Vol. E91-A, No. 1 January 2008

Open Access Open Access  Restricted Access Subscription Access

Table of Contents

Foreword

FOREWORD PDF
Mitsuru MATSUI 1-2

Letters

Powered Tate Pairing Computation PDF
Bo Gyeong KANG, Je Hong PARK 338-341
NPMV-Complete Functions That Compute Discrete Logarithms and Integer Factorization PDF
Shingo HASEGAWA, Shuji ISOBE, Hiroki SHIZUYA 342-344
Injection-Locked Clock Recovery Using a Multiplexed Oscillator for Half-Rate Data-Recovered Applications PDF
Ching-Yuan YANG, Ken-Hao CHANG 409-412
Fault-Tolerance for the Mobile Ad-Hoc Environment PDF
Taesoon PARK, Kwangho KIM 413-416
New Family of Binary Sequences with Low Correlation PDF
Wenfeng JIANG, Lei HU, Xiangyong ZENG 417-421
An Adaptive SLM Scheme Based on Peak Observation for PAPR Reduction of OFDM Signals PDF
Suckchel YANG, Yoan SHIN 422-425
Asymptotic Performance Analysis of Orthogonal Space-Time Block Codes in Spatially Correlated Rician Fading Channel PDF
Kyung Seung AHN 426-429
A Simple Asynchronous UWB Position Location Algorithm Based on Single Round-Trip Transmission PDF
Suckchel YANG, Dongwoo KANG, Young NAMGOONG, Yoan SHIN 430-432
Research on the Road Network Extraction from Satellite Imagery PDF
Lili YUN, Keiichi UCHIMURA 433-436

Papers

New Weakness in the Key-Scheduling Algorithm of RC4 PDF
Toshihiro OHIGASHI, Yoshiaki SHIRAISHI, Masakatu MORII 3-11
An Unequal Secure Encryption Scheme for H.264/AVC Video Compression Standard PDF
Yibo FAN, Jidong WANG, Takeshi IKENAGA, Yukiyasu TSUNOO, Satoshi GOTO 12-21
Linearization Method and Linear Complexity PDF
Hidema TANAKA 22-29
Security of the Five-Round KASUMI Type Permutation PDF
Tetsu IWATA, Tohru YAGI, Kaoru KUROSAWA 30-38
Birthday Paradox for Multi-Collisions PDF
Kazuhiro SUZUKI, Dongvu TONIEN, Kaoru KUROSAWA, Koji TOYOTA 39-45
Improved Collision Search for Hash Functions: New Advanced Message Modification PDF
Yusuke NAITO, Kazuo OHTA, Noboru KUNIHIRO 46-54
New Message Differences for Collision Attacks on MD4 and MD5 PDF
Yu SASAKI, Lei WANG, Noboru KUNIHIRO, Kazuo OHTA 55-63
Classification of Hash Functions Suitable for Real-Life Systems PDF
Yasumasa HIRAI, Takashi KUROKAWA, Shin'ichiro MATSUO, Hidema TANAKA, Akihiro YAMAMURA 64-73
Collision Resistance of Double-Block-Length Hash Function against Free-Start Attack PDF
Shoichi HIROSE 74-82
Traceable Ring Signature PDF
Eiichiro FUJISAKI, Koutarou SUZUKI 83-93
General Conversion for Obtaining Strongly Existentially Unforgeable Signatures PDF
Isamu TERANISHI, Takuro OYAMA, Wakaha OGATA 94-106
Provably Secure Multisignatures in Formal Security Model and Their Optimality PDF
Yuichi KOMANO, Kazuo OHTA, Atsushi SHIMBO, Shinichi KAWAMURA 107-118
Efficient Fair Exchange from Identity-Based Signature PDF
Dae Hyun YUM, Pil Joong LEE 119-126
A Fast (3,n)-Threshold Secret Sharing Scheme Using Exclusive-OR Operations PDF
Jun KURIHARA, Shinsaku KIYOMOTO, Kazuhide FUKUSHIMA, Toshiaki TANAKA 127-138
A Secure Authenticated Key Exchange Protocol for Credential Services PDF
SeongHan SHIN, Kazukuni KOBARA, Hideki IMAI 139-149
Batch Processing for Proofs of Partial Knowledge and Its Applications PDF
Koji CHIDA, Go YAMAMOTO 150-159
Prevention of Information Leakage by Photo-Coupling in Smart Card PDF
Sung-Shiou SHEN, Jung-Hui CHIU 160-167
Side Channel Attacks against Hash-Based MACs with PGV Compression Functions PDF
Katsuyuki OKEYA 168-175
Security Evaluations of MRSL and DRSL Considering Signal Delays PDF
Minoru SAEKI, Daisuke SUZUKI 176-183
An Analysis of Leakage Factors for Dual-Rail Pre-Charge Logic Style PDF
Daisuke SUZUKI, Minoru SAEKI 184-192
A High-Resolution Phase-Based Waveform Matching and Its Application to Side-Channel Attacks PDF
Naofumi HOMMA, Sei NAGASHIMA, Takeshi SUGAWARA, Takafumi AOKI, Akashi SATOH 193-202
Montgomery Multiplication with Twice the Bit-Length of Multipliers PDF
Masayuki YOSHINO, Katsuyuki OKEYA, Camille VUILLAUME 203-210
Diversification of Processors Based on Redundancy in Instruction Set PDF
Shuichi ICHIKAWA, Takashi SAWADA, Hisashi HATA 211-220
Some Efficient Algorithms for the Final Exponentiation of ηT Pairing PDF
Masaaki SHIRASE, Tsuyoshi TAKAGI, Eiji OKAMOTO 221-228
A Multi-Application Smart Card System with Authentic Post-Issuance Program Modification PDF
Mohammad Mesbah UDDIN, Yasunobu NOHARA, Daisuke IKEDA, Hiroto YASUURA 229-235
New Hardware Architecture for Multiplication over GF(2m) and Comparisons with Normal and Polynomial Basis Multipliers for Elliptic Curve Cryptography PDF
Soonhak KWON, Taekyoung KWON, Young-Ho PARK 236-243
Relationship between Standard Model Plaintext Awareness and Message Hiding PDF
Isamu TERANISHI, Wakaha OGATA 244-261
Universally Composable Identity-Based Encryption PDF
Ryo NISHIMAKI, Yoshifumi MANABE, Tatsuaki OKAMOTO 262-271
On the Definitions of Anonymity for Ring Signatures PDF
Miyako OHKUBO, Masayuki ABE 272-282
On the Equivalence of Several Security Notions of KEM and DEM PDF
Waka NAGAO, Yoshifumi MANABE, Tatsuaki OKAMOTO 283-297
A Dental Radiograph Recognition System Using Phase-Only Correlation for Human Identification PDF
Koichi ITO, Akira NIKAIDO, Takafumi AOKI, Eiko KOSUGE, Ryota KAWAMATA, Isamu KASHIMA 298-305
Factorization of Square-Free Integers with High Bits Known PDF
Bagus SANTOSO, Noboru KUNIHIRO, Naoki KANAYAMA, Kazuo OHTA 306-315
Analysis of Program Obfuscation Schemes with Variable Encoding Technique PDF
Kazuhide FUKUSHIMA, Shinsaku KIYOMOTO, Toshiaki TANAKA, Kouichi SAKURAI 316-329
Making Cryptographic Primitives Harder PDF
Shingo HASEGAWA, Hiroyuki HATANAKA, Shuji ISOBE, Eisuke KOIZUMI, Hiroki SHIZUYA 330-337
Enhanced Vertical Perception through Head-Related Impulse Response Customization Based on Pinna Response Tuning in the Median Plane PDF
Ki Hoon SHIN, Youngjin PARK 345-356
Discrete Modelling of Continuous-Time Systems Having Interval Uncertainties Using Genetic Algorithms PDF
Chen-Chien HSU, Tsung-Chi LU, Heng-Chou CHEN 357-364
GDME: Grey Relational Clustering Applied to a Clock Tree Construction with Zero Skew and Minimal Delay PDF
Chia-Chun TSAI, Jan-Ou WU, Trong-Yen LEE 365-374
An ILP Approach to the Simultaneous Application of Operation Scheduling and Power Management PDF
Shih-Hsu HUANG, Chun-Hua CHENG 375-382
An Optimal Parallel Algorithm for Finding All Hinge Vertices of a Circular-Arc Graph PDF
Hirotoshi HONMA, Shigeru MASUYAMA 383-391
Invisibly Sanitizable Digital Signature Scheme PDF
Kunihiko MIYAZAKI, Goichiro HANAOKA, Hideki IMAI 392-402
PAPR Reduction for PCC-OFDM Systems Using Neural Phase Rotator PDF
Masaya OHTA, Hideyuki YAMADA, Katsumi YAMASHITA 403-408