Masakatu MORII


Character-Level Convolutional Neural Network for Predicting Severity of Software Vulnerability from Vulnerability Description
Shunta NAKAGAWA Tatsuya NAGAI Hideaki KANEHARA Keisuke FURUMOTO Makoto TAKITA Yoshiaki SHIRAISHI Takeshi TAKAHASHI Masami MOHRI Yasuhiro TAKANO Masakatu MORII 
Publication:   
Publication Date: 2019/09/01
Vol. E102-D  No. 9  pp. 1679-1682
Type of Manuscript:  Special Section LETTER (Special Section on Log Data Usage Technology and Office Information Systems)
Category: Cybersecurity
Keyword: 
CVECVSSConvolutional Neural Network
 Summary | Full Text:PDF

Improved Integral Attack on HIGHT
Yuki FUNABIKI Yosuke TODO Takanori ISOBE Masakatu MORII 
Publication:   
Publication Date: 2019/09/01
Vol. E102-A  No. 9  pp. 1259-1271
Type of Manuscript:  PAPER
Category: Cryptography and Information Security
Keyword: 
block cipherHIGHTintegral attackdivision propertyMILP
 Summary | Full Text:PDF

CCN-Based Vehicle-to-Vehicle Communication in DSRC for Content Distribution in Urban Environments
Haiyan TIAN Yoshiaki SHIRAISHI Masami MOHRI Masakatu MORII 
Publication:   
Publication Date: 2019/09/01
Vol. E102-D  No. 9  pp. 1653-1664
Type of Manuscript:  Special Section PAPER (Special Section on Log Data Usage Technology and Office Information Systems)
Category: System Construction Techniques
Keyword: 
vehicular networksnon-safety applicationdedicated short range communication (DSRC)content-centric network (CCN)in-network caching
 Summary | Full Text:PDF

A Malicious Web Site Identification Technique Using Web Structure Clustering
Tatsuya NAGAI Masaki KAMIZONO Yoshiaki SHIRAISHI Kelin XIA Masami MOHRI Yasuhiro TAKANO Masakatu MORII 
Publication:   
Publication Date: 2019/09/01
Vol. E102-D  No. 9  pp. 1665-1672
Type of Manuscript:  Special Section PAPER (Special Section on Log Data Usage Technology and Office Information Systems)
Category: Cybersecurity
Keyword: 
website structuremalicious websiteexploit kitclustering
 Summary | Full Text:PDF

Authentication Scheme Using Pre-Registered Information on Blockchain
Toshiki TSUCHIDA Makoto TAKITA Yoshiaki SHIRAISHI Masami MOHRI Yasuhiro TAKANO Masakatu MORII 
Publication:   
Publication Date: 2019/09/01
Vol. E102-D  No. 9  pp. 1676-1678
Type of Manuscript:  Special Section LETTER (Special Section on Log Data Usage Technology and Office Information Systems)
Category: System Construction Techniques
Keyword: 
blockchainauthenticationInternet of Thingspseudo-random functionservice cooperation
 Summary | Full Text:PDF

Coded Caching for Hierarchical Networks with a Different Number of Layers
Makoto TAKITA Masanori HIROTOMO Masakatu MORII 
Publication:   
Publication Date: 2018/12/01
Vol. E101-A  No. 12  pp. 2037-2046
Type of Manuscript:  Special Section PAPER (Special Section on Information Theory and Its Applications)
Category: Coding theory and techniques
Keyword: 
coded cachinghierarchical networkcoded multicastcaching scheme
 Summary | Full Text:PDF

Modeling Attack Activity for Integrated Analysis of Threat Information
Daiki ITO Kenta NOMURA Masaki KAMIZONO Yoshiaki SHIRAISHI Yasuhiro TAKANO Masami MOHRI Masakatu MORII 
Publication:   
Publication Date: 2018/11/01
Vol. E101-D  No. 11  pp. 2658-2664
Type of Manuscript:  Special Section PAPER (Special Section on Information and Communication System Security)
Category: Forensics and Risk Analysis
Keyword: 
diamond modelthreat intelligencecyber kill chainincident report
 Summary | Full Text:PDF

