IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences

Archive Index

Online ISSN : 1745-1337
Volume E95-A No.1  (Publication Date:2012/01/01)
Previous | 
Next
Special Section on Cryptography and Information Security

pp.1-1  FOREWORD
FOREWORD
Naoya TORII  
Summary | Full Text:PDF (98.4KB) >>Buy this Article

pp.2-7  PAPER-Symmetric Cryptography
Some Saturation Characteristics of XOR Sum of Balance Functions
Yasutaka IGARASHI  Toshinobu KANEKO  
Summary | Full Text:PDF (480.3KB) >>Buy this Article

pp.8-20  PAPER-Symmetric Cryptography
Further More on Key Wrapping
Yasushi OSAKI  Tetsu IWATA  
Summary | Full Text:PDF (405.2KB) >>Buy this Article

pp.21-28  PAPER-Symmetric Cryptography
Known-Key Attacks on Rijndael with Large Blocks and Strengthening ShiftRow Parameter
Yu SASAKI  
Summary | Full Text:PDF (625.6KB) >>Buy this Article

pp.29-39  PAPER-Public Key Cryptography
Strongly Secure Authenticated Key Exchange without NAXOS' Approach under Computational Diffie-Hellman Assumption
Minkyu KIM  Atsushi FUJIOKA  Berkant USTAOLU  
Summary | Full Text:PDF (358.4KB) >>Buy this Article

pp.40-56  PAPER-Public Key Cryptography
Strongly Secure Predicate-Based Authenticated Key Exchange: Definition and Constructions
Atsushi FUJIOKA  Koutarou SUZUKI  Kazuki YONEYAMA  
Summary | Full Text:PDF (493.3KB) >>Buy this Article

pp.57-69  PAPER-Public Key Cryptography
Security of Sequential Multiple Encryption
Atsushi FUJIOKA  Yoshiaki OKAMOTO  Taiichi SAITO  
Summary | Full Text:PDF (413.9KB) >>Buy this Article

pp.70-88  PAPER-Public Key Cryptography
Identity-Based Proxy Cryptosystems with Revocability and Hierarchical Confidentialities
Lihua WANG  Licheng WANG  Masahiro MAMBO  Eiji OKAMOTO  
Summary | Full Text:PDF (901.5KB) >>Buy this Article

pp.89-99  PAPER-Hash Function
An AES Based 256-bit Hash Function for Lightweight Applications: Lesamnta-LW
Shoichi HIROSE  Kota IDEGUCHI  Hidenori KUWAKADO  Toru OWADA  Bart PRENEEL  Hirotaka YOSHIDA  
Summary | Full Text:PDF (649.5KB) >>Buy this Article

pp.100-110  PAPER-Hash Function
Meet-in-the-Middle (Second) Preimage Attacks on Two Double-Branch Hash Functions RIPEMD and RIPEMD-128
Lei WANG  Yu SASAKI  Wataru KOMATSUBARA  Kazuo SAKIYAMA  Kazuo OHTA  
Summary | Full Text:PDF (1.5MB) >>Buy this Article

pp.111-124  PAPER-Hash Function
Preimage Attacks against PKC98-Hash and HAS-V
Yu SASAKI  Florian MENDEL  Kazumaro AOKI  
Summary | Full Text:PDF (677.5KB) >>Buy this Article

pp.125-137  PAPER-Authentication
Anonymous Credential with Attributes Certification after Registration
Isamu TERANISHI  Jun FURUKAWA  
Summary | Full Text:PDF (320.1KB) >>Buy this Article

pp.138-150  PAPER-Authentication
Undeniable and Unpretendable Signatures
Le Trieu PHONG  Kaoru KUROSAWA  Wakaha OGATA  
Summary | Full Text:PDF (406.7KB) >>Buy this Article

pp.151-166  PAPER-Authentication
Sub-Linear Size Traceable Ring Signatures without Random Oracles
Eiichiro FUJISAKI  
Summary | Full Text:PDF (339.3KB) >>Buy this Article

pp.167-175  PAPER-Secure Protocol
An Efficient Non-interactive Universally Composable String-Commitment Scheme
Ryo NISHIMAKI  Eiichiro FUJISAKI  Keisuke TANAKA  
Summary | Full Text:PDF (347.8KB) >>Buy this Article

pp.176-184  PAPER-Secure Protocol
A Multi-Trapdoor Commitment Scheme from the RSA Assumption
Ryo NISHIMAKI  Eiichiro FUJISAKI  Keisuke TANAKA  
Summary | Full Text:PDF (333.1KB) >>Buy this Article

pp.185-195  PAPER-Formal Approach
Indifferentiable Security Reconsidered: Role of Scheduling
Kazuki YONEYAMA  
Summary | Full Text:PDF (1.3MB) >>Buy this Article

pp.196-203  PAPER-Mathematics
A Note on the Pairing Computation Using Normalized Miller Functions
Naoki OGURA  Shigenori UCHIYAMA  Naoki KANAYAMA  Eiji OKAMOTO  
Summary | Full Text:PDF (357.1KB) >>Buy this Article

