IEICE Technical Committee Submission System
Advance Program
Online Proceedings
[Sign in]
Tech. Rep. Archives
 Go Top  Go Back   Prev ISEC Conf / Next ISEC Conf [HTML] / [HTML(simple)] / [TEXT]  [Japanese] / [English] 


Technical Committee on Information Security (ISEC) [schedule] [select]
Chair Shinichi Kawamura
Vice Chair Masakatsu Morii, Mitsuru Matsui
Secretary Shoichi Hirose, Hiroshi Doi
Assistant Shiho Moriai

Technical Committee on Information Theory (IT) [schedule] [select]
Chair Toshiyasu Matsushima
Vice Chair kin-ichiro Tokiwa
Secretary Toshiyuki Kohnosu, Tomoharu Shibuya

Technical Committee on Wideband System (WBS) [schedule] [select]
Chair Shinichi Tachikawa
Vice Chair Takehiko Kobayashi, Shinya Matsufuji
Secretary Kouji Ohuchi, Masanori Hamamura
Assistant Teruyuki Miyajima, Ken-ichi Takizawa

Conference Date Thu, Mar 16, 2006 08:30 - 18:00
Fri, Mar 17, 2006 08:30 - 16:40
Topics  
Conference Place Higashiyama Campus, Nagoya University 
Transportation Guide From Nagoya Railway Station: 20 min. by subway Higashiyama Line to Motoyama Station, then transfer to Meijo Line to Nagoya Daigaku Station.
http://www.nagoya-u.ac.jp/en/out/index_7.html
Contact
Person
Prof. Takaya Yamazato
052-789-2743

