IEICE Technical Report

Print edition: ISSN 0913-5685      Online edition: ISSN 2432-6380

Volume 112, Number 460

Information Theory

Workshop Date : 2013-03-07 - 2013-03-08 / Issue Date : 2013-02-28

[PREV] [NEXT]

[TOP] | [2009] | [2010] | [2011] | [2012] | [2013] | [2014] | [2015] | [Japanese] / [English]

[PROGRAM] [BULK PDF DOWNLOAD]


Table of contents

IT2012-62
Universal Coding for Asynchronous Slepian-Wolf Coding Systems
Tetsunao Matsuta, Tomohiko Uyematsu (Tokyo Inst. of Tech.)
pp. 1 - 6

IT2012-63
On a channel-simulation scheme based on reverse Shannon theorem
Daichi Nagai, Tomohiro Ogawa (Univ. of Electro- Comm.)
pp. 7 - 11

IT2012-64
A Numerical Study on a Noisy Order of Quantum Channels and Information Quantities
Taishi Okazawa, Jun Suzuki, Tomohiro Ogawa (Univ. of Electro- Comm.)
pp. 13 - 17

IT2012-65
Order Estimator of Stationary Markov Sources Using Codeword Length of Universal Code
Shinji Kanazawa, Tomohiko Uyematsu (Tokyo Inst. of Tech.)
pp. 19 - 24

IT2012-66
A discussion about efficient double length hash function
Tsuyoshi Sawada, Atsuko Miyaji (JAIST)
pp. 25 - 30

IT2012-67
Consideration on Security Requirements of Fail-stop Signature Schemes
Masahiro Nomura, Katsuhiro Nakamura (Chiba Univ.)
pp. 31 - 38

IT2012-68
Improved Elliptic Curve Scalar Multiplication Using Triple Formula
Atsuko Miyaji, Cuinan Yang (JAIST)
pp. 39 - 44

IT2012-69
A report on Indocrypt2012
Takanori Yasuda (ISIT), Yu Sasaki (NTT), Kouichi Sakurai (Kyushu Univ.)
pp. 45 - 51

IT2012-70
Construction of A Large Class of Optimum Linear Constant Weight Codes
Masao Kasahara, Shigeichi Hirasawa (Waseda Univ.)
pp. 53 - 58

IT2012-71
A Probabilistic Method for Computing the Weight Distribution of Non-Binary LDPC Codes (II)
Jun'ichi Tsurumi (Kobe Univ.), Masanori Hirotomo (Saga Univ.), Masakatu Morii (Kobe Univ.)
pp. 59 - 64

IT2012-72
Performance Evaluation of a Combination of Sum-Product and Two-bit Bit Flipping Decoding Algorithms
Koh Matsushita, Hiroshi Kamabe (Gifu Univ.)
pp. 65 - 70

IT2012-73
Side Channel Security Evaluation of AES Software Implementation by Chosen-Input Method
Shohei Saito, Takeshi Kishikawa, Tsutomu Matsumoto (Yokohama National Univ.)
pp. 71 - 78

IT2012-74
Extensive Performance Analysis of Cryptographic Primitives on the RL78 microcontroller
Yumiko Murakami, Mitsuru Matsui (Mitsubishi Electric)
pp. 79 - 85

IT2012-75
Impact of High-Speed Photodetector on Side Channel Attack through LED Pilot Lamp
Shohei Saito, Tsutomu Matsumoto (Yokohama National Univ.)
pp. 87 - 94

IT2012-76
Maximum Redundancy of Lossless Data Compression via Substring Enumeration for Markov Sources
Ken-ichi Iwata (Univ. of Fukui), Mitsuharu Arimura (Shonan Inst. Tech.), Yuki Shima (Univ. of Fukui)
pp. 95 - 100

IT2012-77
An Approach to Multisource-Multicast Problem using Linear Network Code
Shigeki Miyake (NTT)
pp. 101 - 106

IT2012-78
A consideration on minimum storage regenerating codes for functions
Takahiro Yoshida, Hajime Jinushi (Aoyama Gakuin Univ.), Toshiyasu Matsushima (Waseda Univ.)
pp. 107 - 112

IT2012-79
Construction of Minimal dominating set for the Rank Modulation based on the Compressed Encoding
Yuya Kanbayashi, Tomoharu Shibuya (Sophia Univ.)
pp. 113 - 118

IT2012-80
Verification of a Conjecture on Performance of Floating codes using Hamming Codes
Naoyoshi Okamae, Toru Fujiwara (Osaka Univ.), Yuichi Kaji (NAIST)
pp. 119 - 124

IT2012-81
Iterative Coset Coding Algorithms for Two-Dimensional Weight Constraint
Yutaka Kobayashi, Tadashi Wadayama (Nagoya Inst. of Tech.)
pp. 125 - 130

IT2012-82
Construction of New Classes of Product-sum Type Public Key Cryptosystem, K(IV)PKC, Constructed Based on Maximum Length Code
Masao Kasahara (Waseda Univ.)
pp. 131 - 138

IT2012-83
A knapsack cryptosystem with a randomly signed key
Akira Hayashi (Kanazawa Inst. of Tech.)
pp. 139 - 141

IT2012-84
Notes on Efficient Computing over GF(2^16) using Graphics Processing Unit
Satoshi Tanaka (Kyushu Univ./ISIT), Takanori Yasuda (ISIT), Kouichi Sakurai (Kyushu Univ./ISIT)
pp. 143 - 147

IT2012-85
A Study on Sparse Channel Estimation in Single Carrier Communications
Yuki Nishizawa, Teruyuki Miyajima (Ibaraki Univ.)
pp. 149 - 154

IT2012-86
Performance Comparison of OFDMA and SC-FDMA with Clipping and Filtering
Nguyen Huu Bao Trung, Hideki Ochiai (Yokohama National Univ.)
pp. 155 - 160

IT2012-87
Performance Evaluation of Spatial Modulation OFDM with Frequency-Domain Precoding and Iterative Parallel Interference Canceller
Shosuke Nakamura, Tadatomo Sato (Tokyo City Univ.)
pp. 161 - 166

IT2012-88
[Invited Talk] Road of IT security standard -- From cryptography to cloud and M2M security --
Kazuo Takaragi (AIST)
p. 167

IT2012-89
[Invited Talk] Space-Time Coding Technologies for Fast Time-Varying Channels
Hiroshi Kubo (Ritsumeikan Univ.)
pp. 169 - 174

IT2012-90
A Note on Linear Complexity for Constant-Weight Codes
Takayasu Kaida (Kinki Univ.), Junru Zheng (Kyushu Women's Univ.)
pp. 175 - 179

IT2012-91
Evaluations of Cheating-Detection Capability in the (k,n)-Threshold Scheme Based on the Majority Rule
Noriaki Shimazaki, Hiroki Koga (Univ. of Tsukuba)
pp. 181 - 188

IT2012-92
On fundamental defect of rate theory of quantum key distribution and quantum repeater
Osamu Hirota (Tamagawa Univ.)
pp. 189 - 194

IT2012-93
Laser Fault Injection Attack on Non-Decapped Contact Smart Card
Hitoshi Ono, Yuu Tsuchiya, Tsuyoshi Toyama, Takeshi Kishikawa, Shohei Saito (Yokohama National Univ.), Akihiko Sasaki (MORITA TECH), Akashi Satoh (Univ. of Tokyo), Tsutomu Matsumoto (Yokohama National Univ.)
pp. 195 - 202

IT2012-94
Preventing Unauthorized CAN Transmission by Surveillance Mechanism Built in Electronic Control Unit
Daiki Sekiguchi, Masato Tanabe, Masato Hata, Katsunari Yoshioka, Tsutomu Matsumoto (Yokohama National Univ.)
pp. 203 - 210

IT2012-95
Software Implementation Using Quadruple-Rail Representation Against Power Analysis
Tomoyasu Suzaki, Akira Maekawa, Kazuhiko Minematsu, Toshihiko Okamura (NEC)
pp. 211 - 216

IT2012-96
Nano Artifact-metrics based on Resist Collapsing
Tsutomu Matsumoto, Kenta Hanaki, Ryosuke Suzuki, Daiki Sekiguchi (Yokohama National Univ.), Morihisa Hoga, Yasuyuki Ohyagi (DNP), Makoto Naruse (NICT), Naoya Tate, Motoichi Ohtsu (Univ. of Tokyo)
pp. 217 - 222

IT2012-97
On Methods for Introducing Quiet Period into Wireless LAN over TV White Space
Masumi Yuki, Shigenobu Sasaki (Niigata Univ.)
pp. 223 - 228

IT2012-98
A study on accuracy of acquisition for DS/UWB packet radio transmission
Takuya Inoko, Shigenobu Sasaki (Niigata Univ.)
pp. 229 - 234

IT2012-99
Theoretical analysis of tracking error on DLL with modified pseudo ternary M-sequence pair
Masaya Yamagata, Hiromasa Habuchi (Ibaraki Univ.)
pp. 235 - 239

IT2012-100
[Invited Talk] Distributed Source Coding and its Application to Media Processing
Takayuki Nakachi (NTT)
pp. 241 - 246

IT2012-101
Word Prediction by PPM Algorithm in English and Thai Languages
Soukalom Sosouphanh, Tomohiro Ogawa (Univ. of Electro- Comm.)
pp. 247 - 250

IT2012-102
Finite Length Analysis of Invertible Bloom Lookup Tables
Daichi Yugawa, Tadashi Wadayama (Nagoya Inst. of Tech.)
pp. 251 - 256

IT2012-103
An Analysis on Non-Adaptive Group Testing based on Sparse Pooling Graphs
Tadashi Wadayama (Nagoya Inst. of Tech.)
pp. 257 - 262

IT2012-104
Security Definitions for Public Key Encryption with Keyword Search Revisited
Hirokazu Tagai, Junji Shikata (Yokohama National Univ.)
pp. 263 - 270

IT2012-105
How to Reconstruct dp and dq from Their Fraction
Shigeyoshi Imai, Kaoru Kurosawa, Takuma Ogasawara (Ibaraki Univ.)
pp. 271 - 277

IT2012-106
Toward Practical Application of Searchable Encryption
Takashi Ito, Takato Hirano, Takumi Mori, Mitsuhiro Hattori, Nori Matsuda (Mitsubishi Electric)
pp. 279 - 283

IT2012-107
Efficient Strictly CCA-Secure Proxy Re-Encryption Scheme
Shota Kanno, Kaoru Kurosawa (Ibaraki Univ.), Goichiro Hanaoka, Takahiro Matsuda (AIST)
pp. 285 - 291

IT2012-108
Error Probability of Information and Position Estimation of Mobile Optical Transmitters using Path History
Kohei Harada, Yu Morishima, Ikuo Oka, Shingo Ata (Osaka City Univ.)
pp. 293 - 296

IT2012-109
Threshold Algorithms for Decoding Spinal Codes
Yu Morishima, Ikuo Oka, Shingo Ata (Osaka City Univ.)
pp. 297 - 302

IT2012-110
Peak Power Reduction of Trellis Shaped OFDM Signals by Selection Region Expansion
Masaki Matsuoka, Ryota Yoshizawa, Hideki Ochiai (Yokohama National Univ.)
pp. 303 - 308

IT2012-111
A Selective Symbol Reconstruction Method of Space-Time Coded Transmission
Kohei Chikama, Idhsada Sa-nguanwongthong, Mikado Yotsuya, Shoichiro Yamasaki, Tomoko K. Matsushima (Polytechnic Univ.), Hirokazu Tanaka (Toshiba)
pp. 309 - 312

Note: Each article is a technical report without peer review, and its polished version will be published elsewhere.


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan