-
-
[分享]Special Section on Cryptography and Information Security
-
发表于: 2010-3-2 01:34 5600
-
Archive Index
Online ISSN : 1745-1337
Volume E93-A No.1 (Publication Date:2010/01/01)
RSS Feed(Latest Issue) >> Learn more
Special Section on Cryptography and Information Security
--------------------------------------------------------------------------------
pp.1-2 FOREWORD
FOREWORD
Kazuo TAKARAGI
Summary | Full Text:PDF (62.9KB)
--------------------------------------------------------------------------------
pp.3-12 PAPER-Symmetric Cryptography
Compact Architecture for ASIC Implementation of the MISTY1 Block Cipher
Dai YAMAMOTO Jun YAJIMA Kouichi ITOH
Summary | Full Text:PDF (589.2KB)
--------------------------------------------------------------------------------
pp.13-21 PAPER-Symmetric Cryptography
Tweakable Pseudorandom Permutation from Generalized Feistel Structure
Atsushi MITSUDA Tetsu IWATA
Summary | Full Text:PDF (496.6KB)
--------------------------------------------------------------------------------
pp.22-33 PAPER-Public Key Cryptography
Chosen Ciphertext Security with Optimal Ciphertext Overhead
Masayuki ABE Eike KILTZ Tatsuaki OKAMOTO
Summary | Full Text:PDF (258.5KB)
--------------------------------------------------------------------------------
pp.34-41 PAPER-Public Key Cryptography
On Patarin's Attack against the IC Scheme
Naoki OGURA Shigenori UCHIYAMA
Summary | Full Text:PDF (174.3KB)
--------------------------------------------------------------------------------
pp.42-49 PAPER-Public Key Cryptography
A Rational Secret-Sharing Scheme Based on RSA-OAEP
Toshiyuki ISSHIKI Koichiro WADA Keisuke TANAKA
Summary | Full Text:PDF (200.4KB)
--------------------------------------------------------------------------------
pp.50-62 PAPER-Digital Signature
Revocable Group Signature Schemes with Constant Costs for Signing and Verifying
Toru NAKANISHI Hiroki FUJII Yuta HIRA Nobuo FUNABIKI
Summary | Full Text:PDF (284.7KB)
--------------------------------------------------------------------------------
pp.63-75 PAPER-Digital Signature
New RSA-Based (Selectively) Convertible Undeniable Signature Schemes
Le Trieu PHONG Kaoru KUROSAWA Wakaha OGATA
Summary | Full Text:PDF (283.3KB)
--------------------------------------------------------------------------------
pp.76-83 PAPER-Hash Function
Merkle-Damgård Hash Functions with Split Padding
Kan YASUDA
Summary | Full Text:PDF (414.4KB)
--------------------------------------------------------------------------------
pp.84-92 PAPER-Hash Function
Practical Password Recovery Attacks on MD4 Based Prefix and Hybrid Authentication Protocols
Yu SASAKI Lei WANG Kazuo OHTA Kazumaro AOKI Noboru KUNIHIRO
Summary | Full Text:PDF (338.4KB)
--------------------------------------------------------------------------------
pp.93-101 PAPER-Hash Function
MPP Characteristics of Variants of Merkle-Damgård Iterated Hash Functions
Shungo NAKAMURA Tetsu IWATA
Summary | Full Text:PDF (197.1KB)
--------------------------------------------------------------------------------
pp.102-115 PAPER-Secure Protocol
Anonymous Password-Authenticated Key Exchange: New Construction and Its Extensions
SeongHan SHIN Kazukuni KOBARA Hideki IMAI
Summary | Full Text:PDF (451.2KB)
--------------------------------------------------------------------------------
pp.116-125 PAPER-Secure Protocol
Dual-Policy Attribute Based Encryption: Simultaneous Access Control with Ciphertext and Key Policies
Nuttapong ATTRAPADUNG Hideki IMAI
Summary | Full Text:PDF (229.3KB)
--------------------------------------------------------------------------------
pp.126-135 PAPER-Secure Protocol
Efficient Almost Secure 1-Round Message Transmission Schemes for 3t+1 Channels
Toshinori ARAKI Wakaha OGATA
Summary | Full Text:PDF (205.2KB)
--------------------------------------------------------------------------------
pp.136-143 PAPER-Cryptanalysis
Differential Fault Analysis on CLEFIA with 128, 192, and 256-Bit Keys
Junko TAKAHASHI Toshinori FUKUNAGA
Summary | Full Text:PDF (280.4KB)
--------------------------------------------------------------------------------
pp.144-152 PAPER-Cryptanalysis
Security Analysis of 7-Round MISTY1 against Higher Order Differential Attacks
Yukiyasu TSUNOO Teruo SAITO Maki SHIGERI Takeshi KAWABATA
Summary | Full Text:PDF (321.4KB)
--------------------------------------------------------------------------------
pp.153-163 PAPER-Cryptanalysis
Countermeasures against Power Analysis Attacks for the NTRU Public Key Cryptosystem
Mun-Kyu LEE Jeong Eun SONG Dooho CHOI Dong-Guk HAN
Summary | Full Text:PDF (624.4KB)
--------------------------------------------------------------------------------
pp.164-171 PAPER-Cryptanalysis
Fast WEP-Key Recovery Attack Using Only Encrypted IP Packets
Ryoichi TERAMURA Yasuo ASAKURA Toshihiro OHIGASHI Hidenori KUWAKADO Masakatu MORII
Summary | Full Text:PDF (831.1KB)
--------------------------------------------------------------------------------
pp.172-179 PAPER-Cryptanalysis
On Clock-Based Fault Analysis Attack for an AES Hardware Using RSL
Kazuo SAKIYAMA Kazuo OHTA
Summary | Full Text:PDF (433.7KB)
--------------------------------------------------------------------------------
pp.180-187 PAPER-Mathematics
Recursive Double-Size Modular Multiplications from Euclidean and Montgomery Multipliers
Masayuki YOSHINO Katsuyuki OKEYA Camille VUILLAUME
Summary | Full Text:PDF (233.7KB)
--------------------------------------------------------------------------------
pp.188-193 PAPER-Mathematics
The Vector Decomposition Problem
Maki YOSHIDA Shigeo MITSUNARI Toru FUJIWARA
Summary | Full Text:PDF (189.9KB)
--------------------------------------------------------------------------------
pp.194-201 PAPER-Application
A Cryptographic SoC for Robust Protection of Secret Keys in IPTV DRM Systems
Sanghan LEE Hae-Yong YANG Yongjin YEOM Jongsik PARK
Summary | Full Text:PDF (785.6KB)
--------------------------------------------------------------------------------
pp.202-209 PAPER-Application
High-Speed Passphrase Search System for PGP
Koichi SHIMIZU Daisuke SUZUKI Toyohiro TSURUMARU
Summary | Full Text:PDF (598.5KB)
--------------------------------------------------------------------------------
pp.210-218 PAPER-Application
Multi-Pass Malware Sandbox Analysis with Controlled Internet Connection
Katsunari YOSHIOKA Tsutomu MATSUMOTO
Summary | Full Text:PDF (1.1MB)
--------------------------------------------------------------------------------
Regular Section
--------------------------------------------------------------------------------
pp.219-226 PAPER-Ultrasonics
Ultrasonic Imaging for Boundary Shape Generation by Phase Unwrapping with Singular-Point Elimination Based on Complex-Valued Markov Random Field Model
Tomohiro NISHINO Ryo YAMAKI Akira HIROSE
Summary | Full Text:PDF (1.7MB)
--------------------------------------------------------------------------------
pp.227-232 PAPER-Digital Signal Processing