pp.204-212  PAPER-Mathematics
Solving a 676-Bit Discrete Logarithm Problem in GF(36n)
Takuya HAYASHI  Naoyuki SHINOHARA  Lihua WANG  Shin'ichiro MATSUO  Masaaki SHIRASE  Tsuyoshi TAKAGI  
Summary | Full Text:PDF (594.5KB) >>Buy this Article

pp.213-222  PAPER-Software Protection
Software Protection Combined with Tamper-Proof Device
Kazuhide FUKUSHIMA  Shinsaku KIYOMOTO  Yutaka MIYAKE  
Summary | Full Text:PDF (615.6KB) >>Buy this Article

pp.223-233  PAPER-Implementation
Glitch PUF: Extracting Information from Usually Unwanted Glitches
Koichi SHIMIZU  Daisuke SUZUKI  Tomomi KASUYA  
Summary | Full Text:PDF (2.1MB) >>Buy this Article

pp.234-241  PAPER-Implementation
Toward Effective Countermeasures against an Improved Fault Sensitivity Analysis
Yang LI  Kazuo OHTA  Kazuo SAKIYAMA  
Summary | Full Text:PDF (558.1KB) >>Buy this Article

pp.242-251  PAPER-Implementation
Differential Fault Analysis on Stream Cipher MUGI
Junko TAKAHASHI  Toshinori FUKUNAGA  Kazuo SAKIYAMA  
Summary | Full Text:PDF (788.8KB) >>Buy this Article

pp.252-255  LETTER
Collision Resistance of Hash Functions in a Weak Ideal Cipher Model
Shoichi HIROSE  Hidenori KUWAKADO  
Summary | Full Text:PDF (98.2KB) >>Buy this Article

pp.256-258  LETTER
Security Flaw of an Improved User Authentication Scheme with User Anonymity for Wireless Communications
Hu XIONG  Xiaofeng WANG  Fagen LI  
Summary | Full Text:PDF (63.3KB) >>Buy this Article

pp.259-262  LETTER
Cryptanalysis of Strong Designated Verifier Signature Scheme with Non-delegatability and Non-transferability
Mingwu ZHANG  Tsuyoshi TAKAGI  Bo YANG  Fagen LI  
Summary | Full Text:PDF (86.2KB) >>Buy this Article

pp.263-266  LETTER
A Configurable On-Chip Glitchy-Clock Generator for Fault Injection Experiments
Sho ENDO  Takeshi SUGAWARA  Naofumi HOMMA  Takafumi AOKI  Akashi SATOH  
Summary | Full Text:PDF (1.6MB) >>Buy this Article

pp.267-269  LETTER
On Algebraic Property of T-Functions
Ruilin LI  Bing SUN  Chao LI  Shaojing FU  
Summary | Full Text:PDF (83KB) >>Buy this Article

Special Section on Intelligent Transport Systems

pp.270-270  FOREWORD
FOREWORD
Makoto ITAMI  Hiromasa HABUCHI  
Summary | Full Text:PDF (146.4KB) >>Buy this Article

pp.271-277  INVITED PAPER
A Proposal for Next Generation ITS Wireless Communications System in EV Generation
Kiyohito TOKUDA  
Summary | Full Text:PDF (1.9MB) >>Buy this Article

pp.278-285  PAPER-ITS
An Adaptive Handoff Triggering Mechanism for Vehicular Networks
Luobei KUANG  Zhijun WANG  Ming XU  Yingwen CHEN  
Summary | Full Text:PDF (1.1MB) >>Buy this Article

pp.286-295  PAPER-ITS
Reduction Processing of the Position Estimation Error Using Transmitted Directivity Information
Hiroyuki HATANO  Tomoharu MIZUTANI  Yoshihiko KUWAHARA  
Summary | Full Text:PDF (1.7MB) >>Buy this Article

pp.296-304  PAPER-ITS
Precise Segmentation and Estimation of Pedestrian Trajectory Using On-Board Monocular Cameras
HyungKwan KIM  Yuuki SHIBAYAMA  Shunsuke KAMIJO  
Summary | Full Text:PDF (5.4MB) >>Buy this Article

pp.305-312  PAPER-ITS
MS Location Estimation with Genetic Algorithm
Chien-Sheng CHEN  Jium-Ming LIN  Wen-Hsiung LIU  Ching-Lung CHI  
Summary | Full Text:PDF (1MB) >>Buy this Article

pp.313-316  LETTER-ITS
A Novel Fast Mobile IPv6 Handover Scheme Using Dual Bands in Road-to-Vehicle Communications
Tomotaka WADA  Hiroyuki TAKAHASHI  Kouichi MUTSUURA  Hiromi OKADA  
Summary | Full Text:PDF (977.1KB) >>Buy this Article

pp.317-321  LETTER-ITS
Target Position Estimation Algorithm under Corrupted Measurement Data for Radar Network Systems
Hiroyuki HATANO  Tomoharu MIZUTANI  Kazuya SUGIYAMA  Yoshihiko KUWAHARA  
Summary | Full Text:PDF (552.1KB) >>Buy this Article

