IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences

Archive Index

Online ISSN : 1745-1337
Volume E103-A No.1  (Publication Date:2020/01/01)
[Whole issue]:PDF (74.1MB)
Previous | 
Next
Special Section on Cryptography and Information Security

pp.1-1  FOREWORD  Open Access Paper
FOREWORD
Atsushi FUJIOKA  
Summary | FreeFull Text:PDF(242.7KB)

pp.2-10  PAPER
Towards Minimizing RAM Requirement for Implementation of Grain-128a on ARM Cortex-M3
Yuhei WATANABE  Hideki YAMAMOTO  Hirotaka YOSHIDA  
Summary | Full Text:PDF (822.7KB) >>
Buy this Article


pp.11-20  PAPER  Open Access Paper
Laser-Induced Controllable Instruction Replacement Fault Attack
Junichi SAKAMOTO  Daisuke FUJIMOTO  Tsutomu MATSUMOTO  
Summary | FreeFull Text:PDF(3.4MB)

pp.21-32  PAPER
Constant-Round Client-Aided Two-Server Secure Comparison Protocol and Its Applications
Hiraku MORITA  Nuttapong ATTRAPADUNG  Tadanori TERUYA  Satsuya OHATA  Koji NUIDA  Goichiro HANAOKA  
Summary | Full Text:PDF (2MB) >>
Buy this Article


pp.33-40  PAPER
Efficient Inner Product Functional Encryption with Full-Hiding Security
Junichi TOMIDA  Masayuki ABE  Tatsuaki OKAMOTO  
Summary | Full Text:PDF (929.4KB) >>
Buy this Article


pp.41-73  PAPER  Open Access Paper
Decentralized Attribute-Based Encryption and Signatures
Tatsuaki OKAMOTO  Katsuyuki TAKASHIMA  
Summary | FreeFull Text:PDF(912.6KB)

pp.74-106  PAPER  Open Access Paper
Expressive Attribute-Based Encryption with Constant-Size Ciphertexts from the Decisional Linear Assumption
Katsuyuki TAKASHIMA  
Summary | FreeFull Text:PDF(676.6KB)

pp.107-113  PAPER
Generic Construction of Adaptively Secure Anonymous Key-Policy Attribute-Based Encryption from Public-Key Searchable Encryption
Junichiro HAYATA  Masahito ISHIZAKA  Yusuke SAKAI  Goichiro HANAOKA  Kanta MATSUURA  
Summary | Full Text:PDF (1.4MB) >>
Buy this Article


pp.114-124  PAPER  Open Access Paper
Searchable Public Key Encryption Supporting Simple Boolean Keywords Search
Yu ZHANG  Yansong ZHAO  Yifan WANG  Yin LI  
Summary | FreeFull Text:PDF(1.8MB)

pp.125-140  PAPER
A Revocable Group Signature Scheme with Scalability from Simple Assumptions
Keita EMURA  Takuya HAYASHI  
Summary | Full Text:PDF (935KB) >>
Buy this Article


pp.141-149  PAPER  Open Access Paper
A Constant-Size Signature Scheme with a Tighter Reduction from the CDH Assumption
Kaisei KAJITA  Kazuto OGAWA  Eiichiro FUJISAKI  
Summary | FreeFull Text:PDF(1MB)

pp.150-164  PAPER
A Setup-Free Threshold Encryption Scheme for the Bitcoin Protocol and Its Applications
Goichiro HANAOKA  Yusuke SAKAI  Toshiya SHIMIZU  Takeshi SHIMOYAMA  SeongHan SHIN  
Summary | Full Text:PDF (1.5MB) >>
Buy this Article


pp.165-172  PAPER
Practical Public-Key Encryption Scheme Tightly Secure in the Random Oracle Model
Yusuke SAKAI  Goichiro HANAOKA  
Summary | Full Text:PDF (782.7KB) >>
Buy this Article


pp.173-182  PAPER  Open Access Paper
On the Complexity of the LWR-Solving BKW Algorithm
Hiroki OKADA  Atsushi TAKAYASU  Kazuhide FUKUSHIMA  Shinsaku KIYOMOTO  Tsuyoshi TAKAGI  
Summary | FreeFull Text:PDF(1.1MB)

pp.183-194  PAPER
Verifiable Privacy-Preserving Data Aggregation Protocols
Satoshi YASUDA  Yoshihiro KOSEKI  Yusuke SAKAI  Fuyuki KITAGAWA  Yutaka KAWAI  Goichiro HANAOKA  
Summary | Full Text:PDF (1.8MB) >>
Buy this Article


pp.195-211  PAPER  Open Access Paper
Fully Homomorphic Encryption Scheme Based on Decomposition Ring
Seiko ARITA  Sari HANDA  
Summary | FreeFull Text:PDF(809.6KB)

pp.212-214  LETTER
Security of Related-Key Differential Attacks on TWINE, Revisited
Kosei SAKAMOTO  Kazuhiko MINEMATSU  Nao SHIBATA  Maki SHIGERI  Hiroyasu KUBO  Yuki FUNABIKI  Takanori ISOBE  
Summary | Full Text:PDF (143.9KB) >>
Buy this Article


pp.215-220  LETTER  Open Access Paper
Secrecy Rate Optimization for RF Powered Two-Hop Untrusted Relay Networks with Non-Linear EH Model
Xiaochen LIU  Yuanyuan GAO  Nan SHA  Guozhen ZANG  Kui XU  
Summary | FreeFull Text:PDF(327.3KB)

pp.221-224  LETTER
A New Efficient Algorithm for Secure Outsourcing of Modular Exponentiations
Shaojing FU  Yunpeng YU  Ming XU  
Summary | Full Text:PDF (142.2KB) >>
Buy this Article


Special Section on Intelligent Transport Systems

pp.225-225  FOREWORD  Open Access Paper
FOREWORD
Takayoshi YOKOTA  
Summary | FreeFull Text:PDF(240.8KB)

pp.226-230  INVITED PAPER  Open Access Paper
Public Transport Promotion and Mobility-as-a-Service
Koichi SAKAI  
Summary | FreeFull Text:PDF(916.6KB)

pp.231-242  PAPER  Open Access Paper
Attribute-Aware Loss Function for Accurate Semantic Segmentation Considering the Pedestrian Orientations
Mahmud Dwi SULISTIYO  Yasutomo KAWANISHI  Daisuke DEGUCHI  Ichiro IDE  Takatsugu HIRAYAMA  Jiang-Yu ZHENG  Hiroshi MURASE  
Summary | FreeFull Text:PDF(7.2MB)

pp.243-251  PAPER  Open Access Paper
Visible Light V2V Communication and Ranging System Prototypes Using Spread Spectrum Techniques
Akira John SUZUKI  Masahiro YAMAMOTO  Kiyoshi MIZUI  
Summary | FreeFull Text:PDF(3MB)

pp.252-264  PAPER
An Open Multi-Sensor Fusion Toolbox for Autonomous Vehicles
Abraham MONRROY CANO  Eijiro TAKEUCHI  Shinpei KATO  Masato EDAHIRO  
Summary | Full Text:PDF (8.8MB) >>
Buy this Article


pp.265-267  LETTER  Open Access Paper
A Cell Probe-Based Method for Vehicle Speed Estimation
Chi-Hua CHEN  
Summary | FreeFull Text:PDF(642.4KB)

Special Section on Wideband Systems

pp.268-268  FOREWORD  Open Access Paper
FOREWORD
Minoru OKADA  
Summary | FreeFull Text:PDF(263.3KB)

pp.269-277  INVITED PAPER
Accelerating Outdoor UWB — Domestic Regulation Transition and Standardization within IEEE 802.15
Huan-Bang LI  Kenichi TAKIZAWA  Fumihide KOJIMA  
Summary | Full Text:PDF (2.2MB) >>
Buy this Article


pp.278-286  PAPER
Psychological and Physiological Effects of Visible Light Communication Using Versatile CSK Code Patterns
Takamasa SHIMADA  Noriko KONNO  Atsuya YOKOI  Noriharu MIYAHO  
Summary | Full Text:PDF (2.7MB) >>
Buy this Article


pp.287-294  PAPER
Free Space Optical Turbo Coded Communication System with Hybrid PPM-OOK Signaling
Ran SUN  Hiromasa HABUCHI  Yusuke KOZAWA  
Summary | Full Text:PDF (1.7MB) >>
Buy this Article


pp.295-296  LETTER
An Integrated Wideband Operational Transconductance Amplifier with Complementary Slew-Rate Enhancer
Deng-Fong LU  Chin HSIA  Kun-Chu LEE  
Summary | Full Text:PDF (1.7MB) >>
Buy this Article


Regular Section

pp.297-302  PAPER-Analog Signal Processing
Blind Detection Algorithm Based on Spectrum Sharing and Coexistence for Machine-to-Machine Communication
Yun ZHANG  Bingrui LI  Shujuan YU  Meisheng ZHAO  
Summary | Full Text:PDF (1.3MB) >>
Buy this Article


pp.303-312  PAPER-Nonlinear Problems  Open Access Paper
Chaos-Chaos Intermittency Synchronization Controlled by External Feedback Signals in Chua's Circuits
Sou NOBUKAWA  Hirotaka DOHO  Natsusaku SHIBATA  Haruhiko NISHIMURA  Teruya YAMANISHI  
Summary | FreeFull Text:PDF(5.1MB)

pp.313-324  PAPER-Cryptography and Information Security
Security Analysis and Countermeasures of an End-to-End Encryption Scheme of LINE
Takanori ISOBE  Kazuhiko MINEMATSU  
Summary | Full Text:PDF (931.4KB) >>
Buy this Article


pp.325-333  PAPER-Coding Theory
Run-Length Constraint of Cyclic Reverse-Complement and Constant GC-Content DNA Codes
Ramy TAKI ELDIN  Hajime MATSUI  
Summary | Full Text:PDF (773.6KB) >>
Buy this Article


pp.334-345  PAPER-Coding Theory
Decision Feedback Scheme with Criterion LR+Th for the Ensemble of Linear Block Codes
Toshihiro NIINOMI  Hideki YAGI  Shigeichi HIRASAWA  
Summary | Full Text:PDF (962.2KB) >>
Buy this Article


pp.346-355  PAPER-Image  Open Access Paper
Good Group Sparsity Prior for Light Field Interpolation
Shu FUJITA  Keita TAKAHASHI  Toshiaki FUJII  
Summary | FreeFull Text:PDF(13.5MB)

pp.356-360  LETTER-Speech and Hearing
On the Complementary Role of DNN Multi-Level Enhancement for Noisy Robust Speaker Recognition in an I-Vector Framework
Xingyu ZHANG  Xia ZOU  Meng SUN  Penglong WU  Yimin WANG  Jun HE  
Summary | Full Text:PDF (494.1KB) >>
Buy this Article


pp.361-365  LETTER-Digital Signal Processing
Computationally Efficient DOA Estimation for Massive Uniform Linear Array
Wei JHANG  Shiaw-Wu CHEN  Ann-Chen CHANG  
Summary | Full Text:PDF (434.6KB) >>
Buy this Article


pp.366-369  LETTER-Cryptography and Information Security  Open Access Paper
A Note on the Algebraic Immunity of the Enhanced Boolean Functions
Deng TANG  
Summary | FreeFull Text:PDF(267.2KB)

pp.370-375  LETTER-Coding Theory
Galois Hulls of Cyclic Codes over Finite Fields
Yang DING  Xiaohua LU  
Summary | Full Text:PDF (255.8KB) >>
Buy this Article


pp.376-381  LETTER-Communication Theory and Signals  Open Access Paper
CsiNet-Plus Model with Truncation and Noise on CSI Feedback
Feng LIU  Xuecheng HE  Conggai LI  Yanli XU  
Summary | FreeFull Text:PDF(430.5KB)

pp.382-388  LETTER-Communication Theory and Signals
Distributed Collaborative Spectrum Sensing Using 1-Bit Compressive Sensing in Cognitive Radio Networks
Shengnan YAN  Mingxin LIU  Jingjing SI  
Summary | Full Text:PDF (806.1KB) >>
Buy this Article


Previous | 
Next
go to Page Top