IEICE Technical Committee Submission System
Conference Schedule
Online Proceedings
[Sign in]
Tech. Rep. Archives
    [Japanese] / [English] 
( Committee/Place/Topics  ) --Press->
 
( Paper Keywords:  /  Column:Title Auth. Affi. Abst. Keyword ) --Press->

Technical Committee on Information Security (ISEC)  (Searched in: 2014)

Search Results: Keywords 'from:2015-03-02 to:2015-03-02'

[Go to Official ISEC Homepage (Japanese)] 
Search Results: Conference Papers
 Conference Papers (Available on Advance Programs)  (Sort by: Date Ascending)
 Results 1 - 20 of 40  /  [Next]  
Committee Date Time Place Paper Title / Authors Abstract Paper #
ISEC, IT, WBS 2015-03-02
10:30
Fukuoka The University of Kitakyushu Accelerating QUAD Stream Cipher using Optimal Extension Field on GPU
Satoshi Tanaka (ISIT/Kyushu Univ.), Chen-Mou Cheng (Kyushu Univ.), Takanori Yasuda (ISIT), Kouichi Sakurai (ISIT/Kyushu Univ.) IT2014-62 ISEC2014-75 WBS2014-54
Evaluating non-linear multivariate polynomial systems over finite
fields is an important subroutine for QUAD stream cip... [more]
IT2014-62 ISEC2014-75 WBS2014-54
pp.1-4
ISEC, IT, WBS 2015-03-02
10:55
Fukuoka The University of Kitakyushu A Consideration of NTRU Whose Modular Polynomial Is All One Polynomial
Koki Misumi, Yasuyuki Nogami (Okayama Univ) IT2014-63 ISEC2014-76 WBS2014-55
Quantum computer will break most of recent public key cryptosystems by Shor's algorithm.
Post-quantum cryptosystem whic... [more]
IT2014-63 ISEC2014-76 WBS2014-55
pp.5-10
ISEC, IT, WBS 2015-03-02
11:20
Fukuoka The University of Kitakyushu Efficient Calculation of Pairing with Supersingular Curve on 2-dimentional Extension Field
Akito Kumano, Yasuyuki Nogami (Okayama Univ.), Masaaki Shirase (Future University Hakodate) IT2014-64 ISEC2014-77 WBS2014-56
 [more] IT2014-64 ISEC2014-77 WBS2014-56
pp.11-17
ISEC, IT, WBS 2015-03-02
13:15
Fukuoka The University of Kitakyushu On the construction of the nonlinear function-based stream cipher
Toru Sorimachi, Yusuke Naito (MITSUBISHI ELECTRIC) IT2014-65 ISEC2014-78 WBS2014-57
 [more] IT2014-65 ISEC2014-78 WBS2014-57
pp.19-24
ISEC, IT, WBS 2015-03-02
13:40
Fukuoka The University of Kitakyushu A Construction of Attribute-based Aggregate Signatures
Ryo Takahashi, Shingo Hasegawa, Shuji Isobe, Eisuke Koizumi, Hiroki Shizuya (Tohoku Univ.) IT2014-66 ISEC2014-79 WBS2014-58
Hohenberger, Sahai, Waters proposed the first identity-based aggregate signature which admits unrestricted aggregation b... [more] IT2014-66 ISEC2014-79 WBS2014-58
pp.25-32
ISEC, IT, WBS 2015-03-02
14:05
Fukuoka The University of Kitakyushu On the Limit of Security Proof for Homomorphic Encryption
Daiki Takahashi, Shingo Hasegawa, Shuji Isobe, Eisuke Koizumi, Hiroki Shizuya (Tohoku Univ.) IT2014-67 ISEC2014-80 WBS2014-59
In this paper, we explore on the limitation of security proofs for homomorphic encryptions.
We consider the computation... [more]
IT2014-67 ISEC2014-80 WBS2014-59
pp.33-38
ISEC, IT, WBS 2015-03-02
14:30
Fukuoka The University of Kitakyushu An Extension of the Polynomial Ring-based Fully Homomorphic Encryption Scheme to a Multikey Scheme
Tomoki Hayafuji, Masahiro Mambo (Kanazawa Univ.) IT2014-68 ISEC2014-81 WBS2014-60
Multikey homomorphic encryption is an extended variant of a single key homomorphic encryption where ciphertexts encrypte... [more] IT2014-68 ISEC2014-81 WBS2014-60
pp.39-46
ISEC, IT, WBS 2015-03-02
13:40
Fukuoka The University of Kitakyushu decoding error probability for q-ary linear block code with soft dicision demodulation
Takuya Kawashima, Kazuhiko Yamaguchi (UEC) IT2014-69 ISEC2014-82 WBS2014-61
Computing the error probability of soft decision decoding for linear
code are discussed and proposed. The method is ext... [more]
IT2014-69 ISEC2014-82 WBS2014-61
pp.47-52
ISEC, IT, WBS 2015-03-02
14:05
Fukuoka The University of Kitakyushu An Error Probability Analysis for QAM Classification by Two Amplitude Moments
Tomoaki Ono, Ikuo Oka, Shingo Ata (Osaka City Univ.) IT2014-70 ISEC2014-83 WBS2014-62
A signal detection and its classification are important to cognize radio environments, which include a radio wave monite... [more] IT2014-70 ISEC2014-83 WBS2014-62
pp.53-57
ISEC, IT, WBS 2015-03-02
14:30
Fukuoka The University of Kitakyushu SNR Estimation for QAM by Likelihood Mothods
Shinji Nishijima, Ikuo Oka, Shingo Ata (Osaka City Univ.) IT2014-71 ISEC2014-84 WBS2014-63
According to radio channel conditions, the adaptive system changes modulation, coding, or power dy- namically. The exact... [more] IT2014-71 ISEC2014-84 WBS2014-63
pp.59-62
ISEC, IT, WBS 2015-03-02
13:40
Fukuoka The University of Kitakyushu Channel Sounders for Acoustic Communications Employing Acoustic Electronic Equipment -- Basic Structure of Channel Sounders for Acoustic Communications --
Takahide Ichikawa, Takashi Shimizu, Dai Aizawa, Hiroshi Kubo (Ritsumeikan Univ) IT2014-72 ISEC2014-85 WBS2014-64
This paper discusses channel sounders, which estimate channel impulse response, using commercial electric acoustic equip... [more] IT2014-72 ISEC2014-85 WBS2014-64
pp.63-68
ISEC, IT, WBS 2015-03-02
14:05
Fukuoka The University of Kitakyushu Network Coded Phase Modulation and its Blind Startup Demodulation Using Per-Survivor Processing
Ryo Michio, Hiroshi Kubo (Ritsumeikan Univ) IT2014-73 ISEC2014-86 WBS2014-65
This paper proposes a network coded phase modulation (NWCPM) employing blind demodulation without known sequence for pha... [more] IT2014-73 ISEC2014-86 WBS2014-65
pp.69-74
ISEC, IT, WBS 2015-03-02
14:30
Fukuoka The University of Kitakyushu Block Differential Detection Employing Higher Order Channel Prediction for Multi-Carrier Differential Space-Time Block Coding
Kouki Nakamura, Ritsuko Miyazaki, Hiroshi Kubo (Ritsumeikan Univ.) IT2014-74 ISEC2014-87 WBS2014-66
This paper discusses multi-carrier modulation schemes in the presence of fast time-varying frequency selective fading. T... [more] IT2014-74 ISEC2014-87 WBS2014-66
pp.75-80
ISEC, IT, WBS 2015-03-02
15:10
Fukuoka The University of Kitakyushu Method of selecting anonymous communication circuit using a dynamic trust graph
Yuma Shinohara, Naoshi Kaneko, Tomohiko Saito, Kazuhiko Sumi (Aoyama Gakuin Univ.) IT2014-75 ISEC2014-88 WBS2014-67
Tor has become popular as a software that enables anonymous communication. Tor is a software that implements the "The se... [more] IT2014-75 ISEC2014-88 WBS2014-67
pp.81-88
ISEC, IT, WBS 2015-03-02
15:35
Fukuoka The University of Kitakyushu Analysis on isomorphism classes of elliptic curves subjected to GHS attack over prime degree extensions of finite fields with odd characteristic
Takayuki Hosogaya (Chuo Univ.), Tsutomu Iijima (Koden), Mahoro Shimura (Tokai Univ.), Jinhui Chao (Chuo Univ.) IT2014-76 ISEC2014-89 WBS2014-68
The GHS attack is known to map the discrete logarithm problem (DLP) in the Jacobian of a curve $C_0$ defined over the $d... [more] IT2014-76 ISEC2014-89 WBS2014-68
pp.89-95
ISEC, IT, WBS 2015-03-02
16:00
Fukuoka The University of Kitakyushu A Relation between Autocorrelations of Sequences Generated by the Logistic Map over Prime Fields and Loops whose Periods are Almost Same as Precisions
Takeru Miyazaki (The Univ. of Kitakyushu), Shunsuke Araki (Kyushu Inst. of Tech.), Satoshi Uehara (The Univ. of Kitakyushu), Yasuyuki Nogami (Okayama Univ.) IT2014-77 ISEC2014-90 WBS2014-69
Logistic map over prime fields is one of maps to calculate iteratively by using computers. Though a sequence generated b... [more] IT2014-77 ISEC2014-90 WBS2014-69
pp.97-102
ISEC, IT, WBS 2015-03-02
15:10
Fukuoka The University of Kitakyushu A Study of Two-dimensional Antidictionary Coding Using Automata
Takahiro Ota (NPIT), Hiroyoshi Morita (UEC) IT2014-78 ISEC2014-91 WBS2014-70
In one dimension, for an input string, an antidictionary is the set of all the minimal strings which do not appear in th... [more] IT2014-78 ISEC2014-91 WBS2014-70
pp.103-109
ISEC, IT, WBS 2015-03-02
15:35
Fukuoka The University of Kitakyushu (k,n)-Threshold Secret Sharing Schemes to Detect Substitution Attacks
Wataru Nakamura, Hirosuke Yamamoto (UTokyo) IT2014-79 ISEC2014-92 WBS2014-71
This paper treats $(k,n)$-threshold secret sharing schemes to detect substitution attacks. First a symbolwise coding sch... [more] IT2014-79 ISEC2014-92 WBS2014-71
pp.111-116
ISEC, IT, WBS 2015-03-02
16:00
Fukuoka The University of Kitakyushu Outage Capacity of a Two-User Interference Channel for Simultaneous Information and Energy Transfer
Yutaka Osawa, Ryutaroh Matsumoto, Tetsunao Matsuta, Tomohiko Uyematsu (Tokyo Tech) IT2014-80 ISEC2014-93 WBS2014-72
Wireless energy transfer is attracting more attention. A two-user interference channel for simultaneous information and ... [more] IT2014-80 ISEC2014-93 WBS2014-72
pp.117-122
ISEC, IT, WBS 2015-03-02
15:10
Fukuoka The University of Kitakyushu Empirical Study For High Precision Shape Estimation Using Phase Monopulse Method in UWB Radar
Masanobu Inoue, Yohei Oishi, Keiji Jimi, Isamu Matsunami (Kitakyusyu Univ.) IT2014-81 ISEC2014-94 WBS2014-73
Transmission antenna send a radio wave toward the target, and the reflected signal is received can be the target of imag... [more] IT2014-81 ISEC2014-94 WBS2014-73
pp.123-128
 Results 1 - 20 of 40  /  [Next]  
Choose a download format for default settings. [NEW !!]
Text format pLaTeX format CSV format BibTeX format
Copyright and reproduction : All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan