Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
ISEC |
2017-09-04 15:20 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
Provably Secure Code-Based Signature Schemes via Fiat-Shamir Transform with Theoretical and Practical Analysis on Hash Encodings Taiyo Yamaguchi, Bagus Santoso (UEC) ISEC2017-46 |
In this paper, we propose signature schemes constructed from code-based identification scheme proposed by Stern via Fiat... [more] |
ISEC2017-46 pp.35-42 |
SS |
2017-03-09 11:50 |
Okinawa |
|
Equivalence Checking for Methods in Java and Its Applications Kozo Okano (Shinshu Univ.), Satoshi Harauchi (Mitsubishi Electric Corp.), Shinpei Ogata (Shinshu Univ.), Toshifusa Sekizawa (Nihon Univ.), Takeshi Obara (Shinshu Univ.) SS2016-65 |
A programmer sometimes implements both of equals method and hashCode method in a class of Java. The programmer should ob... [more] |
SS2016-65 pp.31-36 |
TL |
2016-12-17 14:00 |
Tokyo |
Room 303/304/305, Building #8, Waseda University |
From Twitter to Mainstream Usage
-- The Electronic Origins of A New Use of "Can" in Colloquial Singapore English -- Lan Yingjie (Cambridge Univ.) TL2016-52 |
In Standard English, can functions as a modal auxiliary. However, it has also been documented to have other functions in... [more] |
TL2016-52 pp.81-86 |
ISEC |
2015-09-04 10:55 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
Improvement of RainbowCrack Reduction Function Yuki Tabata, Keisuke Iwai, Hidema Tanaka, Takakazu Kurokawa (NDA) ISEC2015-26 |
Rainbow table is a method to crack the password in high speed from hash values. Rainbow table can crack passwords only i... [more] |
ISEC2015-26 pp.9-14 |
ISEC |
2015-09-04 11:20 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
High speed implementation of Hash function on GPU Nguyen Dat Thuong, Keisuke Iwai, Hidema Tanaka, Takakazu Kurokawa (NDA) ISEC2015-27 |
In order to protect the personal information and high confidential information, encryption technology and hash function ... [more] |
ISEC2015-27 pp.15-19 |
IA, ICSS |
2015-06-11 14:35 |
Fukuoka |
Kyushu Institute of Technology Univ. |
An Efficient Rainbow Table Compression Yuki Tabata, Keisuke Iwai, Hidema Tanaka, Takakazu Kurokawa (NDA) IA2015-3 ICSS2015-3 |
Rainbow table is a method to crack the password in high speed from hash values. Rainbow table can crack passwords only i... [more] |
IA2015-3 ICSS2015-3 pp.9-14 |
EMM |
2015-03-12 14:10 |
Okinawa |
|
[Poster Presentation]
A tamper detection scheme for JPEG2000 coded images using reversible data hiding Takeshi Ogasawara, Shoko Imaizumi, Naokazu Aoki, Hiroyuki Kobayashi (Chiba Univ.) EMM2014-82 |
This paper proposes an efficient tamper detection scheme for JPEG2000 coded images.
Marker codes that delimit a JPEG20... [more] |
EMM2014-82 pp.31-36 |
EMM |
2015-03-12 16:00 |
Okinawa |
|
[Poster Presentation]
Generation Methods of Secret Sharing QR Codes Masaki Kuramoto (Osaka Univ.), Kazuhiro Kono (Kansai Univ.), Yoshimichi Ito (Osaka Electro-Communication Univ.), Noboru Babaguchi (Osaka Univ.) EMM2014-92 |
This paper proposes methods for generating a set of multiple QR codes, in which each QR code contains a share of secret ... [more] |
EMM2014-92 pp.91-96 |
NS, IN (Joint) |
2015-03-03 13:00 |
Okinawa |
Okinawa Convention Center |
Implementation of Data Access Function for Distributed Key-Value Stores Using OpenFlow Switches Hiroyuki Sugimura, Katsunori Oyama, Toshihiro Nishizono (Nihon Univ) NS2014-245 |
This paper proposes implementation of data access functions for distributed key-value store based on consistent hashing.... [more] |
NS2014-245 pp.397-402 |
ICD, CPSY |
2014-12-01 15:15 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
[Poster Presentation]
A Scalable Hardware Architecture of Locality-Sesitive Hashing for similarity Search Tsunaki Sadahisa, Kasho Yamamoto, Dahoo Kim, Eric S. Fukuda, Tetsuya Asai, Masato Motomura (Hokkaido Univ.) ICD2014-83 CPSY2014-95 |
Locality-Sensitive Hashing (LSH) is a hash function that projects similar data into memory closely. In similarity search... [more] |
ICD2014-83 CPSY2014-95 p.45 |
SIS, IPSJ-AVM |
2014-09-11 10:45 |
Yamagata |
SHONAI INDUSTRIAL PROMOTION CENTER |
A method of perceptual encryption and its efficient key management for JPEG/Motion JPEG images Kenta Kurihara, Yuko Saito (Tokyo Metropolitan Univ.), Shoko Imaizumi (Chiba Univ.), Sayaka Shiota, Hitoshi Kiya (Tokyo Metropolitan Univ.) SIS2014-53 |
In this paper, we propose a method of perceptual encryption and its efficient key management for images presupposing JPE... [more] |
SIS2014-53 pp.13-18 |
RCC, ASN, NS, RCS, SR (Joint) |
2014-08-01 10:25 |
Kyoto |
Kyoto Terrsa |
A Study on Bit-Interleaved Spinal Codes Shun Ogata, Koji Ishibashi (Univ. of Electro-Comm.) RCS2014-127 |
In this paper, we analyze the bit error rate (BER) performance of a new rateless code named {em spinal code} and reveal ... [more] |
RCS2014-127 pp.203-208 |
CPSY, DC (Joint) |
2014-07-29 15:40 |
Niigata |
Toki Messe, Niigata |
Evaluation of Large-scale Graph Rewriting Model Checking Using Hash Compaction Taketo Yoshida, Masaru Onuma, Kazunori Ueda (Waseda Univ.) DC2014-19 |
Graph rewriting model checking is a verification method that determines whether a model described in a graph rewriting s... [more] |
DC2014-19 pp.9-16 |
ICSS, ISEC, SITE, EMM, IPSJ-CSEC, IPSJ-SPT [detail] |
2014-07-03 15:45 |
Hokkaido |
San-Refure Hakodate |
Data authentication scheme suitable for broadcast in the sensor networks Akihito Sakai, Yuichi Kaji, Minoru Ito (NAIST) ISEC2014-25 SITE2014-20 ICSS2014-29 EMM2014-25 |
Data broadcasting is often utilized in a sensor network system, but the authentication of the broadcast data is not a si... [more] |
ISEC2014-25 SITE2014-20 ICSS2014-29 EMM2014-25 pp.155-162 |
IT |
2014-05-16 09:50 |
Oita |
Beppu International Convention Center |
Efficiency Tricks for Hashing and Blooming in Streaming Algorithms Marat Zhanikeev (Kyushu Inst. of Tech.) IT2014-1 |
Streaming algorithms, also known as data streaming, are a realtime/online alternative to offline processing of data stor... [more] |
IT2014-1 pp.1-4 |
ISEC |
2014-05-09 17:05 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
[Invited Talk]
Limited-Birthday Distinguishers for Hash Functions
-- Collisions beyond the Birthday Bound Can Be Meaningful -- Mitsugu Iwamoto (UEC), Yu Sasaki (NTT) ISEC2014-9 |
In this talk, we explain the paper, with the same title of this talk, appeared at the international cryptographic confer... [more] |
ISEC2014-9 p.49 |
IN |
2014-04-17 13:00 |
Kyoto |
Kyotofu-Chusho-Kigyo-Kaikan |
Elastic and strict load balancing via consistent hashing Yuichi Nakatani, Hiroyuki Kurita, Naoki Takada, Takao Yamashita (NTT) IN2014-1 |
Load balancing is a key function constructing massively distributed systems. Stateful services like SIP and distributed ... [more] |
IN2014-1 pp.1-6 |
ISEC, IT, WBS |
2014-03-11 14:10 |
Aichi |
Nagoya Univ., Higashiyama Campus |
On Dynamic Cooperative Diversity Based on Dual-Spinal Codes Shun Ogata, Koji Ishibashi (The Univ. of Electro-Comm.) IT2013-83 ISEC2013-112 WBS2013-72 |
Spinal codes, a new class of rateless codes proposed recently, have gathered much attention due to its capacity-achievin... [more] |
IT2013-83 ISEC2013-112 WBS2013-72 pp.181-186 |
LOIS |
2014-03-07 14:00 |
Okinawa |
|
On Constructions of Secret Sharing System Realizing Perfect Privacy via a Physical RNG and Integrity via Hash Values Miki Hosaka, Yasushi Takami, Tokutaro Yoshida (NTT) LOIS2013-61 |
When one treats confidential data such as personal information on a life log or an office information system, fulfilling... [more] |
LOIS2013-61 pp.41-46 |
IT |
2013-09-27 10:55 |
Okinawa |
Culture Resort Festone (Okinawa) |
Performance Analysis on Invertible Bloom Lookup Tables with Erasure Errors Daichi Yugawa, Tadashi Wadayama (Nagoya Inst. of Tech.) IT2013-35 |
The Invertible Bloom Lookup Tables (IBLT) is a data structure which supports insertion, deletion, retrieval and listing ... [more] |
IT2013-35 pp.19-24 |