Hideki IMAI


Partially Wildcarded Ciphertext-Policy Attribute-Based Encryption and Its Performance Evaluation
Go OHTAKE Kazuto OGAWA Goichiro HANAOKA Shota YAMADA Kohei KASAMATSU Takashi YAMAKAWA Hideki IMAI 
Publication:   
Publication Date: 2017/09/01
Vol. E100-A  No. 9  pp. 1846-1856
Type of Manuscript:  Special Section PAPER (Special Section on Discrete Mathematics and Its Applications)
Category: 
Keyword: 
attribute-based encryptionciphertext policywildcard
 Summary | Full Text:PDF

How to Make Traitor Tracing Schemes Secure against a Content Comparison Attack in Actual Services
Kazuto OGAWA Goichiro HANAOKA Hideki IMAI 
Publication:   
Publication Date: 2017/01/01
Vol. E100-A  No. 1  pp. 34-49
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: 
Keyword: 
traitor tracingcollusion attackcontent comparisonencodingwatermarkingc-secure code
 Summary | Full Text:PDF

On Finding Secure Domain Parameters Resistant to Cheon's Algorithm
SeongHan SHIN Kazukuni KOBARA Hideki IMAI 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2015/12/01
Vol. E98-A  No. 12  pp. 2456-2470
Type of Manuscript:  Special Section PAPER (Special Section on Information Theory and Its Applications)
Category: Cryptography and Information Security
Keyword: 
elliptic curve domain parametersSDH/related problemsCheon's algorithm
 Summary | Full Text:PDF

A Theoretical Framework for Constructing Matching Algorithms Secure against Wolf Attack
Manabu INUMA Akira OTSUKA Hideki IMAI 
Publication:   IEICE TRANSACTIONS on Information and Systems
Publication Date: 2013/02/01
Vol. E96-D  No. 2  pp. 357-364
Type of Manuscript:  PAPER
Category: Image Recognition, Computer Vision
Keyword: 
biometricswolf attackwolf attack probabilitymatching algorithmsecurity
 Summary | Full Text:PDF

A Numerical Evaluation of Entanglement Sharing Protocols Using Quantum LDPC CSS Codes
Masakazu YOSHIDA Manabu HAGIWARA Takayuki MIYADERA Hideki IMAI 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2012/09/01
Vol. E95-A  No. 9  pp. 1561-1569
Type of Manuscript:  PAPER
Category: Information Theory
Keyword: 
entanglement distillation protocolquantum error-correcting codesquantum low-density parity-check codessum-product decoding
 Summary | Full Text:PDF

Threshold Anonymous Password-Authenticated Key Exchange Secure against Insider Attacks
SeongHan SHIN Kazukuni KOBARA Hideki IMAI 
Publication:   IEICE TRANSACTIONS on Information and Systems
Publication Date: 2011/11/01
Vol. E94-D  No. 11  pp. 2095-2110
Type of Manuscript:  Special Section PAPER (Special Section on Information and Communication System Security)
Category: 
Keyword: 
password-authenticated key exchangepasswordson-line/off-line dictionary attacksanonymityinsider attacksprovable security
 Summary | Full Text:PDF

Secure Broadcast System with Simultaneous Individual Messaging
Arisa FUJII Go OHTAKE Goichiro HANAOKA Nuttapong ATTRAPADUNG Hajime WATANABE Kazuto OGAWA Hideki IMAI 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2011/06/01
Vol. E94-A  No. 6  pp. 1328-1337
Type of Manuscript:  Special Section PAPER (Special Section on Discrete Mathematics and Its Applications)
Category: 
Keyword: 
digital broadcastingcopyright protectionConditional Access System (CAS)broadcast encryption
 Summary | Full Text:PDF

Universally Composable and Statistically Secure Verifiable Secret Sharing Scheme Based on Pre-Distributed Data
Rafael DOWSLEY Jorn MULLER-QUADE Akira OTSUKA Goichiro HANAOKA Hideki IMAI Anderson C.A. NASCIMENTO 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2011/02/01
Vol. E94-A  No. 2  pp. 725-734
Type of Manuscript:  PAPER
Category: Cryptography and Information Security
Keyword: 
verifiable secret sharingdishonest majoritypre-distributed dataunconditional securityuniversal composable
 Summary | Full Text:PDF

Security Analysis of Two Augmented Password-Authenticated Key Exchange Protocols
SeongHan SHIN Kazukuni KOBARA Hideki IMAI 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2010/11/01
Vol. E93-A  No. 11  pp. 2092-2095
Type of Manuscript:  Special Section LETTER (Special Section on Information Theory and Its Applications)
Category: Cryptography and Information Security
Keyword: 
PAKEon-line/off-line dictionary attacksaugmented PAKEserver-compromise impersonation attacksIEEE P1363.2 working group
 Summary | Full Text:PDF

An RSA-Based Leakage-Resilient Authenticated Key Exchange Protocol Secure against Replacement Attacks, and Its Extensions
SeongHan SHIN Kazukuni KOBARA Hideki IMAI 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2010/06/01
Vol. E93-A  No. 6  pp. 1086-1101
Type of Manuscript:  Special Section PAPER (Special Section on Discrete Mathematics and Its Applications)
Category: Cryptography and Information Security
Keyword: 
authenticated key exchangepasswordson-line/off-line dictionary attacksRSAleakage of stored secretsreplacement attacks
 Summary | Full Text:PDF

Dual-Policy Attribute Based Encryption: Simultaneous Access Control with Ciphertext and Key Policies
Nuttapong ATTRAPADUNG Hideki IMAI 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2010/01/01
Vol. E93-A  No. 1  pp. 116-125
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: Secure Protocol
Keyword: 
attribute based encryptionciphertext policykey policy
 Summary | Full Text:PDF

Anonymous Password-Authenticated Key Exchange: New Construction and Its Extensions
SeongHan SHIN Kazukuni KOBARA Hideki IMAI 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2010/01/01
Vol. E93-A  No. 1  pp. 102-115
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: Secure Protocol
Keyword: 
authenticated key exchangepasswordson-line/off-line dictionary attackspassword-authenticated key exchangeanonymityefficiencyprovable security
 Summary | Full Text:PDF

Smallest Size of Circulant Matrix for Regular (3, L) and (4, L) Quasi-Cyclic LDPC Codes with Girth 6
Manabu HAGIWARA Marc P.C. FOSSORIER Takashi KITAGAWA Hideki IMAI 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2009/11/01
Vol. E92-A  No. 11  pp. 2891-2894
Type of Manuscript:  PAPER
Category: Coding Theory
Keyword: 
LDPC codesdifference matrixquasi-cyclic codesregular LDPC codescirculant matrixlower bounds
 Summary | Full Text:PDF

Strong Anonymous Signature
Rui ZHANG Hideki IMAI 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2009/10/01
Vol. E92-A  No. 10  pp. 2487-2491
Type of Manuscript:  Special Section LETTER (Special Section on Information Theory and Its Applications)
Category: Cryptography and Information Security
Keyword: 
anonymous signaturestrong anonymitygeneric and efficient constructions
 Summary | Full Text:PDF

