Engineering Sciences/NOLTA-Information Security(Date:2010/02/25)

Presentation
Traitor Tracing system with Constant-Size Public-key and Ciphertext using q-ary fingerprint codes

Ying ZHANG,  Takashi KITAGAWA,  Nuttapong ATTRAPADUNG,  Hideki IMAI,  

[Date]2010/2/25
[Paper #]IT2009-110,ISEC2009-118,WBS2009-89
Experimental and Theoretical Evaluation of Wolf Fingerprint Using Statistical Information

Takuya NAKAGAWA,  Hyunho KANG,  Shoko YONEZAWA,  Manabu INUMA,  Akira OTSUKA,  Hideki IMAI,  

[Date]2010/2/25
[Paper #]IT2009-111,ISEC2009-119,WBS2009-90
An effective attack against a chaos-based image scrambling encryption

Liang ZHAO,  Kouichi SAKURAI,  

[Date]2010/2/25
[Paper #]IT2009-112,ISEC2009-120,WBS2009-91
On key recovery for Enocoro with weak key in related-key attack scenario

Yasutaka IGARASHI,  Kazuto OKAMOTO,  Toshinobu KANEKO,  

[Date]2010/2/25
[Paper #]IT2009-113,ISEC2009-121,WBS2009-92
A Study on Key Estimation Attacks to Stream Cipher based on Statistical Decision Theory

Ety YUDIASTICHA,  Kazuhiko MINEMATSU,  Toshiyasu MATSUSHIMA,  

[Date]2010/2/25
[Paper #]IT2009-114,ISEC2009-122,WBS2009-93
Preimage Resistance of Hash Functions on the Dedicated Block Cipher

Hidenori KUWAKADO,  Shoichi HIROSE,  

[Date]2010/2/25
[Paper #]IT2009-115,ISEC2009-123,WBS2009-94
Bit Error of Hierarchical Transmission in Optical Wireless Channel

Yusuke OKA,  Hiromasa HABUCHI,  Kouji OHUCHI,  

[Date]2010/2/25
[Paper #]IT2009-116,ISEC2009-124,WBS2009-95
Theoretical BER Performance of Continuous OFDM Signals with Nonlinear Amplification

Yuichiro GOTO,  Akihiro YAMAKITA,  Fumiaki MAEHARA,  

[Date]2010/2/25
[Paper #]IT2009-117,ISEC2009-125,WBS2009-96
On a Blind Time-Domain Equalization Technique in Single-Carrier Block Transmission

Ryo KUWANA,  Teruyuki MIYAJIMA,  

[Date]2010/2/25
[Paper #]IT2009-118,ISEC2009-126,WBS2009-97
Discussion on a self-calibrated pipeline A/D converter

Tohru KOHDA,  Masatora OGATA,  

[Date]2010/2/25
[Paper #]IT2009-119,ISEC2009-127,WBS2009-98
The quantized error of AD/DA conversion using beta-expansion

Tohru KOHDA,  Yuuki FUKAE,  

[Date]2010/2/25
[Paper #]IT2009-120,ISEC2009-128,WBS2009-99
Frequency estimator using Newton method

Tohru KOHDA,  Kohnosuke OGIWARA,  

[Date]2010/2/25
[Paper #]IT2009-121,ISEC2009-129,WBS2009-100
Behavior Level Design of Turbo TCM Decoder : Automatic Synthesis of Pipeline Processing Circuit and Comparison of RTL Design

Hayato TAIRA,  Haruo OGIWARA,  

[Date]2010/2/25
[Paper #]IT2009-122,ISEC2009-130,WBS2009-101
Feasibility study of the pre-processing for enhancing text data compression efficiency

Hirofumi NAKAMURA,  Kiyomitsu KAJISA,  Takayasu FUCHIDA,  

[Date]2010/2/25
[Paper #]IT2009-123,ISEC2009-131,WBS2009-102
Antidictionary Coding Scheme Based on Array Structures

Keita SUZUKI,  Hirotada FUKAE,  Takahiro OTA,  Hiroyoshi MORITA,  

[Date]2010/2/25
[Paper #]IT2009-124,ISEC2009-132,WBS2009-103
Redundancy analysis of the universal source code with a singular prior

Tatsuya HASHIMOTO,  Tsutomu KAWABATA,  

[Date]2010/2/25
[Paper #]IT2009-125,ISEC2009-133,WBS2009-104
New Classes of Public Key Cryptosystems Constructed Based on Error-Correcting Codes and Probabilistic Structure

Masao KASAHARA,  

[Date]2010/2/25
[Paper #]IT2009-126,ISEC2009-134,WBS2009-105
A Construction of New Class of Linear Multivariate Public Key Cryptosystem Constructed Based on Error Correcting Codes

Masao KASAHARA,  

[Date]2010/2/25
[Paper #]IT2009-127,ISEC2009-135,WBS2009-106
A Low Density Knapsack Cryptosystem

Akira HAYASHI,  

[Date]2010/2/25
[Paper #]IT2009-128,ISEC2009-136,WBS2009-107
A study on the probabilistic algorithm to solve the elliptic curve discrete logarithm problem

Osamu ASHIHARA,  Yoshitaka SAGARA,  Nobuhide SAKURAGI,  Tomoko K. MATSUSHIMA,  

[Date]2010/2/25
[Paper #]IT2009-129,ISEC2009-137,WBS2009-108
<<1234>> 41-60hit(78hit)