Engineering Sciences/NOLTA-Information Theory(Date:2009/03/02)

Presentation
A Study on the Iterative Compensation of Clipping Noise for MIMO-OFDM systems

Soichi MINAMIGI,  Hideki OCHIAI,  

[Date]2009/3/2
[Paper #]IT2008-121,ISEC2008-179,WBS2008-134
Phase Compensation for Narrowband Power-Line Communication Channels with Cyclic Time-Varying Features

Yoshie SUGIURA,  Takaya YAMAZATO,  Masaaki KATAYAMA,  

[Date]2009/3/2
[Paper #]IT2008-122,ISEC2008-180,WBS2008-135
Investigation on an effect of Single/Double Optical Hard Limiter in the optical CDMA systems : Effect of quantum noises on OHL

Chinatsu ITO,  Noboru OCHIAI,  Takeshi NAGAO,  Tomoko K. Matsushima,  Yasuaki TERAMACHI,  

[Date]2009/3/2
[Paper #]IT2008-123,ISEC2008-181,WBS2008-136
Influence of scintillation on optical wireless CSK with extended prime code sequences

Yusuke KOZAWA,  Hiromasa HABUCHI,  

[Date]2009/3/2
[Paper #]IT2008-124,ISEC2008-182,WBS2008-137
Study on Multipulse PPM using Replaced Permutation System for Broadcasting Optical Wireless Communications

Toshiki KATO,  Fumie ONO,  Hiromasa HABUCHI,  

[Date]2009/3/2
[Paper #]IT2008-125,ISEC2008-183,WBS2008-138
McEliece Digital Signature With LDPC codes Practicality and Security Evaluation

Shigenori YAMAKAWA,  Yang CUI,  Manabu HAGIWARA,  Kazukuni KOBARA,  Hideki IMAI,  

[Date]2009/3/2
[Paper #]IT2008-126,ISEC2008-184,WBS2008-139
On the Computational Complexity of the Discrete Logarithm Problem over Algebraic Tori

Yuji NISHIGAKI,  Shingo HASEGAWA,  Shuji ISOBE,  Eisuke KOIZUMI,  Masao SAKAI,  Hiroki SHIZUYA,  

[Date]2009/3/2
[Paper #]IT2008-127,ISEC2008-185,WBS2008-140
On the Security of Torus-based Cryptography and Pairing Inversion Problem

Hirofumi MURATANI,  Tomoko YONEMURA,  Kenji OHKUMA,  Taichi ISOGAI,  Kenichiro FURUTA,  Yoshikazu HANATANI,  Yuichi KOMANO,  Hanae NOZAKI,  Atsushi SHIMBO,  

[Date]2009/3/2
[Paper #]IT2008-128,ISEC2008-186,WBS2008-141
Construction of EUF-CMA-secure Digital Signatures Based on weak Identity-Based Signatures

Takahiro Oshima,  Taiichi Saito,  

[Date]2009/3/2
[Paper #]IT2008-129,ISEC2008-187,WBS2008-142
An ID-Based 2-Functional Proxy Cryptosystem

Lihua WANG,  

[Date]2009/3/2
[Paper #]IT2008-130,ISEC2008-188,WBS2008-143
複写される方へ

,  

[Date]2009/3/2
[Paper #]
Notice for photocopying

,  

[Date]2009/3/2
[Paper #]
奥付

,  

[Date]2009/3/2
[Paper #]
<<12345 81-93hit(93hit)