Vol. E90-A, No. 1 January 2007

Open Access Open Access  Restricted Access Subscription Access

Table of Contents

Foreword

FOREWORD PDF
Masakatu MORII 1-1

Letters

On Some Variations of Kurosawa-Desmedt Public-Key Encryption Scheme PDF
Le Trieu PHONG, Wakaha OGATA 226-230
Security Analysis of Authenticated Key Exchange Protocol Based on the q-th Root Problem PDF
Kyung-Ah SHIM 231-233
Symmetric Discharge Logic against Differential Power Analysis PDF
Jong Suk LEE, Jae Woon LEE, Young Hwan KIM 234-240
Further Analysis of ID-Based Authenticated Group Key Agreement Protocol from Bilinear Maps PDF
Kyung-Ah SHIM 295-298
Security Analysis of a Nonce-Based User Authentication Scheme Using Smart Cards PDF
Junghyun NAM, Seungjoo KIM, Sangjoon PARK, Dongho WON 299-302
On the Security of Status Certificate-Based Encryption Scheme PDF
Je Hong PARK, Dong Hoon LEE 303-304
Attacking Phase Shift Keying Based Watermarking PDF
Jeng-Shyang PAN, Chuang LIN 305-306

Papers

How to Construct Super-Pseudorandom Permutations with Short Keys PDF
Tetsu IWATA, Kaoru KUROSAWA 2-13
A Study on Higher Order Differential Attack of KASUMI PDF
Nobuyuki SUGIO, Hiroshi AONO, Sadayuki HONGO, Toshinobu KANEKO 14-21
Evaluation of the Security of RC6 against the χ2-Attack PDF
Atsuko MIYAJI, Yuuki TAKANO 22-28
New Construction for Balanced Boolean Functions with Very High Nonlinearity PDF
Khoongming KHOO, Guang GONG 29-35
Improved Collision Attacks on MD4 and MD5 PDF
Yu SASAKI, Yusuke NAITO, Noboru KUNIHIRO, Kazuo OHTA 36-47
Toward Separating Integer Factoring from Discrete Logarithm mod p PDF
Shuji ISOBE, Wataru KUMAGAI, Masahiro MAMBO, Hiroki SHIZUYA 48-53
Toward the Fair Anonymous Signatures: Deniable Ring Signatures PDF
Yuichi KOMANO, Kazuo OHTA, Atsushi SHIMBO, Shinichi KAWAMURA 54-64
Verifier-Local Revocation Group Signature Schemes with Backward Unlinkability from Bilinear Maps PDF
Toru NAKANISHI, Nobuo FUNABIKI 65-74
A Study of Blind Message Authentication Codes PDF
Chanathip NAMPREMPRE, Gregory NEVEN, Michel ABDALLA 75-82
A General Model of Structured Multisignatures with Message Flexibility PDF
Dan YAMAMOTO, Wakaha OGATA 83-90
An ID-SP-M4M Scheme and Its Security Analysis PDF
Lihua WANG, Eiji OKAMOTO, Ying MIAO, Takeshi OKAMOTO, Hiroshi DOI 91-100
Optimal Multiple Assignments Based on Integer Programming in Secret Sharing Schemes with General Access Structures PDF
Mitsugu IWAMOTO, Hirosuke YAMAMOTO, Hirohisa OGAWA 101-112
An Efficient Publicly Verifiable Mix-Net for Long Inputs PDF
Jun FURUKAWA, Kazue SAKO 113-127
Non-optimistic Secure Circuit Evaluation Based on ElGamal Encryption and Its Applications PDF
Koji CHIDA, Go YAMAMOTO, Koutarou SUZUKI, Shigenori UCHIYAMA, Noburou TANIGUCHI, Osamu SHIONOIRI, Atsushi KANAI 128-138
Universally Composable Hierarchical Hybrid Authenticated Key Exchange PDF
Haruki OTA, Kazuki YONEYAMA, Shinsaku KIYOMOTO, Toshiaki TANAKA, Kazuo OHTA 139-151
Scaling Security of Elliptic Curves with Fast Pairing Using Efficient Endomorphisms PDF
Katsuyuki TAKASHIMA 152-159
Random Switching Logic: A New Countermeasure against DPA and Second-Order DPA at the Logic Level PDF
Daisuke SUZUKI, Minoru SAEKI, Tetsuya ICHIKAWA 160-168
Leakage Analysis of DPA Countermeasures at the Logic Level PDF
Minoru SAEKI, Daisuke SUZUKI, Tetsuya ICHIKAWA 169-178
Mitigating Dictionary Attacks with Text-Graphics Character CAPTCHAs PDF
Chanathip NAMPREMPRE, Matthew N. DAILEY 179-186
Practical Broadcast Encryption from Graph-Theoretic Techniques and Subset-Incremental-Chain Structure PDF
Nuttapong ATTRAPADUNG, Hideki IMAI 187-203
A Private and Consistent Data Retrieval Scheme with Log-Squared Communication PDF
Satoshi NAKAYAMA, Maki YOSHIDA, Shingo OKAMURA, Toru FUJIWARA 204-215
A New Scheme to Realize the Optimum Watermark Detection for the Additive Embedding Scheme with the Spatial Domain PDF
Takaaki FUJITA, Maki YOSHIDA, Toru FUJIWARA 216-225
The Design of Square-Root-Raised-Cosine FIR Filters by an Iterative Technique PDF
Chia-Yu YAO 241-248
Convergence Performance Analyses of Fast Data-Reusing Normalized Least Mean Squared Algorithm PDF
Heng-Chou CHEN, Oscal T.-C. CHEN 249-256
Logic Synthesis Method for Dual-Rail RSFQ Digital Circuits Using Root-Shared Binary Decision Diagrams PDF
Koji OBATA, Kazuyoshi TAKAGI, Naofumi TAKAGI 257-266
Voltage Island Generation in Cell Based Dual-Vdd Design PDF
Yici CAI, Bin LIU, Qiang ZHOU, Xianlong HONG 267-273
Optimal Euler Circuit of Maximum Contiguous Cost PDF
Yu QIAO, Makoto YASUHARA 274-280
Cross-Correlation Properties of Cyclotomic Sequences PDF
Kai CAI, Rongquan FENG, Zhiming ZHENG 281-286
A Genetic Algorithm with Conditional Crossover and Mutation Operators and Its Application to Combinatorial Optimization Problems PDF
Rong-Long WANG, Shinichi FUKUTA, Jia-Hai WANG, Kozo OKAZAKI 287-294