Online ISSN : 

IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
0.34 1.1
Volume E84-A No.1  (Publication Date:2001/01/01)
Previous | 
Next
Special Section on the 10th Anniversary of the IEICE Transactions of Fundamentals: "Last Decade and 21st Century"

pp.1-1  FOREWORD
FOREWORD
Shoji SHINODA  
Summary | Full Text:PDF (8.9KB) >>
Buy this Article


pp.2-6  ARTICLE
A History of the English IEICE Transactions
Shoji SHINODA  
Summary | Full Text:PDF (132.1KB) >>
Buy this Article


pp.7-13  INVITED PAPER
Research Topics and Results on Nonlinear Theory and Its Applications in Japan
Kiyotaka YAMAMURA  Kazuo HORIUCHI  
Summary | Full Text:PDF (173.5KB) >>
Buy this Article


pp.14-30  INVITED PAPER
New Vistas to the Signal Processing of Nonstationary Time Series via an Operator Algebraic Way
Tosiro KOGA  
Summary | Full Text:PDF (342.3KB) >>
Buy this Article


pp.31-38  INVITED PAPER
Differential and Algebraic Geometry of Multilayer Perceptrons
Shun-ichi AMARI  Tomoko OZEKI  
Summary | Full Text:PDF (385.7KB) >>
Buy this Article


pp.39-47  INVITED PAPER
Principle of Superposition for Realizing Dexterous Pinching Motions of a Pair of Robot Fingers with Soft-Tips
Suguru ARIMOTO  Pham Thuc Anh NGUYEN  
Summary | Full Text:PDF (530KB) >>
Buy this Article


pp.48-54  INVITED PAPER
Parallel Meta-Heuristics and Autonomous Decentralized Combinatorial Optimization
Morikazu NAKAMURA  Kenji ONAGA  
Summary | Full Text:PDF (206.6KB) >>
Buy this Article


pp.55-60  INVITED PAPER
Wireless Past and Future--Evolving Mobile Communications Systems--
Fumiyuki ADACHI  
Summary | Full Text:PDF (489.1KB) >>
Buy this Article


pp.61-67  INVITED PAPER
Development of Cryptology in the Nineties
Hideki IMAI  Junji SHIKATA  
Summary | Full Text:PDF (317.7KB) >>
Buy this Article


pp.68-79  INVITED PAPER
Analog Circuit Designs in the Last Decade and Their Trends toward the 21st Century
Shigetaka TAKAGI  
Summary | Full Text:PDF (499.7KB) >>
Buy this Article


pp.80-90  INVITED PAPER
Digital Signal Processing: Progress over the Last Decade and the Challenges Ahead
Nozomu HAMADA  
Summary | Full Text:PDF (319.4KB) >>
Buy this Article


pp.91-97  INVITED PAPER
Towards the System LSI Design Technology
Hiroto YASUURA  
Summary | Full Text:PDF (377.6KB) >>
Buy this Article


pp.98-106  INVITED PAPER
A Perspective on Next-Generation Ad Hoc Networks--A Proposal for an Open Community Network--
Kenichi MASE  Masakazu SENGOKU  Shoji SHINODA  
Summary | Full Text:PDF (506.6KB) >>
Buy this Article


Special Section on Cryptography and Information Security

pp.107-107  FOREWORD
FOREWORD
Hiroki SHIZUYA  
Summary | Full Text:PDF (141.4KB) >>
Buy this Article


pp.108-113  INVITED PAPER
Cryptographic Works of Dr. Kenji Koyama: In Memoria
Noboru KUNIHIRO  Kazuo OHTA  Tatsuaki OKAMOTO  Routo TERADA  Yukio TSURUOKA  
Summary | Full Text:PDF (216.8KB) >>
Buy this Article


pp.114-119  PAPER
Fast Computation over Elliptic Curves E(Fqn) Based on Optimal Addition Sequences
Yukio TSURUOKA  Kenji KOYAMA  
Summary | Full Text:PDF (352.7KB) >>
Buy this Article


pp.120-129  PAPER
Efficient Scalar Multiplications on Elliptic Curves with Direct Computations of Several Doublings
Yasuyuki SAKAI  Kouichi SAKURAI  
Summary | Full Text:PDF (248.6KB) >>
Buy this Article


pp.130-139  PAPER
A Fast Jacobian Group Arithmetic Scheme for Algebraic Curve Cryptography
Ryuichi HARASAWA  Joe SUZUKI  
Summary | Full Text:PDF (274.1KB) >>
Buy this Article


pp.140-145  PAPER
On the Complexity of Constructing an Elliptic Curve of a Given Order
Masato YAMAMICHI  Masahiro MAMBO  Hiroki SHIZUYA  
Summary | Full Text:PDF (215.8KB) >>
Buy this Article


pp.146-150  PAPER
Speeding up the Lattice Factoring Method
Shigenori UCHIYAMA  Naoki KANAYAMA  
Summary | Full Text:PDF (201KB) >>
Buy this Article


pp.151-156  PAPER
A Way of Making Trapdoor One-Way Functions Trapdoor No-Way
Eikoh CHIDA  Motoji OHMORI  Hiroki SHIZUYA  
Summary | Full Text:PDF (212.5KB) >>
Buy this Article


pp.157-164  PAPER
On Lower Bounds for the Communication Complexity of Private Information Retrieval
Toshiya ITOH  
Summary | Full Text:PDF (230.3KB) >>
Buy this Article


pp.165-171  PAPER
The Decision Diffie-Hellman Assumption and the Quadratic Residuosity Assumption
Taiichi SAITO  Takeshi KOSHIBA  Akihiro YAMAMURA  
Summary | Full Text:PDF (249.1KB) >>
Buy this Article


pp.172-178  PAPER
Relations among Security Goals of Probabilistic Public-Key Cryptosystems
Ako SUZUKI  Yuichi KAJI  Hajime WATANABE  
Summary | Full Text:PDF (270.3KB) >>
Buy this Article


pp.179-187  PAPER
A Chosen-Cipher Secure Encryption Scheme Tightly as Secure as Factoring
Eiichiro FUJISAKI  Tatsuaki OKAMOTO  
Summary | Full Text:PDF (265.5KB) >>
Buy this Article


pp.188-196  PAPER
New Multiplicative Knapsack-Type Public Key Cryptosystems
Shinya KIUCHI  Yasuyuki MURAKAMI  Masao KASAHARA  
Summary | Full Text:PDF (354.2KB) >>
Buy this Article


pp.197-204  PAPER
A Signature Scheme with Message Recovery as Secure as Discrete Logarithm
Masayuki ABE  Tatsuaki OKAMOTO  
Summary | Full Text:PDF (227.2KB) >>
Buy this Article


pp.205-213  PAPER
A Threshold Digital Signature Scheme for a Smart Card Based System
Kunihiko MIYAZAKI  Kazuo TAKARAGI  
Summary | Full Text:PDF (232.8KB) >>
Buy this Article


pp.214-221  PAPER
A Digital Signature Scheme on ID-Based Key-Sharing Infrastructures
Tsuyoshi NISHIOKA  Goichiro HANAOKA  Hideki IMAI  
Summary | Full Text:PDF (223.2KB) >>
Buy this Article


pp.222-230  PAPER
Optimal Unconditionally Secure ID-Based Key Distribution Scheme for Large-Scaled Networks
Goichiro HANAOKA  Tsuyoshi NISHIOKA  Yuliang ZHENG  Hideki IMAI  
Summary | Full Text:PDF (299.1KB) >>
Buy this Article


pp.231-238  PAPER
On the Security of the Okamoto-Tanaka ID-Based Key Exchange Scheme against Active Attacks
Seungjoo KIM  Masahiro MAMBO  Takeshi OKAMOTO  Hiroki SHIZUYA  Mitsuru TADA  Dongho WON  
Summary | Full Text:PDF (288.5KB) >>
Buy this Article


pp.239-246  PAPER
A Flexible Method for Masked Sharing of Group Keys
Jun ANZAI  Natsume MATSUZAKI  Tsutomu MATSUMOTO  
Summary | Full Text:PDF (271.9KB) >>
Buy this Article


pp.247-255  PAPER
A Subscriber-Excluding and Traitor-Tracing Broadcast Distribution System
Maki YOSHIDA  Toru FUJIWARA  
Summary | Full Text:PDF (250.5KB) >>
Buy this Article


pp.256-261  PAPER
On the Practical Secret Sharing Scheme
Wakaha OGATA  
Summary | Full Text:PDF (178KB) >>
Buy this Article


pp.262-272  PAPER
An Analytic Construction of the Visual Secret Sharing Scheme for Color Images
Hiroki KOGA  Mitsugu IWAMOTO  Hirosuke YAMAMOTO  
Summary | Full Text:PDF (348.5KB) >>
Buy this Article


