Journal: IEICE Transactions

Volume 96-A, Issue 1

1 -- 0Tsutomu Matsumoto. Foreword
2 -- 14Shingo Yanagihara, Tetsu Iwata. Improving the Permutation Layer of Type 1, Type 3, Source-Heavy, and Target-Heavy Generalized Feistel Structures
15 -- 24Huajin Chen, Wenfeng Qi, Chuangui Ma. On the Construction of Boolean Functions with Optimal Algebraic Immunity Based on Factorization of Numbers of Variables
25 -- 34Yasushi Osaki, Tetsu Iwata. Security of Hash-then-CBC Key Wrapping Revisited
35 -- 41ChangKyun Kim, Eun-Gu Jung, Dong Hoon Lee 0002, Chang-Ho Jung, Daewan Han. Cryptanalysis of INCrypt32 in HID's iCLASS Systems
42 -- 52Tatsuaki Okamoto, Katsuyuki Takashima. Efficient (Hierarchical) Inner-Product Encryption Tightly Reduced from the Decisional Linear Assumption
53 -- 67Mitsuhiro Hattori, Takato Hirano, Takashi Ito, Nori Matsuda, Takumi Mori, Yusuke Sakai, Kazuo Ohta. Ciphertext-Policy Delegatable Hidden Vector Encryption and Its Application
68 -- 75Takuho Mitsunaga, Yoshifumi Manabe, Tatsuaki Okamoto. Efficient Secure Auction Protocols Based on the Boneh-Goh-Nissim Encryption
76 -- 91Atsushi Fujioka, Yoshiaki Okamoto, Taiichi Saito. Generic Construction of Strongly Secure Timed-Release Public-Key Encryption
92 -- 100Masayuki Abe, Tatsuaki Okamoto, Koutarou Suzuki. Message Recovery Signature Schemes from Sigma-Protocols
101 -- 110Mark Manulis, Koutarou Suzuki, Berkant Ustaoglu. Modeling Leakage of Ephemeral Secrets in Tripartite/Group Key Exchange
111 -- 120Hiroaki Kikuchi, Daisuke Kagawa, Anirban Basu, Kazuhiko Ishii, Masayuki Terada, Sadayuki Hongo. Scalable Privacy-Preserving Data Mining with Asynchronously Partitioned Datasets
121 -- 130Yu Sasaki. Meet-in-the-Middle Preimage Attacks on AES Hashing Modes and an Application to Whirlpool
131 -- 140Yu Sasaki. Boomerang Distinguishers on MD4-Based Hash Functions: First Practical Results on Full 5-Pass HAVAL Compression Function
141 -- 149Yu Sasaki, Kazumaro Aoki. Open-Key Distinguishers for the Internal Block Cipher of Tweaked Lesamnta
150 -- 157Masayuki Yoshino, Noboru Kunihiro. Random Sampling Reduction with Precomputation
158 -- 165Reo Yoshida, Katsuyuki Takashima. Computing a Sequence of 2-Isogenies on Supersingular Elliptic Curves
166 -- 170Atsushi Waseda. Multiparty Simultaneous Quantum Identity Authentication Secure against Fake Signal Attacks
171 -- 176Takayasu Kaida, Junru Zheng. On Constant-Weight Multi-Valued Sequences from Cyclic Difference Sets
177 -- 184Yang Li, Kazuo Ohta, Kazuo Sakiyama. A New Type of Fault-Based Attack: Fault Behavior Analysis
185 -- 195Hongying Liu, Xin Jin, Yukiyasu Tsunoo, Satoshi Goto. Correlated Noise Reduction for Electromagnetic Analysis
196 -- 205Yasufumi Hashimoto, Tsuyoshi Takagi, Kouichi Sakurai. General Fault Attacks on Multivariate Public Key Cryptosystems
206 -- 214Mun-Kyu Lee, Jung-Woo Kim, Jeong Eun Song, Kunsoo Park. Efficient Implementation of NTRU Cryptosystem Using Sliding Window Methods
215 -- 224Kuniyasu Suzaki, Kengo Iijima, Toshiki Yagi, Cyrille Artho. Implementation of a Memory Disclosure Attack on Memory Deduplication of Virtual Machines
225 -- 232Takahiro Kasama, Katsunari Yoshioka, Daisuke Inoue, Tsutomu Matsumoto. Catching the Behavioral Differences between Multiple Executions for Malware Detection
233 -- 236Kazumaro Aoki. Provable Security against Cryptanalysis with Impossible Differentials
237 -- 241Kan Yasuda. A Parallelizable PRF-Based MAC Algorithm: Well beyond the Birthday Bound
242 -- 243Bennian Dou, Hong Zhang, Chun-Hua Chen, Chungen Xu. Rogue Key Attacks on Lu et al.'s Verifiably Encrypted Signature Scheme
244 -- 245Bennian Dou, Hong Zhang, Chun-Hua Chen, Chungen Xu. Key Substitution Attacks on Multisignature Schemes
246 -- 0Makoto Itami. Foreword
247 -- 254Hidekazu Murata, Susumu Yoshida, Koji Yamamoto, Daisuke Umehara, Satoshi Denno, Masahiro Morikura. Software Radio-Based Distributed Multi-User MIMO Testbed: Towards Green Wireless Communications
255 -- 263Poomathi Duraisamy, Lim Nguyen. Performance Analysis of Coded-Sequence Self-Encoded Spread Spectrum over Rayleigh Fading Channel
264 -- 273Masahiro Fujii, Yu Watanabe. Primary Signal to Noise Ratio Estimation Based on AIC for UWB Systems
274 -- 284Huan-Bang Li, Kunio Yata, Kenichi Takizawa, Noriaki Miyazaki, Takashi Okada, Kohei Ohno, Takuji Mochizuki, Eishin Nakagawa, Takehiko Kobayashi. Examination of Effective UWB Avoidance Based on Experiments for Coexistence with Other Wireless Systems
285 -- 292Kenichi Takizawa, Hirotaka Yamane, Huan-Bang Li, Feng Lu, Kohei Ohno, Takuji Mochizuki, Takashi Okada, Kunio Yata, Hisashi Nishikawa, Takehiko Kobayashi. Detection Capability of Downlink Signals in Mobile WiMAX and 3GPP LTE with an FFT-Based UWB Receiver
293 -- 295Tsukasa Takahashi, Teruyuki Miyajima. A Max-Min Approach to Channel Shortening in OFDM Systems
296 -- 297Soobum Cho, Sang Kyu Park. Hybrid DCT/DST Precoding Scheme for the PAPR Reduction of OFDM Systems
298 -- 303Shinpei Noguchi, Mamiko Inamori, Yukitoshi Sanada. Reliable Data Transmission for Resonant-Type Wireless Power Transfer
304 -- 311SooHwan Choi, DooSeop Eom. Minimizing False Peak Errors in Generalized Cross-Correlation Time Delay Estimation Using Subsample Time Delay Estimation
312 -- 321Kazushi Kawamura, Masao Yanagisawa, Nozomu Togawa. A Thermal-Aware High-Level Synthesis Algorithm for RDR Architectures through Binding and Allocation
322 -- 331Sun-Mi Park, Ku-Young Chang, Dowon Hong, Changho Seo. m) Defined by Pentanomials Using Weakly Dual Basis
332 -- 339XinJie Zhao, Shize Guo, Fan Zhang, Tao Wang, Zhijie Shi, Hao Luo. Enhanced Side-Channel Cube Attacks on PRESENT
340 -- 344Ken Kihara, Marina Seki, Sakuichi Ohtsuka. Deterioration of Visibility of Scrolling Text Presented Nearby Image Moving in the Opposite Direction
345 -- 355Masashi Nomura, Shigemasa Takai. Computation of Sublanguages for Synthesizing Decentralized Supervisors for Timed Discrete Event Systems
356 -- 359Hiroshi Ninomiya, Manabu Kobayashi, Shigeyoshi Watanabe. Reduced Reconfigurable Logic Circuit Design Based on Double Gate CNTFETs Using Ambipolar Binary Decision Diagram
360 -- 362Shaojing Fu, Chao Li, Longjiang Qu. Generalized Construction of Boolean Function with Maximum Algebraic Immunity Using Univariate Polynomial Representation
363 -- 366Xiaoping Li, Wenping Ma, Tongjiang Yan, Xubo Zhao. Linear Complexity of Binary Whiteman Generalized Cyclotomic Sequences of Order 4
367 -- 372Fanxin Zeng, Xiaoping Zeng, Xiangyong Zeng, Zhenyu Zhang, Guixin Xuan. Several Types of Sequences with Optimal Autocorrelation Properties
373 -- 376Yier Yan, Moon Ho Lee. Low Complexity Decoder Design for Non-binary LDPC Coded MIMO System Using Quasi-Orthogonal STBC
377 -- 382Xiaoyu Chen, Chengqian Xu, Yubo Li, Kai Liu. Construction of Shift Distinct Sequence Sets with Zero or Low Correlation Zone
383 -- 386Sungho Hwang, Kyungjun Kim. Channel Localization Mechanism for Wi-Fi Systems
387 -- 390Jang-Kyun Ahn, Seung-Jun Yu, Hyoung-Kyu Song. Channel Condition Number Based Switching Detection Scheme in MIMO-OFDM System
391 -- 393Haijun Liang, Hongyu Yang, Bo Yang. Traffic Flow Simulator Using Virtual Controller Model
394 -- 397Xin He, Huiyun Jing, Qi Han, Xiamu Niu. Region Diversity Based Saliency Density Maximization for Salient Object Detection