An Instantaneous Frequency Estimator Based on the Symmetric Higher Order Differential Energy Operator
Byeong-Gwan IEM
Summary | Full Text:PDF (231.3KB)
--------------------------------------------------------------------------------
pp.233-242 PAPER-Digital Signal Processing
A Variable Step-Size Proportionate NLMS Algorithm for Identification of Sparse Impulse Response
Ligang LIU Masahiro FUKUMOTO Sachio SAIKI Shiyong ZHANG
Summary | Full Text:PDF (1MB)
--------------------------------------------------------------------------------
pp.243-253 PAPER-Digital Signal Processing
A Novel Filter Dependent CFR Scheme with Waterfilling Based Code Domain Compensation
Hyung Min CHANG Won Cheol LEE
Summary | Full Text:PDF (958.7KB)
--------------------------------------------------------------------------------
pp.254-260 PAPER-Digital Signal Processing
A Low Complexity Noise Suppressor with Hybrid Filterbanks and Adaptive Time-Frequency Tiling
Osamu SHIMADA Akihiko SUGIYAMA Toshiyuki NOMURA
Summary | Full Text:PDF (536.6KB)
--------------------------------------------------------------------------------
pp.261-271 PAPER-Digital Signal Processing
A Single-Chip Speech Dialogue Module and Its Evaluation on a Personal Robot, PaPeRo-Mini
Miki SATO Toru IWASAWA Akihiko SUGIYAMA Toshihiro NISHIZAWA Yosuke TAKANO
Summary | Full Text:PDF (1MB)
--------------------------------------------------------------------------------
pp.272-280 PAPER-Systems and Control
A New Prediction Algorithm for Embedded Real-Time Applications
Luis GRACIA Carlos PEREZ-VIDAL
Summary | Full Text:PDF (1.1MB)
--------------------------------------------------------------------------------
pp.281-290 PAPER-Nonlinear Problems
Circuit Design Optimization Using Genetic Algorithm with Parameterized Uniform Crossover
Zhiguo BAO Takahiro WATANABE
Summary | Full Text:PDF (612.9KB)
--------------------------------------------------------------------------------
pp.291-301 PAPER-Nonlinear Problems
Global Nonlinear Optimization Based on Wave Function and Wave Coefficient Equation
Hideki SATOH
Summary | Full Text:PDF (628.9KB)
--------------------------------------------------------------------------------
pp.302-308 PAPER-Cryptography and Information Security
On the Linear Complexity of Generalized Cyclotomic Binary Sequences with Length 2p2
Jingwei ZHANG Chang-An ZHAO Xiao MA
Summary | Full Text:PDF (185.1KB)
--------------------------------------------------------------------------------
pp.309-315 PAPER-Coding Theory
New Quaternary Sequences with Even Period and Three-Valued Autocorrelation
Jin-Ho CHUNG Yun Kyoung HAN Kyeongcheol YANG
Summary | Full Text:PDF (163KB)
--------------------------------------------------------------------------------
pp.316-319 LETTER-Speech and Hearing
Discriminative Weight Training for Support Vector Machine-Based Speech/Music Classification in 3GPP2 SMV Codec
Sang-Kyun KIM Joon-Hyuk CHANG
Summary | Full Text:PDF (128.5KB)
--------------------------------------------------------------------------------
pp.320-323 LETTER-Digital Signal Processing
Harmonic Components Based Post-Filter Design for Residual Echo Suppression
Minwoo LEE Yoonjae LEE Kihyeon KIM Hanseok KO
Summary | Full Text:PDF (118.4KB)
--------------------------------------------------------------------------------
pp.324-326 LETTER-VLSI Design Technology and CAD
CSD-Based Programmable Multiplier Design for Predetermined Coefficient Groups
Yong-Eun KIM Kyung-Ju CHO Jin-Gyun CHUNG Xinming HUANG
Summary | Full Text:PDF (312.7KB)
--------------------------------------------------------------------------------
pp.327-330 LETTER-Cryptography and Information Security
General Impossible Differential Attack on 7-Round AES
Meiling ZHANG Weiguo ZHANG Jingmei LIU Xinmei WANG
Summary | Full Text:PDF (351KB)
--------------------------------------------------------------------------------
pp.331-335 LETTER-Cryptography and Information Security
DWT-Based High Capacity Audio Watermarking
Mehdi FALLAHPOUR David MEGIAS
Summary | Full Text:PDF (541.1KB)
--------------------------------------------------------------------------------
pp.336-338 LETTER-Coding Theory
The Extended FDH Sequences
WenPing MA YeFeng HE Shaohui SUN
Summary | Full Text:PDF (64.2KB)
--------------------------------------------------------------------------------
pp.339-343 LETTER-Communication Theory and Signals
Blind Channel Estimation for SIMO-OFDM Systems without Cyclic Prefix
Shih-Hao FANG Ju-Ya CHEN Ming-Der SHIEH Jing-Shiun LIN
Summary | Full Text:PDF (184.8KB)
--------------------------------------------------------------------------------
pp.344-347 LETTER-Mobile Information Network and Personal Communications
Stochastic Congestion Control in Wireless Sensor Networks
Hyung Seok KIM Seok LEE Namhoon KIM
Summary | Full Text:PDF (146.5KB)
--------------------------------------------------------------------------------
pp.348-353 LETTER-Image
Improvement of Ringing Artifact Reduction Using a K-Means Method for Color Moving Pictures
Wonwoo JANG Hagyong HAN Wontae CHOI Gidong LEE Bongsoon KANG
Summary | Full Text:PDF (801.4KB)
Online ISSN : 1745-1337
Volume E93-A No.1 (Publication Date:2010/01/01)
RSS Feed(Latest Issue) >> Learn more
Special Section on Cryptography and Information Security
--------------------------------------------------------------------------------
pp.1-2 FOREWORD
FOREWORD
Kazuo TAKARAGI
Summary | Full Text:PDF (62.9KB)
--------------------------------------------------------------------------------
pp.3-12 PAPER-Symmetric Cryptography
Compact Architecture for ASIC Implementation of the MISTY1 Block Cipher
Dai YAMAMOTO Jun YAJIMA Kouichi ITOH
Summary | Full Text:PDF (589.2KB)
--------------------------------------------------------------------------------
pp.13-21 PAPER-Symmetric Cryptography
Tweakable Pseudorandom Permutation from Generalized Feistel Structure
Atsushi MITSUDA Tetsu IWATA
Summary | Full Text:PDF (496.6KB)
--------------------------------------------------------------------------------
pp.22-33 PAPER-Public Key Cryptography
Chosen Ciphertext Security with Optimal Ciphertext Overhead
Masayuki ABE Eike KILTZ Tatsuaki OKAMOTO
Summary | Full Text:PDF (258.5KB)
--------------------------------------------------------------------------------
pp.34-41 PAPER-Public Key Cryptography
On Patarin's Attack against the IC Scheme
Naoki OGURA Shigenori UCHIYAMA
Summary | Full Text:PDF (174.3KB)
--------------------------------------------------------------------------------
pp.42-49 PAPER-Public Key Cryptography
A Rational Secret-Sharing Scheme Based on RSA-OAEP
Toshiyuki ISSHIKI Koichiro WADA Keisuke TANAKA
Summary | Full Text:PDF (200.4KB)
--------------------------------------------------------------------------------
pp.50-62 PAPER-Digital Signature
Revocable Group Signature Schemes with Constant Costs for Signing and Verifying
Toru NAKANISHI Hiroki FUJII Yuta HIRA Nobuo FUNABIKI
Summary | Full Text:PDF (284.7KB)
--------------------------------------------------------------------------------
pp.63-75 PAPER-Digital Signature
New RSA-Based (Selectively) Convertible Undeniable Signature Schemes
Le Trieu PHONG Kaoru KUROSAWA Wakaha OGATA
Summary | Full Text:PDF (283.3KB)
--------------------------------------------------------------------------------
pp.76-83 PAPER-Hash Function
Merkle-Damgård Hash Functions with Split Padding
Kan YASUDA
Summary | Full Text:PDF (414.4KB)
--------------------------------------------------------------------------------
pp.84-92 PAPER-Hash Function
Practical Password Recovery Attacks on MD4 Based Prefix and Hybrid Authentication Protocols
Yu SASAKI Lei WANG Kazuo OHTA Kazumaro AOKI Noboru KUNIHIRO
Summary | Full Text:PDF (338.4KB)
--------------------------------------------------------------------------------
pp.93-101 PAPER-Hash Function
MPP Characteristics of Variants of Merkle-Damgård Iterated Hash Functions
Shungo NAKAMURA Tetsu IWATA
Summary | Full Text:PDF (197.1KB)
--------------------------------------------------------------------------------
pp.102-115 PAPER-Secure Protocol
Anonymous Password-Authenticated Key Exchange: New Construction and Its Extensions
SeongHan SHIN Kazukuni KOBARA Hideki IMAI
Summary | Full Text:PDF (451.2KB)
--------------------------------------------------------------------------------
pp.116-125 PAPER-Secure Protocol
Dual-Policy Attribute Based Encryption: Simultaneous Access Control with Ciphertext and Key Policies
Nuttapong ATTRAPADUNG Hideki IMAI
Summary | Full Text:PDF (229.3KB)
--------------------------------------------------------------------------------
pp.126-135 PAPER-Secure Protocol
Efficient Almost Secure 1-Round Message Transmission Schemes for 3t+1 Channels
Toshinori ARAKI Wakaha OGATA
Summary | Full Text:PDF (205.2KB)
--------------------------------------------------------------------------------
pp.136-143 PAPER-Cryptanalysis
Differential Fault Analysis on CLEFIA with 128, 192, and 256-Bit Keys
Junko TAKAHASHI Toshinori FUKUNAGA
Summary | Full Text:PDF (280.4KB)
--------------------------------------------------------------------------------
pp.144-152 PAPER-Cryptanalysis
Security Analysis of 7-Round MISTY1 against Higher Order Differential Attacks
Yukiyasu TSUNOO Teruo SAITO Maki SHIGERI Takeshi KAWABATA
Summary | Full Text:PDF (321.4KB)
--------------------------------------------------------------------------------
pp.153-163 PAPER-Cryptanalysis
Countermeasures against Power Analysis Attacks for the NTRU Public Key Cryptosystem
Mun-Kyu LEE Jeong Eun SONG Dooho CHOI Dong-Guk HAN
Summary | Full Text:PDF (624.4KB)
--------------------------------------------------------------------------------
pp.164-171 PAPER-Cryptanalysis
Fast WEP-Key Recovery Attack Using Only Encrypted IP Packets
Ryoichi TERAMURA Yasuo ASAKURA Toshihiro OHIGASHI Hidenori KUWAKADO Masakatu MORII
Summary | Full Text:PDF (831.1KB)
--------------------------------------------------------------------------------
pp.172-179 PAPER-Cryptanalysis
On Clock-Based Fault Analysis Attack for an AES Hardware Using RSL
Kazuo SAKIYAMA Kazuo OHTA
Summary | Full Text:PDF (433.7KB)
--------------------------------------------------------------------------------
pp.180-187 PAPER-Mathematics
Recursive Double-Size Modular Multiplications from Euclidean and Montgomery Multipliers
Masayuki YOSHINO Katsuyuki OKEYA Camille VUILLAUME
Summary | Full Text:PDF (233.7KB)
--------------------------------------------------------------------------------
pp.188-193 PAPER-Mathematics
The Vector Decomposition Problem
Maki YOSHIDA Shigeo MITSUNARI Toru FUJIWARA
Summary | Full Text:PDF (189.9KB)
--------------------------------------------------------------------------------
pp.194-201 PAPER-Application
A Cryptographic SoC for Robust Protection of Secret Keys in IPTV DRM Systems
Sanghan LEE Hae-Yong YANG Yongjin YEOM Jongsik PARK
Summary | Full Text:PDF (785.6KB)
--------------------------------------------------------------------------------
pp.202-209 PAPER-Application
High-Speed Passphrase Search System for PGP
Koichi SHIMIZU Daisuke SUZUKI Toyohiro TSURUMARU
Summary | Full Text:PDF (598.5KB)
--------------------------------------------------------------------------------
pp.210-218 PAPER-Application
Multi-Pass Malware Sandbox Analysis with Controlled Internet Connection
Katsunari YOSHIOKA Tsutomu MATSUMOTO
Summary | Full Text:PDF (1.1MB)
--------------------------------------------------------------------------------
Regular Section
--------------------------------------------------------------------------------
pp.219-226 PAPER-Ultrasonics
Ultrasonic Imaging for Boundary Shape Generation by Phase Unwrapping with Singular-Point Elimination Based on Complex-Valued Markov Random Field Model
Tomohiro NISHINO Ryo YAMAKI Akira HIROSE
Summary | Full Text:PDF (1.7MB)
--------------------------------------------------------------------------------
pp.227-232 PAPER-Digital Signal Processing
An Instantaneous Frequency Estimator Based on the Symmetric Higher Order Differential Energy Operator
Byeong-Gwan IEM
Summary | Full Text:PDF (231.3KB)
--------------------------------------------------------------------------------
pp.233-242 PAPER-Digital Signal Processing
A Variable Step-Size Proportionate NLMS Algorithm for Identification of Sparse Impulse Response
Ligang LIU Masahiro FUKUMOTO Sachio SAIKI Shiyong ZHANG
Summary | Full Text:PDF (1MB)
--------------------------------------------------------------------------------
pp.243-253 PAPER-Digital Signal Processing
A Novel Filter Dependent CFR Scheme with Waterfilling Based Code Domain Compensation
Hyung Min CHANG Won Cheol LEE
Summary | Full Text:PDF (958.7KB)
--------------------------------------------------------------------------------
pp.254-260 PAPER-Digital Signal Processing
A Low Complexity Noise Suppressor with Hybrid Filterbanks and Adaptive Time-Frequency Tiling
Osamu SHIMADA Akihiko SUGIYAMA Toshiyuki NOMURA
Summary | Full Text:PDF (536.6KB)
--------------------------------------------------------------------------------
pp.261-271 PAPER-Digital Signal Processing
A Single-Chip Speech Dialogue Module and Its Evaluation on a Personal Robot, PaPeRo-Mini
Miki SATO Toru IWASAWA Akihiko SUGIYAMA Toshihiro NISHIZAWA Yosuke TAKANO
Summary | Full Text:PDF (1MB)
--------------------------------------------------------------------------------
pp.272-280 PAPER-Systems and Control
A New Prediction Algorithm for Embedded Real-Time Applications
Luis GRACIA Carlos PEREZ-VIDAL
Summary | Full Text:PDF (1.1MB)
--------------------------------------------------------------------------------
pp.281-290 PAPER-Nonlinear Problems
Circuit Design Optimization Using Genetic Algorithm with Parameterized Uniform Crossover
Zhiguo BAO Takahiro WATANABE
Summary | Full Text:PDF (612.9KB)
--------------------------------------------------------------------------------
pp.291-301 PAPER-Nonlinear Problems
Global Nonlinear Optimization Based on Wave Function and Wave Coefficient Equation
Hideki SATOH
Summary | Full Text:PDF (628.9KB)
--------------------------------------------------------------------------------
pp.302-308 PAPER-Cryptography and Information Security
On the Linear Complexity of Generalized Cyclotomic Binary Sequences with Length 2p2
Jingwei ZHANG Chang-An ZHAO Xiao MA
Summary | Full Text:PDF (185.1KB)
--------------------------------------------------------------------------------
pp.309-315 PAPER-Coding Theory
New Quaternary Sequences with Even Period and Three-Valued Autocorrelation
Jin-Ho CHUNG Yun Kyoung HAN Kyeongcheol YANG
Summary | Full Text:PDF (163KB)
--------------------------------------------------------------------------------
pp.316-319 LETTER-Speech and Hearing
Discriminative Weight Training for Support Vector Machine-Based Speech/Music Classification in 3GPP2 SMV Codec
Sang-Kyun KIM Joon-Hyuk CHANG
Summary | Full Text:PDF (128.5KB)
--------------------------------------------------------------------------------
pp.320-323 LETTER-Digital Signal Processing
Harmonic Components Based Post-Filter Design for Residual Echo Suppression
Minwoo LEE Yoonjae LEE Kihyeon KIM Hanseok KO
Summary | Full Text:PDF (118.4KB)
--------------------------------------------------------------------------------
pp.324-326 LETTER-VLSI Design Technology and CAD
CSD-Based Programmable Multiplier Design for Predetermined Coefficient Groups
Yong-Eun KIM Kyung-Ju CHO Jin-Gyun CHUNG Xinming HUANG
Summary | Full Text:PDF (312.7KB)
--------------------------------------------------------------------------------
pp.327-330 LETTER-Cryptography and Information Security
General Impossible Differential Attack on 7-Round AES
Meiling ZHANG Weiguo ZHANG Jingmei LIU Xinmei WANG
Summary | Full Text:PDF (351KB)
--------------------------------------------------------------------------------
pp.331-335 LETTER-Cryptography and Information Security
DWT-Based High Capacity Audio Watermarking
Mehdi FALLAHPOUR David MEGIAS
Summary | Full Text:PDF (541.1KB)
--------------------------------------------------------------------------------
pp.336-338 LETTER-Coding Theory
The Extended FDH Sequences
WenPing MA YeFeng HE Shaohui SUN
Summary | Full Text:PDF (64.2KB)
--------------------------------------------------------------------------------
pp.339-343 LETTER-Communication Theory and Signals
Blind Channel Estimation for SIMO-OFDM Systems without Cyclic Prefix
Shih-Hao FANG Ju-Ya CHEN Ming-Der SHIEH Jing-Shiun LIN
Summary | Full Text:PDF (184.8KB)
--------------------------------------------------------------------------------
pp.344-347 LETTER-Mobile Information Network and Personal Communications
Stochastic Congestion Control in Wireless Sensor Networks
Hyung Seok KIM Seok LEE Namhoon KIM
Summary | Full Text:PDF (146.5KB)
--------------------------------------------------------------------------------
pp.348-353 LETTER-Image
Improvement of Ringing Artifact Reduction Using a K-Means Method for Color Moving Pictures
Wonwoo JANG Hagyong HAN Wontae CHOI Gidong LEE Bongsoon KANG
Summary | Full Text:PDF (801.4KB)
[培训]内核驱动高级班,冲击BAT一流互联网大厂工作,每周日13:00-18:00直播授课
赞赏
他的文章
- [转帖][Cado-nfs-discuss] 795-bit factoring and discrete logarithms (RSA-240 于2019年12月2日被破解) 19498
- [转帖]How to factor 2048 bit RSA integers in 8 hours using 20 million noisy qubits 8162
- [推荐]RSA-220 has 220 decimal digits (729 bits), and was factored 6895
- [推荐]RSA-210 has been factored. 11179
- Lessons Learned From Previous SSL/TLS Attacks - A Brief Chronology Of Attacks... 8923
看原图
赞赏
雪币:
留言: