Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
ISEC, WBS, IT |
2017-03-09 16:15 |
Tokyo |
TOKAI University |
Construction of (2,...,2) coverings over projective line from elliptic curves over prime degree extension fields of even characteristic. Takuya Morishita (Chuo Univ.), Mahoro Shimura (Tokai Univ.), Jinhui Chao (Chuo Univ.) IT2016-112 ISEC2016-102 WBS2016-88 |
[more] |
IT2016-112 ISEC2016-102 WBS2016-88 pp.85-89 |
IBISML |
2016-03-18 11:30 |
Tokyo |
Institute of Statistical Mathematics |
Dimension Estimation of Topological Manifolds based on Measure of Simplexes and Application to Manifold Learning Hajime Tasaki, Jinhui Chao (Chuo Univ.) IBISML2015-102 |
Dimension reduction is one of the most important issues in machine learning and computational intelligence for reduction... [more] |
IBISML2015-102 pp.59-62 |
IE, IMQ, MVE, CQ (Joint) [detail] |
2016-03-07 17:55 |
Okinawa |
|
Generation of grid points for 3D-LUT in device calibration based on color discrimination thresholds Masashi Yamamoto, Jinhui Chao (Chuo Univ.) IMQ2015-50 IE2015-149 MVE2015-77 |
In this paper, we propose a method to generate the grid points of 3D Look-Up Table in a color space for device calibrati... [more] |
IMQ2015-50 IE2015-149 MVE2015-77 pp.123-128 |
PRMU, BioX |
2015-03-20 10:30 |
Kanagawa |
|
An authentication scheme using color discrimination thresholds Kensuke Odakura, Jinhui Chao (Chuo Univ) BioX2014-63 PRMU2014-183 |
Current methods of individual authentication have serious security problems of impersonation and forgery. One of the rea... [more] |
BioX2014-63 PRMU2014-183 pp.147-151 |
ISEC, IT, WBS |
2015-03-02 15:35 |
Fukuoka |
The University of Kitakyushu |
Analysis on isomorphism classes of elliptic curves subjected to GHS attack over prime degree extensions of finite fields with odd characteristic Takayuki Hosogaya (Chuo Univ.), Tsutomu Iijima (Koden), Mahoro Shimura (Tokai Univ.), Jinhui Chao (Chuo Univ.) IT2014-76 ISEC2014-89 WBS2014-68 |
The GHS attack is known to map the discrete logarithm problem (DLP) in the Jacobian of a curve $C_0$ defined over the $d... [more] |
IT2014-76 ISEC2014-89 WBS2014-68 pp.89-95 |
ISEC, LOIS, SITE |
2014-11-21 14:40 |
Hyogo |
|
Elliptic curves subjected to the GHS attack over prime degree extension fields in odd characteristic Tsutomu Iijima (Koden), Jinhui Chao (Chuo Univ) ISEC2014-59 SITE2014-50 LOIS2014-29 |
One of the most powerful attacks to elliptic curve and hyperelliptic based cryptosystems defined over an extension of a ... [more] |
ISEC2014-59 SITE2014-50 LOIS2014-29 pp.19-26 |
ISEC, IT, WBS |
2011-03-03 10:50 |
Osaka |
Osaka University |
Attribute-Based Encryption with Traceability and Revocability Yuichi Satoh (Chuo Univ.), Daisuke Moriyama, Hiroshi Doi (IISEC), Jinhui Chao (Chuo Univ.) IT2010-70 ISEC2010-74 WBS2010-49 |
We propose a Ciphertext-Policy Attribute-Based Encryption(CP-ABE) with traceability and revocability. By using our CP-AB... [more] |
IT2010-70 ISEC2010-74 WBS2010-49 pp.15-22 |
ISEC, IT, WBS |
2011-03-04 09:00 |
Osaka |
Osaka University |
Construction of non-hyperelliptic coverings for elliptic curves on extension fields Hiroyuki Hara (Chuo Univ.), Tsutomu Iijima, Mahoro Shimura (Tokai Univ.), Jinhui Chao (Chuo Univ.) IT2010-92 ISEC2010-96 WBS2010-71 |
