Keyword : information security


Generation and Detection of Media Clones
Isao ECHIZEN Noboru BABAGUCHI Junichi YAMAGISHI Naoko NITTA Yuta NAKASHIMA Kazuaki NAKAMURA Kazuhiro KONO Fuming FANG Seiko MYOJIN Zhenzhong KUANG Huy H. NGUYEN Ngoc-Dung T. TIEU 
Publication:   
Publication Date: 2021/01/01
Vol. E104-D  No. 1 ; pp. 12-23
Type of Manuscript:  INVITED PAPER (Special Section on Enriched Multimedia — Multimedia Security and Forensics —)
Category: 
Keyword: 
media cloneinformation securityimage and speech processingsocial mediacommunication model
 Summary | Full Text:PDF(2.8MB)

Authenticated-Encrypted Analog-to-Digital Conversion Based on Non-Linearity and Redundancy Transformation
Vinod V. GADDE Makoto IKEDA 
Publication:   
Publication Date: 2019/12/01
Vol. E102-A  No. 12 ; pp. 1731-1740
Type of Manuscript:  Special Section PAPER (Special Section on VLSI Design and CAD Algorithms)
Category: 
Keyword: 
ADCside channel attacksinformation securityencryptionauthentication
 Summary | Full Text:PDF(2.8MB)

Automatic Prevention of Buffer Overflow Vulnerability Using Candidate Code Generation
Young-Su JANG Jin-Young CHOI 
Publication:   
Publication Date: 2018/12/01
Vol. E101-D  No. 12 ; pp. 3005-3018
Type of Manuscript:  PAPER
Category: Software System
Keyword: 
information securitybuffer overflow vulnerabilitysoftware security monitoring
 Summary | Full Text:PDF(3.6MB)

A Novel Linguistic Steganography Based on Synonym Run-Length Encoding
Lingyun XIANG Xinhui WANG Chunfang YANG Peng LIU 
Publication:   
Publication Date: 2017/02/01
Vol. E100-D  No. 2 ; pp. 313-322
Type of Manuscript:  PAPER
Category: Information Network
Keyword: 
information securitylinguistic steganographysynonym substitutionrun-length encodingsteganalysis
 Summary | Full Text:PDF(416.5KB)

Blind Compressive Sensing Detection of Watermark Coded by Limited-Random Sequence
Chao ZHANG Jialuo XIAO Yaxin ZHANG 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2015/08/01
Vol. E98-A  No. 8 ; pp. 1747-1750
Type of Manuscript:  Special Section LETTER (Special Section on Image Media Quality)
Category: 
Keyword: 
limited-random sequencecompressive sensingwatermarkLRScryptographyinformation security
 Summary | Full Text:PDF(933.2KB)

A Secure and Efficient Certificateless Aggregate Signature Scheme
He LIU Mangui LIANG Haoliang SUN 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2014/04/01
Vol. E97-A  No. 4 ; pp. 991-995
Type of Manuscript:  LETTER
Category: Cryptography and Information Security
Keyword: 
information securityaggregate signaturecertificateless cryptographyauthentication
 Summary | Full Text:PDF(118.6KB)

Detecting Hardware Trojan through Time Domain Constrained Estimator Based Unified Subspace Technique
Mingfu XUE Wei LIU Aiqun HU Youdong WANG 
Publication:   IEICE TRANSACTIONS on Information and Systems
Publication Date: 2014/03/01
Vol. E97-D  No. 3 ; pp. 606-609
Type of Manuscript:  LETTER
Category: Dependable Computing
Keyword: 
information securityhardware securityhardware Trojan detectionunified subspace techniquetime domain constrained estimator
 Summary | Full Text:PDF(1.1MB)

Study on Information Leakage of Input Key due to Frequency Fluctuation of RC Oscillator in Keyboard
Masahiro KINUGAWA Yu-ichi HAYASHI Takaaki MIZUKI Hideaki SONE 
Publication:   IEICE TRANSACTIONS on Communications
Publication Date: 2013/10/01
Vol. E96-B  No. 10 ; pp. 2633-2638
Type of Manuscript:  PAPER
Category: Electromagnetic Compatibility(EMC)
Keyword: 
EM information leakageintegrated oscillatorinformation securityRC oscillator
 Summary | Full Text:PDF(1.1MB)

Data Convertors Design for Optimization of the DDPL Family
Song JIA Li LIU Xiayu LI Fengfeng WU Yuan WANG Ganggang ZHANG 
Publication:   IEICE TRANSACTIONS on Electronics
Publication Date: 2013/09/01
Vol. E96-C  No. 9 ; pp. 1195-1200
Type of Manuscript:  PAPER
Category: Electronic Circuits
Keyword: 
convertordifferential power analysis (DPA)information securitydelay-based dual-rail precharge logic (DDPL)low power
 Summary | Full Text:PDF(1.3MB)

Evaluation of Information Leakage from Cryptographic Hardware via Common-Mode Current
Yu-ichi HAYASHI Naofumi HOMMA Takaaki MIZUKI Takeshi SUGAWARA Yoshiki KAYANO Takafumi AOKI Shigeki MINEGISHI Akashi SATOH Hideaki SONE Hiroshi INOUE 
Publication:   IEICE TRANSACTIONS on Electronics
Publication Date: 2012/06/01
Vol. E95-C  No. 6 ; pp. 1089-1097
Type of Manuscript:  PAPER
Category: Electronic Components
Keyword: 
information securityelectromagnetic information leakagecryptographic modulesside-channel attackscommon-mode currents
 Summary | Full Text:PDF(2.3MB)

Probabilistic Analysis on the Optimal Combination of Trial Division and Probabilistic Primality Tests for Safe Prime Generation
Heejin PARK Dong Kyue KIM 
Publication:   IEICE TRANSACTIONS on Information and Systems
Publication Date: 2011/06/01
Vol. E94-D  No. 6 ; pp. 1210-1215
Type of Manuscript:  PAPER
Category: Information Network
Keyword: 
safe primesafe prime generationtrial divisionmiller-rabin testcryptographyinformation security
 Summary | Full Text:PDF(236.1KB)

Low-Overhead Architecture for Security Tag
Ryota SHIOYA Daewung KIM Kazuo HORIO Masahiro GOSHIMA Shuichi SAKAI 
Publication:   IEICE TRANSACTIONS on Information and Systems
Publication Date: 2011/01/01
Vol. E94-D  No. 1 ; pp. 69-78
Type of Manuscript:  PAPER
Category: Computer System
Keyword: 
processor architecturetagged architectureinformation securityinformation flow tracking
 Summary | Full Text:PDF(507.1KB)

Time-Bound Hierarchical Key Assignment: An Overview
Wen Tao ZHU Robert H. DENG Jianying ZHOU Feng BAO 
Publication:   IEICE TRANSACTIONS on Information and Systems
Publication Date: 2010/05/01
Vol. E93-D  No. 5 ; pp. 1044-1052
Type of Manuscript:  INVITED PAPER (Special Section on Information and Communication System Security)
Category: 
Keyword: 
information securityaccess controltime-bound hierarchical cryptographic key management
 Summary | Full Text:PDF(248.7KB)

Low Cost Design of an Advanced Encryption Standard (AES) Processor Using a New Common-Subexpression-Elimination Algorithm
Ming-Chih CHEN Shen-Fu HSIAO 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2009/12/01
Vol. E92-A  No. 12 ; pp. 3221-3228
Type of Manuscript:  Special Section PAPER (Special Section on VLSI Design and CAD Algorithms)
Category: Embedded, Real-Time and Reconfigurable Systems
Keyword: 
AESVLSIcommon subexpression elimination (CSE)information securitylogic synthesis
 Summary | Full Text:PDF(1009KB)

Contourlet Based Adaptive Watermarking for Color Images
Haohao SONG 
Publication:   IEICE TRANSACTIONS on Information and Systems
Publication Date: 2009/10/01
Vol. E92-D  No. 10 ; pp. 2171-2174
Type of Manuscript:  LETTER
Category: Image Processing and Video Processing
Keyword: 
contourletimage watermarkinginformation securitywavelet
 Summary | Full Text:PDF(81.7KB)