CCA-Secure Public Key Encryption without Group-Dependent Hash Functions
Yang CUI Goichiro HANAOKA Hideki IMAI 
Publication:   IEICE TRANSACTIONS on Information and Systems
Publication Date: 2009/05/01
Vol. E92-D  No. 5  pp. 967-970
Type of Manuscript:  Special Section LETTER (Special Section on Information and Communication System Security)
Category: Cryptographic Techniques
Keyword: 
CCA-secure public-key encryptiongroup-dependent hash
 Summary | Full Text:PDF

A Trade-off Traitor Tracing Scheme
Go OHTAKE Kazuto OGAWA Goichiro HANAOKA Hideki IMAI 
Publication:   IEICE TRANSACTIONS on Information and Systems
Publication Date: 2009/05/01
Vol. E92-D  No. 5  pp. 859-875
Type of Manuscript:  Special Section PAPER (Special Section on Information and Communication System Security)
Category: Contents Protection
Keyword: 
dynamic traitor tracingwatermarkingdigital rights managementcontent distribution
 Summary | Full Text:PDF

Combining Public Key Encryption with Keyword Search and Public Key Encryption
Rui ZHANG Hideki IMAI 
Publication:   IEICE TRANSACTIONS on Information and Systems
Publication Date: 2009/05/01
Vol. E92-D  No. 5  pp. 888-896
Type of Manuscript:  Special Section PAPER (Special Section on Information and Communication System Security)
Category: Cryptographic Techniques
Keyword: 
PEKSPKEPEKS/PKECCA security
 Summary | Full Text:PDF

A Novel Probabilistic Passive Attack on the Protocols HB and HB+
Jose CARRIJO Rafael TONICELLI Hideki IMAI Anderson C.A. NASCIMENTO 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2009/02/01
Vol. E92-A  No. 2  pp. 658-662
Type of Manuscript:  LETTER
Category: Cryptography and Information Security
Keyword: 
authenticationprotocol HB/HB+cryptoanalysis
 Summary | Full Text:PDF

A New Quaternion Design for Space-Time-Polarization Block Code with Full Diversity
Huanfei MA Haibin KAN Hideki IMAI 
Publication:   IEICE TRANSACTIONS on Communications
Publication Date: 2009/02/01
Vol. E92-B  No. 2  pp. 671-674
Type of Manuscript:  LETTER
Category: Wireless Communication Technologies
Keyword: 
MIMOSpace-Time block codeorthogonal designquaternion
 Summary | Full Text:PDF

An Efficient 2-Secure and Short Random Fingerprint Code and Its Security Evaluation
Koji NUIDA Satoshi FUJITSU Manabu HAGIWARA Hideki IMAI Takashi KITAGAWA Kazuto OGAWA Hajime WATANABE 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2009/01/01
Vol. E92-A  No. 1  pp. 197-206
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: Application
Keyword: 
fingerprintc-secure codecollusion attacksecurity analysiswatermarkDRM
 Summary | Full Text:PDF

Formal Security Treatments for IBE-to-Signature Transformation: Relations among Security Notions
Yang CUI Eiichiro FUJISAKI Goichiro HANAOKA Hideki IMAI Rui ZHANG 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2009/01/01
Vol. E92-A  No. 1  pp. 53-66
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: Digital Signature
Keyword: 
identity based encryptiondigital signaturesecurity notions
 Summary | Full Text:PDF

Tag-KEM from Set Partial Domain One-Way Permutations
Masayuki ABE Yang CUI Hideki IMAI Kaoru KUROSAWA 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2009/01/01
Vol. E92-A  No. 1  pp. 42-52
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: Public Key Cryptography
Keyword: 
Tag-KEMhybrid encryptionOAEPSAEP
 Summary | Full Text:PDF

A Secure Construction for Threshold Anonymous Password-Authenticated Key Exchange
SeongHan SHIN Kazukuni KOBARA Hideki IMAI 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2008/11/01
Vol. E91-A  No. 11  pp. 3312-3324
Type of Manuscript:  PAPER
Category: Cryptography and Information Security
Keyword: 
password authenticationkey exchangePAKEanonymityprovable security
 Summary | Full Text:PDF

A New Security Architecture for Personal Networks and Its Performance Evaluation
SeongHan SHIN Hanane FATHI Kazukuni KOBARA Neeli R. PRASAD Hideki IMAI 
Publication:   IEICE TRANSACTIONS on Communications
Publication Date: 2008/07/01
Vol. E91-B  No. 7  pp. 2255-2264
Type of Manuscript:  PAPER
Category: Network
Keyword: 
personal networksleakage of stored secretsauthentication and key exchangeleakage-resilienceforward secrecysecurity architectureperformance evaluation
 Summary | Full Text:PDF

Wolf Attack Probability: A Theoretical Security Measure in Biometric Authentication Systems
Masashi UNE Akira OTSUKA Hideki IMAI 
Publication:   IEICE TRANSACTIONS on Information and Systems
Publication Date: 2008/05/01
Vol. E91-D  No. 5  pp. 1380-1389
Type of Manuscript:  Special Section PAPER (Special Section on Information and Communication System Security)
Category: Biometrics
Keyword: 
biometric authentication systembrute-force attackfinger-vein-pattern based algorithmminutiae-matching algorithmwolf attack probability
 Summary | Full Text:PDF

RSA-Based Password-Authenticated Key Exchange, Revisited
SeongHan SHIN Kazukuni KOBARA Hideki IMAI 
Publication:   IEICE TRANSACTIONS on Information and Systems
Publication Date: 2008/05/01
Vol. E91-D  No. 5  pp. 1424-1438
Type of Manuscript:  Special Section PAPER (Special Section on Information and Communication System Security)
Category: Key Management
Keyword: 
password authenticationkey exchangeRSAon-line/off-line attackse-residue attacksprovable security
 Summary | Full Text:PDF

A Strongly Unforgeable Signature under the CDH Assumption without Collision Resistant Hash Functions
Takahiro MATSUDA Nuttapong ATTRAPADUNG Goichiro HANAOKA Kanta MATSUURA Hideki IMAI 
Publication:   IEICE TRANSACTIONS on Information and Systems
Publication Date: 2008/05/01
Vol. E91-D  No. 5  pp. 1466-1476
Type of Manuscript:  Special Section PAPER (Special Section on Information and Communication System Security)
Category: Cryptographic Techniques
Keyword: 
digital signaturestrong unforgeabilitytarget collision resistant hash functionstandard model
 Summary | Full Text:PDF

Lightweight Privacy-Preserving Authentication Protocols Secure against Active Attack in an Asymmetric Way
Yang CUI Kazukuni KOBARA Kanta MATSUURA Hideki IMAI 
Publication:   IEICE TRANSACTIONS on Information and Systems
Publication Date: 2008/05/01
Vol. E91-D  No. 5  pp. 1457-1465
Type of Manuscript:  Special Section PAPER (Special Section on Information and Communication System Security)
Category: Authentication
Keyword: 
lightweight protocolasymmetric authenticationprivacy-preservingactive attack
 Summary | Full Text:PDF

IVs to Skip for Immunizing WEP against FMS Attack
Kazukuni KOBARA Hideki IMAI 
Publication:   IEICE TRANSACTIONS on Communications
Publication Date: 2008/01/01
Vol. E91-B  No. 1  pp. 164-171
Type of Manuscript:  PAPER
Category: Fundamental Theories for Communications
Keyword: 
RC4WEPIEEE802.11WLANFMS attack
 Summary | Full Text:PDF

Invisibly Sanitizable Digital Signature Scheme
Kunihiko MIYAZAKI Goichiro HANAOKA Hideki IMAI 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2008/01/01
Vol. E91-A  No. 1  pp. 392-402
Type of Manuscript:  PAPER
Category: Cryptography and Information Security
Keyword: 
digital signatureinformation disclosureprivacy issue
 Summary | Full Text:PDF

A Secure Authenticated Key Exchange Protocol for Credential Services
SeongHan SHIN Kazukuni KOBARA Hideki IMAI 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2008/01/01
Vol. E91-A  No. 1  pp. 139-149
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: Protocols
Keyword: 
password authenticationkey exchangeleakage of stored secretsroaming protocolpassword-enabled PKIcredential servicesprovable security
 Summary | Full Text:PDF

Extension of Broadcasting Service by Using Electronic Tokens
Kazuto OGAWA Goichiro HANAOKA Hideki IMAI 
Publication:   IEICE TRANSACTIONS on Information and Systems
Publication Date: 2007/11/01
Vol. E90-D  No. 11  pp. 1741-1750
Type of Manuscript:  PAPER
Category: Contents Technology and Web Information Systems
Keyword: 
content distributiontokenanonymitygroup signatureprivacy preservation
 Summary | Full Text:PDF

Efficient Identity-Based Encryption with Tight Security Reduction
Nuttapong ATTRAPADUNG Jun FURUKAWA Takeshi GOMI Goichiro HANAOKA Hideki IMAI Rui ZHANG 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2007/09/01
Vol. E90-A  No. 9  pp. 1803-1813
Type of Manuscript:  Special Section PAPER (Special Section on Information Theory and Its Applications)
Category: 
Keyword: 
identity based encryptiontight security reduction
 Summary | Full Text:PDF

Key-Insulated Public Key Encryption with Auxiliary Helper Key: Model, Constructions and Formal Security Proofs
Thi Lan Anh PHAN Goichiro HANAOKA Kanta MATSUURA Hideki IMAI 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2007/09/01
Vol. E90-A  No. 9  pp. 1814-1829
Type of Manuscript:  Special Section PAPER (Special Section on Information Theory and Its Applications)
Category: 
Keyword: 
key insulated public key encryptionauxiliary helper keyIND-KE-CCA
 Summary | Full Text:PDF

Birthday Paradox Based Security Analysis of Certain Broadcast Encryption Schemes
Miodrag J. MIHALJEVI Marc P.C. FOSSORIER Hideki IMAI 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2007/06/01
Vol. E90-A  No. 6  pp. 1248-1251
Type of Manuscript:  LETTER
Category: Information Security
Keyword: 
conditional data access controlbroadcast encryptioncryptographic key managementcryptanalysisbirthday paradox
 Summary | Full Text:PDF

Traitor Tracing Scheme Secure against Adaptive Key Exposure and its Application to Anywhere TV Service
Kazuto OGAWA Goichiro HANAOKA Hideki IMAI 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2007/05/01
Vol. E90-A  No. 5  pp. 1000-1011
Type of Manuscript:  Special Section PAPER (Special Section on Discrete Mathematics and Its Applications)
Category: 
Keyword: 
traitor tracingkey exposurekey updatetwo variable-polynomial
 Summary | Full Text:PDF

An Efficient and Leakage-Resilient RSA-Based Authenticated Key Exchange Protocol with Tight Security Reduction
SeongHan SHIN Kazukuni KOBARA Hideki IMAI 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2007/02/01
Vol. E90-A  No. 2  pp. 474-490
Type of Manuscript:  PAPER
Category: Information Security
Keyword: 
authenticated key exchangepasswordson-line and off-line dictionary attacksRSAleakage of stored secretsefficiencyperfect forward secrecy
 Summary | Full Text:PDF

Practical Broadcast Encryption from Graph-Theoretic Techniques and Subset-Incremental-Chain Structure
Nuttapong ATTRAPADUNG Hideki IMAI 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2007/01/01
Vol. E90-A  No. 1  pp. 187-203
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: Application
Keyword: 
broadcast encryptionrevocation scheme
 Summary | Full Text:PDF

Key-Dependent Weak IVs and Weak Keys in WEP--How to Trace Conditions Back to Their Patterns--
Kazukuni KOBARA Hideki IMAI 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2006/08/01
Vol. E89-A  No. 8  pp. 2198-2206
Type of Manuscript:  PAPER
Category: Information Security
Keyword: 
RC4WEPIEEE802.11WLANFMS attack
 Summary | Full Text:PDF

An Efficient Group Signature Scheme from Bilinear Maps
Jun FURUKAWA Hideki IMAI 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2006/05/01
Vol. E89-A  No. 5  pp. 1328-1338
Type of Manuscript:  Special Section PAPER (Special Section on Discrete Mathematics and Its Applications)
Category: 
Keyword: 
group signaturebilinear mapefficient
 Summary | Full Text:PDF

A Provably Secure Refreshable Partially Anonymous Token and Its Applications
Rie SHIGETOMI Akira OTSUKA Jun FURUKAWA Keith MARTIN Hideki IMAI 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2006/05/01
Vol. E89-A  No. 5  pp. 1396-1406
Type of Manuscript:  Special Section PAPER (Special Section on Discrete Mathematics and Its Applications)
Category: 
Keyword: 
anonymous credentialrefreshable tokensanonymityprivacy protection
 Summary | Full Text:PDF

Efficient Algorithms for Tate Pairing
Tetsutaro KOBAYASHI Kazumaro AOKI Hideki IMAI 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2006/01/01
Vol. E89-A  No. 1  pp. 134-143
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: Elliptic Curve Cryptography
Keyword: 
Weil pairingTate pairingelliptic curve cryptosystemfast computation
 Summary | Full Text:PDF

Security Protocols Protection Based on Anomaly Detection
Abdulrahman ALHARBY Hideki IMAI 
Publication:   IEICE TRANSACTIONS on Information and Systems
Publication Date: 2006/01/01
Vol. E89-D  No. 1  pp. 189-200
Type of Manuscript:  Special Section PAPER (Special Section on New Technologies and their Applications of the Internet III)
Category: Intrusion Detection
Keyword: 
intrusion detectionsecurity protocolsanomaly detectiondynamic Bayesian network
 Summary | Full Text:PDF

Flaws in Robust Optimistic Mix-Nets and Stronger Security Notions
Masayuki ABE Hideki IMAI 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2006/01/01
Vol. E89-A  No. 1  pp. 99-105
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: Protocol
Keyword: 
Mix-netanonymitychosen-ciphertext attackssecurity notion
 Summary | Full Text:PDF

Relation between the XL Algorithm and Grobner Basis Algorithms
Makoto SUGITA Mitsuru KAWAZOE Hideki IMAI 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2006/01/01
Vol. E89-A  No. 1  pp. 11-18
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: Symmetric Key Cryptography
Keyword: 
algebraic attacksGrobner basis algorithmF4XL algorithm
 Summary | Full Text:PDF

How to Break COT-Based Fingerprinting Schemes and Design New One
JaeGwi CHOI Goichiro HANAOKA KyungHyune RHEE Hideki IMAI 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2005/10/01
Vol. E88-A  No. 10  pp. 2800-2807
Type of Manuscript:  Special Section PAPER (Special Section on Information Theory and Its Applications)
Category: Cryptography and Information Security
Keyword: 
fingerprintingcommitted oblivious transfer protocoltwo-lock cryptosystem
 Summary | Full Text:PDF