The GHS attack transfers the discrete logarithm problem(DLP) in the group of rational points of an elliptic curve over a... [more] |
IT2010-92 ISEC2010-96 WBS2010-71 pp.143-150 |
ISEC, IT, WBS |
2011-03-04 09:25 |
Osaka |
Osaka University |
GHS attack to elliptic curves on cubic fields of odd characteristic using B.Smith's hyperellptic-to-nonhyperelliptic transform Kazuki Ohkawa (Chuo Univ.), Tsutomu Iijima, Jinhui Chao (Chuo Univ.) IT2010-93 ISEC2010-97 WBS2010-72 |
GHS attack to elliptic curves over cubic fields with hyperelliptic covering of genus three is not effective.In this pape... [more] |
IT2010-93 ISEC2010-97 WBS2010-72 pp.151-157 |
ITE-AIT, IE, ITE-HI, ITE-ME, ITS |
2010-02-15 13:25 |
Hokkaido |
Graduate School of Information and Technology, Hokkaido Univ. |
On Curvature of Color Spaces and its Implications Kohei Toko, Jinhui Chao (Chuo Univ.) ITS2009-42 IE2009-136 |
It is known that a color space is a Riemann space rather than a Euclidena space. For such a color space, one can still c... [more] |
ITS2009-42 IE2009-136 pp.29-34 |
HIP, HCS, MVE, WIT (2nd) |
2009-12-10 - 2009-12-12 |
Hokkaido |
Sappolo Convention Center |
Construction of isometry using Riemann normal coordinates and its application to color-weak correction Satoshi Oshima (Chuo Univ.), Rika Mochizuki (Chuo Univ./NTT), Jinhui Chao (Chuo Univ.) |
In this paper, we use tools from Riemann geometry to show a color-weak correction method that takes into account individ... [more] |
|
PRMU |
2009-10-23 10:00 |
Hiroshima |
Hiroshima Univ. |
The expression and invariants of 3D object's shape using linear model of weak-stationary random fields. Sho Takahashni, Jinhui Chao (Chuo Univ) PRMU2009-84 |
In this paper we show a model for 3D images and other high dimensional data distributions using a linear model of weak-s... [more] |
PRMU2009-84 pp.75-78 |
HCS, HIP |
2008-05-12 - 2008-05-13 |
Okinawa |
Okinawa Industory Support Center |
Exact correction of color-weakness using Riemann normal coordinates Satoshi Oshima, Tatsuya Nakamura, Rika Mochizuki, Jinhui Chao (Chuo Univ.) HCS2008-22 HIP2008-22 |
[more] |
HCS2008-22 HIP2008-22 pp.119-112 |
RCS, SAT (Joint) |
2007-12-20 14:55 |
Oita |
|
Channel estimation via kalman filterin the OFDM systems under multipath environments Ryohei Furuno (Chuo Univ), Nari Tanabe (TUSS), Toshihiro Furukawa (TUS), Jinhui Chao (Chuo Univ) RCS2007-116 |
In OFDM systems, time-varying channels destroy the orthogonality between subcannels and cause interchannel interference ... [more] |
RCS2007-116 pp.25-30 |
ISEC |
2006-05-19 15:20 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
On the Resultant Computation in the Harley Addition Algorithm on Hyperelliptic Curves Jun Nyukai (Chuo Univ.), Kazuto Matsuo (IISEC/Chuo Univ.), Jinhui Chao (Chuo Univ.), Shigeo Tsujii (IISEC/Chuo Univ.) |
[more] |
ISEC2006-5 pp.29-35 |
WBS, IT, ISEC |
2006-03-17 10:45 |
Aichi |
Nagoya Univ. |
A secure ID based authenticated key agreement with pairing Daisuke Moriyama, Jinhui Chao (Chuo Univ.) |
[more] |
IT2005-112 ISEC2005-169 WBS2005-126 pp.103-108 |
ISEC, IPSJ-CSEC, SITE |
2005-07-21 10:20 |
Iwate |
Iwate Prefectural University |
On Security of Superelliptic Curves and Cab Curves Based Cryptosystems against GHS Weil Descent Attack Tsutomu Iijima, Mahoro Shimura, Jinhui Chao (Chuo Univ.), Shigeo Tsujii (IISEC) |
[more] |
ISEC2005-16 SITE2005-14 pp.51-58 |