Engineering Sciences/NOLTA-Information Security(Date:2019/03/07)

Presentation
[Encouragement Talk] A Study of Signal Transmission Forms of Optical Wireless turbo Code system

Ran Sun(Ibaraki Univ.),  Hiromasa Habuchi(Ibaraki Univ.),  Yusuke Kozawa(Ibaraki Univ.),  

[Date]2019-03-07
[Paper #]IT2018-96,ISEC2018-102,WBS2018-97
Relationship between Authentication Reuse and Cryptographic Security Model on Authentication Protocol for Smart card and Reader/Writer

Ryosuke Katsuno(Ibaraki Univ.),  Kazuki Yoneyama(Ibaraki Univ.),  

[Date]2019-03-07
[Paper #]IT2018-87,ISEC2018-93,WBS2018-88
Second-Order Source Resolvability Rate with respect to a Subclass of f-divergence

Ryo Nomura(Senshu Univ.),  

[Date]2019-03-07
[Paper #]IT2018-91,ISEC2018-97,WBS2018-92
Analyzing Final Round Key of AES Implemented on Microcomputer using Neural Network

Satoshi Kosugi(Okayama University),  Sho Joichi(Okayama University),  Ken Ikuta(Okayama University),  Takuya Kusaka(Okayama University),  Yasuyuki Nogami(Okayama University),  Norikazu Takahashi(Okayama University),  

[Date]2019-03-07
[Paper #]IT2018-86,ISEC2018-92,WBS2018-87
[Encouragement Talk] A Study on Location Estimation includes ambiguity Estimation of Kinematic Positioning for Mobile Terminal by using Wireless LAN

Hiroki Musha(Utsunomiya Univ.),  Masahiro Fujii(Utsunomiya Univ.),  

[Date]2019-03-07
[Paper #]IT2018-95,ISEC2018-101,WBS2018-96
Analysis of Zero-Redundancy Estimator with a Finite Window for Markovian Source

Yusuke Hashimoto(Univ. of Electro-Comm.),  Tstutomu Kawabata(Univ. of Electro-Comm.),  

[Date]2019-03-07
[Paper #]IT2018-89,ISEC2018-95,WBS2018-90
History-Free Sequential Aggregate MAC without Pseudorandom Permutation

Shoichi Hirose(Univ. Fukui/JDC),  Junji Shikata(Yokohama National Univ.),  

[Date]2019-03-08
[Paper #]IT2018-101,ISEC2018-107,WBS2018-102
Studies on Ordered Shuffled BP Decoding of LDPC Codes

Ryoma Sakai(UEC),  Arisa Matsuo(UEC),  Kazuhiko Yamaguchi(UEC),  

[Date]2019-03-08
[Paper #]IT2018-128,ISEC2018-134,WBS2018-129
On the Worst-Case Information Rates of Secret Sharing Schemes for Several Access Structures with Many Participants

Takashi Hisatome(U. Tsukuba),  Hiroki Koga(U. Tsukuba),  

[Date]2019-03-08
[Paper #]IT2018-120,ISEC2018-126,WBS2018-121
A Lower Bound of the Joint Capacity of Digital Fingerprinting Codes against a Mixed Attack

Tatsuya Sekine(U. Tsukuba),  Hiroki Koga(U. Tsukuba),  

[Date]2019-03-08
[Paper #]IT2018-119,ISEC2018-125,WBS2018-120
Key Reocvery Atttack on Ring-LWE Scheme Using Side-Channel Information in Number Theoretic Transform

Kento Oonishi(Tokyo Univ.),  Noboru Kunihiro(Tokyo Univ.),  

[Date]2019-03-08
[Paper #]IT2018-112,ISEC2018-118,WBS2018-113
The distribution of the conditional information leakage in binary symmetric erasure wiretap channels

Ukyo Michiwaki(Kyushu Univ.),  Yutaka Jitsumatsu(Kyushu Univ.),  Yasutada Oohama(UEC),  

[Date]2019-03-08
[Paper #]IT2018-118,ISEC2018-124,WBS2018-119
Systematic Encoding Algorithms for Binary And Non-binary Shifted VT Codes

Toyohiko Saeki(Yamaguchi Univ.),  Takayuki Nozaki(Yamaguchi Univ.),  

[Date]2019-03-08
[Paper #]IT2018-126,ISEC2018-132,WBS2018-127
Detailed Design of Shift Distribution for Zigzag Decodable Fountain Code

Ibuki Tatsuta(Yamaguchi Univ.),  Takayuki Nozaki(Yamaguchi Univ.),  

[Date]2019-03-08
[Paper #]IT2018-127,ISEC2018-133,WBS2018-128
Performance Evaluation of Filter-and-Forward Relay with Self-Energy Recycling

Junta Furukawa(Ibaraki Univ.),  Teruyuki Miyajima(Ibaraki Univ.),  Yoshiki Sugitani(Ibaraki Univ.),  

[Date]2019-03-08
[Paper #]IT2018-123,ISEC2018-129,WBS2018-124
Verifiable Delegated Private Bit Comparison

Naoki Shirai(Ibaraki Univ.),  Kazuki Yoneyama(Ibaraki Univ.),  

[Date]2019-03-08
[Paper #]IT2018-113,ISEC2018-119,WBS2018-114
Authenticated Encryption Scheme Secure Against Side Channel Attack

Shoichi Hirose(Univ. Fukui),  Takeshi Sugawara(Univ. Electro-Communications),  Yuichi Komano(Toshiba),  

[Date]2019-03-08
[Paper #]IT2018-102,ISEC2018-108,WBS2018-103
Typical performance of the L1 regularization regression from linear measurements with measurement noise and large coherence

Minori Ihara(Hiroshima City Univ.),  Kazunori Iwata(Hiroshima City Univ.),  Kazushi Mimura(Hiroshima City Univ.),  

[Date]2019-03-08
[Paper #]IT2018-117,ISEC2018-123,WBS2018-118
Secret Sharing on Evolving Multi-level Access Structure

Partha Sarathi Roy(KDDI Research),  Sabyasachi Dutta(Kyushu Univ.),  Kazuhide Fukushima(KDDI Research),  Shinsaku Kiyomoto(KDDI Research),  Kouichi Sakurai(Kyushu Univ.),  

[Date]2019-03-08
[Paper #]IT2018-121,ISEC2018-127,WBS2018-122
Security Enhanced Wireless Communications with Secret Sharing and Signal Processing of Data Transmission

Kyohei Ono(PTU),  Shoichiro Yamasaki(PTU),  Tomoko K. Matsushima(PTU),  Shinichiro Miyazaki(PTU),  Kotoku Omura(PTU),  

[Date]2019-03-08
[Paper #]IT2018-122,ISEC2018-128,WBS2018-123
<<123>> 21-40hit(54hit)