


default search action
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, Volume 87-A
Volume 87-A, Number 1, 2004
- Koji Nakao:
Foreword. 1 - Satoshi Hada:
A Note on Transformations of Interactive Proofs that Preserve the Prover's Complexity. 2-9 - Koh-ichi Nagao, Shigenori Uchiyama, Naoki Kanayama, Kazuto Matsuo:
Analysis of Baby-Step Giant-Step Algorithms for Non-uniform Distributions. 10-17 - Yasuo Hatano, Hidema Tanaka, Toshinobu Kaneko:
Optimization for the Algebraic Method and Its Application to an Attack of MISTY1. 18-27 - Masahiko Takenaka, Takeshi Shimoyama, Takeshi Koshiba:
Theoretical Analysis of chi2 Attack on RC6. 28-36 - Dai Watanabe, Soichi Furuya, Hirotaka Yoshida, Kazuo Takaragi, Bart Preneel:
A New Keystream Generator MUGI. 37-45 - Kaoru Kurosawa, Tetsu Iwata:
TMAC: Two-Key CBC MAC. 46-52 - Swee-Huay Heng, Kaoru Kurosawa:
Square Hash with a Small Key Size. 54-59 - Tetsu Iwata, Kaoru Kurosawa:
On the Universal Hash Functions in Luby-Rackoff Cipher. 60-66 - Toshihiko Matsuo, Kaoru Kurosawa:
On Parallel Hash Functions Based on Block-Ciphers. 67-74 - Katsuyuki Okeya, Tsuyoshi Takagi:
SCA-Resistant and Fast Elliptic Scalar Multiplication Based on wNAF. 75-84 - Tetsuya Izu, Tsuyoshi Takagi:
Fast Elliptic Curve Multiplications with SIMD Operations. 85-93 - Tsuyoshi Takagi:
A Fast RSA-Type Public-Key Primitive Modulo pkq Using Hensel Lifting. 94-101 - Masao Kasahara, Ryuichi Sakai:
A Construction of Public Key Cryptosystem for Realizing Ciphertext of Size 100 Bit and Digital Signature Scheme. 102-109 - Yuichi Komano, Kazuo Ohta:
OAEP-ES - Methodology of Universal Padding Technique. 110-119 - Goichiro Hanaoka, Junji Shikata, Yuliang Zheng, Hideki Imai:
Efficient Unconditionally Secure Digital Signatures. 120-130 - Masayuki Abe, Miyako Ohkubo, Koutarou Suzuki:
1-out-of-n Signatures from a Variety of Keys. 131-140 - Kaoru Kurosawa, Quang Viet Duong:
How to Design Efficient Multiple-Use 1-out-n Oblivious Transfer. 141-146 - Wakaha Ogata, Ryota Sasahara:
k out of n Oblivious Transfer without Random Oracles. 147-151 - Jun Anzai, Tsutomu Matsumoto:
Interaction Key Generation Schemes. 152-159 - Goichiro Hanaoka, Kazuto Ogawa, Itsuro Murota, Go Ohtake, Keigo Majima, Seiichi Gohshi, Kimiyuki Oyamada, Seiichi Namba, Hideki Imai:
Managing Encryption and Key Publication Independently in Digital Rights Management Systems. 160-172 - Koji Chida, Kunio Kobayashi, Hikaru Morita:
An Auction Protocol Preserving Privacy of Losing Bids with a Secure Value Comparison Scheme. 173-181 - Akira Yamada, Shinsaku Kiyomoto, Toshiaki Tanaka, Koji Nakao:
New Time-Stamping Scheme Using Mutual Communications with Pseudonymous Clients. 182-189 - Masakazu Soshi, Mamoru Maekawa, Eiji Okamoto:
The Dynamic-Typed Access Matrix Model and Decidability of the Safety Problem. 190-203 - Kenji Imamoto, Kouichi Sakurai:
Analysis and Design for Private Message Board Systems. 204-211 - Jun Furukawa:
Secure Detection of Watermarks. 212-220 - Tetsuya Izu:
A Note on the Lattice Factoring Method. 221-223 - Kazuhiro Hattanda, Shuichi Ichikawa:
The Evaluation of Davidson's Digital Signature Scheme. 224-225 - Chik How Tan:
Key Substitution Attacks on Some Provably Secure Signature Schemes. 226-227 - Dong Jin Kwak, Sang-Jae Moon:
A Distributed Sign-and-Encryption for Anonymity. 228-230
- Wen-Bin Lin, Bin-Da Liu:
Coefficients Generation for the 4th-Order Leapfrog Sigma-Delta A/D Converters. 231-242 - Tae Hoon Lee, Won-Sang Ra, Seung Hee Jin, Tae Sung Yoon, Jin Bae Park:
Robust Extended Kalman Filtering via Krein Space Estimation. 243-250 - Yuya Matsumoto, Yuichi Tanji, Mamoru Tanaka:
Sparse Realization of Passive Reduced-Order Interconnect Models via PRIMA. 251-257 - Donghyun Kim, Lee-Sup Kim:
An Efficient Fragment Processing Technique in A-Buffer Implementation. 258-269 - Jonah Gamba, Tetsuya Shimamura:
A New Method of Noise Variance Estimation from Low-Order Yule-Walker Equations. 270-274 - Pei-Yin Chen:
VLSI Architecture for 2-D 3-Level Lifting-Based Discrete Wavelet Transform. 275-279 - Shoichi Hirose, Susumu Yoshida:
An Approximate Scheme of Oblivious Transfer with Probabilistic Receipt. 280-281 - Shu-Chuan Chu, John F. Roddick, Zhe-Ming Lu, Jeng-Shyang Pan:
A Digital Image Watermarking Method Based on Labeled Bisecting Clustering Algorithm. 282-285 - Takafumi Hayashi:
A Generalization of Binary Zero-Correlation Zone Sequence Sets Constructed from Hadamard Matrices. 286-291

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.