The SCEAS System
Navigation Menu

Journals in DBLP

IEICE Transactions
2004, volume: 87, number: 1

  1. Koji Nakao
    Foreword. [Citation Graph (0, 0)][DBLP]
    IEICE Transactions, 2004, v:87, n:1, pp:1- [Journal]
  2. Satoshi Hada
    A Note on Transformations of Interactive Proofs that Preserve the Prover's Complexity. [Citation Graph (0, 0)][DBLP]
    IEICE Transactions, 2004, v:87, n:1, pp:2-9 [Journal]
  3. Koh-ichi Nagao, Shigenori Uchiyama, Naoki Kanayama, Kazuto Matsuo
    Analysis of Baby-Step Giant-Step Algorithms for Non-uniform Distributions. [Citation Graph (0, 0)][DBLP]
    IEICE Transactions, 2004, v:87, n:1, pp:10-17 [Journal]
  4. Yasuo Hatano, Hidema Tanaka, Toshinobu Kaneko
    Optimization for the Algebraic Method and Its Application to an Attack of MISTY1. [Citation Graph (0, 0)][DBLP]
    IEICE Transactions, 2004, v:87, n:1, pp:18-27 [Journal]
  5. Masahiko Takenaka, Takeshi Shimoyama, Takeshi Koshiba
    Theoretical Analysis of chi2 Attack on RC6. [Citation Graph (0, 0)][DBLP]
    IEICE Transactions, 2004, v:87, n:1, pp:28-36 [Journal]
  6. Dai Watanabe, Soichi Furuya, Hirotaka Yoshida, Kazuo Takaragi, Bart Preneel
    A New Keystream Generator MUGI. [Citation Graph (0, 0)][DBLP]
    IEICE Transactions, 2004, v:87, n:1, pp:37-45 [Journal]
  7. Kaoru Kurosawa, Tetsu Iwata
    TMAC: Two-Key CBC MAC. [Citation Graph (0, 0)][DBLP]
    IEICE Transactions, 2004, v:87, n:1, pp:46-52 [Journal]
  8. Swee-Huay Heng, Kaoru Kurosawa
    Square Hash with a Small Key Size. [Citation Graph (0, 0)][DBLP]
    IEICE Transactions, 2004, v:87, n:1, pp:54-59 [Journal]
  9. Tetsu Iwata, Kaoru Kurosawa
    On the Universal Hash Functions in Luby-Rackoff Cipher. [Citation Graph (0, 0)][DBLP]
    IEICE Transactions, 2004, v:87, n:1, pp:60-66 [Journal]
  10. Toshihiko Matsuo, Kaoru Kurosawa
    On Parallel Hash Functions Based on Block-Ciphers. [Citation Graph (0, 0)][DBLP]
    IEICE Transactions, 2004, v:87, n:1, pp:67-74 [Journal]
  11. Katsuyuki Okeya, Tsuyoshi Takagi
    SCA-Resistant and Fast Elliptic Scalar Multiplication Based on wNAF. [Citation Graph (0, 0)][DBLP]
    IEICE Transactions, 2004, v:87, n:1, pp:75-84 [Journal]
  12. Tetsuya Izu, Tsuyoshi Takagi
    Fast Elliptic Curve Multiplications with SIMD Operations. [Citation Graph (0, 0)][DBLP]
    IEICE Transactions, 2004, v:87, n:1, pp:85-93 [Journal]
  13. Tsuyoshi Takagi
    A Fast RSA-Type Public-Key Primitive Modulo pkq Using Hensel Lifting. [Citation Graph (0, 0)][DBLP]
    IEICE Transactions, 2004, v:87, n:1, pp:94-101 [Journal]
  14. Masao Kasahara, Ryuichi Sakai
    A Construction of Public Key Cryptosystem for Realizing Ciphertext of Size 100 Bit and Digital Signature Scheme. [Citation Graph (0, 0)][DBLP]
    IEICE Transactions, 2004, v:87, n:1, pp:102-109 [Journal]
  15. Yuichi Komano, Kazuo Ohta
    OAEP-ES - Methodology of Universal Padding Technique. [Citation Graph (0, 0)][DBLP]
    IEICE Transactions, 2004, v:87, n:1, pp:110-119 [Journal]
  16. Goichiro Hanaoka, Junji Shikata, Yuliang Zheng, Hideki Imai
    Efficient Unconditionally Secure Digital Signatures. [Citation Graph (0, 0)][DBLP]
    IEICE Transactions, 2004, v:87, n:1, pp:120-130 [Journal]
  17. Masayuki Abe, Miyako Ohkubo, Koutarou Suzuki
    1-out-of-n Signatures from a Variety of Keys. [Citation Graph (0, 0)][DBLP]
    IEICE Transactions, 2004, v:87, n:1, pp:131-140 [Journal]
  18. Kaoru Kurosawa, Quang Viet Duong
    How to Design Efficient Multiple-Use 1-out-n Oblivious Transfer. [Citation Graph (0, 0)][DBLP]
    IEICE Transactions, 2004, v:87, n:1, pp:141-146 [Journal]
  19. Wakaha Ogata, Ryota Sasahara
    k out of n Oblivious Transfer without Random Oracles. [Citation Graph (0, 0)][DBLP]
    IEICE Transactions, 2004, v:87, n:1, pp:147-151 [Journal]
  20. Jun Anzai, Tsutomu Matsumoto
    Interaction Key Generation Schemes. [Citation Graph (0, 0)][DBLP]
    IEICE Transactions, 2004, v:87, n:1, pp:152-159 [Journal]
  21. Goichiro Hanaoka, Kazuto Ogawa, Itsuro Murota, Go Ohtake, Keigo Majima, Seiichi Gohshi, Kimiyuki Oyamada, Seiichi Namba, Hideki Imai
    Managing Encryption and Key Publication Independently in Digital Rights Management Systems. [Citation Graph (0, 0)][DBLP]
    IEICE Transactions, 2004, v:87, n:1, pp:160-172 [Journal]
  22. Koji Chida, Kunio Kobayashi, Hikaru Morita
    An Auction Protocol Preserving Privacy of Losing Bids with a Secure Value Comparison Scheme. [Citation Graph (0, 0)][DBLP]
    IEICE Transactions, 2004, v:87, n:1, pp:173-181 [Journal]
  23. Akira Yamada, Shinsaku Kiyomoto, Toshiaki Tanaka, Koji Nakao
    New Time-Stamping Scheme Using Mutual Communications with Pseudonymous Clients. [Citation Graph (0, 0)][DBLP]
    IEICE Transactions, 2004, v:87, n:1, pp:182-189 [Journal]
  24. Masakazu Soshi, Mamoru Maekawa, Eiji Okamoto
    The Dynamic-Typed Access Matrix Model and Decidability of the Safety Problem. [Citation Graph (0, 0)][DBLP]
    IEICE Transactions, 2004, v:87, n:1, pp:190-203 [Journal]
  25. Kenji Imamoto, Kouichi Sakurai
    Analysis and Design for Private Message Board Systems. [Citation Graph (0, 0)][DBLP]
    IEICE Transactions, 2004, v:87, n:1, pp:204-211 [Journal]
  26. Jun Furukawa
    Secure Detection of Watermarks. [Citation Graph (0, 0)][DBLP]
    IEICE Transactions, 2004, v:87, n:1, pp:212-220 [Journal]
  27. Tetsuya Izu
    A Note on the Lattice Factoring Method. [Citation Graph (0, 0)][DBLP]
    IEICE Transactions, 2004, v:87, n:1, pp:221-223 [Journal]
  28. Kazuhiro Hattanda, Shuichi Ichikawa
    The Evaluation of Davidson's Digital Signature Scheme. [Citation Graph (0, 0)][DBLP]
    IEICE Transactions, 2004, v:87, n:1, pp:224-225 [Journal]
  29. Chik How Tan
    Key Substitution Attacks on Some Provably Secure Signature Schemes. [Citation Graph (0, 0)][DBLP]
    IEICE Transactions, 2004, v:87, n:1, pp:226-227 [Journal]
  30. Dong Jin Kwak, Sang-Jae Moon
    A Distributed Sign-and-Encryption for Anonymity. [Citation Graph (0, 0)][DBLP]
    IEICE Transactions, 2004, v:87, n:1, pp:228-230 [Journal]
  31. Wen-Bin Lin, Bin-Da Liu
    Coefficients Generation for the 4th-Order Leapfrog Sigma-Delta A/D Converters. [Citation Graph (0, 0)][DBLP]
    IEICE Transactions, 2004, v:87, n:1, pp:231-242 [Journal]
  32. Tae Hoon Lee, Won Sang Ra, Seung Hee Jin, Tae Sung Yoon, Jin Bae Park
    Robust Extended Kalman Filtering via Krein Space Estimation. [Citation Graph (0, 0)][DBLP]
    IEICE Transactions, 2004, v:87, n:1, pp:243-250 [Journal]
  33. Yuya Matsumoto, Yuichi Tanji, Mamoru Tanaka
    Sparse Realization of Passive Reduced-Order Interconnect Models via PRIMA. [Citation Graph (0, 0)][DBLP]
    IEICE Transactions, 2004, v:87, n:1, pp:251-257 [Journal]
  34. Donghyun Kim, Lee-Sup Kim
    An Efficient Fragment Processing Technique in A-Buffer Implementation. [Citation Graph (0, 0)][DBLP]
    IEICE Transactions, 2004, v:87, n:1, pp:258-269 [Journal]
  35. Jonah Gamba, Tetsuya Shimamura
    A New Method of Noise Variance Estimation from Low-Order Yule-Walker Equations. [Citation Graph (0, 0)][DBLP]
    IEICE Transactions, 2004, v:87, n:1, pp:270-274 [Journal]
  36. Pei-Yin Chen
    VLSI Architecture for 2-D 3-Level Lifting-Based Discrete Wavelet Transform. [Citation Graph (0, 0)][DBLP]
    IEICE Transactions, 2004, v:87, n:1, pp:275-279 [Journal]
  37. Shoichi Hirose, Susumu Yoshida
    An Approximate Scheme of Oblivious Transfer with Probabilistic Receipt. [Citation Graph (0, 0)][DBLP]
    IEICE Transactions, 2004, v:87, n:1, pp:280-281 [Journal]
  38. Shu-Chuan Chu, John F. Roddick, Zhe-Ming Lu, Jeng-Shyang Pan
    A Digital Image Watermarking Method Based on Labeled Bisecting Clustering Algorithm. [Citation Graph (0, 0)][DBLP]
    IEICE Transactions, 2004, v:87, n:1, pp:282-285 [Journal]
  39. Takafumi Hayashi
    A Generalization of Binary Zero-Correlation Zone Sequence Sets Constructed from Hadamard Matrices. [Citation Graph (0, 0)][DBLP]
    IEICE Transactions, 2004, v:87, n:1, pp:286-291 [Journal]
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002