Regular Section

pp.322-329  PAPER-Digital Signal Processing
Sampling and Reconstruction of Periodic Piecewise Polynomials Using Sinc Kernel
Akira HIRABAYASHI  
Summary | Full Text:PDF (730.4KB) >>Buy this Article

pp.330-337  PAPER-Digital Signal Processing
An Iterative MAP Approach to Blind Estimation of SIMO FIR Channels
Koji HARADA  Hideaki SAKAI  
Summary | Full Text:PDF (843.2KB) >>Buy this Article

pp.338-345  PAPER-Circuit Theory
A Basic Fuzzy-Estimation Theory for Available Operation of Extremely Complicated Large-Scale Network Systems
Kazuo HORIUCHI  
Summary | Full Text:PDF (378.3KB) >>Buy this Article

pp.346-353  PAPER-Algorithms and Data Structures
Narrow Fingerprint Sensor Verification with Template Updating Technique
SangWoo SIN  Ru ZHOU  Dongju LI  Tsuyoshi ISSHIKI  Hiroaki KUNIEDA  
Summary | Full Text:PDF (2MB) >>Buy this Article

pp.354-361  PAPER-Algorithms and Data Structures
A Fast On-Line Algorithm for the Longest Common Subsequence Problem with Constant Alphabet
Yoshifumi SAKAI  
Summary | Full Text:PDF (290.7KB) >>Buy this Article

pp.362-366  PAPER-Algorithms and Data Structures
Indexed Swap Matching for Short Patterns
Hua ZHAO  Songfeng LU  
Summary | Full Text:PDF (242.6KB) >>Buy this Article

pp.367-371  PAPER-Cryptography and Information Security
On the 2-Adic Complexity of Periodic Binary Sequences
Lu ZHAO  Qiao-yan WEN  Jie ZHANG  Zheng-ping JIN  
Summary | Full Text:PDF (903.1KB) >>Buy this Article

pp.372-380  PAPER-Cryptography and Information Security
Preimage and Second-Preimage Attacks on PGV Hashing Modes of Round-Reduced ARIA, Camellia, and Serpent
Deukjo HONG  Bonwook KOO  Dong-Chan KIM  
Summary | Full Text:PDF (781.8KB) >>Buy this Article

pp.381-390  PAPER-Coding Theory
Analysis of Error Floors of Non-binary LDPC Codes over BEC
Takayuki NOZAKI  Kenta KASAI  Kohichi SAKANIWA  
Summary | Full Text:PDF (792.9KB) >>Buy this Article

pp.391-394  LETTER-Engineering Acoustics
Efficient Reconstruction of Speakerphone-Mode Cellular Phone Sound for Application to Sound Quality Assessment
Hee-Suk PANG  Jun-Seok LIM  Oh-Jin KWON  Sang Bae CHON  Mingu LEE  Jeong-Hun SEO  
Summary | Full Text:PDF (651.2KB) >>Buy this Article

pp.395-399  LETTER-Digital Signal Processing
Closed-Form Real Single-Tone Frequency Estimator Based on Phase Compensation of Multiple Correlation Lags
Yan CAO  Gang WEI  
Summary | Full Text:PDF (303.7KB) >>Buy this Article

pp.400-405  LETTER-Digital Signal Processing
Almost Perfect Sequences and Periodic Complementary Sequence Pairs over the 16-QAM Constellation
Fanxin ZENG  Xiaoping ZENG  Zhenyu ZHANG  Guixin XUAN  
Summary | Full Text:PDF (99.4KB) >>Buy this Article

pp.406-409  LETTER-Nonlinear Problems
A Discrete Particle Swarm Optimizer for Multi-Solution Problems
Masafumi KUBOTA  Toshimichi SAITO  
Summary | Full Text:PDF (362.4KB) >>Buy this Article

pp.410-413  LETTER-Cryptography and Information Security
Scalar Multiplication on Kummer Surface Revisited
Qiping LIN  Fangguo ZHANG  
Summary | Full Text:PDF (85.8KB) >>Buy this Article

pp.414-416  LETTER-Cryptography and Information Security
Key Substitution Attacks on the CFS Signature
Bennian DOU  Chun-Hua CHEN  Hong ZHANG  
Summary | Full Text:PDF (70.9KB) >>Buy this Article

pp.417-420  LETTER-Cryptography and Information Security
A Class of 1-Resilient Functions in Odd Variables with High Nonlinearity and Suboptimal Algebraic Immunity
Yusong DU  Fangguo ZHANG  
Summary | Full Text:PDF (84.7KB) >>Buy this Article

pp.421-424  LETTER-Coding Theory
Efficient Address Generation for Permutation Polynomial Based Interleavers over Integer Rings
Jonghoon RYU  
Summary | Full Text:PDF (124.3KB) >>Buy this Article

Previous | 
Next
go to Page Top