Engineering Sciences/NOLTA-Information Security(Date:2007/03/09)

Presentation
Performance Evaluation of Block Encryption Algorithms on Core2

Junko NAKAJIMA,  Mitsuru MATSUI,  

[Date]2007/3/9
[Paper #]IT2006-103,ISEC2006-158,WBS2006-100
Performance Comparison of the ISO Standard Block Ciphers in ASICs

Takeshi SUGAWARA,  Naofumi HOMMA,  Takafumi AOKI,  Akashi SATOH,  

[Date]2007/3/9
[Paper #]IT2006-104,ISEC2006-159,WBS2006-101
A Technique for Making PKI Robust

Masaki YOSHIDA,  Shingo HASEGAWA,  Shuji ISOBE,  Eisuke KOIZUMI,  Masao SAKAI,  Hiroki SHIZUYA,  Yuichi FUTA,  Manabu MAEDA,  

[Date]2007/3/9
[Paper #]IT2006-105,ISEC2006-160,WBS2006-102
A Digital Watermarking for Audio Information : Randomized Method and Beat-Frequency Method

Shinya MIURA,  Masao SAKAI,  Hiroki SHIZUYA,  

[Date]2007/3/9
[Paper #]IT2006-106,ISEC2006-161,WBS2006-103
A Study on Relation between Orthogonal Design and Dual Codes

Yoshifumi UKITA,  Toshiyasu MATSUSHIMA,  

[Date]2007/3/9
[Paper #]IT2006-107,ISEC2006-162,WBS2006-104
Anothet Form of General Coding Theorems for Source Coding and Shannon's Cipher System

Hiroki KOGA,  

[Date]2007/3/9
[Paper #]IT2006-108,ISEC2006-163,WBS2006-105
Quantum key distribution with guaranteed security by weak coherent light

Masahito HAYASHI,  Akihisa TOMITA,  Jun HASEGAWA,  Tohya HIROSHIMA,  

[Date]2007/3/9
[Paper #]IT2006-109,ISEC2006-164,WBS2006-106
A Study on Performance of Reed-Solomon Coded Code Selection method

Kyung Woon JANG,  Hirokazu TANAKA,  Shoichiro YAMASAKI,  

[Date]2007/3/9
[Paper #]IT2006-110,ISEC2006-165,WBS2006-107
Study on Turbo Decoding Using Error and Erasure Decoder of RS codes As a Hard-in Soft-out Decoder

Shinya MAEHARA,  YAMAGUCHI Kazuhiko /,  Kingo KOABYASHI,  

[Date]2007/3/9
[Paper #]IT2006-111,ISEC2006-166,WBS2006-108
On a Soft-input and output Iterative Decoding Algorithm for Reed-Solomon Codes

Hitoshi TOKUSHIGE,  Ken'ichi ARIMOTO,  Masami MOHRI,  Yasutada OOHAMA,  

[Date]2007/3/9
[Paper #]IT2006-112,ISEC2006-167,WBS2006-109
Method for Reducing Computational Complexity of Soft-Decision Decoding Based on Ordered Statistics

Takayuki SHIMIZU,  Kenya HORAI,  Hisato IWAI,  Hideichi SASAOKA,  

[Date]2007/3/9
[Paper #]IT2006-113,ISEC2006-168,WBS2006-110
Share selectable secret sharing scheme on inefficiency concentrated for particular user

Keit EMURA,  Akito NOMURA,  Masakazu SOSHI,  Atsuko MIYAJI,  

[Date]2007/3/9
[Paper #]IT2006-114,ISEC2006-169,WBS2006-111
Group Signature with Efficient Revocation

Nao NOMURA,  Atsuko MIYAJI,  Keita EMURA,  

[Date]2007/3/9
[Paper #]IT2006-115,ISEC2006-170,WBS2006-112
On Quantum Secret Sharing between Multiparty and Multiparty without Quantum Memory

Takayuki TAKAGI,  Atsushi WASEDA,  Masakazu SOSHI,  Atsuko MIYAJI,  

[Date]2007/3/9
[Paper #]IT2006-116,ISEC2006-171,WBS2006-113
A Study on Huffman Coding for Binomial Sources

Hisao FUKUOKA,  

[Date]2007/3/9
[Paper #]IT2006-117,ISEC2006-172,WBS2006-114
Updating algorithms for Jones splay code with a multiway tree

Yoshiyuki SUIMON,  Hirosuke YAMAMOTO,  

[Date]2007/3/9
[Paper #]IT2006-118,ISEC2006-173,WBS2006-115
Information-Hiding Schemes Based on the Algorithm of gzip

Satoshi TOMIOKA,  Hiroki KOGA,  

[Date]2007/3/9
[Paper #]IT2006-119,ISEC2006-174,WBS2006-116
複写される方へ

,  

[Date]2007/3/9
[Paper #]
奥付

,  

[Date]2007/3/9
[Paper #]
<<12 21-39hit(39hit)