A Flexible-Revocation Scheme for Efficient Public-Key Black-Box Traitor Tracing
Tatsuyuki MATSUSHITA Hideki IMAI 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2005/04/01
Vol. E88-A  No. 4  pp. 1055-1062
Type of Manuscript:  PAPER
Category: Information Security
Keyword: 
public-key traitor tracingblack-box tracingflexible revocation
 Summary | Full Text:PDF

A Simple Leakage-Resilient Authenticated Key Establishment Protocol, Its Extensions, and Applications
SeongHan SHIN Kazukuni KOBARA Hideki IMAI 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2005/03/01
Vol. E88-A  No. 3  pp. 736-754
Type of Manuscript:  PAPER
Category: Information Security
Keyword: 
entropy of passwordson-line and off-line attacksauthenticationkey establishment protocolleakage of stored secretsproactive securityDDH problemstandard model
 Summary | Full Text:PDF

Digitally Signed Document Sanitizing Scheme with Disclosure Condition Control
Kunihiko MIYAZAKI Mitsuru IWAMURA Tsutomu MATSUMOTO Ryoichi SASAKI Hiroshi YOSHIURA Satoru TEZUKA Hideki IMAI 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2005/01/01
Vol. E88-A  No. 1  pp. 239-246
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: Application
Keyword: 
digital signaturedisclosure of official informationprivacy issue
 Summary | Full Text:PDF

Personal Entropy from Graphical Passwords: Methods for Quantification and Practical Key Generation
Masato AKAO Shinji YAMANAKA Goichiro HANAOKA Hideki IMAI 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2004/10/01
Vol. E87-A  No. 10  pp. 2543-2554
Type of Manuscript:  Special Section PAPER (Special Section on Information Theory and Its Applications)
Category: Cryptography and Information Security
Keyword: 
personal entropygraphical passwordsbiometricshumancryptkey generation
 Summary | Full Text:PDF

Information-Theoretically Secure Key Insulated Encryption: Models, Bounds and Constructions
Yumiko HANAOKA Goichiro HANAOKA Junji SHIKATA Hideki IMAI 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2004/10/01
Vol. E87-A  No. 10  pp. 2521-2532
Type of Manuscript:  Special Section PAPER (Special Section on Information Theory and Its Applications)
Category: Cryptography and Information Security
Keyword: 
key exposurekey-insulated encryptionunconditional security
 Summary | Full Text:PDF

Unconditionally Secure Authenticated Encryption
Junji SHIKATA Goichiro HANAOKA Yuliang ZHENG Tsutomu MATSUMOTO Hideki IMAI 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2004/05/01
Vol. E87-A  No. 5  pp. 1119-1131
Type of Manuscript:  Special Section LETTER (Special Section on Discrete Mathematics and Its Applications)
Category: 
Keyword: 
unconditional securityencryptionauthenticated encryptionsigncryption
 Summary | Full Text:PDF

Traceability Schemes against Illegal Distribution of Signed Documents
Shoko YONEZAWA Goichiro HANAOKA Junji SHIKATA Hideki IMAI 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2004/05/01
Vol. E87-A  No. 5  pp. 1172-1182
Type of Manuscript:  Special Section LETTER (Special Section on Discrete Mathematics and Its Applications)
Category: 
Keyword: 
signed documentillegal distributiontraceabilitygroup signaturepartially blind signature
 Summary | Full Text:PDF

The Role of Arbiters for Unconditionally Secure Authentication
Goichiro HANAOKA Junji SHIKATA Yumiko HANAOKA Hideki IMAI 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2004/05/01
Vol. E87-A  No. 5  pp. 1132-1140
Type of Manuscript:  Special Section LETTER (Special Section on Discrete Mathematics and Its Applications)
Category: 
Keyword: 
authentication codearbiterunconditional security
 Summary | Full Text:PDF

Managing Encryption and Key Publication Independently in Digital Rights Management Systems
Goichiro HANAOKA Kazuto OGAWA Itsuro MUROTA Go OHTAKE Keigo MAJIMA Seiichi GOHSHI Kimiyuki OYAMADA Seiichi NAMBA Hideki IMAI 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2004/01/01
Vol. E87-A  No. 1  pp. 160-172
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: Applications
Keyword: 
digital rights management systemscopyright protectionsemantic securityadaptive attacks
 Summary | Full Text:PDF

Efficient Unconditionally Secure Digital Signatures
Goichiro HANAOKA Junji SHIKATA Yuliang ZHENG Hideki IMAI 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2004/01/01
Vol. E87-A  No. 1  pp. 120-130
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: Asymmetric Cipher
Keyword: 
digital signatureunconditional security
 Summary | Full Text:PDF

Constructing c-Secure CRT Codes Using Polynomials over Finite Fields
Mira KIM Junji SHIKATA Hirofumi MURATANI Hideki IMAI 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2003/12/01
Vol. E86-A  No. 12  pp. 3259-3266
Type of Manuscript:  PAPER
Category: Information Security
Keyword: 
fingerprintingcollusion attacksChinese remainder theorem (CRT)
 Summary | Full Text:PDF

Performance of SUD and MUD Interference Cancellation Receivers in Single-Cell and Multi-Cell CDMA Systems
Jonas KARLSSON Hideki IMAI 
Publication:   IEICE TRANSACTIONS on Communications
Publication Date: 2003/10/01
Vol. E86-B  No. 10  pp. 2996-3003
Type of Manuscript:  PAPER
Category: Wireless Communication Technology
Keyword: 
interference cancellationcellular systemsCDMA
 Summary | Full Text:PDF

Irregular Low-Density Parity-Check Code Design Based on Euclidean Geometries
Wataru MATSUMOTO Weigang XU Hideki IMAI 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2003/07/01
Vol. E86-A  No. 7  pp. 1820-1834
Type of Manuscript:  PAPER
Category: Coding Theory
Keyword: 
Euclidean geometrylow-density parity-check codeirregular LDPC code
 Summary | Full Text:PDF

CDMA Multi-Cell Performance of Combined Serial Interference Canceller and Normalized Griffiths' Algorithm
Jonas KARLSSON Hideki IMAI 
Publication:   IEICE TRANSACTIONS on Communications
Publication Date: 2003/01/01
Vol. E86-B  No. 1  pp. 162-169
Type of Manuscript:  Special Section PAPER (Special Issue on Multiple Access and Signal Transmission Techniques for Future Mobile Communications)
Category: 
Keyword: 
interference cancellationsingle-user detectormulti-user detectorcellular systemsCDMA
 Summary | Full Text:PDF

Best Truncated and Impossible Differentials of Feistel Block Ciphers with S-D (Substitution and Diffusion) or D-S Round Functions
Makoto SUGITA Kazukuni KOBARA Hideki IMAI 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2003/01/01
Vol. E86-A  No. 1  pp. 2-12
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: Symmetric Ciphers and Hash Functions
Keyword: 
block cipher camelliatruncated differential cryptanalysisimpossible differential cryptanalysis
 Summary | Full Text:PDF

Pretty-Simple Password-Authenticated Key-Exchange Protocol Proven to be Secure in the Standard Model
Kazukuni KOBARA Hideki IMAI 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2002/10/01
Vol. E85-A  No. 10  pp. 2229-2237
Type of Manuscript:  Special Section PAPER (Special Section on Information Theory and Its Applications)
Category: Information Security
Keyword: 
entropy of passwordskey exchangeauthenticationDDH problemstandard model
 Summary | Full Text:PDF

