Keyword : cryptography


An ATM Security Measure for Smart Card Transactions to Prevent Unauthorized Cash Withdrawal
Hisao OGATA Tomoyoshi ISHIKAWA Norichika MIYAMOTO Tsutomu MATSUMOTO 
Publication:   
Publication Date: 2019/03/01
Vol. E102-D  No. 3 ; pp. 559-567
Type of Manuscript:  PAPER
Category: Dependable Computing
Keyword: 
ATMsecuritymalwarecryptographydevice
 Summary | Full Text:PDF

Fast Montgomery-Like Square Root Computation for All Trinomials
Yin LI Yu ZHANG Xiaoli GUO 
Publication:   
Publication Date: 2019/01/01
Vol. E102-A  No. 1 ; pp. 307-309
Type of Manuscript:  LETTER
Category: Coding Theory
Keyword: 
finite fieldsquare rootinversioncryptography
 Summary | Full Text:PDF

Lightweight Security Hardware Architecture Using DWT and AES Algorithms
Ignacio ALGREDO-BADILLO Francisco R. CASTILLO-SORIA Kelsey A. RAMÍREZ-GUTIÉRREZ Luis MORALES-ROSALES Alejandro MEDINA-SANTIAGO Claudia FEREGRINO-URIBE 
Publication:   
Publication Date: 2018/11/01
Vol. E101-D  No. 11 ; pp. 2754-2761
Type of Manuscript:  PAPER
Category: Information Network
Keyword: 
hardwaresteganographycryptographyDWTFPGA
 Summary | Full Text:PDF

Construction of odd-Variable Rotation Symmetric Boolean Functions with Maximum Algebraic Immunity
Shaojing FU Jiao DU Longjiang QU Chao LI 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2016/04/01
Vol. E99-A  No. 4 ; pp. 853-855
Type of Manuscript:  LETTER
Category: Cryptography and Information Security
Keyword: 
cryptographyrotation symmetric Boolean functionsalgebraic immunitynonlinearity
 Summary | Full Text:PDF

Blind Compressive Sensing Detection of Watermark Coded by Limited-Random Sequence
Chao ZHANG Jialuo XIAO Yaxin ZHANG 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2015/08/01
Vol. E98-A  No. 8 ; pp. 1747-1750
Type of Manuscript:  Special Section LETTER (Special Section on Image Media Quality)
Category: 
Keyword: 
limited-random sequencecompressive sensingwatermarkLRScryptographyinformation security
 Summary | Full Text:PDF

Security Analysis of an Efficient Identity-Based Proxy Signature in the Standard Model
Xiaoming HU Yinchun YANG Jian WANG Huajie XU Wenan TAN 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2015/02/01
Vol. E98-A  No. 2 ; pp. 758-761
Type of Manuscript:  LETTER
Category: Cryptography and Information Security
Keyword: 
cryptographysecurity analysisID-based proxy signaturestandard model
 Summary | Full Text:PDF

Analysis of a Certificateless Aggregate Signature Scheme
Chenhui WANG Yumin YUAN 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2015/01/01
Vol. E98-A  No. 1 ; pp. 421-423
Type of Manuscript:  LETTER
Category: Cryptography and Information Security
Keyword: 
aggregate signaturecertificateless cryptographycryptography
 Summary | Full Text:PDF

On Renyi Entropies and Their Applications to Guessing Attacks in Cryptography
Serdar BOZTAS 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2014/12/01
Vol. E97-A  No. 12 ; pp. 2542-2548
Type of Manuscript:  INVITED PAPER (Special Section on Signal Design and Its Applications in Communications)
Category: 
Keyword: 
guessingRenyi entropyShannon entropypredictabilitybrute force attackscryptographywork factor
 Summary | Full Text:PDF

Linear Complexity of Pseudorandom Sequences Derived from Polynomial Quotients: General Cases
Xiaoni DU Ji ZHANG Chenhuang WU 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2014/04/01
Vol. E97-A  No. 4 ; pp. 970-974
Type of Manuscript:  PAPER
Category: Information Theory
Keyword: 
cryptographypseudorandom binary sequencespolynomial quotientsfinite fieldslinear complexity
 Summary | Full Text:PDF

Bit-Parallel Cubing Computation over GF(3m) for Irreducible Trinomials
Sun-Mi PARK Ku-Young CHANG Dowon HONG Changho SEO 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2014/01/01
Vol. E97-A  No. 1 ; pp. 347-353
Type of Manuscript:  PAPER
Category: Algorithms and Data Structures
Keyword: 
finite field arithmeticpth poweringcharacteristic threecubingtrinomialcryptography
 Summary | Full Text:PDF

A New 8-Bit AES Design for Wireless Network Applications
Ming-Chih CHEN 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2013/12/01
Vol. E96-A  No. 12 ; pp. 2587-2596
Type of Manuscript:  Special Section PAPER (Special Section on VLSI Design and CAD Algorithms)
Category: High-Level Synthesis and System-Level Design
Keyword: 
advanced encryption standardcryptographyencryptionapplication specific integrated circuits
 Summary | Full Text:PDF

An Optimal Identity-Based Broadcast Encryption Scheme for Wireless Sensor Networks
Intae KIM SeongOun HWANG 
Publication:   IEICE TRANSACTIONS on Communications
Publication Date: 2013/03/01
Vol. E96-B  No. 3 ; pp. 891-895
Type of Manuscript:  LETTER
Category: Fundamental Theories for Communications
Keyword: 
cryptographybroadcast encryptionidentity-based encryptionsensor network
 Summary | Full Text:PDF

Generalized Construction of Boolean Function with Maximum Algebraic Immunity Using Univariate Polynomial Representation
Shaojing FU Chao LI Longjiang QU 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2013/01/01
Vol. E96-A  No. 1 ; pp. 360-362
Type of Manuscript:  LETTER
Category: Cryptography and Information Security
Keyword: 
cryptographyBoolean functionalgebraic immunity
 Summary | Full Text:PDF

Linear Complexity of Binary Whiteman Generalized Cyclotomic Sequences of Order 4
Xiaoping LI Wenping MA Tongjiang YAN Xubo ZHAO 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2013/01/01
Vol. E96-A  No. 1 ; pp. 363-366
Type of Manuscript:  LETTER
Category: Cryptography and Information Security
Keyword: 
generalized cyclotomic sequenceslinear complexitycryptographyminimal polynomial
 Summary | Full Text:PDF

Efficient Fully Simulatable Oblivious Transfer from the McEliece Assumptions
Bernardo MACHADO DAVID Anderson C.A. NASCIMENTO Rafael T. DE SOUSA, JR. 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2012/11/01
Vol. E95-A  No. 11 ; pp. 2059-2066
Type of Manuscript:  PAPER
Category: Cryptography and Information Security
Keyword: 
oblivious transferMcEliece assumptionsprovable securitypost quantum cryptographycryptography
 Summary | Full Text:PDF

Recipients' Anonymity in Multihop Ad-Hoc Networks
Helena RIFA-POUS Emmanouil A. PANAOUSIS Christos POLITIS 
Publication:   IEICE TRANSACTIONS on Information and Systems
Publication Date: 2012/01/01
Vol. E95-D  No. 1 ; pp. 181-184
Type of Manuscript:  Special Section LETTER (Special Section on Trust, Security and Privacy in Computing and Communication Systems)
Category: Privacy
Keyword: 
anonymitycryptographyscalabilityad-hoc network
 Summary | Full Text:PDF

Efficient Sequential Architecture of AES CCM for the IEEE 802.16e
Jae Deok JI Seok Won JUNG Jongin LIM 
Publication:   IEICE TRANSACTIONS on Information and Systems
Publication Date: 2012/01/01
Vol. E95-D  No. 1 ; pp. 185-187
Type of Manuscript:  Special Section LETTER (Special Section on Trust, Security and Privacy in Computing and Communication Systems)
Category: Privacy
Keyword: 
cryptographycommunication system securityintegrated chip designFPGA
 Summary | Full Text:PDF

Information-Theoretic Secrecy with Access to Decryption Oracles
Christopher PORTMANN Keisuke TANAKA 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2011/07/01
Vol. E94-A  No. 7 ; pp. 1585-1590
Type of Manuscript:  LETTER
Category: Cryptography and Information Security
Keyword: 
cryptographyinformation-theoretic securityencryption schemedecryption oracle
 Summary | Full Text:PDF

Lightweight One-Time Signature for Short Messages
Dae Hyun YUM Pil Joong LEE 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2011/07/01
Vol. E94-A  No. 7 ; pp. 1567-1575
Type of Manuscript:  PAPER
Category: Cryptography and Information Security
Keyword: 
cryptographydigital signatureone-time signature
 Summary | Full Text:PDF

Probabilistic Analysis on the Optimal Combination of Trial Division and Probabilistic Primality Tests for Safe Prime Generation
Heejin PARK Dong Kyue KIM 
Publication:   IEICE TRANSACTIONS on Information and Systems
Publication Date: 2011/06/01
Vol. E94-D  No. 6 ; pp. 1210-1215
Type of Manuscript:  PAPER
Category: Information Network
Keyword: 
safe primesafe prime generationtrial divisionmiller-rabin testcryptographyinformation security
 Summary | Full Text:PDF

Robust Authentication Scheme between User and Remote Autonomous Object in Telecommunications System
Eun-Jun YOON Il-Soo JEON Kee-Young YOO 
Publication:   IEICE TRANSACTIONS on Information and Systems
Publication Date: 2011/05/01
Vol. E94-D  No. 5 ; pp. 1113-1116
Type of Manuscript:  LETTER
Category: Information Network
Keyword: 
network securityautonomous systemcryptographyauthenticationAES
 Summary | Full Text:PDF

Energy-Efficient Hash Chain Traversal
Dae Hyun YUM Jae Woo SEO Pil Joong LEE 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2011/03/01
Vol. E94-A  No. 3 ; pp. 955-963
Type of Manuscript:  PAPER
Category: Cryptography and Information Security
Keyword: 
cryptographyhash chainefficient traversal
 Summary | Full Text:PDF

Analysis of an Identity-Based Signcryption Scheme in the Standard Model
Fagen LI Yongjian LIAO Zhiguang QIN 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2011/01/01
Vol. E94-A  No. 1 ; pp. 268-269
Type of Manuscript:  Special Section LETTER (Special Section on Cryptography and Information Security)
Category: 
Keyword: 
cryptographyidentity-based signcryptionstandard modelattack
 Summary | Full Text:PDF

Several Classes of Even-Variable Balanced Boolean Functions with Optimal Algebraic Immunity
Chik-How TAN Siong-Thye GOH 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2011/01/01
Vol. E94-A  No. 1 ; pp. 165-171
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: Mathematics
Keyword: 
cryptographyboolean functionoptimal algebraic immunitynonlinearity
 Summary | Full Text:PDF

A Robust Security Mechanism for Mobile Commerce Transactions
Eun-Jun YOON Kee-Young YOO 
Publication:   IEICE TRANSACTIONS on Information and Systems
Publication Date: 2010/11/01
Vol. E93-D  No. 11 ; pp. 2898-2906
Type of Manuscript:  Special Section PAPER (Special Section on Architectures, Protocols, and Applications for the Future Internet)
Category: 
Keyword: 
cryptographysecurity analysissecurity protocolmobile commerceWAPauthentication
 Summary | Full Text:PDF

Privacy Preserving Frequency Mining in 2-Part Fully Distributed Setting
The Dung LUONG Tu Bao HO 
Publication:   IEICE TRANSACTIONS on Information and Systems
Publication Date: 2010/10/01
Vol. E93-D  No. 10 ; pp. 2702-2708
Type of Manuscript:  Special Section PAPER (Special Section on Data Mining and Statistical Science)
Category: 
Keyword: 
privacy preserving frequency mining2-part fully distributed settingcryptography
 Summary | Full Text:PDF

An Optimized Gateway-Oriented Password-Based Authenticated Key Exchange Protocol
Eun-Jun YOON Kee-Young YOO 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2010/04/01
Vol. E93-A  No. 4 ; pp. 850-853
Type of Manuscript:  LETTER
Category: Reliability, Maintainability and Safety Analysis
Keyword: 
cryptographyauthenticationpasswordkey exchangecryptanalysis
 Summary | Full Text:PDF

A Scan-Based Attack Based on Discriminators for AES Cryptosystems
Ryuta NARA Nozomu TOGAWA Masao YANAGISAWA Tatsuo OHTSUKI 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2009/12/01
Vol. E92-A  No. 12 ; pp. 3229-3237
Type of Manuscript:  Special Section PAPER (Special Section on VLSI Design and CAD Algorithms)
Category: Embedded, Real-Time and Reconfigurable Systems
Keyword: 
scan-based attackside-channel attackscan chaintestabilitysecuritycryptographyAES
 Summary | Full Text:PDF

Pipelining a Multi-Mode SHA-384/512 Core with High Area Performance Rate
Anh-Tuan HOANG Katsuhiro YAMAZAKI Shigeru OYANAGI 
Publication:   IEICE TRANSACTIONS on Information and Systems
Publication Date: 2009/10/01
Vol. E92-D  No. 10 ; pp. 2034-2042
Type of Manuscript:  PAPER
Category: VLSI Systems
Keyword: 
cryptographySHA-2fine-grained pipeliningFPGA
 Summary | Full Text:PDF

Simple Backdoors on RSA Modulus by Using RSA Vulnerability
Hung-Min SUN Mu-En WU Cheng-Ta YANG 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2009/09/01
Vol. E92-A  No. 9 ; pp. 2326-2332
Type of Manuscript:  PAPER
Category: Cryptography and Information Security
Keyword: 
cryptographyRSAbackdoorlattice reduction techniqueexhaustive search
 Summary | Full Text:PDF

A Note on Factoring α-LSBS Moduli
Hung-Min SUN Mu-En WU Cheng-Ta YANG 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2009/08/01
Vol. E92-A  No. 8 ; pp. 2137-2138
Type of Manuscript:  LETTER
Category: Cryptography and Information Security
Keyword: 
Fermat's factorization algorithmcryptographyRSAinteger factorization problemmost-significant bit (MSB)least-significant bit (LSB)
 Summary | Full Text:PDF

Cryptographic Energy Costs Are Assumable in Ad Hoc Networks
Helena RIFA-POUS Jordi HERRERA-JOANCOMARTI 
Publication:   IEICE TRANSACTIONS on Information and Systems
Publication Date: 2009/05/01
Vol. E92-D  No. 5 ; pp. 1194-1196
Type of Manuscript:  LETTER
Category: Networks
Keyword: 
performanceenergycryptographyad hoc networksmobile
 Summary | Full Text:PDF

Privacy-Preserving RFID Authentication Using Public Exponent Three RSA Algorithm
Yoonjeong KIM SeongYong OHM Kang YI 
Publication:   IEICE TRANSACTIONS on Information and Systems
Publication Date: 2009/03/01
Vol. E92-D  No. 3 ; pp. 545-547
Type of Manuscript:  LETTER
Category: Application Information Security
Keyword: 
cryptographysecuritysecurity of data
 Summary | Full Text:PDF

Cryptanalysis and Enhancement of Modified Gateway-Oriented Password-Based Authenticated Key Exchange Protocol
Kyung-Ah SHIM 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2008/12/01
Vol. E91-A  No. 12 ; pp. 3837-3839
Type of Manuscript:  LETTER
Category: Cryptography and Information Security
Keyword: 
cryptographypassword-based authentication protocolkey exchangeundetectable on-line password guessing attack
 Summary | Full Text:PDF

A More Compact Representation of XTR Cryptosystem
Masaaki SHIRASE Dong-Guk HAN Yasushi HIBINO Howon KIM Tsuyoshi TAKAGI 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2008/10/01
Vol. E91-A  No. 10 ; pp. 2843-2850
Type of Manuscript:  Special Section PAPER (Special Section on Information Theory and Its Applications)
Category: Cryptography and Information Security
Keyword: 
cryptographyXTR cryptosystemfinite fieldefficient implementationcompact representation
 Summary | Full Text:PDF

On the Security of Provably Secure Multi-Receiver ID-Based Signcryption Scheme
Chik-How TAN 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2008/07/01
Vol. E91-A  No. 7 ; pp. 1836-1838
Type of Manuscript:  LETTER
Category: Cryptography and Information Security
Keyword: 
cryptographyidentity-based signcryption
 Summary | Full Text:PDF

Three-Round Smart Card-Based Key Exchange Scheme
Jeong Ok KWON Ik Rae JEONG Dong Hoon LEE 
Publication:   IEICE TRANSACTIONS on Communications
Publication Date: 2007/11/01
Vol. E90-B  No. 11 ; pp. 3255-3258
Type of Manuscript:  LETTER
Category: Fundamental Theories for Communications
Keyword: 
cryptographykey exchangesmart card
 Summary | Full Text:PDF

Indifferentiability of Single-Block-Length and Rate-1 Compression Functions
Hidenori KUWAKADO Masakatu MORII 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2007/10/01
Vol. E90-A  No. 10 ; pp. 2301-2308
Type of Manuscript:  PAPER
Category: Information Security
Keyword: 
cryptographyhash functioncompression functionblock cipher
 Summary | Full Text:PDF

Forgery of Provable Secure Short Signcryption Scheme
Chik-How TAN 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2007/09/01
Vol. E90-A  No. 9 ; pp. 1879-1880
Type of Manuscript:  Special Section LETTER (Special Section on Information Theory and Its Applications)
Category: 
Keyword: 
cryptographysigncryption
 Summary | Full Text:PDF

Encryption of Composite Multimedia Contents for Access Control
Masaaki FUJIYOSHI Shoko IMAIZUMI Hitoshi KIYA 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2007/03/01
Vol. E90-A  No. 3 ; pp. 590-596
Type of Manuscript:  Special Section PAPER (Special Section on Multimedia and Mobile Signal Processing)
Category: Image
Keyword: 
multimedia communicationaccess controlcryptographyimage codingInternet
 Summary | Full Text:PDF

Web Metering Scheme Based on the Bilinear Pairings
Narn-Yih LEE Ming-Feng LEE 
Publication:   IEICE TRANSACTIONS on Information and Systems
Publication Date: 2007/03/01
Vol. E90-D  No. 3 ; pp. 688-691
Type of Manuscript:  LETTER
Category: Application Information Security
Keyword: 
cryptographymetering schemesecret sharingbilinear pairingsnetwork security
 Summary | Full Text:PDF

Security Analysis of Authenticated Key Exchange Protocol Based on the q-th Root Problem
Kyung-Ah SHIM 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2007/01/01
Vol. E90-A  No. 1 ; pp. 231-233
Type of Manuscript:  Special Section LETTER (Special Section on Cryptography and Information Security)
Category: 
Keyword: 
cryptographyauthenticate key agreement protocolforward secrecyq-th root problemunknown key-share attack
 Summary | Full Text:PDF

On Waters' Signature Scheme
Chik-How TAN 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2006/10/01
Vol. E89-A  No. 10 ; pp. 2684-2685
Type of Manuscript:  Special Section LETTER (Special Section on Information Theory and Its Applications)
Category: Cryptography
Keyword: 
cryptographysignaturekey substitution attacks
 Summary | Full Text:PDF

Secret Key Agreement from Correlated Source Outputs Using Low Density Parity Check Matrices
Jun MURAMATSU 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2006/07/01
Vol. E89-A  No. 7 ; pp. 2036-2046
Type of Manuscript:  PAPER
Category: Information Theory
Keyword: 
common informationcryptographylinear codeslow density parity check codesmulti-terminal source codingsecret key agreementsecret key capacity
 Summary | Full Text:PDF

Design and Evaluation of Data-Dependent Hardware for AES Encryption Algorithm
Ryoichiro ATONO Shuichi ICHIKAWA 
Publication:   IEICE TRANSACTIONS on Information and Systems
Publication Date: 2006/07/01
Vol. E89-D  No. 7 ; pp. 2301-2305
Type of Manuscript:  LETTER
Category: VLSI Systems
Keyword: 
FPGAcustom circuitpartial evaluationspecializationcryptographyembedded system
 Summary | Full Text:PDF

Signature Scheme in Multi-User Setting
Chik-How TAN 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2006/05/01
Vol. E89-A  No. 5 ; pp. 1339-1345
Type of Manuscript:  Special Section PAPER (Special Section on Discrete Mathematics and Its Applications)
Category: 
Keyword: 
cryptographybilinear mapsignatures
 Summary | Full Text:PDF

Improvement of Authenticated Encryption Schemes with Message Linkages for Message Flows
Min-Shiang HWANG Jung-Wen LO Shu-Yin HSIAO Yen-Ping CHU 
Publication:   IEICE TRANSACTIONS on Information and Systems
Publication Date: 2006/04/01
Vol. E89-D  No. 4 ; pp. 1575-1577
Type of Manuscript:  LETTER
Category: Application Information Security
Keyword: 
authenticationcryptographydigital signatureencryption
 Summary | Full Text:PDF

Concurrent Error Detection in Montgomery Multiplication over GF(2m)
Che-Wun CHIOU Chiou-Yng LEE An-Wen DENG Jim-Min LIN 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2006/02/01
Vol. E89-A  No. 2 ; pp. 566-574
Type of Manuscript:  PAPER
Category: Information Security
Keyword: 
cryptographyMontgomery multiplicationfinite field arithmeticfault-tolerant computingconcurrent error detection
 Summary | Full Text:PDF

High-Speed Design of Montgomery Inverse Algorithm over GF(2m)
Ming-Der SHIEH Jun-Hong CHEN Chien-Ming WU 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2006/02/01
Vol. E89-A  No. 2 ; pp. 559-565
Type of Manuscript:  PAPER
Category: Information Security
Keyword: 
finite fieldmodular inverse arithmeticMontgomery algorithmcryptography
 Summary | Full Text:PDF

Improvement of an Efficient and Practical Solution to Remote Authentication: Smart Card
Her-Tyan YEH 
Publication:   IEICE TRANSACTIONS on Communications
Publication Date: 2006/01/01
Vol. E89-B  No. 1 ; pp. 210-211
Type of Manuscript:  LETTER
Category: Internet
Keyword: 
remote authenticationsmart cardnetwork securitycryptographydata security
 Summary | Full Text:PDF

Practical Implementations of a Non-disclosure Fair Contract Signing Protocol
Chih-Hung WANG Chih-Heng YIN 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2006/01/01
Vol. E89-A  No. 1 ; pp. 297-309
Type of Manuscript:  PAPER
Category: Information Security
Keyword: 
cryptographyfair exchangecontract signingsemi-trusted third partyelectronic commerce
 Summary | Full Text:PDF

Security Analysis of Signcryption Scheme from q-Diffie-Hellman Problems
Chik-How TAN 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2006/01/01
Vol. E89-A  No. 1 ; pp. 206-208
Type of Manuscript:  Special Section LETTER (Special Section on Cryptography and Information Security)
Category: Public Key Cryptography
Keyword: 
cryptographysigncryption
 Summary | Full Text:PDF

Verifiable Oblivious Transfer Protocol
Narn-Yih LEE Chien-Chih WANG 
Publication:   IEICE TRANSACTIONS on Information and Systems
Publication Date: 2005/12/01
Vol. E88-D  No. 12 ; pp. 2890-2892
Type of Manuscript:  LETTER
Category: Application Information Security
Keyword: 
oblivious transferverificationzero knowledgecryptographysame message attack
 Summary | Full Text:PDF

Vulnerabilities of Wu-Chieu's Improved Password Authentication Scheme Using Smart Cards
Wei-Chi KU Hsiu-Mei CHUANG Maw-Jinn TSAUR 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2005/11/01
Vol. E88-A  No. 11 ; pp. 3241-3243
Type of Manuscript:  LETTER
Category: Information Security
Keyword: 
cryptographypassword authenticationforgery attacksmart card
 Summary | Full Text:PDF

Improvement of One-Time Password Authentication Scheme Using Smart Cards
Narn-Yih LEE Jung-Chic CHEN 
Publication:   IEICE TRANSACTIONS on Communications
Publication Date: 2005/09/01
Vol. E88-B  No. 9 ; pp. 3765-3767
Type of Manuscript:  LETTER
Category: Fundamental Theories for Communications
Keyword: 
cryptographysecurityone-time passworduser authenticationsmart card
 Summary | Full Text:PDF

Zero-Knowledge Proof for the Independent Set Problem
Pino CABALLERO-GIL 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2005/05/01
Vol. E88-A  No. 5 ; pp. 1301-1302
Type of Manuscript:  Special Section LETTER (Special Section on Discrete Mathematics and Its Applications)
Category: 
Keyword: 
cryptographycomputational complexityalgorithmsdiscrete mathematics
 Summary | Full Text:PDF

Strong Identification Based on a Hard-on-Average Problem
Pino CABALLERO-GIL 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2005/05/01
Vol. E88-A  No. 5 ; pp. 1117-1121
Type of Manuscript:  Special Section PAPER (Special Section on Discrete Mathematics and Its Applications)
Category: 
Keyword: 
cryptographycomputational complexityalgorithmsdiscrete mathematics
 Summary | Full Text:PDF

The Stability of the Lattice Structure of Pseudorandom Number Sequences
Zhihua NIU Enjian BAI Guozhen XIAO 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2005/04/01
Vol. E88-A  No. 4 ; pp. 1096-1098
Type of Manuscript:  LETTER
Category: Information Security
Keyword: 
cryptographypseudorandom number sequenceslattice structurethe stability of lattice structure
 Summary | Full Text:PDF

On the Security of Signcryption Scheme with Key Privacy
Chik-How TAN 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2005/04/01
Vol. E88-A  No. 4 ; pp. 1093-1095
Type of Manuscript:  LETTER
Category: Information Security
Keyword: 
cryptographysigncryption
 Summary | Full Text:PDF

Key Substitution Attacks on Provably Secure Short Signature Schemes
Chik-How TAN 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2005/02/01
Vol. E88-A  No. 2 ; pp. 611-612
Type of Manuscript:  LETTER
Category: Information Security
Keyword: 
cryptographykey substitution attacks
 Summary | Full Text:PDF

Attacks on the Shen et al.'s Timestamp-Based Password Authentication Scheme Using Smart Cards
Eun-Jun YOON Eun-Kyung RYU Kee-Young YOO 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2005/01/01
Vol. E88-A  No. 1 ; pp. 319-321
Type of Manuscript:  Special Section LETTER (Special Section on Cryptography and Information Security)
Category: 
Keyword: 
cryptographypasswordauthenticationsecuritysmart card
 Summary | Full Text:PDF

Security Notes on Generalization of Threshold Signature and Authenticated Encryption
Shuhong WANG Guilin WANG Feng BAO Jie WANG 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2004/12/01
Vol. E87-A  No. 12 ; pp. 3443-3446
Type of Manuscript:  LETTER
Category: Information Security
Keyword: 
digital signaturethreshold signatureauthenticated encryptionsecuritycryptography
 Summary | Full Text:PDF

A Secure LITESET Scheme
Jau-Ji SHEN Iuon-Chang LIN Min-Shiang HWANG 
Publication:   IEICE TRANSACTIONS on Information and Systems
Publication Date: 2004/11/01
Vol. E87-D  No. 11 ; pp. 2509-2512
Type of Manuscript:  LETTER
Category: Application Information Security
Keyword: 
cryptographyLITESETSETsigncryption
 Summary | Full Text:PDF

Provably Secure Three-Party Password-Authenticated Key Exchange
Chun-Li LIN Hsiang-An WEN Tzonelih HWANG Hung-Min SUN 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2004/11/01
Vol. E87-A  No. 11 ; pp. 2990-3000
Type of Manuscript:  PAPER
Category: Information Security
Keyword: 
cryptographypassworddictionary attackauthenticationkey exchangeprovable security
 Summary | Full Text:PDF

A Note on a User Friendly Remote Authentication Scheme with Smart Cards
Shyi-Tsong WU Bin-Chang CHIEU 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2004/08/01
Vol. E87-A  No. 8 ; pp. 2180-2181
Type of Manuscript:  LETTER
Category: Information Security
Keyword: 
cryptographysmart cardremote authentication
 Summary | Full Text:PDF