pp.273-280  PAPER
An Image Correction Scheme for Video Watermarking Extraction
Akihiko KUSANAGI  Hideki IMAI  
Summary | Full Text:PDF (1MB) >>
Buy this Article


pp.281-288  PAPER
Secure Protocol to Construct Electronic Trading
Shin'ichiro MATSUO  Hikaru MORITA  
Summary | Full Text:PDF (474.3KB) >>
Buy this Article


pp.289-294  PAPER
Efficient Sealed-Bid Auction by Using One-Way Functions
Kunio KOBAYASHI  Hikaru MORITA  Koutarou SUZUKI  Mitsuari HAKUTA  
Summary | Full Text:PDF (216.9KB) >>
Buy this Article


pp.295-302  PAPER
Access Control Model with Provisional Actions
Michiharu KUDO  Satoshi HADA  
Summary | Full Text:PDF (360.8KB) >>
Buy this Article


pp.303-310  PAPER
On the Randomness of Chambers and Gollmann Keystream Generator
Fumio SATO  Kaoru KUROSAWA  
Summary | Full Text:PDF (231.6KB) >>
Buy this Article


pp.311-318  PAPER
An Algorithm for Cryptanalysis of Certain Keystream Generators Suitable for High-Speed Software and Hardware Implementations
Miodrag J. MIHALJEVIC  Marc P. C. FOSSORIER  Hideki IMAI  
Summary | Full Text:PDF (245.7KB) >>
Buy this Article


pp.319-325  PAPER
Security of E2 against Truncated Differential Cryptanalysis
Shiho MORIAI  Makoto SUGITA  Masayuki KANDA  
Summary | Full Text:PDF (477.2KB) >>
Buy this Article


pp.326-330  LETTER
A New Product-Sum Type Public Key Cryptosystem Based on Reduced Bases
Daisuke SUZUKI  Yasuyuki MURAKAMI  Ryuichi SAKAI  Masao KASAHARA  
Summary | Full Text:PDF (284.3KB) >>
Buy this Article


Regular Section

pp.331-338  PAPER-Reliability, Maintainability and Safety Analysis
A Statistical Estimation Method of Optimal Software Release Timing Applying Auto-Regressive Models
Tadashi DOHI  Hiromichi MORISHITA  Shunji OSAKI  
Summary | Full Text:PDF (239.2KB) >>
Buy this Article


pp.339-346  PAPER-Analog Signal Processing
Novel Gm-C Realizations of nth-Order Filters
Cheng-Chung HSU  Wu-Shiung FENG  
Summary | Full Text:PDF (663.2KB) >>
Buy this Article


pp.347-355  PAPER-Communication Theory and Signals
Reverse Link Capacity of a Wireless Multimedia CDMA System with Power and Processing Gain Control in Conjunction with CCI Cancellers
Nasser HAMAD  Takeshi HASHIMOTO  
Summary | Full Text:PDF (323.7KB) >>
Buy this Article


pp.356-362  PAPER-Neural Networks and Bioengineering
Morse Code Recognition Using Learning Vector Quantization for Persons with Physical Disabilities
Cheng-Hong YANG  
Summary | Full Text:PDF (507.4KB) >>
Buy this Article


pp.363-366  LETTER-Digital Signal Processing
Robust Kalman Filtering with Variable Forgetting Factor against Impulsive Noise
Han-Su KIM  Jun-Seok LIM  SeongJoon BAEK  Koeng-Mo SUNG  
Summary | Full Text:PDF (150.1KB) >>
Buy this Article


pp.367-371  LETTER-Circuit Theory
Acceleration Techniques for Synthesis and Analysis of Time-Domain Models of Interconnects Using FDTD Method
Takayuki WATANABE  Hideki ASAI  
Summary | Full Text:PDF (258.7KB) >>
Buy this Article


pp.372-377  LETTER-VLSI Design Technology and CAD
An Efficient Implementation Method of a Metric Computation Accelerator for Fractal Image Compression Using Reconfigurable Hardware
Hidehisa NAGANO  Akihiro MATSUURA  Akira NAGOYA  
Summary | Full Text:PDF (197.7KB) >>
Buy this Article


pp.378-382  LETTER-Image
A New Approach to 3-D Profilometry for the White Light Interferometric (WLI)
Seok-Moon RYOO  Tae-Sun CHOI  
Summary | Full Text:PDF (220.7KB) >>
Buy this Article


Previous | 
Next
go to Page Top