IEICE Technical Committee Submission System
Conference Schedule
Online Proceedings
[Sign in]
Tech. Rep. Archives
    [Japanese] / [English] 
( Committee/Place/Topics  ) --Press->
 
( Paper Keywords:  /  Column:Title Auth. Affi. Abst. Keyword ) --Press->

All Technical Committee Conferences  (Searched in: All Years)

Search Results: Conference Papers
 Conference Papers (Available on Advance Programs)  (Sort by: Date Descending)
 Results 21 - 37 of 37 [Previous]  /   
Committee Date Time Place Paper Title / Authors Abstract Paper #
ISEC, WBS, IT 2017-03-09
16:15
Tokyo TOKAI University Construction of (2,...,2) coverings over projective line from elliptic curves over prime degree extension fields of even characteristic.
Takuya Morishita (Chuo Univ.), Mahoro Shimura (Tokai Univ.), Jinhui Chao (Chuo Univ.) IT2016-112 ISEC2016-102 WBS2016-88
 [more] IT2016-112 ISEC2016-102 WBS2016-88
pp.85-89
IBISML 2016-03-18
11:30
Tokyo Institute of Statistical Mathematics Dimension Estimation of Topological Manifolds based on Measure of Simplexes and Application to Manifold Learning
Hajime Tasaki, Jinhui Chao (Chuo Univ.) IBISML2015-102
Dimension reduction is one of the most important issues in machine learning and computational intelligence for reduction... [more] IBISML2015-102
pp.59-62
IE, IMQ, MVE, CQ
(Joint) [detail]
2016-03-07
17:55
Okinawa   Generation of grid points for 3D-LUT in device calibration based on color discrimination thresholds
Masashi Yamamoto, Jinhui Chao (Chuo Univ.) IMQ2015-50 IE2015-149 MVE2015-77
In this paper, we propose a method to generate the grid points of 3D Look-Up Table in a color space for device calibrati... [more] IMQ2015-50 IE2015-149 MVE2015-77
pp.123-128
PRMU, BioX 2015-03-20
10:30
Kanagawa   An authentication scheme using color discrimination thresholds
Kensuke Odakura, Jinhui Chao (Chuo Univ) BioX2014-63 PRMU2014-183
Current methods of individual authentication have serious security problems of impersonation and forgery. One of the rea... [more] BioX2014-63 PRMU2014-183
pp.147-151
ISEC, IT, WBS 2015-03-02
15:35
Fukuoka The University of Kitakyushu Analysis on isomorphism classes of elliptic curves subjected to GHS attack over prime degree extensions of finite fields with odd characteristic
Takayuki Hosogaya (Chuo Univ.), Tsutomu Iijima (Koden), Mahoro Shimura (Tokai Univ.), Jinhui Chao (Chuo Univ.) IT2014-76 ISEC2014-89 WBS2014-68
The GHS attack is known to map the discrete logarithm problem (DLP) in the Jacobian of a curve $C_0$ defined over the $d... [more] IT2014-76 ISEC2014-89 WBS2014-68
pp.89-95
ISEC, LOIS, SITE 2014-11-21
14:40
Hyogo   Elliptic curves subjected to the GHS attack over prime degree extension fields in odd characteristic
Tsutomu Iijima (Koden), Jinhui Chao (Chuo Univ) ISEC2014-59 SITE2014-50 LOIS2014-29
One of the most powerful attacks to elliptic curve and hyperelliptic based cryptosystems defined over an extension of a ... [more] ISEC2014-59 SITE2014-50 LOIS2014-29
pp.19-26
ISEC, IT, WBS 2011-03-03
10:50
Osaka Osaka University Attribute-Based Encryption with Traceability and Revocability
Yuichi Satoh (Chuo Univ.), Daisuke Moriyama, Hiroshi Doi (IISEC), Jinhui Chao (Chuo Univ.) IT2010-70 ISEC2010-74 WBS2010-49
We propose a Ciphertext-Policy Attribute-Based Encryption(CP-ABE) with traceability and revocability. By using our CP-AB... [more] IT2010-70 ISEC2010-74 WBS2010-49
pp.15-22
ISEC, IT, WBS 2011-03-04
09:00
Osaka Osaka University Construction of non-hyperelliptic coverings for elliptic curves on extension fields
