Engineering Sciences/NOLTA-Information Security(Date:2010/02/25)

Presentation
Error exponent for the additive white gaussian noise channel with noisy feedback

Akari SATO,  Hirosuke YAMAMOTO,  

[Date]2010/2/25
[Paper #]IT2009-90,ISEC2009-98,WBS2009-69
A Channel Coding Theorem based on the Number of Guesses

Keishi OKUDERA,  Hirosuke YAMAMOTO,  

[Date]2010/2/25
[Paper #]IT2009-91,ISEC2009-99,WBS2009-70
Joint channel estimation and LDPC decoding over MIMO channels by nonlinear optimization

Takefumi KOBAYASHI,  Ryutaroh MATSUMOTO,  Tomohiko UYEMATSU,  

[Date]2010/2/25
[Paper #]IT2009-92,ISEC2009-100,WBS2009-71
An analysis of bit error probability of recursive systematic convolutional codes with Max-log-MAP decoding

Yoshitake KAWADAI,  Hideki YOSHIKAWA,  

[Date]2010/2/25
[Paper #]IT2009-93,ISEC2009-101,WBS2009-72
On the Size of Circulant Matrices for which Reversible Codes Exist

Tomoharu Shibuya,  Keita Nakade,  

[Date]2010/2/25
[Paper #]IT2009-94,ISEC2009-102,WBS2009-73
1-State Error-Trellis Decoding of LDPC Convolutional Codes Based on Circulant Matrices

Masato TAJIMA,  Koji OKINO,  Takashi MIYAGOSHI,  

[Date]2010/2/25
[Paper #]IT2009-95,ISEC2009-103,WBS2009-74
Indifferentiability Theory and SHA-3 Project : Recent Status of Theoretical and Practical Researches on Hash Functions

Kazuo OHTA,  Lei WANG,  Kazuo SAKIYAMA,  

[Date]2010/2/25
[Paper #]IT2009-96,ISEC2009-104,WBS2009-75
On the Spread-Spectrum Techniques for Inter-Vehicle Communications

Hiromasa HABUCHI,  

[Date]2010/2/25
[Paper #]IT2009-97,ISEC2009-105,WBS2009-76
Codes with unique correlation property and their application

Tomoko K. MATSUSHIMA,  Yasuaki TERAMACHI,  

[Date]2010/2/25
[Paper #]IT2009-98,ISEC2009-106,WBS2009-77
Universal Slepian-Wolf Source Codes Using Low-Density Parity-Check Matrices

Tetsunao MATSUTA,  Tomohiko UYEMATSU,  Ryutaroh MATSUMOTO,  

[Date]2010/2/25
[Paper #]IT2009-99,ISEC2009-107,WBS2009-78
Universal Slepian-Wolf Coding for General Sources

Shigeaki KUZUOKA,  

[Date]2010/2/25
[Paper #]IT2009-100,ISEC2009-108,WBS2009-79
Smooth Renyi Entropy and Resolvability

Tomohiko UYEMATSU,  

[Date]2010/2/25
[Paper #]IT2009-101,ISEC2009-109,WBS2009-80
A Comparative Study of CPA and MIA on Side-channel Attack Standard Evaluation Boards

Asuka TAGUCHI,  Yohei HORI,  Hideki IMAI,  

[Date]2010/2/25
[Paper #]IT2009-102,ISEC2009-110,WBS2009-81
Countermeasures against Power Analysis Attack in Assembly code

Kazunori KAWAMURA,  Keisuke IWAI,  Takakazu KUROKAWA,  

[Date]2010/2/25
[Paper #]IT2009-103,ISEC2009-111,WBS2009-82
Electromagnetic Analysis from power line on SASEBO-R

Tetsutaro KANNO,  Keisuke IWAI,  Takakazu KUROKAWA,  

[Date]2010/2/25
[Paper #]IT2009-104,ISEC2009-112,WBS2009-83
Obtaining Local Information from FPGA Using Electromagnetic Analysis

Takao OCHIAI,  Dai YAMAMOTO,  Kouichi ITOH,  Masahiko TAKENAKA,  Naoya TORII,  Daisuke UCHIDA,  Toshiaki NAGAI,  Shinichi WAKANA,  

[Date]2010/2/25
[Paper #]IT2009-105,ISEC2009-113,WBS2009-84
A Forgery Attack for WPA-TKIP by Modifying Any Packet to the QoS Packet : Almost All Implementations of WPA-TKIP Can Be Attacked

Yosuke TODO,  Yuki OZAWA,  Toshihiro OHIGASHI,  Masakatu MORII,  

[Date]2010/2/25
[Paper #]IT2009-106,ISEC2009-114,WBS2009-85
A Note on Realistic Damages Caused by a Message Falsification Attack on WPA-TKIP

Yuki OZAWA,  Yosuke TODO,  Toshihiro OHIGASHI,  Masakatu MORII,  

[Date]2010/2/25
[Paper #]IT2009-107,ISEC2009-115,WBS2009-86
A Reader Only Attack on a MIFARE Classic

Satoru IMAMURA,  Takashi KITAGAWA,  Hideki IMAI,  

[Date]2010/2/25
[Paper #]IT2009-108,ISEC2009-116,WBS2009-87
An Efficient Random Key Pre-distribution Protocol for Multi-Phase Wireless Sensor Networks (2)

Hisashige ITO,  Atsuko MIYAJI,  Kazumasa OMOTE,  

[Date]2010/2/25
[Paper #]IT2009-109,ISEC2009-117,WBS2009-88
<<1234>> 21-40hit(78hit)