IEICE Technical Report

Print edition: ISSN 0913-5685      Online edition: ISSN 2432-6380

Volume 116, Number 381

Theoretical Foundations of Computing

Workshop Date : 2016-12-21 - 2016-12-22 / Issue Date : 2016-12-14

[PREV] [NEXT]

[TOP] | [2013] | [2014] | [2015] | [2016] | [2017] | [2018] | [2019] | [Japanese] / [English]

[PROGRAM] [BULK PDF DOWNLOAD]


Table of contents

COMP2016-31
Improvements of Blacklistable Anonymous Credential System Using Accumulator
Yuu Aikou, Toru Nakanishi (Hiroshima Univ)
pp. 1 - 7

COMP2016-32
A note on security notions of anonymity in Identity-based encryption
Honomu Ootomo, Taroh Sasaki, Atsushi Fujioka (Kanagawa Univ.)
pp. 9 - 13

COMP2016-33
[Invited Talk] New frontier of machine learning and computation initiated by quantum annealing
Masayuki Ohzeki (Tohoku Univ.)
pp. 15 - 22

COMP2016-34
[Invited Talk] Fast and Scalable Bilinear-Type Conversion Using Integer Programming
Fumitaka Hoshino, Masayuki Abe (NTT), Miyako Ohkubo (NICT)
p. 23

COMP2016-35
[Invited Talk] Cryptanalysis of GGH15 Multilinear Maps (from CRYPTO 2016)
Mehdi Tibouchi (NTT)
p. 25

COMP2016-36
[Invited Talk] Backdoors in Pseudorandom Number Generators: Possibility and Impossibility Results
Jean Paul Degabriele, Kenneth Paterson (RHUL), Jacob Schuldt (AIST), Joanne Woodage (RHUL)
p. 27

COMP2016-37

Miki Miyauchi (NTT)
pp. 29 - 35

COMP2016-38
(See Japanese page.)
pp. 37 - 42

COMP2016-39
A Loosely-Stabilizing Population Protocol for Maximal Independent Set
Seiken Kiyosu, Yuichi Sudo, Hirotsugu Kakugawa, Toshimitsu Masuzawa (Osaka Univ.)
pp. 43 - 49

COMP2016-40
Theoretical Model of Interconnection Networks Consisting of Hosts and Switches
Ryota Yasudo (Keio Univ.), Michihiro Koibuchi (NII), Hideharu Amano (Keio Univ.), Koji Nakano (Hiroshima Univ.)
pp. 51 - 58

COMP2016-41
Effect on Mix Columns to the Security of Minalpher
Yuki Kishi, Taroh Sasaki, Atsushi Fujioka (Kanagawa Univ)
pp. 59 - 62

COMP2016-42
Reconsideration on Re-keying scheme from CARDIS 2015 (part 2)
Yuichi Komano (Toshiba)
pp. 63 - 69

COMP2016-43
[Invited Talk] Theory and Practice of Succinct Data Structures
Kunihiko Sadakane (Univ. of Tokyo)
p. 71

COMP2016-44
[Invited Talk] Adversary-dependent Lossy Trapdoor Function from Hardness of Factoring Semi-smooth RSA Subgroup
Takashi Yamakawa (UT), Shota Yamada, Goichiro Hanaoka (AIST), Noboru Kunihiro (UT)
p. 73

COMP2016-45
[Invited Talk] Extended Tower Number Field Sieve: A New Complexity for the Medium Prime Case (from CRYPTO 2015)
Taechan Kim (NTT)
p. 75

COMP2016-46
[Invited Talk] The SKINNY Family of Block Ciphers and its Low-Latency Variant MANTIS
Yu Sasaki (NTT)
p. 77

COMP2016-47
[Invited Talk] How small can the diameter of an undirected graph be? -- Toward low-latency large-scale interconnection networks --
Ikki Fujiwara (NICT)
p. 79

COMP2016-48
Reduction of Search Number for Equivalence Structure Extraction Under Equivalence Structure Conservation Assumption
Seiya Satoh (AIST), Yoshinobu Takahashi (University of Electro-Communications), Hiroshi Yamakawa (Dwango AI Lab)
pp. 81 - 86

COMP2016-49
Improvement of Finger Outlines Extraction in Hand Images Including Unusual Patterns with a Color Glove
Kotaro Moriuchi, Noriaki Fujishima (NIT, Matsue College)
pp. 87 - 91

Note: Each article is a technical report without peer review, and its polished version will be published elsewhere.


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan