IEICE Technical Report

Print edition: ISSN 0913-5685      Online edition: ISSN 2432-6380

Volume 119, Number 474

Information Security

Workshop Date : 2020-03-10 - 2020-03-11 / Issue Date : 2020-03-03

[PREV] [NEXT]

[TOP] | [2016] | [2017] | [2018] | [2019] | [2020] | [2021] | [2022] | [Japanese] / [English]

[PROGRAM] [BULK PDF DOWNLOAD]


Table of contents

ISEC2019-86
How can blockchain technology contribute to the SDGs?
Mitsuyoshi Imamura (Tsukuba Univ.), Kazumasa Omote (Tsukuba Univ./NICT)
pp. 1 - 5

ISEC2019-87
Consideration on Kleptographic Attack on Cryptocurrency Monero
Sho Minami, Takashi Nishide (Tsukuba Univ.)
pp. 7 - 14

ISEC2019-88
Delegatable zero-knowledge proof systems with NIZap
Naoya Shiratori, Mitsuru Tada (Chiba Univ.)
pp. 15 - 22

ISEC2019-89
A lattice aggregate signature scheme without trapdoor
Koji Oi, Mitsuru Tada (Chiba Univ.)
pp. 23 - 30

ISEC2019-90
(See Japanese page.)
pp. 31 - 37

ISEC2019-91
Security of K(+)MVPKC Based on Message-Dependent Transformation -- Along With Proposal of K(++)CBPKC --
Masao Kasahara (Waseda Univ.)
pp. 39 - 44

ISEC2019-92
Efficient modular inversion by reducing Division Step
Masaya Ikeda, Atsuko Miyaji (Osaka Univ.)
pp. 45 - 50

ISEC2019-93
Improved Threshold Signature with Anonymity
Takuya Inomoto, Atsuko Miyaji (Osaka Univ.)
pp. 51 - 58

ISEC2019-94
[Invited Talk] Development of Path Shadowing Number Model and Prediction of Transmission Capacity in a 5G's Small Cell
Tokio Taga (Kwansei Gakuin Univ.)
pp. 59 - 64

ISEC2019-95
[Invited Talk] IMHO: connecting information theory to cybersecurity
Masakatsu Morii (Kobe Univ.)
p. 65

ISEC2019-96
Effectiveness of Image Steganography using Coding with Cost Function
Ryo Nakazawa, Shun Watanabe (TUAT)
pp. 67 - 72

ISEC2019-97
An Improved Learning Method for Weighted-BP using MAP-based Training Data Filtering
Ryota Yoshizawa, Kenichiro Furuta, Yuma Yoshinaga, Osamu Torii, Tomoya Kodama (Kioxia)
pp. 73 - 78

ISEC2019-98
(2,3)-Threshold Extended Visual Secret Sharing Schemes for QR Code
Naoya Okawa, Kouya Tochikubo (Nihon Univ.)
pp. 79 - 86

ISEC2019-99
Research on DNS tunnel detection by machine learning using appearance characters -- Consideration of implementation of evaluation program --
Tetsuya Asakura, Takeo Tatsumi (OUJ)
pp. 87 - 94

ISEC2019-100
A Statistical Decision-Theoretic Approach for Measuring Privacy Risk in Information Disclosure Problem
Alisa Miyashita, Akira Kamatsuka (Waseda Univ.), Takahiro Yoshida (Yokohama College of Commerce), Toshiyasu Matsushima (Waseda Univ.)
pp. 95 - 100

ISEC2019-101
Encoding Algorithm for Run Length-Limited Single Insertion/Deletion Correcting Code
Reona Takemoto, Takayuki Nozaki (Yamaguchi Univ.)
pp. 101 - 106

ISEC2019-102
Construction of Efficient Decodable Sequence-Subset Codes Based on Constant Weight Codes
Tomokazu Emoto, Takayuki Nozaki (Yamaguchi Univ.)
pp. 107 - 112

ISEC2019-103
Coding Theorems on the Simple Capacity for Digital Fingerprinting Codes
Hiroki Koga (Univ. Tsukuba)
pp. 113 - 120

ISEC2019-104
Security Evaluation of Differential Attacks against KCipher-2
Jin Hoki, Kosei Sakamoto (Hyogo Univ.), Kazuhiko Minematsu (NEC), Takanori Isobe (Hyogo Univ./NICT)
pp. 121 - 126

ISEC2019-105
Toward Differential Characteristic Search of AES by Annealing
Haruka Hirano, Shugo Kakimoto, Kazuki Yoneyama (Ibaraki Univ.), Junpei Yamaguchi (Fujitsu Lab.)
pp. 127 - 133

ISEC2019-106
Security Proof of Cryptographic Permutation Based on Ideal Ciphers
Ryota Nakamichi, Tetsu Iwata (Nagoya Univ.)
pp. 135 - 141

ISEC2019-107
A Remark on Improving Aggregate Message Authentication Codes with Detecting Functionality
Lu Cao, Shingo Sato, Junji Shikata (Yokohama National Univ.)
pp. 143 - 150

ISEC2019-108
Applying Machine Learning to Malware Detection in Mobile Applications
Yoshiki Kusama, Keiji Takeda, Kazuma Kobayashi, Osamu Nakamura (Keio Univ.), Lee Myoungje (LINE corp.)
pp. 151 - 157

ISEC2019-109
Aggregate MAC schemes for generating orders by series-parallel graphs
Yuta Ishii, Mitsuru Tada (Chiba Univ.)
pp. 159 - 166

ISEC2019-110
A Construction Method of Garbled Circuits for ZDD
Takayuki Masui, Hikaru Morita (Graduate Schoool, Kanagawa Univ)
pp. 167 - 170

ISEC2019-111
A fundamental study on identification of various drones using ultra-wideband radar
Takumi Mizushima, Ryohei Nakamura, Hisaya Hadama (NDA)
pp. 171 - 176

ISEC2019-112
An optical CDMA scheme combining modified prime sequence codes and bi-orthogonal codes
Kyohei Ono, Shoichiro Yamasaki, Tomoko K. Matsushima (Polytechnic Univ.)
pp. 177 - 182

ISEC2019-113
A note on orthogonal variable spreading factor codes based on polyphase sequences
Tomoko K. Matsushima, Shoichiro Yamasaki (Polytechnic Univ.)
pp. 183 - 188

ISEC2019-114
Experimental Evaluation of an Indoor Long Distance High Speed Imaging MIMO System
Akifumi Iwasa, Kentaro Kobayashi, Hiraku Okada, Masaaki Katayama (Nagoya Univ.)
pp. 189 - 194

ISEC2019-115
On the Existence of Bonds for Constrained Systems
Akiko Manada (SIT), Takahiro Ota (NPIT), Hiroyoshi Morita (UEC)
pp. 195 - 199

ISEC2019-116
A Note on the Relationship between Smooth Locally Decodable Codes and Private Information Retrieval
Koki Kazama, Akira Kamatsuka (Waseda Univ.), Takahiro Yoshida (Yokohama Col. of Commerce), Toshiyasu Matsushima (Waseda Univ.)
pp. 201 - 206

Note: Each article is a technical report without peer review, and its polished version will be published elsewhere.


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan