Online ISSN : 

IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Volume E87-A No.1  (Publication Date:2004/01/01)
Previous | 
Next
Special Section on Cryptography and Information Security

pp.1-1  FOREWORD
FOREWORD
Koji NAKAO  
Summary | Full Text:PDF >>
Buy this Article


pp.2-9  PAPER-Fundamental
A Note on Transformations of Interactive Proofs that Preserve the Prover's Complexity
Satoshi HADA  
Summary | Full Text:PDF >>
Buy this Article


pp.10-17  PAPER-Fundamental
Analysis of Baby-Step Giant-Step Algorithms for Non-uniform Distributions
Koh-ichi NAGAO  Shigenori UCHIYAMA  Naoki KANAYAMA  Kazuto MATSUO  
Summary | Full Text:PDF >>
Buy this Article


pp.18-27  PAPER-Symmetric Cipher
Optimization for the Algebraic Method and Its Application to an Attack of MISTY1
Yasuo HATANO  Hidema TANAKA  Toshinobu KANEKO  
Summary | Full Text:PDF >>
Buy this Article


pp.28-36  PAPER-Symmetric Cipher
Theoretical Analysis of χ2 Attack on RC6
Masahiko TAKENAKA  Takeshi SHIMOYAMA  Takeshi KOSHIBA  
Summary | Full Text:PDF >>
Buy this Article


pp.37-45  PAPER-Symmetric Cipher
A New Keystream Generator MUGI
Dai WATANABE  Soichi FURUYA  Hirotaka YOSHIDA  Kazuo TAKARAGI  Bart PRENEEL  
Summary | Full Text:PDF >>
Buy this Article


pp.46-53  PAPER-Symmetric Cipher
TMAC: Two-Key CBC MAC
Kaoru KUROSAWA  Tetsu IWATA  
Summary | Full Text:PDF >>
Buy this Article


pp.54-59  PAPER-Symmetric Cipher
Square Hash with a Small Key Size
Swee-Huay HENG  Kaoru KUROSAWA  
Summary | Full Text:PDF >>
Buy this Article


pp.60-66  PAPER-Symmetric Cipher
On the Universal Hash Functions in Luby-Rackoff Cipher
Tetsu IWATA  Kaoru KUROSAWA  
Summary | Full Text:PDF >>
Buy this Article


pp.67-74  PAPER-Symmetric Cipher
On Parallel Hash Functions Based on Block-Ciphers
Toshihiko MATSUO  Kaoru KUROSAWA  
Summary | Full Text:PDF >>
Buy this Article


pp.75-84  PAPER-Asymmetric Cipher
SCA-Resistant and Fast Elliptic Scalar Multiplication Based on wNAF
Katsuyuki OKEYA  Tsuyoshi TAKAGI  
Summary | Full Text:PDF >>
Buy this Article


pp.85-93  PAPER-Asymmetric Cipher
Fast Elliptic Curve Multiplications with SIMD Operations
Tetsuya IZU  Tsuyoshi TAKAGI  
Summary | Full Text:PDF >>
Buy this Article


pp.94-101  PAPER-Asymmetric Cipher
A Fast RSA-Type Public-Key Primitive Modulo pkq Using Hensel Lifting
Tsuyoshi TAKAGI  
Summary | Full Text:PDF >>
Buy this Article


pp.102-109  PAPER-Asymmetric Cipher
A Construction of Public Key Cryptosystem for Realizing Ciphertext of Size 100 Bit and Digital Signature Scheme
Masao KASAHARA  Ryuichi SAKAI  
Summary | Full Text:PDF >>
Buy this Article


pp.110-119  PAPER-Asymmetric Cipher
OAEP-ES--Methodology of Universal Padding Technique--
Yuichi KOMANO  Kazuo OHTA  
Summary | Full Text:PDF >>
Buy this Article


pp.120-130  PAPER-Asymmetric Cipher
Efficient Unconditionally Secure Digital Signatures
Goichiro HANAOKA  Junji SHIKATA  Yuliang ZHENG  Hideki IMAI  
Summary | Full Text:PDF >>
Buy this Article


pp.131-140  PAPER-Asymmetric Cipher
1-out-of-n Signatures from a Variety of Keys
Masayuki ABE  Miyako OHKUBO  Koutarou SUZUKI  
Summary | Full Text:PDF >>
Buy this Article


pp.141-146  PAPER-Protocol
How to Design Efficient Multiple-Use 1-out-n Oblivious Transfer
Kaoru KUROSAWA  Quang Viet DUONG  
Summary | Full Text:PDF >>
Buy this Article


pp.147-151  PAPER-Protocol
k out of n Oblivious Transfer without Random Oracles
Wakaha OGATA  Ryota SASAHARA  
Summary | Full Text:PDF >>
Buy this Article


pp.152-159  PAPER-Protocol
Interaction Key Generation Schemes
Jun ANZAI  Tsutomu MATSUMOTO  
Summary | Full Text:PDF >>
Buy this Article


pp.160-172  PAPER-Applications
Managing Encryption and Key Publication Independently in Digital Rights Management Systems
Goichiro HANAOKA  Kazuto OGAWA  Itsuro MUROTA  Go OHTAKE  Keigo MAJIMA  Seiichi GOHSHI  Kimiyuki OYAMADA  Seiichi NAMBA  Hideki IMAI  
Summary | Full Text:PDF >>
Buy this Article


pp.173-181  PAPER-Applications
An Auction Protocol Preserving Privacy of Losing Bids with a Secure Value Comparison Scheme
Koji CHIDA  Kunio KOBAYASHI  Hikaru MORITA  
Summary | Full Text:PDF >>
Buy this Article


pp.182-189  PAPER-Applications
New Time-Stamping Scheme Using Mutual Communications with Pseudonymous Clients
Akira YAMADA  Shinsaku KIYOMOTO  Toshiaki TANAKA  Koji NAKAO  
Summary | Full Text:PDF >>
Buy this Article


pp.190-203  PAPER-Applications
The Dynamic-Typed Access Matrix Model and Decidability of the Safety Problem
Masakazu SOSHI  Mamoru MAEKAWA  Eiji OKAMOTO  
Summary | Full Text:PDF >>
Buy this Article


pp.204-211  PAPER-Applications
Analysis and Design for Private Message Board Systems
Kenji IMAMOTO  Kouichi SAKURAI  
Summary | Full Text:PDF >>
Buy this Article


pp.212-220  PAPER-Applications
Secure Detection of Watermarks
Jun FURUKAWA  
Summary | Full Text:PDF >>
Buy this Article


pp.221-223  LETTER
A Note on the Lattice Factoring Method
Tetsuya IZU  
Summary | Full Text:PDF >>
Buy this Article


pp.224-225  LETTER
The Evaluation of Davidson's Digital Signature Scheme
Kazuhiro HATTANDA  Shuichi ICHIKAWA  
Summary | Full Text:PDF >>
Buy this Article


pp.226-227  LETTER
Key Substitution Attacks on Some Provably Secure Signature Schemes
Chik-How TAN  
Summary | Full Text:PDF >>
Buy this Article


pp.228-230  LETTER
A Distributed Sign-and-Encryption for Anonymity
DongJin KWAK  SangJae MOON  
Summary | Full Text:PDF >>
Buy this Article


Regular Section

pp.231-242  PAPER-Analog Signal Processing
Coefficients Generation for the 4th-Order Leapfrog Sigma-Delta A/D Converters
Wen-Bin LIN  Bin-Da LIU  
Summary | Full Text:PDF >>
Buy this Article


pp.243-250  PAPER-Systems and Control
Robust Extended Kalman Filtering via Krein Space Estimation
Tae Hoon LEE  Won Sang RA  Seung Hee JIN  Tae Sung YOON  Jin Bae PARK  
Summary | Full Text:PDF >>
Buy this Article


pp.251-257  PAPER-VLSI Design Technology and CAD
Sparse Realization of Passive Reduced-Order Interconnect Models via PRIMA
Yuya MATSUMOTO  Yuichi TANJI  Mamoru TANAKA  
Summary | Full Text:PDF >>
Buy this Article


pp.258-269  PAPER-Computer Graphics
An Efficient Fragment Processing Technique in A-Buffer Implementation
Donghyun KIM  Lee-Sup KIM  
Summary | Full Text:PDF >>
Buy this Article


pp.270-274  LETTER-Digital Signal Processing
A New Method of Noise Variance Estimation from Low-Order Yule-Walker Equations
Jonah GAMBA  Tetsuya SHIMAMURA  
Summary | Full Text:PDF >>
Buy this Article


pp.275-279  LETTER-VLSI Design Technology and CAD
VLSI Architecture for 2-D 3-Level Lifting-Based Discrete Wavelet Transform
Pei-Yin CHEN  
Summary | Full Text:PDF >>
Buy this Article


pp.280-281  LETTER-Information Security
An Approximate Scheme of Oblivious Transfer with Probabilistic Receipt
Shoichi HIROSE  Susumu YOSHIDA  
Summary | Full Text:PDF >>
Buy this Article


pp.282-285  LETTER-Information Security
A Digital Image Watermarking Method Based on Labeled Bisecting Clustering Algorithm
Shu-Chuan CHU  John F. RODDICK  Zhe-Ming LU  Jeng-Shyang PAN  
Summary | Full Text:PDF >>
Buy this Article


pp.286-291  LETTER-Coding Theory
A Generalization of Binary Zero-Correlation Zone Sequence Sets Constructed from Hadamard Matrices
Takafumi HAYASHI  
Summary | Full Text:PDF >>
Buy this Article


Previous | 
Next
go to Page Top