Tue, Mar 10 AM 11:30 - 12:20 |
(1) |
11:30-11:55 |
How can blockchain technology contribute to the SDGs? |
Mitsuyoshi Imamura (Tsukuba Univ.), Kazumasa Omote (Tsukuba Univ./NICT) |
(2) |
11:55-12:20 |
Consideration on Kleptographic Attack on Cryptocurrency Monero |
Sho Minami, Takashi Nishide (Tsukuba Univ.) |
|
12:20-13:20 |
Break ( 60 min. ) |
Tue, Mar 10 PM 13:20 - 14:35 |
(3) |
13:20-13:45 |
Delegatable zero-knowledge proof systems with NIZap |
Naoya Shiratori, Mitsuru Tada (Chiba Univ.) |
(4) |
13:45-14:10 |
A lattice aggregate signature scheme without trapdoor |
Koji Oi, Mitsuru Tada (Chiba Univ.) |
(5) |
14:10-14:35 |
|
|
|
14:35-14:45 |
Break ( 10 min. ) |
Tue, Mar 10 PM 14:45 - 16:00 |
(6) |
14:45-15:10 |
Security of K(+)MVPKC Based on Message-Dependent Transformation
-- Along With Proposal of K(++)CBPKC -- |
Masao Kasahara (Waseda Univ.) |
(7) |
15:10-15:35 |
Efficient modular inversion by reducing Division Step |
Masaya Ikeda, Atsuko Miyaji (Osaka Univ.) |
(8) |
15:35-16:00 |
Improved Threshold Signature with Anonymity |
Takuya Inomoto, Atsuko Miyaji (Osaka Univ.) |
|
16:00-16:10 |
Break ( 10 min. ) |
Tue, Mar 10 PM 16:10 - 17:00 |
(9) |
16:10-17:00 |
[Invited Talk]
Development of Path Shadowing Number Model and Prediction of Transmission Capacity in a 5G's Small Cell |
Tokio Taga (Kwansei Gakuin Univ.) |
|
17:00-17:10 |
Break ( 10 min. ) |
Tue, Mar 10 PM 17:10 - 18:00 |
(10) |
17:10-18:00 |
[Invited Talk]
IMHO: connecting information theory to cybersecurity |
Masakatsu Morii (Kobe Univ.) |
Tue, Mar 10 AM 11:30 - 12:20 |
(11) |
11:30-11:55 |
Effectiveness of Image Steganography using Coding with Cost Function |
Ryo Nakazawa, Shun Watanabe (TUAT) |
(12) |
11:55-12:20 |
An Improved Learning Method for Weighted-BP using MAP-based Training Data Filtering |
Ryota Yoshizawa, Kenichiro Furuta, Yuma Yoshinaga, Osamu Torii, Tomoya Kodama (Kioxia) |
Tue, Mar 10 PM 13:00 - 14:15 |
(13) |
13:00-13:25 |
(2,3)-Threshold Extended Visual Secret Sharing Schemes for QR Code |
Naoya Okawa, Kouya Tochikubo (Nihon Univ.) |
(14) |
13:25-13:50 |
Research on DNS tunnel detection by machine learning using appearance characters
-- Consideration of implementation of evaluation program -- |
Tetsuya Asakura, Takeo Tatsumi (OUJ) |
(15) |
13:50-14:15 |
A Statistical Decision-Theoretic Approach for Measuring Privacy Risk in Information Disclosure Problem |
Alisa Miyashita, Akira Kamatsuka (Waseda Univ.), Takahiro Yoshida (Yokohama College of Commerce), Toshiyasu Matsushima (Waseda Univ.) |
|
14:15-14:25 |
Break ( 10 min. ) |
Tue, Mar 10 PM 14:25 - 15:40 |
(16) |
14:25-14:50 |
Encoding Algorithm for Run Length-Limited Single Insertion/Deletion Correcting Code |
Reona Takemoto, Takayuki Nozaki (Yamaguchi Univ.) |