A Cyber-Attack Detection Model Based on Multivariate Analyses
Yuto SAKAI Koichiro RINSAKA Tadashi DOHI 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2009/07/01
Vol. E92-A  No. 7 ; pp. 1585-1592
Type of Manuscript:  Special Section PAPER (Special Section on Recent Advances in Technologies for Assessing System Reliability)
Category: 
Keyword: 
information securitycyber-attackintrusion detectionquantification methodcluster analysis
 Summary | Full Text:PDF(345.1KB)

Robust Watermarking of 3D Polygonal Meshes
Han Sae SONG Nam Ik CHO 
Publication:   IEICE TRANSACTIONS on Information and Systems
Publication Date: 2008/05/01
Vol. E91-D  No. 5 ; pp. 1512-1521
Type of Manuscript:  PAPER
Category: Application Information Security
Keyword: 
information securitydigital watermarkingrobust watermarking3D polygonal mesh model
 Summary | Full Text:PDF(1001.7KB)

A Novel Elliptic Curve Dynamic Access Control System
Jyh-Horng WEN Ming-Chang WU Tzer-Shyong CHEN 
Publication:   IEICE TRANSACTIONS on Communications
Publication Date: 2007/08/01
Vol. E90-B  No. 8 ; pp. 1979-1987
Type of Manuscript:  PAPER
Category: Fundamental Theories for Communications
Keyword: 
elliptic curve cryptosysteminformation securitysecure filteraccess control
 Summary | Full Text:PDF(292.4KB)

Constructing a Multilayered Boundary to Defend against Intrusive Anomalies
Zonghua ZHANG Hong SHEN 
Publication:   IEICE TRANSACTIONS on Information and Systems
Publication Date: 2007/02/01
Vol. E90-D  No. 2 ; pp. 490-499
Type of Manuscript:  PAPER
Category: Application Information Security
Keyword: 
intrusion detectionanomaly detectioninformation securityPOMDP
 Summary | Full Text:PDF(403.8KB)

A Coordinator for Workflow Management Systems with Information Access Control
Shih-Chien CHOU Chien-Jung WU 
Publication:   IEICE TRANSACTIONS on Information and Systems
Publication Date: 2005/12/01
Vol. E88-D  No. 12 ; pp. 2786-2792
Type of Manuscript:  PAPER
Category: Application Information Security
Keyword: 
workflowworkflow management system (WFMS)coordinationaccess controlinformation securityaccess control list
 Summary | Full Text:PDF(141.8KB)

Multiparty DSA Signature Generation without Simultaneous User Operations
Yoshiki SAMESHIMA Hideaki SAISHO Kazuko OYANAGI Tsutomu MATSUMOTO 
Publication:   IEICE TRANSACTIONS on Information and Systems
Publication Date: 2004/08/01
Vol. E87-D  No. 8 ; pp. 2095-2105
Type of Manuscript:  PAPER
Category: Application Information Security
Keyword: 
threshold multisignatureDigital Signature Algorithmmultiparty protocolcryptographyinformation security
 Summary | Full Text:PDF(302.1KB)

Cryptanalysis of Simple Authenticated Key Agreement Protocols
Chou-Chen YANG Ting-Yi CHANG Min-Shiang HWANG 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2004/08/01
Vol. E87-A  No. 8 ; pp. 2174-2176
Type of Manuscript:  LETTER
Category: Information Security
Keyword: 
cryptographyinformation securitykey agreementkey exchange
 Summary | Full Text:PDF(69.6KB)

Polynomial Representation of a Visual Secret Sharing Scheme and Its Application
Hidenori KUWAKADO Hatsukazu TANAKA 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2002/06/01
Vol. E85-A  No. 6 ; pp. 1379-1386
Type of Manuscript:  PAPER
Category: Information Security
Keyword: 
information securityvisual secret sharingpolynomial representation
 Summary | Full Text:PDF(214.1KB)

All-or-Nothing Transform Based on a Linear Code
Hidenori KUWAKADO Hatsukazu TANAKA 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2002/05/01
Vol. E85-A  No. 5 ; pp. 1084-1087
Type of Manuscript:  Special Section LETTER (Special Section on Discrete Mathematics and Its Applications)
Category: 
Keyword: 
cryptographyinformation securityall-or-nothing transformencryption modelinear code
 Summary | Full Text:PDF(134.7KB)

Message Authentication for Stream
Hidenori KUWAKADO Hatsukazu TANAKA 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2002/01/01
Vol. E85-A  No. 1 ; pp. 190-193
Type of Manuscript:  Special Section LETTER (Special Section on Cryptography and Information Security)
Category: 
Keyword: 
information securitymessage authenticationstreamhash function
 Summary | Full Text:PDF(142.2KB)

Linear Complexity of Kronecker Sequences
Kari H. A. KARKKAINEN 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2001/05/01
Vol. E84-A  No. 5 ; pp. 1348-1351
Type of Manuscript:  LETTER
Category: Spread Spectrum Technologies and Applications
Keyword: 
spreading codesinformation securitysynchronization
 Summary | Full Text:PDF(1MB)

Improvement on the Cheater Identifiable Threshold Scheme
Hidenori KUWAKADO Hatsukazu TANAKA 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2001/04/01
Vol. E84-A  No. 4 ; pp. 957-960
Type of Manuscript:  Special Section LETTER (Special Section on Fundamentals of Information and Communications)
Category: 
Keyword: 
information securitysecret sharingauthentication codeerasure decodingcheater
 Summary | Full Text:PDF(142.5KB)

A Refined Definition of Semantic Security for Public-Key Encryption Schemes
Hideaki SAKAI Noriko NAKAMURA Yoshihide IGARASHI 
Publication:   IEICE TRANSACTIONS on Information and Systems
Publication Date: 2001/01/01
Vol. E84-D  No. 1 ; pp. 34-39
Type of Manuscript:  Special Section PAPER (Special Issue on Selected Papers from LA Symposium)
Category: 
Keyword: 
chosen-ciphertext attackindistinguishabilityinformation securitychosen-plaintext attackpublic-key encryptionsemantic security
 Summary | Full Text:PDF(399.3KB)

New Algorithm for Finding Preimages in a Reduced Version of the MD4 Compression Function
Hidenori KUWAKADO Hatsukazu TANAKA 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2000/01/25
Vol. E83-A  No. 1 ; pp. 97-100
Type of Manuscript:  Special Section LETTER (Special Section on Cryptography and Information Security)
Category: 
Keyword: 
information securityhash functionone-way functionMD4
 Summary | Full Text:PDF(507.8KB)

Comparison of Performance between AND and Majority Logic Type Nonlinear Feedforward Logic Pseudonoise Sequence Generators
Kari H. A. KARKKAINEN 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 1999/08/25
Vol. E82-A  No. 8 ; pp. 1641-1647
Type of Manuscript:  PAPER
Category: Spread Spectrum Technologies and Applications
Keyword: 
information securityspreading codestream cipherlinear complexitycorrelation attackspread-spectrum systemcode division multiple access
 Summary | Full Text:PDF(982.8KB)

Comment on "On the One-Way Algebraic Homomorphism"
Li XIAOJIE Yi Xian YANG 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 1998/01/25
Vol. E81-A  No. 1 ; pp. 105-105
Type of Manuscript:  Special Section LETTER (Special Section on Cryptography and Information Security)
Category: 
Keyword: 
digital signaturecryptologyinformation security
 Summary | Full Text:PDF(49.7KB)

Group Cipher System for Intranet Security
Hiromichi ITO Seiichi SUSAKI Masato ARAI Minoru KOIZUMI Kazuo TAKARAGI 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 1998/01/25
Vol. E81-A  No. 1 ; pp. 28-34
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: 
Keyword: 
information securitygroup-oriented ciphersmart cardintranet
 Summary | Full Text:PDF(670.7KB)

Linear Complexity of Binary Golay Complementary Sequences
Kari H. A. KARKKAINEN Pentti A. LEPPANEN 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 1996/04/25
Vol. E79-A  No. 4 ; pp. 609-613
Type of Manuscript:  PAPER
Category: Spread Spectrum Technologies and Applications
Keyword: 
spread-spectrum techniquespreading codesnon-linear sequencesinformation securitylinear complexity
 Summary | Full Text:PDF(398.4KB)

