IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences
Online ISSN : 1745-1337
Print ISSN : 0916-8508
Current issue
Displaying 1-6 of 6 articles from this issue
Regular Section
  • David CLARINO, Shohei KURODA, Shigeru YAMASHITA
    Article type: PAPER
    Subject area: VLSI Design Technology and CAD
    2025 Volume E108.A Issue 1 Pages 1-10
    Published: January 01, 2025
    Released on J-STAGE: January 01, 2025
    Advance online publication: July 16, 2024
    JOURNAL FREE ACCESS

    Toffoli gates are an important primitive in reversible Boolean logic. In quantum computation, these Toffoli gates are composed using other elementary gates, most notably the Clifford+T basis. However, in fault-tolerant implementations of quantum circuits, the T-gate incurs extra cost relative to Clifford gates like the S-gate and CNOT gate. Relative-phase Toffoli Gates (RTOFs) have been proposed as a way to reduce this T-count at the cost of incurring a relative phase that could skew the final quantum states. In this paper, we utilize an observation that the relative phase which RTOFs introduce can be canceled by the appropriate application of less expensive S-gates instead of T-gates. It leverages alternate forms of the RTOF including incorporating S-gates into it or moving around its input bits in order to simplify the logic to erase the relative phase. We find experimentally that our method has a clear advantage in most cases, and identify several types of circuits that it could be synergistic with.

    Download PDF (3714K)
  • Donghoon CHANG, Deukjo HONG, Jinkeon KANG
    Article type: PAPER
    Subject area: Cryptography and Information Security
    2025 Volume E108.A Issue 1 Pages 11-19
    Published: January 01, 2025
    Released on J-STAGE: January 01, 2025
    Advance online publication: July 12, 2024
    JOURNAL FREE ACCESS

    The Sparkle permutation family is used as an underlying building block of the authenticated encryption scheme Schwaemm, and the hash function Esch which are a part of one of finalists in the National Institute of Standards and Technology (NIST) lightweight cryptography standardization process. In this paper, we present distinguishing attacks on 6-round Sparkle384 and 7-round Sparkle512. We used divide-and-conquer approach and the fact that Sparkle permutations are keyless, as a different approach from designers’ long trail strategy. Our attack on Sparkle384 requires much lower time complexity than existing best one; our attack on Sparkle512 is best in terms of the number of attacked rounds, as far as we know. However, our results do not controvert the security claim of Sparkle designers.

    Download PDF (26447K)
  • Kenji UEHARA, Kunihiko HIRAISHI
    Article type: PAPER
    Subject area: Mathematical Systems Science
    2025 Volume E108.A Issue 1 Pages 20-31
    Published: January 01, 2025
    Released on J-STAGE: January 01, 2025
    Advance online publication: July 22, 2024
    JOURNAL FREE ACCESS

    In this paper, we present a framework for composing discrete-event simulation models from a large amount of airspace traffic data without using any specific waypoints. The framework consists of two parts. In the first part, abstracted route graphs that indicate representative routes in the airspace are composed. We propose two methods for extracting important routes in the form of graphs based on combination of various technologies such as space partition, trajectory clustering, and skeleton extraction. In the second part, discrete-event simulation models are composed based on statistical information on flight time along each edge of the abstracted route graph. The composed simulation models have intermediate granularity between micro models, such as multi-agent simulation, and macro models, such as queuing models, and therefore they should be classified as mesoscopic models. Finally, we show numerical results to evaluate the accuracy of the simulation model.

    Download PDF (5792K)
  • Ling WANG, Zhongqiang LUO
    Article type: LETTER
    Subject area: Digital Signal Processing
    2025 Volume E108.A Issue 1 Pages 32-36
    Published: January 01, 2025
    Released on J-STAGE: January 01, 2025
    Advance online publication: July 12, 2024
    JOURNAL FREE ACCESS

    Radio Frequency Identification (RFID) is one of the key technologies of the Internet of Things. However, during its application, it faces a huge challenge of co-frequency interference cancellation, that is, the tag collision problem. The multi-tag anti-collision problem is modeled as a Blind Source Separation (BSS) problem from the perspective of system communication transmission layer signal processing. In order to reduce the cost of the reader antenna, this paper uses the boundedness of the tag communication signal to propose an underdetermined RFID tag anti-collision method based on Bounded Component Analysis (BCA). This algorithm converts the underdetermined tag into the signal collision model is combined with the BCA mechanism. Verification analysis was conducted using simulation data. The experimental results show that compared with the nonnegative matrix factorization (NMF) algorithm based on minimum correlation and minimum volume constraints, the bounded component analysis method proposed in this article can perform better. Solving the underdetermined collision problem greatly improves the effect of eliminating co-channel interference of tag signals, improves the system bit error rate performance, and reduces the complexity of the underdetermined model system.

    Download PDF (734K)
  • Zongxiang YI, Qiuxia XU
    Article type: LETTER
    Subject area: Coding Theory
    2025 Volume E108.A Issue 1 Pages 37-39
    Published: January 01, 2025
    Released on J-STAGE: January 01, 2025
    Advance online publication: July 12, 2024
    JOURNAL FREE ACCESS

    In 2004, Ryoh Fuji-Hara et al. (IEEE Trans. Inf. Theory. 50(10):2408-2420, 2004) proposed an open problem of finding a maximum multiplicative subgroup G in ℤn satisfying two conditions: (1) the sum of any two distinct elements in G is nonzero; (2) any difference from G is still a unit in ℤn. The subgroups satisfying Condition (2) is called difference unit group. Difference unit group is related to difference packing, zero-difference balanced function and partitioned difference family, and thus have many applications in coding and communication. Suppose the canonical factorization of n is ∏ki=1 peii. In this letter, we mainly answer the open problem with the result that the maximum cardinality of such a subgroup G is $\frac{d}{2^m}$, where d = gcd(p1 - 1, p2 - 1, ・・・, pk - 1) and m = ν2(d). Also an explicit construction of such a subgroup is introduced.

    Download PDF (208K)
  • Qi QI, Zi TENG, Hongmei HUO, Ming XU, Bing BAI
    Article type: LETTER
    Subject area: Image
    2025 Volume E108.A Issue 1 Pages 40-44
    Published: January 01, 2025
    Released on J-STAGE: January 01, 2025
    Advance online publication: July 16, 2024
    JOURNAL FREE ACCESS

    To super-resolve low-resolution (LR) face image suffering from strong noise and fuzzy interference, we present a novel approach for noisy face super-resolution (SR) that is based on three-level information representation constraints. To begin with, we develop a feature distillation network that focuses on extracting pertinent face information, which incorporates both statistical anti-interference models and latent contrast algorithms. Subsequently, we incorporate a face identity embedding model and a discrete wavelet transform model, which serve as additional supervision mechanisms for the reconstruction process. The face identity embedding model ensures the reconstruction of identity information in hypersphere identity metric space, while the discrete wavelet transform model operates in the wavelet domain to supervise the restoration of spatial structures. The experimental results clearly demonstrate the efficacy of our proposed method, which is evident through the lower Learned Perceptual Image Patch Similarity (LPIPS) score and Fréchet Inception Distances (FID), and overall practicability of the reconstructed images.

    Download PDF (4937K)
feedback
Top