Cryptanalysis of Reduced Kreyvium
Yuhei WATANABE Takanori ISOBE Masakatu MORII 
Publication:   
Publication Date: 2018/09/01
Vol. E101-A  No. 9  pp. 1548-1556
Type of Manuscript:  PAPER
Category: Cryptography and Information Security
Keyword: 
differential cryptanalysisconditional differentialhigher-order differentialdistinguisherkey recovery attackKreyvium
 Summary | Full Text:PDF

FCReducer: Locating Symmetric Cryptographic Functions on the Memory
Ryoya FURUKAWA Ryoichi ISAWA Masakatu MORII Daisuke INOUE Koji NAKAO 
Publication:   
Publication Date: 2018/03/01
Vol. E101-D  No. 3  pp. 685-697
Type of Manuscript:  PAPER
Category: Information Network
Keyword: 
malwaredynamic taint analysisbinary analysissandboxcommunity detection
 Summary | Full Text:PDF

On Design of Robust Lightweight Stream Cipher with Short Internal State
Subhadeep BANIK Takanori ISOBE Masakatu MORII 
Publication:   
Publication Date: 2018/01/01
Vol. E101-A  No. 1  pp. 99-109
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: 
Keyword: 
even-mansourlightweightstream ciphershort internal stateTMD tradeoff
 Summary | Full Text:PDF

Error-Trapping Decoding for Cyclic Codes over Symbol-Pair Read Channels
Makoto TAKITA Masanori HIROTOMO Masakatu MORII 
Publication:   
Publication Date: 2017/12/01
Vol. E100-A  No. 12  pp. 2578-2584
Type of Manuscript:  Special Section PAPER (Special Section on Information Theory and Its Applications)
Category: Coding Theory and Techniques
Keyword: 
symbol-pair read channelpair error correctionerror-trapping decodingcyclic code
 Summary | Full Text:PDF

Attribute Revocable Multi-Authority Attribute-Based Encryption with Forward Secrecy for Cloud Storage
Kenta NOMURA Masami MOHRI Yoshiaki SHIRAISHI Masakatu MORII 
Publication:   
Publication Date: 2017/10/01
Vol. E100-D  No. 10  pp. 2420-2431
Type of Manuscript:  Special Section PAPER (Special Section on Advanced Log Processing and Office Information Systems)
Category: 
Keyword: 
ciphertext-policy attribute-based encryptionmultiple key authoritiesattribute revocationforward secrecy
 Summary | Full Text:PDF

Attribute Revocable Attribute-Based Encryption with Forward Secrecy for Fine-Grained Access Control of Shared Data
Yoshiaki SHIRAISHI Kenta NOMURA Masami MOHRI Takeru NARUSE Masakatu MORII 
Publication:   
Publication Date: 2017/10/01
Vol. E100-D  No. 10  pp. 2432-2439
Type of Manuscript:  Special Section PAPER (Special Section on Advanced Log Processing and Office Information Systems)
Category: 
Keyword: 
cryptographic cloud storageciphertext-policy attribute-based encryptionsemantic securityattribute revocationproxy re-encryption
 Summary | Full Text:PDF

Multi-Group Signature Scheme for Simultaneous Verification by Neighbor Services
Kenta NOMURA Masami MOHRI Yoshiaki SHIRAISHI Masakatu MORII 
Publication:   
Publication Date: 2017/08/01
Vol. E100-D  No. 8  pp. 1770-1779
Type of Manuscript:  Special Section PAPER (Special Section on Information and Communication System Security)
Category: Cryptographic Schemes
Keyword: 
internet of thingslocal broadcastdigital signaturefiat-shamir transformlow energy
 Summary | Full Text:PDF

Analysis and Improvements of the Full Spritz Stream Cipher
Subhadeep BANIK Takanori ISOBE Masakatu MORII 
Publication:   
Publication Date: 2017/06/01
Vol. E100-A  No. 6  pp. 1296-1305
Type of Manuscript:  PAPER
Category: Cryptography and Information Security
Keyword: 
RC4Spritzstream ciphershort-term biaslong-term biasdistinguishing attackplaintext recovery attackstate recovery attack
 Summary | Full Text:PDF

