IEICE Technical Committee Submission System
Conference Schedule
Online Proceedings
[Sign in]
Tech. Rep. Archives
    [Japanese] / [English] 
( Committee/Place/Topics  ) --Press->
 
( Paper Keywords:  /  Column:Title Auth. Affi. Abst. Keyword ) --Press->

Technical Committee on Information Theory (IT)  (Searched in: 2011)

Search Results: Keywords 'from:2011-07-21 to:2011-07-21'

[Go to Official IT Homepage (Japanese)] 
Search Results: Conference Papers
 Conference Papers (Available on Advance Programs)  (Sort by: Date Ascending)
 Results 1 - 14 of 14  /   
Committee Date Time Place Paper Title / Authors Abstract Paper #
IT 2011-07-21
14:00
Okayama Okayama University Security evaluation of HyRAL against Boomerang Attack
Tomoya Inoue, Toshinobu Kaneko (TUS) IT2011-10
HyRAL is the block cipher proposed by Hirata in 2010.
In this paper, we study security evaluation of HyRAL against Boom... [more]
IT2011-10
pp.1-6
IT 2011-07-21
14:25
Okayama Okayama University A Study on Key Estimation of Stream Cipher based on Probabilistic Inference Algorithm
Yuji Iikubo, Shunsuke Horii, Toshiyasu Matsushima (Waseda Univ.) IT2011-11
The stream cipher which is a kind of symmetric key algorithm, is a cryptosystem to generate ciphertext by XOR plaintext ... [more] IT2011-11
pp.7-12
IT 2011-07-21
14:50
Okayama Okayama University A Fast Parallel Software Implementation of SHA-1 on GPU(CUDA)
Takumi Mochizuki, Toshinobu Kaneko (TUS) IT2011-12
SHA-1 is Secure Hash Standard(SHS) developed by NIST.
We implement SHA-1 on GPU with CUDA.
To compare,it's implemented... [more]
IT2011-12
pp.13-18
IT 2011-07-21
15:15
Okayama Okayama University A study of statistical modeling of authentication using PUF
Satoru Ishii (Waseda Univ.), Takahiro Yoshida (Aoyama Univ.), Shunsuke Horii, Toshiyasu Matsushima (Waseda Univ.) IT2011-13
Nowadays, it is pointed out that storing the secret in nonvolatile memory of the device has a chance to leak the secret ... [more] IT2011-13
pp.19-24
IT 2011-07-21
16:00
Okayama Okayama University A Simple Technique for Bounding the Redundancy of Slepian-Wolf Coding
Shigeaki Kuzuoka (Wakayama Univ.) IT2011-14
In this paper, we give a simple technique for bounding the redundancy of both variable and fixed rate
Slepian-Wolf cod... [more]
IT2011-14
pp.25-30
IT 2011-07-21
16:25
Okayama Okayama University Signal Detection and Modulation Classification Based on Distribution Tests
Chiaki Honda, Ikuo Oka, Shingo Ata (Osaka City Univ) IT2011-15
Cognitive radio attracts much attention as a system to realize an efficient use of radio spectrum. In the cognitive radi... [more] IT2011-15
pp.31-34
IT 2011-07-22
09:30
Okayama Okayama University Strongly-Secure Secret Sharing based on Linear Codes Can Be Characterized by Generalized Hamming Weight
Jun Kurihara (Tokyo Inst. of Tech./KDDI R&D Labs), Tomohiko Uyematsu (Tokyo Inst. of Tech.) IT2011-16
 [more] IT2011-16
pp.35-40
IT 2011-07-22
09:55
Okayama Okayama University On ramp secret sharing schemes for distributed storage systems under repair dynamics -- Ramp Secret Sharing Schemes based on MBR Codes --
Masazumi Kurihara (UEC), Hidenori Kuwakado (Kobe Univ.) IT2011-17
In this paper, a construction method of ramp secret sharing systems based on minimum bandwidth regenerating(MBR) codes f... [more] IT2011-17
pp.41-46
IT 2011-07-22
10:20
Okayama Okayama University Paring-Friendly Curve over Extension Field of Degree r where r is The Group Order
Yuki Mori, Taichi Sumo, Yasuyuki Nogami (Okayama Univ.), Tomoko K. Matsushima (Polytechnic Univ.), Satoshi Uehara (Kitakyusyu City Univ.) IT2011-18
This paper considers the torsion group structure
when the extension degree of the definition field of
the non-supersin... [more]
IT2011-18
pp.47-52
IT 2011-07-22
11:00
Okayama Okayama University [Special Talk] On sparse signals
Yoshitaka Morikawa (Okayama Univ) IT2011-19
 [more] IT2011-19
pp.53-58
IT 2011-07-22
13:00
Okayama Okayama University Network Reliability of Random Graph
Akiyuki Yano, Tadashi Wadayama (NIT) IT2011-20
 [more] IT2011-20
pp.59-64
IT 2011-07-22
13:25
Okayama Okayama University A Method for Generating Two Independent Random Sequences by Independent Mappings for Two Correlated Sources
Shohei Kunimatsu, Tomohiko Uyematsu, Ryutaroh Matsumoto (Tokyo Tech) IT2011-21
Muramatsu et al. studied the problem of generating two independent random numbers by two independent mappings for two co... [more] IT2011-21
pp.65-70
IT 2011-07-22
13:50
Okayama Okayama University Asymptotics of Bayesian prediction for misspecified models
Nozomi Miya, Tota Suko, Goki Yasuda, Toshiyasu Matsushima (Waseda Univ.) IT2011-22
We consider the sequential prediction problem which is the prediction of the next symbol based on the sequential observa... [more] IT2011-22
pp.71-76
IT 2011-07-22
14:15
Okayama Okayama University The Quantum Teleportation by Using Quantum State Consisted by Even and Odd
Daiki Nakajima, Noboru Watanabe (Tokyo Univ. of Science) IT2011-23
In this paper,we consider the quantum telepotation by using the quantum orthogonal states consisting of Schrodinger cat ... [more] IT2011-23
pp.77-79
 Results 1 - 14 of 14  /   
Choose a download format for default settings. [NEW !!]
Text format pLaTeX format CSV format BibTeX format
Copyright and reproduction : All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan