IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences

Archive Index

Online ISSN : 1745-1337
Volume E97-A No.1  (Publication Date:2014/01/01)
[Whole issue]:PDF (37.6MB)
Previous | 
Next
Special Section on Wideband Systems

pp.1-1  FOREWORD
FOREWORD
Shigenobu SASAKI  
Summary | Full Text:PDF (195.9KB) >>Buy this Article

pp.2-6  PAPER-Foundations
Single Symbol Decodable QO-STBC with Full Diversity
Naotoshi YODA  Chang-Jun AHN  Ken-ya HASHIMOTO  
Summary | Full Text:PDF (814.8KB) >>Buy this Article

pp.7-17  PAPER-Foundations
Improved Spectral Efficiency at Reduced Outage Probability for Cooperative Wireless Networks by Using CSI Directed Estimate and Forward Strategy
Yihenew Wondie MARYE  Chen LIU  Feng LU  Hua-An ZHAO  
Summary | Full Text:PDF (1.5MB) >>Buy this Article

pp.18-29  PAPER-Foundations
Performance of Star 16QAM Schemes Considering Cubic Metric for Uplink DFT-Precoded OFDMA
Teruo KAWAMURA  Yoshihisa KISHIYAMA  Mamoru SAWAHASHI  
Summary | Full Text:PDF (2.5MB) >>Buy this Article

pp.30-39  PAPER-Foundations
Investigation on Frequency Diversity Effects of Various Transmission Schemes Using Frequency Domain Equalizer for DFT-Precoded OFDMA
Lianjun DENG  Teruo KAWAMURA  Hidekazu TAOKA  Mamoru SAWAHASHI  
Summary | Full Text:PDF (2.6MB) >>Buy this Article

pp.40-48  PAPER-Foundations
Virtual Continuous CWmin Control Scheme of WLAN
Yuki SANGENYA  Fumihiro INOUE  Masahiro MORIKURA  Koji YAMAMOTO  Fusao NUNO  Takatoshi SUGIYAMA  
Summary | Full Text:PDF (1.4MB) >>Buy this Article

pp.49-56  PAPER-Foundations
Performance Analysis of MIMO/FSO Systems Using SC-QAM Signaling over Atmospheric Turbulence Channels
Trung HA DUYEN  Anh T. PHAM  
Summary | Full Text:PDF (1.4MB) >>Buy this Article

pp.57-68  PAPER-Resource Allocation
A Novel Low Computational Complexity Power Assignment Method for Non-orthogonal Multiple Access Systems
Anxin LI  Atsushi HARADA  Hidetoshi KAYAMA  
Summary | Full Text:PDF (4.3MB) >>Buy this Article

pp.69-77  PAPER-Resource Allocation
An Efficient Algorithm for Weighted Sum-Rate Maximization in Multicell OFDMA Downlink
Mirza Golam KIBRIA  Hidekazu MURATA  Susumu YOSHIDA  
Summary | Full Text:PDF (873.3KB) >>Buy this Article

pp.78-85  PAPER-Resource Allocation
Joint Resource Allocation Algorithm in Carrier Aggregation Enabled Future Wireless Networks
Zanjie HUANG  Yusheng JI  Hao ZHOU  Baohua ZHAO  
Summary | Full Text:PDF (1.5MB) >>Buy this Article

pp.86-93  PAPER-Implementation
135GHz 98mW 10Gbps CMOS Amplitude Shift Keying Transmitter and Receiver Chipset
Mizuki MOTOYOSHI  Naoko ONO  Kosuke KATAYAMA  Kyoya TAKANO  Minoru FUJISHIMA  
Summary | Full Text:PDF (3.4MB) >>Buy this Article

pp.94-100  PAPER-Implementation
Analyses and Modeling of Ultra-Wideband On-Body Propagation Channels Depending on Population Density within an Elevator Cabin
Miyuki HIROSE  Takehiko KOBAYASHI  
Summary | Full Text:PDF (2.4MB) >>Buy this Article

pp.101-108  PAPER-Implementation
9dB NF and +11dBm OIP3 CMOS Single Conversion Front-End for a Satellite Low-Noise Block Down-Converter
Takeshi MITSUNAKA  Yusuke KISHINO  Masafumi YAMANOUE  Kunihiko IIZUKA  Minoru FUJISHIMA  
Summary | Full Text:PDF (2.6MB) >>Buy this Article

pp.109-116  PAPER-Implementation
Indoor Experiments on 4-by-2 Multi-User MIMO and Carrier Aggregation Achieving Real-Time 1-Gbps Data Transmission in LTE-Advanced Downlink
Yuichi KAKISHIMA  Teruo KAWAMURA  Yoshihisa KISHIYAMA  Hidehiro ANDOH  
Summary | Full Text:PDF (2.2MB) >>Buy this Article

Special Section on Cryptography and Information Security

pp.117-117  FOREWORD
FOREWORD
Toshiaki TANAKA  
Summary | Full Text:PDF (249.3KB) >>Buy this Article

pp.118-126  PAPER-Symmetric Key Based Cryptography
A New Higher Order Differential of CLEFIA
Naoki SHIBAYAMA  Toshinobu KANEKO  
Summary | Full Text:PDF (873.2KB) >>Buy this Article

pp.127-138  PAPER-Symmetric Key Based Cryptography
Comprehensive Study of Integral Analysis on LBlock
Yu SASAKI  Lei WANG  
Summary | Full Text:PDF (1.6MB) >>Buy this Article

pp.139-151  PAPER-Symmetric Key Based Cryptography
Comprehensive Analysis of Initial Keystream Biases of RC4
Takanori ISOBE  Toshihiro OHIGASHI  Yuhei WATANABE  Masakatu MORII  
Summary | Full Text:PDF (1.3MB) >>Buy this Article

pp.152-156  PAPER-Symmetric Key Based Cryptography
A New Necessary Condition for Feedback Functions of de Bruijn Sequences
Zhongxiao WANG  Wenfeng QI  Huajin CHEN  
Summary | Full Text:PDF (498KB) >>Buy this Article

pp.157-166  PAPER-Symmetric Key Based Cryptography
Chosen-IV Correlation Power Analysis on KCipher-2 Hardware and a Masking-Based Countermeasure
Takafumi HIBIKI  Naofumi HOMMA  Yuto NAKANO  Kazuhide FUKUSHIMA  Shinsaku KIYOMOTO  Yutaka MIYAKE  Takafumi AOKI  
Summary | Full Text:PDF (6.7MB) >>Buy this Article

pp.167-176  PAPER-Symmetric Key Based Cryptography
Cryptanalyses on a Merkle-Damgård Based MAC — Almost Universal Forgery and Distinguishing-H Attacks
Yu SASAKI  
Summary | Full Text:PDF (1MB) >>Buy this Article

pp.177-190  PAPER-Symmetric Key Based Cryptography
Distinguishers on Double-Branch Compression Function and Applications to Round-Reduced RIPEMD-128 and RIPEMD-160
Yu SASAKI  Lei WANG  
Summary | Full Text:PDF (699.4KB) >>Buy this Article

pp.191-199  PAPER-Public Key Based Cryptography
Randomness Leakage in the KEM/DEM Framework
Hitoshi NAMIKI  Keisuke TANAKA  Kenji YASUNAGA  
Summary | Full Text:PDF (739.8KB) >>Buy this Article

pp.200-214  PAPER-Public Key Based Cryptography
The RSA Group Is Adaptive Pseudo-Free under the RSA Assumption
Masayuki FUKUMITSU  Shingo HASEGAWA  Shuji ISOBE  Hiroki SHIZUYA  
Summary | Full Text:PDF (606.3KB) >>Buy this Article

pp.215-224  PAPER-Public Key Based Cryptography
Relation between Verifiable Random Functions and Convertible Undeniable Signatures, and New Constructions
Kaoru KUROSAWA  Ryo NOJIMA  Le Trieu PHONG  
Summary | Full Text:PDF (655.2KB) >>Buy this Article

pp.225-235  PAPER-Public Key Based Cryptography
Relations among Notions of Privacy for RFID Authentication Protocols
Daisuke MORIYAMA  Shin'ichiro MATSUO  Miyako OHKUBO  
Summary | Full Text:PDF (688.9KB) >>Buy this Article

pp.236-244  PAPER-Foundations
Key Length Estimation of Pairing-Based Cryptosystems Using ηT Pairing over GF(3n)
Naoyuki SHINOHARA  Takeshi SHIMOYAMA  Takuya HAYASHI  Tsuyoshi TAKAGI  
Summary | Full Text:PDF (582.3KB) >>Buy this Article

pp.245-252  PAPER-Foundations
Security of Multivariate Signature Scheme Using Non-commutative Rings
Takanori YASUDA  Tsuyoshi TAKAGI  Kouichi SAKURAI  
Summary | Full Text:PDF (595.1KB) >>Buy this Article

pp.253-263  PAPER-Foundations
An Accurate Packer Identification Method Using Support Vector Machine
Ryoichi ISAWA  Tao BAN  Shanqing GUO  Daisuke INOUE  Koji NAKAO  
Summary | Full Text:PDF (1.4MB) >>Buy this Article

pp.264-274  PAPER-Hardware Based Security
Unified Coprocessor Architecture for Secure Key Storage and Challenge-Response Authentication
Koichi SHIMIZU  Daisuke SUZUKI  Toyohiro TSURUMARU  Takeshi SUGAWARA  Mitsuru SHIOZAKI  Takeshi FUJINO  
Summary | Full Text:PDF (1.6MB) >>Buy this Article

pp.275-283  PAPER-Hardware Based Security
Security Evaluation of RG-DTM PUF Using Machine Learning Attacks
Mitsuru SHIOZAKI  Kousuke OGAWA  Kota FURUHASHI  Takahiko MURAYAMA  Masaya YOSHIKAWA  Takeshi FUJINO  
Summary | Full Text:PDF (1.9MB) >>Buy this Article

pp.284-291  PAPER-Hardware Based Security
A Digital TRNG Based on Cross Feedback Ring Oscillators
Lijuan LI  Shuguo LI  
Summary | Full Text:PDF (1.1MB) >>Buy this Article

pp.292-297  LETTER
A Property for Full CLEFIA-128 Detected by a Middletext Distinguisher under the Known-Key Setting
Kazumaro AOKI  
Summary | Full Text:PDF (125.9KB) >>Buy this Article

pp.298-299  LETTER
A Note on Security of Public-Key Cryptosystem Provably as Secure as Subset Sum Problem
Shinsuke HAMASHO  Yasuyuki MURAKAMI  
Summary | Full Text:PDF (72.3KB) >>Buy this Article

pp.300-302  LETTER
Implementation of an Elliptic Curve Scalar Multiplication Method Using Division Polynomials
Naoki KANAYAMA  Yang LIU  Eiji OKAMOTO  Kazutaka SAITO  Tadanori TERUYA  Shigenori UCHIYAMA  
Summary | Full Text:PDF (71.2KB) >>Buy this Article

pp.303-305  LETTER
Zero-Sum Defender: Fast and Space-Efficient Defense against Return-Oriented Programming Attacks
Jeehong KIM  Inhyeok KIM  Changwoo MIN  Young Ik EOM  
Summary | Full Text:PDF (282.9KB) >>Buy this Article

Regular Section

pp.306-312  PAPER-Digital Signal Processing
Low-Power Dynamic MIMO Detection for a 4×4 MIMO-OFDM Receiver
Nozomi MIYAZAKI  Shingo YOSHIZAWA  Yoshikazu MIYANAGA  
Summary | Full Text:PDF (1.7MB) >>Buy this Article

pp.313-321  PAPER-Digital Signal Processing
Invariance and Periodic Oversampling in Principal Shift-Invariant Spaces
Kil Hyun KWON  Dae Gwan LEE  
Summary | Full Text:PDF (453.5KB) >>Buy this Article

pp.322-330  PAPER-Digital Signal Processing
Parametric Wiener Filter with Linear Constraints for Unknown Target Signals
Akira TANAKA  Hideyuki IMAI  
Summary | Full Text:PDF (703.8KB) >>Buy this Article

pp.331-338  PAPER-Nonlinear Problems
Eigen Analysis of Moment Vector Equation for Interacting Chaotic Elements Described by Nonlinear Boltzmann Equation
Hideki SATOH  
Summary | Full Text:PDF (1.8MB) >>Buy this Article

pp.339-346  PAPER-VLSI Design Technology and CAD
A Method of Analog IC Placement with Common Centroid Constraints
Keitaro UE  Kunihiro FUJIYOSHI  
Summary | Full Text:PDF (1.1MB) >>Buy this Article

pp.347-353  PAPER-Algorithms and Data Structures
Bit-Parallel Cubing Computation over GF(3m) for Irreducible Trinomials
Sun-Mi PARK  Ku-Young CHANG  Dowon HONG  Changho SEO  
Summary | Full Text:PDF (915.6KB) >>Buy this Article

pp.354-364  PAPER-Cryptography and Information Security
A DPA Attack on the Implementation of RSA-CRT with Montgomery Reduction
Wei-Chih LIEN  Sung-Ming YEN  
Summary | Full Text:PDF (1.8MB) >>Buy this Article

pp.365-370  PAPER-Cryptography and Information Security
The Degree of Two Classes of 3rd Order Correlation Immune Symmetric Boolean Functions
Jie PENG  Haibin KAN  
Summary | Full Text:PDF (519.6KB) >>Buy this Article

pp.371-383  PAPER-Cryptography and Information Security
Cryptanalysis of 249-, 250-, ..., 256-Bit Key HyRAL via Equivalent Keys
Yuki ASANO  Shingo YANAGIHARA  Tetsu IWATA  
Summary | Full Text:PDF (1.1MB) >>Buy this Article

pp.384-392  PAPER-Image
Adaptive Reversible Data Hiding via Integer-to-Integer Subband Transform and Adaptive Generalized Difference Expansion Method
Taichi YOSHIDA  Taizo SUZUKI  Masaaki IKEHARA  
Summary | Full Text:PDF (2.3MB) >>Buy this Article

pp.393-396  LETTER-Ultrasonics
Optimal Transform Order of Fractional Fourier Transform for Decomposition of Overlapping Ultrasonic Signals
Zhenkun LU  Cui YANG  Gang WEI  
Summary | Full Text:PDF (494.5KB) >>Buy this Article

pp.397-400  LETTER-Digital Signal Processing
Doppler Shift Based Target Localization Using Semidefinite Relaxation
Yan Shen DU  Ping WEI  Wan Chun LI  Hong Shu LIAO  
Summary | Full Text:PDF (227KB) >>Buy this Article

pp.401-404  LETTER-Systems and Control
Global Asymptotic Stabilization of Uncertain Nonlinear Systems via System Reconfiguration and Lyapunov Equation Utilization
Ho-Lim CHOI  
Summary | Full Text:PDF (194.2KB) >>Buy this Article

pp.405-408  LETTER-Nonlinear Problems
Phase Unwrapping Algorithm Based on Extended Particle Filter for SAR Interferometry
XianMing XIE  PengDa HUANG  QiuHua LIU  
Summary | Full Text:PDF (444.2KB) >>Buy this Article

pp.409-412  LETTER-Cryptography and Information Security
Efficient Privacy-Preserving Reputation Evaluation in Decentralized Environments
Youwen ZHU  Tsuyoshi TAKAGI  
Summary | Full Text:PDF (138.2KB) >>Buy this Article

pp.413-417  LETTER-Cryptography and Information Security
About Validity Checks of Augmented PAKE in IEEE 1363.2 and ISO/IEC 11770-4
SeongHan SHIN  Kazukuni KOBARA  
Summary | Full Text:PDF (103.7KB) >>Buy this Article

pp.418-420  LETTER-Cryptography and Information Security
Cryptanalysis of Remote Data Integrity Checking Protocol Proposed by L. Chen for Cloud Storage
Shaojing FU  Dongsheng WANG  Ming XU  Jiangchun REN  
Summary | Full Text:PDF (72.9KB) >>Buy this Article

pp.421-424  LETTER-Cryptography and Information Security
Improvement on a Knapsack-Based Probabilistic Encryption Scheme
Baocang WANG  Fagen LI  Yupu HU  
Summary | Full Text:PDF (96.3KB) >>Buy this Article

pp.425-428  LETTER-Information Theory
Odd Perfect Sequences and Sequence Sets with Zero Odd Correlation Zone over the 8-QAM+ Constellation
Yubo LI  Kai LIU  Chengqian XU  Gang LI  
Summary | Full Text:PDF (92.1KB) >>Buy this Article

pp.429-431  LETTER-Communication Theory and Signals
Multiple CFO Estimation Using the Properties of Zadoff-Chu Sequence
Rothna PEC  Chang-Hwan PARK  Yong-Soo CHO  
Summary | Full Text:PDF (387KB) >>Buy this Article

pp.432-435  LETTER-Spread Spectrum Technologies and Applications
N-Shift Zero Correlation Zone Sequence
Chao ZHANG  Keke PANG  
Summary | Full Text:PDF (85.3KB) >>Buy this Article

pp.436-439  LETTER-Mobile Information Network and Personal Communications
Performance Analysis of NAV Based Contention Window in IEEE 802.11 LAN
Seung-Sik CHOI  
Summary | Full Text:PDF (304.4KB) >>Buy this Article

pp.440-443  LETTER-Image
Fuzzy Metric Based Weight Assignment for Deinterlacing
Gwanggil JEON  Young-Sup LEE  SeokHoon KANG  
Summary | Full Text:PDF (708.6KB) >>Buy this Article

pp.444-447  LETTER-Image
A Fast Intra Prediction Method Using the Distribution of Adjacent Pixels in HEVC
Youngjo KIM  Juwon BYUN  Jaeseok KIM  
Summary | Full Text:PDF (764.7KB) >>Buy this Article

Previous | 
Next
go to Page Top