How to Efficiently Exploit Different Types of Biases for Plaintext Recovery of RC4
Yuhei WATANABE Takanori ISOBE Toshihiro OHIGASHI Masakatu MORII 
Publication:   
Publication Date: 2017/03/01
Vol. E100-A  No. 3  pp. 803-810
Type of Manuscript:  PAPER
Category: Cryptography and Information Security
Keyword: 
RC4SSL/TLSplaintext recovery attackkeystream biases
 Summary | Full Text:PDF

Aesthetic QR Code Based on Modified Systematic Encoding Function
Minoru KURIBAYASHI Masakatu MORII 
Publication:   
Publication Date: 2017/01/01
Vol. E100-D  No. 1  pp. 42-51
Type of Manuscript:  Special Section PAPER (Special Section on Enriched Multimedia —New Technology Trends in Creation, Utilization and Protection of Multimedia Information—)
Category: 
Keyword: 
2-dimensional codeaesthetic codeparity check matrix
 Summary | Full Text:PDF

Algebraic Decoding of BCH Codes over Symbol-Pair Read Channels: Cases of Two-Pair and Three-Pair Error Correction
Makoto TAKITA Masanori HIROTOMO Masakatu MORII 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2016/12/01
Vol. E99-A  No. 12  pp. 2179-2191
Type of Manuscript:  Special Section PAPER (Special Section on Information Theory and Its Applications)
Category: Coding Theory and Techniques
Keyword: 
algebraic decodingsymbol-pair read channelpair errorBCH code
 Summary | Full Text:PDF

SSL Client Authentication with TPM
Shohei KAKEI Masami MOHRI Yoshiaki SHIRAISHI Masakatu MORII 
Publication:   IEICE TRANSACTIONS on Information and Systems
Publication Date: 2016/04/01
Vol. E99-D  No. 4  pp. 1052-1061
Type of Manuscript:  Special Section PAPER (Special Section on Cyberworlds)
Category: 
Keyword: 
Trusted Platform Modulepublic key certificateOpenIDSSLclient certificate
 Summary | Full Text:PDF

Efficient Implementations for Practical Linear Cryptanalysis and Its Application to FEAL-8X
Sho SAKIKOYAMA Yosuke TODO Kazumaro AOKI Masakatu MORII 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2016/01/01
Vol. E99-A  No. 1  pp. 31-38
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: 
Keyword: 
linear cryptanalysisFFTFWHTmultiple linear cryptanalysisFEAL-8X
 Summary | Full Text:PDF

A Decoding Algorithm for Cyclic Codes over Symbol-Pair Read Channels
Makoto TAKITA Masanori HIROTOMO Masakatu MORII 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2015/12/01
Vol. E98-A  No. 12  pp. 2415-2422
Type of Manuscript:  Special Section PAPER (Special Section on Information Theory and Its Applications)
Category: Coding Theory
Keyword: 
symbol-pair read channelcyclic codepair errordecoding algorithm
 Summary | Full Text:PDF

Syndrome Decoding of Symbol-Pair Codes
Makoto TAKITA Masanori HIROTOMO Masakatu MORII 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2015/12/01
Vol. E98-A  No. 12  pp. 2423-2428
Type of Manuscript:  Special Section PAPER (Special Section on Information Theory and Its Applications)
Category: Coding Theory
Keyword: 
symbol-pair codessyndrome decodingpair errorpair distance
 Summary | Full Text:PDF

Full Plaintext Recovery Attacks on RC4 Using Multiple Biases
Toshihiro OHIGASHI Takanori ISOBE Yuhei WATANABE Masakatu MORII 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2015/01/01
Vol. E98-A  No. 1  pp. 81-91
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: Symmetric Key Based Cryptography
Keyword: 
RC4stream cipherkeystream biasesplaintext recovery attackguess-and-determine attackbroadcast setting
 Summary | Full Text:PDF

A Method for Computing the Weight Spectrum of LDPC Convolutional Codes Based on Circulant Matrices
Masanori HIROTOMO Masakatu MORII 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2014/12/01
Vol. E97-A  No. 12  pp. 2300-2308
Type of Manuscript:  Special Section PAPER (Special Section on Information Theory and Its Applications)
Category: Coding Theory
Keyword: 
LDPC convolutional codesweight spectrumfree distancetree search algorithm
 Summary | Full Text:PDF

