Thu, Feb 28 AM Rm.301 Chair: ISEC 10:20 - 11:35 |
(1) |
10:20-10:45 |
A Method to Hide Traffic Flows Using Dummy Packets |
Mamoru Mimura, Yasuhiro Nakamura (NDA) |
(2) |
10:45-11:10 |
Secure Data Sharing in Mobile Environments |
Takashi Matsunaka, Takayuki Warabino, Yoji Kishi (KDDI R&D Labs.) |
(3) |
11:10-11:35 |
Random Oracle Model with Inspection of Hash List |
Kazuki Yoneyama, Satoshi Miyagawa, Kazuo Ohta (UEC) |
Thu, Feb 28 PM Invited Talk (Rm.301) 13:00 - 16:20 |
(4) |
13:00-14:00 |
[Invited Talk]
[Invitation Talk] The State of Stream Ciphers |
Masakatu Morii (Kobe Univ.) |
|
14:00-14:10 |
Break ( 10 min. ) |
(5) |
14:10-15:10 |
[Invited Talk]
Inter-Carrier Interference Cancellation in Mobile Reception of OFDM |
Makoto Itami (Tokyo Univ. of Sci) |
|
15:10-15:20 |
Break ( 10 min. ) |
(6) |
15:20-16:20 |
[Invited Talk]
Some Results on Secret Key Agreement from Correlated Source Outputs |
Jun Muramatsu (NTT) |
Thu, Feb 28 PM Rm.301 Chair: IT+ISEC 16:30 - 18:10 |
(7) |
16:30-16:55 |
A Knapsack Cryptosystem Using Two Operations (part 2) |
Kunikatsu Kobayashi, Atsushi Igarashi (Yamagata Univ.) |
(8) |
16:55-17:20 |
A Study on Error Correction Using Block Turbo Codes in Key Agreement Scheme Based on Radio Propagation |
Takayuki Shimizu, Hisato Iwai, Hideichi Sasaoka (Doshisha Univ.) |
(9) |
17:20-17:45 |
Conditions for Achieving a Revocable Network Coding Scheme |
Hidenori Kuwakado, Masakatu Morii (Kobe Univ.) |
(10) |
17:45-18:10 |
A Study on Efficient Scalar Multiplication for Elliptic Curve Cryptosystems |
Naoya Terashima, Tomoko K. Matsushima, Osamu Ashihara (Polytechnic Univ.) |
Thu, Feb 28 AM Rm.306 Chair: IT 10:45 - 12:00 |
(11) |
10:45-11:10 |
Secret key can be obtained from both compatible and incompatible measurements in the six-state QKD protocol |
Ryutaroh Matsumoto (Tokyo Inst. of Tech.) |
(12) |
11:10-11:35 |
Adaptive Sum-Product decoding to estimate the state of the channel |
Kenji Aikawa, Brian Kurkoski, Kazuhiko Yamaguchi (UEC) |
(13) |
11:35-12:00 |
A Decoding Algorithm and its Analysis for Low-Density Parity-Check Codes with Unequal-Error Protection Capabilities |
Makoto Nurita, Brian Kurkoski, Kazuhiko Yamaguchi (UEC) |
Thu, Feb 28 PM Rm.306 Chair: WBS 16:30 - 17:45 |
(14) |
16:30-16:55 |
An iterative signal detection scheme for MIMO SC-FDE using ISI canceller and MLD |
Masakazu Utsunomiya, Yasunori Iwanami, Eiji Okamoto (Nagoya Inst. of Tech) |
(15) |
16:55-17:20 |
A Single-Carrier Transmission Method with Frequency-Domain Equalizing and Space-Time Block Coding |
Shinichiro Miyazaki, Shoichiro Yamasaki (Polytechnic Univ.), Ryuji Kohno (Yokohama National Univ.) |
(16) |
17:20-17:45 |
The theoretical analysis of the slot selection push-type packet compensation protocol for the broadcasting system. |
Koichiro Hashiura, Hiromasa Habuchi (Ibaraki Univ) |
Fri, Feb 29 AM Rm.301 Chair: ISEC 08:30 - 10:10 |
(17) |
08:30-08:55 |
High-Precision Differential Side-channel Analysis Using Band-Pass Filter |
Toru Hisakado, Noritaka Yamashita, Tomoyasu Suzaki, Yukiyasu Tsunoo (NEC), Takahiko Shouji, Akira Nozawa, Takayuki Kimura (YDK) |
(18) |
08:55-09:20 |
Security evaluation of Enocoro-128 ver.1.1 against resynchronization attack |
Kei Konosu, Kenichiro Muto, Hiroki Furuichi (TUS), Dai Watanabe (Hitachi), Toshinobu Kaneko (TUS) |
(19) |
09:20-09:45 |
Side Channel Attacks from Signal Lines of Cryptographic Modules
-- Experiments for FPGA-Implemented AES -- |
Ryota Watanabe, Makoto Torikoshi, Yoshio Takahashi, Tsutomu Matsumoto (Yokohama National Univ.) |
(20) |
09:45-10:10 |
Security Analysis of DRBG Algorithm in NIST SP 800-90 |
Shoichi Hirose (Univ. of Fukui) |
Fri, Feb 29 AM Rm.301 Chair: IT+ISEC 10:20 - 12:00 |
(21) |
10:20-10:45 |
A Construction of Channel Code, Joint Source-Channel Code, and Universal Code for Arbitrary Stationary Memoryless Channels using Sparse Matrices |
Shigeki Miyake, Jun Muramatsu (NTT) |
(22) |
10:45-11:10 |
Secret Key Agreement by Reliability Information of Signals in Gaussian Maurer's Model |
Masashi Naito, Shun Watanabe, Ryutaroh Matsumoto, Tomohiko Uyematsu (Tokyo Inst. of Tech.) |
(23) |
11:10-11:35 |
Construction of Randomness Testing Based on T-Codes |
Kenji Hamano, Hirosuke Yamamoto (Tokyo Univ.) |
(24) |
11:35-12:00 |
A Lower Bound on the Number of Uncorrectable Errors of Weight Half the Minimum Distance |
Kenji Yasunaga, Toru Fujiwara (Osaka Univ.) |
Fri, Feb 29 PM Rm.301 Chair: ISEC 13:00 - 14:40 |
(25) |
13:00-13:25 |
New Classes of Public Key Cryptosystem Constructed on the Basis of Multivariate Polynomials and Random Coding
-- Another class of K(III)RSE(g)PKC -- |
Masao Kasahara (Osaka Gakuin Univ.) |
(26) |
13:25-13:50 |
RC4 Keystream Generator (1) |
Imaya, Masahiro Sukegawa, Atsuko Miyaji (JAIST) |
(27) |
13:50-14:15 |
New Weakness in Alleged RC4 Keystream Generator (2) |
Masahiro Sukegawa, Imaya, Atsuko Miyaji (JAIST) |
(28) |
14:15-14:40 |
A proposal of modified multi ring signature |
Mitsuaki Ikeda, Yutaka Kawai, Kazuo Ohta (UEC) |
Fri, Feb 29 PM Rm.301 Chair: ISEC 14:55 - 16:10 |
(29) |
14:55-15:20 |
A Construction of Partially Blind Signatures with Traceability |
Tsunemichi Chiba (Mitsubishi Electric CC), Eikoh Chida (Ichinoseki NCT), Masahiro Mambo (Univ. of Tsukuba), Hiroki Shizuya (Tohoku Univ.) |
(30) |
15:20-15:45 |
Quantum Secret Sharing Scheme for Amplitude Information |
Takeshi Okada, Hidenori Kuwakado, Masakatu Morii (Kobe Univ.) |
(31) |
15:45-16:10 |
a digital watermarking and its new decoding method with LDPC codes, having clipping tolorance
-- an application of cyclic LDPC codes and decoding using detailed reliability information -- |
Isao Abe, Raul Martinez-Noriega, Hyunho Kang, Brian Kurkoski, Kazuhiko Yamaguchi (UEC) |
Fri, Feb 29 AM Rm.306 Chair: WBS+IT 10:45 - 12:00 |
(32) |
10:45-11:10 |
Investigation on Suitable Code Parameters for Wavelength-Hopping Time-Spreading Optical CDMA Systems Using Generalized MPSCs and Optical Orthogonal Codes |
Tomoko K. Matsushima (Polytechnic Univ.), Noboru Ochiai (Ibaraki Pref. Academy of Industrial Tech.), Takeshi Nagao (Sansou Systems), Yasuaki Teramachi (Polytechnic Univ.) |
(33) |
11:10-11:35 |
Atmospheric optical multi-level PPM with two PN codes |
Yusuke Kozawa, Hiromasa Habuchi (Ibaraki Univ.) |
(34) |
11:35-12:00 |
A Study of Multiuser Space-Frequency Codes for OFDMA |
Tatsumi Konishi (Aichi Inst. of Tech.) |
Fri, Feb 29 PM Rm.306 Chair: IT 13:00 - 14:40 |
(35) |
13:00-13:25 |
Generalized Lengthened Codes and its Applications |
Yasuo Asakura, Masakatu Morii (Kobe Univ.) |
(36) |
13:25-13:50 |
Sliding Window Variation of Antidictionary Data Compression |
Takahiro Ota (PIT-nagano), Hiroyoshi Morita (UEC) |
(37) |
13:50-14:15 |
Network Error-Correcting Codes for Network with Delay |
Yoshito Yamada, Ryutaroh Matsumoto, Tomohiko Uyematsu (Tokyo Tech) |
(38) |
14:15-14:40 |
Concentrating Entanglement by Random Measurement |
Hachiro Fujita (Tokyo Metro Univ.) |
Fri, Feb 29 PM Rm.306 Chair: IT 14:55 - 16:10 |
(39) |
14:55-15:20 |
Near ML detection using Dijkstra's algorithm with bounded list size over MIMO channels |
Atsushi Okawado, Ryutaroh Matsumoto, Tomohiko Uyematsu (Tokyo Inst. of Tech.) |
(40) |
15:20-15:45 |
A Study on Time Domain Block Equallizer on MIMO Frequency Selective Channels |
Yusuke Takahashi, Yasunori Iwanami, Eiji Okamoto (Nitech) |
(41) |
15:45-16:10 |
Error Probability of Soft Decision Viterbi Decoding in Binary Tree Network Composed of Binary Symmetric Channels |
Shinji Tani, Ikuo Oka, Shingo Ata, Ken Hashimoto (Osaka City Univ.) |