IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences

Archive Index

Online ISSN : 1745-1337
Volume E97-A No.6  (Publication Date:2014/06/01)
[Whole issue]:PDF (23.9MB)
Previous | 
Next
Special Section on Discrete Mathematics and Its Applications

pp.1162-1162  FOREWORD
FOREWORD
Kazuyuki AMANO  
Summary | Full Text:PDF (244.8KB) >>Buy this Article

pp.1163-1170  PAPER
Efficient Enumeration of All Ladder Lotteries with k Bars
Katsuhisa YAMANAKA  Shin-ichi NAKANO  
Summary | Full Text:PDF (716.9KB) >>Buy this Article

pp.1171-1179  PAPER
Implicit Generation of Pattern-Avoiding Permutations by Using Permutation Decision Diagrams
Yuma INOUE  Takahisa TODA  Shin-ichi MINATO  
Summary | Full Text:PDF (1.3MB) >>Buy this Article

pp.1180-1186  PAPER
Queue Layouts of Toroidal Grids
Kung-Jui PAI  Jou-Ming CHANG  Yue-Li WANG  Ro-Yu WU  
Summary | Full Text:PDF (1MB) >>Buy this Article

pp.1187-1191  PAPER
Longest Fault-Free Cycles in Folded Hypercubes with Conditional Faulty Elements
Wen-Yin HUANG  Jia-Jie LIU  Jou-Ming CHANG  Ro-Yu WU  
Summary | Full Text:PDF (630.4KB) >>Buy this Article

pp.1192-1199  PAPER
Twin Domination Problems in Round Digraphs
Tamaki NAKAJIMA  Yuuki TANAKA  Toru ARAKI  
Summary | Full Text:PDF (761.2KB) >>Buy this Article

pp.1200-1205  PAPER
Analysis of Lower Bounds for the Multislope Ski-Rental Problem
Hiroshi FUJIWARA  Yasuhiro KONNO  Toshihiro FUJITO  
Summary | Full Text:PDF (558.8KB) >>Buy this Article

pp.1206-1212  PAPER
Computational Complexity of Piano-Hinged Dissections
Zachary ABEL  Erik D. DEMAINE  Martin L. DEMAINE  Takashi HORIYAMA  Ryuhei UEHARA  
Summary | Full Text:PDF (2.3MB) >>Buy this Article

pp.1213-1219  PAPER
Computational Complexity and an Integer Programming Model of Shakashaka
Erik D. DEMAINE  Yoshio OKAMOTO  Ryuhei UEHARA  Yushi UNO  
Summary | Full Text:PDF (1.5MB) >>Buy this Article

pp.1220-1230  PAPER
A Unified View to Greedy Geometric Routing Algorithms in Ad Hoc Networks
Jinhee CHUN  Akiyoshi SHIOURA  Truong MINH TIEN  Takeshi TOKUYAMA  
Summary | Full Text:PDF (1.2MB) >>Buy this Article

pp.1231-1239  PAPER
Sparse Binary-to-Ternary Encoding for Holographic Storage
Seth PHILLIPS  Ivan FAIR  
Summary | Full Text:PDF (1MB) >>Buy this Article

pp.1240-1258  PAPER
Weakened Anonymity of Group Signature and Its Application to Subscription Services
Kazuto OGAWA  Go OHTAKE  Arisa FUJII  Goichiro HANAOKA  
Summary | Full Text:PDF (1.2MB) >>Buy this Article

pp.1259-1272  PAPER
Better Lattice Constructions for Solving Multivariate Linear Equations Modulo Unknown Divisors
Atsushi TAKAYASU  Noboru KUNIHIRO  
Summary | Full Text:PDF (664.5KB) >>Buy this Article

pp.1273-1284  PAPER
Recovering RSA Secret Keys from Noisy Key Bits with Erasures and Errors
Noboru KUNIHIRO  Naoyuki SHINOHARA  Tetsuya IZU  
Summary | Full Text:PDF (570.9KB) >>Buy this Article

pp.1285-1295  PAPER
A Unified Framework for Small Secret Exponent Attack on RSA
Noboru KUNIHIRO  Naoyuki SHINOHARA  Tetsuya IZU  
Summary | Full Text:PDF (521.9KB) >>Buy this Article

pp.1296-1306  PAPER
A Lossy Identification Scheme Using the Subgroup Decision Assumption
Shingo HASEGAWA  Shuji ISOBE  
Summary | Full Text:PDF (356.5KB) >>Buy this Article

pp.1307-1317  PAPER
Secure Hierarchical Identity-Based Identification without Random Oracles
Atsushi FUJIOKA  Taiichi SAITO  Keita XAGAWA  
Summary | Full Text:PDF (652.3KB) >>Buy this Article

pp.1318-1334  PAPER
Non-malleable Multiple Public-Key Encryption
Atsushi FUJIOKA  Eiichiro FUJISAKI  Keita XAGAWA  
Summary | Full Text:PDF (715.9KB) >>Buy this Article

pp.1335-1344  PAPER
Practical and Exposure-Resilient Hierarchical ID-Based Authenticated Key Exchange without Random Oracles
Kazuki YONEYAMA  
Summary | Full Text:PDF (251.4KB) >>Buy this Article

pp.1345-1355  PAPER
Exposure-Resilient One-Round Tripartite Key Exchange without Random Oracles
Koutarou SUZUKI  Kazuki YONEYAMA  
Summary | Full Text:PDF (347.1KB) >>Buy this Article

pp.1356-1364  PAPER
Dynamic Check Message Majority-Logic Decoding Algorithm for Non-binary LDPC Codes
Yichao LU  Xiao PENG  Guifen TIAN  Satoshi GOTO  
Summary | Full Text:PDF (1.4MB) >>Buy this Article

pp.1365-1369  LETTER
Algorithm for Finding Maximum Detour Hinge Vertices of Interval Graphs
Hirotoshi HONMA  Yoko NAKAJIMA  Yuta IGARASHI  Shigeru MASUYAMA  
Summary | Full Text:PDF (232KB) >>Buy this Article

pp.1370-1374  LETTER
On the Greatest Number of Paths and Maximal Paths for a Class of Directed Acyclic Graphs
Shinsuke ODAGIRI  Hiroyuki GOTO  
Summary | Full Text:PDF (230.3KB) >>Buy this Article

pp.1375-1377  LETTER
A Note on Cooperating Systems of One-Way Alternating Finite Automata with Only Universal States
Tatsuya FUJIMOTO  Tsunehiro YOSHINAGA  Makoto SAKAMOTO  
Summary | Full Text:PDF (79.7KB) >>Buy this Article

pp.1378-1381  LETTER
Theoretical Comparison of Root Computations in Finite Fields
Ryuichi HARASAWA  Yutaka SUEYOSHI  Aichi KUDO  
Summary | Full Text:PDF (214.7KB) >>Buy this Article

pp.1382-1384  LETTER
#P-hardness of Computing High Order Derivative and Its Logarithm
Ei ANDO  
Summary | Full Text:PDF (79.4KB) >>Buy this Article

pp.1385-1387  LETTER
Expressing Algorithms as Concise as Possible via Computability Logic
Keehang KWON  
Summary | Full Text:PDF (71.2KB) >>Buy this Article

Regular Section

pp.1388-1395  PAPER-Digital Signal Processing
Efficient Parallel Interference Cancellation MIMO Detector for Software Defined Radio on GPUs
Rongchun LI  Yong DOU  Jie ZHOU  Chen CHEN  
Summary | Full Text:PDF (1.5MB) >>Buy this Article

pp.1396-1404  PAPER-Nonlinear Problems
The Design of Low Complexity S-Boxes Based on a Discretized Piecewise Linear Chaotic Map
Daisaburo YOSHIOKA  Akio TSUNEDA  
Summary | Full Text:PDF (807.8KB) >>Buy this Article

pp.1405-1417  PAPER-Cryptography and Information Security
Highly Nonlinear Resilient Functions without Linear Structures
Jian LIU  Lusheng CHEN  Xuan GUANG  
Summary | Full Text:PDF (837KB) >>Buy this Article

pp.1418-1425  PAPER-Cryptography and Information Security
Extended Algorithm for Solving Underdefined Multivariate Quadratic Equations
Hiroyuki MIURA  Yasufumi HASHIMOTO  Tsuyoshi TAKAGI  
Summary | Full Text:PDF (881KB) >>Buy this Article

pp.1426-1429  LETTER-Digital Signal Processing
Improvement of Semi-Random Measurement Matrix for Compressed Sensing
Wentao LV  Junfeng WANG  Wenxian YU  Zhen TAN  
Summary | Full Text:PDF (236.4KB) >>Buy this Article

pp.1430-1433  LETTER-Coding Theory
On the Average Hamming Correlation of Frequency Hopping Sequences
Hongyu HAN  Daiyuan PENG  Xing LIU  
Summary | Full Text:PDF (87.3KB) >>Buy this Article

pp.1434-1438  LETTER-Communication Theory and Signals
Cooperative Bayesian Compressed Spectrum Sensing for Correlated Wideband Signals
Honggyu JUNG  Kwang-Yul KIM  Yoan SHIN  
Summary | Full Text:PDF (634.2KB) >>Buy this Article

pp.1439-1442  LETTER-Image
A Pipelined Architecture for Intra PU Encoding in HEVC
Yunpyo HONG  Juwon BYUN  Youngjo KIM  Jaeseok KIM  
Summary | Full Text:PDF (689.2KB) >>Buy this Article

Previous | 
Next
go to Page Top