducible Key Encapsulation Mechanisms in the Random Oracle Model
Yusuke SAKAI  Goichiro HANAOKA  Kaoru KUROSAWA  Kazuo OHTA  
Summary | Full Text:PDF (435.6KB) >>Buy this Article

pp.1306-1317  PAPER
Hierarchical ID-Based Authenticated Key Exchange Resilient to Ephemeral Key Leakage
Atsushi FUJIOKA  Koutarou SUZUKI  Kazuki YONEYAMA  
Summary | Full Text:PDF (406.2KB) >>Buy this Article

pp.1318-1327  PAPER
Mixed Bases for Efficient Inversion in F((22)2)2 and Conversion Matrices of SubBytes of AES
Yasuyuki NOGAMI  Kenta NEKADO  Tetsumi TOYOTA  Naoto HONGO  Yoshitaka MORIKAWA  
Summary | Full Text:PDF (771KB) >>Buy this Article

pp.1328-1337  PAPER
Secure Broadcast System with Simultaneous Individual Messaging
Arisa FUJII  Go OHTAKE  Goichiro HANAOKA  Nuttapong ATTRAPADUNG  Hajime WATANABE  Kazuto OGAWA  Hideki IMAI  
Summary | Full Text:PDF (729.8KB) >>Buy this Article

pp.1338-1345  PAPER
A Simple and Efficient Secret Sharing Scheme Secure against Cheating
Toshinori ARAKI  Wakaha OGATA  
Summary | Full Text:PDF (262.7KB) >>Buy this Article

pp.1346-1355  PAPER
A Secure Structured Multisignature Scheme Based on a Non-commutative Ring Homomorphism
Naoto YANAI  Eikoh CHIDA  Masahiro MAMBO  
Summary | Full Text:PDF (366.7KB) >>Buy this Article

pp.1356-1367  PAPER
An Improvement of Twisted Ate Pairing Efficient for Multi-Pairing and Thread Computing
Yumi SAKEMI  Yasuyuki NOGAMI  Shoichi TAKEUCHI  Yoshitaka MORIKAWA  
Summary | Full Text:PDF (414.9KB) >>Buy this Article

pp.1368-1374  PAPER
New Concrete Relation between Trace, Definition Field, and Embedding Degree
Shoujiro HIRASAWA  Atsuko MIYAJI  
Summary | Full Text:PDF (237.3KB) >>Buy this Article

pp.1375-1380  LETTER
A Novel Realization of Threshold Schemes over Binary Field Extensions
Jun KURIHARA  Tomohiko UYEMATSU  
Summary | Full Text:PDF (275.4KB) >>Buy this Article

pp.1381-1385  LETTER
An Algorithm for Minimum Feedback Vertex Set Problem on a Trapezoid Graph
Hirotoshi HONMA  Yutaro KITAMURA  Shigeru MASUYAMA  
Summary | Full Text:PDF (168.3KB) >>Buy this Article

Regular Section

pp.1386-1393  PAPER-Digital Signal Processing
A Linear Optimization of Dual-Tree Complex Wavelet Transform
Seisuke KYOCHI  Takafumi SHIMIZU  Masaaki IKEHARA  
Summary | Full Text:PDF (958.9KB) >>Buy this Article

pp.1394-1400  PAPER-Digital Signal Processing
A New Formalism of the Sliding Window Recursive Least Squares Algorithm and Its Fast Version
Kiyoshi NISHIYAMA  
Summary | Full Text:PDF (488KB) >>Buy this Article

pp.1401-1407  PAPER-Digital Signal Processing
Parameterization of Perfect Sequences of Real Numbers
Takao MAEDA  Takafumi HAYASHI  
Summary | Full Text:PDF (328.7KB) >>Buy this Article

pp.1408-1416  PAPER-Nonlinear Problems
Design of Maximum Length Pseudochaotic Sequences Derived from Discretized 1-D Chaotic Maps and Their Autocorrelation Properties
Daisaburo YOSHIOKA  Akio TSUNEDA  
Summary | Full Text:PDF (479.6KB) >>Buy this Article

pp.1417-1425  PAPER-Numerical Analysis and Optimization
A New Framework with FDPP-LX Crossover for Real-Coded Genetic Algorithm
Zhi-Qiang CHEN  Rong-Long WANG  
Summary | Full Text:PDF (563.6KB) >>Buy this Article

pp.1426-1433  PAPER-Cryptography and Information Security
Further Improved Remote User Authentication Scheme
Jung-Yoon KIM  Hyoung-Kee CHOI  John A. COPELAND  
Summary | Full Text:PDF (439.9KB) >>Buy this Article

pp.1434-1440  PAPER-Cryptography and Information Security
Annihilators and Algebraic Immunity of Symmetric Boolean Functions
Jie PENG  Haibin KAN  
Summary | Full Text:PDF (283.7KB) >>Buy this Article

pp.1441-1448  PAPER-Coding Theory
Structured LDPC Codes to Reduce Pseudo Cycles for Turbo Equalization in Perpendicular Magnetic Recording
Pornchai SUPNITHI  Watid PHAKPHISUT  Wicharn SINGHAUDOM  
Summary | Full Text:PDF (563.6KB) >>Buy this Article

pp.1449-1457  PAPER-Coding Theory
Performance Improvement of Multi-Stage Threshold Decoding with Difference Register
Muhammad Ahsan ULLAH  Haruo OGIWARA  
Summary | Full Text:PDF (653.8KB) >>Buy this Article

pp.1458-1463  PAPER-Computer Graphics
An Efficient Algorithm for Generating Slanted Ellipse Using Simultaneous Recurrences
Munetoshi NUMADA  Hiroyasu KOSHIMIZU  Yasuyo HATANO  Takayuki FUJIWARA  Takuma FUNAHASHI  
Summary | Full Text:PDF (754KB) >>Buy this Article

pp.1464-1467  LETTER-Systems and Control
Control of a Chain of Integrators with a Delay in the Input under Measurement Feedback
Jae-Seung YOUN  Hyun-Do KIM  Ho-Lim CHOI  
Summary | Full Text:PDF (243.5KB) >>Buy this Article

pp.1468-1472  LETTER-Nonlinear Problems
Transformation and Chained Structure for a Class of Nonlinear Affine Control Systems
Tatsuya KAI  
Summary | Full Text:PDF (229.2KB) >>Buy this Article

pp.1473-1475  LETTER-Cryptography and Information Security
A Simplifying Method of Fault Attacks on Pairing Computations
JeaHoon PARK  GyoYong SOHN  SangJae MOON  
Summary | Full Text:PDF (566.1KB) >>Buy this Article

Previous | 
Next
go to Page Top