Cryptanalysis of Simple Authenticated Key Agreement Protocols
Chou-Chen YANG Ting-Yi CHANG Min-Shiang HWANG 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2004/08/01
Vol. E87-A  No. 8 ; pp. 2174-2176
Type of Manuscript:  LETTER
Category: Information Security
Keyword: 
cryptographyinformation securitykey agreementkey exchange
 Summary | Full Text:PDF

Multiparty DSA Signature Generation without Simultaneous User Operations
Yoshiki SAMESHIMA Hideaki SAISHO Kazuko OYANAGI Tsutomu MATSUMOTO 
Publication:   IEICE TRANSACTIONS on Information and Systems
Publication Date: 2004/08/01
Vol. E87-D  No. 8 ; pp. 2095-2105
Type of Manuscript:  PAPER
Category: Application Information Security
Keyword: 
threshold multisignatureDigital Signature Algorithmmultiparty protocolcryptographyinformation security
 Summary | Full Text:PDF

A One-Time Password Authentication Method for Low Spec Machines and on Internet Protocols
Takasuke TSUJI Akihiro SHIMIZU 
Publication:   IEICE TRANSACTIONS on Communications
Publication Date: 2004/06/01
Vol. E87-B  No. 6 ; pp. 1594-1600
Type of Manuscript:  PAPER
Category: Internet
Keyword: 
cryptographyhash functionpassword authenticationone-time password
 Summary | Full Text:PDF

Directions in Polynomial Reconstruction Based Cryptography
Aggelos KIAYIAS Moti YUNG 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2004/05/01
Vol. E87-A  No. 5 ; pp. 978-985
Type of Manuscript:  INVITED PAPER (Special Section on Discrete Mathematics and Its Applications)
Category: 
Keyword: 
cryptographycoding theorydecoding algorithmsReed Solomon codespolynomial reconstructionintractability assumptions
 Summary | Full Text:PDF

On the Pseudorandomness of KASUMI Type Permutations
Tetsu IWATA Tohru YAGI Kaoru KUROSAWA 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2004/05/01
Vol. E87-A  No. 5 ; pp. 1098-1109
Type of Manuscript:  Special Section LETTER (Special Section on Discrete Mathematics and Its Applications)
Category: 
Keyword: 
cryptographyblock cipherKASUMIpseudorandomnessprovable security
 Summary | Full Text:PDF

On Diffie-Hellman Problems in 3rd Order Shift Register
Chik-How TAN Xun YI Chee-Kheong SIEW 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2004/05/01
Vol. E87-A  No. 5 ; pp. 1206-1208
Type of Manuscript:  Special Section LETTER (Special Section on Discrete Mathematics and Its Applications)
Category: 
Keyword: 
cryptographyshift registerDiffie-Hellman problems
 Summary | Full Text:PDF

On the Correctness of Security Proofs for the 3GPP Confidentiality and Integrity Algorithms
Tetsu IWATA Kaoru KUROSAWA 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2004/05/01
Vol. E87-A  No. 5 ; pp. 1110-1118
Type of Manuscript:  Special Section LETTER (Special Section on Discrete Mathematics and Its Applications)
Category: 
Keyword: 
cryptographyf 8f 9modes of operationprovable securityblock cipherpseudorandom permutation
 Summary | Full Text:PDF

Security of Kuwakado-Tanaka Transitive Signature Scheme for Directed Trees
Xun YI Chik-How TAN Eiji OKAMOTO 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2004/04/01
Vol. E87-A  No. 4 ; pp. 955-957
Type of Manuscript:  LETTER
Category: Information Security
Keyword: 
cryptographytransitive signatureforgery attack
 Summary | Full Text:PDF

Comment on Traceability Analysis on Chaum Blind Signature Scheme
Narn-Yih LEE Chien-Nan WU 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2004/02/01
Vol. E87-A  No. 2 ; pp. 511-512
Type of Manuscript:  LETTER
Category: Information Security
Keyword: 
cryptographyblind signaturedigital signatureuntraceabilitysecurity
 Summary | Full Text:PDF

Key Substitution Attacks on Some Provably Secure Signature Schemes
Chik-How TAN 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2004/01/01
Vol. E87-A  No. 1 ; pp. 226-227
Type of Manuscript:  Special Section LETTER (Special Section on Cryptography and Information Security)
Category: 
Keyword: 
cryptographykey substitution attacks
 Summary | Full Text:PDF

A Distributed Sign-and-Encryption for Anonymity
DongJin KWAK SangJae MOON 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2004/01/01
Vol. E87-A  No. 1 ; pp. 228-230
Type of Manuscript:  Special Section LETTER (Special Section on Cryptography and Information Security)
Category: 
Keyword: 
cryptographysecuritysignaturegroup signaturesigncryptionanonymity
 Summary | Full Text:PDF

On the Universal Hash Functions in Luby-Rackoff Cipher
Tetsu IWATA Kaoru KUROSAWA 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2004/01/01
Vol. E87-A  No. 1 ; pp. 60-66
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: Symmetric Cipher
Keyword: 
cryptographyblock cipherFeistel permutationsuper-pseudorandomness
 Summary | Full Text:PDF

TMAC: Two-Key CBC MAC
Kaoru KUROSAWA Tetsu IWATA 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2004/01/01
Vol. E87-A  No. 1 ; pp. 46-53
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: Symmetric Cipher
Keyword: 
cryptographyCBC MACblock cipherprovable security
 Summary | Full Text:PDF

Analysis on Traceability on Stadler et al.'s Fair Blind Signature
Narn-Yih LEE Ming-Kung SUN 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2003/11/01
Vol. E86-A  No. 11 ; pp. 2901-2902
Type of Manuscript:  LETTER
Category: Information Security
Keyword: 
cryptographydigital signatureblind signatureuntraceability
 Summary | Full Text:PDF

A New Provably Secure Signature Scheme
Chik-How TAN Xun YI Chee-Kheong SIEW 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2003/10/01
Vol. E86-A  No. 10 ; pp. 2633-2635
Type of Manuscript:  Special Section LETTER (Special Section on Information Theory and Its Applications)
Category: Information Security
Keyword: 
cryptographydigital signaturestrong RSA assumption
 Summary | Full Text:PDF

An Impersonation Attack on One-Time Password Authentication Protocol OSPA
Takasuke TSUJI Akihiro SHIMIZU 
Publication:   IEICE TRANSACTIONS on Communications
Publication Date: 2003/07/01
Vol. E86-B  No. 7 ; pp. 2182-2185
Type of Manuscript:  LETTER
Category: Fundamental Theories
Keyword: 
cryptographyhash functionpassword authenticationone-time password
 Summary | Full Text:PDF

Security Enhancement for Protecting Password Transmission
Chou-Chen YANG Ting-Yi CHANG Jian-Wei LI Min-Shiang HWANG 
Publication:   IEICE TRANSACTIONS on Communications
Publication Date: 2003/07/01
Vol. E86-B  No. 7 ; pp. 2178-2181
Type of Manuscript:  LETTER
Category: Fundamental Theories
Keyword: 
authenticationcryptographypasswordsecurity
 Summary | Full Text:PDF

An Untraceable Blind Signature Scheme
Min-Shiang HWANG Cheng-Chi LEE Yan-Chi LAI 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2003/07/01
Vol. E86-A  No. 7 ; pp. 1902-1906
Type of Manuscript:  LETTER
Category: Information Security
Keyword: 
blind signaturescryptographyuntraceabilitysecurity
 Summary | Full Text:PDF

Comments on Hwang-Lee-Lai Attack upon Fan-Lei Partially Blind Signature Scheme
Chun-I FAN 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2003/07/01
Vol. E86-A  No. 7 ; pp. 1900-1901
Type of Manuscript:  LETTER
Category: Information Security
Keyword: 
partially blind signatureselectronic cashsecurity privacycryptography
 Summary | Full Text:PDF

Cryptanalysis and Restriction of an Automatic Signature Scheme in Distributed Systems
Yuh-Min TSENG 
Publication:   IEICE TRANSACTIONS on Communications
Publication Date: 2003/05/01
Vol. E86-B  No. 5 ; pp. 1679-1681
Type of Manuscript:  LETTER
Category: Fundamental Theories
Keyword: 
cryptographycryptanalysissignaturecomputer viruses
 Summary | Full Text:PDF

Efficient Arithmetic in Optimal Extension Fields Using Simultaneous Multiplication
Mun-Kyu LEE Kunsoo PARK 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2003/05/01
Vol. E86-A  No. 5 ; pp. 1316-1321
Type of Manuscript:  LETTER
Category: Information Security
Keyword: 
cryptographyelliptic curveoptimal extension fieldfinite field
 Summary | Full Text:PDF

On the n-th Order Shift Register Based Discrete Logarithm
Chik-How TAN Xun YI Chee-Kheong SIEW 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2003/05/01
Vol. E86-A  No. 5 ; pp. 1213-1216
Type of Manuscript:  Special Section LETTER (Special Section on Discrete Mathematics and Its Applications)
Category: 
Keyword: 
cryptographyshift registersdiscrete logarithm
 Summary | Full Text:PDF

Inclusion Relations of Boolean Functions Satisfying PC(l) of Order k
Tetsu IWATA Kaoru KUROSAWA 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2003/01/01
Vol. E86-A  No. 1 ; pp. 47-53
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: Symmetric Ciphers and Hash Functions
Keyword: 
cryptographyBoolean functionpropagation characteristicinclusion relations
 Summary | Full Text:PDF

Robust Digital Signature Scheme with Subliminal Channels
Narn-Yih LEE Dai-Rui LIN 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2003/01/01
Vol. E86-A  No. 1 ; pp. 187-188
Type of Manuscript:  Special Section LETTER (Special Section on Cryptography and Information Security)
Category: 
Keyword: 
cryptographysecuritydigital signaturesubliminal channel
 Summary | Full Text:PDF

The Security of the Improvement on the Generalization of Threshold Signature and Authenticated Encryption
Narn-Yih LEE 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2002/10/01
Vol. E85-A  No. 10 ; pp. 2364-2367
Type of Manuscript:  LETTER
Category: Information Security
Keyword: 
cryptographythreshold signaturegroup-oriented cryptographyauthenticated encryptionsecurity
 Summary | Full Text:PDF

All-or-Nothing Transform Based on a Linear Code
Hidenori KUWAKADO Hatsukazu TANAKA 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2002/05/01
Vol. E85-A  No. 5 ; pp. 1084-1087
Type of Manuscript:  Special Section LETTER (Special Section on Discrete Mathematics and Its Applications)
Category: 
Keyword: 
cryptographyinformation securityall-or-nothing transformencryption modelinear code
 Summary | Full Text:PDF

Cryptanalysis of a Key Management Scheme for Secure Multicast Communications
Gwoboa HORNG 
Publication:   IEICE TRANSACTIONS on Communications
Publication Date: 2002/05/01
Vol. E85-B  No. 5 ; pp. 1050-1051
Type of Manuscript:  LETTER
Category: Internet
Keyword: 
multicast communicationskey managementcryptographyone-way function tree
 Summary | Full Text:PDF

A Faster Modular Multiplication Based on Key Size Partitioning for RSA Public-Key Cryptosystem
Seok-Yong LEE Yong-Jin JEONG Oh-Jun KWON 
Publication:   IEICE TRANSACTIONS on Information and Systems
Publication Date: 2002/04/01
Vol. E85-D  No. 4 ; pp. 789-791
Type of Manuscript:  LETTER
Category: Applications of Information Security Techniques
Keyword: 
modular multiplicationRSAcryptographykey size partitioning
 Summary | Full Text:PDF

Distributed Virtual Safe-Deposit Box
Magda VALLS Jorge L. VILLAR 
Publication:   IEICE TRANSACTIONS on Information and Systems
Publication Date: 2002/04/01
Vol. E85-D  No. 4 ; pp. 786-788
Type of Manuscript:  LETTER
Category: Applications of Information Security Techniques
Keyword: 
threshold cryptosystemscryptographydistributed system
 Summary | Full Text:PDF

Cryptanalysis and Improvement of Two Access Control Schemes with User Authentication in a Distributed Computer Network
Narn-Yih LEE 
Publication:   IEICE TRANSACTIONS on Information and Systems
Publication Date: 2002/02/01
Vol. E85-D  No. 2 ; pp. 386-391
Type of Manuscript:  PAPER
Category: Applications of Information Security Techniques
Keyword: 
cryptographycryptanalysisaccess controluser authentication
 Summary | Full Text:PDF

Round Security and Super-Pseudorandomness of MISTY Type Structure
Tetsu IWATA Tomonobu YOSHINO Tomohiro YUASA Kaoru KUROSAWA 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2002/01/01
Vol. E85-A  No. 1 ; pp. 2-10
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: 
Keyword: 
cryptographyblock cipherround securitysuper-pseudorandomnessMISTY type structure
 Summary | Full Text:PDF

New Signature Schemes Based on 3rd Order Shift Registers
Chik-How TAN Xun YI Chee-Kheong SIEW 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2002/01/01
Vol. E85-A  No. 1 ; pp. 102-109
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: 
Keyword: 
cryptographydigital signatureshift registersdiscrete logarithm
 Summary | Full Text:PDF

On the Security of Generalization of Threshold Signature and Authenticated Encryption
Yuh-Min TSENG Jinn-Ke JAN Hung-Yu CHIEN 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2001/10/01
Vol. E84-A  No. 10 ; pp. 2606-2609
Type of Manuscript:  LETTER
Category: Information Security
Keyword: 
cryptographythreshold signaturegroup-oriented cryptographyauthenticated encryption
 Summary | Full Text:PDF

Formal Analysis of E-Commerce Protocols
Mauricio PAPA Oliver BREMER John HALE Sujeet SHENOI 
Publication:   IEICE TRANSACTIONS on Information and Systems
Publication Date: 2001/10/01
Vol. E84-D  No. 10 ; pp. 1313-1323
Type of Manuscript:  Special Section PAPER (IEICE/IEEE Joint Special Issue on Autonomous Decentralized Systems and Systems' Assurance)
Category: Electronic Commerce
Keyword: 
formal methodcryptographye-commerce
 Summary | Full Text:PDF