Effect of Noisy Estimation on Turbo-Coded Modulation over Flat Rayleigh Fading Channels
Tadashi MINOWA Hideki IMAI 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2002/10/01
Vol. E85-A  No. 10  pp. 2211-2219
Type of Manuscript:  Special Section PAPER (Special Section on Information Theory and Its Applications)
Category: Coding Theory
Keyword: 
flat-Rayleigh fading channelnoisy channel estimatechannel capacityturbo-coded modulation
 Summary | Full Text:PDF

An Unconditionally Secure Electronic Cash Scheme with Computational Untraceability
Akira OTSUKA Goichiro HANAOKA Junji SHIKATA Hideki IMAI 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2002/01/01
Vol. E85-A  No. 1  pp. 140-148
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: 
Keyword: 
electronic cashinformation theoretic securityunconditionally secure signature
 Summary | Full Text:PDF

Cryptanalysis of TOYOCRYPT-HS1 Stream Cipher
Miodrag J. MIHALJEVIC Hideki IMAI 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2002/01/01
Vol. E85-A  No. 1  pp. 66-73
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: 
Keyword: 
stream cipherkeystream generatorslinear feedback shift registersnonlinear filtercryptanalysis
 Summary | Full Text:PDF

A Traitor Traceable Conference System with Dynamic Sender
Goichiro HANAOKA Junji SHIKATA Yuliang ZHENG Hideki IMAI 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2002/01/01
Vol. E85-A  No. 1  pp. 167-174
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: 
Keyword: 
traitor traceable schemeauthentication schemedynamic senderunconditional security
 Summary | Full Text:PDF

Semantically Secure McEliece Public-Key Cryptosystem
Kazukuni KOBARA Hideki IMAI 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2002/01/01
Vol. E85-A  No. 1  pp. 74-83
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: 
Keyword: 
McEliece public-key cryptosystemsemantic securityprovable securityconversioncoding theory
 Summary | Full Text:PDF

Reliability-Based Decoding Algorithm in Multistage Decoding of Multilevel Codes
Motohiko ISAKA Hideki IMAI 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2001/10/01
Vol. E84-A  No. 10  pp. 2528-2531
Type of Manuscript:  Special Section LETTER (Special Section on Information Theory and Its Applications)
Category: Communication Systems
Keyword: 
multilevel codemultistage decodingpartitioning reliability-based decodingordered statistics
 Summary | Full Text:PDF

A Novel Method of Reducing the Decoding Complexity for High-Rate Turbo Codes
Tadashi MINOWA Hideki IMAI 
Publication:   IEICE TRANSACTIONS on Communications
Publication Date: 2001/08/01
Vol. E84-B  No. 8  pp. 2151-2160
Type of Manuscript:  PAPER
Category: Fundamental Theories
Keyword: 
turbo codehigh-rate convolutional codereduced-complexity decoding
 Summary | Full Text:PDF

Improving the Secure Electronic Transaction Protocol by Using Signcryption
Goichiro HANAOKA Yuliang ZHENG Hideki IMAI 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2001/08/01
Vol. E84-A  No. 8  pp. 2042-2051
Type of Manuscript:  PAPER
Category: Information Security
Keyword: 
signcryptionSETcomputational overheadmessage overhead
 Summary | Full Text:PDF

On Decoding Techniques for Cryptanalysis of Certain Encryption Algorithms
Miodrag J. MIHALJEVIC Marc P. C. FOSSORIER Hideki IMAI 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2001/04/01
Vol. E84-A  No. 4  pp. 919-930
Type of Manuscript:  Special Section PAPER (Special Section on Fundamentals of Information and Communications)
Category: 
Keyword: 
decodingcryptanalysiskeystream generatorsfast correlation attack
 Summary | Full Text:PDF

Optimal Unconditionally Secure ID-Based Key Distribution Scheme for Large-Scaled Networks
Goichiro HANAOKA Tsuyoshi NISHIOKA Yuliang ZHENG Hideki IMAI 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2001/01/01
Vol. E84-A  No. 1  pp. 222-230
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: 
Keyword: 
key predistribution systemID-based cryptosystemcollusion attack
 Summary | Full Text:PDF

Development of Cryptology in the Nineties
Hideki IMAI Junji SHIKATA 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2001/01/01
Vol. E84-A  No. 1  pp. 61-67
Type of Manuscript:  INVITED PAPER (Special Section on the 10th Anniversary of the IEICE Transactions of Fundamentals: "Last Decade and 21st Century")
Category: 
Keyword: 
cryptologysecret-key cryptographypublic-key cryptographykey managementhumancrypt
 Summary | Full Text:PDF

A Digital Signature Scheme on ID-Based Key-Sharing Infrastructures
Tsuyoshi NISHIOKA Goichiro HANAOKA Hideki IMAI 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2001/01/01
Vol. E84-A  No. 1  pp. 214-221
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: 
Keyword: 
key predistribution systemID-based cryptosystemdigital signature
 Summary | Full Text:PDF

Hierarchical Coding Based on Multilevel Bit-Interleaved Channels
Motohiko ISAKA Hideki IMAI 
Publication:   IEICE TRANSACTIONS on Communications
Publication Date: 2001/01/01
Vol. E84-B  No. 1  pp. 1-9
Type of Manuscript:  PAPER
Category: Fundamental Theories
Keyword: 
multilevel codingbit-interleavingunequal error protectionmultistage decoding
 Summary | Full Text:PDF

An Algorithm for Cryptanalysis of Certain Keystream Generators Suitable for High-Speed Software and Hardware Implementations
Miodrag J. MIHALJEVIC Marc P. C. FOSSORIER Hideki IMAI 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2001/01/01
Vol. E84-A  No. 1  pp. 311-318
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: 
Keyword: 
stream cipherkeystream generatorslinear feedback shift registersfast correlation attackdecoding
 Summary | Full Text:PDF

An Image Correction Scheme for Video Watermarking Extraction
Akihiko KUSANAGI Hideki IMAI 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2001/01/01
Vol. E84-A  No. 1  pp. 273-280
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: 
Keyword: 
digital watermarkingMPEGimage correctionpatchwork algorithmgeometrical alteration
 Summary | Full Text:PDF

An Optimization of Credit-Based Payment for Electronic Toll Collection Systems
Goichiro HANAOKA Tsuyoshi NISHIOKA Yuliang ZHENG Hideki IMAI 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2000/08/25
Vol. E83-A  No. 8  pp. 1681-1690
Type of Manuscript:  PAPER
Category: Information Security
Keyword: 
credit-based paymentelectronic toll collection systemkey predistribution systemID-based cryptosystemcollusion attack
 Summary | Full Text:PDF

Tradeoffs between Error Performance and Decoding Complexity in Multilevel 8-PSK Codes with UEP Capabilities and Multistage Decoding
Motohiko ISAKA Robert H. MORELOS-ZARAGOZA Marc P. C. FOSSORIER Shu LIN Hideki IMAI 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2000/08/25
Vol. E83-A  No. 8  pp. 1704-1712
Type of Manuscript:  PAPER
Category: Coding Theory
Keyword: 
multilevel codesmultistage decodingtradeoffsdecoding complexityerror performance
 Summary | Full Text:PDF

