Engineering Sciences/NOLTA-Information Security(Date:2016/03/10)

Presentation
A Multiplier Architecture for Finite Field of 254bit-Prime Square Order Based on Pipelined 32bit Montgomery Multipliers

Yusuke Nagahama(YNU),  Daisuke Fujimoto(YNU),  Tsutomu Matsumoto(YNU),  

[Date]2016-03-10
[Paper #]IT2015-116,ISEC2015-75,WBS2015-99
Acceleration of the Arimoto algorithm for computation of random coding exponent function

Hiroki Watanabe(UEC),  Hiroshi Nagaoka(UEC),  

[Date]2016-03-10
[Paper #]IT2015-102,ISEC2015-61,WBS2015-85
Distance and Correlation Properties for Constant-Weight Codes from an (11,5,2)-Cyclic Difference Set

Takayasu Kaida(Kinki Univ.),  Junru Zheng(Kyuhsu Women's Univ.),  

[Date]2016-03-10
[Paper #]IT2015-117,ISEC2015-76,WBS2015-100
Revisiting Isomorphism of Polynomials with Two Secrets

Bagus Santoso(UEC),  

[Date]2016-03-10
[Paper #]IT2015-112,ISEC2015-71,WBS2015-95
[Invited Talk] Security of quantum cryptography and the hash function

Toyohiro Tsurumaru(Mitsubishi Electric),  

[Date]2016-03-10
[Paper #]IT2015-125,ISEC2015-84,WBS2015-108
Performance Analysis of Spatially-Coupled MacKay-Neal Codes on Channels with Memory

Takuya Okazaki(Tokyo Tech),  Kenta Kasai(Tokyo Tech),  

[Date]2016-03-11
[Paper #]IT2015-127,ISEC2015-86,WBS2015-110
studies on evaluating system for q-ary linear block codes based on q-input r-output symmetric channels

Tomohiro Fujikawa(UEC),  Yamaguchi Kazuhiko(UEC),  

[Date]2016-03-11
[Paper #]IT2015-126,ISEC2015-85,WBS2015-109
Performance Comparison of Multivariate Polynomial Encryption Schemes SRP and ABC

Takanori Yasuda(ISIT),  Kouichi Sakurai(Kyushu Univ.),  

[Date]2016-03-11
[Paper #]IT2015-134,ISEC2015-93,WBS2015-117
An improvement of sum-product decoding of LDPC codes by a local search method

Yuki Kawauchi(NDA),  Hiroshi Enoki(NDA),  Kohtaro Watanabe(NDA),  Seiji Kataoka(NDA),  

[Date]2016-03-11
[Paper #]IT2015-128,ISEC2015-87,WBS2015-111
Reconsideration of Fail-Stop Signature Schemes and Their UC-Security

Masahiro Nomura(Ex-Chiba Univ.),  Katsuhiro Nakamura(Chiba Univ.),  

[Date]2016-03-11
[Paper #]IT2015-131,ISEC2015-90,WBS2015-114
Expressive Attribute-Based Encryption with Fast Decryption

Tsuchida Hikaru(Univ. of Tsukuba),  Kanayama Naoki(Univ. of Tsukuba),  Nishide Takashi(Univ. of Tsukuba),  Okamoto Eiji(Univ. of Tsukuba),  

[Date]2016-03-11
[Paper #]IT2015-132,ISEC2015-91,WBS2015-115
Construction of WOM codes for multilevel flash memories based of integer programming

Yoju Fujino(NIT),  Tadashi Wadayama(NIT),  

[Date]2016-03-11
[Paper #]IT2015-129,ISEC2015-88,WBS2015-112
Provable Secure Decentralized Multi-Authority Attribute-Based Encryption on Non-Programmable Random Oracle Model

Tsuchida Hikaru(Univ. of Tsukuba),  Kanayama Naoki(Univ. of Tsukuba),  Nishide Takashi(Univ. of Tsukuba),  Okamoto Eiji(Univ. of Tsukuba),  

[Date]2016-03-11
[Paper #]IT2015-133,ISEC2015-92,WBS2015-116
Asymptotics Zero Error Capacity on Nearest Neighbor Error Channels with Multilevel Alphabet

Takafumi Nakano(NIT),  Tadashi Wadayama(NIT),  

[Date]2016-03-11
[Paper #]IT2015-130,ISEC2015-89,WBS2015-113
k-Anonymization Techinque for Encrypted Data

Masayuki Yoshino(Hitachi),  Hisayoshi Sato(Hitachi),  Ken Naganuma(Hitachi),  Yasuko Fukuzawa(Hitachi),  

[Date]2016-03-11
[Paper #]IT2015-135,ISEC2015-94,WBS2015-118
[Invited Talk] A Brief Overview and Survey on Some Advanced Cryptographic Primitives and Tools

Takahiro Matsuda(AIST),  

[Date]2016-03-11
[Paper #]IT2015-136,ISEC2015-95,WBS2015-119
[Invited Talk] Refined Analysis of Optimum Coding Rate for Channels with States

Hideki Yagi(Univ. of Electro-Communications),  

[Date]2016-03-11
[Paper #]IT2015-137,ISEC2015-96,WBS2015-120
<<12 21-37hit(37hit)