Journal: IEICE Trans. Fundam. Electron. Commun. Comput. Sci.

Volume 107, Issue 3

192 -- 0Noboru Kunihiko. Foreword
193 -- 202Rikuhiro Kojima, Jacob C. N. Schuldt, Goichiro Hanaoka. A New Pairing-Based Two-Round Tightly-Secure Multi-Signature Scheme with Key Aggregation
203 -- 217Kyosuke Yamashita, Keisuke Hara, Yohei Watanabe 0001, Naoto Yanai, Junji Shikata. Designated Verifier Signature with Claimability
218 -- 233Hirotomo Shinoki, Koji Nuida. On Extension of Evaluation Algorithms in Keyed-Homomorphic Encryption
234 -- 247Daisuke Maeda, Koki Morimura, Shintaro Narisada, Kazuhide Fukushima, Takashi Nishide. Efficient Homomorphic Evaluation of Arbitrary Uni/Bivariate Integer Functions and Their Applications
248 -- 259Kyoichi Asano, Keita Emura, Atsushi Takayasu. More Efficient Adaptively Secure Lattice-Based IBE with Equality Test in the Standard Model
260 -- 274Keita Emura. Generic Construction of Public-Key Authenticated Encryption with Keyword Search Revisited
275 -- 282Yasuhiko Ikematsu, Tsunekazu Saito. Hilbert Series for Systems of UOV Polynomials
283 -- 290Keitaro Hiwatashi, Koji Nuida. Correlated Randomness Reduction in Domain-Restricted Secure Two-Party Computation
291 -- 305Takayuki Sasaki, Mami Kawaguchi, Takuhiro Kumagai, Katsunari Yoshioka, Tsutomu Matsumoto. Observation of Human-Operated Accesses Using Remote Management Device Honeypot
306 -- 318Ren Takeuchi, Rikima Mitsuhashi, Masakatsu Nishigaki, Tetsushi Ohki. Ensemble Malware Classifier Considering PE Section Information
319 -- 330Vu Trung Duong Le, Hoai Luan Pham, Thi Hong Tran, Yasuhiko Nakashima. Flexible and Energy-Efficient Crypto-Processor for Arbitrary Input Length Processing in Blockchain-Based IoT Applications
331 -- 343Hanae Nozaki, Kazukuni Kobara. Power Analysis of Floating-Point Operations for Leakage Resistance Evaluation of Neural Network Model Parameters
344 -- 354Tatsuya Oyama, Kota Yoshida, Shunsuke Okura, Takeshi Fujino. Adversarial Examples Created by Fault Injection Attack on Image Sensor Interface
355 -- 358Shingo Yashiki, Chako Takahashi, Koutarou Suzuki. Backdoor Attacks on Graph Neural Networks Trained with Data Augmentation
359 -- 0Yuichi Kaji. Foreword
360 -- 372Mitsugu Iwamoto. Information-Theoretic Perspectives for Simulation-Based Security in Multi-Party Computation
373 -- 383Shoichiro Yamasaki, Tomoko K. Matsushima, Kyohei Ono, Hirokazu Tanaka. Variable-Length Orthogonal Codes over Finite Fields Realizing Data Multiplexing and Error Correction Coding Simultaneously
384 -- 392Sho Higuchi, Yuta Sakai. A Fundamental Limit of Variable-Length Compression with Worst-Case Criteria in Terms of Side Information
393 -- 403Tomohiko Uyematsu, Tetsunao Matsuta. Equivalences among Some Information Measures for Individual Sequences and Their Applications for Fixed-Length Coding Problems
