Engineering Sciences/NOLTA-Information Security(Date:2013/02/28)

Presentation
Verification of a Conjecture on Performance of Floating codes using Hamming Codes

Naoyoshi OKAMAE,  Toru FUJIWARA,  Yuichi KAJI,  

[Date]2013/2/28
[Paper #]IT2012-80,ISEC2012-98,WBS2012-66
Iterative Coset Coding Algorithms for Two-Dimensional Weight Constraint

Yutaka KOBAYASHI,  Tadashi WADAYAMA,  

[Date]2013/2/28
[Paper #]IT2012-81,ISEC2012-99,WBS2012-67
Construction of New Classes of Product-sum Type Public Key Cryptosystem, K(IV)ΣIIPKC, Constructed Based on Maximum Length Code

Masao KASAHARA,  

[Date]2013/2/28
[Paper #]IT2012-82,ISEC2012-100,WBS2012-68
A Knapsack Cryptosystem with a Randomly Signed Key

Akira HAYASHI,  

[Date]2013/2/28
[Paper #]IT2012-83,ISEC2012-101,WBS2012-69
Notes on Efficient Computing over GF(2^<16>) using Graphics Processing Unit

Satoshi TANAKA,  Takanori YASUDA,  Kouichi SAKURAI,  

[Date]2013/2/28
[Paper #]IT2012-84,ISEC2012-102,WBS2012-70
A Study on Sparse Channel Estimation in Single Carrier Communications

Yuki NISHIZAWA,  Teruyuki MIYAJIMA,  

[Date]2013/2/28
[Paper #]IT2012-85,ISEC2012-103,WBS2012-71
Performance Comparison of OFDMA and SC-FDMA with Clipping and Filtering

HUU BAO TRUNG NGUYEN,  HIDEKI OCHIAI,  

[Date]2013/2/28
[Paper #]IT2012-86,ISEC2012-104,WBS2012-72
Performance Evaluation of Spatial Modulation OFDM with Frequency-Domain Precoding and Iterative Parallel Interference Canceller

Shosuke NAKAMURA,  Tadatomo SATO,  

[Date]2013/2/28
[Paper #]IT2012-87,ISEC2012-105,WBS2012-73
Road of IT Security Standard : From Cryptography to Cloud and M2M Security(Invited Talk)

Kazuo TAKARAGI,  

[Date]2013/2/28
[Paper #]IT2012-88,ISEC2012-106,WBS2012-74
Space-Time Coding Technologies for Fast Time-Varying Channels(Invited Talk)

Hiroshi KuBo,  

[Date]2013/2/28
[Paper #]IT2012-89,ISEC2012-107,WBS2012-75
A Note on Linear Complexity for Constant-Weight Codes

Takayasu KAIDA,  Junru ZHENG,  

[Date]2013/2/28
[Paper #]IT2012-90,ISEC2012-108,WBS2012-76
Evaluations of Cheating-Detection Capability in the (k, n)-Threshold Scheme Based on the Majority Rule

Noriaki SHIMAZAKI,  Hiroki KOGA,  

[Date]2013/2/28
[Paper #]IT2012-91,ISEC2012-109,WBS2012-77
On Fundamental Defect of Rate Theory of Quantum Key Distribution and Quantum Repeater

Osamu HIROTA,  

[Date]2013/2/28
[Paper #]IT2012-92,ISEC2012-110,WBS2012-78
Laser Fault Injection Attack on Non-Decapped Contact Smart Card

Hitoshi ONO,  Yuu TSUCHIYA,  Tsuyoshi TOYAMA,  Takeshi KISHIKAWA,  Shohei SAITO,   Akihiko SASAKI,  Akashi SATO,  Tsutomu MATSUMOTO,  

[Date]2013/2/28
[Paper #]IT2012-93,ISEC2012-111,WBS2012-79
Preventing Unauthorized CAN Transmission by Surveillance Mechanism Built in Electronic Control Unit

Daiki SEKIGUCHI,  Msato TANABE,  Msato HATA,  Katunari YOSHIOKA,  Tsutomu MATSUMOTO,  

[Date]2013/2/28
[Paper #]IT2012-94,ISEC2012-112,WBS2012-80
Software Implementation Using Quadruple-Rail Representation Against Power Analysis

Tomoyasu SUZAKI,  Akira MAEKAWA,  Kazuhiko MINEMATSU,  Toshihiko OKAMURA,  

[Date]2013/2/28
[Paper #]IT2012-95,ISEC2012-113,WBS2012-81
Nano Artifact-metrics based on Resist Collapsing

Tsutomu MATSUMOTO,  Kenta HANAKI,  Ryosuke SUZUKI,  Daiki SEKIGUCHI,  Morihisa HOGA,  Yasuyuki OHYAGI,  Makoto NARUSE,  Naoya TATE,  Motoichi OHTSU,  

[Date]2013/2/28
[Paper #]IT2012-96,ISEC2012-114,WBS2012-82
On Methods for Introducing Quiet Period into Wireless LAN Over TV White Space

Masumi YUKI,  Shigenobu SASAKI,  

[Date]2013/2/28
[Paper #]IT2012-97,ISEC2012-115,WBS2012-83
A Study on Accuracy of Acquisition for DS/UWB Packet Radio Transmission

Takuya ITNOKO,  Shigenobu SASAKI,  

[Date]2013/2/28
[Paper #]IT2012-98,ISEC2012-116,WBS2012-84
Theoretical analysis of tracking error on DLL with modified pseudo ternary M-sequence pair

Masaya YAMAGATA,  Hiromasa HABUCHI,  

[Date]2013/2/28
[Paper #]IT2012-99,ISEC2012-117,WBS2012-85
<<123>> 21-40hit(56hit)