Thu, Mar 16 AM 
08:30 - 12:00
(1) 08:30-08:55 UWB Propagation Channel Measurement in an Indoor Environment at Ka Band Yuko Rikuta (NICT), Suguru Fujita (Panasonic), Fumio Ohkubo, Hiroko Hosoya (NTT-AT), Kiyoshi Hamaguchi, Jun-ichi Takada, Takehiko Kobayashi (NICT)
(2) 08:55-09:20 Measurement based Evaluation of a 26GHz-band UWB communication system Kenichi Takizawa (NICT), Suguru Fujita (Panasonic), Yuko Rikuta, Kiyoshi Hamaguchi, Ryuji Kohno (NICT)
(3) 09:20-09:45 Inteference Mitigation Experiments Using Adaptation Template Wave in UWB Impulse Communication Makoto Hasegawa, Yoshihisa Hara, Kohei Ohno, Tetsushi Ikegami (Meiji Univ), Kenichi Takizawa, Ryuji Kohno (NICT)
(4) 09:45-10:10 Performance Evaluation of Wavelet OFDM under Narrowband Interference Environments Hideyuki Nishiyori, Daisuke Umehara, Yoshiteru Morihiro (Kyoto Univ.)
  10:10-10:20 Break ( 10 min. )
(5) 10:20-10:45 Interference Mitigation Study for the Coexistence of Pulse Based UWB and Multi-Band OFDM Kohei Ohno, Tetsushi Ikegami (Meiji Univ.)
(6) 10:45-11:10 IQ Imbalance Compensation on MB-OFDM with Transmit Diversity Yohei Kato, Tsuyoshi Ikuno, Yukitoshi Sanada (Keio Univ.)
(7) 11:10-11:35 The Performance of Two Stage Acquisition Scheme for Impulsed-Based UWB System on the Multipath Environments Wataru Horie, Tomohito Inaba, Yukitoshi Sanada (Keio Univ.)
(8) 11:35-12:00 A study on the circuit with rapid acquisition and small tracking error for DSSS UWB radar Kenji Konda, Yasunori Iwanami, Eiji Okamoto (NIT), Hiroyuki Kida (JRC)
Thu, Mar 16 PM 
13:15 - 16:35
(9) 13:15-14:15 [Invited Talk]
Acceleration of arithmetic in Galois fields by hardware support
Naofumi Takagi (Nagoya Univ.)
  14:15-14:25 Break ( 10 min. )
(10) 14:25-15:25 [Invited Talk]
Robust Reliable Radio for Industrial Communications
Masaaki Katayama (Nagoya Univ.)
  15:25-15:35 Break ( 10 min. )
(11) 15:35-16:35 [Invited Talk]
TBA
Hirosuke Yamamoto (Univ. of Tokyo)
  16:35-16:45 Break ( 10 min. )
Thu, Mar 16 PM 
16:45 - 18:00
(12) 16:45-17:10 A Study on Generalized MPSCs for Synchronous Optical CDMA Systems Tomoko K. Matsushima, Yasuaki Teramachi (Polytechnic Univ.)
(13) 17:10-17:35 Evaluation and Implemetation of Visible Light CDMA Communication Systems using Generalized MPSC Takanori Ishikawa, Mera Diah Asri Suryaningtyas (Polytechnic Univ.), Takeshi Nagao (Sansou Systems), Tomoko K. Matsushima, Yasuaki Teramachi (Polytechnic Univ.)
(14) 17:35-18:00 Experiment on Hierarchical Coding Scheme for Parallel Optical Wireless Communications Kyoichiro Masuda, Takaya Yamazato, Hiraku Okada, Masaaki Katayama (Nagoya Univ.)
Thu, Mar 16 AM 
10:20 - 12:00
(15) 10:20-10:45 Experimental Results on INSTAC-8 Compliant Board Yukiyasu Tsunoo, Toru Hisakado (NEC), Etsuko Tsujihara (Y.D.K.), Tsutomu Matsumoto (Yokohama National Univ.), Shinichi Kawamura, Kouichi Fujisaki (Toshiba)
(16) 10:45-11:10 Degradation of tamper resistant LSI by parameter variation of scaled devices and its countermeasures Hiroshi Yamauchi, Makoto Ikeda, Kunihiro Asada (Univ. of Tokyo)
(17) 11:10-11:35 Hardware Implemantation and Tamper Resistance Evaluation of a Hash Function Jun Kitahara, Katsuyuki Okeya (Hitachi)
(18) 11:35-12:00 A High-Resolution Waveform Analysis Based on Phase-Only Correlation and Its Application to Side-Channel Attacks Yuichi Imai, Naofumi Homma, Sei Nagashima, Takafumi Aoki (Tohoku Univ.), Akashi Satoh (IBM Japan)
Thu, Mar 16 PM 
16:45 - 18:00
(19) 16:45-17:10 Complexity of Diffie-Hellman problems and its variants Kazunari Manabe, Shuji Isobe, Eisuke Koizumi, Masao Sakai, Hiroki Shizuya (Tohoku Univ.)
(20) 17:10-17:35 On the Complexity of the Closest Vector Problem for Regular Lattices Shingo Hasegawa, Shuji Isobe, Hiroki Shizuya (Tohoku Univ.), Yuichi Futa, Motoji Ohmori (Matsushita Elec. Ind.)
(21) 17:35-18:00 Complexity of abstract DDoS attack problems Daisuke Yokota, Shuji Isobe, Eisuke Koizumi, Masao Sakai, Hiroki Shizuya (Tohoku Univ.)
Thu, Mar 16 AM 
08:30 - 12:00
(22) 08:30-08:55 A Generalized-LSB Embedding Model for Universal Lossless Data Embedding Hidetoshi Yokoo, Shingo Mamada (Gunma Univ.)
(23) 08:55-09:20 Universal Lossy Coding for Individual Sequences Based on Complexity Functions Shigeaki Kuzuoka, Tomohiko Uyematsu (Tokyo Inst. of Tech.)
(24) 09:20-09:45 Data Compression Using Source Model Based on Antidictionary Tree Takahiro Ota (Pit-Nagano), Hiroyoshi Morita (UEC)
(25) 09:45-10:10 On Construction of Reversible Variable-Length Codes Including Synchronization Markers as Codewords Dongzhao Sun, Hiroyoshi Morita, Mikihiko Nishiara (Univ. of Electro-Comm.)
  10:10-10:20 Break ( 10 min. )
(26) 10:20-10:45 A Note on Multi-topic Document Classification Method Based upon Statistical Decision Theory Yasunari Maeda, Hideki Yoshida, Yoshitaka Fujiwara (Kitami Inst. of Tech.), Toshiyasu Matsushima (Waseda Univ.)
(27) 10:45-11:10 On stochastic model for generating process of codewords of arithmetic code Dai Watanabe, Mikihiko Nishiara, Hiroyoshi Morita (UEC)
(28) 11:10-11:35 Cross Correlation Matrices for Multiuser Chip-Asynchronous DS/CDMA systems Yutaka Jitsumatsu, Muhammad Tahir Abbas khan, Tohru Kohda (Kyushu Univ.)
(29) 11:35-12:00 Performance Analysis of Space-Time CDMA Systems over MIMO Rayleigh Fading Channels Dianjun Chen, Takeshi Hashimoto (Univ. of Electro-Comm.)
Thu, Mar 16 PM 
16:45 - 17:35
(30) 16:45-17:10 Comparison between Gold-Sequence-Code and M-Sequence-Code for human voices in digital Watermarking method Satoshi Aoki, Kenji Nagasaka (Hosei univ)
(31) 17:10-17:35 An Algorithm for Computing the Hiding Capacity of Information Hiding Kensuke Yasui, Tota Suko, Toshiyasu Matsushima (Waseda Univ.)
Fri, Mar 17 AM 
08:30 - 10:10
(32) 08:30-08:55 A Note on Correlation-based Watermarking Scheme Exploiting 1-D DCT Kiyotaka Baba, Hiromu Koda, Shojiro Sakata (UEC)
(33) 08:55-09:20 Nonlinear Precoding for Block Transmission Teruyuki Miyajima, Yan Weiwei (Ibaraki Univ.), Kazuhiko Nakamura (Yamanashi Univ.)
