The International Symposium on Information Theory and Its Applications

number title/author
We-AM-Poster.1Code Parameter Estimation from Noisy Data: TPC
Swaminathan R, A.S.MadhuKumar,
We-AM-Poster.10A p-adic Analysis of Periodic Properties for Knuth’s Quadratic Congruence Sequences
Takeru Miyazaki, Shunsuke Araki, Kohei Kawase, Hideyuki Muraoka, Yasuyuki Nogami, Satoshi Uehara,
We-AM-Poster.11Capacity Analysis for Hybrid FSO/RF Networks
Shubha Sharma, A.S. Madhukumar, Swaminathan R,
We-AM-Poster.12Evaluation of Leakage Information on Searchable Encryption Database
Masayuki Yoshino, Ken Naganuma, Noboru Kunihiro, Sota Onozawa,
We-AM-Poster.13Channel Model Divided into Cylinder for Free-Space Optical Links in Rain
Kyohei Futami, Gou Hosoya, Hiroyuki Yashima,
We-AM-Poster.14Performance Evaluation of Post-Quantum Cryptographic Algorithms using JavaScript
Ye Yuan, Junting Xiao, Kazuhide Fukushima, Shinsaku Kiyomoto, Tsuyoshi Takagi,
We-AM-Poster.15Neural Network Detection of LDPC-Coded Random Access CDMA Systems
Yuto Ichiki, Guanghui Song, Kui Cai, Shan Lu, Jun Cheng,
We-AM-Poster.16Joint Secure Communication and Independent Random Number Generation against Eavesdropper
Natsuki Hirotani, Tomohiko Uyematsu, Tetsunao Matsuta,
We-AM-Poster.17Fundamental Trade-off among Identification, Secrecy and Template Rates in Identification System
Vamoua Yachongka, Hideki Yagi,
We-AM-Poster.18A novel Doppler resistant low complexity CS-CDMA system
Hikaru Mizuyoshi, Chenggao Han,
We-AM-Poster.19A New Bound of (r,δ)-Locally Repairable Codes over Finite Field of Small Order
Tomoya Hamada, Hideki Yagi,
We-AM-Poster.2Improved LT Code Degree Distribution and its Performance Evaluation
Takumi Ishiyama, Ryo Shibata, Gou Hosoya, Hiroyuki Yashima,
We-AM-Poster.20A Calculation Method using DFT Matrix for Roos Bound
Junru Zheng, Takayasu Kaida,
We-AM-Poster.21Expected Graph Evolution for Spatially “Mt. Fuji” Coupled LDPC Codes
Yuta Nakahara, Toshiyasu Matsushima,
We-AM-Poster.22Study the Quantitative Bound of Required Samples in Attacking GACD-based FHE Schemes
Yuntao Wang, Xiaoling Yu, Tsuyoshi Takagi,
We-AM-Poster.23A Construction of Secret Sharing Schemes with Threshold 3 for Countably Infinite Participants
Taksahi Hisatome, Hiroki Koga,
We-AM-Poster.24Generating Binary Quasi-Cyclic Reversible Codes
Ramy Taki ElDin, Hajime Matsui,
We-AM-Poster.25Some Properties of Z4 Sequences Obtained from Two Binary NTUA Sequences by the Gray Coding
Masahiro GOTO, Takeru MIYAZAKI, Satoshi UEHARA, Yasuyuki NOGAMI,
We-AM-Poster.26Research on Convolutional Codes for Dependable Storage Systems
Tianyi Zhang,
We-AM-Poster.27Probability Density Based Performance Analysis for Energy Harvesting Communications
Yu MORISHIMA,
We-AM-Poster.28Detailed experimentation know-how about CPA against lightweight cipher implemented 8-bit microcontroller for tamper resistance test bench
Kota Kanou, Jun Sato, Tsukasa Adachi, Masahiro Kaminaga, Hideki Yoshikawa, Toshinori Suzuki, Masaharu Fukase, Arimitsu Shikoda,
We-AM-Poster.29Dispensing with Noise Forward in the “Weak” Relay Eavesdropper Channel
Krishnamoorthy Iyer,
We-AM-Poster.3Probabilistic Shaping for BICM with Pseudorandom Sequence
Masashi Yuri, Ryo Shibata, Gou Hosoya, Hiroyuki Yashima,
We-AM-Poster.30A Note on a Bound on the Rate of a Locally Recoverable Code with Multiple Recovering Sets
Koki Kazama, Akira Kamatsuka, Takahiro Yoshida, Toshiyasu Matsushima,
We-AM-Poster.31Asymptotic Analysis of Classification in the Presence of Generalized Label Noise
G. Yasuda, T. Suko, T. Matsushima,
We-AM-Poster.32A Study of Error-Control Scheme for WBAN based on Retransmission
Takahiro Goto, Kento Takabayashi, Ryuji Kohno,
We-AM-Poster.4Attack on Multiple-Use Password Protected Secret Sharing
Taiyu Kamiyama, Yuta Ugaya, Keisuke Kodaira, Tomoharu Shibuya,
We-AM-Poster.5Consideration on b-weight for cyclic codes over b-symbol read channels
Yuto Kono, Shogo Usami,
We-AM-Poster.6Enumeration of Compact Trees of AIFV Codes
Kengo Hashimoto, Ken-ichi Iwata, Hirosuke Yamamoto,
We-AM-Poster.7Some properties of NTU sequences
Gangsan Kim, Hong-Yeop Song,
We-AM-Poster.8A Thresholded Discriminative Metric Learning Approach for Deep Speaker Recognition
Yin-Cheng Yeh, Yan-Chin Liao, Hsie-Chia Chang,
We-AM-Poster.9Security of K(AII) ΣⅡ PKC Along with a Challenge Problem
Yasuyuki Murakami, Masao Kasahara,