The search functionality is under construction.
The search functionality is under construction.

Keyword Search Result

[Keyword] Al(20498hit)

7701-7720hit(20498hit)

  • Generalized Classes of Weak Keys on RC4 Using Predictive State

    Ryoichi TERAMURA  Toshihiro OHIGASHI  Hidenori KUWAKADO  Masakatu MORII  

     
    PAPER-Symmetric Cryptography

      Vol:
    E94-A No:1
      Page(s):
    10-18

    Conventional class of weak keys on RC4 stream cipher is defined as a specific case that combinations of the first three bytes of secret key satisfy two relational equations. This paper expands and generalizes the classes of weak keys using generalized relational equations and special classes of the internal state (called predictive state). We derive the probability that generalized classes of weak keys leak the information of bytes of the secret key. Furthermore, we enumerate the generalized classes of weak keys and show that most of them leak more information of the secret key than Roos' one.

  • Spatially Adaptive Noise Removal Algorithm Using Local Statistics

    Tuan-Anh NGUYEN  Won-Seon SONG  Min-Cheol HONG  

     
    LETTER-Image

      Vol:
    E94-A No:1
      Page(s):
    452-456

    In this letter, we propose a spatially adaptive noise removal algorithm using local statistics. The proposed algorithm consists of two stages: noise detection and removal. In order to solve the trade-off between the effective noise suppression and the over-smoothness of the reconstructed image, local statistics such as local maximum and the local weighted activity is defined. With the local statistics, the noise detection function is defined and a modified Gaussian filter is used to suppress the detected noise components. The experimental results demonstrate the effectiveness of the proposed algorithm.

  • BICM-ID with 3-Dimensional BPSK and Signal Space Diversity over Rayleigh Channel

    Qiuliang XIE  Kewu PENG  Fang YANG  Zhaocheng WANG  Zhixing YANG  

     
    LETTER-Fundamental Theories for Communications

      Vol:
    E94-B No:1
      Page(s):
    282-284

    A BICM-ID system with 3-dimensional rotated BPSK constellation and signal space diversity (SSD) is proposed to combat the effect of Rayleigh fading. A new criterion based on mutual information is proposed to find the optimal rotation matrix, and the labeling that fits well with the outer code is presented. Simulation results show that at BER of 10-5 over a Rayleigh fading channel, with the code length of 192,000 bits and the iteration number of 100, the performance of the proposed system is only about 0.8 dB from the Gaussian-input Shannon limit and exceeds the limit constrained by the traditional QPSK input without rotation or SSD, at the spectrum efficiency of 1 bit/s/Hz.

  • An Efficient Adaptive-Deniable-Concurrent Non-malleable Commitment Scheme

    Seiko ARITA  

     
    PAPER-Cryptography and Information Security

      Vol:
    E94-A No:1
      Page(s):
    367-382

    It is known that composable secure commitments, that is, concurrent non-malleable commitments exist in the plain model, based only on standard assumptions such as the existence of claw-free permutations or even one-way functions. Since being based on the plain model, the deniability of them is trivially satisfied, and especially the latter scheme satisfies also adaptivity, hence it is adaptive-deniable-concurrent non-malleable. However, those schemes cannot be said to be practically efficient. We show a practically efficient (string) adaptive-deniable-concurrent commitment scheme is possible under a global setup model, called the Global CRS-KR model.

  • A Fully Secure Spatial Encryption Scheme

    Daisuke MORIYAMA  Hiroshi DOI  

     
    PAPER-Public Key Cryptography

      Vol:
    E94-A No:1
      Page(s):
    28-35

    Spatial encryption is one of the generalized identity based encryption proposed by Boneh and Hamburg in 2008. Spatial encryption provides a framework for generating many identity based cryptosystems such as broadcast encryption, forward secure encryption or ring signature. While this may appear to be an attractive feature, all existing spatial encryption schemes are only selectively secure. In this paper, we present a fully secure spatial encryption scheme based on the three composite order bilinear groups.

