Thu, Jul 21 PM 14:00 - 15:40 |
(1) |
14:00-14:25 |
Security evaluation of HyRAL against Boomerang Attack |
Tomoya Inoue, Toshinobu Kaneko (TUS) |
(2) |
14:25-14:50 |
A Study on Key Estimation of Stream Cipher based on Probabilistic Inference Algorithm |
Yuji Iikubo, Shunsuke Horii, Toshiyasu Matsushima (Waseda Univ.) |
(3) |
14:50-15:15 |
A Fast Parallel Software Implementation of SHA-1 on GPU(CUDA) |
Takumi Mochizuki, Toshinobu Kaneko (TUS) |
(4) |
15:15-15:40 |
A study of statistical modeling of authentication using PUF |
Satoru Ishii (Waseda Univ.), Takahiro Yoshida (Aoyama Univ.), Shunsuke Horii, Toshiyasu Matsushima (Waseda Univ.) |
|
15:40-16:00 |
Break ( 20 min. ) |
Thu, Jul 21 PM 16:00 - 16:50 |
(5) |
16:00-16:25 |
A Simple Technique for Bounding the Redundancy of Slepian-Wolf Coding |
Shigeaki Kuzuoka (Wakayama Univ.) |
(6) |
16:25-16:50 |
Signal Detection and Modulation Classification Based on Distribution Tests |
Chiaki Honda, Ikuo Oka, Shingo Ata (Osaka City Univ) |
Fri, Jul 22 AM 09:30 - 10:45 |
(7) |
09:30-09:55 |
Strongly-Secure Secret Sharing based on Linear Codes Can Be Characterized by Generalized Hamming Weight |
Jun Kurihara (Tokyo Inst. of Tech./KDDI R&D Labs), Tomohiko Uyematsu (Tokyo Inst. of Tech.) |
(8) |
09:55-10:20 |
On ramp secret sharing schemes for distributed storage systems under repair dynamics
-- Ramp Secret Sharing Schemes based on MBR Codes -- |
Masazumi Kurihara (UEC), Hidenori Kuwakado (Kobe Univ.) |
(9) |
10:20-10:45 |
Paring-Friendly Curve over Extension Field of Degree r where r is The Group Order |
Yuki Mori, Taichi Sumo, Yasuyuki Nogami (Okayama Univ.), Tomoko K. Matsushima (Polytechnic Univ.), Satoshi Uehara (Kitakyusyu City Univ.) |
|
10:45-11:00 |
Break ( 15 min. ) |
Fri, Jul 22 AM 11:00 - 11:55 |
(10) |
11:00-11:55 |
[Special Talk]
On sparse signals |
Yoshitaka Morikawa (Okayama Univ) |
|
11:55-13:00 |
Break ( 65 min. ) |
Fri, Jul 22 PM 13:00 - 14:40 |
(11) |
13:00-13:25 |
Network Reliability of Random Graph |
Akiyuki Yano, Tadashi Wadayama (NIT) |
(12) |
13:25-13:50 |
A Method for Generating Two Independent Random Sequences by Independent Mappings for Two Correlated Sources |
Shohei Kunimatsu, Tomohiko Uyematsu, Ryutaroh Matsumoto (Tokyo Tech) |
(13) |
13:50-14:15 |
Asymptotics of Bayesian prediction for misspecified models |
Nozomi Miya, Tota Suko, Goki Yasuda, Toshiyasu Matsushima (Waseda Univ.) |
(14) |
14:15-14:40 |
The Quantum Teleportation by Using Quantum State Consisted by Even and Odd |
Daiki Nakajima, Noboru Watanabe (Tokyo Univ. of Science) |