


default search action
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, Volume 87-A
Volume 87-A, Number 1, 2004
- Koji Nakao:

Foreword. 1 - Satoshi Hada:

A Note on Transformations of Interactive Proofs that Preserve the Prover's Complexity. 2-9 - Koh-ichi Nagao, Shigenori Uchiyama, Naoki Kanayama, Kazuto Matsuo:

Analysis of Baby-Step Giant-Step Algorithms for Non-uniform Distributions. 10-17 - Yasuo Hatano, Hidema Tanaka, Toshinobu Kaneko:

Optimization for the Algebraic Method and Its Application to an Attack of MISTY1. 18-27 - Masahiko Takenaka, Takeshi Shimoyama, Takeshi Koshiba:

Theoretical Analysis of chi2 Attack on RC6. 28-36 - Dai Watanabe, Soichi Furuya, Hirotaka Yoshida, Kazuo Takaragi, Bart Preneel:

A New Keystream Generator MUGI. 37-45 - Kaoru Kurosawa, Tetsu Iwata:

TMAC: Two-Key CBC MAC. 46-52 - Swee-Huay Heng, Kaoru Kurosawa:

Square Hash with a Small Key Size. 54-59 - Tetsu Iwata, Kaoru Kurosawa:

On the Universal Hash Functions in Luby-Rackoff Cipher. 60-66 - Toshihiko Matsuo, Kaoru Kurosawa:

On Parallel Hash Functions Based on Block-Ciphers. 67-74 - Katsuyuki Okeya, Tsuyoshi Takagi:

SCA-Resistant and Fast Elliptic Scalar Multiplication Based on wNAF. 75-84 - Tetsuya Izu, Tsuyoshi Takagi:

Fast Elliptic Curve Multiplications with SIMD Operations. 85-93 - Tsuyoshi Takagi:

A Fast RSA-Type Public-Key Primitive Modulo pkq Using Hensel Lifting. 94-101 - Masao Kasahara, Ryuichi Sakai:

A Construction of Public Key Cryptosystem for Realizing Ciphertext of Size 100 Bit and Digital Signature Scheme. 102-109 - Yuichi Komano, Kazuo Ohta:

OAEP-ES - Methodology of Universal Padding Technique. 110-119 - Goichiro Hanaoka, Junji Shikata, Yuliang Zheng, Hideki Imai:

Efficient Unconditionally Secure Digital Signatures. 120-130 - Masayuki Abe, Miyako Ohkubo, Koutarou Suzuki:

1-out-of-n Signatures from a Variety of Keys. 131-140 - Kaoru Kurosawa, Quang Viet Duong:

How to Design Efficient Multiple-Use 1-out-n Oblivious Transfer. 141-146 - Wakaha Ogata, Ryota Sasahara:

k out of n Oblivious Transfer without Random Oracles. 147-151 - Jun Anzai, Tsutomu Matsumoto:

Interaction Key Generation Schemes. 152-159 - Goichiro Hanaoka, Kazuto Ogawa, Itsuro Murota, Go Ohtake, Keigo Majima, Seiichi Gohshi, Kimiyuki Oyamada, Seiichi Namba, Hideki Imai:

Managing Encryption and Key Publication Independently in Digital Rights Management Systems. 160-172 - Koji Chida, Kunio Kobayashi, Hikaru Morita:

An Auction Protocol Preserving Privacy of Losing Bids with a Secure Value Comparison Scheme. 173-181 - Akira Yamada, Shinsaku Kiyomoto, Toshiaki Tanaka, Koji Nakao:

New Time-Stamping Scheme Using Mutual Communications with Pseudonymous Clients. 182-189 - Masakazu Soshi, Mamoru Maekawa, Eiji Okamoto:

The Dynamic-Typed Access Matrix Model and Decidability of the Safety Problem. 190-203 - Kenji Imamoto, Kouichi Sakurai:

Analysis and Design for Private Message Board Systems. 204-211 - Jun Furukawa:

Secure Detection of Watermarks. 212-220 - Tetsuya Izu:

A Note on the Lattice Factoring Method. 221-223 - Kazuhiro Hattanda, Shuichi Ichikawa:

The Evaluation of Davidson's Digital Signature Scheme. 224-225 - Chik How Tan:

Key Substitution Attacks on Some Provably Secure Signature Schemes. 226-227 - Dong Jin Kwak, Sang-Jae Moon:

A Distributed Sign-and-Encryption for Anonymity. 228-230
- Wen-Bin Lin, Bin-Da Liu:

Coefficients Generation for the 4th-Order Leapfrog Sigma-Delta A/D Converters. 231-242 - Tae Hoon Lee, Won-Sang Ra, Seung Hee Jin, Tae Sung Yoon, Jin Bae Park:

Robust Extended Kalman Filtering via Krein Space Estimation. 243-250 - Yuya Matsumoto, Yuichi Tanji, Mamoru Tanaka:

Sparse Realization of Passive Reduced-Order Interconnect Models via PRIMA. 251-257 - Donghyun Kim, Lee-Sup Kim:

An Efficient Fragment Processing Technique in A-Buffer Implementation. 258-269 - Jonah Gamba, Tetsuya Shimamura:

A New Method of Noise Variance Estimation from Low-Order Yule-Walker Equations. 270-274 - Pei-Yin Chen:

VLSI Architecture for 2-D 3-Level Lifting-Based Discrete Wavelet Transform. 275-279 - Shoichi Hirose, Susumu Yoshida:

An Approximate Scheme of Oblivious Transfer with Probabilistic Receipt. 280-281 - Shu-Chuan Chu, John F. Roddick, Zhe-Ming Lu, Jeng-Shyang Pan:

A Digital Image Watermarking Method Based on Labeled Bisecting Clustering Algorithm. 282-285 - Takafumi Hayashi:

A Generalization of Binary Zero-Correlation Zone Sequence Sets Constructed from Hadamard Matrices. 286-291

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














