Thu, Mar 16 AM 08:30 - 12:00 |
(1) |
08:30-08:55 |
UWB Propagation Channel Measurement in an Indoor Environment at Ka Band |
Yuko Rikuta (NICT), Suguru Fujita (Panasonic), Fumio Ohkubo, Hiroko Hosoya (NTT-AT), Kiyoshi Hamaguchi, Jun-ichi Takada, Takehiko Kobayashi (NICT) |
(2) |
08:55-09:20 |
Measurement based Evaluation of a 26GHz-band UWB communication system |
Kenichi Takizawa (NICT), Suguru Fujita (Panasonic), Yuko Rikuta, Kiyoshi Hamaguchi, Ryuji Kohno (NICT) |
(3) |
09:20-09:45 |
Inteference Mitigation Experiments Using Adaptation Template Wave in UWB Impulse Communication |
Makoto Hasegawa, Yoshihisa Hara, Kohei Ohno, Tetsushi Ikegami (Meiji Univ), Kenichi Takizawa, Ryuji Kohno (NICT) |
(4) |
09:45-10:10 |
Performance Evaluation of Wavelet OFDM under Narrowband Interference Environments |
Hideyuki Nishiyori, Daisuke Umehara, Yoshiteru Morihiro (Kyoto Univ.) |
|
10:10-10:20 |
Break ( 10 min. ) |
(5) |
10:20-10:45 |
Interference Mitigation Study for the Coexistence of Pulse Based UWB and Multi-Band OFDM |
Kohei Ohno, Tetsushi Ikegami (Meiji Univ.) |
(6) |
10:45-11:10 |
IQ Imbalance Compensation on MB-OFDM with Transmit Diversity |
Yohei Kato, Tsuyoshi Ikuno, Yukitoshi Sanada (Keio Univ.) |
(7) |
11:10-11:35 |
The Performance of Two Stage Acquisition Scheme for Impulsed-Based UWB System on the Multipath Environments |
Wataru Horie, Tomohito Inaba, Yukitoshi Sanada (Keio Univ.) |
(8) |
11:35-12:00 |
A study on the circuit with rapid acquisition and small tracking error for DSSS UWB radar |
Kenji Konda, Yasunori Iwanami, Eiji Okamoto (NIT), Hiroyuki Kida (JRC) |
Thu, Mar 16 PM 13:15 - 16:35 |
(9) |
13:15-14:15 |
[Invited Talk]
Acceleration of arithmetic in Galois fields by hardware support |
Naofumi Takagi (Nagoya Univ.) |
|
14:15-14:25 |
Break ( 10 min. ) |
(10) |
14:25-15:25 |
[Invited Talk]
Robust Reliable Radio for Industrial Communications |
Masaaki Katayama (Nagoya Univ.) |
|
15:25-15:35 |
Break ( 10 min. ) |
(11) |
15:35-16:35 |
[Invited Talk]
TBA |
Hirosuke Yamamoto (Univ. of Tokyo) |
|
16:35-16:45 |
Break ( 10 min. ) |
Thu, Mar 16 PM 16:45 - 18:00 |
(12) |
16:45-17:10 |
A Study on Generalized MPSCs for Synchronous Optical CDMA Systems |
Tomoko K. Matsushima, Yasuaki Teramachi (Polytechnic Univ.) |
(13) |
17:10-17:35 |
Evaluation and Implemetation of Visible Light CDMA Communication Systems using Generalized MPSC |
Takanori Ishikawa, Mera Diah Asri Suryaningtyas (Polytechnic Univ.), Takeshi Nagao (Sansou Systems), Tomoko K. Matsushima, Yasuaki Teramachi (Polytechnic Univ.) |
(14) |
17:35-18:00 |
Experiment on Hierarchical Coding Scheme for Parallel Optical Wireless Communications |
Kyoichiro Masuda, Takaya Yamazato, Hiraku Okada, Masaaki Katayama (Nagoya Univ.) |
Thu, Mar 16 AM 10:20 - 12:00 |
(15) |
10:20-10:45 |
Experimental Results on INSTAC-8 Compliant Board |
Yukiyasu Tsunoo, Toru Hisakado (NEC), Etsuko Tsujihara (Y.D.K.), Tsutomu Matsumoto (Yokohama National Univ.), Shinichi Kawamura, Kouichi Fujisaki (Toshiba) |
(16) |
10:45-11:10 |
Degradation of tamper resistant LSI by parameter variation of scaled devices and its countermeasures |
