Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
ISEC, IT, WBS |
2015-03-02 10:30 |
Fukuoka |
The University of Kitakyushu |
Accelerating QUAD Stream Cipher using Optimal Extension Field on GPU Satoshi Tanaka (ISIT/Kyushu Univ.), Chen-Mou Cheng (Kyushu Univ.), Takanori Yasuda (ISIT), Kouichi Sakurai (ISIT/Kyushu Univ.) IT2014-62 ISEC2014-75 WBS2014-54 |
Evaluating non-linear multivariate polynomial systems over finite
fields is an important subroutine for QUAD stream cip... [more] |
IT2014-62 ISEC2014-75 WBS2014-54 pp.1-4 |
ISEC, IT, WBS |
2015-03-02 10:55 |
Fukuoka |
The University of Kitakyushu |
A Consideration of NTRU Whose Modular Polynomial Is All One Polynomial Koki Misumi, Yasuyuki Nogami (Okayama Univ) IT2014-63 ISEC2014-76 WBS2014-55 |
Quantum computer will break most of recent public key cryptosystems by Shor's algorithm.
Post-quantum cryptosystem whic... [more] |
IT2014-63 ISEC2014-76 WBS2014-55 pp.5-10 |
ISEC, IT, WBS |
2015-03-02 11:20 |
Fukuoka |
The University of Kitakyushu |
Efficient Calculation of Pairing with Supersingular Curve on 2-dimentional Extension Field Akito Kumano, Yasuyuki Nogami (Okayama Univ.), Masaaki Shirase (Future University Hakodate) IT2014-64 ISEC2014-77 WBS2014-56 |
[more] |
IT2014-64 ISEC2014-77 WBS2014-56 pp.11-17 |
ISEC, IT, WBS |
2015-03-02 13:15 |
Fukuoka |
The University of Kitakyushu |
On the construction of the nonlinear function-based stream cipher Toru Sorimachi, Yusuke Naito (MITSUBISHI ELECTRIC) IT2014-65 ISEC2014-78 WBS2014-57 |
[more] |
IT2014-65 ISEC2014-78 WBS2014-57 pp.19-24 |
ISEC, IT, WBS |
2015-03-02 13:40 |
Fukuoka |
The University of Kitakyushu |
A Construction of Attribute-based Aggregate Signatures Ryo Takahashi, Shingo Hasegawa, Shuji Isobe, Eisuke Koizumi, Hiroki Shizuya (Tohoku Univ.) IT2014-66 ISEC2014-79 WBS2014-58 |
Hohenberger, Sahai, Waters proposed the first identity-based aggregate signature which admits unrestricted aggregation b... [more] |
IT2014-66 ISEC2014-79 WBS2014-58 pp.25-32 |
ISEC, IT, WBS |
2015-03-02 14:05 |
Fukuoka |
The University of Kitakyushu |
On the Limit of Security Proof for Homomorphic Encryption Daiki Takahashi, Shingo Hasegawa, Shuji Isobe, Eisuke Koizumi, Hiroki Shizuya (Tohoku Univ.) IT2014-67 ISEC2014-80 WBS2014-59 |
In this paper, we explore on the limitation of security proofs for homomorphic encryptions.
We consider the computation... [more] |
IT2014-67 ISEC2014-80 WBS2014-59 pp.33-38 |
ISEC, IT, WBS |
2015-03-02 14:30 |
Fukuoka |
The University of Kitakyushu |
An Extension of the Polynomial Ring-based Fully Homomorphic Encryption Scheme to a Multikey Scheme Tomoki Hayafuji, Masahiro Mambo (Kanazawa Univ.) IT2014-68 ISEC2014-81 WBS2014-60 |
Multikey homomorphic encryption is an extended variant of a single key homomorphic encryption where ciphertexts encrypte... [more] |
IT2014-68 ISEC2014-81 WBS2014-60 pp.39-46 |
ISEC, IT, WBS |
2015-03-02 13:40 |
Fukuoka |
The University of Kitakyushu |
decoding error probability for q-ary linear block code with soft dicision demodulation Takuya Kawashima, Kazuhiko Yamaguchi (UEC) IT2014-69 ISEC2014-82 WBS2014-61 |
Computing the error probability of soft decision decoding for linear
code are discussed and proposed. The method is ext... [more] |
IT2014-69 ISEC2014-82 WBS2014-61 pp.47-52 |
ISEC, IT, WBS |
2015-03-02 14:05 |
Fukuoka |
The University of Kitakyushu |
An Error Probability Analysis for QAM Classification by Two Amplitude Moments Tomoaki Ono, Ikuo Oka, Shingo Ata (Osaka City Univ.) IT2014-70 ISEC2014-83 WBS2014-62 |
A signal detection and its classification are important to cognize radio environments, which include a radio wave monite... [more] |
IT2014-70 ISEC2014-83 WBS2014-62 pp.53-57 |
ISEC, IT, WBS |
2015-03-02 14:30 |
Fukuoka |
The University of Kitakyushu |
SNR Estimation for QAM by Likelihood Mothods Shinji Nishijima, Ikuo Oka, Shingo Ata (Osaka City Univ.) IT2014-71 ISEC2014-84 WBS2014-63 |
According to radio channel conditions, the adaptive system changes modulation, coding, or power dy- namically. The exact... [more] |
IT2014-71 ISEC2014-84 WBS2014-63 pp.59-62 |
ISEC, IT, WBS |
2015-03-02 13:40 |
Fukuoka |
The University of Kitakyushu |
Channel Sounders for Acoustic Communications Employing Acoustic Electronic Equipment
-- Basic Structure of Channel Sounders for Acoustic Communications -- Takahide Ichikawa, Takashi Shimizu, Dai Aizawa, Hiroshi Kubo (Ritsumeikan Univ) IT2014-72 ISEC2014-85 WBS2014-64 |
This paper discusses channel sounders, which estimate channel impulse response, using commercial electric acoustic equip... [more] |
IT2014-72 ISEC2014-85 WBS2014-64 pp.63-68 |
ISEC, IT, WBS |
2015-03-02 14:05 |
Fukuoka |
The University of Kitakyushu |
Network Coded Phase Modulation and its Blind Startup Demodulation Using Per-Survivor Processing Ryo Michio, Hiroshi Kubo (Ritsumeikan Univ) IT2014-73 ISEC2014-86 WBS2014-65 |
This paper proposes a network coded phase modulation (NWCPM) employing blind demodulation without known sequence for pha... [more] |
IT2014-73 ISEC2014-86 WBS2014-65 pp.69-74 |
ISEC, IT, WBS |
2015-03-02 14:30 |
Fukuoka |
The University of Kitakyushu |
Block Differential Detection Employing Higher Order Channel Prediction for Multi-Carrier Differential Space-Time Block Coding Kouki Nakamura, Ritsuko Miyazaki, Hiroshi Kubo (Ritsumeikan Univ.) IT2014-74 ISEC2014-87 WBS2014-66 |
This paper discusses multi-carrier modulation schemes in the presence of fast time-varying frequency selective fading. T... [more] |
IT2014-74 ISEC2014-87 WBS2014-66 pp.75-80 |
ISEC, IT, WBS |
2015-03-02 15:10 |
Fukuoka |
The University of Kitakyushu |
Method of selecting anonymous communication circuit using a dynamic trust graph Yuma Shinohara, Naoshi Kaneko, Tomohiko Saito, Kazuhiko Sumi (Aoyama Gakuin Univ.) IT2014-75 ISEC2014-88 WBS2014-67 |
Tor has become popular as a software that enables anonymous communication. Tor is a software that implements the "The se... [more] |
IT2014-75 ISEC2014-88 WBS2014-67 pp.81-88 |
ISEC, IT, WBS |
2015-03-02 15:35 |
Fukuoka |
The University of Kitakyushu |
Analysis on isomorphism classes of elliptic curves subjected to GHS attack over prime degree extensions of finite fields with odd characteristic Takayuki Hosogaya (Chuo Univ.), Tsutomu Iijima (Koden), Mahoro Shimura (Tokai Univ.), Jinhui Chao (Chuo Univ.) IT2014-76 ISEC2014-89 WBS2014-68 |
The GHS attack is known to map the discrete logarithm problem (DLP) in the Jacobian of a curve $C_0$ defined over the $d... [more] |
IT2014-76 ISEC2014-89 WBS2014-68 pp.89-95 |
ISEC, IT, WBS |
2015-03-02 16:00 |
Fukuoka |
The University of Kitakyushu |
A Relation between Autocorrelations of Sequences Generated by the Logistic Map over Prime Fields and Loops whose Periods are Almost Same as Precisions Takeru Miyazaki (The Univ. of Kitakyushu), Shunsuke Araki (Kyushu Inst. of Tech.), Satoshi Uehara (The Univ. of Kitakyushu), Yasuyuki Nogami (Okayama Univ.) IT2014-77 ISEC2014-90 WBS2014-69 |
Logistic map over prime fields is one of maps to calculate iteratively by using computers. Though a sequence generated b... [more] |
IT2014-77 ISEC2014-90 WBS2014-69 pp.97-102 |
ISEC, IT, WBS |
2015-03-02 15:10 |
Fukuoka |
The University of Kitakyushu |
A Study of Two-dimensional Antidictionary Coding Using Automata Takahiro Ota (NPIT), Hiroyoshi Morita (UEC) IT2014-78 ISEC2014-91 WBS2014-70 |
In one dimension, for an input string, an antidictionary is the set of all the minimal strings which do not appear in th... [more] |
IT2014-78 ISEC2014-91 WBS2014-70 pp.103-109 |
ISEC, IT, WBS |
2015-03-02 15:35 |
Fukuoka |
The University of Kitakyushu |
(k,n)-Threshold Secret Sharing Schemes to Detect Substitution Attacks Wataru Nakamura, Hirosuke Yamamoto (UTokyo) IT2014-79 ISEC2014-92 WBS2014-71 |
This paper treats $(k,n)$-threshold secret sharing schemes to detect substitution attacks. First a symbolwise coding sch... [more] |
IT2014-79 ISEC2014-92 WBS2014-71 pp.111-116 |
ISEC, IT, WBS |
2015-03-02 16:00 |
Fukuoka |
The University of Kitakyushu |
Outage Capacity of a Two-User Interference Channel for Simultaneous Information and Energy Transfer Yutaka Osawa, Ryutaroh Matsumoto, Tetsunao Matsuta, Tomohiko Uyematsu (Tokyo Tech) IT2014-80 ISEC2014-93 WBS2014-72 |
Wireless energy transfer is attracting more attention. A two-user interference channel for simultaneous information and ... [more] |
IT2014-80 ISEC2014-93 WBS2014-72 pp.117-122 |
ISEC, IT, WBS |
2015-03-02 15:10 |
Fukuoka |
The University of Kitakyushu |
Empirical Study For High Precision Shape Estimation Using Phase Monopulse Method in UWB Radar Masanobu Inoue, Yohei Oishi, Keiji Jimi, Isamu Matsunami (Kitakyusyu Univ.) IT2014-81 ISEC2014-94 WBS2014-73 |
Transmission antenna send a radio wave toward the target, and the reflected signal is received can be the target of imag... [more] |
IT2014-81 ISEC2014-94 WBS2014-73 pp.123-128 |