Masakatu MORII


Error-Trapping Decoding for Cyclic Codes over Symbol-Pair Read Channels
Makoto TAKITA Masanori HIROTOMO Masakatu MORII 
Publication:   
Publication Date: 2017/12/01
Vol. E100-A  No. 12  pp. 2578-2584
Type of Manuscript:  Special Section PAPER (Special Section on Information Theory and Its Applications)
Category: Coding Theory and Techniques
Keyword: 
symbol-pair read channelpair error correctionerror-trapping decodingcyclic code
 Summary | Full Text:PDF(774.1KB)

Attribute Revocable Attribute-Based Encryption with Forward Secrecy for Fine-Grained Access Control of Shared Data
Yoshiaki SHIRAISHI Kenta NOMURA Masami MOHRI Takeru NARUSE Masakatu MORII 
Publication:   
Publication Date: 2017/10/01
Vol. E100-D  No. 10  pp. 2432-2439
Type of Manuscript:  Special Section PAPER (Special Section on Advanced Log Processing and Office Information Systems)
Category: 
Keyword: 
cryptographic cloud storageciphertext-policy attribute-based encryptionsemantic securityattribute revocationproxy re-encryption
 Summary | Full Text:PDF(802.4KB)

Attribute Revocable Multi-Authority Attribute-Based Encryption with Forward Secrecy for Cloud Storage
Kenta NOMURA Masami MOHRI Yoshiaki SHIRAISHI Masakatu MORII 
Publication:   
Publication Date: 2017/10/01
Vol. E100-D  No. 10  pp. 2420-2431
Type of Manuscript:  Special Section PAPER (Special Section on Advanced Log Processing and Office Information Systems)
Category: 
Keyword: 
ciphertext-policy attribute-based encryptionmultiple key authoritiesattribute revocationforward secrecy
 Summary | Full Text:PDF(1.3MB)

Multi-Group Signature Scheme for Simultaneous Verification by Neighbor Services
Kenta NOMURA Masami MOHRI Yoshiaki SHIRAISHI Masakatu MORII 
Publication:   
Publication Date: 2017/08/01
Vol. E100-D  No. 8  pp. 1770-1779
Type of Manuscript:  Special Section PAPER (Special Section on Information and Communication System Security)
Category: Cryptographic Schemes
Keyword: 
internet of thingslocal broadcastdigital signaturefiat-shamir transformlow energy
 Summary | Full Text:PDF(1018.3KB)

Analysis and Improvements of the Full Spritz Stream Cipher
Subhadeep BANIK Takanori ISOBE Masakatu MORII 
Publication:   
Publication Date: 2017/06/01
Vol. E100-A  No. 6  pp. 1296-1305
Type of Manuscript:  PAPER
Category: Cryptography and Information Security
Keyword: 
RC4Spritzstream ciphershort-term biaslong-term biasdistinguishing attackplaintext recovery attackstate recovery attack
 Summary | Full Text:PDF(870.2KB)

How to Efficiently Exploit Different Types of Biases for Plaintext Recovery of RC4
Yuhei WATANABE Takanori ISOBE Toshihiro OHIGASHI Masakatu MORII 
Publication:   
Publication Date: 2017/03/01
Vol. E100-A  No. 3  pp. 803-810
Type of Manuscript:  PAPER
Category: Cryptography and Information Security
Keyword: 
RC4SSL/TLSplaintext recovery attackkeystream biases
 Summary | Full Text:PDF(937.9KB)

Aesthetic QR Code Based on Modified Systematic Encoding Function
Minoru KURIBAYASHI Masakatu MORII 
Publication:   
Publication Date: 2017/01/01
Vol. E100-D  No. 1  pp. 42-51
Type of Manuscript:  Special Section PAPER (Special Section on Enriched Multimedia —New Technology Trends in Creation, Utilization and Protection of Multimedia Information—)
Category: 
Keyword: 
2-dimensional codeaesthetic codeparity check matrix
 Summary | Full Text:PDF(777KB)

Algebraic Decoding of BCH Codes over Symbol-Pair Read Channels: Cases of Two-Pair and Three-Pair Error Correction
Makoto TAKITA Masanori HIROTOMO Masakatu MORII 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2016/12/01
Vol. E99-A  No. 12  pp. 2179-2191
Type of Manuscript:  Special Section PAPER (Special Section on Information Theory and Its Applications)
Category: Coding Theory and Techniques
Keyword: 
algebraic decodingsymbol-pair read channelpair errorBCH code
 Summary | Full Text:PDF(366KB)

SSL Client Authentication with TPM
Shohei KAKEI Masami MOHRI Yoshiaki SHIRAISHI Masakatu MORII 
Publication:   IEICE TRANSACTIONS on Information and Systems
Publication Date: 2016/04/01
Vol. E99-D  No. 4  pp. 1052-1061
Type of Manuscript:  Special Section PAPER (Special Section on Cyberworlds)
Category: 
Keyword: 
Trusted Platform Modulepublic key certificateOpenIDSSLclient certificate
 Summary | Full Text:PDF(1.8MB)

Efficient Implementations for Practical Linear Cryptanalysis and Its Application to FEAL-8X
Sho SAKIKOYAMA Yosuke TODO Kazumaro AOKI Masakatu MORII 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2016/01/01
Vol. E99-A  No. 1  pp. 31-38
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: 
Keyword: 
linear cryptanalysisFFTFWHTmultiple linear cryptanalysisFEAL-8X
 Summary | Full Text:PDF(1.1MB)

A Decoding Algorithm for Cyclic Codes over Symbol-Pair Read Channels
Makoto TAKITA Masanori HIROTOMO Masakatu MORII 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2015/12/01
Vol. E98-A  No. 12  pp. 2415-2422
Type of Manuscript:  Special Section PAPER (Special Section on Information Theory and Its Applications)
Category: Coding Theory
Keyword: 
symbol-pair read channelcyclic codepair errordecoding algorithm
 Summary | Full Text:PDF(381.6KB)

Syndrome Decoding of Symbol-Pair Codes
Makoto TAKITA Masanori HIROTOMO Masakatu MORII 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2015/12/01
Vol. E98-A  No. 12  pp. 2423-2428
Type of Manuscript:  Special Section PAPER (Special Section on Information Theory and Its Applications)
Category: Coding Theory
Keyword: 
symbol-pair codessyndrome decodingpair errorpair distance
 Summary | Full Text:PDF(358.9KB)

Full Plaintext Recovery Attacks on RC4 Using Multiple Biases
Toshihiro OHIGASHI Takanori ISOBE Yuhei WATANABE Masakatu MORII 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2015/01/01
Vol. E98-A  No. 1  pp. 81-91
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: Symmetric Key Based Cryptography
Keyword: 
RC4stream cipherkeystream biasesplaintext recovery attackguess-and-determine attackbroadcast setting
 Summary | Full Text:PDF(945KB)

A Method for Computing the Weight Spectrum of LDPC Convolutional Codes Based on Circulant Matrices
Masanori HIROTOMO Masakatu MORII 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2014/12/01
Vol. E97-A  No. 12  pp. 2300-2308
Type of Manuscript:  Special Section PAPER (Special Section on Information Theory and Its Applications)
Category: Coding Theory
Keyword: 
LDPC convolutional codesweight spectrumfree distancetree search algorithm
 Summary | Full Text:PDF(399.8KB)

Comprehensive Analysis of Initial Keystream Biases of RC4
Takanori ISOBE Toshihiro OHIGASHI Yuhei WATANABE Masakatu MORII 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2014/01/01
Vol. E97-A  No. 1  pp. 139-151
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: Symmetric Key Based Cryptography
Keyword: 
RC4stream cipherkeystream biasesplaintext recovery attackmultiple key distinguisherkey recovery attackbroadcast setting
 Summary | Full Text:PDF(1.3MB)

Anonymous Authentication Scheme without Verification Table for Wireless Environments
Ryoichi ISAWA Masakatu MORII 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2012/12/01
Vol. E95-A  No. 12  pp. 2488-2492
Type of Manuscript:  LETTER
Category: Cryptography and Information Security
Keyword: 
anonymityauthenticationsecuritywireless communication
 Summary | Full Text:PDF(92.8KB)

On the Probabilistic Computation Method with Reliability for the Weight Distribution of LDPC Codes
Masanori HIROTOMO Masami MOHRI Masakatu MORII 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2012/04/01
Vol. E95-A  No. 4  pp. 790-800
Type of Manuscript:  PAPER
Category: Coding Theory
Keyword: 
LDPC codesweight distributionprobabilistic algorithm
 Summary | Full Text:PDF(814.4KB)

Falsification Attacks against WPA-TKIP in a Realistic Environment
Yosuke TODO Yuki OZAWA Toshihiro OHIGASHI Masakatu MORII 
Publication:   IEICE TRANSACTIONS on Information and Systems
Publication Date: 2012/02/01
Vol. E95-D  No. 2  pp. 588-595
Type of Manuscript:  PAPER
Category: Information Network
Keyword: 
wireless LAN networkWPA-TKIPfalsification attackQoSvulnerability
 Summary | Full Text:PDF(642.8KB)

Cryptanalysis for RC4 and Breaking WEP/WPA-TKIP
Masakatu MORII Yosuke TODO 
Publication:   IEICE TRANSACTIONS on Information and Systems
Publication Date: 2011/11/01
Vol. E94-D  No. 11  pp. 2087-2094
Type of Manuscript:  INVITED PAPER (Special Section on Information and Communication System Security)
Category: 
Keyword: 
wireless LAN networkRC4WEPWPA-TKIPcryptoanalysis
 Summary | Full Text:PDF(505.6KB)

Irreducible m-Term Polynomial and Its Application to Multiplication over GF(2m)
Yuko OZASA Masanori HIROTOMO Masakatu MORII 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2011/03/01
Vol. E94-A  No. 3  pp. 1045-1048
Type of Manuscript:  LETTER
Category: General Fundamentals and Boundaries
Keyword: 
finite fieldmultiplicationpolynomial ring representation
 Summary | Full Text:PDF(85.4KB)

Generalized Classes of Weak Keys on RC4 Using Predictive State
Ryoichi TERAMURA Toshihiro OHIGASHI Hidenori KUWAKADO Masakatu MORII 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2011/01/01
Vol. E94-A  No. 1  pp. 10-18
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: Symmetric Cryptography
Keyword: 
cryptanalysisstream cipherRC4weak keypredictive state
 Summary | Full Text:PDF(630.7KB)

Systematic Generation of Tardos's Fingerprint Codes
Minoru KURIBAYASHI Masakatu MORII 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2010/02/01
Vol. E93-A  No. 2  pp. 508-515
Type of Manuscript:  PAPER
Category: Cryptography and Information Security
Keyword: 
fingerprintingTardos's codechaotic mapcollusion attack
 Summary | Full Text:PDF(568.7KB)

Fast WEP-Key Recovery Attack Using Only Encrypted IP Packets
Ryoichi TERAMURA Yasuo ASAKURA Toshihiro OHIGASHI Hidenori KUWAKADO Masakatu MORII 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2010/01/01
Vol. E93-A  No. 1  pp. 164-171
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: Cryptanalysis
Keyword: 
cryptanalysisRC4WEPIEEE 802.11wireless LANIP packet
 Summary | Full Text:PDF(832.3KB)

A Probabilistic Algorithm for Computing the Weight Distribution of LDPC Codes
Masanori HIROTOMO Masami MOHRI Masakatu MORII 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2009/07/01
Vol. E92-A  No. 7  pp. 1677-1689
Type of Manuscript:  PAPER
Category: Coding Theory
Keyword: 
LDPC codesweight distributionprobabilistic methodminimum distance
 Summary | Full Text:PDF(431.1KB)

A Chosen-IV Key Recovery Attack on Py and Pypy
Takanori ISOBE Toshihiro OHIGASHI Hidenori KUWAKADO Masakatu MORII 
Publication:   IEICE TRANSACTIONS on Information and Systems
Publication Date: 2009/01/01
Vol. E92-D  No. 1  pp. 32-40
Type of Manuscript:  PAPER
Category: Application Information Security
Keyword: 
cryptanalysisstream cipherPyPypyeSTREAMkey recovery attack
 Summary | Full Text:PDF(374.5KB)

