IEICE Technical Report

Print edition: ISSN 0913-5685      Online edition: ISSN 2432-6380

Volume 116, Number 506

Wideband System

Workshop Date : 2017-03-09 - 2017-03-10 / Issue Date : 2017-03-02

[PREV] [NEXT]

[TOP] | [2013] | [2014] | [2015] | [2016] | [2017] | [2018] | [2019] | [Japanese] / [English]

[PROGRAM] [BULK PDF DOWNLOAD]


Table of contents

WBS2016-75
A Note on Key Dependency of Stream Cipher Grain v1
Satoshi Kidokoro (Tokai Univ.), Takanori Isobe (Kobe Univ.), Toshihiro Ohigashi (Tokai Univ.)
pp. 1 - 6

WBS2016-76
Obfuscation of Symmetric Key Cryptography using Linear Obfuscation
Gavin Lynn Stewart (JAIST), Yuichi Futa (TUT), Atsuko Miyaji (JAIST/Osaka Univ.)
pp. 7 - 14

WBS2016-77
The Security of 3-Round RSA-OAEP against Related-Key Attacks
Gembu Ito, Hiraku Morita, Tetsu Iwata (Nagoya Univ.)
pp. 15 - 22

WBS2016-78
[Invited Talk] Recent Advances in Whitebox Cryptgraphy -- Efficient and Robust Constructions and New Attacks --
Takanori Isobe (Sony Global M&O Corp.)
p. 23

WBS2016-79
A consideration of Meet-in-the-middle Attack for Multiple Encryption Algorithm
Yohei Maezawa, Munetoshi Iwakiri (NDA)
pp. 25 - 31

WBS2016-80
Security Analysis of Ordinary Isogeny Diffie--Hellman
Satoshi Furukawa, Atsushi Takayasu, Noboru Kunihiro (The Univ. of Tokyo)
pp. 33 - 40

WBS2016-81
Elliptic Curves Subjected to the GHS Attack on Composite Degree Extension Fields of Odd Characteristic Part II
Tappei Kobayashi (Chuo Univ.), Tsutomu Iijima (Koden Electronics), Jinhui Chao (Chuo Univ.)
pp. 41 - 48

WBS2016-82
On the Design of Locally Repairable Codes Based on Code Modification
Hiroto Tamiya (Kobe Univ.), Masanori Hirotomo (Saga Univ.), Masakatu Morii (Kobe Univ.)
pp. 49 - 53

WBS2016-83
Sphere packing bound and Gilbert-Varshamov bound for b-symbol read channels
Seunghoan Song, Toru Fujiwara (Osaka Univ.)
pp. 55 - 60

WBS2016-84
Trellis Reduction for Tail-Biting Convolutional Codes Using Characteristic Matrices and Cyclically Shifted Code-Subsequences
Masato Tajima
pp. 61 - 66

WBS2016-85
Security evaluation of elliptic curve cryptosystems with special addition formula(2)
Ryohei Morishima (Osaka Univ.), Atsuko Miyaji (Osaka Univ./JAIST)
pp. 67 - 72

WBS2016-86
Security evaluation of elliptic curve cryptosystems with special addition formula
Kodera Kenta (Osaka Univ.), Miyaji Atsuko (Osaka Univ./JAIST), Cheng Chen-Mou (Osaka Univ.)
pp. 73 - 78

WBS2016-87
Construction of covering curves of elliptic curves over finite fields of even characteristic using simple extension
Seiya Kukisaki (Chuo Univ.), Mahoro Simura (Tokai Univ.), Jinhui Chao (Chuo Univ.)
pp. 79 - 83

WBS2016-88
Construction of (2,...,2) coverings over projective line from elliptic curves over prime degree extension fields of even characteristic.
Takuya Morishita (Chuo Univ.), Mahoro Shimura (Tokai Univ.), Jinhui Chao (Chuo Univ.)
pp. 85 - 89

WBS2016-89
A study on delay profile measurements using MB-OFDM-UWB signal and cross-correlation
Takuya Okamoto, Tetsushi Ikegami (Meiji Univ.)
pp. 91 - 96

WBS2016-90
Multiuser Performance Evaluation on Square-law Detection DS-UWB-IR using Modified Pseudo-orthogonal M-sequence
Takuma Matsumura, Hiromasa Habuchi (Ibaraki Univ.)
pp. 97 - 102

WBS2016-91
PAPR Reduction Scheme for OFCDM Using Code Shift Keying
Yuki Hosokawa, Hiromasa Habuchi (Ibaraki Univ.)
pp. 103 - 107

WBS2016-92
Different Orthogonal Code DS/CDMA with High Spectral Efficiency and Evaluations by Interference Cancellation Using Indoor Radio Wave Intensity Distriburtion
Hirofumi Nakajo, Shin'ichi Tachikawa (NIT, Nagaoka)
pp. 109 - 113

WBS2016-93
[Invited Talk] On the Wyner-Ziv Coding Problem with Delayed Side Information
Tetsunao Matsuta, Tomohiko Uyematsu (Tokyo Tech)
pp. 115 - 120

WBS2016-94
Anonymous Oblivious RAM for Multi-user Environment
Satoru Takano, Su Chunhua, Atuko Miyaji (Osaka Univ.)
pp. 121 - 128

WBS2016-95
A study of secure multi-party set union protocol
Katsunari Shishido, Atsuko Miyaji (OU)
pp. 129 - 135

WBS2016-96
Software Protection by Hash-Table-Based Interlocking of Self Integrity Verification
Naoki Watanabe, Naoki Yoshida, Tsutomu Matsumoto (YNU)
pp. 137 - 144

WBS2016-97
Diagonally Witness-Indistinguishable Proof Systems
Hiroaki Anada (Univ. Nagasaki), Seiko Arita (IISEC)
pp. 145 - 148

WBS2016-98
Provable Secure Signature Scheme against Quantum Adversaries based on Decisional Isomorphism of Polynomials with Two Secrets
Bagus Santoso (UEC)
pp. 149 - 154

WBS2016-99
Studies on evaluationg system for q-ary linear block codes based on q-input r-output symmetric channels(2)
Kyoshiro Furuya, Kazuhiko Yamaguchi (UEC)
pp. 155 - 160

WBS2016-100
MRI Acceleration by Super Resolution
Ayaka Nakashima, Masanori Kawakita, Yutaka Jitsumatsu (Kyushu Univ.), Shigehide Kuhara (Kyorin Univ.), Jun'ichi Takeuchi (Kyushu Univ.)
pp. 161 - 166

WBS2016-101
BER Prediction of Convolutional Coded OFDM Transmission with Application to IEEE 802.11 Wireless LAN
Norisato Suga, Naoto Egashira, Kazuto Yano, Tomoaki Kumagai (ATR)
pp. 167 - 172

WBS2016-102
Overflow Probability of Variable-Length Codes Allowing Non-Vanishing Error Probability
Ryo Nomura (Senshu Univ.), Hideki Yagi (Univ. of Electro-Comm.)
pp. 173 - 178

WBS2016-103
Notes on a new fundamental scheme K(V)Scheme for constructing secure product-sum PKC, K(V) ΣΠPKC and multivariate PKC, K(V)MVPKC
Masao Kasahara (Waseda Univ.)
pp. 179 - 185

WBS2016-104
A Note on Acceptable Information Leakage of Searchable Symmetric Encryption
Takeshi Nakai, Takuya Nojima, Mitsugu Iwamoto, Kazuo Ohta (UEC)
pp. 187 - 193

WBS2016-105
Efficient Verifiable Attribute-Based Keyword Search
Go Ohtake (NHK), Reihaneh Safavi-Naini (Univ. of Calgary), Liang Feng Zhang (ShanghaiTech Univ.)
pp. 195 - 202

WBS2016-106
Index Coding with Information-Theoretic Secrecy for Unintended Message
Mami Takei, Hiroki Koga (Univ. Tsukuba)
pp. 203 - 208

WBS2016-107
Spectrum Sensing in Cooperative with Some Secondary Users
Yuki Muranaka, Ryutaroh Matsumoto, Tetsunao Matsuta, Tomohiko Uyematsu (Tokyo Tech)
pp. 209 - 214

WBS2016-108
Quantum Stabilizer Codes Can Realize Access Structures Impossible by Classical Secret Sharing
Ryutaroh Matsumoto (Tokyo Tech.)
pp. 215 - 216

WBS2016-109
Secret Sharing Schemes using Modulo-2^m Operations
Hidenori Kuwakado (Kansai Univ.)
pp. 217 - 221

WBS2016-110
Development of Security Incident Symptomatic Analysis function in SIAS
Mitsumu Katsuno, Hiroki Sakamoto, Hiroyuki Ookawa, Takashi Yamaguchi, Eiji Nunohiro (TUIS), Akira Orita, Tatsuya Sekiguchi (HISYS.ISR)
pp. 223 - 228

WBS2016-111
Performance of Error Correcting Codes for RGB-LED Parallel Transmission
Ran Sun, Hiromasa Habuchi, Yusuke Kozawa (Ibaraki Univ.)
pp. 229 - 232

WBS2016-112
Impact of Multi-Path Reflection on the Visible-Light Variable N-parallel Code-Shift Keying utilizing Modified Prime Sequence Code
Keisuke Osawa, Hiromasa Habuchi, Yusuke Kozawa (Ibaraki Univ.)
pp. 233 - 238

WBS2016-113
A Study on Relay Communication using UAV with Buffer
Higashi Takahiro, Ochiai Hideki (Yokohama National Univ.)
pp. 239 - 244

WBS2016-114
[Invited Talk] A Survey on Space-, Time-, and Frequency-Domain Index Modulation
Shinya Sugiura (TUAT)
pp. 245 - 249

Note: Each article is a technical report without peer review, and its polished version will be published elsewhere.


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan