Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
EMM, IT |
2023-05-12 13:50 |
Kyoto |
Rakuyu Kaikan (Kyoto Univ. Yoshida-South Campus) (Primary: On-site, Secondary: Online) |
Some Remarks on Hadamard-type Matrices over Residue Class Rings or Finite Fields Tetsuya Kojima, Iori Kodama (NIT, Tokyo College) IT2023-13 EMM2023-13 |
Hadamard matrix is defined as a square matrix where any components are $-1$ or $+1$, and where any pairs of rows are mut... [more] |
IT2023-13 EMM2023-13 pp.67-72 |
HWS |
2023-04-14 13:45 |
Oita |
(Primary: On-site, Secondary: Online) |
Fundamental Study on the effect of the Number of RNS Bases on the Side-channel Information Leakage from Modular Multiplier Daisuke Fujimoto, Rikuo Haga, Yuichi Hayashi (NAIST) HWS2023-2 |
In public-key cryptography, the Residue Number System (RNS) has been proposed as a hardware implementation approach that... [more] |
HWS2023-2 pp.6-8 |
EMM, EA, ASJ-H |
2021-11-15 13:30 |
Online |
Online |
[Poster Presentation]
Study on frame synchronization in spread-spectrum based speech information hiding method by using linear prediction residue Takuto Isoyama, Masashi Unoki (JAIST) EA2021-40 EMM2021-67 |
Our previous study proposed a blindly-detectable direct-spread spectrum (DSS) method using linear prediction (LP) residu... [more] |
EA2021-40 EMM2021-67 pp.74-79 |
CS, CAS |
2020-02-28 11:40 |
Kumamoto |
|
Construction of Finite-Length Sequences for Underground Multiplexing Coded Sonar Yoshihiro Tanada, Masato Iguchi, Tomoki Tsutsui (Kyoto Univ) CAS2019-119 CS2019-119 |
Elastic wave propagation through underground aims to observe three-dimensional underground structure. In order to realiz... [more] |
CAS2019-119 CS2019-119 pp.125-130 |
EA, ASJ-H, EMM, IPSJ-MUS [detail] |
2018-11-21 13:30 |
Ishikawa |
Hotel Koshuen |
Study on spread-spectrum based speech watermarking method by using linear prediction residual Reiya Namikawa, Masashi Unoki (JAIST) EA2018-68 EMM2018-68 |
Direct spread spectrum (DSS) method is well-known as a robust audio information-hiding method.
However, this method has... [more] |
EA2018-68 EMM2018-68 pp.31-36 |
EMM |
2018-03-05 14:35 |
Kagoshima |
Naze Community Center (Amami-Shi, Kagoshima) |
[Poster Presentation]
Study on spread-spectrum based speech watermarking method for linear predictive coding Reiya Namikawa, Masashi Unoki (JAIST) EMM2017-79 |
This paper investigates availability of spread-spectrum based speech watermarking
method for linear predictive coding. ... [more] |
EMM2017-79 pp.13-16 |
ISEC, LOIS, SITE |
2016-11-07 14:55 |
Fukui |
Community Hall & AOSSA Mall, Fukui |
Factorization of Composite Numbers having a Prime of Special Form with Elliptic Curve Method Masaaki Shirase (FUN) ISEC2016-54 SITE2016-44 LOIS2016-32 |
A previous work cite{Shirase16}
considered when the elliptic curve method (ECM) successes with a scalar value $N$
fo... [more] |
ISEC2016-54 SITE2016-44 LOIS2016-32 pp.19-26 |
DC, SS |
2016-10-27 13:40 |
Shiga |
Hikone Kinro-Fukushi Kaikan Bldg. |
Single Limited-Magnitude Error Correcting Codes Using Integer Residue Ring of Large Order Shohei Kotaki, Masato Kitakami (Chiba Univ.) SS2016-22 DC2016-24 |
Multilevel memories, which store multiple bit information within a memory cell,
cause specific errors which mostly shif... [more] |
SS2016-22 DC2016-24 pp.25-29 |
NLP |
2015-07-22 10:25 |
Hokkaido |
Bibai Onsen Yu-rinkan |
A solution on the degree determination problem of Chebyshev polynomials over the residue ring Z/2^kZ Kento Kawano, Daisaburo Yoshioka (Sojo Univ.) NLP2015-77 |
A public key cryptosystem based on Chebyshev polynomials over the residue ring Z/2^k Z is recently introduced. In this p... [more] |
NLP2015-77 pp.53-56 |
RECONF, CPSY, VLD, IPSJ-SLDM [detail] |
2015-01-30 10:30 |
Kanagawa |
Hiyoshi Campus, Keio University |
Error detection using residue signed-digit number arithmetic for arithmetic circuits Yoshitomo Nema, Yuuki Tanaka, Kazuhiro Motegi, Shugang Wei (Gunma Univ) VLD2014-136 CPSY2014-145 RECONF2014-69 |
For error detection of multiply-accumulate operation, a residue error detector can be considered for the VLSI implementa... [more] |
VLD2014-136 CPSY2014-145 RECONF2014-69 pp.151-156 |
VLD, CPSY, RECONF, IPSJ-SLDM [detail] |
2012-01-26 10:50 |
Kanagawa |
Hiyoshi Campus, Keio University |
A residue - weighted number conversion algorithm based on signed-digit arithmetic for a three-moduli set Masaya Arai, Yuuki Tanaka, Shugang Wei (Gunma Univ.) VLD2011-110 CPSY2011-73 RECONF2011-69 |
In this paper, a residue-weighted number conversion algorithm using SD(signed-digit) arithmetic for a moduli set \{$2^n$... [more] |
VLD2011-110 CPSY2011-73 RECONF2011-69 pp.111-116 |
ISEC, LOIS |
2011-11-15 14:50 |
Osaka |
Osaka Electro-Communication University |
On Definition Fields of Pairing Friendly Curves With Embedding Degree 4, 6, 8 Masaaki Shirase (FUN) ISEC2011-58 LOIS2011-52 |
The BN prime $p$, which is required for constructing the BN curve, is given by $p=36z^4+36z^3+24z^2+6z+1$. By the way, t... [more] |
ISEC2011-58 LOIS2011-52 pp.163-170 |
DC |
2011-10-20 13:30 |
Tokyo |
|
Neighborhood Level Error Control Codes for Multiple-level Systems Shohei Kotaki, Masato Kitakami (Chiba Univ.) DC2011-23 |
Multiple-level concept, which deals with more than 2 states as data unit, is used in such systems as Flash Memory or mod... [more] |
DC2011-23 pp.19-24 |
ISEC |
2011-09-09 15:15 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
Determining All Traces of Elliptic Curves $y^{2}=x^{3} \pm 2^{i}3^{j}$ over BN Field Toshiya Nakajima (QFR Lab.) ISEC2011-30 |
A prime $p$ of the form $p=36z^{4}+36z^{3}+24z^{2}+6z+1\ (z \in \mathbb{Z})$ is called a BN(Barreto-Naehrig) prime and a... [more] |
ISEC2011-30 pp.25-28 |
IT |
2010-07-22 16:40 |
Tokyo |
Kogakuin University |
[Invited Talk]
On Costruction Methods of Lee-Metric Error Correcting Codes over Finite Rings Katsuhiro Nakamura (Chiba Univ.) IT2010-22 |
This paper describes Lee-metric error correcting codes over finite rings,especially over integer residue ring Zq (q=2^m)... [more] |
IT2010-22 pp.63-66 |