(17) |
14:50-15:15 |
Construction of Efficient Decodable Sequence-Subset Codes Based on Constant Weight Codes |
Tomokazu Emoto, Takayuki Nozaki (Yamaguchi Univ.) |
(18) |
15:15-15:40 |
Coding Theorems on the Simple Capacity for Digital Fingerprinting Codes |
Hiroki Koga (Univ. Tsukuba) |
Wed, Mar 11 AM 09:30 - 11:10 |
(19) |
09:30-09:55 |
Security Evaluation of Differential Attacks against KCipher-2 |
Jin Hoki, Kosei Sakamoto (Hyogo Univ.), Kazuhiko Minematsu (NEC), Takanori Isobe (Hyogo Univ./NICT) |
(20) |
09:55-10:20 |
Toward Differential Characteristic Search of AES by Annealing |
Haruka Hirano, Shugo Kakimoto, Kazuki Yoneyama (Ibaraki Univ.), Junpei Yamaguchi (Fujitsu Lab.) |
(21) |
10:20-10:45 |
Security Proof of Cryptographic Permutation Based on Ideal Ciphers |
Ryota Nakamichi, Tetsu Iwata (Nagoya Univ.) |
(22) |
10:45-11:10 |
A Remark on Improving Aggregate Message Authentication Codes with Detecting Functionality |
Lu Cao, Shingo Sato, Junji Shikata (Yokohama National Univ.) |
|
11:10-11:20 |
Break ( 10 min. ) |
Wed, Mar 11 AM 11:20 - 12:35 |
(23) |
11:20-11:45 |
Applying Machine Learning to Malware Detection in Mobile Applications |
Yoshiki Kusama, Keiji Takeda, Kazuma Kobayashi, Osamu Nakamura (Keio Univ.), Lee Myoungje (LINE corp.) |
(24) |
11:45-12:10 |
Aggregate MAC schemes for generating orders by series-parallel graphs |
Yuta Ishii, Mitsuru Tada (Chiba Univ.) |
(25) |
12:10-12:35 |
A Construction Method of Garbled Circuits for ZDD |
Takayuki Masui, Hikaru Morita (Graduate Schoool, Kanagawa Univ) |
Wed, Mar 11 AM 09:30 - 11:10 |
(26) |
09:30-09:55 |
A fundamental study on identification of various drones using ultra-wideband radar |
Takumi Mizushima, Ryohei Nakamura, Hisaya Hadama (NDA) |
(27) |
09:55-10:20 |
An optical CDMA scheme combining modified prime sequence codes and bi-orthogonal codes |
Kyohei Ono, Shoichiro Yamasaki, Tomoko K. Matsushima (Polytechnic Univ.) |
(28) |
10:20-10:45 |
A note on orthogonal variable spreading factor codes based on polyphase sequences |
Tomoko K. Matsushima, Shoichiro Yamasaki (Polytechnic Univ.) |
(29) |
10:45-11:10 |
Experimental Evaluation of an Indoor Long Distance High Speed Imaging MIMO System |
Akifumi Iwasa, Kentaro Kobayashi, Hiraku Okada, Masaaki Katayama (Nagoya Univ.) |
|
11:10-11:20 |
Break ( 10 min. ) |
Wed, Mar 11 AM 11:20 - 12:10 |
(30) |
11:20-11:45 |
On the Existence of Bonds for Constrained Systems |
Akiko Manada (SIT), Takahiro Ota (NPIT), Hiroyoshi Morita (UEC) |
(31) |
11:45-12:10 |
A Note on the Relationship between Smooth Locally Decodable Codes and Private Information Retrieval |
Koki Kazama, Akira Kamatsuka (Waseda Univ.), Takahiro Yoshida (Yokohama Col. of Commerce), Toshiyasu Matsushima (Waseda Univ.) |