IEICE Technical Committee Submission System
Conference Schedule
Online Proceedings
[Sign in]
Tech. Rep. Archives
    [Japanese] / [English] 
( Committee/Place/Topics  ) --Press->
 
( Paper Keywords:  /  Column:Title Auth. Affi. Abst. Keyword ) --Press->

All Technical Committee Conferences  (Searched in: All Years)

Search Results: Conference Papers
 Conference Papers (Available on Advance Programs)  (Sort by: Date Descending)
 Results 1 - 20 of 34  /  [Next]  
Committee Date Time Place Paper Title / Authors Abstract Paper #
ICSS, IPSJ-SPT 2020-03-02
13:30
Okinawa Okinawa-Ken-Seinen-Kaikan
(Cancelled but technical report was issued)
Implementation of aggregate message authentication and its evaluation
Atsuhiro Yamagishi, Yoshio Takeuchi (JDC), Tatsuya Takehisa, Hidekazu Nishiura, Zoa Jiafa (NISSIN), Yu Imamura (JDC), Junji Sikata (YNU), Shoichi Hirose (JDC), Koji Nakao (YNU), Yuko Ishida, Hideki Imai, Yasuo Hirata (JDC) ICSS2019-96
 [more] ICSS2019-96
pp.207-212
ICSS 2019-11-13
16:45
Miyazaki MRT Terrace(Miyazaki) Study on evaluation system for aggregate message authentication and its application to IoT systems
Atsuhiro Yamagishi, Yoshio Takeuchi (JDC), Tatsuya Takeuchi, Hidekazu Nishiura (Nissin), Yu Imamura (JDC), Junji Shikata (YNU), Shoichi Hirose (JDC), Koji Nakao (YNU), Yuko Ishida, Hideki Imai, Yasuo Hirata (JDC) ICSS2019-67
Utilization of Internet of things (IoT) devices has widely spread, and suppressing the increasing amount of data due to ... [more] ICSS2019-67
pp.41-46
QIT
(2nd)
2012-05-22
15:50
Fukui Fukui Univ. A Solution to the Mean King's Problem using Quantum Error-Correcting Codes
Masakazu Yoshida (Chuo Univ.), Takayuki Miyadera (Kyoto Univ.), Gen Kimura (Shibaura Inst. of Tech.), Hideki Imai (Chuo Univ.)
Mean King's problem is formulated as a quantum retrodiction problem for noncommutative observables. In this paper, we in... [more]
IT, ISEC, WBS 2012-03-01
10:55
Kanagawa   Object Verification System from Artifact-Metrics Based on Printed Ink Spread
Takanori Kobayashi, Takuya Nakamura, Hiroki Sato (Chuo Univ.), Nuttapong Attrapadung, Hideki Imai (AIST) IT2011-47 ISEC2011-74 WBS2011-48
Artifact-Metrics is the technology of attestation or a truth judging in which the feature peculiar to an artificial thin... [more] IT2011-47 ISEC2011-74 WBS2011-48
pp.9-13
IT, ISEC, WBS 2012-03-01
11:45
Kanagawa   Analysis of interdependency of information security in Japan
Ryouta Hishiki (Chuou Univ.), Bongkot Jenjarrussakul, Hideyuki Tanaka, Kanta Matsuura (Tokyo Univ.), Hideki Imai (Chuou Univ.) IT2011-49 ISEC2011-76 WBS2011-50
In the economy, the activities of the Internet is essential in all
industrial sector.

Therefore, it is also necessar... [more]
IT2011-49 ISEC2011-76 WBS2011-50
pp.23-29
IBISML 2010-11-04
15:00
Tokyo IIS, Univ. of Tokyo [Poster Presentation] Quantum Error Correction with Non-Binary LDPC Codes
Kenta Kasai (Tokyo Inst. of Tech.), Manabu Hagiwara (AIST), Hideki Imai (Chuo Univ.), Kohichi Sakaniwa (Tokyo Inst. of Tech.) IBISML2010-77
Quantum error correction is used in quantum computing and quantum communications to protect quantum information from qua... [more] IBISML2010-77
pp.135-145
IT 2010-09-22
10:55
Miyagi Tohoku Gakuin University Study on the performance of the entanglement distillation protocol using the quantum error correcting code
Masakazu Yoshida (Chuo Univ.), Manabu Hagiwara, Takayuki Miyadera (AIST), Hideki Imai (Chuo Univ./AIST) IT2010-42
Entangled states play crucial roles in the quantum communication. The entanglement distillation protocol enables us to s... [more] IT2010-42
pp.51-56
ISEC, IPSJ-CSEC, SITE, ICSS [detail] 2010-07-02
14:15
Aomori Hirosaki University Efficient Augmented PAK Protocols
SeongHan Shin, Kazukuni Kobara (AIST), Hideki Imai (Chuo Univ.) ISEC2010-32 SITE2010-28 ICSS2010-38
 [more] ISEC2010-32 SITE2010-28 ICSS2010-38
pp.167-172
IT, ISEC, WBS 2010-03-04
10:50
Nagano Nagano-Engineering Campus, Shinshu University About Security of Threshold Anonymous Password-Authenticated Key Exchange
SeongHan Shin, Kazukuni Kobara (AIST), Hideki Imai (Chuo Univ.) IT2009-75 ISEC2009-83 WBS2009-54
An anonymous password-authenticated key exchange protocol is
designed to provide both password-only authentication and ... [more]
IT2009-75 ISEC2009-83 WBS2009-54
pp.23-30
IT, ISEC, WBS 2010-03-05
09:00
Nagano Nagano-Engineering Campus, Shinshu University A Comparative Study of CPA and MIA on Side-channel Attack Standard Evaluation Boards
Asuka Taguchi, Yohei Hori, Hideki Imai (Chuo Univ.) IT2009-102 ISEC2009-110 WBS2009-81
Correlation Power Analysis (CPA) and Mutual Information Analysis (MIA)
are applied to the AES circuits implemented on ... [more]
IT2009-102 ISEC2009-110 WBS2009-81
pp.199-204
IT, ISEC, WBS 2010-03-05
11:40
Nagano Nagano-Engineering Campus, Shinshu University A Reader Only Attack on a MIFARE Classic
Satoru Imamura (Chuo Univ.), Takashi Kitagawa (Univ. of Tokyo.), Hideki Imai (Chuo Univ.) IT2009-108 ISEC2009-116 WBS2009-87
MIFARE Classic card is a contactless smart card which is one of the most popular on the market. For example, it is used ... [more] IT2009-108 ISEC2009-116 WBS2009-87
pp.241-246
IT, ISEC, WBS 2010-03-05
13:50
Nagano Nagano-Engineering Campus, Shinshu University Traitor Tracing system with Constant-size Public-key and Ciphertext using q-ary fingerprinting codes
Ying Zhang (Chuo Univ.), Takashi Kitagawa (Univ. of Tokyo.), Nuttapong Attrapadung (AIST), Hideki Imai (Chuo Univ/AIST) IT2009-110 ISEC2009-118 WBS2009-89
A traitor tracing system enables a publisher to trace a pirate decryption box to one of the secret keys used to create t... [more] IT2009-110 ISEC2009-118 WBS2009-89
pp.255-260
IT, ISEC, WBS 2010-03-05
14:15
Nagano Nagano-Engineering Campus, Shinshu University Experimental and Theoretical Evaluation of Wolf Fingerprint Using Statistical Information
Takuya Nakagawa, Hyunho Kang (Chuo Univ.), Shoko Yonezawa, Manabu Inuma, Akira Otsuka (AIST), Hideki Imai (Chuo Univ/AIST) IT2009-111 ISEC2009-119 WBS2009-90
Although the evaluation of biometric systems is often focusing on the
high performance matching approaches, it is not a... [more]
IT2009-111 ISEC2009-119 WBS2009-90
pp.261-268
ISEC, LOIS 2009-11-12
13:30
Gifu Gifu Univ. Constructing New Differential Path and Algebraic Cryptanalysis for Full-SHA-1
Makoto Sugita (NTT/AIST), Mitsuru Kawazoe (Osaka Prefecture Univ.), Hideki Imai (AIST/ Chuo Univ.) ISEC2009-51 LOIS2009-40
Since the cryptanalysis for SHA-1 was proposed [19], many improvements have been proposed. Recently a new result was pro... [more] ISEC2009-51 LOIS2009-40
pp.1-8
RECONF 2009-05-15
11:00
Fukui   Development and Evaluation of Cryptographic Hardware Generated by Behavior-level Synthesis
Yohei Hori, Mai Itoh (Chuo Univ.), Hideki Imai (Chuo Univ./AIST) RECONF2009-12
Cryptography is widely applied to various consumer electronics to
protect digital contents, users' privacy, product co... [more]
RECONF2009-12
pp.67-72
WBS, IT, ISEC 2009-03-10
15:15
Hokkaido Hakodate Mirai Univ. Multi-receiver Authentication Codes with Secrecy and Revocation Capability for Multiple Message Transmissions
Shinpei Chiba, Takahiro Yoshida (Chuo Univ), Nuttapong Attrapadung (AIST), Hideki Imai (Chuo Univ/AIST) IT2008-90 ISEC2008-148 WBS2008-103
In this paper,we consider an extension of Multi-receiver Authentication Codes for Multiple Message Transmissions(MRA-MMT... [more] IT2008-90 ISEC2008-148 WBS2008-103
pp.301-306
WBS, IT, ISEC 2009-03-10
15:15
Hokkaido Hakodate Mirai Univ. McEliece Digital Signature with LDPC codes -- Practicality and Security Evaluation --
Shigenori Yamakawa (Chuo Univ.), Yang Cui, Manabu Hagiwara, Kazukuni Kobara (AIST/Chuo Univ.), Hideki Imai (Chuo Univ./AIST) IT2008-126 ISEC2008-184 WBS2008-139
Most of the current public-key cryptosystems (PKCs) are considered to be broken if a quantum computer
is realized in th... [more]
IT2008-126 ISEC2008-184 WBS2008-139
pp.537-543
VLD, DC, IPSJ-SLDM, CPSY, RECONF, ICD, CPM
(Joint) [detail]
2008-11-18
15:20
Fukuoka Kitakyushu Science and Research Park Development of Side-channel Attack Standard Evaluation BOard and Tool
Yohei Hori, Toshihiro Katashita, Hirofumi Sakane, Kenji Toda, Akashi Satoh (National Institute of Advanced Industrial Science and Technology), Hideki Imai (Chuo Univ.) RECONF2008-54
Side-channel Attack Standard Evaluation BOards (SASEBO) and their
analysis tools are developed to provide uniform exp... [more]
RECONF2008-54
pp.87-92
IT 2008-09-11
17:30
Okinawa Culture Resort Festone (Okinawa) Consideration to Fast Simulation for Error Rate of Each Bit Position on LDPC Codes
Yuto Matsunaga (Chuo Univ.), Manabu Hagiwara, Hideki Imai (Chuo Univ./AIST) IT2008-27
This paper, we consider fast simulation for error rate of each bit position on LDPC Codes.QC LDPC Codes has a theorem th... [more] IT2008-27
pp.43-48
ISEC, SITE, IPSJ-CSEC 2007-07-19
16:35
Hokkaido Future University-Hakodate On Anonymous Password-Authenticated Key Exchange
SeongHan Shin, Kazukuni Kobara, Hideki Imai (AIST/Chuo Univ.) ISEC2007-37 SITE2007-31
An anonymous password-authenticated key exchange (PAKE) protocol is
designed to provide both user's password-based auth... [more]
ISEC2007-37 SITE2007-31
pp.145-151
 Results 1 - 20 of 34  /  [Next]  
Choose a download format for default settings. [NEW !!]
Text format pLaTeX format CSV format BibTeX format
Copyright and reproduction : All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan