Journals in DBLP
Koji Nakao Foreword. [Citation Graph (0, 0)][DBLP ] IEICE Transactions, 2004, v:87, n:1, pp:1- [Journal ] Satoshi Hada A Note on Transformations of Interactive Proofs that Preserve the Prover's Complexity. [Citation Graph (0, 0)][DBLP ] IEICE Transactions, 2004, v:87, n:1, pp:2-9 [Journal ] Koh-ichi Nagao , Shigenori Uchiyama , Naoki Kanayama , Kazuto Matsuo Analysis of Baby-Step Giant-Step Algorithms for Non-uniform Distributions. [Citation Graph (0, 0)][DBLP ] IEICE Transactions, 2004, v:87, n:1, pp:10-17 [Journal ] Yasuo Hatano , Hidema Tanaka , Toshinobu Kaneko Optimization for the Algebraic Method and Its Application to an Attack of MISTY1. [Citation Graph (0, 0)][DBLP ] IEICE Transactions, 2004, v:87, n:1, pp:18-27 [Journal ] Masahiko Takenaka , Takeshi Shimoyama , Takeshi Koshiba Theoretical Analysis of chi2 Attack on RC6. [Citation Graph (0, 0)][DBLP ] IEICE Transactions, 2004, v:87, n:1, pp:28-36 [Journal ] Dai Watanabe , Soichi Furuya , Hirotaka Yoshida , Kazuo Takaragi , Bart Preneel A New Keystream Generator MUGI. [Citation Graph (0, 0)][DBLP ] IEICE Transactions, 2004, v:87, n:1, pp:37-45 [Journal ] Kaoru Kurosawa , Tetsu Iwata TMAC: Two-Key CBC MAC. [Citation Graph (0, 0)][DBLP ] IEICE Transactions, 2004, v:87, n:1, pp:46-52 [Journal ] Swee-Huay Heng , Kaoru Kurosawa Square Hash with a Small Key Size. [Citation Graph (0, 0)][DBLP ] IEICE Transactions, 2004, v:87, n:1, pp:54-59 [Journal ] Tetsu Iwata , Kaoru Kurosawa On the Universal Hash Functions in Luby-Rackoff Cipher. [Citation Graph (0, 0)][DBLP ] IEICE Transactions, 2004, v:87, n:1, pp:60-66 [Journal ] Toshihiko Matsuo , Kaoru Kurosawa On Parallel Hash Functions Based on Block-Ciphers. [Citation Graph (0, 0)][DBLP ] IEICE Transactions, 2004, v:87, n:1, pp:67-74 [Journal ] Katsuyuki Okeya , Tsuyoshi Takagi SCA-Resistant and Fast Elliptic Scalar Multiplication Based on wNAF. [Citation Graph (0, 0)][DBLP ] IEICE Transactions, 2004, v:87, n:1, pp:75-84 [Journal ] Tetsuya Izu , Tsuyoshi Takagi Fast Elliptic Curve Multiplications with SIMD Operations. [Citation Graph (0, 0)][DBLP ] IEICE Transactions, 2004, v:87, n:1, pp:85-93 [Journal ] Tsuyoshi Takagi A Fast RSA-Type Public-Key Primitive Modulo pk q Using Hensel Lifting. [Citation Graph (0, 0)][DBLP ] IEICE Transactions, 2004, v:87, n:1, pp:94-101 [Journal ] Masao Kasahara , Ryuichi Sakai A Construction of Public Key Cryptosystem for Realizing Ciphertext of Size 100 Bit and Digital Signature Scheme. [Citation Graph (0, 0)][DBLP ] IEICE Transactions, 2004, v:87, n:1, pp:102-109 [Journal ] Yuichi Komano , Kazuo Ohta OAEP-ES - Methodology of Universal Padding Technique. [Citation Graph (0, 0)][DBLP ] IEICE Transactions, 2004, v:87, n:1, pp:110-119 [Journal ] Goichiro Hanaoka , Junji Shikata , Yuliang Zheng , Hideki Imai Efficient Unconditionally Secure Digital Signatures. [Citation Graph (0, 0)][DBLP ] IEICE Transactions, 2004, v:87, n:1, pp:120-130 [Journal ] Masayuki Abe , Miyako Ohkubo , Koutarou Suzuki 1-out-of-n Signatures from a Variety of Keys. [Citation Graph (0, 0)][DBLP ] IEICE Transactions, 2004, v:87, n:1, pp:131-140 [Journal ] Kaoru Kurosawa , Quang Viet Duong How to Design Efficient Multiple-Use 1-out-n Oblivious Transfer. [Citation Graph (0, 0)][DBLP ] IEICE Transactions, 2004, v:87, n:1, pp:141-146 [Journal ] Wakaha Ogata , Ryota Sasahara k out of n Oblivious Transfer without Random Oracles. [Citation Graph (0, 0)][DBLP ] IEICE Transactions, 2004, v:87, n:1, pp:147-151 [Journal ] Jun Anzai , Tsutomu Matsumoto Interaction Key Generation Schemes. [Citation Graph (0, 0)][DBLP ] IEICE Transactions, 2004, v:87, n:1, pp:152-159 [Journal ] Goichiro Hanaoka , Kazuto Ogawa , Itsuro Murota , Go Ohtake , Keigo Majima , Seiichi Gohshi , Kimiyuki Oyamada , Seiichi Namba , Hideki Imai Managing Encryption and Key Publication Independently in Digital Rights Management Systems. [Citation Graph (0, 0)][DBLP ] IEICE Transactions, 2004, v:87, n:1, pp:160-172 [Journal ] Koji Chida , Kunio Kobayashi , Hikaru Morita An Auction Protocol Preserving Privacy of Losing Bids with a Secure Value Comparison Scheme. [Citation Graph (0, 0)][DBLP ] IEICE Transactions, 2004, v:87, n:1, pp:173-181 [Journal ] Akira Yamada , Shinsaku Kiyomoto , Toshiaki Tanaka , Koji Nakao New Time-Stamping Scheme Using Mutual Communications with Pseudonymous Clients. [Citation Graph (0, 0)][DBLP ] IEICE Transactions, 2004, v:87, n:1, pp:182-189 [Journal ] Masakazu Soshi , Mamoru Maekawa , Eiji Okamoto The Dynamic-Typed Access Matrix Model and Decidability of the Safety Problem. [Citation Graph (0, 0)][DBLP ] IEICE Transactions, 2004, v:87, n:1, pp:190-203 [Journal ] Kenji Imamoto , Kouichi Sakurai Analysis and Design for Private Message Board Systems. [Citation Graph (0, 0)][DBLP ] IEICE Transactions, 2004, v:87, n:1, pp:204-211 [Journal ] Jun Furukawa Secure Detection of Watermarks. [Citation Graph (0, 0)][DBLP ] IEICE Transactions, 2004, v:87, n:1, pp:212-220 [Journal ] Tetsuya Izu A Note on the Lattice Factoring Method. [Citation Graph (0, 0)][DBLP ] IEICE Transactions, 2004, v:87, n:1, pp:221-223 [Journal ] Kazuhiro Hattanda , Shuichi Ichikawa The Evaluation of Davidson's Digital Signature Scheme. [Citation Graph (0, 0)][DBLP ] IEICE Transactions, 2004, v:87, n:1, pp:224-225 [Journal ] Chik How Tan Key Substitution Attacks on Some Provably Secure Signature Schemes. [Citation Graph (0, 0)][DBLP ] IEICE Transactions, 2004, v:87, n:1, pp:226-227 [Journal ] Dong Jin Kwak , Sang-Jae Moon A Distributed Sign-and-Encryption for Anonymity. [Citation Graph (0, 0)][DBLP ] IEICE Transactions, 2004, v:87, n:1, pp:228-230 [Journal ] Wen-Bin Lin , Bin-Da Liu Coefficients Generation for the 4th-Order Leapfrog Sigma-Delta A/D Converters. [Citation Graph (0, 0)][DBLP ] IEICE Transactions, 2004, v:87, n:1, pp:231-242 [Journal ] Tae Hoon Lee , Won Sang Ra , Seung Hee Jin , Tae Sung Yoon , Jin Bae Park Robust Extended Kalman Filtering via Krein Space Estimation. [Citation Graph (0, 0)][DBLP ] IEICE Transactions, 2004, v:87, n:1, pp:243-250 [Journal ] Yuya Matsumoto , Yuichi Tanji , Mamoru Tanaka Sparse Realization of Passive Reduced-Order Interconnect Models via PRIMA. [Citation Graph (0, 0)][DBLP ] IEICE Transactions, 2004, v:87, n:1, pp:251-257 [Journal ] Donghyun Kim , Lee-Sup Kim An Efficient Fragment Processing Technique in A-Buffer Implementation. [Citation Graph (0, 0)][DBLP ] IEICE Transactions, 2004, v:87, n:1, pp:258-269 [Journal ] Jonah Gamba , Tetsuya Shimamura A New Method of Noise Variance Estimation from Low-Order Yule-Walker Equations. [Citation Graph (0, 0)][DBLP ] IEICE Transactions, 2004, v:87, n:1, pp:270-274 [Journal ] Pei-Yin Chen VLSI Architecture for 2-D 3-Level Lifting-Based Discrete Wavelet Transform. [Citation Graph (0, 0)][DBLP ] IEICE Transactions, 2004, v:87, n:1, pp:275-279 [Journal ] Shoichi Hirose , Susumu Yoshida An Approximate Scheme of Oblivious Transfer with Probabilistic Receipt. [Citation Graph (0, 0)][DBLP ] IEICE Transactions, 2004, v:87, n:1, pp:280-281 [Journal ] Shu-Chuan Chu , John F. Roddick , Zhe-Ming Lu , Jeng-Shyang Pan A Digital Image Watermarking Method Based on Labeled Bisecting Clustering Algorithm. [Citation Graph (0, 0)][DBLP ] IEICE Transactions, 2004, v:87, n:1, pp:282-285 [Journal ] Takafumi Hayashi A Generalization of Binary Zero-Correlation Zone Sequence Sets Constructed from Hadamard Matrices. [Citation Graph (0, 0)][DBLP ] IEICE Transactions, 2004, v:87, n:1, pp:286-291 [Journal ]