|
Your search returned 58 records. Click on the hyperlinks to view further details of Titles.. |
Magazine Name : Ieice Transactions On Fundamentals Of Electronics, Communications And Computer Sciences
|
Year : 2014 Volume number : E97-A Issue: 01 |
Single Symbol Decodable Qo-Stbc With Full Diversity
(Article)
Subject:
Qo-Stbc
,
Symbol Modification
,
Power Imbalance
,
Transmission Diversity
Author:
Naotoshi
Yoda
Chang-Jun
Ahn
page:
02
-
07
Improved Spectral Efficiency At Reduced Outage Probability For Cooperative Wireless Networks By Using Csi Directed Estimate And Forward Strategy
(Article)
Subject:
Cooperative Communication
,
Amplify-And-Forward (Af)
,
Decode-And-Forward (Df)
,
Spectral Efficiency
Author:
Yihenew Wondie
Marye
Chen
Liu
page:
07
-
17
9db Nf And +11 Dmb Oip3 Cmos Single Conversion Front-End For A Satellite Low-Noise Block Down-Converter
(Article)
Subject:
Cmos
,
Ku-Band
,
Lnb
,
Rf-Amp
Author:
Takeshi
Mitsunaka
Yusuke
Kishino
page:
101
-
108
Indoor Experiments On 4-By-2 Multi-User Mimo And Carrier Aggregation Achieving Real-Time 1-Gbps Dara Transmission In Lte-Advanced Downlink
(Article)
Subject:
Lte-Advanced
,
Ofdma
,
Multi-User Mimo
,
Antenna Arrangement
Author:
Yuichi
Kakishima
Teruo
Kawamura
page:
109
-
116
A New Higher Order Differential Of Clefia
(Article)
Subject:
Cryptanalysis
,
Higher Order Differential Attack
,
Meet-In-The-Middle Attack Technique
,
Block Cipher
Author:
Naoki
Shibayama
Toshinobu
Kaneko
page:
118
-
126
Comprehensive Study Of Integral Analysis On Lblock
(Article)
Subject:
Lblock
,
Integral Analysis
,
Partial-Sum
,
Meet-In-The-Middle
Author:
Yu
Sasaki
Lei
Wang
page:
127
-
138
Comprehensive Analysis Of Initial Keystream Biases Of Rc4
(Article)
Subject:
Rc4
,
Stream Cipher
,
Keystream Biases
,
Plaintext Recovery Attack
Author:
Takanori
Isobe
Toshihiro
Ohigashi
page:
139
-
151
A New Necessary Condition For Feedback Functions Of De Bruijn Sequences
(Article)
Subject:
Stream Cipher
,
Nonlinear Feedback Shift Registers
,
De Bruijn Sequences
Author:
Zhongxiao
Wang
Wenfeng
Qi
page:
152
-
156
Chosen-Iv Correlation Power Analysis On Kcipher-2 Hardware And A Masking-Based Countermeasure
(Article)
Subject:
Side-Channel Attacks
,
Kcipher-2
,
Correlation Power Analysis
,
Random Masking
Author:
Takafumi
Hibiki
Naofumi
Homma
page:
157
-
166
Cryptanalyses On A Merkle-Damgard Based Mac-Almost Universal Forgery And Distinguishing-H Attacks
(Article)
Subject:
Lpmac
,
Distinguishing-H Attack
,
Almost Universal Forgery Attack
,
Multi-Collision
Author:
Yu
Sasaki
page:
167
-
176
Distinguishers On Double-Branch Compression Function And Applications To Round-Reduced Ripemd-128 And Ripemd-160
(Article)
Subject:
Ripemd-128
,
Ripemd-160
,
Double-Branch Structure
,
2-Dimension
Author:
Yu
Sasaki
Lei
Wang
page:
177
-
190
Performance Of Star 16qam Schemes Considering Cubic Metric For Uplink Dft-Precoded Ofdma
(Article)
Subject:
Modulation Schemes
,
16qam
,
Dft-Precoded Ofdma
,
Single-Carrier Fdma
Author:
Teruo
Kawamura
Yoshihisa
Kishiyama
page:
18
-
29
Randomness Leakage In The Kem/Dem Framework
(Article)
Subject:
Leakage Resilient Cryptography
,
Public-Key Encryption
,
Kem/Dem Framework
,
Hash Proofs System
Author:
Hitoshi
Namiki
Keisuke
Tanaka
page:
191
-
199
The Rsa Group Is Adaptive Pseudo-Free Under The Rsa Assumption
(Article)
Subject:
Pseudo-Freeness
,
Adaptive Pseudo-Free Groups
,
Rsa Assumption
Author:
Masayuki
Fukumitsu
Shingo
