Junnosuke HOSHIDO Tonan KAMATA Tsutomu ANSAI Ryuhei UEHARA
Shin-ichi NAKANO
Shang LU Kohei HATANO Shuji KIJIMA Eiji TAKIMOTO
Lin ZHOU Yanxiang CAO Qirui WANG Yunling CHENG Chenghao ZHUANG Yuxi DENG
Zhen WANG Longye WANG
Naohiro TODA Tetsuya NAKAGAMI
Haijun Wang Tao Hu Dongdong Chen Huiwei Yao Runze He Di Wu Zhifu Tian
Jianqiang NI Gaoli WANG Yingxin LI Siwei SUN
Rui CHENG Yun JIANG Qinglin ZHANG Qiaoqiao XIA
Ren TOGO Rintaro YANAGI Masato KAWAI Takahiro OGAWA Miki HASEYAMA
Naoki TATTA Yuki SAKATA Rie JINKI Yuukou HORITA
Kundan LAL DAS Munehisa SEKIKAWA Naohiko INABA
Menglong WU Tianao YAO Zhe XING Jianwen ZHANG Yumeng LIN
Jian ZHANG Zhao GUANG Wanjuan SONG Zhiyan XU
Shinya Matsumoto Daiki Ikemoto Takuya Abe Kan Okubo Kiyoshi Nishikawa
Kazuki HARADA Yuta MARUYAMA Tomonori TASHIRO Gosuke OHASHI
Zezhong WANG Masayuki SHIMODA Atsushi TAKAHASHI
Pierpaolo AGAMENNONE
Jianmao XIAO Jianyu ZOU Yuanlong CAO Yong ZHOU Ziwei YE Xun SHAO
Kazumasa ARIMURA Ryoichi MIYAUCHI Koichi TANNO
Shinichi NISHIZAWA Shinji KIMURA
Zhe LIU Wu GUAN Ziqin YAN Liping LIANG
Shuichi OHNO Shenjian WANG Kiyotsugu TAKABA
Yindong CHEN Wandong CHEN Dancheng HUANG
Xiaohe HE Zongwang LI Wei HUANG Junyan XIANG Chengxi ZHANG Zhuochen XIE Xuwen LIANG
Conggai LI Feng LIU Yingying LI Yanli XU
Siwei Yang Tingli Li Tao Hu Wenzhi Zhao
Takahiro FUJITA Kazuyuki WADA
Kazuma TAKA Tatsuya ISHIKAWA Kosei SAKAMOTO Takanori ISOBE
Quang-Thang DUONG Kohei MATSUKAWA Quoc-Trinh VO Minoru OKADA
Sihua LIU Xiaodong ZHU Kai KANG Li WAN Yong WANG
Kazuya YAMAMOTO Nobukazu TAKAI
Yasuhiro Sugimoto Nobukazu Takai
Ho-Lim CHOI
Weibang DAI Xiaogang CHEN Houpeng CHEN Sannian SONG Yichen SONG Shunfen LI Tao HONG Zhitang SONG
Duo Zhang Shishan Qi
Young Ghyu Sun Soo Hyun Kim Dong In Kim Jin Young Kim
Hongbin ZHANG Ao ZHAN Jing HAN Chengyu WU Zhengqiang WANG
Yuli YANG Jianxin SONG Dan YU Xiaoyan HAO Yongle CHEN
Kazuki IWAHANA Naoto YANAI Atsuo INOMATA Toru FUJIWARA
Rikuto KURAHARA Kosei SAKAMOTO Takanori ISOBE
Elham AMIRI Mojtaba JOODAKI
Qingqi ZHANG Xiaoan BAO Ren WU Mitsuru NAKATA Qi-Wei GE
Jiaqi Wang Aijun Liu Changjun Yu
Ruo-Fei Wang Jia Zhang Jun-Feng Liu Jing-Wei Tang
Yingnan QI Chuhong TANG Haiyang LIU Lianrong MA
Yi XIONG Senanayake THILAK Daisuke ARAI Jun IMAOKA Masayoshi YAMAMOTO
Zhenhai TAN Yun YANG Xiaoman WANG Fayez ALQAHTANI
Chenrui CHANG Tongwei LU Feng YAO
Takuma TSUCHIDA Rikuho MIYATA Hironori WASHIZAKI Kensuke SUMOTO Nobukazu YOSHIOKA Yoshiaki FUKAZAWA
Shoichi HIROSE Kazuhiko MINEMATSU
Toshimitsu USHIO
Yuta FUKUDA Kota YOSHIDA Takeshi FUJINO
Qingping YU Yuan SUN You ZHANG Longye WANG Xingwang LI
Qiuyu XU Kanghui ZHAO Tao LU Zhongyuan WANG Ruimin HU
Lei Zhang Xi-Lin Guo Guang Han Di-Hui Zeng
Meng HUANG Honglei WEI
Yang LIU Jialong WEI Shujian ZHAO Wenhua XIE Niankuan CHEN Jie LI Xin CHEN Kaixuan YANG Yongwei LI Zhen ZHAO
Ngoc-Son DUONG Lan-Nhi VU THI Sinh-Cong LAM Phuong-Dung CHU THI Thai-Mai DINH THI
Lan XIE Qiang WANG Yongqiang JI Yu GU Gaozheng XU Zheng ZHU Yuxing WANG Yuwei LI
Jihui LIU Hui ZHANG Wei SU Rong LUO
Shota NAKAYAMA Koichi KOBAYASHI Yuh YAMASHITA
Wataru NAKAMURA Kenta TAKAHASHI
