Keyword : encryption


Security Evaluation for Block Scrambling-Based Image Encryption Including JPEG Distortion against Jigsaw Puzzle Solver Attacks
Tatsuya CHUMAN Hitoshi KIYA 
Publication:   
Publication Date: 2018/12/01
Vol. E101-A  No. 12 ; pp. 2405-2408
Type of Manuscript:  Special Section LETTER (Special Section on Signal Design and Its Applications in Communications)
Category: Image
Keyword: 
jigsaw puzzleJPEGencryptionEtC system
 Summary | Full Text:PDF(1.2MB)

Novel Secure Communication Based on Chaos Synchronization
Bo WANG Xiaohua ZHANG Xiucheng DONG 
Publication:   
Publication Date: 2018/07/01
Vol. E101-A  No. 7 ; pp. 1132-1135
Type of Manuscript:  LETTER
Category: Nonlinear Problems
Keyword: 
chaos synchronizationencryptiondigital signalsecure communication
 Summary | Full Text:PDF(434.6KB)

Repeated Games for Generating Randomness in Encryption
Kenji YASUNAGA Kosuke YUZAWA 
Publication:   
Publication Date: 2018/04/01
Vol. E101-A  No. 4 ; pp. 697-703
Type of Manuscript:  PAPER
Category: Cryptography and Information Security
Keyword: 
game theoryrepeated gamerandomnessencryption
 Summary | Full Text:PDF(681KB)

On the Security of Block Scrambling-Based EtC Systems against Extended Jigsaw Puzzle Solver Attacks
Tatsuya CHUMAN Kenta KURIHARA Hitoshi KIYA 
Publication:   
Publication Date: 2018/01/01
Vol. E101-D  No. 1 ; pp. 37-44
Type of Manuscript:  Special Section PAPER (Special Section on Enriched Multimedia — Potential and Possibility of Multimedia Contents for the Future —)
Category: 
Keyword: 
jigsaw puzzleJPEGencryptionEtC system
 Summary | Full Text:PDF(1.9MB)

A Bullet-Proof Verification Approach to Defend against Black Hole Attacks in Mobile Ad Hoc Networks
Firoz AHMED Seokhoon YOON Hoon OH 
Publication:   IEICE TRANSACTIONS on Communications
Publication Date: 2015/03/01
Vol. E98-B  No. 3 ; pp. 422-436
Type of Manuscript:  PAPER
Category: Network
Keyword: 
AODVsecurityblack hole attackencryptionmobile ad hoc networks
 Summary | Full Text:PDF(2.3MB)

Trends and Development of Information-Theoretic Cryptography
Junji SHIKATA 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2015/01/01
Vol. E98-A  No. 1 ; pp. 16-25
Type of Manuscript:  INVITED PAPER (Special Section on Cryptography and Information Security)
Category: 
Keyword: 
information-theoretic cryptographyShannon entropyRényi entropyencryptionauthentication
 Summary | Full Text:PDF(328.1KB)

A New 8-Bit AES Design for Wireless Network Applications
Ming-Chih CHEN 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2013/12/01
Vol. E96-A  No. 12 ; pp. 2587-2596
Type of Manuscript:  Special Section PAPER (Special Section on VLSI Design and CAD Algorithms)
Category: High-Level Synthesis and System-Level Design
Keyword: 
advanced encryption standardcryptographyencryptionapplication specific integrated circuits
 Summary | Full Text:PDF(1.8MB)

Hardware Design of Multi Gbps RC4 Stream Cipher
Thi Hong TRAN Leonardo LANANTE, Jr. Yuhei NAGAO Hiroshi OCHI 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2013/11/01
Vol. E96-A  No. 11 ; pp. 2120-2127
Type of Manuscript:  Special Section PAPER (Special Section on Smart Multimedia & Communication Systems)
Category: VLSI Design Technology and CAD
Keyword: 
RC4encryptionWEPWPAIEEE 802.11ac
 Summary | Full Text:PDF(1.5MB)

Further Analysis of a Practical Hierarchical Identity-Based Encryption Scheme
Ying SUN Yong YU Yi MU 
Publication:   IEICE TRANSACTIONS on Information and Systems
Publication Date: 2012/06/01
Vol. E95-D  No. 6 ; pp. 1690-1693
Type of Manuscript:  LETTER
Category: Information Network
Keyword: 
cryptanalysisencryptionhierarchical identity-based cryptography
 Summary | Full Text:PDF(71KB)

MV-OPES: Multivalued-Order Preserving Encryption Scheme: A Novel Scheme for Encrypting Integer Value to Many Different Values
Hasan KADHEM Toshiyuki AMAGASA Hiroyuki KITAGAWA 
Publication:   IEICE TRANSACTIONS on Information and Systems
Publication Date: 2010/09/01
Vol. E93-D  No. 9 ; pp. 2520-2533
Type of Manuscript:  PAPER
Category: Data Engineering, Web Information Systems
Keyword: 
encryptionorder-preservingdatabase outsourcingstatistical attack
 Summary | Full Text:PDF(850.9KB)

An Efficient Encryption and Key Management Scheme for Layered Access Control of H.264/Scalable Video Coding
Su-Wan PARK Sang Uk SHIN 
Publication:   IEICE TRANSACTIONS on Information and Systems
Publication Date: 2009/05/01
Vol. E92-D  No. 5 ; pp. 851-858
Type of Manuscript:  Special Section PAPER (Special Section on Information and Communication System Security)
Category: Contents Protection
Keyword: 
H.264/SVCscalable video coding (SVC)encryptionkey managementaccess right
 Summary | Full Text:PDF(547.9KB)

Short-Exponent RSA
Hung-Min SUN Cheng-Ta YANG Mu-En WU 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2009/03/01
Vol. E92-A  No. 3 ; pp. 912-918
Type of Manuscript:  PAPER
Category: Cryptography and Information Security
Keyword: 
RSAencryptiondigital signaturepublic-key cryptosystem
 Summary | Full Text:PDF(216.8KB)

Improvement of Authenticated Encryption Schemes with Message Linkages for Message Flows
Min-Shiang HWANG Jung-Wen LO Shu-Yin HSIAO Yen-Ping CHU 
Publication:   IEICE TRANSACTIONS on Information and Systems
Publication Date: 2006/04/01
Vol. E89-D  No. 4 ; pp. 1575-1577
Type of Manuscript:  LETTER
Category: Application Information Security
Keyword: 
authenticationcryptographydigital signatureencryption
 Summary | Full Text:PDF(68KB)

A Cramer-Shoup Variant Related to the Quadratic Residuosity Problem
Harunaga HIWATARI Keisuke TANAKA 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2006/01/01
Vol. E89-A  No. 1 ; pp. 203-205
Type of Manuscript:  Special Section LETTER (Special Section on Cryptography and Information Security)
Category: Public Key Cryptography
Keyword: 
encryptionsemantically securequadratic residuosity
 Summary | Full Text:PDF(77.7KB)

Schemes for Encryption with Anonymity and Ring Signature
Ryotaro HAYASHI Keisuke TANAKA 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2006/01/01
Vol. E89-A  No. 1 ; pp. 66-73
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: Public Key Cryptography
Keyword: 
encryptionring signaturekey-privacyanonymity
 Summary | Full Text:PDF(171.1KB)

Tamper-Resistant Software System Based on a Finite State Machine
Akito MONDEN Antoine MONSIFROT Clark THOMBORSON 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2005/01/01
Vol. E88-A  No. 1 ; pp. 112-122
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: Tamper-Resistance
Keyword: 
software securitysoftware protectionobfuscationencryption
 Summary | Full Text:PDF(426.8KB)

Unconditionally Secure Authenticated Encryption
Junji SHIKATA Goichiro HANAOKA Yuliang ZHENG Tsutomu MATSUMOTO Hideki IMAI 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2004/05/01
Vol. E87-A  No. 5 ; pp. 1119-1131
Type of Manuscript:  Special Section LETTER (Special Section on Discrete Mathematics and Its Applications)
Category: 
Keyword: 
unconditional securityencryptionauthenticated encryptionsigncryption
 Summary | Full Text:PDF(293.6KB)

Security Issues for Software Defined Radio: Design of a Secure Download System
Lachlan B. MICHAEL Miodrag J. MIHALJEVIC Shinichiro HARUYAMA Ryuji KOHNO 
Publication:   IEICE TRANSACTIONS on Communications
Publication Date: 2002/12/01
Vol. E85-B  No. 12 ; pp. 2588-2600
Type of Manuscript:  Special Section PAPER (Special Issue on Software Defined Radio Technology and Its Applications)
Category: 
Keyword: 
software defined radio (SDR)securityencryptionauthentification
 Summary | Full Text:PDF(949.8KB)

Security Mechanism of Privacy Enhanced Shared File System Suitable for Mobile Access
Atsushi SHIMBO Toshinari TAKAHASHI Masao MUROTA 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 1996/01/25
Vol. E79-A  No. 1 ; pp. 102-109
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: 
Keyword: 
encryptionversion controlfile systemconcurrent editing
 Summary | Full Text:PDF(769.1KB)