  • Bit Error Rate and Power Allocation of Soft-Decision-and-Forward Cooperative Networks

    Kyoung-Young SONG  Jong-Seon NO  Habong CHUNG  

     
    PAPER-Wireless Communication Technologies

      Vol:
    E94-B No:1
      Page(s):
    234-242

    In this paper, the performance of the soft-decision-and-forward (SDF) protocol in the cooperative communication network with one source, one relay, and one destination, where each node has two transmit and receive antennas, is analyzed in terms of the bit error rate (BER) obtained from the pairwise error probability (PEP). Using the moment generating function and Q-function approximation, the PEP of SDF protocol is calculated and we confirm that the SDF with two antennas achieves the full diversity order. For the slow-varying Rayleigh fading channel, the optimal power allocation ratio can be determined so as to minimize the average PEP (or BER). Due to the difficulty of deriving the optimal value analytically, an alternative strategy of maximizing the product signal-to-noise ratio (SNR) of direct and relay links, which we call the suboptimal power allocation, is considered. Through a numerical analysis, we show that the performance gap between the suboptimal and optimal power allocation strategies is negligible in the high SNR region.

  • Transmission Performance of an In-Body to Off-Body UWB Communication Link

    Jianqing WANG  Kenichiro MASAMI  Qiong WANG  

     
    PAPER-Antennas and Propagation

      Vol:
    E94-B No:1
      Page(s):
    150-157

    The objective of this study is to investigate the feasibility of an ultra wideband (UWB) impulse radio system for in-body to off-body wireless communication for biomedical applications. At first, a UWB antenna is designed in the UWB low band for implant use in the chest. Then the channel model is extracted and established based on the finite difference time domain (FDTD) simulation with an anatomical human body model. The established channel model consists of a small set of parameters for generating discrete time impulse responses. The generated model shows good agreement with the FDTD-calculated result in terms of key communication metrics. For effective communication over the multipath-affected channel, the pulse position modulation is employed and a 2-finger RAKE structure with a constant temporal delay is proposed in the receiver. The bit error rate performance has shown the validity of the system in the in-body to off-body chest channel.

  • A Two-Stage Spatiotemporal Approach for Mining Traffic Flows across Multiple Networks

    Weisong HE  Guangmin HU  Yingjie ZHOU  Haiyan JIN  

     
    LETTER-Graphs and Networks

      Vol:
    E94-A No:1
      Page(s):
    440-442

    In this letter, a new definition of two-stage spatiotemporal approach, called ICA-WFS (Independent-Component-Analysis-Weighted-Frequent-Substructure) is proposed. To facilitate capturing abnormal behavior across multiple networks and dimensionality reduction at a single Point of Presence (PoP), ICA is applied. With application of WFS, an complete graph is examined, unusual substructures of which are reported. Experiments are conducted and, together with application of backbone network (Internet2) Netflow data, show some positive results.

  • Robust Subthreshold CMOS Digital Circuit Design with On-Chip Adaptive Supply Voltage Scaling Technique

    Yuji OSAKI  Tetsuya HIROSE  Kei MATSUMOTO  Nobutaka KUROKI  Masahiro NUMA  

     
    PAPER-Electronic Circuits

      Vol:
    E94-C No:1
      Page(s):
    80-88

    A delay-compensation circuit for low-power subthreshold digital circuits is proposed. Delay in digital circuits operating in the subthreshold region of MOSFETs changes exponentially with process and temperature variations. Threshold-voltage monitoring and supply-voltage scaling techniques are adopted to mitigate such variations. The variation in the delay can be significantly reduced by monitoring the threshold voltage of a MOSFET in each LSI chip and exploiting the voltage as the supply voltage for subthreshold digital circuits. The supply voltage generated by the threshold voltage monitoring circuit can be regarded as the minimum supply voltage to meet the delay constraint. Monte Carlo SPICE simulations demonstrated that a delay-time variation can be improved from having a log-normal to having a normal distribution. A prototype in a 0.35-µm standard CMOS process showed that the exponential delay variation with temperature of the ring-oscillator frequency in the range from 0.321 to 212 kHz can remain by using compensation in the range from 5.26 to 19.2 kHz.

  • UMPI Test in SIRV Distribution for the Multi-Rank Signal Model

    Guolong CUI  Lingjiang KONG  Xiaobo YANG  Jianyu YANG  

     
    LETTER-Sensing

      Vol:
    E94-B No:1
      Page(s):
    368-371

    This letter mainly deals with the multi-rank signal detecting problem against Spherically Invariant Random Vector (SIRV) background with Invariance theory. It is proved that generalized likelihood ratio test (GLRT), Rao test and Wald test are all the Uniformly Most Powerful Invariant (UMPI) detectors in SIRV distributions under a mild technical condition.

  • Mobile Terminal Substitution of Vehicular Collision Avoidance Support System (VCASS) for Non-VCASS Vehicles: S-VCASS

    Tomotaka WADA  Shinji NAKAI  Tetsuya MARUOKA  Haokun WANG  Hiromi OKADA  

     
    PAPER-Intelligent Transport System

      Vol:
    E94-A No:1
      Page(s):
    410-419

    In this paper, we develop a VCASS substitution system (S-VCASS) using a personal mobile terminal in order to improve the effectiveness of VCASS in an environment comprising both VCASS and non-VCASS vehicles. We propose three new pedestrian state judgment algorithms that can be implemented on a personal mobile terminal for inter-vehicle communications. We evaluate the performances of the three proposed algorithms with real vehicles. Finally, we show that the proposed algorithms can recognize vehicles without VCASS.

  • Analysis of Transient Electromagnetic Scattering from Two-Dimensional Open-Ended Structures by Numerical Inversion of Laplace Transform

    Shinichiro OHNUKI  Yuya KITAOKA  

     
    BRIEF PAPER-Transients and Time-Domain Techiques

      Vol:
    E94-C No:1
      Page(s):
    68-71

    A novel computational method is proposed to investigate electromagnetic scattering problems. It is error controllable and reliable simulation in time domain can be performed. We apply the proposed method to analysis of transient scattering from open-ended structures and discuss scattering mechanisms.

  • Graph-Spectral Filter for Removing Mixture of Gaussian and Random Impulsive Noise

    Yu QIU  Zenggang DU  Kiichi URAHAMA  

     
    LETTER-Image

      Vol:
    E94-A No:1
      Page(s):
    457-460

    We propose, in this letter, a new type of image denoising filter using a data analysis technique. We deal with pixels as data and extract the most dominant cluster from pixels in the filtering window. We output the centroid of the extracted cluster. We demonstrate that this graph-spectral filter can effectively reduce a mixture of Gaussian and random impulsive noise.

  • Toward Digital Watermarking for Cryptographic Data

    Maki YOSHIDA  Toru FUJIWARA  

     
    LETTER

      Vol:
    E94-A No:1
      Page(s):
    270-272

    This paper introduces a novel type of digital watermarking, which is mainly designed for embededing information into cryptographic data such as keys, ciphertexts, and signatures. We focus on a mathematical structure of the recent major cryptosystems called pairing-based schemes. We present a detection-type watermarking scheme by which a watermark is visible by anyone but unremovable without secret trapdoor. The important feature is that both correctness and security of cryptographic data remain satisfied even if the trapdoor is published.

  • A Low-Cost Continuous-Flow Parallel Memory-Based FFT Processor for UWB Applications

    Chin-Long WEY  Shin-Yo LIN  Hsu-Sheng WANG  Hung-Lieh CHEN  Chun-Ming HUANG  

     
    PAPER-VLSI Design Technology and CAD

      Vol:
    E94-A No:1
      Page(s):
    315-323

    In UWB systems, data symbols are transmitted and received continuously. The Fast Fourier Transform (FFT) processor must be able to seamlessly process input/output data. This paper presents the design and implementation of a continuous data flow parallel memory-based FFT (CF-PMBFFT) processor without the use of input buffer for pre-loading the input data. The processor realizes a memory space of two N-words and multiple processing elements (PEs) to achieve the seamless data flow and meet the design requirement. The circuit has been fabricated in TSMC 0.18 µm 1P6M CMOS process with the supply voltage of 1.8 V. Measurement results of the test chip shows that the developed CF-PMBFFT processor takes a core area of 1.97 mm2 with a power consumption of 62.12 mW for a throughput rate of 528 MS/s.

  • How to Decide Selection Functions for Power Analysis: From the Viewpoint of Hardware Architecture of Block Ciphers

    Daisuke SUZUKI  Minoru SAEKI  Koichi SHIMIZU  Tsutomu MATSUMOTO  

     
    PAPER-Implementation

      Vol:
    E94-A No:1
      Page(s):
    200-210

    In this paper we first demonstrate that effective selection functions in power analysis attacks change depending on circuit architectures of a block cipher. We then conclude that the most resistant architecture on its own, in the case of the loop architecture, has two data registers have separate roles: one for storing the plaintext and ciphertext, and the other for storing intermediate values. There, the pre-whitening operation is placed at the output of the former register. The architecture allows the narrowest range of selection functions and thereby has resistance against ordinary CPA. Thus, we can easily defend against attacks by ordinary CPA at the architectural level, whereas we cannot against DPA. Secondly, we propose a new technique called "self-templates" in order to raise the accuracy of evaluation of DPA-based attacks. Self-templates enable to differentiate meaningful selection functions for DPA-based attacks without any strong assumption as in the template attack. We also present the results of attacks to an AES co-processor on an ASIC and demonstrate the effectiveness of the proposed technique.

  • Design Methodology for Yield Enhancement of Switched-Capacitor Analog Integrated Circuits

    Pei-Wen LUO  Jwu-E CHEN  Chin-Long WEY  

     
    PAPER-VLSI Design Technology and CAD

      Vol:
    E94-A No:1
      Page(s):
    352-361

    Device mismatch plays an important role in the design of accurate analog circuits. The common centroid structure is commonly employed to reduce device mismatches caused by symmetrical layouts and processing gradients. Among the candidate placements generated by the common centroid approach, however, whichever achieves better matching is generally difficult to be determined without performing the time-consuming yield evaluation process. In addition, this rule-based methodology makes it difficult to achieve acceptable matching between multiple capacitors and to handle an irregular layout area. Based on a spatial correlation model, this study proposed a design methodology for yield enhancement of analog circuits using switched-capacitor techniques. An efficient and effective placement generator is developed to derive a placement for a circuit to achieve the highest or near highest correlation coefficient and thus accomplishing a better yield performance. A simple yield analysis is also developed to evaluate the achieved yield performance of a derived placement. Results show that the proposed methodology derives a placement which achieves better yield performance than those generated by the common centroid approach.

  • Analysis Method of Ground Wave Propagation over Land-to-Sea Mixed-Path by Using Helmholtz-Kirchhoff Integral Theorem

    Toru KAWANO  Keiji GOTO  Toyohiko ISHIHARA  

     
    PAPER-Radiation and Propagation

      Vol:
    E94-C No:1
      Page(s):
    10-17

    In this paper, we have derived a novel integral representation for the ground wave propagation over land-to-sea mixed-paths by applying the Helmholtz-Kirchhoff integral theorem. By using the method of stationary phase applicable uniformly as the stationary phase point approaches the endpoint of the integral, we have derived the asymptotic solution for the scattered fields consisting of the first-order and the second-order diffraction terms. We show that the asymptotic solution thus derived agrees with the asymptotic solution derived by applying the aperture field method (AFM) and the method of stationary phase. We have confirmed the validity and the utility of the novel integral representation and its asymptotic solution by comparing with the widely used mixed-path theorem and the experimental measurement performed in Kanto area and Tokyo bay.

  • Generation of Flat Optical Frequency Comb Based on FM Laser Operation of Fiber Ring Laser

    Masaki HIRANO  Ryosuke YOTSUTANI  Akihiro MORIMOTO  

     
    LETTER-Lasers, Quantum Electronics

      Vol:
    E94-C No:1
      Page(s):
    132-133

    We obtained flat optical frequency combs by using the FM laser operation of a fiber ring laser and external intensity modulation. Extremely wide FM spectra can be easily obtained by the moderate internal phase modulation of an FM laser. We used an external intensity modulator to extract a linearly chirped part from the FM light in order to obtain flat spectra. In our experiments, we obtained a flat optical frequency comb with a spectral bandwidth of about 0.5 THz and a power deviation of less than 1.5 dB.

  • A Self-Organizing Pulse-Coupled Network of Sub-Threshold Oscillating Spiking Neurons

    Kai KINOSHITA  Hiroyuki TORIKAI  

     
    PAPER-Nonlinear Problems

      Vol:
    E94-A No:1
      Page(s):
    300-314

    In this paper, an artificial sub-threshold oscillating spiking neuron is presented and its response phenomena to an input spike-train are analyzed. In addition, a dynamic parameter update rule of the neuron for achieving synchronizations to the input spike-train having various spike frequencies is presented. Using an analytical two-dimensional return map, local stability of the parameter update rule is analyzed. Furthermore, a pulse-coupled network of the neurons is presented and its basic self-organizing function is analyzed. Fundamental comparisons are also presented.

7701-7720hit(20498hit)