Vol. E88-A, No. 1 January 2005

Open Access Open Access  Restricted Access Subscription Access

Table of Contents

Foreword

FOREWORD PDF
Akira HAYASHI 1-1

Letters

Fast Modular Reduction over Euclidean Rings and Its Application to Universal Hash Functions PDF
Xiangyong ZENG, Lei HU 305-310
A Typical Profile of the k-Error Linear Complexity for Balanced Binary Sequences with Period 2n PDF
Takayasu KAIDA 311-313
A Rectification Scheme for RST Invariant Image Watermarking PDF
Yan LIU, Dong ZHENG, Jiying ZHAO 314-318
Attacks on the Shen et al.'s Timestamp-Based Password Authentication Scheme Using Smart Cards PDF
Eun-Jun YOON, Eun-Kyung RYU, Kee-Young YOO 319-321
Efficient Secret Sharing Schemes Based on Authorized Subsets PDF
Kouya TOCHIKUBO, Tomohiko UYEMATSU, Ryutaroh MATSUMOTO 322-326
Procedural Constraints in the Extended RBAC and the Coloured Petri Net Modeling PDF
Wook SHIN, Jeong-Gun LEE, Hong Kook KIM, Kouichi SAKURAI 327-330
An Area Efficient Approach to Design Self-Timed Cryptosystems Combatting DPA Attack PDF
Dong-Wook LEE, Dong-Soo HAR 331-333
Permutation-Based Semi-Fragile Watermark Scheme PDF
Guo-rui FENG, Ling-ge JIANG, Chen HE 374-377
Crest Factor Reduction for Complex Multi-Carrier Signal Processing PDF
Young-Hwan YOU, Min-Goo KANG, Han-Jong KIM, Pan-Yuh JOO, Hyoung-Kyu SONG 378-380
A Simple Improvement to Tufts-Kumaresan Method for Multiple Sinusoidal Frequency Estimation PDF
Hing-Cheung SO, Chi-Tim LEUNG 381-383
A Low-Voltage Low-Power Bipolar Transconductor with High-Linearity PDF
Won-Sup CHUNG, Hyeong-Woo CHA, Sang-Hee SON 384-386
A New Sliding Surface Design Method of Linear Systems with Mismatched Uncertainties PDF
Seung Ho JANG, Sang Woo KIM 387-391
On the Linear Complexity of Generalized Cyclotomic Sequences of Order Four Over Zpq PDF
Enjian BAI, Xiaotong FU, Guozhen XIAO 392-395
Complex Hadamard Codes PDF
WenPing MA, MoonHo LEE 396-398
All Fundamental Particular Solutions are Needed to Express an Arbitrary Firing Count Vector in Petri Nets PDF
Akira MURAYA, Tadashi MATSUMOTO, Seiichiro MORO, Haruo HASEGAWA 399-404

Papers

Linear Attack Using Multiple Linear Approximations PDF
Jun CHOI, Deukjo HONG, Seokhie HONG, Sangjin LEE 2-8
How to Improve Interpolation Attack PDF
Kaoru KUROSAWA, Tetsu IWATA, Quang Viet DUONG 9-15
A Strength Evaluation of a Pseudorandom Number Generator MUGI against Linear Cryptanalysis PDF
Hiroki SEKINE, Tetsuro NOSAKA, Yasuo HATANO, Masaki TAKEDA, Toshinobu KANEKO 16-24
On the Security of a MAC by Mitchell PDF
Tetsu IWATA, Kaoru KUROSAWA 25-32
Weak Security Notions of Cryptographic Unkeyed Hash Functions and Their Amplifiability PDF
Shoichi HIROSE 33-38
PGV-Style Block-Cipher-Based Hash Families and Black-Box Analysis PDF
Wonil LEE, Mridul NANDI, Palash SARKAR, Donghoon CHANG, Sangjin LEE, Kouichi SAKURAI 39-48
Construction of UOWHF: Two New Parallel Methods PDF
Wonil LEE, Donghoon CHANG, Sangjin LEE, Soohak SUNG, Mridul NANDI 49-58
Constructing Boolean Functions by Modifying Maiorana-McFarland's Superclass Functions PDF
Xiangyong ZENG, Lei HU 59-66
The Distribution of the Spectrum for the Discrete Fourier Transform Test Included in SP800-22 PDF
Kenji HAMANO 67-73
A Construction of Public-Key Cryptosystem Based on Singular Simultaneous Equations PDF
Masao KASAHARA, Ryuichi SAKAI 74-80
The Computational Difficulty of Solving Cryptographic Primitive Problems Related to the Discrete Logarithm Problem PDF
Chisato KONOMA, Masahiro MAMBO, Hiroki SHIZUYA 81-88
Improvements of Addition Algorithm on Genus 3 Hyperelliptic Curves and Their Implementation PDF
Masaki GONDA, Kazuto MATSUO, Kazumaro AOKI, Jinhui CHAO, Shigeo TSUJII 89-96
An Extension of GHS Weil Descent Attack PDF
Tsutomu IIJIMA, Mahoro SHIMURA, Jinhui CHAO, Shigeo TSUJII 97-104
Exact Analyses of Computational Time for Factoring in Quantum Computers PDF
Noboru KUNIHIRO 105-111
Tamper-Resistant Software System Based on a Finite State Machine PDF
Akito MONDEN, Antoine MONSIFROT, Clark THOMBORSON 112-122
On the Importance of Protecting Δ in SFLASH against Side Channel Attacks PDF
Katsuyuki OKEYA, Tsuyoshi TAKAGI, Camille VUILLAUME 123-131
Zero-Value Register Attack on Elliptic Curve Cryptosystem PDF
Toru AKISHITA, Tsuyoshi TAKAGI 132-139
On the Optimal Parameter Choice for Elliptic Curve Cryptosystems Using Isogeny PDF
Toru AKISHITA, Tsuyoshi TAKAGI 140-146
An SPA-Based Extension of Schindler's Timing Attack against RSA Using CRT PDF
Yuuki TOMOEDA, Hideyuki MIYAKE, Atsushi SHIMBO, Shinichi KAWAMURA 147-153
On the Vulnerability of Exponent Recodings for the Exponentiation against Side Channel Attacks PDF
Yasuyuki SAKAI, Kouichi SAKURAI 154-160
Fast Elliptic Curve Multiplications Resistant against Side Channel Attacks PDF
Tetsuya IZU, Tsuyoshi TAKAGI 161-171
Efficient and Verifiable Shuffling and Shuffle-Decryption PDF
Jun FURUKAWA 172-188
Secure, Efficient and Practical Key Management Scheme in the Complete-Subtree Method PDF
Ryo NOJIMA, Yuichi KAJI 189-194
Solutions to Security Problems of Rivest and Shamir's PayWord Scheme PDF
Norio ADACHI, Satoshi AOKI, Yuichi KOMANO, Kazuo OHTA 195-202
Reducing Receiver's Storage in CS, SD and LSD Broadcast Encryption Schemes PDF
Tomoyuki ASANO 203-210
Flexible-Routing Anonymous Networks Using Optimal Length of Ciphertext PDF
Koji CHIDA, Masayuki ABE 211-221
A Scheme for Partial Disclosure of Transaction Log PDF
Yasuhiro OHTAKI, Masaru KAMADA, Kaoru KUROSAWA 222-229
Efficient Divisible Voting Scheme PDF
Natsuki ISHIDA, Shin'ichiro MATSUO, Wakaha OGATA 230-238
Digitally Signed Document Sanitizing Scheme with Disclosure Condition Control PDF
Kunihiko MIYAZAKI, Mitsuru IWAMURA, Tsutomu MATSUMOTO, Ryoichi SASAKI, Hiroshi YOSHIURA, Satoru TEZUKA, Hideki IMAI 239-246
Proposal and Analysis of a Distributed Online Certificate Status Protocol with Low Communication Cost PDF
Satoshi KOGA, Kouichi SAKURAI 247-254
Generalized Vickrey Auction and Suppression of Active Adversary Using Incentive-Compatible Implementation PDF
Makoto YOKOO, Koutarou SUZUKI 255-261
Unlinkable Delivery System for Interactive Dramas PDF
Shingo OKAMURA, Yoshiyuki KONISHI, Maki YOSHIDA, Toru FUJIWARA 262-269
A Collaborative Role-Based Access Control for Trusted Operating Systems in Distributed Environment PDF
Hyung-Chan KIM, R.S. RAMAKRISHNA, Kouichi SAKURAI 270-279
Discrimination Method of Synthetic Speech Using Pitch Frequency against Synthetic Speech Falsification PDF
Akio OGIHARA, Hitoshi UNNO, Akira SHIOZAKI 280-286
Proposal of a Transformation Method for Iris Codes in Iris Scanning Verification PDF
Haruki OTA, Shinsaku KIYOMOTO, Toshiaki TANAKA 287-295
On Collusion Security of Random Codes PDF
Katsunari YOSHIOKA, Junji SHIKATA, Tsutomu MATSUMOTO 296-304
Random Bit Climbers on Multiobjective MNK-Landscapes: Effects of Memory and Population Climbing PDF
Hernan AGUIRRE, Kiyoshi TANAKA 334-345
Fault-Tolerant Pancyclicity of the Mobius Cubes PDF
Ming-Chien YANG, Tseng-Kuei LI, Jimmy J.M. TAN, Lih-Hsing HSU 346-352
Trellis Properties of Product Codes PDF
Haibin KAN, Hong SHEN 353-358
A Low-Complexity Step-by-Step Decoding Algorithm for Binary BCH Codes PDF
Ching-Lung CHR, Szu-Lin SU, Shao-Wei WU 359-365
A Simple Method of BER Calculation in DPSK/OFDM Systems over Fading Channels PDF
Fumihito SASAMORI, Shiro HANDA, Shinjiro OSHITA 366-373