Your search returned 58 records. Click on the hyperlinks to view further details of Titles..

 

Magazine Name : Ieice Transactions On Fundamentals Of Electronics, Communications And Computer Sciences

Year : 2014 Volume number : E97-A Issue: 01

Single Symbol Decodable Qo-Stbc With Full Diversity (Article)
Subject: Qo-Stbc , Symbol Modification , Power Imbalance , Transmission Diversity
Author: Naotoshi Yoda      Chang-Jun Ahn     
page:      02 - 07
Improved Spectral Efficiency At Reduced Outage Probability For Cooperative Wireless Networks By Using Csi Directed Estimate And Forward Strategy (Article)
Subject: Cooperative Communication , Amplify-And-Forward (Af) , Decode-And-Forward (Df) , Spectral Efficiency
Author: Yihenew Wondie Marye      Chen Liu     
page:      07 - 17
9db Nf And +11 Dmb Oip3 Cmos Single Conversion Front-End For A Satellite Low-Noise Block Down-Converter (Article)
Subject: Cmos , Ku-Band , Lnb , Rf-Amp
Author: Takeshi Mitsunaka      Yusuke Kishino     
page:      101 - 108
Indoor Experiments On 4-By-2 Multi-User Mimo And Carrier Aggregation Achieving Real-Time 1-Gbps Dara Transmission In Lte-Advanced Downlink (Article)
Subject: Lte-Advanced , Ofdma , Multi-User Mimo , Antenna Arrangement
Author: Yuichi Kakishima      Teruo Kawamura     
page:      109 - 116
A New Higher Order Differential Of Clefia (Article)
Subject: Cryptanalysis , Higher Order Differential Attack , Meet-In-The-Middle Attack Technique , Block Cipher
Author: Naoki Shibayama      Toshinobu Kaneko     
page:      118 - 126
Comprehensive Study Of Integral Analysis On Lblock (Article)
Subject: Lblock , Integral Analysis , Partial-Sum , Meet-In-The-Middle
Author: Yu Sasaki      Lei Wang     
page:      127 - 138
Comprehensive Analysis Of Initial Keystream Biases Of Rc4 (Article)
Subject: Rc4 , Stream Cipher , Keystream Biases , Plaintext Recovery Attack
Author: Takanori Isobe      Toshihiro Ohigashi     
page:      139 - 151
A New Necessary Condition For Feedback Functions Of De Bruijn Sequences (Article)
Subject: Stream Cipher , Nonlinear Feedback Shift Registers , De Bruijn Sequences
Author: Zhongxiao Wang      Wenfeng Qi     
page:      152 - 156
Chosen-Iv Correlation Power Analysis On Kcipher-2 Hardware And A Masking-Based Countermeasure (Article)
Subject: Side-Channel Attacks , Kcipher-2 , Correlation Power Analysis , Random Masking
Author: Takafumi Hibiki      Naofumi Homma     
page:      157 - 166
Cryptanalyses On A Merkle-Damgard Based Mac-Almost Universal Forgery And Distinguishing-H Attacks (Article)
Subject: Lpmac , Distinguishing-H Attack , Almost Universal Forgery Attack , Multi-Collision
Author: Yu Sasaki     
page:      167 - 176
Distinguishers On Double-Branch Compression Function And Applications To Round-Reduced Ripemd-128 And Ripemd-160 (Article)
Subject: Ripemd-128 , Ripemd-160 , Double-Branch Structure , 2-Dimension
Author: Yu Sasaki      Lei Wang     
page:      177 - 190
Performance Of Star 16qam Schemes Considering Cubic Metric For Uplink Dft-Precoded Ofdma (Article)
Subject: Modulation Schemes , 16qam , Dft-Precoded Ofdma , Single-Carrier Fdma
Author: Teruo Kawamura      Yoshihisa Kishiyama     
page:      18 - 29
Randomness Leakage In The Kem/Dem Framework (Article)
Subject: Leakage Resilient Cryptography , Public-Key Encryption , Kem/Dem Framework , Hash Proofs System
Author: Hitoshi Namiki      Keisuke Tanaka     
page:      191 - 199
The Rsa Group Is Adaptive Pseudo-Free Under The Rsa Assumption (Article)
Subject: Pseudo-Freeness , Adaptive Pseudo-Free Groups , Rsa Assumption
Author: Masayuki Fukumitsu      Shingo Hasegawa     
page:      200 - 214
Relation Between Verifiable Random Functions And Convertible Undeniable Signatures, And New Constructions (Article)
Subject: Selectively Convertible Undeniable Signatures , Verifiable Random Functions , Standard Model
Author: Kaoru Kurosawa      Ryo Nojima     
page:      215 - 224
Relations Among Notions Of Privacy For Rfid Authentication Protocols (Article)
Subject: Rfid , Authentication , Security Model
Author: Daisuke Moriyama      Shin'Ichiro Matsuo     
page:      225 - 235
Key Length Estimation Of Pairing-Based Cryptosystems Using Nt Pairing Over Gf(3n) (Article)
Subject: Pairing-Based Cryptosystems , Discrete Logarithm Problem , Finite Field , Key Length
Author: Naoyuki Shinohara      Takeshi Shimoyama     
page:      236 - 244
Security Of Multivariate Signature Scheme Using Non-Commutative Rings (Article)
Subject: Multivariate Public Key Cryptosystem , Digital Signature , Rainbow , Non-Commutative Rings
Author: Takanori Yasuda      Tsuyoshi Takagi     
page:      245 - 252
An Accurate Packer Identification Method Using Support Vector Machine (Article)
Subject: Malware Analysis , Pack , Unpack , Machine Learning
Author: Ryoichi Isawa      Tao Ban     
page:      253 - 263
Unifield Coprocessor Architecture For Secure Key Storage And Challenge-Response Authentication (Article)
Subject: Physical Unclonable Function , Puf , Glitch Puf , Physical Random Nember Generator
Author: Koichi Shimizu      Daisuke Suzuki     
page:      264 - 274
Security Evaluation Of Rg-Dtm Puf Using Machine Learning Attacks (Article)
Subject: Physical Unclonable Function (Puf) , Arbiter-Puf , Xor Arbiter-Puf , Machine Learning Attack
Author: Mitsuru Shiozaki      Kousuke Ogawa     
page:      275 - 283
A Digital Trng Based On Cross Feedback Ring Oscillators (Article)
Subject: Digital Trng , Fpga , Stateless , Metastability
Author: Lijuan Li      Shuguo Li     
page:      284 - 291
A Property For Full Clefia-128 Detected By A Middletext Distinguisher Under The Known-Key Setting (Article)
Subject: Clefia , Higher-Order Integral , Integral Attack , Middletext Distinguisher
Author: Kazumaro Aoki     
page:      292 - 297
A Note On Security Of Public-Key Cryptosystem Provably As Secure As Subset Sum Problem (Article)
Subject: Subset Sum Problem , Provable Security , Attack
Author: Shinsuke Hamasho      Yasuyuki Murakami     
page:      298 - 299
Investigation On Frequency Diversity Effects Of Various Transmission Schemes Using Frequency Domain Equalizer For Dft-Precoded Ofdma (Article)
Subject: Single-Carrier Fdma , Frequency Diversity , Frequency Domain Equalizer , Frequency Mean Square Covariance
Author: Lianjun Deng      Teruo Kawamura     
page:      30 - 39
Implementation Of An Elliptic Curve Scalar Multiplication Method Using Division Polynomials (Article)
Subject: Elliptic Curve , Division Polynomial , Scalar Multiplication , Elliptic Net
Author: Naoki Kanayama      Yang Liu     
page:      300 - 302
Zero-Sum Defender: Fast And Space-Efficient Defense Against Return-Oriented Programming Attacks (Article)
Subject: Return-Oriented Programming , Malware Defense , Software Security
Author: Jeehong Kim      Inhyeok Kim     
page:      303 - 305
Low-Power Dynamic Mimo Detection For A 4*4 Mimo-Ofdm Receiver (Article)
Subject: Wireless Communication , Mimo Detection , Low Power , Dvfs
Author: Nozomi Miyazaki      Shingo Yoshizawa     
page:      306 - 312
Invariance And Periodic Oversampling In Principal Shift-Invariant Spaces (Article)
Subject: Principal Shift-Invariant Spaces , Oversampling , Frame , Invariance
Author: Kil Hyun Kwon      Dae Gwan Lee     
page:      313 - 321
Parametric Wiener Filter With Linear Constraints For Unknown Target Signals (Article)
Subject: Parametric Wiener Filter , Linear Constraints , Optimization Criterion , Closed-Form Solution
Author: Akira Tanaka      Hideyuki Imai     
page:      322 - 330
Eigen Analysis Of Moment Vector Equation For Interacting Chaotic Elements Described By Nonlinear Boltzmann Equation (Article)
Subject: Nonlinear Interaction , Boltzmann Equation , Mve , Eigen Analysis
Author: Hideki Satoh     
page:      331 - 338
A Method Of Analog Ic Placement With Common Centroid Constraints (Article)
Subject: Analog Circuits , Placement , Symmetry Constraints , Arc Plasma Method
Author: Keitaro Ue      Kunihiro Fujiyoshi     
page:      339 - 346
Bit-Parallel Cubing Computation Over Gf(3m) For Irreducible Trinomials (Article)
Subject: Finite Fields Arithmetic , Pth Powering , Characteristic Three , Cubing
Author: Sun-Mi Park      Ku-Young Chang     
page:      347 - 353
A Dpa Attack On The Implementation Of Rsa-Crt With Montgomery Reduction (Article)
Subject: Differential Power Analysis , Message Blinding , Montgomery Reduction , Rsa-Crt
Author: Wei-Chih Lien      Sung-Ming Yen     
page:      354 - 364
The Degree Of Two Classes Of 3rd Order Correlation Immune Symmetric Boolean Functions (Article)
Subject: Boolean Functions , Correlation Immune , Correlation Attack , Algebraic Degree
Author: Jie Peng      Haibin Kan     
page:      365 - 370
Cryptanalysis Of 249-, 250-,...., 256-Bit Key Hyral Via Equivalent (Article)
Subject: Cryptanalysis , Block Cipher , Hyral , Equivalent Key
Author: Yuki Asano      Shingo Yanagihara     
page:      371 - 383
Adaptive Reversible Data Hiding Via Iteger-To-Integer Subband Transform And Adaptive Generalized Difference Expansion Method (Article)
Subject: Adaptive Reversible Data Hiding , Adaptive Generalized Difference Expansion , Frequency Domain , Iteger-To-Integer Subband Transform
Author: Taichi Yoshida      Taizo Suzuki     
page:      384 - 392
Optimal Transform Order Of Fractional Fourier Transform For Decomposition Of Overlapping Ultrasonic Signals (Article)
Subject: Fractional Fourier Transform , Separation , Overlapping , Ultra-Sonic
Author: Zhenkun Lu      Cui Yang     
page:      393 - 396
Doppler Shift Based Target Localization Using Semidefinite Relaxation (Article)
Subject: Doppler Frequency Shift (Dfs) , Localization , Maximum Likelihood Estimation (Mle) , Semidefinite Programming (Sdp)
Author: Yan Shen Du      Ping Wei     
page:      397 - 400
Virtual Continuous Cwmin Control Scheme Of Wlan (Article)
Subject: Csma/Ca , Ieee 802.11dcf , Cwmin Control , Fairness
Author: Yuki Sangenya      Fumihiro Inoue     
page:      40 - 48
Global Asymptotic Stabilization Of Uncertain Nonlinear Systems Via System Reconfiguration And Lyapunov Equation Utilization (Article)
Subject: Global Asymptotic Stabilization , Uncertain Nonlinear Systems , System Reconfiguration , Lyapunov Equation
Author: Ho-Lin Choi     
page:      401 - 404
Phase Unwrapping Algorithm Based On Extended Particle Filter For Sar Interferometry (Article)
Subject: Phase Unwrapping , Extended Particle Filter (Epf) , Path Following Strategy
Author: Xianming Xie      Pengda Huang     
page:      405 - 408
Efficient Privacy-Preserving Reputation Evaluation In Decentralized Environments (Article)
Subject: Reputation Evaluation , Decentralized Environments , Privacy-Preserving , Communication Delay
Author: Youwen Zhu      Tsuyoshi Takagi     
page:      409 - 412
About Validity Checks Of Augmented Pake In Ieee 1363.2 And Iso/Iec 11770-4 (Article)
Subject: Pake , On-Line/Off-Line Dictionary Attacks , Augmented Pake , Ieee 1363.2
Author: Seonghan Shin      Kazukuni Kobara     
page:      413 - 417
Cryptanalysis Of Remote Data Integrity Checking Protocol Proposed By L. Chen For Cloud Storage (Article)
Subject: Cloud Computing , Cloud Storage , Data Integrity , Replay Attack
Author: Shaojing Fu      Dongsheng Wang     
page:      418 - 420
Improvement On A Knapsack-Based Probabilistic Encryption Scheme (Article)
Subject: Public Key Cryptography , Knapsack Problem , Security Analysis , Trapdoor Knapsack
Author: Baocang Wang      Fagen Li     
page:      421 - 424
Odd Perfect Sequences And Sequence Sets With Zero Odd Correlation Zone Over The 8-Qam+ Constellation (Article)
Subject: Odd Perfect Sequence , Zero Odd Correlation Zone (Zocz) , 8-Qam+ Constellation , Ternary Odd Perfect Sequence
Author: Yubo Li      Kai Liu     
page:      425 - 428
Multiple Cfo Estimation Using The Properties Of Zadoff-Chu Sequence (Article)
Subject: Multiple Cfo Estimation , Comp , Zadoff-Chu Sequence
Author: Rothna Pec      Chang-Hwan Park     
page:      429 - 431
N-Shift Zero Correlation Zone Sequence (Article)
Subject: Zero Correlation Zone , Zcz , N-Shift Sequence , Interference Cancellation
Author: Chao Zhang      Keke Pang     
page:      432 - 435
Performance Analysis Of Nav Based Contention Window In Ieee 802.11 Lan (Article)
Subject: Ieee 802.11 Lan , Contention Window , Backoff , Csma/Ca
Author: Seung-Sik Choi     
page:      436 - 439
Fuzzy Metric Based Weight Assignment For Deinterlacing (Article)
Subject: Fuzzy Metric , Deinterlacing , Weight Assignment , Scanning Format Conversion
Author: Gwanggil Jeon      Seokhoon Kang     
page:      440 - 443
A Fast Intra Prediction Method Using The Distribution Of Adjacent Pixels In Hevc (Article)
Subject: Hevc , Intra-Mode Coding , Video Coding , Video Compression
Author: Youngjo Kim      Juwon Byun     
page:      444 - 447
Performance Analysis Of Mimo/Fso Systems Using Sc-Qam Signaling Over Atmospheric Turbulence Channels (Article)
Subject: Free Space Optical (Fso) Communications , Multiple-Input Multiple-Output (Mimo) , Subcarrier Quadrature-Amplitude Modulation (Sc-Qam) , Atmospheric Turbulence
Author: Trung Ha Duyen      Anh T. Pham     
page:      49 - 56
A Novel Low Computational Complexity Power Assignment Method For Non-Orthogonal Multiple Access Systems (Article)
Subject: Non-Orthogonal Multiple Access , Power Assignment , Low Computational Complexity , Tree Search
Author: Anxin Li      Atsushi Harada     
page:      57 - 68
An Efficient Algorithm For Weighted Sum-Rate Maximization In Multicell Ofdma Downlink (Article)
Subject: Weighted Sum-Rate Maximization , Coordinated Linear Precoding , Convex Approximation , Second-Order Cone Programming
Author: Mirza Golam Kibria      Hidekazu Murata     
page:      69 - 77
Joint Resource Allocation Algorithm In Carrier Aggregation Enabled Future Wireless Networks (Article)
Subject: Resource Allocation , Ofdma , Proportional Fairness , Carrier Aggregation
Author: Zanjie Huang      Yusheng Ji     
page:      78 - 85
135ghz 98mw 10gbps Cmos Amplitude Shift Keying Transmitter And Receiver Chipset (Article)
Subject: Cmos , D-Band , High-Speed , Wireless
Author: Mizuki Motoyoshi      Naoko Ono     
page:      86 - 93
Analyses And Modeling Of Ultra-Wideband On-Body Propagation Channels Depending On Population Density Within An Elevator Cabin (Article)
Subject: Ultra-Wideband (Uwb) , Wireless Body Area Networks , Indoor Channel Measurement , Body-Shadowing
Author: Miyuki Hirose      Takehiko Kobayashi     
page:      94 - 100