Comprehensive Analysis of Initial Keystream Biases of RC4
Takanori ISOBE Toshihiro OHIGASHI Yuhei WATANABE Masakatu MORII 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2014/01/01
Vol. E97-A  No. 1  pp. 139-151
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: Symmetric Key Based Cryptography
Keyword: 
RC4stream cipherkeystream biasesplaintext recovery attackmultiple key distinguisherkey recovery attackbroadcast setting
 Summary | Full Text:PDF

Anonymous Authentication Scheme without Verification Table for Wireless Environments
Ryoichi ISAWA Masakatu MORII 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2012/12/01
Vol. E95-A  No. 12  pp. 2488-2492
Type of Manuscript:  LETTER
Category: Cryptography and Information Security
Keyword: 
anonymityauthenticationsecuritywireless communication
 Summary | Full Text:PDF

On the Probabilistic Computation Method with Reliability for the Weight Distribution of LDPC Codes
Masanori HIROTOMO Masami MOHRI Masakatu MORII 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2012/04/01
Vol. E95-A  No. 4  pp. 790-800
Type of Manuscript:  PAPER
Category: Coding Theory
Keyword: 
LDPC codesweight distributionprobabilistic algorithm
 Summary | Full Text:PDF

Falsification Attacks against WPA-TKIP in a Realistic Environment
Yosuke TODO Yuki OZAWA Toshihiro OHIGASHI Masakatu MORII 
Publication:   IEICE TRANSACTIONS on Information and Systems
Publication Date: 2012/02/01
Vol. E95-D  No. 2  pp. 588-595
Type of Manuscript:  PAPER
Category: Information Network
Keyword: 
wireless LAN networkWPA-TKIPfalsification attackQoSvulnerability
 Summary | Full Text:PDF

Cryptanalysis for RC4 and Breaking WEP/WPA-TKIP
Masakatu MORII Yosuke TODO 
Publication:   IEICE TRANSACTIONS on Information and Systems
Publication Date: 2011/11/01
Vol. E94-D  No. 11  pp. 2087-2094
Type of Manuscript:  INVITED PAPER (Special Section on Information and Communication System Security)
Category: 
Keyword: 
wireless LAN networkRC4WEPWPA-TKIPcryptoanalysis
 Summary | Full Text:PDF

Irreducible m-Term Polynomial and Its Application to Multiplication over GF(2m)
Yuko OZASA Masanori HIROTOMO Masakatu MORII 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2011/03/01
Vol. E94-A  No. 3  pp. 1045-1048
Type of Manuscript:  LETTER
Category: General Fundamentals and Boundaries
Keyword: 
finite fieldmultiplicationpolynomial ring representation
 Summary | Full Text:PDF

Generalized Classes of Weak Keys on RC4 Using Predictive State
Ryoichi TERAMURA Toshihiro OHIGASHI Hidenori KUWAKADO Masakatu MORII 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2011/01/01
Vol. E94-A  No. 1  pp. 10-18
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: Symmetric Cryptography
Keyword: 
cryptanalysisstream cipherRC4weak keypredictive state
 Summary | Full Text:PDF

Systematic Generation of Tardos's Fingerprint Codes
Minoru KURIBAYASHI Masakatu MORII 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2010/02/01
Vol. E93-A  No. 2  pp. 508-515
Type of Manuscript:  PAPER
Category: Cryptography and Information Security
Keyword: 
fingerprintingTardos's codechaotic mapcollusion attack
 Summary | Full Text:PDF

Fast WEP-Key Recovery Attack Using Only Encrypted IP Packets
Ryoichi TERAMURA Yasuo ASAKURA Toshihiro OHIGASHI Hidenori KUWAKADO Masakatu MORII 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2010/01/01
Vol. E93-A  No. 1  pp. 164-171
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: Cryptanalysis
Keyword: 
cryptanalysisRC4WEPIEEE 802.11wireless LANIP packet
 Summary | Full Text:PDF

A Probabilistic Algorithm for Computing the Weight Distribution of LDPC Codes
Masanori HIROTOMO Masami MOHRI Masakatu MORII 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2009/07/01
Vol. E92-A  No. 7  pp. 1677-1689
Type of Manuscript:  PAPER
Category: Coding Theory
Keyword: 
LDPC codesweight distributionprobabilistic methodminimum distance
 Summary | Full Text:PDF

A Chosen-IV Key Recovery Attack on Py and Pypy
Takanori ISOBE Toshihiro OHIGASHI Hidenori KUWAKADO Masakatu MORII 
Publication:   IEICE TRANSACTIONS on Information and Systems
Publication Date: 2009/01/01
Vol. E92-D  No. 1  pp. 32-40
Type of Manuscript:  PAPER
Category: Application Information Security
Keyword: 
cryptanalysisstream cipherPyPypyeSTREAMkey recovery attack
 Summary | Full Text:PDF

Compression Functions Suitable for the Multi-Property-Preserving Transform
Hidenori KUWAKADO Masakatu MORII 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2008/10/01
Vol. E91-A  No. 10  pp. 2851-2859
Type of Manuscript:  Special Section PAPER (Special Section on Information Theory and Its Applications)
Category: Cryptography and Information Security
Keyword: 
compression functionhash functionmulti-property preserving
 Summary | Full Text:PDF

Reversible Watermark with Large Capacity Based on the Prediction Error Expansion
Minoru KURIBAYASHI Masakatu MORII Hatsukazu TANAKA 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2008/07/01
Vol. E91-A  No. 7  pp. 1780-1790
Type of Manuscript:  PAPER
Category: Cryptography and Information Security
Keyword: 
reversible watermarkprediction errorlocation map
 Summary | Full Text:PDF

New Weakness in the Key-Scheduling Algorithm of RC4
Toshihiro OHIGASHI Yoshiaki SHIRAISHI Masakatu MORII 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2008/01/01
Vol. E91-A  No. 1  pp. 3-11
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: Symmetric Cryptography
Keyword: 
cryptanalysisstream cipherRC4key scheduling algorithm
 Summary | Full Text:PDF

Indifferentiability of Single-Block-Length and Rate-1 Compression Functions
Hidenori KUWAKADO Masakatu MORII 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2007/10/01
Vol. E90-A  No. 10  pp. 2301-2308
Type of Manuscript:  PAPER
Category: Information Security
Keyword: 
cryptographyhash functioncompression functionblock cipher
 Summary | Full Text:PDF

FOREWORD
Masakatu MORII 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2007/01/01
Vol. E90-A  No. 1  pp. 1-1
Type of Manuscript:  FOREWORD
Category: 
Keyword: 
 Summary | Full Text:PDF

Fingerprinting Protocol Based on Distributed Providers Using Oblivious Transfer
Urara SHINMYO Minoru KURIBAYASHI Masakatu MORII Hatsukazu TANAKA 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2006/10/01
Vol. E89-A  No. 10  pp. 2597-2602
Type of Manuscript:  Special Section PAPER (Special Section on Information Theory and Its Applications)
Category: Cryptography
Keyword: 
fingerprintingdistributed providersoblivious transfer
 Summary | Full Text:PDF

Internal-State Reconstruction of a Stream Cipher RC4
Yoshiaki SHIRAISHI Toshihiro OHIGASHI Masakatu MORII 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2003/10/01
Vol. E86-A  No. 10  pp. 2636-2638
Type of Manuscript:  Special Section LETTER (Special Section on Information Theory and Its Applications)
Category: Information Security
Keyword: 
stream cipherRC4internal-state reconstruction
 Summary | Full Text:PDF

A Method for Improving Fast Correlation Attack Using Parity Check Equations Modifications
Youji FUKUTA Yoshiaki SHIRAISHI Masakatu MORII 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2003/08/01
Vol. E86-A  No. 8  pp. 2155-2158
Type of Manuscript:  LETTER
Category: Information Security
Keyword: 
stream ciphernonlinear combiner generatorfast correlation attackparity check equations
 Summary | Full Text:PDF

Moment Calculating Algorithm for Busy-period of Discrete-time Finite-capacity M/G/1 Type Queue
Chikara OHTA Masakatu MORII 
Publication:   IEICE TRANSACTIONS on Communications
Publication Date: 2002/01/01
Vol. E85-B  No. 1  pp. 293-304
Type of Manuscript:  PAPER
Category: Network
Keyword: 
discrete-time M/G/1 type queuebusy periodmomentsHOL priority control
 Summary | Full Text:PDF

On Good Convolutional Codes with Optimal Free Distance for Rates 1/2, 1/3 and 1/4
Naoto SONE Masami MOHRI Masakatu MORII Hiroshi SASANO 
Publication:   IEICE TRANSACTIONS on Communications
Publication Date: 2001/01/01
Vol. E84-B  No. 1  pp. 116-119
Type of Manuscript:  LETTER
Category: Fundamental Theories
Keyword: 
convolutional codeoptimum free distance (OFD)minimum free distanceCedervall-Johannesson algorithm
 Summary | Full Text:PDF

A Probabilistic Algorithm for Determining the Minimum Weight of Cyclic Codes
Masami MOHRI Masakatu MORII 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 1998/10/25
Vol. E81-A  No. 10  pp. 2170-2173
Type of Manuscript:  Special Section LETTER (Special Section on Information Theory and Its Applications)
Category: Coding Theory
Keyword: 
minimum weightcyclic codesprobabilistic algorithm
 Summary | Full Text:PDF

A Simple Parallel Algorithm for the Ziv-Lempel Encoding
Ken-ichi IWATA Masakatu MORII Tomohiko UYEMATSU Eiji OKAMOTO 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 1998/04/25
Vol. E81-A  No. 4  pp. 709-712
Type of Manuscript:  LETTER
Category: Information Theory and Coding Theory
Keyword: 
parallel encodingsliding-window Ziv-Lempel algorithmlongest-matched stringuniversal data compression
 Summary | Full Text:PDF

An Efficient Universal Coding Algorithm for Noiseless Channel with Symbols of Unequal Cost
Ken-ichi IWATA Masakatu MORII Tomohiko UYEMATSU 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 1997/11/25
Vol. E80-A  No. 11  pp. 2232-2237
Type of Manuscript:  Special Section PAPER (Special Section on Information Theory and Its Applications)
Category: Source Coding
Keyword: 
noiseless codingadditive cost of code symboluniversally optimal cost codingZiv-Lempel codingVarn coding
 Summary | Full Text:PDF

New Key Generation Algorithm for RSA Cryptosystem
Ryuichi SAKAI Masakatu MORII Masao KASAHARA 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 1994/01/25
Vol. E77-A  No. 1  pp. 89-97
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: 
Keyword: 
cryptographypublic-key cryptosystemRSAkey generation algorithmprimality test
 Summary | Full Text:PDF

An Accelerated Solution of Quadratic Equations over GF(2m)
Masakatu MORII Sayaka YOSHIZU 
Publication:   IEICE TRANSACTIONS (1976-1990)
Publication Date: 1990/11/25
Vol. E73-E  No. 11  pp. 1821-1823
Type of Manuscript:  Special Section LETTER (Special Issue on 1990 Autumn Natl. Conv. IEICE)
Category: Information Theory
Keyword: 
 Summary | Full Text:PDF

Bit-Serial Squarer in Finite Fields with Characteristic 2
Masakatu MORII Yuzo TAKAMATSU 
Publication:   IEICE TRANSACTIONS (1976-1990)
Publication Date: 1990/08/25
Vol. E73-E  No. 8  pp. 1314-1318
Type of Manuscript:  LETTER
Category: Information Theory and Coding Theory
Keyword: 
 Summary | Full Text:PDF

Efficient Construction of Gate Circuit for Computing Multiplicative Inverses over GF (2m)
Masakatu MORII Masao KASAHARA 
Publication:   IEICE TRANSACTIONS (1976-1990)
Publication Date: 1989/01/25
Vol. E72-E  No. 1  pp. 37-42
Type of Manuscript:  PAPER
Category: Information Theory and Coding Theory
Keyword: 
 Summary | Full Text:PDF

A Theorem that GF (24m) has no Self-Complementary Normal Bases over GF (2) for Odd m
Masakatu MORII Kyoki IMAMURA 
Publication:   IEICE TRANSACTIONS (1976-1990)
Publication Date: 1984/12/25
Vol. E67-E  No. 12  pp. 655-656
Type of Manuscript:  LETTER
Category: Mathematics
Keyword: 
 Summary | Full Text:PDF