Hasegawa
page:
200
-
214
Relation Between Verifiable Random Functions And Convertible Undeniable Signatures, And New Constructions
(Article)
Subject:
Selectively Convertible Undeniable Signatures
,
Verifiable Random Functions
,
Standard Model
Author:
Kaoru
Kurosawa
Ryo
Nojima
page:
215
-
224
Relations Among Notions Of Privacy For Rfid Authentication Protocols
(Article)
Subject:
Rfid
,
Authentication
,
Security Model
Author:
Daisuke
Moriyama
Shin'Ichiro
Matsuo
page:
225
-
235
Key Length Estimation Of Pairing-Based Cryptosystems Using Nt Pairing Over Gf(3n)
(Article)
Subject:
Pairing-Based Cryptosystems
,
Discrete Logarithm Problem
,
Finite Field
,
Key Length
Author:
Naoyuki
Shinohara
Takeshi
Shimoyama
page:
236
-
244
Security Of Multivariate Signature Scheme Using Non-Commutative Rings
(Article)
Subject:
Multivariate Public Key Cryptosystem
,
Digital Signature
,
Rainbow
,
Non-Commutative Rings
Author:
Takanori
Yasuda
Tsuyoshi
Takagi
page:
245
-
252
An Accurate Packer Identification Method Using Support Vector Machine
(Article)
Subject:
Malware Analysis
,
Pack
,
Unpack
,
Machine Learning
Author:
Ryoichi
Isawa
Tao
Ban
page:
253
-
263
Unifield Coprocessor Architecture For Secure Key Storage And Challenge-Response Authentication
(Article)
Subject:
Physical Unclonable Function
,
Puf
,
Glitch Puf
,
Physical Random Nember Generator
Author:
Koichi
Shimizu
Daisuke
Suzuki
page:
264
-
274
Security Evaluation Of Rg-Dtm Puf Using Machine Learning Attacks
(Article)
Subject:
Physical Unclonable Function (Puf)
,
Arbiter-Puf
,
Xor Arbiter-Puf
,
Machine Learning Attack
Author:
Mitsuru
Shiozaki
Kousuke
Ogawa
page:
275
-
283
A Digital Trng Based On Cross Feedback Ring Oscillators
(Article)
Subject:
Digital Trng
,
Fpga
,
Stateless
,
Metastability
Author:
Lijuan
Li
Shuguo
Li
page:
284
-
291
A Property For Full Clefia-128 Detected By A Middletext Distinguisher Under The Known-Key Setting
(Article)
Subject:
Clefia
,
Higher-Order Integral
,
Integral Attack
,
Middletext Distinguisher
Author:
Kazumaro
Aoki
page:
292
-
297
A Note On Security Of Public-Key Cryptosystem Provably As Secure As Subset Sum Problem
(Article)
Subject:
Subset Sum Problem
,
Provable Security
,
Attack
Author:
Shinsuke
Hamasho
Yasuyuki
Murakami
page:
298
-
299
Investigation On Frequency Diversity Effects Of Various Transmission Schemes Using Frequency Domain Equalizer For Dft-Precoded Ofdma
(Article)
Subject:
Single-Carrier Fdma
,
Frequency Diversity
,
Frequency Domain Equalizer
,
Frequency Mean Square Covariance
Author:
Lianjun
Deng
Teruo
Kawamura
page:
30
-
39
Implementation Of An Elliptic Curve Scalar Multiplication Method Using Division Polynomials
(Article)
Subject:
Elliptic Curve
,
Division Polynomial
,
Scalar Multiplication
,
Elliptic Net
Author:
Naoki
Kanayama
Yang
Liu
page:
300
-
302
Zero-Sum Defender: Fast And Space-Efficient Defense Against Return-Oriented Programming Attacks
(Article)
Subject:
Return-Oriented Programming
,
Malware Defense
,
Software Security
Author:
Jeehong
Kim
Inhyeok
Kim
page:
303
-
305
Low-Power Dynamic Mimo Detection For A 4*4 Mimo-Ofdm Receiver
(Article)
Subject:
Wireless Communication
,
Mimo Detection
,
Low Power
,
Dvfs
Author:
Nozomi
Miyazaki
Shingo
Yoshizawa
page:
306
-
312
Invariance And Periodic Oversampling In Principal Shift-Invariant Spaces
(Article)
Subject:
Principal Shift-Invariant Spaces
,
Oversampling
,
Frame
,
Invariance
Author:
Kil Hyun
Kwon
Dae Gwan
Lee
page:
313
-
321
Parametric Wiener Filter With Linear Constraints For Unknown Target Signals
(Article)
Subject:
Parametric Wiener Filter
,
Linear Constraints
,
Optimization Criterion
,
Closed-Form Solution
Author:
Akira
Tanaka
Hideyuki
Imai
page:
322
-
330
Eigen Analysis Of Moment Vector Equation For Interacting Chaotic Elements Described By Nonlinear Boltzmann Equation
(Article)
Subject:
Nonlinear Interaction
,
Boltzmann Equation
,
Mve
,
Eigen Analysis
Author:
Hideki
Satoh
page:
331
-
338
A Method Of Analog Ic Placement With Common Centroid Constraints
(Article)
Subject:
Analog Circuits
,
Placement
,
Symmetry Constraints
,
Arc Plasma Method
Author:
Keitaro
Ue
Kunihiro
Fujiyoshi
page:
339
-
346
Bit-Parallel Cubing Computation Over Gf(3m) For Irreducible Trinomials
(Article)
Subject:
Finite Fields Arithmetic
,
Pth Powering
,
Characteristic Three
,
Cubing
Author:
Sun-Mi
Park
Ku-Young
Chang
page:
347
-
353
A Dpa Attack On The Implementation Of Rsa-Crt With Montgomery Reduction
(Article)
Subject:
Differential Power Analysis
,
Message Blinding
,
Montgomery Reduction
,
Rsa-Crt
Author:
Wei-Chih
Lien
Sung-Ming
Yen
page:
354
-
364
The Degree Of Two Classes Of 3rd Order Correlation Immune Symmetric Boolean Functions
(Article)
Subject:
Boolean Functions
,
Correlation Immune
,
Correlation Attack
,
Algebraic Degree
Author:
Jie
Peng
Haibin
Kan
page:
365
-
370
Cryptanalysis Of 249-, 250-,...., 256-Bit Key Hyral Via Equivalent
(Article)
Subject:
Cryptanalysis
,
Block Cipher
,
Hyral
,
Equivalent Key
Author:
Yuki
Asano
Shingo
Yanagihara
page:
371
-
383
Adaptive Reversible Data Hiding Via Iteger-To-Integer Subband Transform And Adaptive Generalized Difference Expansion Method
(Article)
Subject:
Adaptive Reversible Data Hiding
,
Adaptive Generalized Difference Expansion
,
Frequency Domain
,
Iteger-To-Integer Subband Transform
Author:
Taichi
Yoshida
Taizo
Suzuki
page:
384
-
392
Optimal Transform Order Of Fractional Fourier Transform For Decomposition Of Overlapping Ultrasonic Signals
(Article)
Subject:
Fractional Fourier Transform
,
Separation
,
Overlapping
,
Ultra-Sonic
Author:
Zhenkun
Lu
Cui
Yang
page:
393
-
396
Doppler Shift Based Target Localization Using Semidefinite Relaxation
(Article)
Subject:
Doppler Frequency Shift (Dfs)
,
Localization
,
Maximum Likelihood Estimation (Mle)
,
Semidefinite Programming (Sdp)
Author:
Yan Shen
Du
Ping
Wei
page:
397
-
400
Virtual Continuous Cwmin Control Scheme Of Wlan
(Article)
Subject:
Csma/Ca
,
Ieee 802.11dcf
,
Cwmin Control
,
Fairness
Author:
Yuki
Sangenya
Fumihiro
Inoue
page:
40
-
48
Global Asymptotic Stabilization Of Uncertain Nonlinear Systems Via System Reconfiguration And Lyapunov Equation Utilization
(Article)
Subject:
Global Asymptotic Stabilization
,
Uncertain Nonlinear Systems
,
System Reconfiguration
,
Lyapunov Equation
Author:
Ho-Lin
Choi
page:
401
-
404
Phase Unwrapping Algorithm Based On Extended Particle Filter For Sar Interferometry
(Article)
Subject:
Phase Unwrapping
,
Extended Particle Filter (Epf)
,
Path Following Strategy
Author:
Xianming
Xie
Pengda
Huang
page:
405
-
408
Efficient Privacy-Preserving Reputation Evaluation In Decentralized Environments
(Article)
Subject:
Reputation Evaluation
,
Decentralized Environments
,
Privacy-Preserving
,
Communication Delay
Author:
Youwen
Zhu
Tsuyoshi
Takagi
page:
409
-
412
About Validity Checks Of Augmented Pake In Ieee 1363.2 And Iso/Iec 11770-4
(Article)
Subject:
Pake
,
On-Line/Off-Line Dictionary Attacks
,
Augmented Pake
,
Ieee 1363.2
Author:
Seonghan
Shin
Kazukuni
Kobara
page:
413
-
417
Cryptanalysis Of Remote Data Integrity Checking Protocol Proposed By L. Chen For Cloud Storage
(Article)
Subject:
Cloud Computing
,
Cloud Storage
,
Data Integrity
,
Replay Attack
Author:
Shaojing
Fu
Dongsheng
Wang
page:
418
-
420
Improvement On A Knapsack-Based Probabilistic Encryption Scheme
(Article)
Subject:
Public Key Cryptography
,
Knapsack Problem
,
Security Analysis
,
Trapdoor Knapsack
Author:
Baocang
Wang
Fagen
Li
page:
421
-
424
Odd Perfect Sequences And Sequence Sets With Zero Odd Correlation Zone Over The 8-Qam+ Constellation
(Article)
Subject:
Odd Perfect Sequence
,
Zero Odd Correlation Zone (Zocz)
,
8-Qam+ Constellation
,
Ternary Odd Perfect Sequence
Author:
Yubo
Li
Kai
Liu
page:
425
-
428
Multiple Cfo Estimation Using The Properties Of Zadoff-Chu Sequence
(Article)
Subject:
Multiple Cfo Estimation
,
Comp
,
Zadoff-Chu Sequence
Author:
Rothna
Pec
Chang-Hwan
Park
page:
429
-
431
N-Shift Zero Correlation Zone Sequence
(Article)
Subject:
Zero Correlation Zone
,
Zcz
,
N-Shift Sequence
,
Interference Cancellation
Author:
Chao
Zhang
Keke
Pang
page:
432
-
435
Performance Analysis Of Nav Based Contention Window In Ieee 802.11 Lan
(Article)
Subject:
Ieee 802.11 Lan
,
Contention Window
,
Backoff
,
Csma/Ca
Author:
Seung-Sik
Choi
page:
436
-
439
Fuzzy Metric Based Weight Assignment For Deinterlacing
(Article)
Subject:
Fuzzy Metric
,
Deinterlacing
,
Weight Assignment
,
Scanning Format Conversion
Author:
Gwanggil
Jeon
Seokhoon
Kang
page:
440
-
443
A Fast Intra Prediction Method Using The Distribution Of Adjacent Pixels In Hevc
(Article)
Subject:
Hevc
,
Intra-Mode Coding
,
Video Coding
,
Video Compression
Author:
Youngjo
Kim
Juwon
Byun
page:
444
-
447
Performance Analysis Of Mimo/Fso Systems Using Sc-Qam Signaling Over Atmospheric Turbulence Channels
(Article)
Subject:
Free Space Optical (Fso) Communications
,
Multiple-Input Multiple-Output (Mimo)
,
Subcarrier Quadrature-Amplitude Modulation (Sc-Qam)
,
Atmospheric Turbulence
Author:
Trung Ha
Duyen
Anh T.
Pham
page:
49
-
56
A Novel Low Computational Complexity Power Assignment Method For Non-Orthogonal Multiple Access Systems
(Article)
Subject:
Non-Orthogonal Multiple Access
,
Power Assignment
,
Low Computational Complexity
,
Tree Search
Author:
Anxin
Li
Atsushi
Harada
page:
57
-
68
An Efficient Algorithm For Weighted Sum-Rate Maximization In Multicell Ofdma Downlink
(Article)
Subject:
Weighted Sum-Rate Maximization
,
Coordinated Linear Precoding
,
Convex Approximation
,
Second-Order Cone Programming
Author:
Mirza Golam
Kibria
Hidekazu
Murata
page:
69
-
77
Joint Resource Allocation Algorithm In Carrier Aggregation Enabled Future Wireless Networks
(Article)
Subject:
Resource Allocation
,
Ofdma
,
Proportional Fairness
,
Carrier Aggregation
Author:
Zanjie
Huang
Yusheng
Ji
page:
78
-
85
135ghz 98mw 10gbps Cmos Amplitude Shift Keying Transmitter And Receiver Chipset
(Article)
Subject:
Cmos
,
D-Band
,
High-Speed
,
Wireless
Author:
Mizuki
Motoyoshi
Naoko
Ono
page:
86
-
93
Analyses And Modeling Of Ultra-Wideband On-Body Propagation Channels Depending On Population Density Within An Elevator Cabin
(Article)
Subject:
Ultra-Wideband (Uwb)
,
Wireless Body Area Networks
,
Indoor Channel Measurement
,
Body-Shadowing
Author:
Miyuki
Hirose
Takehiko
Kobayashi
page:
94
-
100
|
|
| | |