Compression Functions Suitable for the Multi-Property-Preserving Transform
Hidenori KUWAKADO Masakatu MORII 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2008/10/01
Vol. E91-A  No. 10  pp. 2851-2859
Type of Manuscript:  Special Section PAPER (Special Section on Information Theory and Its Applications)
Category: Cryptography and Information Security
Keyword: 
compression functionhash functionmulti-property preserving
 Summary | Full Text:PDF(195.8KB)

Reversible Watermark with Large Capacity Based on the Prediction Error Expansion
Minoru KURIBAYASHI Masakatu MORII Hatsukazu TANAKA 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2008/07/01
Vol. E91-A  No. 7  pp. 1780-1790
Type of Manuscript:  PAPER
Category: Cryptography and Information Security
Keyword: 
reversible watermarkprediction errorlocation map
 Summary | Full Text:PDF(630.8KB)

New Weakness in the Key-Scheduling Algorithm of RC4
Toshihiro OHIGASHI Yoshiaki SHIRAISHI Masakatu MORII 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2008/01/01
Vol. E91-A  No. 1  pp. 3-11
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: Symmetric Cryptography
Keyword: 
cryptanalysisstream cipherRC4key scheduling algorithm
 Summary | Full Text:PDF(308.7KB)

Indifferentiability of Single-Block-Length and Rate-1 Compression Functions
Hidenori KUWAKADO Masakatu MORII 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2007/10/01
Vol. E90-A  No. 10  pp. 2301-2308
Type of Manuscript:  PAPER
Category: Information Security
Keyword: 
cryptographyhash functioncompression functionblock cipher
 Summary | Full Text:PDF(223.7KB)

FOREWORD
Masakatu MORII 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2007/01/01
Vol. E90-A  No. 1  pp. 1-1
Type of Manuscript:  FOREWORD
Category: 
Keyword: 
 Summary | Full Text:PDF(55.9KB)

Fingerprinting Protocol Based on Distributed Providers Using Oblivious Transfer
Urara SHINMYO Minoru KURIBAYASHI Masakatu MORII Hatsukazu TANAKA 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2006/10/01
Vol. E89-A  No. 10  pp. 2597-2602
Type of Manuscript:  Special Section PAPER (Special Section on Information Theory and Its Applications)
Category: Cryptography
Keyword: 
fingerprintingdistributed providersoblivious transfer
 Summary | Full Text:PDF(304.2KB)

Internal-State Reconstruction of a Stream Cipher RC4
Yoshiaki SHIRAISHI Toshihiro OHIGASHI Masakatu MORII 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2003/10/01
Vol. E86-A  No. 10  pp. 2636-2638
Type of Manuscript:  Special Section LETTER (Special Section on Information Theory and Its Applications)
Category: Information Security
Keyword: 
stream cipherRC4internal-state reconstruction
 Summary | Full Text:PDF(146.9KB)

A Method for Improving Fast Correlation Attack Using Parity Check Equations Modifications
Youji FUKUTA Yoshiaki SHIRAISHI Masakatu MORII 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2003/08/01
Vol. E86-A  No. 8  pp. 2155-2158
Type of Manuscript:  LETTER
Category: Information Security
Keyword: 
stream ciphernonlinear combiner generatorfast correlation attackparity check equations
 Summary | Full Text:PDF(187.5KB)

Moment Calculating Algorithm for Busy-period of Discrete-time Finite-capacity M/G/1 Type Queue
Chikara OHTA Masakatu MORII 
Publication:   IEICE TRANSACTIONS on Communications
Publication Date: 2002/01/01
Vol. E85-B  No. 1  pp. 293-304
Type of Manuscript:  PAPER
Category: Network
Keyword: 
discrete-time M/G/1 type queuebusy periodmomentsHOL priority control
 Summary | Full Text:PDF(454.1KB)

