IEICE Technical Committee Submission System
Conference Schedule
Online Proceedings
[Sign in]
Tech. Rep. Archives
    [Japanese] / [English] 
( Committee/Place/Topics  ) --Press->
 
( Paper Keywords:  /  Column:Title Auth. Affi. Abst. Keyword ) --Press->

Technical Committee on Information Theory (IT)  (Searched in: 2007)

Search Results: Keywords 'from:2008-02-28 to:2008-02-28'

[Go to Official IT Homepage (Japanese)] 
Search Results: Conference Papers
 Conference Papers (Available on Advance Programs)  (Sort by: Date Ascending)
 Results 1 - 20 of 41  /  [Next]  
Committee Date Time Place Paper Title / Authors Abstract Paper #
ISEC, IT, WBS 2008-02-28
10:20
Tokyo   A Method to Hide Traffic Flows Using Dummy Packets
Mamoru Mimura, Yasuhiro Nakamura (NDA) IT2007-32 ISEC2007-129 WBS2007-63
Currently, some traffic analysis technologies with packet capturing are being developed to observe the usage of the netw... [more] IT2007-32 ISEC2007-129 WBS2007-63
pp.1-8
ISEC, IT, WBS 2008-02-28
10:45
Tokyo   Secure Data Sharing in Mobile Environments
Takashi Matsunaka, Takayuki Warabino, Yoji Kishi (KDDI R&D Labs.) IT2007-33 ISEC2007-130 WBS2007-64
This paper proposes an approach for sharing data securely on mobile terminals with members of a particular group. In mob... [more] IT2007-33 ISEC2007-130 WBS2007-64
pp.9-14
ISEC, IT, WBS 2008-02-28
11:10
Tokyo   Random Oracle Model with Inspection of Hash List
Kazuki Yoneyama, Satoshi Miyagawa, Kazuo Ohta (UEC) IT2007-34 ISEC2007-131 WBS2007-65
 [more] IT2007-34 ISEC2007-131 WBS2007-65
pp.15-21
ISEC, IT, WBS 2008-02-28
13:00
Tokyo   [Invited Talk] [Invitation Talk] The State of Stream Ciphers
Masakatu Morii (Kobe Univ.) IT2007-35 ISEC2007-132 WBS2007-66
The author has been working in the field of Network Security and Cryptography. Recently it is in stream cipher. This pap... [more] IT2007-35 ISEC2007-132 WBS2007-66
pp.23-30
ISEC, IT, WBS 2008-02-28
14:10
Tokyo   [Invited Talk] Inter-Carrier Interference Cancellation in Mobile Reception of OFDM
Makoto Itami (Tokyo Univ. of Sci) IT2007-36 ISEC2007-133 WBS2007-67
 [more] IT2007-36 ISEC2007-133 WBS2007-67
pp.31-37
ISEC, IT, WBS 2008-02-28
15:20
Tokyo   [Invited Talk] Some Results on Secret Key Agreement from Correlated Source Outputs
Jun Muramatsu (NTT) IT2007-37 ISEC2007-134 WBS2007-68
We consider the situation in which legitimate users Alice and Bob and an eavesdropper Eve each has access to a correlate... [more] IT2007-37 ISEC2007-134 WBS2007-68
pp.39-44
ISEC, IT, WBS 2008-02-28
16:30
Tokyo   A Knapsack Cryptosystem Using Two Operations (part 2)
Kunikatsu Kobayashi, Atsushi Igarashi (Yamagata Univ.) IT2007-38 ISEC2007-135 WBS2007-69
We propose a knapsack cryptosystem using two operations addition and multiplication. This knapsack cryptosystem is proof... [more] IT2007-38 ISEC2007-135 WBS2007-69
pp.45-48
ISEC, IT, WBS 2008-02-28
16:55
Tokyo   A Study on Error Correction Using Block Turbo Codes in Key Agreement Scheme Based on Radio Propagation
Takayuki Shimizu, Hisato Iwai, Hideichi Sasaoka (Doshisha Univ.) IT2007-39 ISEC2007-136 WBS2007-70
As a countermeasure scheme against eavesdroppers in wireless communications,
key agreement schemes, using an
ESPAR (El... [more]
IT2007-39 ISEC2007-136 WBS2007-70
pp.49-54
ISEC, IT, WBS 2008-02-28
17:20
Tokyo   Conditions for Achieving a Revocable Network Coding Scheme
Hidenori Kuwakado, Masakatu Morii (Kobe Univ.) IT2007-40 ISEC2007-137 WBS2007-71
In this paper,
we introduce the concept of revocation into network coding.
The revocation means that
a source can ... [more]
IT2007-40 ISEC2007-137 WBS2007-71
pp.55-58
ISEC, IT, WBS 2008-02-28
17:45
Tokyo   A Study on Efficient Scalar Multiplication for Elliptic Curve Cryptosystems
Naoya Terashima, Tomoko K. Matsushima, Osamu Ashihara (Polytechnic Univ.) IT2007-41 ISEC2007-138 WBS2007-72
Efficient elliptic curve arithmetic is crucial for cryptosystems based on elliptic curves. Such cryptosystems often requ... [more] IT2007-41 ISEC2007-138 WBS2007-72
pp.59-66
ISEC, IT, WBS 2008-02-28
10:45
Tokyo   Secret key can be obtained from both compatible and incompatible measurements in the six-state QKD protocol