Evaluating Security of a Simple Interactive Human Identification Scheme
Ryo MIZUTANI Tsutomu MATSUMOTO 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 1995/05/25
Vol. E78-A  No. 5 ; pp. 577-578
Type of Manuscript:  Special Section LETTER (Special Section of Letters Selected from the 1994 IEICE Fall Conference)
Category: 
Keyword: 
authenticationhuman cryptographyhuman interfaceidentificationinformation securitypasswords
 Summary | Full Text:PDF(142.5KB)

Permutation Cipher Scheme Using Polynomials over a Field
Eiji OKAMOTO Tomohiko UYEMATSU Masahiro MAMBO 
Publication:   IEICE TRANSACTIONS on Information and Systems
Publication Date: 1995/02/25
Vol. E78-D  No. 2 ; pp. 138-142
Type of Manuscript:  PAPER
Category: Information Security
Keyword: 
cryptographyinformation securitypermutationReed-Solomon code
 Summary | Full Text:PDF(382.8KB)

A New Class of Non-interactive ID-Based Key Sharing Schemes and Its Performances
Ryuichi SAKAI Masao KASAHARA 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 1995/01/25
Vol. E78-A  No. 1 ; pp. 51-58
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: 
Keyword: 
key sharingID informationcommon keycryptosysteminformation security
 Summary | Full Text:PDF(557.2KB)

A Simple Method to Control Indirect Information Flows
Satoshi OZAKI Tsutomu MATSUMOTO Hideki IMAI 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 1994/11/25
Vol. E77-A  No. 11 ; pp. 1938-1941
Type of Manuscript:  Special Section LETTER (Special Section of Letters Selected from the 1994 IEICE Spring Conference)
Category: 
Keyword: 
access controlflow controlinformation flowinformation securityUNIX
 Summary | Full Text:PDF(261.4KB)

Shared Pseudo-Random Secret Generation Protocols
Manuel CERECEDO Tsutomu MATSUMOTO Hideki IMAI 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 1994/04/25
Vol. E77-A  No. 4 ; pp. 636-645
Type of Manuscript:  Special Section PAPER (Special Section on Discrete Mathematics and Its Applications)
Category: 
Keyword: 
information securitycryptographypseudo-random number generationsecret sharing schemesnon-interactive secure computation
 Summary | Full Text:PDF(793.3KB)

Efficient and Secure Multiparty Generation of Digital Signatures Based on Discrete Logarithms
Manuel CERECEDO Tsutomu MATSUMOTO Hideki IMAI 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 1993/04/25
Vol. E76-A  No. 4 ; pp. 532-545
Type of Manuscript:  Special Section PAPER (Special Section on Discrete Mathematics and Its Applications)
Category: 
Keyword: 
information securitycryptographydigital signaturesmultiparty protocolsnoninteracitve secure computationdiscrete log-based cryptosystems
 Summary | Full Text:PDF(1.2MB)

An Access Control Mechanism for Object-Oriented Database Systems
Tadashi ARAKI Tetsuya CHIKARAISHI Thomas HARDJONO Tadashi OHTA Nobuyoshi TERASHIMA 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 1993/01/25
Vol. E76-A  No. 1 ; pp. 112-121
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: 
Keyword: 
information securityobject-oriented database systemmultilevel access controlsecurity policytrusted computing base
 Summary | Full Text:PDF(874.5KB)

Improving the Performance of Enciphered B+-Trees
Thomas HARDJONO Tadashi ARAKI Tetsuya CHIKARAISHI 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 1993/01/25
Vol. E76-A  No. 1 ; pp. 104-111
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: 
Keyword: 
information securitycryptography
 Summary | Full Text:PDF(761.6KB)

Methods to Securely Realize Caller-Authenticated and Callee-Specified Telephone Calls
Tomoyuki ASANO Tsutomu MATSUMOTO Hideki IMAI 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 1993/01/25
Vol. E76-A  No. 1 ; pp. 88-95
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: 
Keyword: 
information securitypersonalized telecommunicationcaller authenticationcallee specificationkey predistribution systemcryptography
 Summary | Full Text:PDF(655.1KB)