On Good Convolutional Codes with Optimal Free Distance for Rates 1/2, 1/3 and 1/4
Naoto SONE Masami MOHRI Masakatu MORII Hiroshi SASANO 
Publication:   IEICE TRANSACTIONS on Communications
Publication Date: 2001/01/01
Vol. E84-B  No. 1  pp. 116-119
Type of Manuscript:  LETTER
Category: Fundamental Theories
Keyword: 
convolutional codeoptimum free distance (OFD)minimum free distanceCedervall-Johannesson algorithm
 Summary | Full Text:PDF(120.3KB)

A Probabilistic Algorithm for Determining the Minimum Weight of Cyclic Codes
Masami MOHRI Masakatu MORII 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 1998/10/25
Vol. E81-A  No. 10  pp. 2170-2173
Type of Manuscript:  Special Section LETTER (Special Section on Information Theory and Its Applications)
Category: Coding Theory
Keyword: 
minimum weightcyclic codesprobabilistic algorithm
 Summary | Full Text:PDF(287.9KB)

A Simple Parallel Algorithm for the Ziv-Lempel Encoding
Ken-ichi IWATA Masakatu MORII Tomohiko UYEMATSU Eiji OKAMOTO 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 1998/04/25
Vol. E81-A  No. 4  pp. 709-712
Type of Manuscript:  LETTER
Category: Information Theory and Coding Theory
Keyword: 
parallel encodingsliding-window Ziv-Lempel algorithmlongest-matched stringuniversal data compression
 Summary | Full Text:PDF(300.2KB)

An Efficient Universal Coding Algorithm for Noiseless Channel with Symbols of Unequal Cost
Ken-ichi IWATA Masakatu MORII Tomohiko UYEMATSU 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 1997/11/25
Vol. E80-A  No. 11  pp. 2232-2237
Type of Manuscript:  Special Section PAPER (Special Section on Information Theory and Its Applications)
Category: Source Coding
Keyword: 
noiseless codingadditive cost of code symboluniversally optimal cost codingZiv-Lempel codingVarn coding
 Summary | Full Text:PDF(506.2KB)

New Key Generation Algorithm for RSA Cryptosystem
Ryuichi SAKAI Masakatu MORII Masao KASAHARA 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 1994/01/25
Vol. E77-A  No. 1  pp. 89-97
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: 
Keyword: 
cryptographypublic-key cryptosystemRSAkey generation algorithmprimality test
 Summary | Full Text:PDF(693.6KB)

An Accelerated Solution of Quadratic Equations over GF(2m)
Masakatu MORII Sayaka YOSHIZU 
Publication:   IEICE TRANSACTIONS (1976-1990)
Publication Date: 1990/11/25
Vol. E73-E  No. 11  pp. 1821-1823
Type of Manuscript:  Special Section LETTER (Special Issue on 1990 Autumn Natl. Conv. IEICE)
Category: Information Theory
Keyword: 
 Summary | Full Text:PDF(151.4KB)

Bit-Serial Squarer in Finite Fields with Characteristic 2
Masakatu MORII Yuzo TAKAMATSU 
Publication:   IEICE TRANSACTIONS (1976-1990)
Publication Date: 1990/08/25
Vol. E73-E  No. 8  pp. 1314-1318
Type of Manuscript:  LETTER
Category: Information Theory and Coding Theory
Keyword: 
 Summary | Full Text:PDF(238.8KB)

Efficient Construction of Gate Circuit for Computing Multiplicative Inverses over GF (2m)
Masakatu MORII Masao KASAHARA 
Publication:   IEICE TRANSACTIONS (1976-1990)
Publication Date: 1989/01/25
Vol. E72-E  No. 1  pp. 37-42
Type of Manuscript:  PAPER
Category: Information Theory and Coding Theory
Keyword: 
 Summary | Full Text:PDF(455.7KB)

A Theorem that GF (24m) has no Self-Complementary Normal Bases over GF (2) for Odd m
Masakatu MORII Kyoki IMAMURA 
Publication:   IEICE TRANSACTIONS (1976-1990)
Publication Date: 1984/12/25
Vol. E67-E  No. 12  pp. 655-656
Type of Manuscript:  LETTER
Category: Mathematics
Keyword: 
 Summary | Full Text:PDF(111.8KB)