(34) 09:20-09:45 Study on stability of timing synchronization for wireless ad hoc networks Bin Zhu, Hidekazu Murata, Kiyomichi Araki (Tokyo Titech)
(35) 09:45-10:10 Robust BFDM/OQAM Receiver for Time-Frequency Dispersive Channels Bayarpurev Mongol, Takaya Yamazato, Hiraku Okada, Masaaki Katayama (Nagoya Univ.)
  10:10-10:20 Break ( 10 min. )
Fri, Mar 17 AM 
10:20 - 12:00
(36) 10:20-10:45 A study of maintaining the image quality of digital watermarking for binary images Kenta Kuroda, Kunikatsu Kobayashi (Yamagata Univ)
(37) 10:45-11:10 Proposal of Image Compensation Which Embeds Data for Compensation in An Image Takumi Sasaki, Kunikatsu Kobayashi (Yamagata Univ.)
(38) 11:10-11:35 Watermarking Method for Detecting Alteration of Digital Images Using Smearing-Desmearing and Wavelet Transforms Shunsuke Nakata, Toshiyuki Uto, Kenji Ohue (Ehime Univ.)
(39) 11:35-12:00 Video Watermarking Method Using Smearing-Desmearing and Wavelet Transforms Genta Furutsu, Toshiyuki Uto, Kenji Ohue (Ehime Univ.)
Fri, Mar 17 PM 
13:00 - 16:15
(40) 13:00-13:25 A constant giving the maximum linear probability in arithmetic addition Hirotaka Ittogi (Canon), Toyonaga Tsukishima, Toshinobu Kaneko (TUS)
(41) 13:25-13:50 A Study on necessary numbers of plaintexts for Cache Attack with Average Method Yoshitaka Ikeda, Kozue Yamaguchi, Toshinobu Kaneko (Tokyo Univ. of Science)
(42) 13:50-14:15 Analysis of Tiger in Encryption Mode Hirotaka Yoshida (Hitachi), Alex Biryukov, Bart Preneel (Leuven), Dai Watanabe (Hitachi)
(43) 14:15-14:40 Not PGV constructions of compression function based on a block cipher Dai Watanabe, Hirotaka Yoshida (Hitachi)
  14:40-15:00 Break ( 20 min. )
(44) 15:00-15:25 A Construction of Authenticated Encryption Algorithm Based on Stream Cipher MUGI and Its Security Dai Watanabe (sdl), Toshinobu Kaneko (tus)
(45) 15:25-15:50 On the Randomness Evaluation Method Using NIST Randomness Test Hidetoshi Okutomi, Manabu Kaneda (TOSHIBA INFORMATION SYSTEMS), Kenji Yamaguchi, Katsuhiro Nakamura (Chiba Univ.)
(46) 15:50-16:15 Design of a Stream Cipher using Efficient Clock Control Shinsaku Kiyomoto, Toshiaki Tanaka (KDDI R&D Labs.), Kouichi Sakurai (Kyushu Univ.)
Fri, Mar 17 AM 
09:45 - 12:00
(47) 09:45-10:10 An Encryption Method for Multiple Receivers with Different Roles Yasuo Hatano, Kunihiko Miyazaki (Hitachi)
  10:10-10:20 Break ( 10 min. )
(48) 10:20-10:45 Realization of the ID-based encryption scheme based on symmetric-key technique with Device characteristic value Hiromi Fukaya (Pastel), Kouichi Sakurai (CSCE)
(49) 10:45-11:10 A secure ID based authenticated key agreement with pairing Daisuke Moriyama, Jinhui Chao (Chuo Univ.)
(50) 11:10-11:35 An approach to Hierarchical Identity-Based Signature Jun Jikeya, Atsuko Miyaji (JAIST)
(51) 11:35-12:00 Efficient DPA-and-SPA Secure Scalar Elliptic Curve Multiplication with Pre-computed Tables Takeshi Kiyomiya, Atsuko Miyaji, Kenji Mizosoe (JAIST)
Fri, Mar 17 PM 
13:00 - 14:40
(52) 13:00-13:25 K-Matrix Public-Key Cryptosystems Constructed Based on Random Coding Techinique
-- Along with a proporsal of new classes of SE(g)-PKC --
Masao Kasahara (Osaka Gakuin Univ.)
(53) 13:25-13:50 A factoring algorithm using multiple parabola and quadratic field Susumu Fujii, Kunikatsu Kobayashi (Yamagata Univ.)
(54) 13:50-14:15 A study on authentic method using a scheme of secret key agreement based on the radio channel characteristics Akito Kitaura, Hisato Iwai, Hideichi Sasaoka (Doshisha Univ.)
(55) 14:15-14:40 A proposal of authentication method for BB84 protocol Fumio Ohta, Hisayoshi Sato, Kazuo Takaragi (Hitachi)
Fri, Mar 17 AM 
08:30 - 11:35
(56) 08:30-08:55 Stopping set Distribution of Multi-Edge type LDPC Code Ensembles Tatsuya Okubo, Kenta Kasai, Yuji Shimoyama, Kohichi Sakaniwa (Tokyo Tech.)
(57) 08:55-09:20 Second Support Weight Distribution of Regular LDPC Code Ensembles Takayuki Itsui, Kenta Kasai, Ryoji Ikegaya (Tokyo Inst. of Tech.), Tomoharu Shibuya (NIME), Kohichi Sakaniwa (Tokyo Inst. of Tech.)
(58) 09:20-09:45 A Modification Method for Constructing Low-Density Parity-Check Codes for Burst Erasures Gou Hosoya, Hideki Yagi, Toshiyasu Matsushima, Shigeichi Hirasawa (Waseda Univ.)
(59) 09:45-10:10 Cyclic LDPC codes for Burst Correction Shumei Song, Shu Lin, Khaled Abdel-Ghaffar (Univ. of California)
  10:10-10:20 Break ( 10 min. )
(60) 10:20-10:45 Studies on low rate concatenated codes based on turbo-like codes Noriyuki Shimanuki, Brian Kurkoski, Kazuhiko Yamaguchi (UEC)
(61) 10:45-11:10 Fast Simulation Method for Turbo Codes over Non-Gaussian Noise Channel
-- Simulation Method Related to Optimal Simulation Probability Density Function --
Takakazu Sakai (Kitami Inst. of Tech.)
(62) 11:10-11:35 Improvement of Water Fall region characteristics of serially concatenated trellis-coded modulation Daisuke Kobayashi, Toshiyuki Shohon, Haruo Ogiwara (Nagaoka Univ. of Tech.)
Fri, Mar 17 PM 
13:25 - 16:40
(63) 13:25-13:50 Performance of high dimensional parity check codes with high code rate Satoru Kose, Hiroshi Kamabe (Gifu Univ.)
(64) 13:50-14:15 On Basic Properties for Construction of High-Rate Constrained Code Koudai Hiyama, Hiroki Koga (Tsukuba Univ.)
(65) 14:15-14:40 Several Classes of Concatenated Quantum Codes: Constructions and Bounds Hachiro Fujita (Univ. of Tokyo)
  14:40-15:00 Break ( 20 min. )
(66) 15:00-15:25 A Recursive Construction of Error-Correcting Signature Code for Multiple-Access Adder Channel Daisaku Toda, Jun Cheng, Yoichiro Watanabe (Doshisha Univ.)
(67) 15:25-15:50 Quadriphase E-Sequence generation and application Rongzhen Jin, Naoki Suehiro (Univ. of Tsukuba)
(68) 15:50-16:15 Information routing on the combination network and its applications Masazumi Kurihara, Takamichi Tateoka (UEC)
(69) 16:15-16:40 A high-efficiency Hybrid-ARQ scheme using channel quality estimation Makoto Takai, Hisato Iwai, Hideichi Sasaoka (Doshisha Univ.)

