Print edition: ISSN 0913-5685 Online edition: ISSN 2432-6380
[TOP] | [2006] | [2007] | [2008] | [2009] | [2010] | [2011] | [2012] | [Japanese] / [English]
IT2009-72
Formal verification method for Access control model which can describe Dynamic Segregation of Duties
Michinobu Ochi, Satoshi Ono (Kogakuin Univ.)
pp. 1 - 5
IT2009-73
Considerations on Web System Development Process against XSS worms.
Koji Hiyoshi, Kazuko Oyanagi (Inst. of Information Security)
pp. 7 - 14
IT2009-74
Evaluation of Mutual Anonymity in P2P Networks
Chigusa Kawashima (Univ. of Electro-Comm.), Todorka Alexandrova (Tokyo Metro Univ.), I Gusti Bagus Baskara Nugraha, Hiroyoshi Morita (Univ. of Electro-Comm.)
pp. 15 - 22
IT2009-75
About Security of Threshold Anonymous Password-Authenticated Key Exchange
SeongHan Shin, Kazukuni Kobara (AIST), Hideki Imai (Chuo Univ.)
pp. 23 - 30
IT2009-76
A 2-round Identification Scheme Secure against Concurrent Man-in-the-Middle Attacks
Hiroaki Anada, Seiko Arita (IISEC)
pp. 31 - 38
IT2009-77
Construction of secure Group Identification based on Digital Signature
Keisuke Saito, Taiichi Saito (Tokyo Denki Univ.)
pp. 39 - 43
IT2009-78
Improved Method for Constructing Pairing-friendly Elliptic Curves with Fixed Coefficients
Masaaki Shirase (Future Univ-Hakodate)
pp. 45 - 52
IT2009-79
An Experiment of Number Field Sieve over GF(p) of Low Hamming Weight Characteristic
Kenichiro Hayasaka, Tsuyoshi Takagi (Future Univ. Hakodate)
pp. 53 - 60
IT2009-80
An RSA Encryption Hardware Algorithm that uses a DSP block on the FPGA
Kensuke Kawakami, Koji Nakano (Hiroshima Univ.)
pp. 61 - 68
IT2009-81
Performance Evaluation of A Multipath Routing Method for Highly Reliable Wireless Communications
Kento Terai, Shinsuke Hara (Osaka City Univ.)
pp. 69 - 74
IT2009-82
Experimental Validation of an Ultra Wideband Spatio-Temporal Channel Sounder Employing an OFDM signal in a Narrowband Interference Environment
Hiroto Iiduka, Daisuke Sugizaki, Naohiko Iwakiri, Takehiko Kobayashi (Tokyo Denki Univ.)
pp. 75 - 80
IT2009-83
Feasibility Study on Cognitive Radio based TV Spectrum Reuse using Leaky Coaxial Cable
Melvin Cabatuan, Masato Saito, Minoru Okada (NAIST)
pp. 81 - 86
IT2009-84
An Area Layout-based MAP Estimation for Indoor Localization
Daisuke Anzai, Shinsuke Hara (Osaka City Univ.)
pp. 87 - 92
IT2009-85
Direction Finding Performances in UWB Short-Range Phase-Comparison Monopulse Radars
Hironori Enkouji, Takehiko Nishide, Natsuki Hashimoto, Naohiko Iwakiri, Takehiko Kobayashi (Tokyo Denki Univ.)
pp. 93 - 98
IT2009-86
Applicability of MB-OFDM UWB System to In-car Wireless Communication
Fumiaki Maehara, Ryouhei Kaneko, Akihiro Yamakita (Waseda Univ.)
pp. 99 - 104
IT2009-87
Analysis of optical wireless multi-level PPM using IM/DD
Yusuke Kozawa, Hiromasa Habuchi (Ibaraki Univ.)
pp. 105 - 109
IT2009-88
A Study on LDPC coded Time Domain Block Equalizer under MIMO Frequency Selective Channels
Wang Junpeng, Yasunori Iwanami, Eiji Okamoto (Nagoya Inst. of Tech.)
pp. 111 - 116
IT2009-89
New Implementation and Evaluation of Knuth-Yao Algorithm and Interval Algorithm
Shogo Takahashi, Hirosuke Yamamoto (Univ. of Tokyo)
pp. 117 - 122
IT2009-90
Error exponent for the additive white gaussian noise channel with noisy feedback
Akari Sato, Hirosuke Yamamoto (Univ. of Tokyo)
pp. 123 - 128
IT2009-91
A Channel Coding Theorem based on the Number of Guesses
Keishi Okudera, Hirosuke Yamamoto (Univ. of Tokyo)
pp. 129 - 133
IT2009-92
Joint channel estimation and LDPC decoding over MIMO channels by nonlinear optimization
Takefumi Kobayashi, Ryutaroh Matsumoto, Tomohiko Uyematsu (Tokyo Inst. of Tech.)
pp. 135 - 140
IT2009-93
An analysis of bit error probability of recursive systematic convolutional codes with Max-log-MAP decoding
Yoshitake Kawadai, Hideki Yoshikawa (Tohoku Gakuin Univ)
pp. 141 - 145
IT2009-94
On the Size of Circulant Matrices for which Reversible Codes Exist
Tomoharu Shibuya, Keita Nakade (Sophia Univ.)
pp. 147 - 151
IT2009-95
1-State Error-Trellis Decoding of LDPC Convolutional Codes Based on Circulant Matrices
Masato Tajima, Koji Okino, Takashi Miyagoshi (Univ. of Toyama)
pp. 153 - 158
IT2009-96
[Invited Talk]
Indifferentiability Theory and SHA-3 Project
-- Recent Status of Theoretical and Practical Researches on Hash Functions --
Kazuo Ohta, Lei Wang, Kazuo Sakiyama (Univ. of Electro-Comm.)
pp. 159 - 166
IT2009-97
[Invited Talk]
On the Spread-Spectrum Techniques for Inter-Vechile Communications
Hiromasa Habuchi (Ibaraki Univ.)
pp. 167 - 174
IT2009-98
[Invited Talk]
Codes with unique correlation property and their application
Tomoko K. Matsushima, Yasuaki Teramachi (Polytechnic Univ.)
pp. 175 - 180
IT2009-99
Universal Slepian-Wolf Source Codes Using Low-Density Parity-Check Matrices
Tetsunao Matsuta, Tomohiko Uyematsu, Ryutaroh Matsumoto (Tokyo Inst. of Tech.)
pp. 181 - 186
IT2009-100
Universal Slepian-Wolf Coding for General Sources
Shigeaki Kuzuoka (Wakayama Univ.)
pp. 187 - 191
IT2009-101
Smooth Renyi Entropy and Resolvability
Tomohiko Uyematsu (Tokyo Inst. of Tech.)
pp. 193 - 198
IT2009-102
A Comparative Study of CPA and MIA on Side-channel Attack Standard Evaluation Boards
Asuka Taguchi, Yohei Hori, Hideki Imai (Chuo Univ.)
pp. 199 - 204
IT2009-103
Countermeasures against Power Analysis Attacks in Assembly code
Kazunori Kawamura, Keisuke Iwai, Takakazu Kurokawa (NDA)
pp. 205 - 210
IT2009-104
Electromagnetic Analysis from power line on SASEBO-R
Tetsutaro Kanno, Keisuke Iwai, Takakazu Kurokawa (NDA)
pp. 211 - 216
IT2009-105
Obtaining Local Information from FPGA Using Electromagnetic Analysis
Takao Ochiai, Dai Yamamoto, Kouichi Itoh, Masahiko Takenaka, Naoya Torii, Daisuke Uchida, Toshiaki Nagai, Shinichi Wakana (Fujitsu Labs.)
pp. 217 - 223
IT2009-106
A Forgery Attack for WPA-TKIP by Modifying Any Packet to the QoS Packet
-- Almost All Implementations of WPA-TKIP Can Be Attacked --
Yosuke Todo, Yuki Ozawa (Kobe Univ.), Toshihiro Ohigashi (Hiroshima Univ.), Masakatu Morii (Kobe Univ.)
pp. 225 - 232
IT2009-107
A Note on Realistic Damages Caused by a Message Falsification Attack on WPA-TKIP
Yuki Ozawa, Yosuke Todo (Kobe Univ), Toshihiro Ohigashi (Hiroshima Univ), Masakatu Morii (Kobe Univ)
pp. 233 - 240
IT2009-108
A Reader Only Attack on a MIFARE Classic
Satoru Imamura (Chuo Univ.), Takashi Kitagawa (Univ. of Tokyo.), Hideki Imai (Chuo Univ.)
pp. 241 - 246
IT2009-109
An Efficient Random Key Pre-distribution Protocol for Multi-Phase Wireless Sensor Networks (2)
Hisashige Ito, Atsuko Miyaji, Kazumasa Omote (JAIST)
pp. 247 - 254
IT2009-110
Traitor Tracing system with Constant-size Public-key and Ciphertext using q-ary fingerprinting codes
Ying Zhang (Chuo Univ.), Takashi Kitagawa (Univ. of Tokyo.), Nuttapong Attrapadung (AIST), Hideki Imai (Chuo Univ/AIST)
pp. 255 - 260
IT2009-111
Experimental and Theoretical Evaluation of Wolf Fingerprint Using Statistical Information
Takuya Nakagawa, Hyunho Kang (Chuo Univ.), Shoko Yonezawa, Manabu Inuma, Akira Otsuka (AIST), Hideki Imai (Chuo Univ/AIST)
pp. 261 - 268
IT2009-112
An effective attack against a chaos-based image scrambling encryption
Liang Zhao, Kouichi Sakurai (Kyushu Univ.)
pp. 269 - 274
IT2009-113
On key recovery for Enocoro with weak key in related-key attack scenario
Yasutaka Igarashi, Kazuto Okamoto, Toshinobu Kaneko (Tokyo Univ. of Science)
pp. 275 - 280
IT2009-114
A Study on Key Estimation Attacks to Stream Cipher based on Statistical Decision Theory
Ety Yudiasticha (Waseda Univ.), Kazuhiko Minematsu (NEC), Toshiyasu Matsushima (Waseda Univ.)
pp. 281 - 287
IT2009-115
Preimage Resistance of Hash Functions on the Dedicated Block Cipher
Hidenori Kuwakado (Kobe Univ.), Shoichi Hirose (Univ. of Fukui)
pp. 289 - 293
IT2009-116
Bit Error of Hierarchical Transmission in Optical Wireless Channel
Yusuke Oka, Hiromasa Habuchi (Ibaraki Univ.), Kouji Ohuchi (Shizuoka Univ.)
pp. 295 - 300
IT2009-117
Theoretical BER Performance of Continuous OFDM Signals with Nonlinear Amplification
Yuichiro Goto, Akihiro Yamakita, Fumiaki Maehara (Waseda Univ.)
pp. 301 - 305
IT2009-118
On a Blind Time-Domain Equalization Technique in Single-Carrier Block Transmisson
Ryo Kuwana, Teruyuki Miyajima (Ibaraki Univ.)
pp. 307 - 312
IT2009-119
Discussion on a self-calibrated pipeline A/D converter.
Tohru Kohda, Masatora Ogata (Kyushu Univ.)
pp. 313 - 318
IT2009-120
The quantized error of AD/DA conversion using beta-expansion
Tohru Kohda, Yuuki Fukae (Kyushu Univ.)
pp. 319 - 324
IT2009-121
Frequency estimator using Newton method
Tohru Kohda, Kohnosuke Ogiwara (Kyushu Univ.)
pp. 325 - 329
IT2009-122
Behavior Level Design of Turbo TCM Decoder
-- Automatic Synthesis of Pipeline Processing Circuit and Comparison of RTL Design --
Hayato Taira, Haruo Ogiwara (Nagaoka Univ. of Tech.)
pp. 331 - 335
IT2009-123
Feasibility study of the pre-processing for enhancing text data compression efficiency
Hirofumi Nakamura (Miyakonojo Natl. Coll. of Tech), Kiyomitsu Kajisa (Kagoshima Natl. Coll. of Tech), Takayasu Fuchida (Kagoshima Univ.)
pp. 337 - 342
IT2009-124
Antidictionary Coding Scheme Based on Array Structures
Keita Suzuki, Hirotada Fukae (Univ. of Electro-Comm.), Takahiro Ota (Nagano Prefectural Inst. of Tech.), Hiroyoshi Morita (Univ. of Electro-Comm.)
pp. 343 - 348
IT2009-125
Redundancy analysis of the universal source code with a singular prior
Tatsuya Hashimoto, Tsutomu Kawabata (Univ. of Electro-Comm.)
pp. 349 - 352
IT2009-126
New Classes of Public Key Cryptosystems Constructed Based on Error-Correcting Codes and Probabilistic Structure
Masao Kasahara (Osaka Gakuin Univ.)
pp. 353 - 360
IT2009-127
A Construction of New Class of Linear Multivariate Public Key Cryptosystem Constructed Based on Error Correcting Codes
Masao Kasahara (Osaka Gakuin Univ.)
pp. 361 - 366
IT2009-128
A Low Density Knapsack Cryptosystem
Akira Hayashi (Kanazawa Inst. of Tech.)
pp. 367 - 372
IT2009-129
A study on the probabilistic algorithm to solve the elliptic curve discrete logarithm problem
Osamu Ashihara, Yoshitaka Sagara, Nobuhide Sakuragi, Tomoko K. Matsushima (Polytechnic Univ.)
pp. 373 - 380
IT2009-130
A Note on Practical Key Derivation Functions
Shoichi Hirose (Univ. of Fukui.)
pp. 381 - 384
IT2009-131
Collision Attack on DM Compression Function Using Reduced AES-256
Tetsuya Kobayashi, Shoichi Hirose (Univ. Fukui)
pp. 385 - 390
IT2009-132
Reducing Disclosed Credentials in Automated Trust Negotiation Using Preference
Taichi Hanaoka, Yoshimichi Ito, Noboru Babaguchi (Osaka Univ.)
pp. 391 - 398
IT2009-133
Bio-metric Authentication using Motion Image of Speakers Face
Mari Ozaki, Ryuichi Sakai (Osaka Electro-Comm Univ.)
pp. 399 - 401
IT2009-134
Existing Probability of Gauss Period Normal Basis
Kenta Nekado, Yasuyuki Nogami, Yoshitaka Morikawa (Okayama Univ.)
pp. 403 - 407
IT2009-135
On Constant Weight Codes with Large Linear Complexity from Cyclic Difference Set
Takayasu Kaida (Kinki Univ.)
pp. 409 - 412
IT2009-136
On the Redundancy Rate of FF and VF Source Codes for General Sources
Mitsuharu Arimura (Shonan Inst. of Tech.), Ken-ichi Iwata (Univ. of Fukui)
pp. 413 - 418
IT2009-137
Constructions of A Large Class of Optimum Linear Codes for Small Number of Information Symbols
Masao Kasahara (Osaka Gakuin Univ.), Shigeichi Hirasawa (Waseda Univ.)
pp. 419 - 426
IT2009-138
Secure Key Rate of the BB84 Protocol using Finite Sample Bits
Yousuke Sano, Ryutaroh Matsumoto, Tomohiko Uyematsu (Tokyo Inst. of Tech.)
pp. 427 - 432
IT2009-139
Bit Transmission Probability Maximizing the Key Rate of the BB84 Protocol
Sonny Lumbantoruan, Ryutaroh Matsumoto, Tomohiko Uyematsu (Tokyo Inst. of Tech.)
pp. 433 - 438
IT2009-140
On the Capacity of the AND Anti-Collusion Fingerprinting Codes
Hiroki Koga (Univ. of Tsukuba.)
pp. 439 - 444
IT2009-141
On Access Structures of Secret Sharing Scheme based on Bivariate Polynomial Interpolation Scheme
Hideaki Kashiwagura, Mikihiko Nishiara (Shinshu Univ)
pp. 445 - 448
IT2009-142
Secure Linear Network Coding using Surplus Resources
Tomoki Kubo, Kunihiko Harada, Hirosuke Yamamoto (Univ. of Tokyo)
pp. 449 - 454
IT2009-143
Vulnerability of MRD-Code-based Universal Secure Network Coding against Stronger Eavesdroppers
Eitaro Shioji, Ryutaroh Matsumoto, Tomohiko Uyematsu (Tokyo Inst. of Tech.)
pp. 455 - 460
IT2009-144
Construction of wiretap codes from ordinary channel codes
Masahito Hayashi (Tohoku Univ./National Univ. of Singapore), Ryutaroh Matsumoto (Tokyo Inst. of Tech.)
pp. 461 - 465
IT2009-145
Basics of Design and Analysis of Codes for Wiretap Channels
Mitsuru Hamada (Tamagawa Univ.)
pp. 467 - 474
Note: Each article is a technical report without peer review, and its polished version will be published elsewhere.