IEICE Technical Report

Print edition: ISSN 0913-5685      Online edition: ISSN 2432-6380

Volume 119, Number 473

Information Theory

Workshop Date : 2020-03-10 - 2020-03-11 / Issue Date : 2020-03-03

[PREV] [NEXT]

[TOP] | [2016] | [2017] | [2018] | [2019] | [2020] | [2021] | [2022] | [Japanese] / [English]

[PROGRAM] [BULK PDF DOWNLOAD]


Table of contents

IT2019-90
How can blockchain technology contribute to the SDGs?
Mitsuyoshi Imamura (Tsukuba Univ.), Kazumasa Omote (Tsukuba Univ./NICT)
pp. 1 - 5

IT2019-91
Consideration on Kleptographic Attack on Cryptocurrency Monero
Sho Minami, Takashi Nishide (Tsukuba Univ.)
pp. 7 - 14

IT2019-92
Delegatable zero-knowledge proof systems with NIZap
Naoya Shiratori, Mitsuru Tada (Chiba Univ.)
pp. 15 - 22

IT2019-93
A lattice aggregate signature scheme without trapdoor
Koji Oi, Mitsuru Tada (Chiba Univ.)
pp. 23 - 30

IT2019-94
(See Japanese page.)
pp. 31 - 37

IT2019-95
Security of K(+)MVPKC Based on Message-Dependent Transformation -- Along With Proposal of K(++)CBPKC --
Masao Kasahara (Waseda Univ.)
pp. 39 - 44

IT2019-96
Efficient modular inversion by reducing Division Step
Masaya Ikeda, Atsuko Miyaji (Osaka Univ.)
pp. 45 - 50

IT2019-97
Improved Threshold Signature with Anonymity
Takuya Inomoto, Atsuko Miyaji (Osaka Univ.)
pp. 51 - 58

IT2019-98
[Invited Talk] Development of Path Shadowing Number Model and Prediction of Transmission Capacity in a 5G's Small Cell
Tokio Taga (Kwansei Gakuin Univ.)
pp. 59 - 64

IT2019-99
[Invited Talk] IMHO: connecting information theory to cybersecurity
Masakatsu Morii (Kobe Univ.)
p. 65

IT2019-100
Effectiveness of Image Steganography using Coding with Cost Function
Ryo Nakazawa, Shun Watanabe (TUAT)
pp. 67 - 72

IT2019-101
An Improved Learning Method for Weighted-BP using MAP-based Training Data Filtering
Ryota Yoshizawa, Kenichiro Furuta, Yuma Yoshinaga, Osamu Torii, Tomoya Kodama (Kioxia)
pp. 73 - 78

IT2019-102
(2,3)-Threshold Extended Visual Secret Sharing Schemes for QR Code
Naoya Okawa, Kouya Tochikubo (Nihon Univ.)
pp. 79 - 86

IT2019-103
Research on DNS tunnel detection by machine learning using appearance characters -- Consideration of implementation of evaluation program --
Tetsuya Asakura, Takeo Tatsumi (OUJ)
pp. 87 - 94

IT2019-104
A Statistical Decision-Theoretic Approach for Measuring Privacy Risk in Information Disclosure Problem
Alisa Miyashita, Akira Kamatsuka (Waseda Univ.), Takahiro Yoshida (Yokohama College of Commerce), Toshiyasu Matsushima (Waseda Univ.)
pp. 95 - 100

IT2019-105
Encoding Algorithm for Run Length-Limited Single Insertion/Deletion Correcting Code
Reona Takemoto, Takayuki Nozaki (Yamaguchi Univ.)
pp. 101 - 106

IT2019-106
Construction of Efficient Decodable Sequence-Subset Codes Based on Constant Weight Codes
Tomokazu Emoto, Takayuki Nozaki (Yamaguchi Univ.)
pp. 107 - 112

IT2019-107
Coding Theorems on the Simple Capacity for Digital Fingerprinting Codes
Hiroki Koga (Univ. Tsukuba)
pp. 113 - 120

IT2019-108
Security Evaluation of Differential Attacks against KCipher-2
Jin Hoki, Kosei Sakamoto (Hyogo Univ.), Kazuhiko Minematsu (NEC), Takanori Isobe (Hyogo Univ./NICT)
pp. 121 - 126

IT2019-109
Toward Differential Characteristic Search of AES by Annealing
Haruka Hirano, Shugo Kakimoto, Kazuki Yoneyama (Ibaraki Univ.), Junpei Yamaguchi (Fujitsu Lab.)
pp. 127 - 133

IT2019-110
Security Proof of Cryptographic Permutation Based on Ideal Ciphers
Ryota Nakamichi, Tetsu Iwata (Nagoya Univ.)
pp. 135 - 141

IT2019-111
A Remark on Improving Aggregate Message Authentication Codes with Detecting Functionality
Lu Cao, Shingo Sato, Junji Shikata (Yokohama National Univ.)
pp. 143 - 150

IT2019-112
Applying Machine Learning to Malware Detection in Mobile Applications
Yoshiki Kusama, Keiji Takeda, Kazuma Kobayashi, Osamu Nakamura (Keio Univ.), Lee Myoungje (LINE corp.)
pp. 151 - 157

IT2019-113
Aggregate MAC schemes for generating orders by series-parallel graphs
Yuta Ishii, Mitsuru Tada (Chiba Univ.)
pp. 159 - 166

IT2019-114
A Construction Method of Garbled Circuits for ZDD
Takayuki Masui, Hikaru Morita (Graduate Schoool, Kanagawa Univ)
pp. 167 - 170

IT2019-115
A fundamental study on identification of various drones using ultra-wideband radar
Takumi Mizushima, Ryohei Nakamura, Hisaya Hadama (NDA)
pp. 171 - 176

IT2019-116
An optical CDMA scheme combining modified prime sequence codes and bi-orthogonal codes
Kyohei Ono, Shoichiro Yamasaki, Tomoko K. Matsushima (Polytechnic Univ.)
pp. 177 - 182

IT2019-117
A note on orthogonal variable spreading factor codes based on polyphase sequences
Tomoko K. Matsushima, Shoichiro Yamasaki (Polytechnic Univ.)
pp. 183 - 188

IT2019-118
Experimental Evaluation of an Indoor Long Distance High Speed Imaging MIMO System
Akifumi Iwasa, Kentaro Kobayashi, Hiraku Okada, Masaaki Katayama (Nagoya Univ.)
pp. 189 - 194

IT2019-119
On the Existence of Bonds for Constrained Systems
Akiko Manada (SIT), Takahiro Ota (NPIT), Hiroyoshi Morita (UEC)
pp. 195 - 199

IT2019-120
A Note on the Relationship between Smooth Locally Decodable Codes and Private Information Retrieval
Koki Kazama, Akira Kamatsuka (Waseda Univ.), Takahiro Yoshida (Yokohama Col. of Commerce), Toshiyasu Matsushima (Waseda Univ.)
pp. 201 - 206

Note: Each article is a technical report without peer review, and its polished version will be published elsewhere.


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan