Online ISSN : 1745-1337
|

IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
|
|
|
Volume E96-A No.1 (Publication Date:2013/01/01)
|
|
|
Special Section on Cryptography and Information Security |
|
|
pp.2-14 PAPER-Symmetric Key Cryptography Improving the Permutation Layer of Type 1, Type 3, Source-Heavy, and Target-Heavy Generalized Feistel Structures Shingo YANAGIHARA Tetsu IWATA
| | Summary | Full Text:PDF
>>
|
| |
pp.15-24 PAPER-Symmetric Key Cryptography On the Construction of Boolean Functions with Optimal Algebraic Immunity Based on Factorization of Numbers of Variables Huajin CHEN Wenfeng Qi Chuangui MA
| | Summary | Full Text:PDF
>>
|
| |
|
|
|
|
|
|
|
|
|
pp.121-130 PAPER-Hash Functions Meet-in-the-Middle Preimage Attacks on AES Hashing Modes and an Application to Whirlpool Yu SASAKI
| | Summary | Full Text:PDF
>>
|
| |
pp.131-140 PAPER-Hash Functions Boomerang Distinguishers on MD4-Based Hash Functions: First Practical Results on Full 5-Pass HAVAL Compression Function Yu SASAKI
| | Summary | Full Text:PDF
>>
|
| |
pp.141-149 PAPER-Hash Functions Open-Key Distinguishers for the Internal Block Cipher of Tweaked Lesamnta Yu SASAKI Kazumaro AOKI
| | Summary | Full Text:PDF
>>
|
| |
|
|
pp.166-170 PAPER-Foundations Multiparty Simultaneous Quantum Identity Authentication Secure against Fake Signal Attacks Atsushi WASEDA
| | Summary | Full Text:PDF
>>
|
| |
|
|
|
|
|
|
|
pp.233-236 LETTER Provable Security against Cryptanalysis with Impossible Differentials Kazumaro AOKI
| | Summary | Full Text:PDF
>>
|
| |
pp.237-241 LETTER A Parallelizable PRF-Based MAC Algorithm: Well beyond the Birthday Bound Kan YASUDA
| | Summary | Full Text:PDF
>>
|
| |
|
|
Special Section on Wideband Systems |
|
|
|
|
|
|
|
|
|
Regular Section |
|
|
pp.304-311 PAPER-Digital Signal Processing Minimizing False Peak Errors in Generalized Cross-Correlation Time Delay Estimation Using Subsample Time Delay Estimation SooHwan CHOI DooSeop EOM
| | Summary | Full Text:PDF
>>
|
| |
|
|
|
|
pp.345-355 PAPER-Concurrent Systems Computation of Sublanguages for Synthesizing Decentralized Supervisors for Timed Discrete Event Systems Masashi NOMURA Shigemasa TAKAI
| | Summary | Full Text:PDF
>>
|
| |
|
pp.360-362 LETTER-Cryptography and Information Security Generalized Construction of Boolean Function with Maximum Algebraic Immunity Using Univariate Polynomial Representation Shaojing FU Chao LI Longjiang QU
| | Summary | Full Text:PDF
>>
|
| |
|
|
pp.373-376 LETTER-Coding Theory Low Complexity Decoder Design for Non-binary LDPC Coded MIMO System Using Quasi-Orthogonal STBC Yier YAN Moon Ho LEE
| | Summary | Full Text:PDF
>>
|
| |
|
|
|
|
|
|
go to Page Top |