Journal: IEICE Transactions

Volume 87-A, Issue 1

1 -- 0Koji Nakao. Foreword
2 -- 9Satoshi Hada. A Note on Transformations of Interactive Proofs that Preserve the Prover s Complexity
10 -- 17Koh-ichi Nagao, Shigenori Uchiyama, Naoki Kanayama, Kazuto Matsuo. Analysis of Baby-Step Giant-Step Algorithms for Non-uniform Distributions
18 -- 27Yasuo Hatano, Hidema Tanaka, Toshinobu Kaneko. Optimization for the Algebraic Method and Its Application to an Attack of MISTY1
28 -- 36Masahiko Takenaka, Takeshi Shimoyama, Takeshi Koshiba. Theoretical Analysis of chi:::2::: Attack on RC6
37 -- 45Dai Watanabe, Soichi Furuya, Hirotaka Yoshida, Kazuo Takaragi, Bart Preneel. A New Keystream Generator MUGI
46 -- 52Kaoru Kurosawa, Tetsu Iwata. TMAC: Two-Key CBC MAC
54 -- 59Swee-Huay Heng, Kaoru Kurosawa. Square Hash with a Small Key Size
60 -- 66Tetsu Iwata, Kaoru Kurosawa. On the Universal Hash Functions in Luby-Rackoff Cipher
67 -- 74Toshihiko Matsuo, Kaoru Kurosawa. On Parallel Hash Functions Based on Block-Ciphers
75 -- 84Katsuyuki Okeya, Tsuyoshi Takagi. SCA-Resistant and Fast Elliptic Scalar Multiplication Based on wNAF
85 -- 93Tetsuya Izu, Tsuyoshi Takagi. Fast Elliptic Curve Multiplications with SIMD Operations
94 -- 101Tsuyoshi Takagi. A Fast RSA-Type Public-Key Primitive Modulo p:::k:::q Using Hensel Lifting
102 -- 109Masao Kasahara, Ryuichi Sakai. A Construction of Public Key Cryptosystem for Realizing Ciphertext of Size 100 Bit and Digital Signature Scheme
110 -- 119Yuichi Komano, Kazuo Ohta. OAEP-ES - Methodology of Universal Padding Technique
120 -- 130Goichiro Hanaoka, Junji Shikata, Yuliang Zheng, Hideki Imai. Efficient Unconditionally Secure Digital Signatures
131 -- 140Masayuki Abe, Miyako Ohkubo, Koutarou Suzuki. 1-out-of-n Signatures from a Variety of Keys
141 -- 146Kaoru Kurosawa, Quang Viet Duong. How to Design Efficient Multiple-Use 1-out-n Oblivious Transfer
147 -- 151Wakaha Ogata, Ryota Sasahara. k out of n Oblivious Transfer without Random Oracles
152 -- 159Jun Anzai, Tsutomu Matsumoto. Interaction Key Generation Schemes
160 -- 172Goichiro Hanaoka, Kazuto Ogawa, Itsuro Murota, Go Ohtake, Keigo Majima, Seiichi Gohshi, Kimiyuki Oyamada, Seiichi Namba, Hideki Imai. Managing Encryption and Key Publication Independently in Digital Rights Management Systems
173 -- 181Koji Chida, Kunio Kobayashi, Hikaru Morita. An Auction Protocol Preserving Privacy of Losing Bids with a Secure Value Comparison Scheme
182 -- 189Akira Yamada, Shinsaku Kiyomoto, Toshiaki Tanaka, Koji Nakao. New Time-Stamping Scheme Using Mutual Communications with Pseudonymous Clients
190 -- 203Masakazu Soshi, Mamoru Maekawa, Eiji Okamoto. The Dynamic-Typed Access Matrix Model and Decidability of the Safety Problem
204 -- 211Kenji Imamoto, Kouichi Sakurai. Analysis and Design for Private Message Board Systems
212 -- 220Jun Furukawa. Secure Detection of Watermarks
221 -- 223Tetsuya Izu. A Note on the Lattice Factoring Method
224 -- 225Kazuhiro Hattanda, Shuichi Ichikawa. The Evaluation of Davidson s Digital Signature Scheme
226 -- 227Chik-How Tan. Key Substitution Attacks on Some Provably Secure Signature Schemes
228 -- 230Dong Jin Kwak, Sang-Jae Moon. A Distributed Sign-and-Encryption for Anonymity
231 -- 242Wen-Bin Lin, Bin-Da Liu. Coefficients Generation for the 4th-Order Leapfrog Sigma-Delta A/D Converters
243 -- 250Tae Hoon Lee, Won Sang Ra, Seung Hee Jin, Tae Sung Yoon, Jin Bae Park. Robust Extended Kalman Filtering via Krein Space Estimation
251 -- 257Yuya Matsumoto, Yuichi Tanji, Mamoru Tanaka. Sparse Realization of Passive Reduced-Order Interconnect Models via PRIMA
258 -- 269Donghyun Kim, Lee-Sup Kim. An Efficient Fragment Processing Technique in A-Buffer Implementation
270 -- 274Jonah Gamba, Tetsuya Shimamura. A New Method of Noise Variance Estimation from Low-Order Yule-Walker Equations
275 -- 279Pei-Yin Chen. VLSI Architecture for 2-D 3-Level Lifting-Based Discrete Wavelet Transform
280 -- 281Shoichi Hirose, Susumu Yoshida. An Approximate Scheme of Oblivious Transfer with Probabilistic Receipt
282 -- 285Shu-Chuan Chu, John F. Roddick, Zhe-Ming Lu, Jeng-Shyang Pan. A Digital Image Watermarking Method Based on Labeled Bisecting Clustering Algorithm
286 -- 291Takafumi Hayashi. A Generalization of Binary Zero-Correlation Zone Sequence Sets Constructed from Hadamard Matrices