Attacks and Solutions on Strong-Password Authentication
Chun-Li LIN Hung-Min SUN Tzonelih HWANG 
Publication:   IEICE TRANSACTIONS on Communications
Publication Date: 2001/09/01
Vol. E84-B  No. 9 ; pp. 2622-2627
Type of Manuscript:  PAPER
Category: Fundamental Theories
Keyword: 
cryptographystrong-password authenticationstrong one-way hash functionone-time password
 Summary | Full Text:PDF

On the Randomness of Chambers and Gollmann Keystream Generator
Fumio SATO Kaoru KUROSAWA 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2001/01/01
Vol. E84-A  No. 1 ; pp. 303-310
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: 
Keyword: 
cryptographystream cipherself-decimation system
 Summary | Full Text:PDF

Simple and Secure Coin (SAS-Coin)--A Practical Micropayment System
Manjula SANDIRIGAMA Akihiro SHIMIZU Matu-Tarow NODA 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2000/12/25
Vol. E83-A  No. 12 ; pp. 2679-2688
Type of Manuscript:  PAPER
Category: Information Security
Keyword: 
cryptographyhash functionssecuritySAS password authenticationmicropayment schemes
 Summary | Full Text:PDF

A Practical (t,n) Multi-Secret Sharing Scheme
Hung-Yu CHIEN Jinn-Ke JAN Yuh-Min TSENG 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2000/12/25
Vol. E83-A  No. 12 ; pp. 2762-2765
Type of Manuscript:  LETTER
Category: Information Security
Keyword: 
cryptographysecret sharing
 Summary | Full Text:PDF

Improvement of a Multi-Role-Based Access Control Policy
Victor R. L. SHEN 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2000/07/25
Vol. E83-A  No. 7 ; pp. 1483-1485
Type of Manuscript:  LETTER
Category: Information Security
Keyword: 
multi-role-based access controlcryptographysecurity of datauser hierarchy
 Summary | Full Text:PDF

Simple and Secure Password Authentication Protocol (SAS)
Manjula SANDIRIGAMA Akihiro SHIMIZU Matu-Tarow NODA 
Publication:   IEICE TRANSACTIONS on Communications
Publication Date: 2000/06/25
Vol. E83-B  No. 6 ; pp. 1363-1365
Type of Manuscript:  LETTER
Category: Fundamental Theories
Keyword: 
cryptographyhash functionspassword authenticationsecurityone time password
 Summary | Full Text:PDF

Secure Multi-Party Computation over Networks
Yasuaki NISHITANI Yoshihide IGARASHI 
Publication:   IEICE TRANSACTIONS on Information and Systems
Publication Date: 2000/03/25
Vol. E83-D  No. 3 ; pp. 561-569
Type of Manuscript:  INVITED SURVEY PAPER
Category: Parallel and Distributed Algorithms
Keyword: 
securitysecure protocolsmulti-party computationcryptography
 Summary | Full Text:PDF

New Subliminal Channel Embedded in the ESIGN
Hidenori KUWAKADO Hatsukazu TANAKA 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 1999/10/25
Vol. E82-A  No. 10 ; pp. 2167-2171
Type of Manuscript:  Special Section PAPER (Special Section on Information Theory and Its Applications)
Category: Security
Keyword: 
cryptographydigital signaturesubliminal channelESIGN
 Summary | Full Text:PDF

An Improvement of Novel Cryptographic Key Assignment Scheme for Dynamic Access Control in a Hierarchy
Min-Shiang HWANG 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 1999/03/25
Vol. E82-A  No. 3 ; pp. 548-550
Type of Manuscript:  LETTER
Category: Information Security
Keyword: 
cryptographyaccess controluser hierarchy
 Summary | Full Text:PDF

Construct Message Authentication Code with One-Way Hash Functions and Block Ciphers
Yi-Shiung YEH Chan-Chi WANG 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 1999/02/25
Vol. E82-A  No. 2 ; pp. 390-393
Type of Manuscript:  PAPER
Category: Information Security
Keyword: 
cryptographyMACone-way hash functionblock cipher
 Summary | Full Text:PDF

A Universal Single-Authority Election System
Chin-Laung LEI Chun-I FAN 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 1998/10/25
Vol. E81-A  No. 10 ; pp. 2186-2193
Type of Manuscript:  PAPER
Category: General Fundamentals and Boundaries
Keyword: 
electronic election systems blind signaturessecurity & privacycryptography
 Summary | Full Text:PDF

Multi-Recastable Ticket Schemes for Electronic Voting
Chun-I FAN Chin-Laung LEI 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 1998/05/25
Vol. E81-A  No. 5 ; pp. 940-949
Type of Manuscript:  PAPER
Category: Information Security
Keyword: 
multi-recastable electronic votingsblind signaturessecurity and privacyquadratic residuescryptography
 Summary | Full Text:PDF

Low-Computation Partially Blind Signatures for Electronic Cash
Chun-I FAN Chin-Laung LEI 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 1998/05/25
Vol. E81-A  No. 5 ; pp. 818-824
Type of Manuscript:  Special Section PAPER (Special Section on Discrete Mathematics and Its Applications)
Category: 
Keyword: 
partially blind signaturescryptographyquadratic residueelectronic cash
 Summary | Full Text:PDF

One-Time Digital Signature and Pseudo k-Time Digital Signature
Hiroshi MIYANO 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 1998/01/25
Vol. E81-A  No. 1 ; pp. 48-55
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: 
Keyword: 
cryptographydigital signatureone-way functiondirected acyclic graph
 Summary | Full Text:PDF

High Performance Nonce-Based Authentication and Key Distribution Protocols against Password Guessing Attacks
Sung-Ming YEN Meng-Tzung LIU 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 1997/11/25
Vol. E80-A  No. 11 ; pp. 2209-2217
Type of Manuscript:  Special Section PAPER (Special Section on Information Theory and Its Applications)
Category: Security
Keyword: 
authenticationchallenge-responsecryptographykey distributionnonceoff-line dictionary attackon-line attackpasswordtrusted third-partyverifiable text attack
 Summary | Full Text:PDF

User Authentication in Mobile Computing Environment
Akio TAKUBO Mutsumi ISHIKAWA Takashi WATANABE Masakazu SOGA Tadanori MIZUNO 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 1997/07/25
Vol. E80-A  No. 7 ; pp. 1288-1298
Type of Manuscript:  Special Section PAPER (Special Section on Multi-dimensional Mobile Information Network)
Category: 
Keyword: 
mobile computingauthenticationsecurityprotocolcryptography
 Summary | Full Text:PDF

On Non-Pseudorandomness from Block Ciphers with Provable Immunity Against Linear Cryptanalysis
Kouichi SAKURAI Yuliang ZHENG 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 1997/01/25
Vol. E80-A  No. 1 ; pp. 19-24
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: 
Keyword: 
block ciphercryptographyData Encryption Standarddifferential cryptanalysislinear cryptanalysispseudorandom permutationsecuritysecret-key block cipher
 Summary | Full Text:PDF

Algebraic Properties of Permutation Polynomials
Eiji OKAMOTO Wayne AITKEN George Robert BLAKLEY 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 1996/04/25
Vol. E79-A  No. 4 ; pp. 494-501
Type of Manuscript:  Special Section PAPER (Special Section on Discrete Mathematics and Its Applications)
Category: 
Keyword: 
finite fieldpermutation polynomialcryptographytranspositioncycle
 Summary | Full Text:PDF

On the One-Way Algebraic Homomorphism
Eikoh CHIDA Takao NISHIZEKI Motoji OHMORI Hiroki SHIZUYA 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 1996/01/25
Vol. E79-A  No. 1 ; pp. 54-60
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: 
Keyword: 
one-way functionhomomorphismcryptography
 Summary | Full Text:PDF

A New Version of FEAL, Stronger against Differential Cryptanalysis*
Routo TERADA Paulo G. PINHEIRO Kenji KOYAMA 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 1996/01/25
Vol. E79-A  No. 1 ; pp. 28-34
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: 
Keyword: 
cryptographyblock cipherdifferential cryptanalysiskey breaking
 Summary | Full Text:PDF

On the Complexity of the Discrete Logarithm for a General Finite Group
Tatsuaki OKAMOTO Kouichi SAKURAI Hiroki SHIZUYA 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 1996/01/25
Vol. E79-A  No. 1 ; pp. 61-65
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: 
Keyword: 
discrete logarithmcomputational complexitycryptography
 Summary | Full Text:PDF

Relationships among Nonlinearity Criteria of Boolean Functions
Shouichi HIROSE Katsuo IKEDA 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 1995/02/25
Vol. E78-A  No. 2 ; pp. 235-243
Type of Manuscript:  PAPER
Category: Information Security and Cryptography
Keyword: 
Boolean functionsnonlinearity criteriapropagation criterionstrict avalanche criterionsymmetric cryptosystemscryptography
 Summary | Full Text:PDF

Permutation Cipher Scheme Using Polynomials over a Field
Eiji OKAMOTO Tomohiko UYEMATSU Masahiro MAMBO 
Publication:   IEICE TRANSACTIONS on Information and Systems
Publication Date: 1995/02/25
Vol. E78-D  No. 2 ; pp. 138-142
Type of Manuscript:  PAPER
Category: Information Security
Keyword: 
cryptographyinformation securitypermutationReed-Solomon code
 Summary | Full Text:PDF

A New RSA-Type Scheme Based on Singular Cubic Curves y2x3+bx2 (mod n)
Hidenori KUWAKADO Kenji KOYAMA Yukio TSURUOKA 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 1995/01/25
Vol. E78-A  No. 1 ; pp. 27-33
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: 
Keyword: 
cryptographyRSA cryptosystemcubic curve
 Summary | Full Text:PDF

One-Way Functions over Finite Near-Rings
Eikoh CHIDA Hiroki SHIZUYA Takao NISHIZEKI 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 1995/01/25
Vol. E78-A  No. 1 ; pp. 4-10
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: 
Keyword: 
one-way functionsring homomorphismcryptography
 Summary | Full Text:PDF

An Electronic Retail Payment System with Distributed Control--A Conceptual Design--
Tsutomu MATSUMOTO 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 1995/01/25
Vol. E78-A  No. 1 ; pp. 67-76
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: 
Keyword: 
electronic paymentfunds transfercashwalletcardcryptographysecurity
 Summary | Full Text:PDF

Information Leakage Measurement in a Distributed Computation Protocol
Shin-ichi KAWAMURA 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 1995/01/25
Vol. E78-A  No. 1 ; pp. 59-66
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: 
Keyword: 
server-aided secure computationRSAinformation theorysecuritycryptography
 Summary | Full Text:PDF

Efficient Cryptosystems over Elliptic Curves Based on a Product of Form-Free Primes
Hidenori KUWAKADO Kenji KOYAMA 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 1994/08/25
Vol. E77-A  No. 8 ; pp. 1309-1318
Type of Manuscript:  Special Section PAPER (Special Section on Information Theory and Its Applications)
Category: 
Keyword: 
cryptographypublic-keyelliptic curvesfactorization
 Summary | Full Text:PDF

Shared Pseudo-Random Secret Generation Protocols
Manuel CERECEDO Tsutomu MATSUMOTO Hideki IMAI 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 1994/04/25
Vol. E77-A  No. 4 ; pp. 636-645
Type of Manuscript:  Special Section PAPER (Special Section on Discrete Mathematics and Its Applications)
Category: 
Keyword: 
information securitycryptographypseudo-random number generationsecret sharing schemesnon-interactive secure computation
 Summary | Full Text:PDF

New Key Generation Algorithm for RSA Cryptosystem
Ryuichi SAKAI Masakatu MORII Masao KASAHARA 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 1994/01/25
Vol. E77-A  No. 1 ; pp. 89-97
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: 
Keyword: 
cryptographypublic-key cryptosystemRSAkey generation algorithmprimality test
 Summary | Full Text:PDF

Secure Addition Sequence and Its Application on the Server-Aided Secret Computation Protocols
Chi-Sung LAIH Sung-Ming YEN 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 1994/01/25
Vol. E77-A  No. 1 ; pp. 81-88
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: 
Keyword: 
addition sequencecryptographyRSASASCprotocolssecure computations
 Summary | Full Text:PDF

Efficient and Secure Multiparty Generation of Digital Signatures Based on Discrete Logarithms
Manuel CERECEDO Tsutomu MATSUMOTO Hideki IMAI 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 1993/04/25
Vol. E76-A  No. 4 ; pp. 532-545
Type of Manuscript:  Special Section PAPER (Special Section on Discrete Mathematics and Its Applications)
Category: 
Keyword: 
information securitycryptographydigital signaturesmultiparty protocolsnoninteracitve secure computationdiscrete log-based cryptosystems
 Summary | Full Text:PDF

Improving the Performance of Enciphered B+-Trees
Thomas HARDJONO Tadashi ARAKI Tetsuya CHIKARAISHI 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 1993/01/25
Vol. E76-A  No. 1 ; pp. 104-111
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: 
Keyword: 
information securitycryptography
 Summary | Full Text:PDF

Methods to Securely Realize Caller-Authenticated and Callee-Specified Telephone Calls
Tomoyuki ASANO Tsutomu MATSUMOTO Hideki IMAI 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 1993/01/25
Vol. E76-A  No. 1 ; pp. 88-95
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: 
Keyword: 
information securitypersonalized telecommunicationcaller authenticationcallee specificationkey predistribution systemcryptography
 Summary | Full Text:PDF

The Sibling Intractable Function Family (SIFF): Notion, Construction and Applications
Yuliang ZHENG Thomas HARDJONO Josef PIEPRZYK 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 1993/01/25
Vol. E76-A  No. 1 ; pp. 4-13
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: 
Keyword: 
informationsecuritycryptography
 Summary | Full Text:PDF

Net Structure and Cryptography
Hisao SHIZUKA Yutaka MOURI 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 1992/10/25
Vol. E75-A  No. 10 ; pp. 1422-1428
Type of Manuscript:  Special Section PAPER (Special Section on Application of Petri Nets to Concurrent System Design)
Category: 
Keyword: 
petri netcryptographyT-invariantbitmarking
 Summary | Full Text:PDF