Engineering Sciences/NOLTA-Information Security(Date:2013/02/28)

Presentation
表紙

,  

[Date]2013/2/28
[Paper #]
目次

,  

[Date]2013/2/28
[Paper #]
Universal Coding for Asynchronous Slepian-Wolf Coding Systems

Tetsunao MATSUTA,  Tomohiko UYEMATSU,  

[Date]2013/2/28
[Paper #]IT2012-62,ISEC2012-80,WBS2012-48
On a channel-simulation scheme based on reverse Shannon theorem

Daichi NAGAI,  Tomohiro OGAWA,  

[Date]2013/2/28
[Paper #]IT2012-63,ISEC2012-81,WBS2012-49
A Numerical Study on a Noisy Order of Quantum Channels and Information Quantities

Taishi OKAZAWA,  Jun SUZUKI,  Tomohiro OGAWA,  

[Date]2013/2/28
[Paper #]IT2012-64,ISEC2012-82,WBS2012-50
Order Estimator of Stationary Markov Sources Using Codeword Length of Universal Code

Shinji KANAZAWA,  Tomohiko UYEMATSU,  

[Date]2013/2/28
[Paper #]IT2012-65,ISEC2012-83,WBS2012-51
A discussion about efficient double length hash function

Tsuyoshi SAWADA,  Atsuko MIYAJI,  

[Date]2013/2/28
[Paper #]IT2012-66,ISEC2012-84,WBS2012-52
Consideration on Security Requirements of Fail-stop Signature Schemes

Masahiro NOMURA,  Katsuhiro NAKAMURA,  

[Date]2013/2/28
[Paper #]IT2012-67,ISEC2012-85,WBS2012-53
Improved Elliptic Curve Scalar Multiplication Using Triple Formula

Atsuko MIYAJI,  Cuinan YANG,  

[Date]2013/2/28
[Paper #]IT2012-68,ISEC2012-86,WBS2012-54
Report on INDOCRYPT2012

Takanori YASUDA,  Yu SASAKI,  Kouichi SAKURAI,  

[Date]2013/2/28
[Paper #]IT2012-69,ISEC2012-87,WBS2012-55
Constructions of A Large Class of Optimum Linear Constant Weight Codes

Masao KASAHARA,  Shigeichi HIRASAWA,  

[Date]2013/2/28
[Paper #]IT2012-70,ISEC2012-88,WBS2012-56
A Probabilistic Method for Computing the Weight Distribution of Non-Binary LDPC Codes (II)

Jun'ichi TSURUMI,  Masanori HIROTOMO,  Masakatu MORII,  

[Date]2013/2/28
[Paper #]IT2012-71,ISEC2012-89,WBS2012-57
Performance Evaluation of a Combination of Sum-Product and Two-bit Bit Flipping Decoding Algorithms

Koh MATSUSHITA,  Hiroshi KAMABE,  

[Date]2013/2/28
[Paper #]IT2012-72,ISEC2012-90,WBS2012-58
Side Channel Security Evaluation ofAES Software Implementation by Chosen-Input Method

Shohei Saito,   Takeshi Kishikawa,  Tsutomu Matsumoto,  

[Date]2013/2/28
[Paper #]IT2012-73,ISEC2012-91,WBS2012-59
Extensive Performance Analysis of Cryptographic Primitives on the RL78 Microcontroller RL78 Microcontroller

Yumiko MURAKAMI,  Mitsuru MATSUI,  

[Date]2013/2/28
[Paper #]IT2012-74,ISEC2012-92,WBS2012-60
Impact of High-Speed Photodetector on Side Channel Attack through LED Pilot Lamp

Shohei Saito,  Tsutomu Matsumoto,  

[Date]2013/2/28
[Paper #]IT2012-75,ISEC2012-93,WBS2012-61
Maximum Redundancy of Lossless Data Compression via Substring Enumeration for Markov Sources

Ken-ichi IWATA,  Mitsuharu ARIMURA,  Yuki SHIMA,  

[Date]2013/2/28
[Paper #]IT2012-76,ISEC2012-94,WBS2012-62
An Approach to Multisource-Multicast Problem using Linear Network Code

Shigeki MIYAKE,  

[Date]2013/2/28
[Paper #]IT2012-77,ISEC2012-95,WBS2012-63
A Consideration on Minimum Storage Regenerating Codes for Functions

Takahiro YOSHIDA,  Hajime JINUSHI,  Toshiyasu MATSUSHIMA,  

[Date]2013/2/28
[Paper #]IT2012-78,ISEC2012-96,WBS2012-64
Construction of Minimal Dominating Set for the Rank Modulation Based on the Compressed Encoding

Yuya Kanbayashi,  Tomoharu Shibuya,  

[Date]2013/2/28
[Paper #]IT2012-79,ISEC2012-97,WBS2012-65
123>> 1-20hit(56hit)