Journal: IEICE Transactions

Volume 103-A, Issue 1

1 -- 0Atsushi Fujioka. Foreword
2 -- 10Yuhei Watanabe, Hideki Yamamoto, Hirotaka Yoshida. Towards Minimizing RAM Requirement for Implementation of Grain-128a on ARM Cortex-M3
11 -- 20Junichi Sakamoto, Daisuke Fujimoto, Tsutomu Matsumoto. Laser-Induced Controllable Instruction Replacement Fault Attack
21 -- 32Hiraku Morita, Nuttapong Attrapadung, Tadanori Teruya, Satsuya Ohata, Koji Nuida, Goichiro Hanaoka. Constant-Round Client-Aided Two-Server Secure Comparison Protocol and Its Applications
33 -- 40Junichi Tomida, Masayuki Abe, Tatsuaki Okamoto. Efficient Inner Product Functional Encryption with Full-Hiding Security
41 -- 73Tatsuaki Okamoto, Katsuyuki Takashima. Decentralized Attribute-Based Encryption and Signatures
74 -- 106Katsuyuki Takashima. Expressive Attribute-Based Encryption with Constant-Size Ciphertexts from the Decisional Linear Assumption
107 -- 113Junichiro Hayata, Masahito Ishizaka, Yusuke Sakai 0001, Goichiro Hanaoka, Kanta Matsuura. Generic Construction of Adaptively Secure Anonymous Key-Policy Attribute-Based Encryption from Public-Key Searchable Encryption
114 -- 124Yu Zhang, Yansong Zhao, Yifan Wang, Yin Li. Searchable Public Key Encryption Supporting Simple Boolean Keywords Search
125 -- 140Keita Emura, Takuya Hayashi 0001. A Revocable Group Signature Scheme with Scalability from Simple Assumptions
141 -- 149Kaisei Kajita, Kazuto Ogawa, Eiichiro Fujisaki. A Constant-Size Signature Scheme with a Tighter Reduction from the CDH Assumption
150 -- 164Goichiro Hanaoka, Yusuke Sakai 0001, Toshiya Shimizu, Takeshi Shimoyama, SeongHan Shin. A Setup-Free Threshold Encryption Scheme for the Bitcoin Protocol and Its Applications
165 -- 172Yusuke Sakai 0001, Goichiro Hanaoka. Practical Public-Key Encryption Scheme Tightly Secure in the Random Oracle Model
173 -- 182Hiroki Okada, Atsushi Takayasu, Kazuhide Fukushima, Shinsaku Kiyomoto, Tsuyoshi Takagi. On the Complexity of the LWR-Solving BKW Algorithm
183 -- 194Satoshi Yasuda, Yoshihiro Koseki, Yusuke Sakai 0001, Fuyuki Kitagawa, Yutaka Kawai, Goichiro Hanaoka. Verifiable Privacy-Preserving Data Aggregation Protocols
195 -- 211Seiko Arita, Sari Handa. Fully Homomorphic Encryption Scheme Based on Decomposition Ring
212 -- 214Kosei Sakamoto, Kazuhiko Minematsu, Nao Shibata, Maki Shigeri, Hiroyasu Kubo, Yuki Funabiki, Takanori Isobe 0001. Security of Related-Key Differential Attacks on TWINE, Revisited
215 -- 220Xiaochen Liu, Yuanyuan Gao, Nan Sha, Guozhen Zang, Kui Xu 0001. Secrecy Rate Optimization for RF Powered Two-Hop Untrusted Relay Networks with Non-Linear EH Model
221 -- 224Shaojing Fu, Yunpeng Yu, Ming Xu 0002. A New Efficient Algorithm for Secure Outsourcing of Modular Exponentiations
225 -- 0Takayoshi Yokota. Foreword
226 -- 230Koichi Sakai. Public Transport Promotion and Mobility-as-a-Service
231 -- 242Mahmud Dwi Sulistiyo, Yasutomo Kawanishi, Daisuke Deguchi, Ichiro Ide, Takatsugu Hirayama, Jiang Yu Zheng, Hiroshi Murase. Attribute-Aware Loss Function for Accurate Semantic Segmentation Considering the Pedestrian Orientations
243 -- 251Akira John Suzuki, Masahiro Yamamoto, Kiyoshi Mizui. Visible Light V2V Communication and Ranging System Prototypes Using Spread Spectrum Techniques
252 -- 264Abraham Monrroy, Eijiro Takeuchi, Shinpei Kato, Masato Edahiro. An Open Multi-Sensor Fusion Toolbox for Autonomous Vehicles
265 -- 267Chi-Hua Chen. A Cell Probe-Based Method for Vehicle Speed Estimation
268 -- 0Minoru Okada. Foreword
269 -- 277Huan-Bang Li, Kenichi Takizawa, Fumihide Kojima. Accelerating Outdoor UWB - Domestic Regulation Transition and Standardization within IEEE 802.15
278 -- 286Takamasa Shimada, Noriko Konno, Atsuya Yokoi, Noriharu Miyaho. Psychological and Physiological Effects of Visible Light Communication Using Versatile CSK Code Patterns
287 -- 294Ran Sun, Hiromasa Habuchi, Yusuke Kozawa. Free Space Optical Turbo Coded Communication System with Hybrid PPM-OOK Signaling
295 -- 296Deng-Fong Lu, Chin Hsia, Kun-Chu Lee. An Integrated Wideband Operational Transconductance Amplifier with Complementary Slew-Rate Enhancer
297 -- 302Yun Zhang, Bingrui Li, Shujuan Yu, Meisheng Zhao. Blind Detection Algorithm Based on Spectrum Sharing and Coexistence for Machine-to-Machine Communication
303 -- 312Sou Nobukawa, Hirotaka Doho, Natsusaku Shibata, Haruhiko Nishimura, Teruya Yamanishi. Chaos-Chaos Intermittency Synchronization Controlled by External Feedback Signals in Chua's Circuits
313 -- 324Takanori Isobe 0001, Kazuhiko Minematsu. Security Analysis and Countermeasures of an End-to-End Encryption Scheme of LINE
325 -- 333Ramy Taki ElDin, Hajime Matsui. Run-Length Constraint of Cyclic Reverse-Complement and Constant GC-Content DNA Codes
334 -- 345Toshihiro Niinomi, Hideki Yagi, Shigeichi Hirasawa. Decision Feedback Scheme with Criterion LR+Th for the Ensemble of Linear Block Codes
346 -- 355Shu Fujita, Keita Takahashi, Toshiaki Fujii. Good Group Sparsity Prior for Light Field Interpolation
356 -- 360Xingyu Zhang, Xia Zou, Meng Sun 0001, Penglong Wu, Yimin Wang, Jun He. On the Complementary Role of DNN Multi-Level Enhancement for Noisy Robust Speaker Recognition in an I-Vector Framework
361 -- 365Wei Jhang, Shiaw-Wu Chen, Ann-Chen Chang. Computationally Efficient DOA Estimation for Massive Uniform Linear Array
366 -- 369Deng Tang. A Note on the Algebraic Immunity of the Enhanced Boolean Functions
370 -- 375Yang Ding, Xiaohua Lu. Galois Hulls of Cyclic Codes over Finite Fields
376 -- 381Feng Liu 0004, Xuecheng He, Conggai Li, YanLi Xu. CsiNet-Plus Model with Truncation and Noise on CSI Feedback
382 -- 388Shengnan Yan, Mingxin Liu, Jingjing Si. Distributed Collaborative Spectrum Sensing Using 1-Bit Compressive Sensing in Cognitive Radio Networks