Ryutaroh Matsumoto (Tokyo Inst. of Tech.) IT2007-43 ISEC2007-140 WBS2007-74
We give an example of a quantum channel over which
the six-state quantum key distribution protocol
allows the legitima... [more]
IT2007-43 ISEC2007-140 WBS2007-74
pp.73-75
ISEC, IT, WBS 2008-02-28
11:10
Tokyo   Adaptive Sum-Product decoding to estimate the state of the channel
Kenji Aikawa, Brian Kurkoski, Kazuhiko Yamaguchi (UEC) IT2007-44 ISEC2007-141 WBS2007-75
The combination of LDPC codes and sum-product decoding algorithm can
achieve performance near the Shannon limit. Howeve... [more]
IT2007-44 ISEC2007-141 WBS2007-75
pp.77-82
ISEC, IT, WBS 2008-02-28
11:35
Tokyo   A Decoding Algorithm and its Analysis for Low-Density Parity-Check Codes with Unequal-Error Protection Capabilities
Makoto Nurita, Brian Kurkoski, Kazuhiko Yamaguchi (UEC) IT2007-45 ISEC2007-142 WBS2007-76
Unequal-error protection codes have two or more levels of the error protection capability, and code bits can be protecte... [more] IT2007-45 ISEC2007-142 WBS2007-76
pp.83-88
ISEC, IT, WBS 2008-02-28
16:30
Tokyo   An iterative signal detection scheme for MIMO SC-FDE using ISI canceller and MLD
Masakazu Utsunomiya, Yasunori Iwanami, Eiji Okamoto (Nagoya Inst. of Tech) IT2007-46 ISEC2007-143 WBS2007-77
In this paper we have proposed a novel receiver structure using SC-FDE (Single-Carrier Frequency Domain Equalization), w... [more] IT2007-46 ISEC2007-143 WBS2007-77
pp.89-94
ISEC, IT, WBS 2008-02-28
16:55
Tokyo   A Single-Carrier Transmission Method with Frequency-Domain Equalizing and Space-Time Block Coding
Shinichiro Miyazaki, Shoichiro Yamasaki (Polytechnic Univ.), Ryuji Kohno (Yokohama National Univ.) IT2007-47 ISEC2007-144 WBS2007-78
A single career transmission method with frequency domain equalization is excellent in respect that the amplitude variab... [more] IT2007-47 ISEC2007-144 WBS2007-78
pp.95-98
ISEC, IT, WBS 2008-02-28
17:20
Tokyo   The theoretical analysis of the slot selection push-type packet compensation protocol for the broadcasting system.
Koichiro Hashiura, Hiromasa Habuchi (Ibaraki Univ) IT2007-48 ISEC2007-145 WBS2007-79
The purpose of this paper, to analyze the performance of the packet compensation protocol with slot selection. The slot ... [more] IT2007-48 ISEC2007-145 WBS2007-79
pp.99-103
ISEC, IT, WBS 2008-02-29
08:30
Tokyo   High-Precision Differential Side-channel Analysis Using Band-Pass Filter
Toru Hisakado, Noritaka Yamashita, Tomoyasu Suzaki, Yukiyasu Tsunoo (NEC), Takahiko Shouji, Akira Nozawa, Takayuki Kimura (YDK) IT2007-49 ISEC2007-146 WBS2007-80
In this paper, we describe high-precision method for differential side-channel analysis(DSCA) using a band-pass filter. ... [more] IT2007-49 ISEC2007-146 WBS2007-80
pp.1-6
ISEC, IT, WBS 2008-02-29
08:55
Tokyo   Security evaluation of Enocoro-128 ver.1.1 against resynchronization attack
Kei Konosu, Kenichiro Muto, Hiroki Furuichi (TUS), Dai Watanabe (Hitachi), Toshinobu Kaneko (TUS) IT2007-50 ISEC2007-147 WBS2007-81
Enocoro is a pseudorandom number generator for a stream cipher proposed by Hitachi,Ltd at ISEC in September, 2007.
In... [more]
IT2007-50 ISEC2007-147 WBS2007-81
pp.7-13
ISEC, IT, WBS 2008-02-29
09:20
Tokyo   Side Channel Attacks from Signal Lines of Cryptographic Modules -- Experiments for FPGA-Implemented AES --
Ryota Watanabe, Makoto Torikoshi, Yoshio Takahashi, Tsutomu Matsumoto (Yokohama National Univ.) IT2007-51 ISEC2007-148 WBS2007-82
 [more] IT2007-51 ISEC2007-148 WBS2007-82
pp.15-22
ISEC, IT, WBS 2008-02-29
09:45
Tokyo   Security Analysis of DRBG Algorithm in NIST SP 800-90
Shoichi Hirose (Univ. of Fukui) IT2007-52 ISEC2007-149 WBS2007-83
We discuss the security of HMAC_DRBG specified in NIST SP 800-90.
We show that HMAC_DRBG is a pseudorandom bit generato... [more]
IT2007-52 ISEC2007-149 WBS2007-83
pp.23-28
 Results 1 - 20 of 41  /  [Next]  
Choose a download format for default settings. [NEW !!]
Text format pLaTeX format CSV format BibTeX format
Copyright and reproduction : All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan