Print edition: ISSN 0913-5685 Online edition: ISSN 2432-6380
[TOP] | [2007] | [2008] | [2009] | [2010] | [2011] | [2012] | [2013] | [Japanese] / [English]
WBS2010-47
Efficient Searchable Encryption Schemes Against Frequency Analysis
Takashi Ito, Mitsuhiro Hattori, Nori Matsuda (Mitsubishi Electric Corp.), Yusuke Sakai, Kazuo Ohta (Univ. of Electro-Communications)
pp. 1 - 6
WBS2010-48
Homomorphic Encryption Based Countermeasure against Active Attacks in Privacy-Preserving Biometric Authentication
Takato Hirano, Takumi Mori, Mitsuhiro Hattori, Takashi Ito, Nori Matsuda (Mitsubishi Electric)
pp. 7 - 14
WBS2010-49
Attribute-Based Encryption with Traceability and Revocability
Yuichi Satoh (Chuo Univ.), Daisuke Moriyama, Hiroshi Doi (IISEC), Jinhui Chao (Chuo Univ.)
pp. 15 - 22
WBS2010-50
A Study on Forward Secure Leakage Resilient Signature Schemes
Kentaro Moto, Daisuke Moriyama, Hiroshi Doi (IISEC)
pp. 23 - 30
WBS2010-51
[Invited Talk]
Information Security Scheme in Wireless Communication Based on Radio Propagation
Hideichi Sasaoka (Doshisha Univ.)
pp. 31 - 36
WBS2010-52
[Invited Talk]
Code/Error-Trellis Construction for Convolutional Codes Using Shifted Code/Error-Subsequences
Masato Tajima, Koji Okino, Takashi Miyagoshi (Univ. of Toyama)
pp. 37 - 44
WBS2010-53
[Invited Talk]
Linear Cryptanalysis
-- History and Open Problems --
Mitsuru Matsui (Mitsubishi Electric)
p. 45
WBS2010-54
Clone-Resistant Modules, Physical Unclonable Functions, and Artifact-metrics
Tsutomu Matsumoto (Yokohama Nat Univ.)
pp. 47 - 48
WBS2010-55
RFID Identification Protocol with Reduced Reader Computational Cost
Takaaki Miyoshi, Tetsu Iwata (Nagoya Univ.)
pp. 49 - 55
WBS2010-56
Improved State Recovery Algorithm of RC4 PRGA by Using Differences between Two Internal States
Kazuho Kakiwaki, Atsuko Miyaji (JAIST)
pp. 57 - 64
WBS2010-57
A Note on the Partition by Defining Set and the Weight Distributions for Cyclic Codes
Takayasu Kaida (Kinki Univ.), Junru Zheng (Kyuhsu Women's Univ.)
pp. 65 - 68
WBS2010-58
Constructing Algorithms of Large-Girth LDPC Codes Based on the Shortest Paths in Tanner Graphs
Kenya Sugihara, Hideo Yoshida (Mitsubishi Electric)
pp. 69 - 74
WBS2010-59
Performance Analysis of Variable-Length Interleaver for Turbo Codes Based on Pruning
Ken Enokizono, Hideki Ochiai (Yokohama National Univ.)
pp. 75 - 80
WBS2010-60
Algorithm for Minimizing Distortion in Delay-Sensitive Transmission on Closed-Loop System
Yuto Iwai, Mikihiko Nishiara (Shinshu Univ.)
pp. 81 - 86
WBS2010-61
Han-Kobayashi Rate Region for Gray-Wyner Source Coding System
Shigeaki Kuzuoka (Wakayama Univ.)
pp. 87 - 92
WBS2010-62
The Width of Information-Spectrum and the Worst-Case Redundancy of Fixed-Length Coding
Hiroki Koga (Univ. of Tsukuba), Mitsuharu Arimura (Shonan Inst. of Tech.), Ken-ichi Iwata (Univ. of Fukui)
pp. 93 - 98
WBS2010-63
A Dynamic Programming of Joint Source-Channel Coding for Discrete Memoryless Sources and (d,k)-constrained Channels using Monge Property
Takuya Koyama, Ken-ichi Iwata (Univ of Fukui)
pp. 99 - 104
WBS2010-64
A Study on Blind Estimation of Sparse OFDM Channel Based on Nonzero Tap Detection
Takahiro Ueno, Teruyuki Miyajima (Ibaraki Univ.)
pp. 105 - 111
WBS2010-65
A Study on Interference Suppression for Asynchronous AF Cooperative OFDM Systems
Makoto Kanaduka, Teruyuki Miyajima (Ibaraki Univ.)
pp. 113 - 118
WBS2010-66
Packet Compensation Performance of the Modified Binary Countdown Scheme for Ad-Hoc Network
Koichiro Hashiura, Hiromasa Habuchi (Ibaraki Univ.)
pp. 119 - 122
WBS2010-67
A Study on Unequal-Power-Allocation-Typed Turbo Codes on Relay Channel
Ryo Endo, Hiromasa Habuchi, Tomoaki Murata (Ibaraki Univ.)
pp. 123 - 126
WBS2010-68
Properties of ZCZ Codes Derived from Even-Shift Orthgonal Sequences
Tomohiro Hayashida, Takahiro Matsumoto, Shinya Matsufuji (Yamaguchi Univ.), Pingzhi Fan (Southwest Jiaotong Univ.)
pp. 127 - 130
WBS2010-69
A Study on Parallel Combinatory Spread Spectrum Communication System for Optical Wireless Communications
Yusuke Kozawa, Hiromasa Habuchi (Ibaraki Univ.)
pp. 131 - 135
WBS2010-70
Performance Analysis of MPPM-PSM Scheme in Optical Wireless Communications
Takayoshi Numata, Hiromasa Habuchi (Ibaraki Univ.)
pp. 137 - 142
WBS2010-71
Construction of non-hyperelliptic coverings for elliptic curves on extension fields
Hiroyuki Hara (Chuo Univ.), Tsutomu Iijima, Mahoro Shimura (Tokai Univ.), Jinhui Chao (Chuo Univ.)
pp. 143 - 150
WBS2010-72
GHS attack to elliptic curves on cubic fields of odd characteristic using B.Smith's hyperellptic-to-nonhyperelliptic transform
Kazuki Ohkawa (Chuo Univ.), Tsutomu Iijima, Jinhui Chao (Chuo Univ.)
pp. 151 - 157
WBS2010-73
Proposition of precomputation schemes considering memory
Taiki Sasahara, Atsuko Miyaji (JAIST)
pp. 159 - 166
WBS2010-74
Performance Evaluations of Robust Group Key Exchange Protocols
Takashi Sato, Atsuko Miyaji (JAIST)
pp. 167 - 175
WBS2010-75
Verification Points of Security Against a Passive Attack for Key Exchange Protocols
Haruki Ota, Shinsaku Kiyomoto, Yutaka Miyake (KDDI Labs.)
pp. 177 - 184
WBS2010-76
Improved POSH scheme using hash chains among sensors
Tetsuomi Hasegawa, Hikaru Morita (Kanagawa Univ.), Satoru Kanno (NTT SOFT), Shoji Okuno (Kanagawa Univ.)
pp. 185 - 190
WBS2010-77
An anomaly detection method using gamma-divergence and its application to system call sequence
Shintaro Murakami, Masanori Kawakita, Jun'ichi Takeuchi (ISIT/Kyushu Univ.)
pp. 191 - 197
WBS2010-78
Oblivious Symmetric Key Encryption and Its Application to IP-Traceback
Ryo Nojima (NICT), Youki Kadobayashi (NAIST)
pp. 199 - 203
WBS2010-79
A Note on serviceability between personal certificate and server sertificate on PKI
Rie Shigetomi Yamaguchi, Yutaka Oiwa, Hajime Watanabe (AIST)
pp. 205 - 212
WBS2010-80
User Authentication Using Neural Network Based on Keystroke Characteristics
Keishi Sakurai, Takao Miyamoto, Shigeki Aoki, Motoi Iwata, Akira Shiozaki (Osaka Prefecture Univ.)
pp. 213 - 220
WBS2010-81
Robust image hashing against geometric attacks using image normalization and SVD decomposition
Ricardo Antonio Parrao Hernandez (IPN-MEX), Brian M. Kurkoski (Univ. of Electro-Comm.), Mariko Nakano Miyatake (IPN-MEX)
pp. 221 - 226
WBS2010-82
Visual Card Games for Boys and Girls
Miyuki Uno, Mikio Kano (Ibaraki Univ.)
pp. 227 - 234
WBS2010-83
An improved PPM* Algorithm based on the Minimal Expected Codeword Length and Switching Escape Probability Estimation
Keita Tomokuni, Hirosuke Yamamoto (Univ. of Tokyo)
pp. 235 - 242
WBS2010-84
A Practical Algorithm of Universal Source Coding by the Most Frequent Substring
Tsuki Saito, Tetsunao Matsuta, Ryutaroh Matsumoto, Tomohiko Uyematsu (Tokyo Inst. of Tech)
pp. 243 - 248
WBS2010-85
A Generalized MDL Criterion and its Application to Learning Bayesian Network Structure
-- When Both Discrete and Continuous Data are Present --
Joe Suzuki (Osaka Univ.)
pp. 249 - 254
WBS2010-86
Error exponent for channel coding with noisy feedback and bin coding
Akari Sato, Hirosuke Yamamoto (Univ. of Tokyo)
pp. 255 - 262
WBS2010-87
Rate-Splitting for Multiple Receiver Channels
Hideki Yagi (Univ. of Electro-Comm.), H. Vincent Poor (Princeton Univ.)
pp. 263 - 269
WBS2010-88
Performance evaluation of MC-CDMA system which permits time and frequency offsets
Tatsuma Kuwazaki, Tohru Kohda, Yutaka Jitsumatsu (Kyushu Univ.)
pp. 271 - 276
WBS2010-89
Performance Evaluation of Non-binary LDPC Code with APSK Modulation
Keiya Ishikawa, Hideki Ochiai (Yokohama National Univ.)
pp. 277 - 282
WBS2010-90
Secure Multiplex Coding with a Common Message
Ryutaroh Matsumoto (Tokyo Inst. of Tech.), Masahito Hayashi (Tohoku Univ./NUS)
pp. 283 - 287
WBS2010-91
A consideration on unconditionally secure key distribution schemes considering leakage of secret information of key distribution centers
Takahiro Yoshida, Hajime Jinushi (Aoyama Gakuin Univ.), Toshiyasu Matsushima (Waseda Univ.)
pp. 289 - 294
WBS2010-92
Dual universality of hash functions and its applications to quantum cryptography
Toyohiro Tsurumaru (Mitsubishi Electric Corp.), Masahito Hayashi (Tohoku Univ./ NUS)
pp. 295 - 302
WBS2010-93
On an extended version of Rashmi-Shah-Kumar regenerating codes and secret sharing for distributed storage
Masazumi Kurihara (Univ. of Electro-Comm), Hidenori Kuwakado (Kobe Univ.)
pp. 303 - 310
WBS2010-94
A (3,3)-Threshold Scheme Secure against Ordinary and Extended Impersonation Attacks
Kazuya Koyano, Hiroki Koga (Tsukuba Univ.)
pp. 311 - 318
WBS2010-95
Identifiability of Malicious Users of the Digital Fingerprinting Code Based on a Finite Projective Plane
Yusuke Fujii, Hiroki Koga (Tsukuba Univ.)
pp. 319 - 326
WBS2010-96
Efficient Privacy Amplification Algorithms for Quantum Key Distribution
Takeshi Asai, Toyohiro Tsurumaru (Mitsubishi Electric Corporation)
pp. 327 - 332
WBS2010-97
New Differential Fault Analysis on Trivium Based on Setup-Time Violations
Qi Li, Shigeto Gomisawa, Mitsugu Iwamoto, Kazuo Ohta, Kazuo Sakiyama (Univ. of Electro-Comm)
pp. 333 - 339
WBS2010-98
Higher Order Differential Attack on HyRAL
Naoki Shibayama, Yasutaka Igarashi, Toshinobu Kaneko, Seiichiro Hangai (Tokyo Univ. of Science)
pp. 341 - 347
WBS2010-99
A New Class of Secret Sharing Schemes, KSS(I), and Its Application to Biometrics
Masao Kasahara (O.G.U)
pp. 349 - 352
WBS2010-100
A Method of Fingerprint Authentication Using KSS(I)
Hiroki Satomura, Tetsushi Ohki, Naohisa Komatsu (Waseda Univ.), Masao Kasahara (Osaka Gakuin Univ.)
pp. 353 - 360
WBS2010-101
Digital Watermark Method with Maximum Detection Amplitude Value of Complex Signature Impulse
Toshinori Ueda, Toshiyuki Uto, Kenji Ohue (Ehime Univ.)
pp. 361 - 366
WBS2010-102
Digital Watermark Method Using Extended Smear-Desmearing Transform and High-pass filter
Masataka Ohno, Toshiyuki Uto, Kenji Ohue (Ehime Univ.)
pp. 367 - 372
WBS2010-103
A Construction of New Class of Knapsack-Type Public Key Cryptosystem, K(III)ΣPKC
Masao Kasahara (Osaka Gakuin Univ.)
pp. 373 - 376
WBS2010-104
Public Key Cryptosystems Constructed Based on Pseudo Cyclic Codes, K(VIII)SE(1)PKC and K(XI)SE(2)PKC
-- Modification of K(VII)SE(1)PKC --
Masao Kasahara (Osaka Gakuin Univ.)
pp. 377 - 382
WBS2010-105
Proposal of Hidden Pair of Bijection Signature Scheme
Masahito Gotaishi, Shigeo Tsujii (Chuo Univ.)
pp. 383 - 388
WBS2010-106
On the self-reducibility and the many-one-like reducibilities for multi-valued functions
Ji-Won Huh, Shuji Isobe, Eisuke Koizumi, Hiroki Shizuya (Tohoku Univ.)
pp. 389 - 394
WBS2010-107
On the (Im)possibility Results for Strong Attack Models for Public Key Cryptosystems
Yutaka Kawai (Univ. of Tokyo), Yusuke Sakai (Univ. of Electro-Comm.), Noboru Kunihiro (Univ. of Tokyo)
pp. 395 - 402
WBS2010-108
Symbolic Criterion for EUC Secure Authentication against Static Adversary
Itsuki Suzuki, Maki Yoshida, Toru Fujiwara (Osaka Univ.)
pp. 403 - 410
Note: Each article is a technical report without peer review, and its polished version will be published elsewhere.