In this letter we propose a new mode for block ciphers which uses an unknown random block as feedback. We show that the successful differential/linear cryptanalyses of DES under the mode require at least the complexity of the exhaustive key search. We also present the processing overhead of our scheme compared to that of ECB mode.
Mingya LIU Shiro HANDA Masanobu MACHIDA Shinjiro OSHITA
We propose a novel adaptive multiple-symbol differential detection (MSDD) scheme that has excellent performance over frequency selective fading (FSF) channels. The adaptive MSDD scheme consists of an adaptive noncoherent least mean square channel estimator that can accomplish channel estimation without any decision delay and the MSDD. The M-algorithm is introduced into this detection scheme to reduce the complication of computation due to increasing observed sequence length in the MSDD. Because of the application of the adaptive channel estimator and the M-algorithm, this adaptive MSDD make it possible that channel estimation is accomplished for every symbol along M surviving paths without any decision delay. And the SER performance of this adaptive MSDD is not affected by phase fluctuation introduced by a channel because the MSDD and the noncoherent channel estimator are applied. The adaptive MSDD scheme is applied to typical constellation of 16APSK, the (4,12) QAM and the star QAM. The excellent tracking performance of this adaptive MSDD scheme over FSF channels is confirmed by computer simulations.
In many of machine learning problems, it is essential to use not only the training data, but also a priori knowledge about how the world is constrained. In many cases, such knowledge is given in the forms of constraints on differential data or more specifically partial differential equations (PDEs). Neural networks with capabilities to learn differential data can take advantage of such knowledge and easily incorporate such constraints into the learning of training value data. In this paper, we report a structure, an algorithm, and results of experiments on neural networks learing differential data.
On the Internet, a Quality of Service (QoS) guaranteed services are increasingly being demanded, and the Internet Engineering Task Force (IETF) is developing the specification documents for the QoS services intensively. This overview details the technical rationales underlining the contents of the specification documents developed by the IETF for Differentiated Services (DiffServ)--to provide QoS guarantee services in the large IP networks-- and Policy Framework--to manage DiffServ compliant networks. The IP networks with DiffServ consist of boundary routers and interior routers. These routers are composed of packet classifiers and marker, shaper, and policing function. Many vendors have developed DiffServ-compliant routers with gigabit interfaces. An example of an implementation of a DiffServ-compliant router and a demonstration of a QoS service using this router are presented here. The Policy Framework is expected to be one of the promising management solutions to co-operate with and manage many DiffServ-compliant routers. An experiment that adopts the Policy Framework to a DiffServ compliant network is also outlined.
Shohei YANO Haruhide HOKARI Shoji SHIMADA
Out-of-head sound localization achieved via binaural earphones is indispensable for a virtual sound system. It is necessary to measure the two transfer functions of each subject, Spatial Sound Transfer Function (SSTF) and Ear Canal Transfer Function (ECTF), for achieving sound localization. It is well known that the quality of sound localization may be poor if the individual transfer functions are not accurately reproduced. This is because each subject has his/her own transfer functions. It is very important to clarify which function includes more individual information, SSTF or ECTF, in order to implement a simpler model. Therefore, we introduce the quantity of "Personal differences" for investigating the subject's transfer functions included in SSTF and ECTF. We measure the transfer functions SSTF and ECTF of 60 subjects in a soundproofed room, and analysis of the data using Principal Component Analysis (PCA) and three subjective assessment tests. This study finds that ECTF differs more widely from person to person than SSTF.
Youki KADOBAYASHI Shinji SHIMOJO
The increasing diversity in Internet applications necessitates extended Internet architecture that can differentiate forwarding treatment of different types of flows. Diffserv can be a solution to the problem when it is augmented by several additional components. In this paper we describe various issues and possible directions in augmenting Diffserv. We present our analysis of Diffserv architecture, anticipated developments to augment Diffserv architecture, and potential applications of Diffserv.
Kenji SATO Mikio HANAFUSA Akira NODA Atsutoshi ARAKAWA Toshiaki ASAHI Masayuki UCHIDA Osamu ODA
Pure green ZnTe light-emitting diodes (LEDs) were first realized reproducibly based on high quality ZnTe substrates and a simple thermal diffusion process. This success which overcomes the compensation effect in II-VI materials is due to the use of high quality p-type ZnTe single crystals with low dislocation densities of the level of 2000 cm-2 grown by the vertical gradient freezing (VGF) method and the suppression of as compensating point defects by low temperature annealing with covering the surface of the substrates by the deposition of n-type dopant, Al. The thermal diffusion coefficient and the activation energy of Al were determined from the pn interface observed by scanning electron spectroscopy (SEM). The formation of the intrinsic pn junctions was confirmed from the electron-beam induced current (EBIC) observation and I-V measurement. The bright 550 nm electroluminescence (EL) from these pn-junctions was reproducibly observed under room light at room temperature, with the lifetime exceeding 1000 hrs.
Taishi YAHARA Ryutaro KAWAMURA Satoru OHTA
This paper proposes a new self-healing scheme that differentiates the bandwidth requirement for each network service on ATM networks. First, we show the necessity of our proposed scheme. In the future network, we must satisfy two demands, rapid restoration from failure and differentiated bandwidth requirements. The conventional restoration scheme, called the self-healing scheme, realizes rapid restoration, but does not support bandwidth differentiation; the new self-healing scheme proposed herein does. We also show that the proposed scheme reduces the spare resources required for backup. The scheme can be realized as a simple extension of the conventional self-healing scheme. Finally, simulations show that the proposed scheme requires fewer spare resources while offering comparable restoration time to the conventional approach against any demand pattern.
The features of the method of moment (MoM) and the finite difference time domain (FDTD) method for numerical analysis of the electromagnetic scattering problem are presented. First, the integral equations for the conducting wire, conducting plane and the dielectric materials are described. Importance to ensure the condition of the continuity of the current of the scatterers is emphasized and numerical examples for a conducting structure involving a junction of wire segment and planar segment is presented. Finally, the advantages and the disadvantages of the FDTD method are discussed.
The mathematical theory of bicomplex electromagnetic waves in two-dimensional scattering and diffraction problems is developed. The Vekua's integral expression for the two-dimensional fields valid only in the closed source-free region is generalized into the radiating field. The boundary-value problems for scattering and diffraction are formulated in the bicomplex space. The complex function of a single variable, which obeys the Cauchy-Riemann relations and thus expresses low-frequency aspects of the near field at a wedge of the scatterer, is connected with the radiating field by an integral operator having a suitable kernel. The behaviors of this complex function in the whole space are discussed together with those of the far-zone field or the amplitude of angular spectrum. The Hilbert's factorization scheme is used to find out a linear transformation from the far-zone field to the bicomplex-valued function of a single variable. This transformation is shown to be unique. The new integral expression for the field scattered by a thin metallic strip is also obtained.
Shouli YAN Edgar SANCHEZ-SINENCIO
Low voltage (LV) analog circuit design techniques are addressed in this tutorial. In particular, (i) technology considerations; (ii) transistor model capable to provide performance and power tradeoffs; (iii) low voltage implementation techniques capable to reduce the power supply requirements, such as bulk-driven, floating-gate, and self-cascode MOSFETs; (iv) basic LV building blocks; (v) multi-stage frequency compensation topologies; and (vi) fully-differential and fully-balanced systems.
Huen-Tae HA Jung-Woong RA Se-Yun KIM
Diffraction pattern functions of an E-polarized scattering by a wedge composed of perfectly conducting metal and lossless dielectric with arbitrary permittivity are analyzed by applying an improved physical optics approximation and its correction. The correction terms are expressed into a complete expansion of the Neumann's series, of which coefficients are calculated numerically to satisfy the null-field condition in the complementary region.
Interpolation attack was presented by Jakobsen and Knudsen at FSE'97. Interpolation attack is effective against ciphers that have a certain algebraic structure like the PURE cipher which is a prototype cipher, but it is difficult to apply the attack to real-world ciphers. This difficulty is due to the difficulty of deriving a low degree polynomial relation between ciphertexts and plaintexts. In other words, it is difficult to evaluate the security against interpolation attack. This paper generalizes the interpolation attack. The generalization makes easier to evaluate the security against interpolation attack. We call the generalized interpolation attack linear sum attack. We present an algorithm that evaluates the security of byte-oriented ciphers against linear sum attack. Moreover, we show the relationship between linear sum attack and higher order differential attack. In addition, we show the security of CRYPTON, E2, and RIJNDAEL against linear sum attack using the algorithm.