Hiroyuki Hara (Chuo Univ.), Tsutomu Iijima, Mahoro Shimura (Tokai Univ.), Jinhui Chao (Chuo Univ.) IT2010-92 ISEC2010-96 WBS2010-71
The GHS attack transfers the discrete logarithm problem(DLP) in the group of rational points of an elliptic curve over a... [more] IT2010-92 ISEC2010-96 WBS2010-71
pp.143-150
ISEC, IT, WBS 2011-03-04
09:25
Osaka Osaka University GHS attack to elliptic curves on cubic fields of odd characteristic using B.Smith's hyperellptic-to-nonhyperelliptic transform
Kazuki Ohkawa (Chuo Univ.), Tsutomu Iijima, Jinhui Chao (Chuo Univ.) IT2010-93 ISEC2010-97 WBS2010-72
GHS attack to elliptic curves over cubic fields with hyperelliptic covering of genus three is not effective.In this pape... [more] IT2010-93 ISEC2010-97 WBS2010-72
pp.151-157
ITE-AIT, IE, ITE-HI, ITE-ME, ITS 2010-02-15
13:25
Hokkaido Graduate School of Information and Technology, Hokkaido Univ. On Curvature of Color Spaces and its Implications
Kohei Toko, Jinhui Chao (Chuo Univ.) ITS2009-42 IE2009-136
It is known that a color space is a Riemann space rather than a Euclidena space. For such a color space, one can still c... [more] ITS2009-42 IE2009-136
pp.29-34
HIP, HCS, MVE, WIT
(2nd)
2009-12-10
- 2009-12-12
Hokkaido Sappolo Convention Center Construction of isometry using Riemann normal coordinates and its application to color-weak correction
Satoshi Oshima (Chuo Univ.), Rika Mochizuki (Chuo Univ./NTT), Jinhui Chao (Chuo Univ.)
In this paper, we use tools from Riemann geometry to show a color-weak correction method that takes into account individ... [more]
PRMU 2009-10-23
10:00
Hiroshima Hiroshima Univ. The expression and invariants of 3D object's shape using linear model of weak-stationary random fields.
Sho Takahashni, Jinhui Chao (Chuo Univ) PRMU2009-84
In this paper we show a model for 3D images and other high dimensional data distributions using a linear model of weak-s... [more] PRMU2009-84
pp.75-78
HCS, HIP 2008-05-12
- 2008-05-13
Okinawa Okinawa Industory Support Center Exact correction of color-weakness using Riemann normal coordinates
Satoshi Oshima, Tatsuya Nakamura, Rika Mochizuki, Jinhui Chao (Chuo Univ.) HCS2008-22 HIP2008-22
 [more] HCS2008-22 HIP2008-22
pp.119-112
RCS, SAT
(Joint)
2007-12-20
14:55
Oita   Channel estimation via kalman filterin the OFDM systems under multipath environments
Ryohei Furuno (Chuo Univ), Nari Tanabe (TUSS), Toshihiro Furukawa (TUS), Jinhui Chao (Chuo Univ) RCS2007-116
In OFDM systems, time-varying channels destroy the orthogonality between subcannels and cause interchannel interference ... [more] RCS2007-116
pp.25-30
ISEC 2006-05-19
15:20
Tokyo Kikai-Shinko-Kaikan Bldg. On the Resultant Computation in the Harley Addition Algorithm on Hyperelliptic Curves
Jun Nyukai (Chuo Univ.), Kazuto Matsuo (IISEC/Chuo Univ.), Jinhui Chao (Chuo Univ.), Shigeo Tsujii (IISEC/Chuo Univ.)
 [more] ISEC2006-5
pp.29-35
WBS, IT, ISEC 2006-03-17
10:45
Aichi Nagoya Univ. A secure ID based authenticated key agreement with pairing
Daisuke Moriyama, Jinhui Chao (Chuo Univ.)
 [more] IT2005-112 ISEC2005-169 WBS2005-126
pp.103-108
ISEC, IPSJ-CSEC, SITE 2005-07-21
10:20
Iwate Iwate Prefectural University On Security of Superelliptic Curves and Cab Curves Based Cryptosystems against GHS Weil Descent Attack
Tsutomu Iijima, Mahoro Shimura, Jinhui Chao (Chuo Univ.), Shigeo Tsujii (IISEC)
 [more] ISEC2005-16 SITE2005-14
pp.51-58
 Results 21 - 37 of 37 [Previous]  /   
Choose a download format for default settings. [NEW !!]
Text format pLaTeX format CSV format BibTeX format
Copyright and reproduction : All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan