IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences

Archive Index

Online ISSN : 1745-1337
Volume E96-A No.1  (Publication Date:2013/01/01)
Previous | 
Next
Special Section on Cryptography and Information Security

pp.1-1  FOREWORD
FOREWORD
Tsutomu MATSUMOTO  
Summary | Full Text:PDF (229.7KB) >>Buy this Article

pp.2-14  PAPER-Symmetric Key Cryptography
Improving the Permutation Layer of Type 1, Type 3, Source-Heavy, and Target-Heavy Generalized Feistel Structures
Shingo YANAGIHARA  Tetsu IWATA  
Summary | Full Text:PDF (567.5KB) >>Buy this Article

pp.15-24  PAPER-Symmetric Key Cryptography
On the Construction of Boolean Functions with Optimal Algebraic Immunity Based on Factorization of Numbers of Variables
Huajin CHEN  Wenfeng Qi  Chuangui MA  
Summary | Full Text:PDF (335.7KB) >>Buy this Article

pp.25-34  PAPER-Symmetric Key Cryptography
Security of Hash-then-CBC Key Wrapping Revisited
Yasushi OSAKI  Tetsu IWATA  
Summary | Full Text:PDF (307.8KB) >>Buy this Article

pp.35-41  PAPER-Symmetric Key Cryptography
Cryptanalysis of INCrypt32 in HID's iCLASS Systems
ChangKyun KIM  Eun-Gu JUNG  Dong Hoon LEE  Chang-Ho JUNG  Daewan HAN  
Summary | Full Text:PDF (1.4MB) >>Buy this Article

pp.42-52  PAPER-Public Key Based Protocols
Efficient (Hierarchical) Inner-Product Encryption Tightly Reduced from the Decisional Linear Assumption
Tatsuaki OKAMOTO  Katsuyuki TAKASHIMA  
Summary | Full Text:PDF (310.4KB) >>Buy this Article

pp.53-67  PAPER-Public Key Based Protocols
Ciphertext-Policy Delegatable Hidden Vector Encryption and Its Application
Mitsuhiro HATTORI  Takato HIRANO  Takashi ITO  Nori MATSUDA  Takumi MORI  Yusuke SAKAI  Kazuo OHTA  
Summary | Full Text:PDF (1.2MB) >>Buy this Article

pp.68-75  PAPER-Public Key Based Protocols
Efficient Secure Auction Protocols Based on the Boneh-Goh-Nissim Encryption
Takuho MITSUNAGA  Yoshifumi MANABE  Tatsuaki OKAMOTO  
Summary | Full Text:PDF (673.5KB) >>Buy this Article

pp.76-91  PAPER-Public Key Based Protocols
Generic Construction of Strongly Secure Timed-Release Public-Key Encryption
Atsushi FUJIOKA  Yoshiaki OKAMOTO  Taiichi SAITO  
Summary | Full Text:PDF (345.6KB) >>Buy this Article

pp.92-100  PAPER-Public Key Based Protocols
Message Recovery Signature Schemes from Sigma-Protocols
Masayuki ABE  Tatsuaki OKAMOTO  Koutarou SUZUKI  
Summary | Full Text:PDF (328.4KB) >>Buy this Article

pp.101-110  PAPER-Public Key Based Protocols
Modeling Leakage of Ephemeral Secrets in Tripartite/Group Key Exchange
Mark MANULIS  Koutarou SUZUKI  Berkant USTAOGLU  
Summary | Full Text:PDF (461.1KB) >>Buy this Article

pp.111-120  PAPER-Public Key Based Protocols
Scalable Privacy-Preserving Data Mining with Asynchronously Partitioned Datasets
Hiroaki KIKUCHI  Daisuke KAGAWA  Anirban BASU  Kazuhiko ISHII  Masayuki TERADA  Sadayuki HONGO  
Summary | Full Text:PDF (1.4MB) >>Buy this Article

pp.121-130  PAPER-Hash Functions
Meet-in-the-Middle Preimage Attacks on AES Hashing Modes and an Application to Whirlpool
Yu SASAKI  
Summary | Full Text:PDF (1.1MB) >>Buy this Article

pp.131-140  PAPER-Hash Functions
Boomerang Distinguishers on MD4-Based Hash Functions: First Practical Results on Full 5-Pass HAVAL Compression Function
Yu SASAKI  
Summary | Full Text:PDF (476.7KB) >>Buy this Article

pp.141-149  PAPER-Hash Functions
Open-Key Distinguishers for the Internal Block Cipher of Tweaked Lesamnta
Yu SASAKI  Kazumaro AOKI  
Summary | Full Text:PDF (467.5KB) >>Buy this Article

pp.150-157  PAPER-Foundations
Random Sampling Reduction with Precomputation
Masayuki YOSHINO  Noboru KUNIHIRO  
Summary | Full Text:PDF (734.4KB) >>Buy this Article

pp.158-165  PAPER-Foundations
Computing a Sequence of 2-Isogenies on Supersingular Elliptic Curves
Reo YOSHIDA  Katsuyuki TAKASHIMA  
Summary | Full Text:PDF (268KB) >>Buy this Article

pp.166-170  PAPER-Foundations
Multiparty Simultaneous Quantum Identity Authentication Secure against Fake Signal Attacks
Atsushi WASEDA  
Summary | Full Text:PDF (353.4KB) >>Buy this Article

pp.171-176  PAPER-Foundations
On Constant-Weight Multi-Valued Sequences from Cyclic Difference Sets
Takayasu KAIDA  Junru ZHENG  
Summary | Full Text:PDF (515.6KB) >>Buy this Article

pp.177-184  PAPER-Implementation
A New Type of Fault-Based Attack: Fault Behavior Analysis
Yang LI  Kazuo OHTA  Kazuo SAKIYAMA  
Summary | Full Text:PDF (1.2MB) >>Buy this Article

pp.185-195  PAPER-Implementation
Correlated Noise Reduction for Electromagnetic Analysis
Hongying LIU  Xin JIN  Yukiyasu TSUNOO  Satoshi GOTO  
Summary | Full Text:PDF (2.9MB) >>Buy this Article

pp.196-205  PAPER-Implementation
General Fault Attacks on Multivariate Public Key Cryptosystems
Yasufumi HASHIMOTO  Tsuyoshi TAKAGI  Kouichi SAKURAI  
Summary | Full Text:PDF (359.9KB) >>Buy this Article

pp.206-214  PAPER-Implementation
Efficient Implementation of NTRU Cryptosystem Using Sliding Window Methods
Mun-Kyu LEE  Jung Woo KIM  Jeong Eun SONG  Kunsoo PARK  
Summary | Full Text:PDF (948.7KB) >>Buy this Article

pp.215-224  PAPER-System Security
Implementation of a Memory Disclosure Attack on Memory Deduplication of Virtual Machines
Kuniyasu SUZAKI  Kengo IIJIMA  Toshiki YAGI  Cyrille ARTHO  
Summary | Full Text:PDF (1.6MB) >>Buy this Article

pp.225-232  PAPER-System Security
Catching the Behavioral Differences between Multiple Executions for Malware Detection
Takahiro KASAMA  Katsunari YOSHIOKA  Daisuke INOUE  Tsutomu MATSUMOTO  
Summary | Full Text:PDF (1.6MB) >>Buy this Article

pp.233-236  LETTER
Provable Security against Cryptanalysis with Impossible Differentials
Kazumaro AOKI  
Summary | Full Text:PDF (78.1KB) >>Buy this Article

pp.237-241  LETTER
A Parallelizable PRF-Based MAC Algorithm: Well beyond the Birthday Bound
Kan YASUDA  
Summary | Full Text:PDF (171.1KB) >>Buy this Article

pp.242-243  LETTER
Rogue Key Attacks on Lu et al.'s Verifiably Encrypted Signature Scheme
Bennian DOU  Hong ZHANG  Chun-Hua CHEN  Chungen XU  
Summary | Full Text:PDF (68.4KB) >>Buy this Article

pp.244-245  LETTER
Key Substitution Attacks on Multisignature Schemes
Bennian DOU  Hong ZHANG  Chun-Hua CHEN  Chungen XU  
Summary | Full Text:PDF (64.7KB) >>Buy this Article

Special Section on Wideband Systems

pp.246-246  FOREWORD
FOREWORD
Makoto ITAMI  
Summary | Full Text:PDF (143.8KB) >>Buy this Article

pp.247-254  INVITED PAPER
Software Radio-Based Distributed Multi-User MIMO Testbed: Towards Green Wireless Communications
Hidekazu MURATA  Susumu YOSHIDA  Koji YAMAMOTO  Daisuke UMEHARA  Satoshi DENNO  Masahiro MORIKURA  
Summary | Full Text:PDF (2.8MB) >>Buy this Article

pp.255-263  PAPER
Performance Analysis of Coded-Sequence Self-Encoded Spread Spectrum over Rayleigh Fading Channel
Poomathi DURAISAMY  Lim NGUYEN  
Summary | Full Text:PDF (1.1MB) >>Buy this Article

pp.264-273  PAPER
Primary Signal to Noise Ratio Estimation Based on AIC for UWB Systems
Masahiro FUJII  Yu WATANABE  
Summary | Full Text:PDF (1.4MB) >>Buy this Article

pp.274-284  PAPER
Examination of Effective UWB Avoidance Based on Experiments for Coexistence with Other Wireless Systems
Huan-Bang LI  Kunio YATA  Kenichi TAKIZAWA  Noriaki MIYAZAKI  Takashi OKADA  Kohei OHNO  Takuji MOCHIZUKI  Eishin NAKAGAWA  Takehiko KOBAYASHI  
Summary | Full Text:PDF (4.4MB) >>Buy this Article

pp.285-292  PAPER
Detection Capability of Downlink Signals in Mobile WiMAX and 3GPP LTE with an FFT-Based UWB Receiver
Kenichi TAKIZAWA  Hirotaka YAMANE  Huan-Bang LI  Feng LU  Kohei OHNO  Takuji MOCHIZUKI  Takashi OKADA  Kunio YATA  Hisashi NISHIKAWA  Takehiko KOBAYASHI  
Summary | Full Text:PDF (2.8MB) >>Buy this Article

pp.293-295  LETTER
A Max-Min Approach to Channel Shortening in OFDM Systems
Tsukasa TAKAHASHI  Teruyuki MIYAJIMA  
Summary | Full Text:PDF (168.1KB) >>Buy this Article

pp.296-297  LETTER
Hybrid DCT/DST Precoding Scheme for the PAPR Reduction of OFDM Systems
Soobum CHO  Sang Kyu PARK  
Summary | Full Text:PDF (144.3KB) >>Buy this Article

Regular Section

pp.298-303  PAPER-Digital Signal Processing
Reliable Data Transmission for Resonant-Type Wireless Power Transfer
Shinpei NOGUCHI  Mamiko INAMORI  Yukitoshi SANADA  
Summary | Full Text:PDF (1.4MB) >>Buy this Article

pp.304-311  PAPER-Digital Signal Processing
Minimizing False Peak Errors in Generalized Cross-Correlation Time Delay Estimation Using Subsample Time Delay Estimation
SooHwan CHOI  DooSeop EOM  
Summary | Full Text:PDF (2MB) >>Buy this Article

pp.312-321  PAPER-VLSI Design Technology and CAD
A Thermal-Aware High-Level Synthesis Algorithm for RDR Architectures through Binding and Allocation
Kazushi KAWAMURA  Masao YANAGISAWA  Nozomu TOGAWA  
Summary | Full Text:PDF (1.5MB) >>Buy this Article

pp.322-331  PAPER-Algorithms and Data Structures
Fast Bit-Parallel Polynomial Basis Multiplier for GF(2m) Defined by Pentanomials Using Weakly Dual Basis
Sun-Mi PARK  Ku-Young CHANG  Dowon HONG  Changho SEO  
Summary | Full Text:PDF (942.3KB) >>Buy this Article

pp.332-339  PAPER-Cryptography and Information Security
Enhanced Side-Channel Cube Attacks on PRESENT
Xinjie ZHAO  Shize GUO  Fan ZHANG  Tao WANG  Zhijie SHI  Hao LUO  
Summary | Full Text:PDF (1.5MB) >>Buy this Article

pp.340-344  PAPER-Vision
Deterioration of Visibility of Scrolling Text Presented Nearby Image Moving in the Opposite Direction
Ken KIHARA  Marina SEKI  Sakuichi OHTSUKA  
Summary | Full Text:PDF (2.3MB) >>Buy this Article

pp.345-355  PAPER-Concurrent Systems
Computation of Sublanguages for Synthesizing Decentralized Supervisors for Timed Discrete Event Systems
Masashi NOMURA  Shigemasa TAKAI  
Summary | Full Text:PDF (1.3MB) >>Buy this Article

pp.356-359  LETTER-Circuit Theory
Reduced Reconfigurable Logic Circuit Design Based on Double Gate CNTFETs Using Ambipolar Binary Decision Diagram
Hiroshi NINOMIYA  Manabu KOBAYASHI  Shigeyoshi WATANABE  
Summary | Full Text:PDF (615.3KB) >>Buy this Article

pp.360-362  LETTER-Cryptography and Information Security
Generalized Construction of Boolean Function with Maximum Algebraic Immunity Using Univariate Polynomial Representation
Shaojing FU  Chao LI  Longjiang QU  
Summary | Full Text:PDF (82.9KB) >>Buy this Article

pp.363-366  LETTER-Cryptography and Information Security
Linear Complexity of Binary Whiteman Generalized Cyclotomic Sequences of Order 4
Xiaoping LI  Wenping MA  Tongjiang YAN  Xubo ZHAO  
Summary | Full Text:PDF (84.2KB) >>Buy this Article

pp.367-372  LETTER-Information Theory
Several Types of Sequences with Optimal Autocorrelation Properties
Fanxin ZENG  Xiaoping ZENG  Xiangyong ZENG  Zhenyu ZHANG  Guixin XUAN  
Summary | Full Text:PDF (110.7KB) >>Buy this Article

pp.373-376  LETTER-Coding Theory
Low Complexity Decoder Design for Non-binary LDPC Coded MIMO System Using Quasi-Orthogonal STBC
Yier YAN  Moon Ho LEE  
Summary | Full Text:PDF (255.8KB) >>Buy this Article

pp.377-382  LETTER-Coding Theory
Construction of Shift Distinct Sequence Sets with Zero or Low Correlation Zone
Xiaoyu CHEN  Chengqian XU  Yubo LI  Kai LIU  
Summary | Full Text:PDF (111.3KB) >>Buy this Article

pp.383-386  LETTER-Communication Theory and Signals
Channel Localization Mechanism for Wi-Fi Systems
Sungho HWANG  Kyungjun KIM  
Summary | Full Text:PDF (1MB) >>Buy this Article

pp.387-390  LETTER-Communication Theory and Signals
Channel Condition Number Based Switching Detection Scheme in MIMO-OFDM System
Jang-Kyun AHN  Seung-Jun YU  Hyoung-Kyu SONG  
Summary | Full Text:PDF (370.9KB) >>Buy this Article

pp.391-393  LETTER-Intelligent Transport System
Traffic Flow Simulator Using Virtual Controller Model
Haijun LIANG  Hongyu YANG  Bo YANG  
Summary | Full Text:PDF (368.2KB) >>Buy this Article

pp.394-397  LETTER-Image
Region Diversity Based Saliency Density Maximization for Salient Object Detection
Xin HE  Huiyun JING  Qi HAN  Xiamu NIU  
Summary | Full Text:PDF (658KB) >>Buy this Article

Previous | 
Next
go to Page Top