IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences

Archive Index

Online ISSN : 1745-1337
Volume E98-A No.1  (Publication Date:2015/01/01)
[Whole issue]:PDF (73.5MB)
Previous | 
Next
Special Section on Cryptography and Information Security

pp.1-2  FOREWORD
FOREWORD
Kouichi SAKURAI  
Summary | Full Text:PDF (208.5KB) >>Buy this Article

pp.3-15  INVITED PAPER
Dual Pairing Vector Spaces and Their Applications
Tatsuaki OKAMOTO  Katsuyuki TAKASHIMA  
Summary | Full Text:PDF (561.1KB) >>Buy this Article

pp.16-25  INVITED PAPER
Trends and Development of Information-Theoretic Cryptography
Junji SHIKATA  
Summary | Full Text:PDF (328.1KB) >>Buy this Article

pp.26-38  PAPER-Symmetric Key Based Cryptography
Improved Single-Key Distinguisher on HMAC-MD5 and Key Recovery Attacks on Sandwich-MAC-MD5 and MD5-MAC
Yu SASAKI  Gaoli WANG  Lei WANG  
Summary | Full Text:PDF (1.3MB) >>Buy this Article

pp.39-48  PAPER-Symmetric Key Based Cryptography
Upper Bounds for the Security of Several Feistel Networks
Yosuke TODO  
Summary | Full Text:PDF (701.7KB) >>Buy this Article

pp.49-60  PAPER-Symmetric Key Based Cryptography
Bitwise Partial-Sum: A New Tool for Integral Analysis against ARX Designs
Yu SASAKI  Lei WANG  
Summary | Full Text:PDF (1.4MB) >>Buy this Article

pp.61-71  PAPER-Symmetric Key Based Cryptography
Preimage Attacks on Feistel-SP Functions: Impact of Omitting the Last Network Twist
Yu SASAKI  
Summary | Full Text:PDF (1.7MB) >>Buy this Article

pp.72-80  PAPER-Symmetric Key Based Cryptography
Improved MILP Modeling for Automatic Security Evaluation and Application to FOX
Kexin QIAO  Lei HU  Siwei SUN  Xiaoshuang MA  Haibin KAN  
Summary | Full Text:PDF (1.7MB) >>Buy this Article

pp.81-91  PAPER-Symmetric Key Based Cryptography
Full Plaintext Recovery Attacks on RC4 Using Multiple Biases
Toshihiro OHIGASHI  Takanori ISOBE  Yuhei WATANABE  Masakatu MORII  
Summary | Full Text:PDF (945KB) >>Buy this Article

pp.92-99  PAPER-Public Key Based Cryptography
Certificateless Aggregate Signature Schemes with Improved Security
Nguyen Quoc VIET  Wakaha OGATA  
Summary | Full Text:PDF (380.2KB) >>Buy this Article

pp.100-116  PAPER-Public Key Based Cryptography
Key-Private Proxy Re-Encryption from Lattices, Revisited
Ryo NISHIMAKI  Keita XAGAWA  
Summary | Full Text:PDF (616.6KB) >>Buy this Article

pp.117-131  PAPER-Public Key Based Cryptography
Revocable Group Signatures with Compact Revocation List Using Accumulators
Toru NAKANISHI  Nobuo FUNABIKI  
Summary | Full Text:PDF (635KB) >>Buy this Article

pp.132-143  PAPER-Public Key Based Cryptography
Compact Authenticated Key Exchange from Bounded CCA-Secure KEM
Kazuki YONEYAMA  
Summary | Full Text:PDF (254.4KB) >>Buy this Article

pp.144-152  PAPER-Public Key Based Cryptography
Cryptanalysis of the Quaternion Rainbow
Yasufumi HASHIMOTO  
Summary | Full Text:PDF (351KB) >>Buy this Article

pp.153-161  PAPER-Foundation
Security Analysis on AUTH Protocol and Its Variant against the Man-in-the-Middle Attack
Kosei ENDO  Noboru KUNIHIRO  
Summary | Full Text:PDF (658.7KB) >>Buy this Article

pp.162-170  PAPER-Foundation
Key Update Mechanism Using All-or-Nothing Transform for Network Storage of Encrypted Data
Dai WATANABE  Masayuki YOSHINO  
Summary | Full Text:PDF (430.8KB) >>Buy this Article

pp.171-181  PAPER-Foundation
An Adaptive Multiple-Fault Injection Attack on Microcontrollers and a Countermeasure
Sho ENDO  Naofumi HOMMA  Yu-ichi HAYASHI  Junko TAKAHASHI  Hitoshi FUJI  Takafumi AOKI  
Summary | Full Text:PDF (3.3MB) >>Buy this Article

pp.182-191  PAPER-Foundation
Efficient DFA on SPN-Based Block Ciphers and Its Application to the LED Block Cipher
Rei UENO  Naofumi HOMMA  Takafumi AOKI  
Summary | Full Text:PDF (969.9KB) >>Buy this Article

pp.192-202  PAPER-Foundation
Evaluation Method for Access-Driven Cache Attacks Using Correlation Coefficient
Junko TAKAHASHI  Toshinori FUKUNAGA  Kazumaro AOKI  Hitoshi FUJI  
Summary | Full Text:PDF (1.8MB) >>Buy this Article

pp.203-212  PAPER-Foundation
A Strengthened Security Notion for Password-Protected Secret Sharing Schemes
Shingo HASEGAWA  Shuji ISOBE  Jun-ya IWAZAKI  Eisuke KOIZUMI  Hiroki SHIZUYA  
Summary | Full Text:PDF (837.2KB) >>Buy this Article

pp.213-222  PAPER-Foundation
Secret Sharing with Share-Conversion: Achieving Small Share-Size and Extendibility to Multiparty Computation
Ryo KIKUCHI  Koji CHIDA  Dai IKARASHI  Wakaha OGATA  Koki HAMADA  Katsumi TAKAHASHI  
Summary | Full Text:PDF (1.1MB) >>Buy this Article

pp.223-231  PAPER-Foundation
Adaptively and Unconditionally Secure Conversion Protocols between Ramp and Linear Secret Sharing
Ryo KIKUCHI  Dai IKARASHI  Koki HAMADA  Koji CHIDA  
Summary | Full Text:PDF (848.4KB) >>Buy this Article

pp.232-245  PAPER-Foundation
Generic Fully Simulatable Adaptive Oblivious Transfer
Kaoru KUROSAWA  Ryo NOJIMA  Le Trieu PHONG  
Summary | Full Text:PDF (690.1KB) >>Buy this Article

pp.246-249  LETTER
A Tighter Bound for the Character Sum of Primitive Sequences over Residue Rings Modulo Square-Free Odd Integers
Lin WANG  Yu ZHOU  Ying GAO  
Summary | Full Text:PDF (99.2KB) >>Buy this Article

Special Section on Intelligent Transport Systems

pp.250-250  FOREWORD
FOREWORD
Shunsuke KAMIJO  
Summary | Full Text:PDF (199.2KB) >>Buy this Article

pp.251-258  INVITED PAPER
The History of and Prospects for ITS with a Focus on Car Navigation Systems
Tsuneo TAKAHASHI  
Summary | Full Text:PDF (1.6MB) >>Buy this Article

pp.259-266  INVITED PAPER
The Challenge of Collaboration among Academies and Asia Pacific for ITS R&D
Hiroshi MAKINO  Shunsuke KAMIJO  
Summary | Full Text:PDF (2.9MB) >>Buy this Article

pp.267-274  PAPER
Gap Acceptance on Car Following for Aerodynamic Drag Reduction — Relationships among Gap Distance, Vehicle Types, and Driver Characteristics —
Naohisa HASHIMOTO  Shin KATO  Sadayuki TSUGAWA  
Summary | Full Text:PDF (2.6MB) >>Buy this Article

pp.275-283  PAPER
Positioning Method by Two GNSS Satellites and Distance Sensor in Urban Area
Hiroyuki HATANO  Tomoya KITANI  Masahiro FUJII  Atsushi ITO  Yu WATANABE  Hironobu ONISHI  Toru AOKI  
Summary | Full Text:PDF (1.8MB) >>Buy this Article

pp.284-293  PAPER
Evaluation of Multi-GNSSs and GPS with 3D Map Methods for Pedestrian Positioning in an Urban Canyon Environment
Li-Ta HSU  Feiyu CHEN  Shunsuke KAMIJO  
Summary | Full Text:PDF (7.9MB) >>Buy this Article

pp.294-303  PAPER
Novel Vehicle Information Acquisition Method Using 2D Reflector Code for Automotive Infrared Laser Radar
Tomotaka WADA  Yusuke SHIKIJI  Keita WATARI  Hiromi OKADA  
Summary | Full Text:PDF (4.6MB) >>Buy this Article

pp.304-312  PAPER
MPVUS: A Moving Prediction Based Video Streaming Uploading Scheme over Vehicular Networks
Xiaojin ZHU  Jingping BI  Jianhang LIU  
Summary | Full Text:PDF (1.7MB) >>Buy this Article

pp.313-322  PAPER
Pedestrian Dead Reckoning for Mobile Phones Using Magnetic Deviation Map
Noriaki KAKIUCHI  Kenichi SUNAGAWA  Shunsuke KAMIJO  
Summary | Full Text:PDF (6.5MB) >>Buy this Article

Regular Section

pp.323-330  PAPER-Systems and Control
Adaptive Assignment of Deadline and Clock Frequency in Real-Time Embedded Control Systems
Tatsuya YOSHIMOTO  Toshimitsu USHIO  Takuya AZUMI  
Summary | Full Text:PDF (1.1MB) >>Buy this Article

pp.331-339  PAPER-Nonlinear Problems
Stabilizing Unknown and Unstable Periodic Orbits in DC-DC Converters by Temporal Perturbations of the Switching Time
Hanh Thi-My NGUYEN  Tadashi TSUBONE  
Summary | Full Text:PDF (2.6MB) >>Buy this Article

pp.340-353  PAPER-Nonlinear Problems
In-Phase and Anti-Phase Synchronization Phenomena in Coupled Systems of Piecewise Constant Oscillators
Keisuke SUZUKI  Tadashi TSUBONE  
Summary | Full Text:PDF (4.4MB) >>Buy this Article

pp.354-361  PAPER-Numerical Analysis and Optimization
Application of the Recursive Transfer Method to Flexural Waves II: Reflection Enhancement Caused by Resonant Scattering in Acoustic Waveguide
Hatsuhiro KATO  Hatsuyoshi KATO  Takaaki ISHII  
Summary | Full Text:PDF (548.6KB) >>Buy this Article

pp.362-377  PAPER-Numerical Analysis and Optimization
A Multi-Learning Immune Algorithm for Numerical Optimization
Shuaiqun WANG  Shangce GAO   Aorigele  Yuki TODO  Zheng TANG  
Summary | Full Text:PDF (2.5MB) >>Buy this Article

pp.378-383  PAPER-Algorithms and Data Structures
Generalization to Any Field of Toeplitz Matrix Vector Product Based on Multi-Way Splitting Method and Its Application
Sun-Mi PARK  Ku-Young CHANG  Dowon HONG  Changho SEO  
Summary | Full Text:PDF (924.7KB) >>Buy this Article

pp.384-390  PAPER-Algorithms and Data Structures
A Fixed-Parameter Algorithm for Detecting a Singleton Attractor in an AND/OR Boolean Network with Bounded Treewidth
Chia-Jung CHANG  Takeyuki TAMURA  Kun-Mao CHAO  Tatsuya AKUTSU  
Summary | Full Text:PDF (1.1MB) >>Buy this Article

pp.391-399  PAPER-Information Theory
Graphical Calculus for Qutrit Systems
Xiaoning BIAN  Quanlong WANG  
Summary | Full Text:PDF (2MB) >>Buy this Article

pp.400-410  PAPER-Communication Theory and Signals
Bit-Express: A Loss Tolerant Network Transmission via Network Coding
Kai PAN  Weiyang LIU  Dongcheng WU  Hui LI  
Summary | Full Text:PDF (2.7MB) >>Buy this Article

pp.411-414  LETTER-Digital Signal Processing
Blind Residual CFO Estimation under Single Data Block for Uplink Interleaved OFDMA
Ann-Chen CHANG  Chih-Chang SHEN  
Summary | Full Text:PDF (244.1KB) >>Buy this Article

pp.415-420  LETTER-Digital Signal Processing
On-Line Monaural Ambience Extraction Algorithm for Multichannel Audio Upmixing System Based on Nonnegative Matrix Factorization
Seokjin LEE  Hee-Suk PANG  
Summary | Full Text:PDF (1.2MB) >>Buy this Article

pp.421-423  LETTER-Cryptography and Information Security
Analysis of a Certificateless Aggregate Signature Scheme
Chenhui WANG  Yumin YUAN  
Summary | Full Text:PDF (75.7KB) >>Buy this Article

pp.424-427  LETTER-Cryptography and Information Security
An Offline Dictionary Attack against Abdalla and Pointcheval's Key Exchange in the Password-Only Three-Party Setting
Junghyun NAM  Kim-Kwang Raymond CHOO  Juryon PAIK  Dongho WON  
Summary | Full Text:PDF (227KB) >>Buy this Article

pp.428-433  LETTER-Cryptography and Information Security
Hidden Credential Retrieval, Revisited
SeongHan SHIN  Kazukuni KOBARA  
Summary | Full Text:PDF (294.9KB) >>Buy this Article

pp.434-440  LETTER-Cryptography and Information Security
On the LFSRization of a Class of FCSR Automata
Zhiqiang LIN  Lishan KE  Dongdai LIN  Jian GAO  
Summary | Full Text:PDF (266.6KB) >>Buy this Article

pp.441-444  LETTER-Communication Theory and Signals
Robust Time Synchronization Algorithm for IEEE 802.11ac WLAN Systems
Soohyun JANG  Jaeyoung ROH  Seongjoo LEE  Yunho JUNG  
Summary | Full Text:PDF (479.5KB) >>Buy this Article

pp.445-449  LETTER-Communication Theory and Signals
Collaborative Spectrum Sensing via L1/2 Regularization
Zhe LIU  Feng LI  WenLei DUAN  
Summary | Full Text:PDF (249.7KB) >>Buy this Article

pp.450-454  LETTER-Communication Theory and Signals
Received Signal Strength-Based Localization Using Delta Method for Non-cooperative Scenario in Wireless Sensor Networks
Thu L.N. NGUYEN  Yoan SHIN  
Summary | Full Text:PDF (228.4KB) >>Buy this Article

pp.455-458  LETTER-Image
Frame Rate Up-Conversion Using Median Filter and Motion Estimation with Occlusion Detection
Dang Ngoc Hai NGUYEN  NamUk KIM  Yung-Lyul LEE  
Summary | Full Text:PDF (1.5MB) >>Buy this Article

Previous | 
Next
go to Page Top