Chunfeng FU Renjie JIN Longjiang QU Zijian ZHOU
Masaki KOBAYASHI
Shinichi NISHIZAWA Masahiro MATSUDA Shinji KIMURA
Keisuke FUKADA Tatsuhiko SHIRAI Nozomu TOGAWA
Yuta NAGAHAMA Tetsuya MANABE
Baoxian Wang Ze Gao Hongbin Xu Shoupeng Qin Zhao Tan Xuchao Shi
Maki TSUKAHARA Yusaku HARADA Haruka HIRATA Daiki MIYAHARA Yang LI Yuko HARA-AZUMI Kazuo SAKIYAMA
Guijie LIN Jianxiao XIE Zejun ZHANG
Hiroki FURUE Yasuhiko IKEMATSU
Longye WANG Lingguo KONG Xiaoli ZENG Qingping YU
Ayaka FUJITA Mashiho MUKAIDA Tadahiro AZETSU Noriaki SUETAKE
Xingan SHA Masao YANAGISAWA Youhua SHI
Jiqian XU Lijin FANG Qiankun ZHAO Yingcai WAN Yue GAO Huaizhen WANG
Sei TAKANO Mitsuji MUNEYASU Soh YOSHIDA Akira ASANO Nanae DEWAKE Nobuo YOSHINARI Keiichi UCHIDA
Kohei DOI Takeshi SUGAWARA
Yuta FUKUDA Kota YOSHIDA Takeshi FUJINO
Mingjie LIU Chunyang WANG Jian GONG Ming TAN Changlin ZHOU
Hironori UCHIKAWA Manabu HAGIWARA
Atsuko MIYAJI Tatsuhiro YAMATSUKI Tomoka TAKAHASHI Ping-Lun WANG Tomoaki MIMOTO
Kazuya TANIGUCHI Satoshi TAYU Atsushi TAKAHASHI Mathieu MOLONGO Makoto MINAMI Katsuya NISHIOKA
Masayuki SHIMODA Atsushi TAKAHASHI
Yuya Ichikawa Naoko Misawa Chihiro Matsui Ken Takeuchi
Katsutoshi OTSUKA Kazuhito ITO
Rei UEDA Tsunato NAKAI Kota YOSHIDA Takeshi FUJINO
Motonari OHTSUKA Takahiro ISHIMARU Yuta TSUKIE Shingo KUKITA Kohtaro WATANABE
Iori KODAMA Tetsuya KOJIMA
Yusuke MATSUOKA
Yosuke SUGIURA Ryota NOGUCHI Tetsuya SHIMAMURA
Tadashi WADAYAMA Ayano NAKAI-KASAI
Li Cheng Huaixing Wang
Beining ZHANG Xile ZHANG Qin WANG Guan GUI Lin SHAN
Soh YOSHIDA Nozomi YATOH Mitsuji MUNEYASU
Ryo YOSHIDA Soh YOSHIDA Mitsuji MUNEYASU
Nichika YUGE Hiroyuki ISHIHARA Morikazu NAKAMURA Takayuki NAKACHI
Ling ZHU Takayuki NAKACHI Bai ZHANG Yitu WANG
Toshiyuki MIYAMOTO Hiroki AKAMATSU
Yanchao LIU Xina CHENG Takeshi IKENAGA
Kengo HASHIMOTO Ken-ichi IWATA
Hiroshi FUJISAKI
Tota SUKO Manabu KOBAYASHI
Akira KAMATSUKA Koki KAZAMA Takahiro YOSHIDA
Manabu HAGIWARA
Eugin HYUN Woojin OH Jong-Hun LEE
In automotive frequency modulated continuous wave (FMCW) radar based on multiple ramps with different slope, an effective pairing algorithm is required to simultaneously detect the target range and velocity. That is, as finding beat-frequencies intersecting at a single point of the range-Doppler map, we extract the range and velocity of a target. Unlike the ideal case, however, in a real radar system, even though multiple beat frequencies are originated from the same target, these beat frequencies have many different intersection values, resulting in mismatch pairing during the pairing step. Moreover, this problem also reduces the detection accuracy and the radar detection performance. In this study, we found that mismatch pairing is caused by the round-off errors of the range-beat frequency and Doppler frequency, as well as their various combinations in the discrete frequency domain. We also investigated the effect of mismatch pairing on detection performance, and proposed a new approach to minimize this problem. First, we propose integer and half-integer frequency position-based pairing method during extraction of the range and Doppler frequencies in each ramp to increase detection accuracy. Second, we propose a window-based pairing method to identify the same target from range-Doppler frequencies extracted in the first step. We also find the appropriate window size to overcome pairing mismatch. Finally, we propose the method to obtain a higher accuracy of range and velocity by weighting the values determined in one window. To verify the detection performance of the proposed method by comparison with the typical method, simulations were conducted. Then, in a real field test using the developed radar prototype, the detection probability of the proposed algorithm showed more than 60% improvement in comparison with the conventional method.
Shingo YOSHIZAWA Mai NOZAKI Hiroshi TANIMOTO
Due to increasing demand for machine-to-machine (M2M) communication, simultaneous connections for many terminals are requested for current wireless communication systems. Interleave division multiple access (IDMA) has superior multiuser detection performance and attains high data transmission efficiency in multiuser communications. This paper describes the VLSI implementation of an interference canceller for OFDM-IDMA systems. The conventional architecture decreases a throughput in pipeline processing due to wait time occurring in interleave and deinterleave memory units. The proposed architecture adopts dual-frame processing to solve the problem of the wait time and achieves a high utilization ratio in pipeline stage operation. In the implementation results, the proposed architecture has reduced circuit area and power consumption by 25% and 41% for BPSK demodulation and 33% and 44% for QPSK demodulation compared with the conventional architecture on the same throughput condition.
In this paper, we propose a 3rd-order nonlinear IIR filter for compensating nonlinear distortions of loudspeaker systems. Nonlinear distortions are common around the lowest resonance frequency for electrodynamic loudspeaker systems. One interesting approach to compensating nonlinear distortions is to employ a mirror filter. The mirror filter is derived from the nonlinear differential equation for loudspeaker systems. The nonlinear parameters of a loudspeaker system, which include the force factor, stiffness, and so forth, depend on the displacement of the diaphragm. The conventional filter structure, which is called the 2nd-order nonlinear IIR filter that originates the mirror filter, cannot reduce nonlinear distortions at high frequencies because it does not take into account the nonlinearity of the self-inductance of loudspeaker systems. To deal with this problem, the proposed filter takes into account the nonlinearity of the self-inductance and has a 3rd-order nonlinear IIR filter structure. Hence, this filter can reduce nonlinear distortions at high frequencies while maintaining a lower computational complexity than that of a Volterra filter-based compensator. Experimental results demonstrate that the proposed filter outperforms the conventional filter by more than 2dB for 2nd-order nonlinear distortions at high frequencies.
Dijian CHEN Zhiwei HAO Kenji FUJIMOTO Tatsuya SUZUKI
This paper develops the double generating function method for the discrete-time linear quadratic optimal control problem. This method can give generators for optimal solutions only in terms of pre-computed coefficients and boundary conditions, which is useful for the on-line repetitive computation for different boundary conditions. Moreover, since each generator contains inverse terms, the invertibility analysis is also performed to conclude that the terms in the generators constructed by double generating functions with opposite time directions are invertible under some mild conditions, while the terms with the same time directions will become singular when the time goes infinity which may cause instability in numerical computations. Examples demonstrate the effectiveness of the developed method.
Jingyuan ZHAO Meiqin WANG Jiazhe CHEN Yuliang ZHENG
SAFER block cipher family consists of SAFER K, SAFER SK, SAFER+ and SAFER++. As the first proposed block cipher of them, SAFER K is strengthened by SAFER SK with improved key schedule. SAFER+ is designed as an AES candidate and Bluetooth uses a customized version of it for security. SAFER++, a variant of SAFER+, is among the cryptographic primitives selected for the second phase of the NESSIE project. In this paper, we take advantage of properties of the linear transformation and S-boxes to identify new impossible differentials for SAFER SK, SAFER+, and SAFER++. Moreover, we give the impossible differential attacks on 4-round SAFER SK/128 and 4-round SAFER+/128(256), 5-round SAFER++/128 and 5.5-round SAFER++/256. Our attacks significantly improve previously known impossible differential attacks on them. Specifically, our attacks on SAFER+ are the best attack in terms of number of rounds.
Eiichiro FUJISAKI Akinori KAWACHI Ryo NISHIMAKI Keisuke TANAKA Kenji YASUNAGA
Leakage resilient cryptography is often considered in the presence of a very strong leakage oracle: An adversary may submit arbitrary efficiently computable function f to the leakage oracle to receive f(x), where x denotes the entire secret that a party possesses. This model is somewhat too strong in the setting of public-key encryption (PKE). It is known that no secret-key leakage resilient PKE scheme exists if the adversary may have access to the secret-key leakage oracle to receive only one bit after it was given the challenge ciphertext. Similarly, there exists no sender-randomness leakage resilient PKE scheme if one-bit leakage occurs after the target public key was given to the adversary. At TCC 2011, Halevi and Lin have broken the barrier of after-the-fact leakage, by proposing the so-called split state model, where a secret key of a party is explicitly divided into at least two pieces, and the adversary may have not access to the entire secret at once, but each divided pieces, one by one. In the split-state model, they have constructed post-challenge secret-key leakage resilient CPA secure PKEs from hash proof systems, but the construction of CCA secure post-challenge secret-key leakage PKE has remained open. They have also remained open to construct sender-randomness leakage PKE in the split state model. This paper provides a solution to the open issues. We also note that the proposal of Halevi and Lin is post-challenge secret-key leakage CPA secure against a single challenge ciphertext; not against multiple challenges. We present an efficient generic construction that converts any CCA secure PKE scheme into a multiple-challenge CCA secure PKE that simultaneously tolerates post-challenge secret-key and sender-randomness leakage in the split state model, without any additional assumption. In addition, our leakage amount of the resulting schemes is the same as that of Halevi and Lin CPA PKE, i.e., (1/2+γ)l/2 where l denotes the length of the entire secret (key or randomness) and γ denotes a universal (possitive) constant less than 1/2. Our conversion is generic and available for many other public-key primitives. For instance, it can convert any identity-based encryption (IBE) scheme to a post-challenge master-key leakage and sender-randomness leakage secure IBE.
Field Programmable Gate Array (FPGA) implementation of Elliptic Curve Cryptography (ECC) over GF(p) is commonly not fast enough to meet the request of high-performance applications. There are three critical factors to determine the performance of ECC processor over GF(p): multiplication structure, modular multiplication algorithm, and scalar point multiplication scheduling. This work proposes a novel multiplication structure which is a two-stage pipeline on the basis of Karatsuba-Ofman algorithm. With the proposed multiplication structure, we design a 256-bit modular multiplier based on Improved Barret Modular Multiplication algorithm. Upon the modular multiplier, we finish the scalar point multiplication scheduling and implement a high-performance ECC processor on FPGA. Compared with the previous modular multipliers, our modular multiplier reduces the 256-bit modular multiplication time by 28% at least. Synthesis result on Altera Stratix II shows that our ECC processor can complete a 256-bit ECC scalar point multiplication in 0.51ms, which is at least 1.3 times faster than the currently reported FPGA ECC processors over GF(p).
Sicong LIU Fang YANG Chao ZHANG Jian SONG
A narrowband interference (NBI) estimation and mitigation method based on compressive sensing (CS) for communication systems with repeated training sequences is investigated in this letter. The proposed CS-based differential measuring method is performed through the differential operation on the inter-block-interference-free regions of the received adjacent training sequences. The sparse NBI signal can be accurately recovered from a time-domain measurement vector of small size under the CS framework, without requiring channel information or dedicated resources. Theoretical analysis and simulation results show that the proposed method is robust to NBI under multi-path fading channels.
Xushan CHEN Xiongwei ZHANG Jibin YANG Meng SUN Weiwei YANG
Compressive sensing (CS) exploits the sparsity or compressibility of signals to recover themselves from a small set of nonadaptive, linear measurements. The number of measurements is much smaller than Nyquist-rate, thus signal recovery is achieved at relatively expense. Thus, many signal processing problems which do not require exact signal recovery have attracted considerable attention recently. In this paper, we establish a framework for parameter estimation of a signal corrupted by additive colored Gaussian noise (ACGN) based on compressive measurements. We also derive the Cramer-Rao lower bound (CRB) for the frequency estimation problems in compressive domain and prove some useful properties of the CRB under different compressive measurements. Finally, we show that the theoretical conclusions are along with experimental results.
Ann-Chen CHANG Chih-Chang SHEN
This letter deals with the carrier frequency offsets (CFO) estimation problem for orthogonal frequency division multiple access (OFDMA) uplink systems. Combined with centro-symmetric (CS) trimmed autocorrelation matrix and weighting subspace projection, the proposed estimator has better estimate performance than MVDR, MUSIC, CS-MUSIC, and ESPRIT estimators, especially in relatively less of OFDMA blocks and low SNR situations. Simulation results are presented to verify the efficiency of the proposed estimator.
Xiao Yu LUO Ping WEI Lu GAN Hong Shu LIAO
Recently, Gan and Luo have proposed a direction-of-arrival estimation method for uncorrelated and coherent signals in the presence of multipath propagation [3]. In their method, uncorrelated and coherent signals are distinguished by rotational invariance techniques and the property of the moduli of eigenvalues. However, due to the limitation of finite number of sensors, the pseudo-inverse matrix derived in this method is an approximate one. When the number of sensors is small, the approximation error is large, which adversely affects the property of the moduli of eigenvalues. Consequently, the method in [3] performs poorly in identifying uncorrelated signals under such circumstance. Moreover, in cases of small number of snapshots and low signal to noise ratio, the performance of their method is poor as well. Therefore, in this letter we first study the approximation in [3] and then propose an improved method that performs better in distinguishing between uncorrelated signals and coherent signals and in the aforementioned two cases. The simulation results demonstrate the effectiveness and efficiency of the proposed method.
This letter investigates the consensus problem for an undirected network of high-order integrators with an arbitrarily large communication delay. A consensus protocol with the low gain parameter that can eliminate an effect of time delay on the consensus problem is proposed newly. Moreover, it is proved that under some sufficient conditions, it can solve the consensus problem in the presence of an arbitrarily large communication delay. A simulation example is presented to verify the validness of the proposed design.
In order to improve the motion control performance, a new friction determination method, using the LuGre model, is proposed. The model parameters are determined by performing two-step closed-loop experiments using a proportional-integral observer (PIO). The PIO is also used to develop a robust motion controller to deal with additional uncertainties including the effect of the inaccurate estimation of the friction. The experimental results reveal improved performance compared to that of a single-PIO-based controller.
Yun BU Tian Qian LI Qiang ZHANG
It is very difficult to know evolution state of ACO in its working. To solve the problem, we propose using colony entropy and mean colony entropy to monitor the algorithm. The two functions show fluctuation and declining trends depended on time t in a tour and iteration number. According to the principle, that each updated edge will get the same increment is improper. Then a weighted algorithm is proposed to calculate each arc's increment based on its selected probability. The strategy can provide more exploration to help to find the global optimum value, and experiments show its improved performance.
Fei TANG Hongda LI Jinyong CHANG
In a proxy re-signatures (PRS) scheme, a semi-trusted proxy is given some information which allows it to translate a user i's signature on a message m into another user j's signature on the same message m. However, the proxy cannot, on it own, compute signatures for either i or j. This notion introduced by Blaze et a. at EUROCRYPT 1998, and then revisited by Ateniese and Hohenberger at CCS 2005. The existence of multi-use unidirectional PRS scheme is an open problem left by AH05. Whereafter, at CCS 2008, Libert and Vergnaud constructed the first multi-use unidirectional PRS scheme. However, there is a major drawback in the LV08 scheme that the size of the signatures is linear in the number of translations. Hence, Libert and Vergnaud said that a more challenging task would be to find out implementations of such primitives where the size of signatures and the verification cost do not grow linearly with the number of translations. In this work we resolve this task by constructing a such PRS scheme in the standard model by using indistinguishability obfuscation. A shortcoming of our construction is that the security is selective but not full.
Xinran LI Fang-Wei FU Xuan GUANG
FOX is a family of block ciphers published in 2004 and is famous for its provable security to cryptanalysis. In this paper, we present multiple 4-round impossible differentials and several new results of impossible differential attacks on 5,6,7-round FOX64 and 5-round FOX128 with the multiple differentials and the new early abort technique which shall reduce the data complexity and the time complexity respectively. In terms of the data complexity and the time complexity, our results are better than any of the previously known attacks.
Minglong QI Shengwu XIONG Jingling YUAN Wenbi RAO Luo ZHONG
In this letter, we give a trace representation of binary Jacobi sequences with period pq over an extension field of the odd prime field Fr. Our method is based on the use of a pqth root of unity over the extension field, and the representation of the Jacobi sequences by corresponding indicator functions and quadratic characters of two primes p and q.
This paper studies the problem of power allocation for a two-way orthogonal frequency division multiplexing (OFDM) based cognitive radio (CR) network to maximize the ergodic capacities of the secondary users (SUs). Under the assumption that the SUs know the channel state information (CSI) of the interference links between the SUs and the primary user (PU) perfectly, the optimal power allocation algorithm under the interference and transmit power constraints is derived. In addition, we further assume that the SUs only know the channel distribution information (CDI) of the interference links and propose a heuristic algorithm under the interference outage and transmit power constraints based on Gaussian approximation. It is shown that the ergodic capacity with CDI is not degraded compared to that with perfect CSI under tight transmit power constraint. Moreover, it is shown that the interference outage constraint is satisfied even for very small number of subcarriers if an interference power margin is adopted for Gaussian approximation.
Sung-Bok CHOI Young-Hwan YOU Hyoung-Kyu SONG
Many wireless communication systems use a relay station for cooperative diversity or cell coverage extension. In this letter, an efficient partial single relay selection scheme is proposed for wireless communications. The conventional schemes such as the best harmonic mean and the threshold-based relay selection should know channel state informaion (CSI), or noise variance at all stations in advance. But the proposed scheme does not require any priori information. It uses a characteristic of the repeated signal pattern at candidates of the relay station. Simulation results show that the performance of proposed scheme is very close to the best harmonic mean relay selection scheme as one of the optimal relay selection schemes.
Kohei INOUE Kenji HARA Kiichi URAHAMA
Recently, hue-preserving color image enhancement methods have been proposed by several researchers. However, the theoretical comparison of the performance of their methods has not been conducted yet. In this paper, we propose a hue-preserving saturation maximization method, and show a relationship of the saturation of enhanced colors by related methods. We also demonstrate the correctness of the relationship experimentally.