Keyword : lattice


Explicit Relation between Low-Dimensional LLL-Reduced Bases and Shortest Vectors
Kotaro MATSUDA Atsushi TAKAYASU Tsuyoshi TAKAGI 
Publication:   
Publication Date: 2019/09/01
Vol. E102-A  No. 9 ; pp. 1091-1100
Type of Manuscript:  Special Section PAPER (Special Section on Discrete Mathematics and Its Applications)
Category: Cryptography and Information Security
Keyword: 
latticeshortest vector problemLLL algorithmlattice-based cryptography
 Summary | Full Text:PDF

Hardness Evaluation for Search LWE Problem Using Progressive BKZ Simulator
Yuntao WANG Yoshinori AONO Tsuyoshi TAKAGI 
Publication:   
Publication Date: 2018/12/01
Vol. E101-A  No. 12 ; pp. 2162-2170
Type of Manuscript:  Special Section PAPER (Special Section on Information Theory and Its Applications)
Category: Cryptography and Information Security
Keyword: 
latticeLWE challengeBDDunique SVPembedding techniqueprogressive BKZ simulatorpost-quantum cryptography
 Summary | Full Text:PDF

Generalized Framework to Attack RSA with Special Exposed Bits of the Private Key
Shixiong WANG Longjiang QU Chao LI Shaojing FU 
Publication:   
Publication Date: 2017/10/01
Vol. E100-A  No. 10 ; pp. 2113-2122
Type of Manuscript:  PAPER
Category: Cryptography and Information Security
Keyword: 
RSApartial key exposure attacklatticeLLL algorithmCoppersmith's methodunravelled linearization
 Summary | Full Text:PDF

A New Attack on RSA with Known Middle Bits of the Private Key
Shixiong WANG Longjiang QU Chao LI Shaojing FU 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2015/12/01
Vol. E98-A  No. 12 ; pp. 2677-2685
Type of Manuscript:  PAPER
Category: Cryptography and Information Security
Keyword: 
RSAattack with known middle bitsCoppersmith's methodlatticeLLL algorithmunravelled linearization
 Summary | Full Text:PDF

A New Generic Construction of Proxy Signatures under Enhanced Security Models
Kee Sung KIM Ik Rae JEONG 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2015/04/01
Vol. E98-A  No. 4 ; pp. 975-981
Type of Manuscript:  PAPER
Category: Cryptography and Information Security
Keyword: 
proxy signaturegeneric constructionID-based signaturelattice
 Summary | Full Text:PDF

Bit-Plane Coding of Lattice Codevectors
Wisarn PATCHOO Thomas R. FISCHER 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2013/08/01
Vol. E96-A  No. 8 ; pp. 1817-1820
Type of Manuscript:  LETTER
Category: Coding Theory
Keyword: 
lattice vector quantizationlatticebit-plane coding
 Summary | Full Text:PDF

Granular Gain of Low-Dimensional Lattices from Binary Linear Codes
Misako KOTANI Shingo KAWAMOTO Motohiko ISAKA 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2012/12/01
Vol. E95-A  No. 12 ; pp. 2168-2170
Type of Manuscript:  Special Section LETTER (Special Section on Information Theory and Its Applications)
Category: Coding Theory
Keyword: 
granular gainlatticelinear codesquantization
 Summary | Full Text:PDF

Small Secret CRT-Exponent Attacks on Takagi's RSA
Naoyuki SHINOHARA Tetsuya IZU Noboru KUNIHIRO 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2011/01/01
Vol. E94-A  No. 1 ; pp. 19-27
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: Public Key Cryptography
Keyword: 
CRT-exponentlatticeLLLTakagi's RSA
 Summary | Full Text:PDF

Bisections of Two Sets of Points in the Plane Lattice
Miyuki UNO Tomoharu KAWANO Mikio KANO 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2009/02/01
Vol. E92-A  No. 2 ; pp. 502-507
Type of Manuscript:  PAPER
Category: Algorithms and Data Structures
Keyword: 
red pointblue pointlatticebisectorrectangular cutsemi-rectangular cuttwo sets of points
 Summary | Full Text:PDF

Small Secret Key Attack on a Takagi's Variant of RSA
Kouichi ITOH Noboru KUNIHIRO Kaoru KUROSAWA 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2009/01/01
Vol. E92-A  No. 1 ; pp. 33-41
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: Public Key Cryptography
Keyword: 
latticeLLLtrivariate polynomialRSA
 Summary | Full Text:PDF

A Digital Signature Scheme Based on NP-Complete Lattice Problems
Shunichi HAYASHI Mitsuru TADA 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2008/05/01
Vol. E91-A  No. 5 ; pp. 1253-1264
Type of Manuscript:  PAPER
Category: Cryptography and Information Security
Keyword: 
NP-complete problemlatticeidentification schemesignature scheme
 Summary | Full Text:PDF

Factorization of Square-Free Integers with High Bits Known
Bagus SANTOSO Noboru KUNIHIRO Naoki KANAYAMA Kazuo OHTA 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2008/01/01
Vol. E91-A  No. 1 ; pp. 306-315
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: Cryptanalysis
Keyword: 
factorizationlatticeCoppersmith's method
 Summary | Full Text:PDF

New NP-Complete Problems Associated with Lattices
Shunichi HAYASHI Mitsuru TADA 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2007/05/01
Vol. E90-A  No. 5 ; pp. 941-948
Type of Manuscript:  Special Section PAPER (Special Section on Discrete Mathematics and Its Applications)
Category: 
Keyword: 
NP-complete problemlatticeELVPBELVPNELVP
 Summary | Full Text:PDF

Some Trellis Properties on Lattices
Haibin KAN Hong SHEN 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2005/07/01
Vol. E88-A  No. 7 ; pp. 1979-1986
Type of Manuscript:  PAPER
Category: Coding Theory
Keyword: 
latticetrellis diagramsdual latticestensor product
 Summary | Full Text:PDF

Fast Modular Reduction over Euclidean Rings and Its Application to Universal Hash Functions
Xiangyong ZENG Lei HU 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2005/01/01
Vol. E88-A  No. 1 ; pp. 305-310
Type of Manuscript:  Special Section LETTER (Special Section on Cryptography and Information Security)
Category: 
Keyword: 
modular reductionEuclidean ringlatticeuniversal hash function familymessage authentication code
 Summary | Full Text:PDF

Two Methods for Decreasing the Computational Complexity of the MIMO ML Decoder
Takayuki FUKATANI Ryutaroh MATSUMOTO Tomohiko UYEMATSU 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2004/10/01
Vol. E87-A  No. 10 ; pp. 2571-2576
Type of Manuscript:  Special Section PAPER (Special Section on Information Theory and Its Applications)
Category: Communication Theory
Keyword: 
MIMO fading channelmaximum likelihood detectionsphere decoderlattice
 Summary | Full Text:PDF

A Note on Tanner Graphs for Group Block Codes and Lattices
Haibin KAN Hong SHEN 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2004/08/01
Vol. E87-A  No. 8 ; pp. 2182-2184
Type of Manuscript:  LETTER
Category: Coding Theory
Keyword: 
latticedual latticelabel codegroup codeTanner graph
 Summary | Full Text:PDF

Generalized Permutation Alphabets and Generating Groups
The Cuong DINH Takeshi HASHIMOTO 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 1998/01/25
Vol. E81-A  No. 1 ; pp. 147-155
Type of Manuscript:  PAPER
Category: Information Security
Keyword: 
trellis-coded modulation (TCM )geometrically uniform (GU ) codesmultidimensional (MD ) constellationspermutationslattice
 Summary | Full Text:PDF