Contact Address and Latest Schedule Information
ISEC Technical Committee on Information Security (ISEC)   [Latest Schedule]
Contact Address Shoichi Hirose(School of Engineering, The University of Fukui)
TEL0776-27-9738,FAX0776-27-9738
E--mail: ic-c (to ISEC secretaries) 
IT Technical Committee on Information Theory (IT)   [Latest Schedule]
Contact Address Tomoharu Shibuya (NIME)
TEL: 043-298-3253, FAX: 043-298-3482
E--mail: tbu 
WBS Technical Committee on Wideband System (WBS)   [Latest Schedule]
Contact Address Kouji Ohuchi (Shizuoka Univ.)
TEL/FAX: +81-53-478-1614
E--mail: douipc 


Last modified: 2006-03-08 13:23:04


Notification: Mail addresses are partially hidden against SPAM.

[Download Paper's Information (in Japanese)] <-- Press download button after click here.
 
[Cover and Index of IEICE Technical Report by Issue]
 

[Presentation and Participation FAQ] (in Japanese)
 

[Return to IT Schedule Page]   /   [Return to ISEC Schedule Page]   /   [Return to WBS Schedule Page]   /  
 
 Go Top  Go Back   Prev ISEC Conf / Next ISEC Conf [HTML] / [HTML(simple)] / [TEXT]  [Japanese] / [English] 


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan