IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences

Archive Index

Online ISSN : 1745-1337
Volume E102-A No.1  (Publication Date:2019/01/01)
[Whole issue]:PDF (47.1MB)
Previous | 
Special Section on Cryptography and Information Security

pp.1-2  FOREWORD
FOREWORD
Masayuki ABE  
Summary | Full Text:PDF (257.8KB) >>Buy this Article

pp.3-10  INVITED PAPER  Open Access Paper
Token Model and Interpretation Function for Blockchain-Based FinTech Applications
Kanta MATSUURA  
Summary | FreeFull Text:PDF(528.1KB)

pp.11-16  INVITED PAPER
Towards Reducing the Gap between Cryptography and Its Usage
Kazumaro AOKI  
Summary | Full Text:PDF (453KB) >>Buy this Article

pp.17-26  PAPER
Meet-in-the-Middle Key Recovery Attacks on a Single-Key Two-Round Even-Mansour Cipher
Takanori ISOBE  Kyoji SHIBUTANI  
Summary | Full Text:PDF (946.2KB) >>Buy this Article

pp.27-34  PAPER
On Quantum Related-Key Attacks on Iterated Even-Mansour Ciphers
Akinori HOSOYAMADA  Kazumaro AOKI  
Summary | Full Text:PDF (908KB) >>Buy this Article

pp.35-47  PAPER
Optimizing Online Permutation-Based AE Schemes for Lightweight Applications
Yu SASAKI  Kan YASUDA  
Summary | Full Text:PDF (1.7MB) >>Buy this Article

pp.48-55  PAPER
Multi-Service Oriented Stream Data Synchronization Scheme for Multicore Cipher Chips
Li LI  Fenghua LI  Guozhen SHI  
Summary | Full Text:PDF (1.4MB) >>Buy this Article

pp.56-64  PAPER
An ASIC Crypto Processor for 254-Bit Prime-Field Pairing Featuring Programmable Arithmetic Core Optimized for Quadratic Extension Field
Hiromitsu AWANO  Tadayuki ICHIHASHI  Makoto IKEDA  
Summary | Full Text:PDF (2.7MB) >>Buy this Article

pp.65-73  PAPER  Open Access Paper
Improvement of Anomaly Detection Performance Using Packet Flow Regularity in Industrial Control Networks
Kensuke TAMURA  Kanta MATSUURA  
Summary | FreeFull Text:PDF(978KB)

pp.74-80  PAPER  Open Access Paper
Elliptic Curve Method Using Complex Multiplication Method
Yusuke AIKAWA  Koji NUIDA  Masaaki SHIRASE  
Summary | FreeFull Text:PDF(1MB)

pp.81-98  PAPER
Proxy Re-Encryption That Supports Homomorphic Operations for Re-Encrypted Ciphertexts
Yutaka KAWAI  Takahiro MATSUDA  Takato HIRANO  Yoshihiro KOSEKI  Goichiro HANAOKA  
Summary | Full Text:PDF (1.8MB) >>Buy this Article

pp.99-113  PAPER
How to Watermark Cryptographic Functions by Bilinear Maps
Ryo NISHIMAKI  
Summary | Full Text:PDF (708KB) >>Buy this Article

pp.114-124  PAPER  Open Access Paper
No-Dictionary Searchable Symmetric Encryption
Wakaha OGATA  Kaoru KUROSAWA  
Summary | FreeFull Text:PDF(572.4KB)

pp.125-147  PAPER
On Fail-Stop Signature Schemes with H-EUC Security
Masahiro NOMURA  Katsuhiro NAKAMURA  
Summary | Full Text:PDF (704.3KB) >>Buy this Article

pp.148-151  LETTER
Post-Quantum Security of IGE Mode Encryption in Telegram
Jeeun LEE  Sungsook KIM  Seunghyun LEE  Kwangjo KIM  
Summary | Full Text:PDF (287.6KB) >>Buy this Article

pp.152-154  LETTER
On Searching Maximal-Period Dynamic LFSRs With at Most Four Switches
Lin WANG  Zhi HU  Deng TANG  
Summary | Full Text:PDF (311.4KB) >>Buy this Article

Special Section on Wideband Systems

pp.155-155  FOREWORD
FOREWORD
Fumiaki MAEHARA  
Summary | Full Text:PDF (279.1KB) >>Buy this Article

pp.156-167  INVITED PAPER  Open Access Paper
Practical Performance and Prospect of Underwater Optical Wireless Communication ——Results of Optical Characteristic Measurement at Visible Light Band under Water and Communication Tests with the Prototype Modem in the Sea——
Takao SAWA  Naoki NISHIMURA  Koji TOJO  Shin ITO  
Summary | FreeFull Text:PDF(5MB)

pp.168-176  PAPER
Investigation into Symbol Error Rate of Multilevel Differential Polarization Shift Keying with Estimation of Inclined Polarization Axes
Kouji OHUCHI  Yusuke ITO  
Summary | Full Text:PDF (1.2MB) >>Buy this Article

pp.177-185  PAPER
Filter-and-Forward-Based Full-Duplex Relaying in Frequency-Selective Channels
Shogo KOYANAGI  Teruyuki MIYAJIMA  
Summary | Full Text:PDF (1MB) >>Buy this Article

pp.186-194  PAPER  Open Access Paper
Random Access Control Scheme with Reservation Channel for Capacity Expansion of QZSS Safety Confirmation System
Suguru KAMEDA  Kei OHYA  Tomohide TAKAHASHI  Hiroshi OGUMA  Noriharu SUEMATSU  
Summary | FreeFull Text:PDF(2MB)

pp.195-204  PAPER
Method for Detecting User Positions with Unmanned Aerial Vehicles Based on Doppler Shifts
Hiroyasu ISHIKAWA  Hiroki ONUKI  Hideyuki SHINONAGA  
Summary | Full Text:PDF (3.1MB) >>Buy this Article

pp.205-208  LETTER
Positioning Method for Wireless LAN Based on RTK-GPS
Hiroki MUSHA  Masahiro FUJII  
Summary | Full Text:PDF (463.4KB) >>Buy this Article

pp.209-210  LETTER
A 2-5GHz Wideband Inductorless Low Noise Amplifier for LTE and Intermediate-Frequency-Band 5G Applications
Youming ZHANG  Fengyi HUANG  Lijuan YANG  Xusheng TANG  Zhen CHEN  
Summary | Full Text:PDF (983.3KB) >>Buy this Article

Regular Section

pp.211-218  PAPER-Digital Signal Processing
Phase-Difference Compensation and Nonuniform Pulse Transmission for Accurate Real-Time Moving Object Tracking
Koichi ICHIGE  Nobuya ARAKAWA  Ryo SAITO  Osamu SHIBATA  
Summary | Full Text:PDF (1.3MB) >>Buy this Article

pp.219-226  PAPER-Analog Signal Processing
Circuit Scale Reduced N-Path Filters with Sampling Computation for Increased Harmonic Passband Rejection
Zi Hao ONG  Takahide SATO  Satomi OGAWA  
Summary | Full Text:PDF (1.7MB) >>Buy this Article

pp.227-234  PAPER-Systems and Control
Asymptotic Stabilization of Nonholonomic Four-Wheeled Vehicle with Steering Limitation
Wataru HASHIMOTO  Yuh YAMASHITA  Koichi KOBAYASHI  
Summary | Full Text:PDF (1.4MB) >>Buy this Article

pp.235-241  PAPER-Nonlinear Problems
Multi-Phase Synchronization Phenomena in a Ring-Coupled System of Digital Spiking Neurons
Hiroaki UCHIDA  Toshimichi SAITO  
Summary | Full Text:PDF (4.5MB) >>Buy this Article

pp.242-250  PAPER-Cryptography and Information Security
New Distinguisher on Reduced-Round Keccak Sponge Function
Senyang HUANG  Xiaoyun WANG  Guangwu XU  Meiqin WANG  Jingyuan ZHAO  
Summary | Full Text:PDF (1.4MB) >>Buy this Article

pp.251-269  PAPER-Cryptography and Information Security  Open Access Paper
Fast and Scalable Bilinear-Type Conversion Method for Large Scale Crypto Schemes
Masayuki ABE  Fumitaka HOSHINO  Miyako OHKUBO  
Summary | FreeFull Text:PDF(4.6MB)

pp.270-277  PAPER-Cryptography and Information Security  Open Access Paper
The PRF Security of Compression-Function-Based MAC Functions in the Multi-User Setting
Shoichi HIROSE  
Summary | FreeFull Text:PDF(670.8KB)

pp.278-289  PAPER-Cryptography and Information Security
Improving MDC-4 to Be More Secure
Deukjo HONG  Dong-Chan KIM  Daesung KWON  
Summary | Full Text:PDF (1.2MB) >>Buy this Article

pp.290-295  LETTER-Digital Signal Processing
Zero-Forcing Aided Polarization Dependent Loss Elimination for Polarization Modulation Based Dual-Polarized Satellite Systems
Rugang WANG  Feng ZHOU  Xiaofang YANG  Zhangkai LUO  
Summary | Full Text:PDF (469.1KB) >>Buy this Article

pp.296-299  LETTER-Digital Signal Processing
Online Antenna-Pulse Selection for STAP by Exploiting Structured Covariance Matrix
Fengde JIA  Zishu HE  Yikai WANG  Ruiyang LI  
Summary | Full Text:PDF (308.8KB) >>Buy this Article

pp.300-302  LETTER-Cryptography and Information Security
A New Attack Scheme on the Bitcoin Reward System
Jaewoo SO  
Summary | Full Text:PDF (334.6KB) >>Buy this Article

pp.303-306  LETTER-Information Theory
Some Improved Constructions for Nonbinary Quantum BCH Codes
Nianqi TANG  Zhuo LI  Lijuan XING  Ming ZHANG  Feifei ZHAO  
Summary | Full Text:PDF (252.3KB) >>Buy this Article

pp.307-309  LETTER-Coding Theory
Fast Montgomery-Like Square Root Computation for All Trinomials
Yin LI  Yu ZHANG  Xiaoli GUO  
Summary | Full Text:PDF (224.8KB) >>Buy this Article

pp.310-315  LETTER-Coding Theory
On the Separating Redundancy of the Duals of First-Order Generalized Reed-Muller Codes
Haiyang LIU  Yan LI  Lianrong MA  
Summary | Full Text:PDF (282.7KB) >>Buy this Article

pp.316-319  LETTER-Spread Spectrum Technologies and Applications
Low-Hit-Zone Frequency-Hopping Sequence Sets with Optimal Periodic Partial Hamming Correlation Properties
Limengnan ZHOU  Hongyu HAN  Xing LIU  
Summary | Full Text:PDF (156.5KB) >>Buy this Article

pp.320-323  LETTER-General Fundamentals and Boundaries
Lightweight Computation of Overlaid Traffic Flows by Shortest Origin-Destination Trips
Hiroyuki GOTO  Yohei KAKIMOTO  Yoichi SHIMAKAWA  
Summary | Full Text:PDF (1.3MB) >>Buy this Article

Previous | 
go to Page Top