404 -- 408Mikihiko Nishiara, Yuki Ito. Proof of Achievability Part of Rate-Distortion Theorem without Random Coding
409 -- 416Takahiro Ota, Akiko Manada. A Reconstruction of Circular Binary String Using Substrings and Minimal Absent Words
417 -- 447Kengo Hashimoto, Ken-ichi Iwata. k-Bit Delay Decodable Codes
448 -- 457Koshi Shimada, Shota Saito, Toshiyasu Matsushima. An Efficient Bayes Coding Algorithm for Changing Context Tree Model
458 -- 463Masaki Hori, Mikihiko Nishiara. Channel Capacity with Cost Constraint Allowing Cost Overrun
464 -- 475Toru Nakanishi 0001, Atsuki Iriboshi, Katsunobu Imai. Short DL-Based Blacklistable Ring Signatures from DualRing
476 -- 485Daisuke Hibino, Tomoharu Shibuya. Efficient Construction of Encoding Polynomials in a Distributed Coded Computing Scheme
486 -- 492Asahi Mizukoshi, Ayano Nakai-Kasai, Tadashi Wadayama. PSOR-Jacobi Algorithm for Accelerated MMSE MIMO Detection
493 -- 502Ken Hisanaga, Motohiko Isaka. Communication-Efficient Distributed Orthogonal Approximate Message Passing for Sparse Signal Recovery
503 -- 509Shota Saito. Meta-Bound on Lower Bounds of Bayes Risk in Parameter Estimation
510 -- 518Jun Suzuki. Bayesian Nagaoka-Hayashi Bound for Multiparameter Quantum-State Estimation Problem
519 -- 522Minami Sato, Sosuke Minamoto, Ryuichi Sakai, Yasuyuki Murakami. High-Density Knapsack Cryptosystem Using Shifted-Odd and Super-Increasing Sequence
523 -- 525Yuta Nakahara, Toshiyasu Matsushima. Batch Updating of a Posterior Tree Distribution Over a Meta-Tree
526 -- 529Shogo Chiwaki, Ryutaroh Matsumoto. Performance Comparison of the Two Reconstruction Methods for Stabilizer-Based Quantum Secret Sharing
530 -- 0Nozomu Togawa. Foreword
531 -- 539Masahiro Nishimura, Taito Manabe, Yuichiro Shibata. Pipelined ADPCM Compression for HDR Synthesis on an FPGA
540 -- 548Jiaxuan Lu, Yutaka Masuda, Tohru Ishihara. Identification of Redundant Flip-Flops Using Fault Injection for Low-Power Approximate Computing Circuits
549 -- 556Momoko Fukuda, Makoto Ikeda. Template-Based Design Optimization for Selecting Pairing-Friendly Curve Parameters
557 -- 565Sohei Shimomai, Kei Ueda, Shinji Kimura. Input Data Format for Sparse Matrix in Quantum Annealing Emulator
566 -- 574Ryosuke Matsuo, Shin-ichi Minato. A Complete Library of Cross-Bar Gate Logic with Three Control Inputs
575 -- 582Kotaro Abe, Makoto Ikeda. Template Attacks on ECDSA Hardware and Theoretical Estimation of the Success Rate
583 -- 591Masayoshi Yoshimura, Atsuya Tsujikawa, Toshinori Hosokawa. CRLock: A SAT and FALL Attacks Resistant Logic Locking Method for Controller at Register Transfer Level
592 -- 599Tomohiro Nishiguchi, Nobutaka Kuroki, Masahiro Numa. Technology Remapping Approach Using Multi-Gate Reconfigurable Cells for Post-Mask Functional ECO
600 -- 609Yuya Ushioda, Mineo Kaneko. ILP Based Approaches for Optimizing Early Decompute in Two Level Adiabatic Logic Circuits

Volume 107, Issue 2

187 -- 191Qingping Yu, You Zhang, Renze Luo, Longye Wang, Xingwang Li. Parity-Check Polarization-Adjusted Convolutional Coding

Volume 107, Issue 1

1 -- 2Eiji Konaka. Foreword
3 -- 15Takumi Komori, Yutaka Masuda, Tohru Ishihara. Virtualizing DVFS for Energy Minimization of Embedded Dual-OS Platform
16 -- 24Takahiro Fujita, Kazuyuki Wada, Kawori Sekine. An Output Voltage Estimation and Regulation System Using Only the Primary-Side Electrical Parameters for Wireless Power Transfer Circuits
25 -- 30Kyohei Murakata, Koichi Kobayashi, Yuh Yamashita. Multi-Agent Surveillance Based on Travel Cost Minimization
31 -- 37Keita Terashima, Koichi Kobayashi, Yuh Yamashita. Reinforcement Learning for Multi-Agent Systems with Temporal Logic Specifications
38 -- 51Soma Kawakami, Yosuke Mukasa, Siya Bao, Dema Ba, Junya Arai, Satoshi Yagi, Junji Teramoto, Nozomu Togawa. Ising-Machine-Based Solver for Constrained Graph Coloring Problems
52 -- 62Soma Kawakami, Kentaro Ohno, Dema Ba, Satoshi Yagi, Junji Teramoto, Nozomu Togawa. Giving a Quasi-Initial Solution to Ising Machines by Controlling External Magnetic Field Coefficients
63 -- 74Ryotaro Negishi, Tatsuki Kurihara, Nozomu Togawa. Hardware-Trojan Detection at Gate-Level Netlists Using a Gradient Boosting Decision Tree Model and Its Extension Using Trojan Probability Propagation
75 -- 86Kota Hisafuru, Kazunari Takasaki, Nozomu Togawa. An Anomalous Behavior Detection Method Utilizing IoT Power Waveform Shapes
87 -- 95Koyo Kugiyama, Seiji Miyoshi. Statistical-Mechanical Analysis of Adaptive Volterra Filter for Nonwhite Input Signals
96 -- 104Takuma Nagao, Tomoki Nakamura, Masuo Kajiyama, Makoto Eiki, Michiko Inoue, Michihiro Shintani. Wafer-Level Characteristic Variation Modeling Considering Systematic Discontinuous Effects
105 -- 113Xingyu Wang, Ruilin Zhang, Hirofumi Shinohara. A Single-Inverter-Based True Random Number Generator with On-Chip Clock-Tuning-Based Entropy Calibration Circuit
114 -- 118Fujihiko Matsumoto, Hinano Ohtsu. Consideration of Integrated Low-Frequency Low-Pass Notch Filter Employing CCII Based Capacitance Multipliers
119 -- 124Wenhui Liu, Xiaoni Du, Xingbin Qiao. Construction of a Class of Linear Codes with at Most Three-Weight and the Application
125 -- 133Yitu Wang, Takayuki Nakachi. Network Traffic Anomaly Detection: A Revisiting to Gaussian Process and Sparse Representation
134 -- 140Jinguang Hao, Gang Wang 0029, Honggang Wang, Lili Wang, Xuefeng Liu. Low-Complexity Digital Channelizer Design for Software Defined Radio
141 -- 156Aorui Gou, Jingjing Liu, Xiaoxiang Chen, Xiaoyang Zeng, Yibo Fan. CCTSS: The Combination of CNN and Transformer with Shared Sublayer for Detection and Classification
157 -- 168Nabilah Shabrina, Dongju Li, Tsuyoshi Isshiki. High Precision Fingerprint Verification for Small Area Sensor Based on Deep Learning
169 -- 173Yifan Guo, Zhijun Wang, Wu Guan, Liping Liang, Xin Qiu. An Efficient Signal Detection Method Based on Enhanced Quasi-Newton Iteration for Massive MIMO Systems
174 -- 177Yanyan Chang, Wei Zhang 0055, Hao Wang 0072, Lina Shi, Yanyan Liu. Prime-Factor GFFT Architecture for Fast Frequency Domain Decoding of Cyclic Codes
178 -- 181Zhi Liu 0008, Siyuan Zhang, Xiaohan Guan, Mengmeng Zhang. A Fast Intra Mode Decision Algorithm in VVC Based on Feature Cross for Screen Content Videos
182 -- 186Chaorong Zhang, Yuyang Peng, Ming Yue, Fawaz Al Hazemi. A Simple Design of Reconfigurable Intelligent Surface-Assisted Index Modulation: Generalized Reflected Phase Modulation