Joon-Young CHOI Kyungmo KOO Jin Soo LEE
We consider a single-link multi-source network with FAST TCP sources. We adopt a continuous-time dynamic model for FAST TCP sources, and propose a static model to adequately describe the queuing delay dynamics at the link. The proposed model turns out to have a structure that reveals the time-varying network feedback delay, which allows us to analyze FAST TCP with due consideration of the time-varying network feedback delay. Based on the proposed model, we establish sufficient conditions for the boundedness of congestion window of each source and for the global asymptotic stability. The asymptotic stability condition shows that the stability property of each source is affected by all other sources sharing the link. Simulation results illustrate the validity of the sufficient condition for the global asymptotic stability.
Ziyan JIA Katsunobu YOSHII Shiro HANDA Fumihito SASAMORI Shinjiro OSHITA
In this paper, we propose a novel noncoherent maximum likelihood detection (NMLD) method for differential spatial multiplexing (SM) multiple-input multiple-output (MIMO) systems. Unlike the conventional maximum likelihood detection (MLD) method which needs the knowledge of channel state information (CSI) at the receiver, NMLD method has no need of CSI at either the transmitter or receiver. After repartitioning the observation block of multiple-symbol differential detection (MSDD) and following a decision feedback process, the decision metric of NMLD is derived by reforming that of MSDD. Since the maximum Doppler frequency and noise power are included in the derived decision metric, estimations of both maximum Doppler frequency and noise power are needed at the receiver for NMLD. A fast calculation algorithm (FCA) is applied to reduce the computational complexity of NMLD. The feasibility of the proposed NMLD is demonstrated by computer simulations in both slow and fast fading environments. Simulation results show that the proposed NMLD has good bit error rate (BER) performance, approaching that of the conventional coherent MLD with the extension of reference symbols interval. It is also proved that the BER performance is not sensitive to the estimation errors in maximum Doppler frequency and noise power.
A 0.9-V 12-bit 40-MSPS pipeline ADC with I/Q amplifier sharing technique is presented for wireless receivers. To achieve high linearity even at 0.9-V supply, the clock signals to sampling switches are boosted over 0.9 V in conversion stages. The clock-boosting circuit for lifting these clocks is shared between I-ch ADC and Q-ch ADC, reducing the area penalty. Low supply voltage narrows the available output range of the operational amplifier. A pseudo-differential (PD) amplifier with two-gain-stage common-mode feedback (CMFB) is proposed in views of its wide output range and power efficiency. This ADC is fabricated in 90-nm CMOS technology. At 40 MS/s, the measured SNDR is 59.3 dB and the corresponding effective number of bits (ENOB) is 9.6. Until Nyquist frequency, the ENOB is kept over 9.3. The ADC dissipates 17.3 mW/ch, whose performances are suitable for ADCs for mobile wireless systems such as WLAN/WiMAX.
Akimasa HIRATA Yukinori TAKANO Toshihiro NAGAI
The present study proposes a quasi-static finite-difference time-domain (FDTD) method for dosimetry in humans due to contact current at low frequencies (10 kHz). Our attention focused on wave sources which can reduce computational time. The computational time was found to be reduced using a voltage source of a step function with smooth start. The computational time required for the proposed method was smaller than a quasi-static FDTD method proposed in a previous study. Comparison between our computational results and those in a previous study suggested the effectiveness of our proposal. The difference in in-situ electric field due to different human models was a factor of 2 or so.
Yukiyasu TSUNOO Teruo SAITO Maki SHIGERI Takeshi KAWABATA
MISTY1 is a 64-bit block cipher that has provable security against differential and linear cryptanalysis. MISTY1 is one of the algorithms selected in the European NESSIE project, and it has been recommended for Japanese e-Government ciphers by the CRYPTREC project. This paper shows that higher order differential attacks can be successful against 7-round versions of MISTY1 with FL functions. The attack on 7-round MISTY1 can recover a partial subkey with a data complexity of 254.1 and a computational complexity of 2120.8, which signifies the first successful attack on 7-round MISTY1 with no limitation such as a weak key. This paper also evaluates the complexity of this higher order differential attack on MISTY1 in which the key schedule is replaced by a pseudorandom function. It is shown that resistance to the higher order differential attack is not substantially improved even in 7-round MISTY1 in which the key schedule is replaced by a pseudorandom function.
Cong-Nguyen BUI Hae-Yeoun LEE Jeong-Chun JOO Heung-Kyu LEE
A secure method for steganography is proposed. Pixel-value differencing (PVD) steganography and bit-plane complexity segmentation (BPCS) steganography have the weakness of generating blocky effects and noise in smooth areas and being detectable with steganalysis. To overcome these weaknesses, a secure bit-plane based steganography method on the spatial domain is presented, which uses a robust measure to select noisy blocks for embedding messages. A matrix embedding technique is also applied to reduce the change of cover images. Given that the statistical property of cover images is well preserved in stego-images, the proposed method is undetectable by steganalysis that uses RS analysis or histogram-based analysis. The proposed method is compared with the PVD and BPCS steganography methods. Experimental results confirm that the proposed method is secure against potential attacks.
Maki YOSHIDA Shigeo MITSUNARI Toru FUJIWARA
This paper introduces a new computational problem on a two-dimensional vector space, called the vector decomposition problem (VDP), which is mainly defined for designing cryptosystems using pairings on elliptic curves. We first show a relation between the VDP and the computational Diffie-Hellman problem (CDH). Specifically, we present a sufficient condition for the VDP on a two-dimensional vector space to be at least as hard as the CDH on a one-dimensional subspace. We also present a sufficient condition for the VDP with a fixed basis to have a trapdoor. We then give an example of vector spaces which satisfy both sufficient conditions and on which the CDH is assumed to be hard in previous work. In this sense, the intractability of the VDP is a reasonable assumption as that of the CDH.
Naoki OGURA Shigenori UCHIYAMA
In 2007, Ding et al. proposed an attractive scheme, which is called the -Invertible Cycles (IC) scheme. IC is one of the most efficient multivariate public-key cryptosystems (MPKC); these schemes would be suitable for using under limited computational resources. In 2008, an efficient attack against IC using Grobner basis algorithms was proposed by Fouque et al. However, they only estimated the complexity of their attack based on their experimental results. On the other hand, Patarin had proposed an efficient attack against some multivariate public-key cryptosystems. We call this attack Patarin's attack. The complexity of Patarin's attack can be estimated by finding relations corresponding to each scheme. In this paper, we propose an another practical attack against the IC encryption/signature scheme. We estimate the complexity of our attack (not experimentally) by adapting Patarin's attack. The attack can be also applied to the IC- scheme. Moreover, we show some experimental results of a practical attack against the IC/IC- schemes. This is the first implementation of both our proposed attack and an attack based on Grobner basis algorithm for the even case, that is, a parameter is even.
Junko TAKAHASHI Toshinori FUKUNAGA
This paper describes a differential fault analysis (DFA) attack against CLEFIA. The proposed attack can be applied to CLEFIA with all supported keys: 128, 192, and 256-bit keys. DFA is a type of side-channel attack. This attack enables the recovery of secret keys by injecting faults into a secure device during its computation of the cryptographic algorithm and comparing the correct ciphertext with the faulty one. CLEFIA is a 128-bit blockcipher with 128, 192, and 256-bit keys developed by the Sony Corporation in 2007. CLEFIA employs a generalized Feistel structure with four data lines. We developed a new attack method that uses this characteristic structure of the CLEFIA algorithm. On the basis of the proposed attack, only 2 pairs of correct and faulty ciphertexts are needed to retrieve the 128-bit key, and 10.78 pairs on average are needed to retrieve the 192 and 256-bit keys. The proposed attack is more efficient than any previously reported. In order to verify the proposed attack and estimate the calculation time to recover the secret key, we conducted an attack simulation using a PC. The simulation results show that we can obtain each secret key within three minutes on average. This result shows that we can obtain the entire key within a feasible computational time.
Ziyan JIA Shiro HANDA Fumihito SASAMORI Shinjiro OSHITA
In this paper, multiple-symbol differential detection (MSDD) is applied to the differential unitary space-time-frequency coding (DUSTFC) scheme over frequency selective fading multiple-input multiple-output (MIMO) channels. The motivation of applying MSDD is to compensate for the performance loss of conventional (two-symbol observation) differential detection comparing with coherent detection, by extending the observation interval and considering the fading autocorrelations. Since the differential coding of DUSTFC can be performed in time or frequency domain, both the time-domain and frequency-domain MSDD are investigated. After calculating the frequency-domain fading autocorrelation, the decision metrics of MSDD considering appropriate fading autocorrelations are derived in time and frequency domain respectively. Bit error rate (BER) performances of the two kinds of MSDD are analyzed by computer simulations. Simulation results demonstrate that a considerable performance gain can be got by applying MSDD in both cases, and the transmit diversity gain can also be enhanced by applying MSDD. So that it is proved that full advantage of transmit diversity with DUSTFC can be taken by applying MSDD.
A generalized formulation of the instantaneous frequency based on the symmetric higher order differential energy operator is proposed. The motivation for the formulation is that there is some frequency misalignment in time when the ordinary higher order differential energy operator is used for the instantaneous frequency estimator. The special cases of the generalized formulation are also presented. The proposed instantaneous frequency estimators are compared with existing methods in terms of error performance measured in the mean absolute error. In terms of the estimation error performance, the third order instantaneous frequency estimator with the symmetrical structure shows the best result under noise free condition. Under noisy situation, the fourth order instantaneous frequency estimator with the symmetrical structure produces the best results. Application examples are provided to show the usefulness of the estimator.
Meiling ZHANG Weiguo ZHANG Jingmei LIU Xinmei WANG
Impossible differential attack (IDA) uses impossible differential characteristics extracted from enough plaintext pairs to retrieve subkeys of the first and the last several rounds of AES. In this paper, a general IDA on 7-round AES is proposed. Such attack takes the number of all-zero columns of the 7th and the 6th round as parameters (α,β). And a trade-off relation between the number of plaintexts and times of encryptions in the process of the attack is derived, which makes only some values of (α,β) allowed in the attack for different key length.
Jun-Hyun BAE Sang-Hune PARK Jae-Yoon SIM Hong-June PARK
A digital 3 Gbps 0.2 V differential transmitter is proposed using a voltage-mode pseudo-LVDS output driver. The delay mismatch between two pre-drivers is digitally calibrated by a modified digital DLL with the duty cycle correction. The height and width of eye opening are improved by 103% and 46%, respectively. The power consumption is 11.4 mW at 1.2 V with 0.18 µm process.
This paper studies scattering and diffraction of a TE plane wave from a periodic surface with semi-infinite extent. By use of a combination of the Wiener-Hopf technique and a perturbation method, a concrete representation of the wavefield is explicitly obtained in terms of a sum of two types of Fourier integrals. It is then found that effects of surface roughness mainly appear on the illuminated side, but weakly on the shadow side. Moreover, ripples on the angular distribution of the first-order scattering in the shadow side are newly found as interference between a cylindrical wave radiated from the edge and an inhomogeneous plane wave supported by the periodic surface.
Chee-Hyun PARK Kwang-Seok HONG
This letter proposes a new adaptive filtering method that uses the last L desired signal samples as an extra input vector, besides the existing input data, to reduce mean square error. We have improved the convergence rate by adopting the squared norm of the past error samples, in addition to the modified cost function. The modified variable error-data normalized step-size least mean square algorithm provides fast convergence, ensuring a small final misadjustment. Simulation results indicate its superior mean square error performance, while its convergence rate equals that of existing methods. In addition, the proposed algorithm shows superior tracking capability when the system is subjected to an abrupt disturbance.
Ren SAKATA Tazuko TOMIOKA Takahiro KOBAYASHI
When cognitive radio (CR) systems dynamically use the frequency band, a control signal is necessary to indicate which carrier frequencies are currently available in the network. In order to keep efficient spectrum utilization, this control signal also should be transmitted based on the channel conditions. If transmitters dynamically select carrier frequencies, receivers have to receive control signals without knowledge of their carrier frequencies. To enable such transmission and reception, this paper proposes a novel scheme called DCPT (Differential Code Parallel Transmission). With DCPT, receivers can receive low-rate information with no knowledge of the carrier frequencies. The transmitter transmits two signals whose carrier frequencies are spaced by a predefined value. The absolute values of the carrier frequencies can be varied. When the receiver acquires the DCPT signal, it multiplies the signal by a frequency-shifted version of the signal; this yields a DC component that represents the data signal which is then demodulated. The performance was evaluated by means of numerical analysis and computer simulation. We confirmed that DCPT operates successfully even under severe interference if its parameters are appropriately configured.
OFDM (Orthogonal Frequency Division Multiplexing) is widely used in wideband wireless communication systems due to its excellent performance. One of the most important operations in OFDM receivers is preamble detection. This paper addresses a general form of extended differential detection methods, which is a combination of differential detection and a moving average filter. This paper also presents a filter size determination method that achieves satisfactory performance in various channel environments.
Chee-Hyun PARK Kwang-Seok HONG
Estimating a location of mobile phones or sound source is of considerable interest in wireless communications and signal processing. In this letter, we propose squared range weighted least squares (SRWLS) using the range estimate attained from the Taylor series-based maximum likelihood. The weight can be determined more accurately when using the proposed method, compared with the existing methods using the variance of noise. The simulation results show that the proposed method is superior to the existing methods in RMSE as the measurement noise amount of sensors increases.
Tomoyuki KOGANEZAWA Ichiro HIROSAWA Hidenori ISHII Takahiro SAKAI
We developed a new method for characterizing molecular distribution in very thin liquid crystal layer (5-40 nm) evaporated onto rubbed polyimide film used by grazing-incidence X-ray diffraction (GIXD). The diffraction peaks corresponding to intermolecular correlation perpendicular to longitudinal axis of liquid crystal molecule and the clear anisotropic distribution of liquid crystal molecules in a thin layer were successfully observed. We found that in the vicinity of the alignment film, the intermolecular spacing correlation perpendicular to longitudinal axis of the 5CB molecule was expanded by the alignment film, and that the ordering of the 5CB was not so high. As the distance from the alignment film the spacing came close to the intrinsic intermolecular spacing.
Byung-Tae CHOI Hyung Dal PARK Heung-Sik TAE
To explain the variation of the address discharge during an address period, the wall voltage variation during an address period was investigated as a function of the address-on-time by using the Vt closed curves. It was observed that the wall voltage between the scan and address electrodes was decreased with an increase in the address-on-time. It was also observed that the wall voltage variation during an address period strongly depended on the voltage difference between the scan and address electrodes. Based on this result, the modified driving waveform to raise the level of Vscanw, was proposed to minimize the voltage difference between the scan and address electrodes. However, the modified driving waveform resulted in the increase in the falling time of scan pulse. Finally, the overlapped double scan waveform was proposed to reduce a falling time of scan pulse under the raised voltage level of Vscanw, also.