Ishtiaq Rasool KHAN Ryoji OHBA
The explicit formula for the coefficients of maximally linear digital differentiators is derived by the use of Taylor series. A modification in the formula is proposed to extend the effective passband of the differentiator with the same number of coefficients.
Hiroaki MIYASHITA Isamu CHIBA Shuji URASAKI Shoichiro FUKAO
Simple approximate formulas are obtained for the mutual impedance and admittance by using a product of radiation patterns of antennas. The formulas come from a stationary expression of the reaction integral between two antennas where far-field approximations are employed. The theory deals with antennas in free space as well as under the presence of a wedge. Two applications are given for microstrip antennas with experimental verifications.
Masayuki YAMAUCHI Masahiro WADA Yoshifumi NISHIO Akio USHIDA
In this study, wave propagation phenomena of phase states are observed at van der Pol oscillators coupled by inductors as a ladder. For the case of 17 oscillators, interesting wave propagation phenomena of phase states are found. By using the relationship between phase states and oscillation frequencies, the mechanisms of the propagation and the reflection of wave are explained. Circuit experimental results agree well with computer calculated results qualitatively.
Ken'ichi KAWANISHI Yoshitaka TAKAHASHI Toyofumi TAKENAKA
We propose a traffic measurement system which uses trap and polling methods. To obtain its performance we consider a queueing model with a single server and evaluate a packet delay. In our multi-cast traffic, packets are modeled as a batch with a batch size distribution {gk}. The batch arrival process is observed as two processes on the basis of batch size. For a batch whose size is more than or equal to a threshold L, the batch will be trapped by our traffic measurement system (in queueing model, it will enter a queue immediately after its arrival). For a batch whose size is less than L, it will be observed at a polling cycle T (in queueing model, it will be temporarily stored in a buffer and all these small batches will be cyclically noticed with a cycle T). We analyze this queueing model by a diffusion approximation and compare the packet delay observed by our traffic measurement system with the L=1 original batch arrival model. Evaluating the results of the diffusion approximation, we illustrate that our traffic measurement system has functions not only to give an accurate estimation of the mean waiting time but also reduce the number of measurements by choosing appropriate parameters L and T.
Masahiko HIRATSUKA Takafumi AOKI Tatsuo HIGUCHI
This paper explores a possibility of constructing massively parallel molecular computing systems using molecular electronic devices called enzyme transistors. The enzyme transistor is, in a sense, an artificial catalyst which selects a specific substrate molecule and transforms it into a specific product. Using this primitive function, various active continuous media for signal transfer/processing can be realized. Prominent examples discussed in this paper are: (i) Turing pattern formation and (ii) excitable wave propagation in a two-dimensional enzyme transistor array. This paper demonstrates the potential of enzyme transistors for creating reaction-diffusion dynamics that performs useful computations in a massively parallel fashion.
Takeshi SHIMOYAMA Shiho MORIAI Toshinobu KANEKO Shigeo TSUJII
Since the proposal of differential cryptanalysis and linear cryptanalysis in 1991 and 1993, respectively, the resistance to these cryptanalysis has been studied. In FSE2, Knudsen proposed a method of attacking block ciphers that used the higher order differential, and in FSE4, Jakobsen and Knudsen applied it to a cipher proposed by Nyberg and Knudsen. Their approach, however, requires large complexity of running time. In this paper, we improve this attack and show that our improved algorithm requires much fewer chosen texts and much less complexity than those of previous works.
Yasuo TACHIBANA Yoshinori SUZUKI
This paper deals with a method of estimating the parameters and the order of a linear system using differential digital filters and the resultant. From the observed signals of the input and output of an objective system, we extract the differential signals from the zero order to an appropriate high order with the same phase characteristics, using several digital filters. On the assumption that the system order is known, we estimate the parameters of the transfer function and evaluate the estimation error bounds. We propose a criterion function generated by the product of the highest order coefficients and the resultant of the numerator and denominator of the estimated transfer function. Applying this criterion function, we can estimate the order of the objective system. The threshold corresponding to this criterion function is evaluated from the deviation in the frequency characteristics of the used differential filters and the error bound of the estimated parameters. In order to demonstrate the propriety of the proposed method, some numerical simulations are presented.