Modified Aggressive Mode of Internet Key Exchange Resistant against Denial-of-Service Attacks
Kanta MATSUURA Hideki IMAI 
Publication:   IEICE TRANSACTIONS on Information and Systems
Publication Date: 2000/05/25
Vol. E83-D  No. 5  pp. 972-979
Type of Manuscript:  Special Section PAPER (Special Issue on Next Generation Internet Technologies and Their Applications)
Category: 
Keyword: 
InternetsecurityIKEDenial-of-ServiceCookie
 Summary | Full Text:PDF

Realizing the Menezes-Okamoto-Vanstone (MOV) Reduction Efficiently for Ordinary Elliptic Curves
Junji SHIKATA Yuliang ZHENG Joe SUZUKI Hideki IMAI 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2000/04/25
Vol. E83-A  No. 4  pp. 756-763
Type of Manuscript:  PAPER
Category: Information Security
Keyword: 
elliptic curve cryptographyelliptic curve discrete logarithm problemMenezes-Okamoto-Vanstone (MOV) algorithmsupersingular elliptic curvesordinary elliptic curves
 Summary | Full Text:PDF

A Family of Fast Keystream Generators Based on Programmable Linear Cellular Automata over GF (q) and Time-Variant Table
Miodrag MIHALJEVIC Hideki IMAI 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 1999/01/25
Vol. E82-A  No. 1  pp. 32-39
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: 
Keyword: 
data encryptionstream cipherkeystream generatorscellular automata
 Summary | Full Text:PDF

A Family of Fast Dedicated One-Way Hash Functions Based on Linear Cellular Automata over GF(q)
Miodrag MIHALJEVIC Yuliang ZHENG Hideki IMAI 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 1999/01/25
Vol. E82-A  No. 1  pp. 40-47
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: 
Keyword: 
information integritycryptographic hash-functionscellular automata
 Summary | Full Text:PDF

Coded Modulation for Satellite Broadcasting Based on Unconventional Partitionings
Motohiko ISAKA Robert H. MORELOS-ZARAGOZA Marc P. C. FOSSORIER Shu LIN Hideki IMAI 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 1998/10/25
Vol. E81-A  No. 10  pp. 2055-2063
Type of Manuscript:  Special Section PAPER (Special Section on Information Theory and Its Applications)
Category: Coded Modulation
Keyword: 
block coded modulationmultistage decodingunequal error protectionunconventional partitioningssatellite broadcasting
 Summary | Full Text:PDF

FOREWORD
Shojiro SAKATA Hideki IMAI 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 1997/11/25
Vol. E80-A  No. 11  pp. 2051-2051
Type of Manuscript:  FOREWORD
Category: 
Keyword: 
 Summary | Full Text:PDF

Block Coding Scheme Based on Complementary Sequences for Multicarrier Signals
Hideki OCHIAI Hideki IMAI 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 1997/11/25
Vol. E80-A  No. 11  pp. 2136-2143
Type of Manuscript:  Special Section PAPER (Special Section on Information Theory and Its Applications)
Category: Communications/Coded Modulation/Spread Spectrum
Keyword: 
multicarrier modulationmultiphase complementary sequencepeak to average power ratioblock coding
 Summary | Full Text:PDF

Multi-Dimensional Turbo Codes: Performance and Simplified Decoding Structure
Jifeng LI Hideki IMAI 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 1997/11/25
Vol. E80-A  No. 11  pp. 2089-2094
Type of Manuscript:  Special Section PAPER (Special Section on Information Theory and Its Applications)
Category: Coding Theory
Keyword: 
multi-dimensional turbo codeiterative decodingMAP algorithminterleaver
 Summary | Full Text:PDF

On Strictly Geometrically Uniform Codes: Construction and New Codes
Oscar Yassuo TAKESHITA Hideki IMAI 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 1997/03/25
Vol. E80-A  No. 3  pp. 590-597
Type of Manuscript:  PAPER
Category: Information Theory and Coding Theory
Keyword: 
geometrically uniform codesgroup codestrellis code
 Summary | Full Text:PDF

Viterbi Decoding Considering Synchronization Errors
Takuo MORI Hideki IMAI 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 1996/09/25
Vol. E79-A  No. 9  pp. 1324-1329
Type of Manuscript:  Special Section PAPER (Special Section on Information Theory and Its Applications)
Category: Coding Theory
Keyword: 
synchronization errorinsertion/deletion errorViterbi decodingLevenshtein distance
 Summary | Full Text:PDF

Coded Modulation for Satellite Digital Video Broadcasting
Robert MORELOS-ZARAGOZA Oscar Yassuo TAKESHITA Hideki IMAI 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 1996/09/25
Vol. E79-A  No. 9  pp. 1355-1360
Type of Manuscript:  Special Section PAPER (Special Section on Information Theory and Its Applications)
Category: Coded Modulation
Keyword: 
coded modulationdigital videosatellite broadcasting
 Summary | Full Text:PDF

MFSK/FH-CDMA System with Two-Stage Address Coding and Error Correcting Coding and Decoding
Weidong MAO Ryuji KOHNO Hideki IMAI 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 1995/09/25
Vol. E78-A  No. 9  pp. 1117-1126
Type of Manuscript:  Special Section PAPER (Special Section on Information Theory and Its Applications)
Category: 
Keyword: 
two-stage codingMFSKFH-CDMAaddress codemulti-user detectionerasure decoding
 Summary | Full Text:PDF

A Simple Method to Control Indirect Information Flows
Satoshi OZAKI Tsutomu MATSUMOTO Hideki IMAI 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 1994/11/25
Vol. E77-A  No. 11  pp. 1938-1941
Type of Manuscript:  Special Section LETTER (Special Section of Letters Selected from the 1994 IEICE Spring Conference)
Category: 
Keyword: 
access controlflow controlinformation flowinformation securityUNIX
 Summary | Full Text:PDF

Variable Error Controlling Schemes for Intelligent Error Controlling Systems
Taroh SASAKI Ryuji KOHNO Hideki IMAI 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 1994/08/25
Vol. E77-A  No. 8  pp. 1281-1288
Type of Manuscript:  Special Section PAPER (Special Section on Information Theory and Its Applications)
Category: 
Keyword: 
error correcting codesunequal error protectionvariable error controlimportanceintelligent communication
 Summary | Full Text:PDF

Multilevel RLL (D,K,l) Constrained Sequences
Oscar Yassuo TAKESHITA Ryuji KOHNO Hideki IMAI 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 1994/08/25
Vol. E77-A  No. 8  pp. 1238-1245
Type of Manuscript:  Special Section PAPER (Special Section on Information Theory and Its Applications)
Category: 
Keyword: 
runlength limited sequencesrecording signalschannel capacitypower spectra density
 Summary | Full Text:PDF

An Error-Controlling Scheme according to the Importance of Individual Segments of Model-Based Coded Facial Images
Noriko SUZUKI Taroh SASAKI Ryuji KOHNO Hideki IMAI 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 1994/08/25
Vol. E77-A  No. 8  pp. 1289-1297
Type of Manuscript:  Special Section PAPER (Special Section on Information Theory and Its Applications)
Category: 
Keyword: 
human communicationfacial image codingintelligent error-controllingunequal error protection codesmodel-based coding
 Summary | Full Text:PDF

Adaptive Array Antenna Based on Spatial Spectral Estimation Using Maximum Entropy Method
Minami NAGATSUKA Naoto ISHII Ryuji KOHNO Hideki IMAI 
Publication:   IEICE TRANSACTIONS on Communications
Publication Date: 1994/05/25
Vol. E77-B  No. 5  pp. 624-633
Type of Manuscript:  Special Section PAPER (Special Issue on Adaptive Signal Processing in Mobile Radio Communications)
Category: 
Keyword: 
adaptive array antennamaximum entropy methodspatial samplingtemporal sampling
 Summary | Full Text:PDF

Shared Pseudo-Random Secret Generation Protocols
Manuel CERECEDO Tsutomu MATSUMOTO Hideki IMAI 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 1994/04/25
Vol. E77-A  No. 4  pp. 636-645
Type of Manuscript:  Special Section PAPER (Special Section on Discrete Mathematics and Its Applications)
Category: 
Keyword: 
information securitycryptographypseudo-random number generationsecret sharing schemesnon-interactive secure computation
 Summary | Full Text:PDF

Asymptotic Bounds for Unidirectional Byte Error-Correcting Codes
Yuichi SAITOH Hideki IMAI 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 1993/09/25
Vol. E76-A  No. 9  pp. 1437-1441
Type of Manuscript:  Special Section PAPER (Special Section on Information Theory and Its Applications)
Category: 
Keyword: 
asymptotic bounderror-correction codinggeneralized concatenated codingunidirectional byte errorVarshamov-Gilbert bound
 Summary | Full Text:PDF

A Fast Automatic Fingerprint Identification Method Based on a Weighted-Mean of Binary Image
Yu HE Ryuji KOHNO Hideki IMAI 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 1993/09/25
Vol. E76-A  No. 9  pp. 1469-1482
Type of Manuscript:  Special Section PAPER (Special Section on Information Theory and Its Applications)
Category: 
Keyword: 
automatic fingerprint identificationpattern recognitionweighted-meanoptimizationpersonal identification
 Summary | Full Text:PDF

Implementation of an Industrial R/C System Using a Hybrid DS/FH Spread Spectrum Technique
Atsushi HOSHIKUKI Michio YAMAMOTO Satoru ISHII Ryuji KOHNO Hideki IMAI 
Publication:   IEICE TRANSACTIONS on Communications
Publication Date: 1993/08/25
Vol. E76-B  No. 8  pp. 984-989
Type of Manuscript:  Special Section PAPER (Special Issue on Spread Spectrum Techniques and Applications)
Category: 
Keyword: 
industrial R/C systemhybrid DS/FHDSFHspread spectrum
 Summary | Full Text:PDF

Multihopping and Decoding of Error-Correcting Code for MFSK/FH-SSMA Systems
Tetsuo MABUCHI Ryuji KOHNO Hideki IMAI 
Publication:   IEICE TRANSACTIONS on Communications
Publication Date: 1993/08/25
Vol. E76-B  No. 8  pp. 874-885
Type of Manuscript:  Special Section PAPER (Special Issue on Spread Spectrum Techniques and Applications)
Category: 
Keyword: 
spread spectrum multiple accessfrequency hoppingerror-correcting code
 Summary | Full Text:PDF

Efficient and Secure Multiparty Generation of Digital Signatures Based on Discrete Logarithms
Manuel CERECEDO Tsutomu MATSUMOTO Hideki IMAI 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 1993/04/25
Vol. E76-A  No. 4  pp. 532-545
Type of Manuscript:  Special Section PAPER (Special Section on Discrete Mathematics and Its Applications)
Category: 
Keyword: 
information securitycryptographydigital signaturesmultiparty protocolsnoninteracitve secure computationdiscrete log-based cryptosystems
 Summary | Full Text:PDF

Construction Techniques for Error-Control Runlength-Limited Block Codes
Yuichi SAITOH Takahiro OHNO Hideki IMAI 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 1993/03/25
Vol. E76-A  No. 3  pp. 453-458
Type of Manuscript:  PAPER
Category: Information Theory and Coding Theory
Keyword: 
coding theory(d,k) constraintserror-correction codingerror-detection codingmodulation coding,recording code
 Summary | Full Text:PDF

Adaptive Equalization with Dual Diversity-Combining
Kouei MISAIZU Takashi MATSUOKA Hiroshi OHNISHI Ryuji KOHNO Hideki IMAI 
Publication:   IEICE TRANSACTIONS on Communications
Publication Date: 1993/02/25
Vol. E76-B  No. 2  pp. 131-138
Type of Manuscript:  Special Section PAPER (Special Issue on Land Mobile/Portable Propagation)
Category: 
Keyword: 
adaptive equalizerdual diversity-combiningdigital mobile radio communicationmultipath fading channel
 Summary | Full Text:PDF

Cascaded Co-Channel Interference Cancelling and Diversity Combining for Spread-Spectrum Multi-Access over Multipath Fading Channels
Young C. YOON Ryuji KOHNO Hideki IMAI 
Publication:   IEICE TRANSACTIONS on Communications
Publication Date: 1993/02/25
Vol. E76-B  No. 2  pp. 163-168
Type of Manuscript:  Special Section LETTER (Special Issue on Land Mobile/Portable Propagation)
Category: 
Keyword: 
spread-spectrum multi-accessco-channel interference cancellationdiversity combiningmultipath fading
 Summary | Full Text:PDF

Methods to Securely Realize Caller-Authenticated and Callee-Specified Telephone Calls
Tomoyuki ASANO Tsutomu MATSUMOTO Hideki IMAI 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 1993/01/25
Vol. E76-A  No. 1  pp. 88-95
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: 
Keyword: 
information securitypersonalized telecommunicationcaller authenticationcallee specificationkey predistribution systemcryptography
 Summary | Full Text:PDF

Runlength-Limited Short-Length Codes for Unidirectional-Byte-Error-Control
Yuichi SAITOH Hideki IMAI 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 1992/09/25
Vol. E75-A  No. 9  pp. 1057-1062
Type of Manuscript:  Special Section PAPER (Special Section on Information Theory and Its Applications)
Category: 
Keyword: 
byte errorscoding/decodingerror-correction codingmemory fault-tolerancerecording codeunidirectional error
 Summary | Full Text:PDF

Median Differential Order Statistic Filters
Peiheng QI Ryuji KOHNO Hideki IMAI 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 1992/09/25
Vol. E75-A  No. 9  pp. 1100-1109
Type of Manuscript:  Special Section PAPER (Special Section on Information Theory and Its Applications)
Category: 
Keyword: 
median filterorder statistic filtermedian differential order informationpiecewise linear functionoutput mean square error
 Summary | Full Text:PDF

An Error-Controlling Scheme Based on Different Importance of Segments of a Natural Language
Taroh SASAKI Ryuji KOHNO Hideki IMAI 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 1992/09/25
Vol. E75-A  No. 9  pp. 1076-1086
Type of Manuscript:  Special Section PAPER (Special Section on Information Theory and Its Applications)
Category: 
Keyword: 
intelligent communicationerror-correcting codesnatural language
 Summary | Full Text:PDF

Runlength-Limited Codes which Turn Peak-Shift Errors into Unidirectional Byte Errors
Yuichi SAITOH Hideki IMAI 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 1992/07/25
Vol. E75-A  No. 7  pp. 898-900
Type of Manuscript:  Special Section LETTER (Special Section on the 1992 IEICE Spring Conference)
Category: 
Keyword: 
coding theoryrecording codeerror-correcting codeconcatenated codepeak-shift errorunidirectional byte error
 Summary | Full Text:PDF

A Multi-Purpose Proof System and Its Analysis
Chaosheng SHU Tsutomu MATSUMOTO Hideki IMAI 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 1992/06/25
Vol. E75-A  No. 6  pp. 735-743
Type of Manuscript:  PAPER
Category: Information Security and Cryptography
Keyword: 
identity proofmembership proofzero-knowledge proof
 Summary | Full Text:PDF

Proving Identity in Three Moves
Yuliang ZHENG Tsutomu MATSUMOTO Hideki IMAI 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 1991/11/25
Vol. E74-A  No. 11  pp. 3602-3606
Type of Manuscript:  PAPER
Category: Information Security and Cryptography
Keyword: 
 Summary | Full Text:PDF

Recent Applications of Error-Correcting Codes
Hideki IMAI 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 1991/09/25
Vol. E74-A  No. 9  pp. 2473-2482
Type of Manuscript:  INVITED PAPER (Special Issue on Information Theory and Its Applications)
Category: 
Keyword: 
 Summary | Full Text:PDF

New Decoding Techniques for Punctured Convolutional Codes
Pisit CHARN KEIT KONG Yuichi SAITOH Kazuhiko YAMAGUCHI Hideki IMAI 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 1991/09/25
Vol. E74-A  No. 9  pp. 2571-2578
Type of Manuscript:  Special Section PAPER (Special Issue on Information Theory and Its Applications)
Category: 
Keyword: 
 Summary | Full Text:PDF

New Binary Encoding Schemes of Positive Integers
Yoko MIYAKAWA Yuichi SAITOH Hideki IMAI 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 1991/09/25
Vol. E74-A  No. 9  pp. 2504-2512
Type of Manuscript:  Special Section PAPER (Special Issue on Information Theory and Its Applications)
Category: 
Keyword: 
 Summary | Full Text:PDF

Pseudo-Noise Sequences for Tracking and Data Relay Satellite and Related Systems
Hidenobu FUKUMASA Ryuji HOHNO Hideki IMAI 
Publication:   IEICE TRANSACTIONS on Communications
Publication Date: 1991/05/25
Vol. E74-B  No. 5  pp. 1137-1144
Type of Manuscript:  Special Section PAPER (Special Issue on Spread Spectrum Techniques and Its Applications)
Category: 
Keyword: 
 Summary | Full Text:PDF

Performance of Multihop Fast Frequency Hopping/Spread Spectrum Multiple Access System in a Selective Fading Channel
Hideya YAMAMURA Ryuji KOHNO Hideki IMAI 
Publication:   IEICE TRANSACTIONS on Communications
Publication Date: 1991/05/25
Vol. E74-B  No. 5  pp. 1145-1154
Type of Manuscript:  Special Section PAPER (Special Issue on Spread Spectrum Techniques and Its Applications)
Category: 
Keyword: 
 Summary | Full Text:PDF

Information Security of Spread Spectrum Systems
Hideki IMAI Ryuji KOHNO Tsutomu MATSUMOTO 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 1991/03/25
Vol. E74-A  No. 3  pp. 488-505
Type of Manuscript:  INVITED PAPER
Category: 
Keyword: 
 Summary | Full Text:PDF

Recent Development of Cryptology in Japan
Hideki IMAI 
Publication:   IEICE TRANSACTIONS (1976-1990)
Publication Date: 1990/07/25
Vol. E73-E  No. 7  pp. 1026-1030
Type of Manuscript:  REVIEW PAPER
Category: 
Keyword: 
 Summary | Full Text:PDF

A Prototype KPS and Its Application--IC Card Based Key Sharing and Cryptographic Communication--
Tsutomu MATSUMOTO Youichi TAKASHIMA Hideki IMAI Minoru SASAKI Hiroharu YOSHIKAWA Shin-ichiro WATANABE 
Publication:   IEICE TRANSACTIONS (1976-1990)
Publication Date: 1990/07/25
Vol. E73-E  No. 7  pp. 1111-1119
Type of Manuscript:  Special Section PAPER (Special Issue on Cryptography and Information Security)
Category: Applications
Keyword: 
 Summary | Full Text:PDF

Connections among Several Versions of One-Way Hash Functions
Yuliang ZHENG Tsutomu MATSUMOTO Hideki IMAI 
Publication:   IEICE TRANSACTIONS (1976-1990)
Publication Date: 1990/07/25
Vol. E73-E  No. 7  pp. 1092-1099
Type of Manuscript:  Special Section PAPER (Special Issue on Cryptography and Information Security)
Category: Authentication Techniques
Keyword: 
 Summary | Full Text:PDF

On Generating Cryptographically Desirable Substitutions
Kwangjo KIM Tsutomu MATSUMOTO Hideki IMAI 
Publication:   IEICE TRANSACTIONS (1976-1990)
Publication Date: 1990/07/25
Vol. E73-E  No. 7  pp. 1031-1035
Type of Manuscript:  Special Section PAPER (Special Issue on Cryptography and Information Security)
Category: Common-Key Systems
Keyword: 
 Summary | Full Text:PDF

Several Theorems on Probabilistic Cryptosystems
Yuliang ZHENG Tsutomu MATSUMOTO Hideki IMAI 
Publication:   IEICE TRANSACTIONS (1976-1990)
Publication Date: 1989/07/25
Vol. E72-E  No. 7  pp. 819-827
Type of Manuscript:  PAPER
Category: Foundations of Data Security
Keyword: 
 Summary | Full Text:PDF

Residuosity Problem and Its Applications to Cryptography
Yuliang ZHENG Tsutomu MATSUMOTO Hideki IMAI 
Publication:   IEICE TRANSACTIONS (1976-1990)
Publication Date: 1988/08/25
Vol. E71-E  No. 8  pp. 759-767
Type of Manuscript:  PAPER
Category: Foundations of Data Security
Keyword: 
 Summary | Full Text:PDF

On Seeking Smart Public-Key-Distribution Systems
Tsutomu MATSUMOTO Youichi TAKASHIMA Hideki IMAI 
Publication:   IEICE TRANSACTIONS (1976-1990)
Publication Date: 1986/02/25
Vol. E69-E  No. 2  pp. 99-106
Type of Manuscript:  PAPER
Category: Information and Communication Theory
Keyword: 
 Summary | Full Text:PDF

A Cryptographically Useful Theorem on the Connection between Uni and Multivariate Polynomials
Tsutomu MATSUMOTO Hideki IMAI Hiroshi HARASHIMA Hiroshi MIYAKAWA 
Publication:   IEICE TRANSACTIONS (1976-1990)
Publication Date: 1985/03/25
Vol. E68-E  No. 3  pp. 139-146
Type of Manuscript:  PAPER
Category: Cryptography
Keyword: 
 Summary | Full Text:PDF

Boolean-Function Representations of a Mapping
Tsutomu MATSUMOTO Hideki IMAI 
Publication:   IEICE TRANSACTIONS (1976-1990)
Publication Date: 1982/06/25
Vol. E65-E  No. 6  pp. 337-344
Type of Manuscript:  PAPER
Category: Computers
Keyword: 
 Summary | Full Text:PDF