Hiroshi Yamauchi, Makoto Ikeda, Kunihiro Asada (Univ. of Tokyo) |
(17) |
11:10-11:35 |
Hardware Implemantation and Tamper Resistance Evaluation of a Hash Function |
Jun Kitahara, Katsuyuki Okeya (Hitachi) |
(18) |
11:35-12:00 |
A High-Resolution Waveform Analysis Based on Phase-Only Correlation and Its Application to Side-Channel Attacks |
Yuichi Imai, Naofumi Homma, Sei Nagashima, Takafumi Aoki (Tohoku Univ.), Akashi Satoh (IBM Japan) |
Thu, Mar 16 PM 16:45 - 18:00 |
(19) |
16:45-17:10 |
Complexity of Diffie-Hellman problems and its variants |
Kazunari Manabe, Shuji Isobe, Eisuke Koizumi, Masao Sakai, Hiroki Shizuya (Tohoku Univ.) |
(20) |
17:10-17:35 |
On the Complexity of the Closest Vector Problem for Regular Lattices |
Shingo Hasegawa, Shuji Isobe, Hiroki Shizuya (Tohoku Univ.), Yuichi Futa, Motoji Ohmori (Matsushita Elec. Ind.) |
(21) |
17:35-18:00 |
Complexity of abstract DDoS attack problems |
Daisuke Yokota, Shuji Isobe, Eisuke Koizumi, Masao Sakai, Hiroki Shizuya (Tohoku Univ.) |
Thu, Mar 16 AM 08:30 - 12:00 |
(22) |
08:30-08:55 |
A Generalized-LSB Embedding Model for Universal Lossless Data Embedding |
Hidetoshi Yokoo, Shingo Mamada (Gunma Univ.) |
(23) |
08:55-09:20 |
Universal Lossy Coding for Individual Sequences Based on Complexity Functions |
Shigeaki Kuzuoka, Tomohiko Uyematsu (Tokyo Inst. of Tech.) |
(24) |
09:20-09:45 |
Data Compression Using Source Model Based on Antidictionary Tree |
Takahiro Ota (Pit-Nagano), Hiroyoshi Morita (UEC) |
(25) |
09:45-10:10 |
On Construction of Reversible Variable-Length Codes Including Synchronization Markers as Codewords |
Dongzhao Sun, Hiroyoshi Morita, Mikihiko Nishiara (Univ. of Electro-Comm.) |
|
10:10-10:20 |
Break ( 10 min. ) |
(26) |
10:20-10:45 |
A Note on Multi-topic Document Classification Method Based upon Statistical Decision Theory |
Yasunari Maeda, Hideki Yoshida, Yoshitaka Fujiwara (Kitami Inst. of Tech.), Toshiyasu Matsushima (Waseda Univ.) |
(27) |
10:45-11:10 |
On stochastic model for generating process of codewords of arithmetic code |
Dai Watanabe, Mikihiko Nishiara, Hiroyoshi Morita (UEC) |
(28) |
11:10-11:35 |
Cross Correlation Matrices for Multiuser Chip-Asynchronous DS/CDMA systems |
Yutaka Jitsumatsu, Muhammad Tahir Abbas khan, Tohru Kohda (Kyushu Univ.) |
(29) |
11:35-12:00 |
Performance Analysis of Space-Time CDMA Systems over MIMO Rayleigh Fading Channels |
Dianjun Chen, Takeshi Hashimoto (Univ. of Electro-Comm.) |
Thu, Mar 16 PM 16:45 - 17:35 |
(30) |
16:45-17:10 |
Comparison between Gold-Sequence-Code and M-Sequence-Code for human voices in digital Watermarking method |
Satoshi Aoki, Kenji Nagasaka (Hosei univ) |
(31) |
17:10-17:35 |
An Algorithm for Computing the Hiding Capacity of Information Hiding |
Kensuke Yasui, Tota Suko, Toshiyasu Matsushima (Waseda Univ.) |
Fri, Mar 17 AM 08:30 - 10:10 |
(32) |
08:30-08:55 |
A Note on Correlation-based Watermarking Scheme Exploiting 1-D DCT |
Kiyotaka Baba, Hiromu Koda, Shojiro Sakata (UEC) |
(33) |
08:55-09:20 |
Nonlinear Precoding for Block Transmission |
Teruyuki Miyajima, Yan Weiwei (Ibaraki Univ.), Kazuhiko Nakamura (Yamanashi Univ.) |
(34) |
09:20-09:45 |
Study on stability of timing synchronization for wireless ad hoc networks |
Bin Zhu, Hidekazu Murata, Kiyomichi Araki (Tokyo Titech) |
(35) |
09:45-10:10 |
Robust BFDM/OQAM Receiver for Time-Frequency Dispersive Channels |
Bayarpurev Mongol, Takaya Yamazato, Hiraku Okada, Masaaki Katayama (Nagoya Univ.) |
|
10:10-10:20 |
Break ( 10 min. ) |
Fri, Mar 17 AM 10:20 - 12:00 |
(36) |
10:20-10:45 |
A study of maintaining the image quality of digital watermarking for binary images |
Kenta Kuroda, Kunikatsu Kobayashi (Yamagata Univ) |
(37) |
10:45-11:10 |
Proposal of Image Compensation Which Embeds Data for Compensation in An Image |
Takumi Sasaki, Kunikatsu Kobayashi (Yamagata Univ.) |
(38) |
11:10-11:35 |
Watermarking Method for Detecting Alteration of Digital Images Using Smearing-Desmearing and Wavelet Transforms |
Shunsuke Nakata, Toshiyuki Uto, Kenji Ohue (Ehime Univ.) |
(39) |
11:35-12:00 |
Video Watermarking Method Using Smearing-Desmearing and Wavelet Transforms |
Genta Furutsu, Toshiyuki Uto, Kenji Ohue (Ehime Univ.) |
Fri, Mar 17 PM 13:00 - 16:15 |
(40) |
13:00-13:25 |
A constant giving the maximum linear probability in arithmetic addition |
Hirotaka Ittogi (Canon), Toyonaga Tsukishima, Toshinobu Kaneko (TUS) |
(41) |
13:25-13:50 |
A Study on necessary numbers of plaintexts for Cache Attack with Average Method |
Yoshitaka Ikeda, Kozue Yamaguchi, Toshinobu Kaneko (Tokyo Univ. of Science) |
(42) |
13:50-14:15 |
Analysis of Tiger in Encryption Mode |
Hirotaka Yoshida (Hitachi), Alex Biryukov, Bart Preneel (Leuven), Dai Watanabe (Hitachi) |
(43) |
14:15-14:40 |
Not PGV constructions of compression function based on a block cipher |
Dai Watanabe, Hirotaka Yoshida (Hitachi) |
|
14:40-15:00 |
Break ( 20 min. ) |
(44) |
15:00-15:25 |
A Construction of Authenticated Encryption Algorithm Based on Stream Cipher MUGI and Its Security |
Dai Watanabe (sdl), Toshinobu Kaneko (tus) |
(45) |
15:25-15:50 |
On the Randomness Evaluation Method Using NIST Randomness Test |
Hidetoshi Okutomi, Manabu Kaneda (TOSHIBA INFORMATION SYSTEMS), Kenji Yamaguchi, Katsuhiro Nakamura (Chiba Univ.) |
(46) |
15:50-16:15 |
Design of a Stream Cipher using Efficient Clock Control |
Shinsaku Kiyomoto, Toshiaki Tanaka (KDDI R&D Labs.), Kouichi Sakurai (Kyushu Univ.) |
Fri, Mar 17 AM 09:45 - 12:00 |
(47) |
09:45-10:10 |
An Encryption Method for Multiple Receivers with Different Roles |
Yasuo Hatano, Kunihiko Miyazaki (Hitachi) |
|
10:10-10:20 |
Break ( 10 min. ) |
(48) |
10:20-10:45 |
Realization of the ID-based encryption scheme based on symmetric-key technique with Device characteristic value |
Hiromi Fukaya (Pastel), Kouichi Sakurai (CSCE) |
(49) |
10:45-11:10 |
A secure ID based authenticated key agreement with pairing |
Daisuke Moriyama, Jinhui Chao (Chuo Univ.) |
(50) |
11:10-11:35 |
An approach to Hierarchical Identity-Based Signature |
Jun Jikeya, Atsuko Miyaji (JAIST) |
(51) |
11:35-12:00 |
Efficient DPA-and-SPA Secure Scalar Elliptic Curve Multiplication with Pre-computed Tables |
Takeshi Kiyomiya, Atsuko Miyaji, Kenji Mizosoe (JAIST) |
Fri, Mar 17 PM 13:00 - 14:40 |
(52) |
13:00-13:25 |
K-Matrix Public-Key Cryptosystems Constructed Based on Random Coding Techinique
-- Along with a proporsal of new classes of SE(g)-PKC -- |
Masao Kasahara (Osaka Gakuin Univ.) |
(53) |
13:25-13:50 |
A factoring algorithm using multiple parabola and quadratic field |
Susumu Fujii, Kunikatsu Kobayashi (Yamagata Univ.) |
(54) |
13:50-14:15 |
A study on authentic method using a scheme of secret key agreement based on the radio channel characteristics |
Akito Kitaura, Hisato Iwai, Hideichi Sasaoka (Doshisha Univ.) |
(55) |
14:15-14:40 |
A proposal of authentication method for BB84 protocol |
Fumio Ohta, Hisayoshi Sato, Kazuo Takaragi (Hitachi) |
Fri, Mar 17 AM 08:30 - 11:35 |
(56) |
08:30-08:55 |
Stopping set Distribution of Multi-Edge type LDPC Code Ensembles |
Tatsuya Okubo, Kenta Kasai, Yuji Shimoyama, Kohichi Sakaniwa (Tokyo Tech.) |
(57) |
08:55-09:20 |
Second Support Weight Distribution of Regular LDPC Code Ensembles |
Takayuki Itsui, Kenta Kasai, Ryoji Ikegaya (Tokyo Inst. of Tech.), Tomoharu Shibuya (NIME), Kohichi Sakaniwa (Tokyo Inst. of Tech.) |
(58) |
09:20-09:45 |
A Modification Method for Constructing Low-Density Parity-Check Codes for Burst Erasures |
Gou Hosoya, Hideki Yagi, Toshiyasu Matsushima, Shigeichi Hirasawa (Waseda Univ.) |
(59) |
09:45-10:10 |
Cyclic LDPC codes for Burst Correction |
Shumei Song, Shu Lin, Khaled Abdel-Ghaffar (Univ. of California) |
|
10:10-10:20 |
Break ( 10 min. ) |
(60) |
10:20-10:45 |
Studies on low rate concatenated codes based on turbo-like codes |
Noriyuki Shimanuki, Brian Kurkoski, Kazuhiko Yamaguchi (UEC) |
(61) |
10:45-11:10 |
Fast Simulation Method for Turbo Codes over Non-Gaussian Noise Channel
-- Simulation Method Related to Optimal Simulation Probability Density Function -- |
Takakazu Sakai (Kitami Inst. of Tech.) |
(62) |
11:10-11:35 |
Improvement of Water Fall region characteristics of serially concatenated trellis-coded modulation |
Daisuke Kobayashi, Toshiyuki Shohon, Haruo Ogiwara (Nagaoka Univ. of Tech.) |
Fri, Mar 17 PM 13:25 - 16:40 |
(63) |
13:25-13:50 |
Performance of high dimensional parity check codes with high code rate |
Satoru Kose, Hiroshi Kamabe (Gifu Univ.) |
(64) |
13:50-14:15 |
On Basic Properties for Construction of High-Rate Constrained Code |
Koudai Hiyama, Hiroki Koga (Tsukuba Univ.) |
(65) |
14:15-14:40 |
Several Classes of Concatenated Quantum Codes: Constructions and Bounds |
Hachiro Fujita (Univ. of Tokyo) |
|
14:40-15:00 |
Break ( 20 min. ) |
(66) |
15:00-15:25 |
A Recursive Construction of Error-Correcting Signature Code for Multiple-Access Adder Channel |
Daisaku Toda, Jun Cheng, Yoichiro Watanabe (Doshisha Univ.) |
(67) |
15:25-15:50 |
Quadriphase E-Sequence generation and application |
Rongzhen Jin, Naoki Suehiro (Univ. of Tsukuba) |
(68) |
15:50-16:15 |
Information routing on the combination network and its applications |
Masazumi Kurihara, Takamichi Tateoka (UEC) |
(69) |
16:15-16:40 |
A high-efficiency Hybrid-ARQ scheme using channel quality estimation |
Makoto Takai, Hisato Iwai, Hideichi Sasaoka (Doshisha Univ.) |