IEICE Technical Report

Print edition: ISSN 0913-5685      Online edition: ISSN 2432-6380

Volume 116, Number 505

Information Security

Workshop Date : 2017-03-09 - 2017-03-10 / Issue Date : 2017-03-02

[PREV] [NEXT]

[TOP] | [2013] | [2014] | [2015] | [2016] | [2017] | [2018] | [2019] | [Japanese] / [English]

[PROGRAM] [BULK PDF DOWNLOAD]


Table of contents

ISEC2016-89
A Note on Key Dependency of Stream Cipher Grain v1
Satoshi Kidokoro (Tokai Univ.), Takanori Isobe (Kobe Univ.), Toshihiro Ohigashi (Tokai Univ.)
pp. 1 - 6

ISEC2016-90
Obfuscation of Symmetric Key Cryptography using Linear Obfuscation
Gavin Lynn Stewart (JAIST), Yuichi Futa (TUT), Atsuko Miyaji (JAIST/Osaka Univ.)
pp. 7 - 14

ISEC2016-91
The Security of 3-Round RSA-OAEP against Related-Key Attacks
Gembu Ito, Hiraku Morita, Tetsu Iwata (Nagoya Univ.)
pp. 15 - 22

ISEC2016-92
[Invited Talk] Recent Advances in Whitebox Cryptgraphy -- Efficient and Robust Constructions and New Attacks --
Takanori Isobe (Sony Global M&O Corp.)
p. 23

ISEC2016-93
A consideration of Meet-in-the-middle Attack for Multiple Encryption Algorithm
Yohei Maezawa, Munetoshi Iwakiri (NDA)
pp. 25 - 31

ISEC2016-94
Security Analysis of Ordinary Isogeny Diffie--Hellman
Satoshi Furukawa, Atsushi Takayasu, Noboru Kunihiro (The Univ. of Tokyo)
pp. 33 - 40

ISEC2016-95
Elliptic Curves Subjected to the GHS Attack on Composite Degree Extension Fields of Odd Characteristic Part II
Tappei Kobayashi (Chuo Univ.), Tsutomu Iijima (Koden Electronics), Jinhui Chao (Chuo Univ.)
pp. 41 - 48

ISEC2016-96
On the Design of Locally Repairable Codes Based on Code Modification
Hiroto Tamiya (Kobe Univ.), Masanori Hirotomo (Saga Univ.), Masakatu Morii (Kobe Univ.)
pp. 49 - 53

ISEC2016-97
Sphere packing bound and Gilbert-Varshamov bound for b-symbol read channels
Seunghoan Song, Toru Fujiwara (Osaka Univ.)
pp. 55 - 60

ISEC2016-98
Trellis Reduction for Tail-Biting Convolutional Codes Using Characteristic Matrices and Cyclically Shifted Code-Subsequences
Masato Tajima
pp. 61 - 66

ISEC2016-99
Security evaluation of elliptic curve cryptosystems with special addition formula(2)
Ryohei Morishima (Osaka Univ.), Atsuko Miyaji (Osaka Univ./JAIST)
pp. 67 - 72

ISEC2016-100
Security evaluation of elliptic curve cryptosystems with special addition formula
Kodera Kenta (Osaka Univ.), Miyaji Atsuko (Osaka Univ./JAIST), Cheng Chen-Mou (Osaka Univ.)
pp. 73 - 78

ISEC2016-101
Construction of covering curves of elliptic curves over finite fields of even characteristic using simple extension
Seiya Kukisaki (Chuo Univ.), Mahoro Simura (Tokai Univ.), Jinhui Chao (Chuo Univ.)
pp. 79 - 83

ISEC2016-102
Construction of (2,...,2) coverings over projective line from elliptic curves over prime degree extension fields of even characteristic.
Takuya Morishita (Chuo Univ.), Mahoro Shimura (Tokai Univ.), Jinhui Chao (Chuo Univ.)
pp. 85 - 89

ISEC2016-103
A study on delay profile measurements using MB-OFDM-UWB signal and cross-correlation
Takuya Okamoto, Tetsushi Ikegami (Meiji Univ.)
pp. 91 - 96

ISEC2016-104
Multiuser Performance Evaluation on Square-law Detection DS-UWB-IR using Modified Pseudo-orthogonal M-sequence
Takuma Matsumura, Hiromasa Habuchi (Ibaraki Univ.)
pp. 97 - 102

ISEC2016-105
PAPR Reduction Scheme for OFCDM Using Code Shift Keying
Yuki Hosokawa, Hiromasa Habuchi (Ibaraki Univ.)
pp. 103 - 107

ISEC2016-106
Different Orthogonal Code DS/CDMA with High Spectral Efficiency and Evaluations by Interference Cancellation Using Indoor Radio Wave Intensity Distriburtion
Hirofumi Nakajo, Shin'ichi Tachikawa (NIT, Nagaoka)
pp. 109 - 113

ISEC2016-107
[Invited Talk] On the Wyner-Ziv Coding Problem with Delayed Side Information
Tetsunao Matsuta, Tomohiko Uyematsu (Tokyo Tech)
pp. 115 - 120

ISEC2016-108
Anonymous Oblivious RAM for Multi-user Environment
Satoru Takano, Su Chunhua, Atuko Miyaji (Osaka Univ.)
pp. 121 - 128

ISEC2016-109
A study of secure multi-party set union protocol
Katsunari Shishido, Atsuko Miyaji (OU)
pp. 129 - 135

ISEC2016-110
Software Protection by Hash-Table-Based Interlocking of Self Integrity Verification
Naoki Watanabe, Naoki Yoshida, Tsutomu Matsumoto (YNU)
pp. 137 - 144

ISEC2016-111
Diagonally Witness-Indistinguishable Proof Systems
Hiroaki Anada (Univ. Nagasaki), Seiko Arita (IISEC)
pp. 145 - 148

ISEC2016-112
Provable Secure Signature Scheme against Quantum Adversaries based on Decisional Isomorphism of Polynomials with Two Secrets
Bagus Santoso (UEC)
pp. 149 - 154

ISEC2016-113
Studies on evaluationg system for q-ary linear block codes based on q-input r-output symmetric channels(2)
Kyoshiro Furuya, Kazuhiko Yamaguchi (UEC)
pp. 155 - 160

ISEC2016-114
MRI Acceleration by Super Resolution
Ayaka Nakashima, Masanori Kawakita, Yutaka Jitsumatsu (Kyushu Univ.), Shigehide Kuhara (Kyorin Univ.), Jun'ichi Takeuchi (Kyushu Univ.)
pp. 161 - 166

ISEC2016-115
BER Prediction of Convolutional Coded OFDM Transmission with Application to IEEE 802.11 Wireless LAN
Norisato Suga, Naoto Egashira, Kazuto Yano, Tomoaki Kumagai (ATR)
pp. 167 - 172

ISEC2016-116
Overflow Probability of Variable-Length Codes Allowing Non-Vanishing Error Probability
Ryo Nomura (Senshu Univ.), Hideki Yagi (Univ. of Electro-Comm.)
pp. 173 - 178

ISEC2016-117
Notes on a new fundamental scheme K(V)Scheme for constructing secure product-sum PKC, K(V) ΣΠPKC and multivariate PKC, K(V)MVPKC
Masao Kasahara (Waseda Univ.)
pp. 179 - 185

ISEC2016-118
A Note on Acceptable Information Leakage of Searchable Symmetric Encryption
Takeshi Nakai, Takuya Nojima, Mitsugu Iwamoto, Kazuo Ohta (UEC)
pp. 187 - 193

ISEC2016-119
Efficient Verifiable Attribute-Based Keyword Search
Go Ohtake (NHK), Reihaneh Safavi-Naini (Univ. of Calgary), Liang Feng Zhang (ShanghaiTech Univ.)
pp. 195 - 202

ISEC2016-120
Index Coding with Information-Theoretic Secrecy for Unintended Message
Mami Takei, Hiroki Koga (Univ. Tsukuba)
pp. 203 - 208

ISEC2016-121
Spectrum Sensing in Cooperative with Some Secondary Users
Yuki Muranaka, Ryutaroh Matsumoto, Tetsunao Matsuta, Tomohiko Uyematsu (Tokyo Tech)
pp. 209 - 214

ISEC2016-122
Quantum Stabilizer Codes Can Realize Access Structures Impossible by Classical Secret Sharing
Ryutaroh Matsumoto (Tokyo Tech.)
pp. 215 - 216

ISEC2016-123
Secret Sharing Schemes using Modulo-2^m Operations
Hidenori Kuwakado (Kansai Univ.)
pp. 217 - 221

ISEC2016-124
Development of Security Incident Symptomatic Analysis function in SIAS
Mitsumu Katsuno, Hiroki Sakamoto, Hiroyuki Ookawa, Takashi Yamaguchi, Eiji Nunohiro (TUIS), Akira Orita, Tatsuya Sekiguchi (HISYS.ISR)
pp. 223 - 228

ISEC2016-125
Performance of Error Correcting Codes for RGB-LED Parallel Transmission
Ran Sun, Hiromasa Habuchi, Yusuke Kozawa (Ibaraki Univ.)
pp. 229 - 232

ISEC2016-126
Impact of Multi-Path Reflection on the Visible-Light Variable N-parallel Code-Shift Keying utilizing Modified Prime Sequence Code
Keisuke Osawa, Hiromasa Habuchi, Yusuke Kozawa (Ibaraki Univ.)
pp. 233 - 238

ISEC2016-127
A Study on Relay Communication using UAV with Buffer
Higashi Takahiro, Ochiai Hideki (Yokohama National Univ.)
pp. 239 - 244

ISEC2016-128
[Invited Talk] A Survey on Space-, Time-, and Frequency-Domain Index Modulation
Shinya Sugiura (TUAT)
pp. 245 - 249

Note: Each article is a technical report without peer review, and its polished version will be published elsewhere.


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan