IEICE Technical Report

Print edition: ISSN 0913-5685      Online edition: ISSN 2432-6380

Volume 109, Number 446

Wideband System

Workshop Date : 2010-03-04 - 2010-03-05 / Issue Date : 2010-02-25

[PREV] [NEXT]

[TOP] | [2006] | [2007] | [2008] | [2009] | [2010] | [2011] | [2012] | [Japanese] / [English]

[PROGRAM] [BULK PDF DOWNLOAD]


Table of contents

WBS2009-51
Formal verification method for Access control model which can describe Dynamic Segregation of Duties
Michinobu Ochi, Satoshi Ono (Kogakuin Univ.)
pp. 1 - 5

WBS2009-52
Considerations on Web System Development Process against XSS worms.
Koji Hiyoshi, Kazuko Oyanagi (Inst. of Information Security)
pp. 7 - 14

WBS2009-53
Evaluation of Mutual Anonymity in P2P Networks
Chigusa Kawashima (Univ. of Electro-Comm.), Todorka Alexandrova (Tokyo Metro Univ.), I Gusti Bagus Baskara Nugraha, Hiroyoshi Morita (Univ. of Electro-Comm.)
pp. 15 - 22

WBS2009-54
About Security of Threshold Anonymous Password-Authenticated Key Exchange
SeongHan Shin, Kazukuni Kobara (AIST), Hideki Imai (Chuo Univ.)
pp. 23 - 30

WBS2009-55
A 2-round Identification Scheme Secure against Concurrent Man-in-the-Middle Attacks
Hiroaki Anada, Seiko Arita (IISEC)
pp. 31 - 38

WBS2009-56
Construction of secure Group Identification based on Digital Signature
Keisuke Saito, Taiichi Saito (Tokyo Denki Univ.)
pp. 39 - 43

WBS2009-57
Improved Method for Constructing Pairing-friendly Elliptic Curves with Fixed Coefficients
Masaaki Shirase (Future Univ-Hakodate)
pp. 45 - 52

WBS2009-58
An Experiment of Number Field Sieve over GF(p) of Low Hamming Weight Characteristic
Kenichiro Hayasaka, Tsuyoshi Takagi (Future Univ. Hakodate)
pp. 53 - 60

WBS2009-59
An RSA Encryption Hardware Algorithm that uses a DSP block on the FPGA
Kensuke Kawakami, Koji Nakano (Hiroshima Univ.)
pp. 61 - 68

WBS2009-60
Performance Evaluation of A Multipath Routing Method for Highly Reliable Wireless Communications
Kento Terai, Shinsuke Hara (Osaka City Univ.)
pp. 69 - 74

WBS2009-61
Experimental Validation of an Ultra Wideband Spatio-Temporal Channel Sounder Employing an OFDM signal in a Narrowband Interference Environment
Hiroto Iiduka, Daisuke Sugizaki, Naohiko Iwakiri, Takehiko Kobayashi (Tokyo Denki Univ.)
pp. 75 - 80

WBS2009-62
Feasibility Study on Cognitive Radio based TV Spectrum Reuse using Leaky Coaxial Cable
Melvin Cabatuan, Masato Saito, Minoru Okada (NAIST)
pp. 81 - 86

WBS2009-63
An Area Layout-based MAP Estimation for Indoor Localization
Daisuke Anzai, Shinsuke Hara (Osaka City Univ.)
pp. 87 - 92

WBS2009-64
Direction Finding Performances in UWB Short-Range Phase-Comparison Monopulse Radars
Hironori Enkouji, Takehiko Nishide, Natsuki Hashimoto, Naohiko Iwakiri, Takehiko Kobayashi (Tokyo Denki Univ.)
pp. 93 - 98

WBS2009-65
Applicability of MB-OFDM UWB System to In-car Wireless Communication
Fumiaki Maehara, Ryouhei Kaneko, Akihiro Yamakita (Waseda Univ.)
pp. 99 - 104

WBS2009-66
Analysis of optical wireless multi-level PPM using IM/DD
Yusuke Kozawa, Hiromasa Habuchi (Ibaraki Univ.)
pp. 105 - 109

WBS2009-67
A Study on LDPC coded Time Domain Block Equalizer under MIMO Frequency Selective Channels
Wang Junpeng, Yasunori Iwanami, Eiji Okamoto (Nagoya Inst. of Tech.)
pp. 111 - 116

WBS2009-68
New Implementation and Evaluation of Knuth-Yao Algorithm and Interval Algorithm
Shogo Takahashi, Hirosuke Yamamoto (Univ. of Tokyo)
pp. 117 - 122

WBS2009-69
Error exponent for the additive white gaussian noise channel with noisy feedback
Akari Sato, Hirosuke Yamamoto (Univ. of Tokyo)
pp. 123 - 128

WBS2009-70
A Channel Coding Theorem based on the Number of Guesses
Keishi Okudera, Hirosuke Yamamoto (Univ. of Tokyo)
pp. 129 - 133

WBS2009-71
Joint channel estimation and LDPC decoding over MIMO channels by nonlinear optimization
Takefumi Kobayashi, Ryutaroh Matsumoto, Tomohiko Uyematsu (Tokyo Inst. of Tech.)
pp. 135 - 140

WBS2009-72
An analysis of bit error probability of recursive systematic convolutional codes with Max-log-MAP decoding
Yoshitake Kawadai, Hideki Yoshikawa (Tohoku Gakuin Univ)
pp. 141 - 145

WBS2009-73
On the Size of Circulant Matrices for which Reversible Codes Exist
Tomoharu Shibuya, Keita Nakade (Sophia Univ.)
pp. 147 - 151

WBS2009-74
1-State Error-Trellis Decoding of LDPC Convolutional Codes Based on Circulant Matrices
Masato Tajima, Koji Okino, Takashi Miyagoshi (Univ. of Toyama)
pp. 153 - 158

WBS2009-75
[Invited Talk] Indifferentiability Theory and SHA-3 Project -- Recent Status of Theoretical and Practical Researches on Hash Functions --
Kazuo Ohta, Lei Wang, Kazuo Sakiyama (Univ. of Electro-Comm.)
pp. 159 - 166

WBS2009-76
[Invited Talk] On the Spread-Spectrum Techniques for Inter-Vechile Communications
Hiromasa Habuchi (Ibaraki Univ.)
pp. 167 - 174

WBS2009-77
[Invited Talk] Codes with unique correlation property and their application
Tomoko K. Matsushima, Yasuaki Teramachi (Polytechnic Univ.)
pp. 175 - 180

WBS2009-78
Universal Slepian-Wolf Source Codes Using Low-Density Parity-Check Matrices
Tetsunao Matsuta, Tomohiko Uyematsu, Ryutaroh Matsumoto (Tokyo Inst. of Tech.)
pp. 181 - 186

WBS2009-79
Universal Slepian-Wolf Coding for General Sources
Shigeaki Kuzuoka (Wakayama Univ.)
pp. 187 - 191

WBS2009-80
Smooth Renyi Entropy and Resolvability
Tomohiko Uyematsu (Tokyo Inst. of Tech.)
pp. 193 - 198

WBS2009-81
A Comparative Study of CPA and MIA on Side-channel Attack Standard Evaluation Boards
Asuka Taguchi, Yohei Hori, Hideki Imai (Chuo Univ.)
pp. 199 - 204

WBS2009-82
Countermeasures against Power Analysis Attacks in Assembly code
Kazunori Kawamura, Keisuke Iwai, Takakazu Kurokawa (NDA)
pp. 205 - 210

WBS2009-83
Electromagnetic Analysis from power line on SASEBO-R
Tetsutaro Kanno, Keisuke Iwai, Takakazu Kurokawa (NDA)
pp. 211 - 216

WBS2009-84
Obtaining Local Information from FPGA Using Electromagnetic Analysis
Takao Ochiai, Dai Yamamoto, Kouichi Itoh, Masahiko Takenaka, Naoya Torii, Daisuke Uchida, Toshiaki Nagai, Shinichi Wakana (Fujitsu Labs.)
pp. 217 - 223

WBS2009-85
A Forgery Attack for WPA-TKIP by Modifying Any Packet to the QoS Packet -- Almost All Implementations of WPA-TKIP Can Be Attacked --
Yosuke Todo, Yuki Ozawa (Kobe Univ.), Toshihiro Ohigashi (Hiroshima Univ.), Masakatu Morii (Kobe Univ.)
pp. 225 - 232

WBS2009-86
A Note on Realistic Damages Caused by a Message Falsification Attack on WPA-TKIP
Yuki Ozawa, Yosuke Todo (Kobe Univ), Toshihiro Ohigashi (Hiroshima Univ), Masakatu Morii (Kobe Univ)
pp. 233 - 240

WBS2009-87
A Reader Only Attack on a MIFARE Classic
Satoru Imamura (Chuo Univ.), Takashi Kitagawa (Univ. of Tokyo.), Hideki Imai (Chuo Univ.)
pp. 241 - 246

WBS2009-88
An Efficient Random Key Pre-distribution Protocol for Multi-Phase Wireless Sensor Networks (2)
Hisashige Ito, Atsuko Miyaji, Kazumasa Omote (JAIST)
pp. 247 - 254

WBS2009-89
Traitor Tracing system with Constant-size Public-key and Ciphertext using q-ary fingerprinting codes
Ying Zhang (Chuo Univ.), Takashi Kitagawa (Univ. of Tokyo.), Nuttapong Attrapadung (AIST), Hideki Imai (Chuo Univ/AIST)
pp. 255 - 260

WBS2009-90
Experimental and Theoretical Evaluation of Wolf Fingerprint Using Statistical Information
Takuya Nakagawa, Hyunho Kang (Chuo Univ.), Shoko Yonezawa, Manabu Inuma, Akira Otsuka (AIST), Hideki Imai (Chuo Univ/AIST)
pp. 261 - 268

WBS2009-91
An effective attack against a chaos-based image scrambling encryption
Liang Zhao, Kouichi Sakurai (Kyushu Univ.)
pp. 269 - 274

WBS2009-92
On key recovery for Enocoro with weak key in related-key attack scenario
Yasutaka Igarashi, Kazuto Okamoto, Toshinobu Kaneko (Tokyo Univ. of Science)
pp. 275 - 280

WBS2009-93
A Study on Key Estimation Attacks to Stream Cipher based on Statistical Decision Theory
Ety Yudiasticha (Waseda Univ.), Kazuhiko Minematsu (NEC), Toshiyasu Matsushima (Waseda Univ.)
pp. 281 - 287

WBS2009-94
Preimage Resistance of Hash Functions on the Dedicated Block Cipher
Hidenori Kuwakado (Kobe Univ.), Shoichi Hirose (Univ. of Fukui)
pp. 289 - 293

WBS2009-95
Bit Error of Hierarchical Transmission in Optical Wireless Channel
Yusuke Oka, Hiromasa Habuchi (Ibaraki Univ.), Kouji Ohuchi (Shizuoka Univ.)
pp. 295 - 300

WBS2009-96
Theoretical BER Performance of Continuous OFDM Signals with Nonlinear Amplification
Yuichiro Goto, Akihiro Yamakita, Fumiaki Maehara (Waseda Univ.)
pp. 301 - 305

WBS2009-97
On a Blind Time-Domain Equalization Technique in Single-Carrier Block Transmisson
Ryo Kuwana, Teruyuki Miyajima (Ibaraki Univ.)
pp. 307 - 312

WBS2009-98
Discussion on a self-calibrated pipeline A/D converter.
Tohru Kohda, Masatora Ogata (Kyushu Univ.)
pp. 313 - 318

WBS2009-99
The quantized error of AD/DA conversion using beta-expansion
Tohru Kohda, Yuuki Fukae (Kyushu Univ.)
pp. 319 - 324

WBS2009-100
Frequency estimator using Newton method
Tohru Kohda, Kohnosuke Ogiwara (Kyushu Univ.)
pp. 325 - 329

WBS2009-101
Behavior Level Design of Turbo TCM Decoder -- Automatic Synthesis of Pipeline Processing Circuit and Comparison of RTL Design --
Hayato Taira, Haruo Ogiwara (Nagaoka Univ. of Tech.)
pp. 331 - 335

WBS2009-102
Feasibility study of the pre-processing for enhancing text data compression efficiency
Hirofumi Nakamura (Miyakonojo Natl. Coll. of Tech), Kiyomitsu Kajisa (Kagoshima Natl. Coll. of Tech), Takayasu Fuchida (Kagoshima Univ.)
pp. 337 - 342

WBS2009-103
Antidictionary Coding Scheme Based on Array Structures
Keita Suzuki, Hirotada Fukae (Univ. of Electro-Comm.), Takahiro Ota (Nagano Prefectural Inst. of Tech.), Hiroyoshi Morita (Univ. of Electro-Comm.)
pp. 343 - 348

WBS2009-104
Redundancy analysis of the universal source code with a singular prior
Tatsuya Hashimoto, Tsutomu Kawabata (Univ. of Electro-Comm.)
pp. 349 - 352

WBS2009-105
New Classes of Public Key Cryptosystems Constructed Based on Error-Correcting Codes and Probabilistic Structure
Masao Kasahara (Osaka Gakuin Univ.)
pp. 353 - 360

WBS2009-106
A Construction of New Class of Linear Multivariate Public Key Cryptosystem Constructed Based on Error Correcting Codes
Masao Kasahara (Osaka Gakuin Univ.)
pp. 361 - 366

WBS2009-107
A Low Density Knapsack Cryptosystem
Akira Hayashi (Kanazawa Inst. of Tech.)
pp. 367 - 372

WBS2009-108
A study on the probabilistic algorithm to solve the elliptic curve discrete logarithm problem
Osamu Ashihara, Yoshitaka Sagara, Nobuhide Sakuragi, Tomoko K. Matsushima (Polytechnic Univ.)
pp. 373 - 380

WBS2009-109
A Note on Practical Key Derivation Functions
Shoichi Hirose (Univ. of Fukui.)
pp. 381 - 384

WBS2009-110
Collision Attack on DM Compression Function Using Reduced AES-256
Tetsuya Kobayashi, Shoichi Hirose (Univ. Fukui)
pp. 385 - 390

WBS2009-111
Reducing Disclosed Credentials in Automated Trust Negotiation Using Preference
Taichi Hanaoka, Yoshimichi Ito, Noboru Babaguchi (Osaka Univ.)
pp. 391 - 398

WBS2009-112
Bio-metric Authentication using Motion Image of Speakers Face
Mari Ozaki, Ryuichi Sakai (Osaka Electro-Comm Univ.)
pp. 399 - 401

WBS2009-113
Existing Probability of Gauss Period Normal Basis
Kenta Nekado, Yasuyuki Nogami, Yoshitaka Morikawa (Okayama Univ.)
pp. 403 - 407

WBS2009-114
On Constant Weight Codes with Large Linear Complexity from Cyclic Difference Set
Takayasu Kaida (Kinki Univ.)
pp. 409 - 412

WBS2009-115
On the Redundancy Rate of FF and VF Source Codes for General Sources
Mitsuharu Arimura (Shonan Inst. of Tech.), Ken-ichi Iwata (Univ. of Fukui)
pp. 413 - 418

WBS2009-116
Constructions of A Large Class of Optimum Linear Codes for Small Number of Information Symbols
Masao Kasahara (Osaka Gakuin Univ.), Shigeichi Hirasawa (Waseda Univ.)
pp. 419 - 426

WBS2009-117
Secure Key Rate of the BB84 Protocol using Finite Sample Bits
Yousuke Sano, Ryutaroh Matsumoto, Tomohiko Uyematsu (Tokyo Inst. of Tech.)
pp. 427 - 432

WBS2009-118
Bit Transmission Probability Maximizing the Key Rate of the BB84 Protocol
Sonny Lumbantoruan, Ryutaroh Matsumoto, Tomohiko Uyematsu (Tokyo Inst. of Tech.)
pp. 433 - 438

WBS2009-119
On the Capacity of the AND Anti-Collusion Fingerprinting Codes
Hiroki Koga (Univ. of Tsukuba.)
pp. 439 - 444

WBS2009-120
On Access Structures of Secret Sharing Scheme based on Bivariate Polynomial Interpolation Scheme
Hideaki Kashiwagura, Mikihiko Nishiara (Shinshu Univ)
pp. 445 - 448

WBS2009-121
Secure Linear Network Coding using Surplus Resources
Tomoki Kubo, Kunihiko Harada, Hirosuke Yamamoto (Univ. of Tokyo)
pp. 449 - 454

WBS2009-122
Vulnerability of MRD-Code-based Universal Secure Network Coding against Stronger Eavesdroppers
Eitaro Shioji, Ryutaroh Matsumoto, Tomohiko Uyematsu (Tokyo Inst. of Tech.)
pp. 455 - 460

WBS2009-123
Construction of wiretap codes from ordinary channel codes
Masahito Hayashi (Tohoku Univ./National Univ. of Singapore), Ryutaroh Matsumoto (Tokyo Inst. of Tech.)
pp. 461 - 465

WBS2009-124
Basics of Design and Analysis of Codes for Wiretap Channels
Mitsuru Hamada (Tamagawa Univ.)
pp. 467 - 474

Note: Each article is a technical report without peer review, and its polished version will be published elsewhere.


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan