IEICE Technical Report

Print edition: ISSN 0913-5685      Online edition: ISSN 2432-6380

Volume 112, Number 461

Information Security

Workshop Date : 2013-03-07 - 2013-03-08 / Issue Date : 2013-02-28

[PREV] [NEXT]

[TOP] | [2009] | [2010] | [2011] | [2012] | [2013] | [2014] | [2015] | [Japanese] / [English]

[PROGRAM] [BULK PDF DOWNLOAD]


Table of contents

ISEC2012-80
Universal Coding for Asynchronous Slepian-Wolf Coding Systems
Tetsunao Matsuta, Tomohiko Uyematsu (Tokyo Inst. of Tech.)
pp. 1 - 6

ISEC2012-81
On a channel-simulation scheme based on reverse Shannon theorem
Daichi Nagai, Tomohiro Ogawa (Univ. of Electro- Comm.)
pp. 7 - 11

ISEC2012-82
A Numerical Study on a Noisy Order of Quantum Channels and Information Quantities
Taishi Okazawa, Jun Suzuki, Tomohiro Ogawa (Univ. of Electro- Comm.)
pp. 13 - 17

ISEC2012-83
Order Estimator of Stationary Markov Sources Using Codeword Length of Universal Code
Shinji Kanazawa, Tomohiko Uyematsu (Tokyo Inst. of Tech.)
pp. 19 - 24

ISEC2012-84
A discussion about efficient double length hash function
Tsuyoshi Sawada, Atsuko Miyaji (JAIST)
pp. 25 - 30

ISEC2012-85
Consideration on Security Requirements of Fail-stop Signature Schemes
Masahiro Nomura, Katsuhiro Nakamura (Chiba Univ.)
pp. 31 - 38

ISEC2012-86
Improved Elliptic Curve Scalar Multiplication Using Triple Formula
Atsuko Miyaji, Cuinan Yang (JAIST)
pp. 39 - 44

ISEC2012-87
A report on Indocrypt2012
Takanori Yasuda (ISIT), Yu Sasaki (NTT), Kouichi Sakurai (Kyushu Univ.)
pp. 45 - 51

ISEC2012-88
Construction of A Large Class of Optimum Linear Constant Weight Codes
Masao Kasahara, Shigeichi Hirasawa (Waseda Univ.)
pp. 53 - 58

ISEC2012-89
A Probabilistic Method for Computing the Weight Distribution of Non-Binary LDPC Codes (II)
Jun'ichi Tsurumi (Kobe Univ.), Masanori Hirotomo (Saga Univ.), Masakatu Morii (Kobe Univ.)
pp. 59 - 64

ISEC2012-90
Performance Evaluation of a Combination of Sum-Product and Two-bit Bit Flipping Decoding Algorithms
Koh Matsushita, Hiroshi Kamabe (Gifu Univ.)
pp. 65 - 70

ISEC2012-91
Side Channel Security Evaluation of AES Software Implementation by Chosen-Input Method
Shohei Saito, Takeshi Kishikawa, Tsutomu Matsumoto (Yokohama National Univ.)
pp. 71 - 78

ISEC2012-92
Extensive Performance Analysis of Cryptographic Primitives on the RL78 microcontroller
Yumiko Murakami, Mitsuru Matsui (Mitsubishi Electric)
pp. 79 - 85

ISEC2012-93
Impact of High-Speed Photodetector on Side Channel Attack through LED Pilot Lamp
Shohei Saito, Tsutomu Matsumoto (Yokohama National Univ.)
pp. 87 - 94

ISEC2012-94
Maximum Redundancy of Lossless Data Compression via Substring Enumeration for Markov Sources
Ken-ichi Iwata (Univ. of Fukui), Mitsuharu Arimura (Shonan Inst. Tech.), Yuki Shima (Univ. of Fukui)
pp. 95 - 100

ISEC2012-95
An Approach to Multisource-Multicast Problem using Linear Network Code
Shigeki Miyake (NTT)
pp. 101 - 106

ISEC2012-96
A consideration on minimum storage regenerating codes for functions
Takahiro Yoshida, Hajime Jinushi (Aoyama Gakuin Univ.), Toshiyasu Matsushima (Waseda Univ.)
pp. 107 - 112

ISEC2012-97
Construction of Minimal dominating set for the Rank Modulation based on the Compressed Encoding
Yuya Kanbayashi, Tomoharu Shibuya (Sophia Univ.)
pp. 113 - 118

ISEC2012-98
Verification of a Conjecture on Performance of Floating codes using Hamming Codes
Naoyoshi Okamae, Toru Fujiwara (Osaka Univ.), Yuichi Kaji (NAIST)
pp. 119 - 124

ISEC2012-99
Iterative Coset Coding Algorithms for Two-Dimensional Weight Constraint
Yutaka Kobayashi, Tadashi Wadayama (Nagoya Inst. of Tech.)
pp. 125 - 130

ISEC2012-100
Construction of New Classes of Product-sum Type Public Key Cryptosystem, K(IV)PKC, Constructed Based on Maximum Length Code
Masao Kasahara (Waseda Univ.)
pp. 131 - 138

ISEC2012-101
A knapsack cryptosystem with a randomly signed key
Akira Hayashi (Kanazawa Inst. of Tech.)
pp. 139 - 141

ISEC2012-102
Notes on Efficient Computing over GF(2^16) using Graphics Processing Unit
Satoshi Tanaka (Kyushu Univ./ISIT), Takanori Yasuda (ISIT), Kouichi Sakurai (Kyushu Univ./ISIT)
pp. 143 - 147

ISEC2012-103
A Study on Sparse Channel Estimation in Single Carrier Communications
Yuki Nishizawa, Teruyuki Miyajima (Ibaraki Univ.)
pp. 149 - 154

ISEC2012-104
Performance Comparison of OFDMA and SC-FDMA with Clipping and Filtering
Nguyen Huu Bao Trung, Hideki Ochiai (Yokohama National Univ.)
pp. 155 - 160

ISEC2012-105
Performance Evaluation of Spatial Modulation OFDM with Frequency-Domain Precoding and Iterative Parallel Interference Canceller
Shosuke Nakamura, Tadatomo Sato (Tokyo City Univ.)
pp. 161 - 166

ISEC2012-106
[Invited Talk] Road of IT security standard -- From cryptography to cloud and M2M security --
Kazuo Takaragi (AIST)
p. 167

ISEC2012-107
[Invited Talk] Space-Time Coding Technologies for Fast Time-Varying Channels
Hiroshi Kubo (Ritsumeikan Univ.)
pp. 169 - 174

ISEC2012-108
A Note on Linear Complexity for Constant-Weight Codes
Takayasu Kaida (Kinki Univ.), Junru Zheng (Kyushu Women's Univ.)
pp. 175 - 179

ISEC2012-109
Evaluations of Cheating-Detection Capability in the (k,n)-Threshold Scheme Based on the Majority Rule
Noriaki Shimazaki, Hiroki Koga (Univ. of Tsukuba)
pp. 181 - 188

ISEC2012-110
On fundamental defect of rate theory of quantum key distribution and quantum repeater
Osamu Hirota (Tamagawa Univ.)
pp. 189 - 194

ISEC2012-111
Laser Fault Injection Attack on Non-Decapped Contact Smart Card
Hitoshi Ono, Yuu Tsuchiya, Tsuyoshi Toyama, Takeshi Kishikawa, Shohei Saito (Yokohama National Univ.), Akihiko Sasaki (MORITA TECH), Akashi Satoh (Univ. of Tokyo), Tsutomu Matsumoto (Yokohama National Univ.)
pp. 195 - 202

ISEC2012-112
Preventing Unauthorized CAN Transmission by Surveillance Mechanism Built in Electronic Control Unit
Daiki Sekiguchi, Masato Tanabe, Masato Hata, Katsunari Yoshioka, Tsutomu Matsumoto (Yokohama National Univ.)
pp. 203 - 210

ISEC2012-113
Software Implementation Using Quadruple-Rail Representation Against Power Analysis
Tomoyasu Suzaki, Akira Maekawa, Kazuhiko Minematsu, Toshihiko Okamura (NEC)
pp. 211 - 216

ISEC2012-114
Nano Artifact-metrics based on Resist Collapsing
Tsutomu Matsumoto, Kenta Hanaki, Ryosuke Suzuki, Daiki Sekiguchi (Yokohama National Univ.), Morihisa Hoga, Yasuyuki Ohyagi (DNP), Makoto Naruse (NICT), Naoya Tate, Motoichi Ohtsu (Univ. of Tokyo)
pp. 217 - 222

ISEC2012-115
On Methods for Introducing Quiet Period into Wireless LAN over TV White Space
Masumi Yuki, Shigenobu Sasaki (Niigata Univ.)
pp. 223 - 228

ISEC2012-116
A study on accuracy of acquisition for DS/UWB packet radio transmission
Takuya Inoko, Shigenobu Sasaki (Niigata Univ.)
pp. 229 - 234

ISEC2012-117
Theoretical analysis of tracking error on DLL with modified pseudo ternary M-sequence pair
Masaya Yamagata, Hiromasa Habuchi (Ibaraki Univ.)
pp. 235 - 239

ISEC2012-118
[Invited Talk] Distributed Source Coding and its Application to Media Processing
Takayuki Nakachi (NTT)
pp. 241 - 246

ISEC2012-119
Word Prediction by PPM Algorithm in English and Thai Languages
Soukalom Sosouphanh, Tomohiro Ogawa (Univ. of Electro- Comm.)
pp. 247 - 250

ISEC2012-120
Finite Length Analysis of Invertible Bloom Lookup Tables
Daichi Yugawa, Tadashi Wadayama (Nagoya Inst. of Tech.)
pp. 251 - 256

ISEC2012-121
An Analysis on Non-Adaptive Group Testing based on Sparse Pooling Graphs
Tadashi Wadayama (Nagoya Inst. of Tech.)
pp. 257 - 262

ISEC2012-122
Security Definitions for Public Key Encryption with Keyword Search Revisited
Hirokazu Tagai, Junji Shikata (Yokohama National Univ.)
pp. 263 - 270

ISEC2012-123
How to Reconstruct dp and dq from Their Fraction
Shigeyoshi Imai, Kaoru Kurosawa, Takuma Ogasawara (Ibaraki Univ.)
pp. 271 - 277

ISEC2012-124
Toward Practical Application of Searchable Encryption
Takashi Ito, Takato Hirano, Takumi Mori, Mitsuhiro Hattori, Nori Matsuda (Mitsubishi Electric)
pp. 279 - 283

ISEC2012-125
Efficient Strictly CCA-Secure Proxy Re-Encryption Scheme
Shota Kanno, Kaoru Kurosawa (Ibaraki Univ.), Goichiro Hanaoka, Takahiro Matsuda (AIST)
pp. 285 - 291

ISEC2012-126
Error Probability of Information and Position Estimation of Mobile Optical Transmitters using Path History
Kohei Harada, Yu Morishima, Ikuo Oka, Shingo Ata (Osaka City Univ.)
pp. 293 - 296

ISEC2012-127
Threshold Algorithms for Decoding Spinal Codes
Yu Morishima, Ikuo Oka, Shingo Ata (Osaka City Univ.)
pp. 297 - 302

ISEC2012-128
Peak Power Reduction of Trellis Shaped OFDM Signals by Selection Region Expansion
Masaki Matsuoka, Ryota Yoshizawa, Hideki Ochiai (Yokohama National Univ.)
pp. 303 - 308

ISEC2012-129
A Selective Symbol Reconstruction Method of Space-Time Coded Transmission
Kohei Chikama, Idhsada Sa-nguanwongthong, Mikado Yotsuya, Shoichiro Yamasaki, Tomoko K. Matsushima (Polytechnic Univ.), Hirokazu Tanaka (Toshiba)
pp. 309 - 312

Note: Each article is a technical report without peer review, and its polished version will be published elsewhere.


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan