IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences

Archive Index

Online ISSN : 1745-1337
Volume E89-A No.1  (Publication Date:2006/01/01)
Previous | 
Next
Special Section on Cryptography and Information Security

pp.1-1  FOREWORD
FOREWORD
Shinichi KAWAMURA  
Summary | Full Text:PDF (38.6KB) >>Buy this Article

pp.2-10  PAPER-Symmetric Key Cryptography
How to Maximize Software Performance of Symmetric Primitives on Pentium III and 4
Mitsuru MATSUI  Sayaka FUKUDA  
Summary | Full Text:PDF (346.7KB) >>Buy this Article

pp.11-18  PAPER-Symmetric Key Cryptography
Relation between the XL Algorithm and Grobner Basis Algorithms
Makoto SUGITA  Mitsuru KAWAZOE  Hideki IMAI  
Summary | Full Text:PDF (199.4KB) >>Buy this Article

pp.19-27  PAPER-Symmetric Key Cryptography
Quadratic Equations from APN Power Functions
Jung Hee CHEON  Dong Hoon LEE  
Summary | Full Text:PDF (181.6KB) >>Buy this Article

pp.28-38  PAPER-Public Key Cryptography
A Universally Composable Secure Channel Based on the KEM-DEM Framework
Waka NAGAO  Yoshifumi MANABE  Tatsuaki OKAMOTO  
Summary | Full Text:PDF (218.6KB) >>Buy this Article

pp.39-46  PAPER-Public Key Cryptography
k-Resilient Identity-Based Encryption in the Standard Model
Swee-Huay HENG  Kaoru KUROSAWA  
Summary | Full Text:PDF (164.2KB) >>Buy this Article

pp.47-54  PAPER-Public Key Cryptography
A Construction of Public-Key Cryptosystem Using Algebraic Coding on the Basis of Superimposition and Randomness
Masao KASAHARA  
Summary | Full Text:PDF (139.1KB) >>Buy this Article

pp.55-65  PAPER-Public Key Cryptography
Plaintext Simulatability
Eiichiro FUJISAKI  
Summary | Full Text:PDF (179.4KB) >>Buy this Article

pp.66-73  PAPER-Public Key Cryptography
Schemes for Encryption with Anonymity and Ring Signature
Ryotaro HAYASHI  Keisuke TANAKA  
Summary | Full Text:PDF (171.1KB) >>Buy this Article

pp.74-80  PAPER-Digital Signature
Efficient Identification of Bad Signatures in RSA-Type Batch Signature
Seungwon LEE  Seongje CHO  Jongmoo CHOI  Yookun CHO  
Summary | Full Text:PDF (498.2KB) >>Buy this Article

pp.81-89  PAPER-Digital Signature
Generalized Powering Functions and Their Application to Digital Signatures
Hisayoshi SATO  Tsuyoshi TAKAGI  Satoru TEZUKA  Kazuo TAKARAGI  
Summary | Full Text:PDF (236.1KB) >>Buy this Article

pp.90-98  PAPER-Digital Signature
Conversion Schemes for Unlinkable Signatures That Include Revocable Unlinkability
Koji CHIDA  
Summary | Full Text:PDF (165.4KB) >>Buy this Article

pp.99-105  PAPER-Protocol
Flaws in Robust Optimistic Mix-Nets and Stronger Security Notions
Masayuki ABE  Hideki IMAI  
Summary | Full Text:PDF (152.8KB) >>Buy this Article

pp.106-114  PAPER-Protocol
Authorization-Limited Transformation-Free Proxy Cryptosystems and Their Security Analyses
Lihua WANG  Zhenfu CAO  Takeshi OKAMOTO  Ying MIAO  Eiji OKAMOTO  
Summary | Full Text:PDF (424.3KB) >>Buy this Article

pp.115-123  PAPER-Elliptic Curve Cryptography
Radix-r Non-Adjacent Form and Its Application to Pairing-Based Cryptosystem
Tsuyoshi TAKAGI  David REIS, Jr.  Sung-Ming YEN  Bo-Ching WU  
Summary | Full Text:PDF (209.6KB) >>Buy this Article

pp.124-133  PAPER-Elliptic Curve Cryptography
A New Type of Fast Endomorphisms on Jacobians of Hyperelliptic Curves and Their Cryptographic Application
Katsuyuki TAKASHIMA  
Summary | Full Text:PDF (192.6KB) >>Buy this Article

pp.134-143  PAPER-Elliptic Curve Cryptography
Efficient Algorithms for Tate Pairing
Tetsutaro KOBAYASHI  Kazumaro AOKI  Hideki IMAI  
Summary | Full Text:PDF (207.6KB) >>Buy this Article

pp.144-150  PAPER-Elliptic Curve Cryptography
Candidate One-Way Functions on Non-Supersingular Elliptic Curves
Taiichi SAITO  Fumitaka HOSHINO  Shigenori UCHIYAMA  Tetsutaro KOBAYASHI  
Summary | Full Text:PDF (213.3KB) >>Buy this Article

pp.151-160  PAPER-Elliptic Curve Cryptography
Efficient Hyperelliptic Curve Cryptosystems Using Theta Divisors
Masanobu KATAGI  Toru AKISHITA  Izuru KITAMURA  Tsuyoshi TAKAGI  
Summary | Full Text:PDF (287.7KB) >>Buy this Article

pp.161-168  PAPER-Elliptic Curve Cryptography
Security Analysis of the SPA-Resistant Fractional Width Method
Katsuyuki OKEYA  Tsuyoshi TAKAGI  Camille VUILLAUME  
Summary | Full Text:PDF (167KB) >>Buy this Article

pp.169-177  PAPER-Information Hiding
Best Security Index for Digital Fingerprinting
Kozo BANNO  Shingo ORIHARA  Takaaki MIZUKI  Takao NISHIZEKI  
Summary | Full Text:PDF (243.5KB) >>Buy this Article

pp.178-185  PAPER-Information Hiding
Multi-Matcher On-Line Signature Verification System in DWT Domain
Isao NAKANISHI  Hiroyuki SAKAMOTO  Naoto NISHIGUCHI  Yoshio ITOH  Yutaka FUKUI  
Summary | Full Text:PDF (643KB) >>Buy this Article

pp.186-193  PAPER-Information Hiding
Correlation-Based Video Watermarking Method Using Inter-Frame Similarity
Motoo YAMAMOTO  Akira SHIOZAKI  Motoi IWATA  Akio OGIHARA  
Summary | Full Text:PDF (502.9KB) >>Buy this Article

pp.194-202  PAPER-Application
A Selective Video Encryption Scheme for MPEG Compression Standard
Gang LIU  Takeshi IKENAGA  Satoshi GOTO  Takaaki BABA  
Summary | Full Text:PDF (524KB) >>Buy this Article

pp.203-205  LETTER-Public Key Cryptography
A Cramer-Shoup Variant Related to the Quadratic Residuosity Problem
Harunaga HIWATARI  Keisuke TANAKA  
Summary | Full Text:PDF (77.7KB) >>Buy this Article

pp.206-208  LETTER-Public Key Cryptography
Security Analysis of Signcryption Scheme from q-Diffie-Hellman Problems
Chik-How TAN  
Summary | Full Text:PDF (77KB) >>Buy this Article

pp.209-212  LETTER-Protocol
Attack on the Sun-Chen-Hwang's Three-Party Key Agreement Protocols Using Passwords
Junghyun NAM  Seungjoo KIM  Dongho WON  
Summary | Full Text:PDF (139KB) >>Buy this Article

pp.213-218  LETTER-Protocol
Weakness in Jung et al.'s ID-Based Conference Key Distribution Scheme
Junghyun NAM  Seungjoo KIM  Dongho WON  
Summary | Full Text:PDF (259.5KB) >>Buy this Article

pp.219-221  LETTER-Information Hiding
Redundancy in Instruction Sequences of Computer Programs
Kazuhiro HATTANDA  Shuichi ICHIKAWA  
Summary | Full Text:PDF (166.7KB) >>Buy this Article

pp.222-226  LETTER-Information Hiding
Evaluation of Mutational Capability and Real-Time Applicability of Obfuscation Techniques
Shinsaku KIYOMOTO  Toshiaki TANAKA  
Summary | Full Text:PDF (655.3KB) >>Buy this Article

pp.227-230  LETTER-Information Hiding
Obtaining Traceability Codes from Chinese Reminder Theorem Codes
Marcel FERNANDEZ  Miguel SORIANO  Josep COTRINA  
Summary | Full Text:PDF (79.1KB) >>Buy this Article

pp.231-237  LETTER-Side Channel Analysis
Simple Power Analysis on Fast Modular Reduction with Generalized Mersenne Prime for Elliptic Curve Cryptosystems
Yasuyuki SAKAI  Kouichi SAKURAI  
Summary | Full Text:PDF (102.5KB) >>Buy this Article

pp.238-239  LETTER-Access Control
uT-RBAC: Ubiquitous Role-Based Access Control Model
Song-hwa CHAE  Wonil KIM  Dong-Kyoo KIM  
Summary | Full Text:PDF (86.9KB) >>Buy this Article

Regular Section

pp.240-247  PAPER-Engineering Acoustics
Common Acoustical Pole Estimation from Multi-Channel Musical Audio Signals
Takuya YOSHIOKA  Takafumi HIKICHI  Masato MIYOSHI  Hiroshi G. OKUNO  
Summary | Full Text:PDF (997.2KB) >>Buy this Article

pp.248-259  PAPER-Digital Signal Processing
Coefficients--Delay Simultaneous Adaptation Scheme for Linear Equalization of Nonminimum Phase Channels
Yusuke TSUDA  Jonah GAMBA  Tetsuya SHIMAMURA  
Summary | Full Text:PDF (730.8KB) >>Buy this Article

pp.260-269  PAPER-Systems and Control
A MPBSG Technique Based Parallel Dual-Type Method Used for Solving Distributed Optimal Power Flow Problems
Huay CHANG  Shieh-Shing LIN  
Summary | Full Text:PDF (1.3MB) >>Buy this Article

pp.270-279  PAPER-Nonlinear Problems
Approximation and Analysis of Non-linear Equations in a Moment Vector Space
Hideki SATOH  
Summary | Full Text:PDF (1.5MB) >>Buy this Article

pp.280-287  PAPER-VLSI Design Technology and CAD
A Cost-Effective Handshake Protocol and Its Implementation for Bundled-Data Asynchronous Circuits
Masakazu SHIMIZU  Koki ABE  
Summary | Full Text:PDF (1.7MB) >>Buy this Article

pp.288-296  PAPER-Reliability, Maintainability and Safety Analysis
Optimal Workload for a Multi-Tasking k-out-of-n:G Load Sharing System
Ji Hwan CHA  Hisashi YAMAMOTO  Won Young YUN  
Summary | Full Text:PDF (326KB) >>Buy this Article

pp.297-309  PAPER-Information Security
Practical Implementations of a Non-disclosure Fair Contract Signing Protocol
Chih-Hung WANG  Chih-Heng YIN  
Summary | Full Text:PDF (226.6KB) >>Buy this Article

pp.310-315  LETTER-Digital Signal Processing
Design and Experimental Evaluation of Improved Least Squares and Weighted Least Squares Quadrature Mirror Filters
A.P. VINOD  
Summary | Full Text:PDF (180.5KB) >>Buy this Article

pp.316-320  LETTER-Digital Signal Processing
QFB Low-Delay Design Satisfying Perfect-Reconstruction
Her-Chang CHAO  Shih-Jen YANG  
Summary | Full Text:PDF (631.9KB) >>Buy this Article

pp.321-323  LETTER-Digital Signal Processing
Recursive Computation of Wiener-Khintchine Theorem and Bispectrum
Khalid Mahmood AAMIR  Mohammad Ali MAUD  Arif ZAMAN  Asim LOAN  
Summary | Full Text:PDF (64KB) >>Buy this Article

pp.324-327  LETTER-Digital Signal Processing
A Novel Image Segmentation Approach Based on Particle Swarm Optimization
Chih-Chin LAI  
Summary | Full Text:PDF (213.1KB) >>Buy this Article

pp.328-333  LETTER-Nonlinear Problems
A Design Method of Parallel Fast RLS Second-Order Adaptive Volterra Filter
Xueqin ZHAO  Jianming LU  Takashi YAHAGI  
Summary | Full Text:PDF (667.6KB) >>Buy this Article

pp.334-339  LETTER-Information Security
Refined Computations for Points of the Form 2kP Based on Montgomery Trick
Daisuke ADACHI  Tomio HIRATA  
Summary | Full Text:PDF (101.3KB) >>Buy this Article

pp.340-347  LETTER-Information Theory
Low Encoding Complexity Video Compression Based on Low-Density Parity Check Codes
Haruhiko KANEKO  
Summary | Full Text:PDF (975.5KB) >>Buy this Article

pp.348-353  LETTER-Coding Theory
QPSK Differential Space Time Coding on Different Unitary Matrices Sets and Initializations
Jia HOU  Moon Ho LEE  
Summary | Full Text:PDF (572.1KB) >>Buy this Article

pp.354-358  LETTER-Neural Networks and Bioengineering
A Hill-Shift Learning Algorithm of Hopfield Network for Bipartite Subgraph Problem
Rong-Long WANG  Kozo OKAZAKI  
Summary | Full Text:PDF (98.9KB) >>Buy this Article

Previous | 
Next
go to Page Top