IEICE Technical Committee Submission System
Conference Schedule
Online Proceedings
[Sign in]
Tech. Rep. Archives
    [Japanese] / [English] 
( Committee/Place/Topics  ) --Press->
 
( Paper Keywords:  /  Column:Title Auth. Affi. Abst. Keyword ) --Press->

All Technical Committee Conferences  (Searched in: All Years)

Search Results: Conference Papers
 Conference Papers (Available on Advance Programs)  (Sort by: Date Descending)
 Results 21 - 36 of 36 [Previous]  /   
Committee Date Time Place Paper Title / Authors Abstract Paper #
LQE, OPE, OCS 2010-10-28
11:45
Fukuoka Mojiko Retro Town, Minato house Experimental demonstration of a Yuen-2000 (Y-00) prototype in the GbE communication of the local area network (LAN) of Tamagawa University
Fumio Futami, Osamu Hirota (Tamagawa University), Makoto Honda, Shigeto Akutsu, Katsuyoshi Harasawa (Hitachi Information & Communication Engineering) OCS2010-57 OPE2010-93 LQE2010-66
Although the current networks are playing an essential role in modern societies, the personal information and proprietar... [more] OCS2010-57 OPE2010-93 LQE2010-66
pp.25-30
NS, CS, IN
(Joint)
2010-09-03
11:15
Miyagi Tohoku University Method for Achieving Maximum Data Message Flow in Wireless Multihop Networks
Yuki Tatsuno, Hiroaki Higaki (Tokyo Denki Univ.) IN2010-57
For multimedia data message transmissions in wireless multihop networks, transmission capacity is reserved in wireless l... [more] IN2010-57
pp.79-84
ISEC 2010-05-21
14:15
Tokyo Kikai-Shinko-Kaikan Bldg. Comparing with feature of quantum stream cipher Y-00 and CPPM -- Cipher with randomization of chiphertext --
Masaki Sohma, Osamu Hirota (Tamagawa Univ.) ISEC2010-4
The basis of the information theoretic security of the symmetric ky cipher is based on the Shannon theory published in 1... [more] ISEC2010-4
pp.17-24
OPE, EMT, LQE, PN, IEE-EMT 2010-01-28
15:00
Kyoto   A proposal of secure photonic network based on quantum stream cipher Y-00 and its example -- Criticism against NICT quantum ICT committee --
Osamu Hirota, Satoki Kawanishi (Tamagawa Univ.) PN2009-42 OPE2009-180 LQE2009-162
A new threat for high speed photonic network that is a construction of data center of attackers is closed up. This paper... [more] PN2009-42 OPE2009-180 LQE2009-162
pp.41-46
CS, OCS
(Joint)
2010-01-29
11:20
Yamaguchi Kaikyo Messe Shimonoseki Effects introduced by Randomization for Intensity Modulated Y-00 Cryptosystem
Yuki Nagasako (IRI/Tamagawa Univ.) OCS2009-111
Yuen 2000 protocol (Y-00) designed by intensity modulation has advantages over phase modulated Y-00. However, it has bee... [more] OCS2009-111
pp.67-71
ISEC 2009-12-16
13:25
Tokyo Kikai-Shinko-Kaikan Bldg. Beyond the Shannon limit by quantum stream cipher Y-00 and Holevo-Sohma-Hirota theorem -- General proof --
Osamu Hirota (Tamagawa Univ.) ISEC2009-72
One of important problems in cryptography is to prove the existence of a cipher which can break the Shannon limit.
Yue... [more]
ISEC2009-72
pp.7-14
OPE, LQE, OCS 2009-10-22
16:35
Fukuoka   An Evaluation on Eavesdropper's Capability for Intensity Modulated Y-00 Cryptosystem
Yuki Nagasako (nternet Research Inst/Tamagawa Univ.) OCS2009-57 OPE2009-123 LQE2009-82
Yuen 2000 Protocol (Y-00) is a multi-signal level quantum transmission system that utilizes quantum noises to establish ... [more] OCS2009-57 OPE2009-123 LQE2009-82
pp.81-86
ISEC 2009-09-25
11:35
Tokyo Kikai-Shinko-Kaikan Bldg. Spy satellite system with quasi perfect secrecy by quantum stream cipher Y-00 -- Beyond the Shannon limit --
Osamu Hirota (Tamagawa Univ.) ISEC2009-42
It is well known that there is the Shannon limit for information theoretic security of the conventional symmetric key ci... [more] ISEC2009-42
pp.15-22
USN, IPSJ-UBI 2009-07-17
16:20
Kyoto ATR (Kyoto) On an Overhearing-based Data Transmission Reduction using Data Interpolation in Wireless Sensor Networks
Akimitsu Kanzaki (Osaka Univ.), Yuuki Iima (Nomura Research Inst.), Takahiro Hara, Shojiro Nishio (Osaka Univ.) USN2009-27
In this paper, we propose an traffic reduction method using overhearing of wireless communications in wireless sensor ne... [more] USN2009-27
pp.163-168
NS, OCS, PN
(Joint)
2009-06-25
16:25
Nagasaki Nagasaki Museum of History and Culture (Nagasaki) General discussion of randomizations for quantum stream cipher by Y-00
Osamu Hirota (Tamagawa Univ.) OCS2009-12
t is well known that there is the Shannon limit for the conventional symmetric key cipher. However, there is no proof su... [more] OCS2009-12
pp.11-16
PN, CS, OCS
(Joint)
2008-06-13
15:40
Hokkaido Chitose Institute of Science and Technology A possibility of information theoretic security of quantum stream cipher Y-00
Osamu Hirota (Tamagawa Univ.) OCS2008-17
Since Yuen 2000 protocol (Y-00) was introduced as a way of realizing Gauss-Yuen random cipher with the possibility of in... [more] OCS2008-17
pp.39-44
NLP 2007-08-07
10:45
Shizuoka   A note on sequence generation power of one-bit one-state cellular automata
Naoki Kamikawa, Hiroshi Umeo (OECU) NLP2007-56
A model of cellular automata(CA) was devised for studying self-reproduction by John von Neumann.
It is studied in many ... [more]
NLP2007-56
pp.19-24
OCS, PN, CS
(Joint)
2007-06-14
13:55
Hokkaido Chitose Inst. of Science and Technology Security evaluation system for quantum stream cipher by Y-00 protocol
Osamu Hirota (Tamagawa Univ.), Kiichi Yamashita (Kagosima Univ.), Katsuyoshi Harasawa (Hitachi ICE), Masaru Fuse (Panasonic), Kenichi Ohhata (Kagosima Univ) OCS2007-11
Recently a new quantum cryptography has been invented for high speed optical communication networks so called Yuen proto... [more] OCS2007-11
pp.7-12
NLP 2007-06-08
13:00
Hiroshima   A note on the class of sequences generated in real-time by one-bit two-state cellular automata
Naoki Kamikawa, Hiroshi Umeo (Osaka Electro-Communication UOsaka Electro-Communication Unniv.) NLP2007-11
A model of cellular automata (CA) was devised for studying self-reproduction by John von Neumann.
It is studied in many... [more]
NLP2007-11
pp.1-5
ISEC 2005-09-16
10:20
Tokyo Kikai-Shinko-Kaikan Bldg. Are attacks on Y-00(Optical communication Quantum Cryptography) the true attacks? PartII
Osamu Hirota (tamagawa Univ.)
In this letter, we clarify that the logic of the attack on Y-00 ( Yuen
protocol) by Imafuku, Imai, Nishioka, Hasegawa, ... [more]
ISEC2005-76
pp.1-6
IT, WBS, ISEC 2005-03-18
09:55
Kyoto Kyoto Univ. Is the attack to Y-00 optical communication quantum cryptography a true attack?
Osamu Hirota (Tamagawa Univ.)
In this letter, we clarify that the attack on Y-00 ( Yuen
protocol) by Nishioka and Imai group (Mitsubishi Electric Lt... [more]
IT2004-70 ISEC2004-126 WBS2004-185
pp.1-6
 Results 21 - 36 of 36 [Previous]  /   
Choose a download format for default settings. [NEW !!]
Text format pLaTeX format CSV format BibTeX format
Copyright and reproduction : All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan