Print edition: ISSN 0913-5685 Online edition: ISSN 2432-6380
[TOP] | [2009] | [2010] | [2011] | [2012] | [2013] | [2014] | [2015] | [Japanese] / [English]
WBS2012-48
Universal Coding for Asynchronous Slepian-Wolf Coding Systems
Tetsunao Matsuta, Tomohiko Uyematsu (Tokyo Inst. of Tech.)
pp. 1 - 6
WBS2012-49
On a channel-simulation scheme based on reverse Shannon theorem
Daichi Nagai, Tomohiro Ogawa (Univ. of Electro- Comm.)
pp. 7 - 11
WBS2012-50
A Numerical Study on a Noisy Order of Quantum Channels and Information Quantities
Taishi Okazawa, Jun Suzuki, Tomohiro Ogawa (Univ. of Electro- Comm.)
pp. 13 - 17
WBS2012-51
Order Estimator of Stationary Markov Sources Using Codeword Length of Universal Code
Shinji Kanazawa, Tomohiko Uyematsu (Tokyo Inst. of Tech.)
pp. 19 - 24
WBS2012-52
A discussion about efficient double length hash function
Tsuyoshi Sawada, Atsuko Miyaji (JAIST)
pp. 25 - 30
WBS2012-53
Consideration on Security Requirements of Fail-stop Signature Schemes
Masahiro Nomura, Katsuhiro Nakamura (Chiba Univ.)
pp. 31 - 38
WBS2012-54
Improved Elliptic Curve Scalar Multiplication Using Triple Formula
Atsuko Miyaji, Cuinan Yang (JAIST)
pp. 39 - 44
WBS2012-55
A report on Indocrypt2012
Takanori Yasuda (ISIT), Yu Sasaki (NTT), Kouichi Sakurai (Kyushu Univ.)
pp. 45 - 51
WBS2012-56
Construction of A Large Class of Optimum Linear Constant Weight Codes
Masao Kasahara, Shigeichi Hirasawa (Waseda Univ.)
pp. 53 - 58
WBS2012-57
A Probabilistic Method for Computing the Weight Distribution of Non-Binary LDPC Codes (II)
Jun'ichi Tsurumi (Kobe Univ.), Masanori Hirotomo (Saga Univ.), Masakatu Morii (Kobe Univ.)
pp. 59 - 64
WBS2012-58
Performance Evaluation of a Combination of Sum-Product and Two-bit Bit Flipping Decoding Algorithms
Koh Matsushita, Hiroshi Kamabe (Gifu Univ.)
pp. 65 - 70
WBS2012-59
Side Channel Security Evaluation of AES Software Implementation by Chosen-Input Method
Shohei Saito, Takeshi Kishikawa, Tsutomu Matsumoto (Yokohama National Univ.)
pp. 71 - 78
WBS2012-60
Extensive Performance Analysis of Cryptographic Primitives on the RL78 microcontroller
Yumiko Murakami, Mitsuru Matsui (Mitsubishi Electric)
pp. 79 - 85
WBS2012-61
Impact of High-Speed Photodetector on Side Channel Attack through LED Pilot Lamp
Shohei Saito, Tsutomu Matsumoto (Yokohama National Univ.)
pp. 87 - 94
WBS2012-62
Maximum Redundancy of Lossless Data Compression via Substring Enumeration for Markov Sources
Ken-ichi Iwata (Univ. of Fukui), Mitsuharu Arimura (Shonan Inst. Tech.), Yuki Shima (Univ. of Fukui)
pp. 95 - 100
WBS2012-63
An Approach to Multisource-Multicast Problem using Linear Network Code
Shigeki Miyake (NTT)
pp. 101 - 106
WBS2012-64
A consideration on minimum storage regenerating codes for functions
Takahiro Yoshida, Hajime Jinushi (Aoyama Gakuin Univ.), Toshiyasu Matsushima (Waseda Univ.)
pp. 107 - 112
WBS2012-65
Construction of Minimal dominating set for the Rank Modulation based on the Compressed Encoding
Yuya Kanbayashi, Tomoharu Shibuya (Sophia Univ.)
pp. 113 - 118
WBS2012-66
Verification of a Conjecture on Performance of Floating codes using Hamming Codes
Naoyoshi Okamae, Toru Fujiwara (Osaka Univ.), Yuichi Kaji (NAIST)
pp. 119 - 124
WBS2012-67
Iterative Coset Coding Algorithms for Two-Dimensional Weight Constraint
Yutaka Kobayashi, Tadashi Wadayama (Nagoya Inst. of Tech.)
pp. 125 - 130
WBS2012-68
Construction of New Classes of Product-sum Type Public Key Cryptosystem, K(IV)PKC, Constructed Based on Maximum Length Code
Masao Kasahara (Waseda Univ.)
pp. 131 - 138
WBS2012-69
A knapsack cryptosystem with a randomly signed key
Akira Hayashi (Kanazawa Inst. of Tech.)
pp. 139 - 141
WBS2012-70
Notes on Efficient Computing over GF(2^16) using Graphics Processing Unit
Satoshi Tanaka (Kyushu Univ./ISIT), Takanori Yasuda (ISIT), Kouichi Sakurai (Kyushu Univ./ISIT)
pp. 143 - 147
WBS2012-71
A Study on Sparse Channel Estimation in Single Carrier Communications
Yuki Nishizawa, Teruyuki Miyajima (Ibaraki Univ.)
pp. 149 - 154
WBS2012-72
Performance Comparison of OFDMA and SC-FDMA with Clipping and Filtering
Nguyen Huu Bao Trung, Hideki Ochiai (Yokohama National Univ.)
pp. 155 - 160
WBS2012-73
Performance Evaluation of Spatial Modulation OFDM with Frequency-Domain Precoding and Iterative Parallel Interference Canceller
Shosuke Nakamura, Tadatomo Sato (Tokyo City Univ.)
pp. 161 - 166
WBS2012-74
[Invited Talk]
Road of IT security standard
-- From cryptography to cloud and M2M security --
Kazuo Takaragi (AIST)
p. 167
WBS2012-75
[Invited Talk]
Space-Time Coding Technologies for Fast Time-Varying Channels
Hiroshi Kubo (Ritsumeikan Univ.)
pp. 169 - 174
WBS2012-76
A Note on Linear Complexity for Constant-Weight Codes
Takayasu Kaida (Kinki Univ.), Junru Zheng (Kyushu Women's Univ.)
pp. 175 - 179
WBS2012-77
Evaluations of Cheating-Detection Capability in the (k,n)-Threshold Scheme Based on the Majority Rule
Noriaki Shimazaki, Hiroki Koga (Univ. of Tsukuba)
pp. 181 - 188
WBS2012-78
On fundamental defect of rate theory of quantum key distribution and quantum repeater
Osamu Hirota (Tamagawa Univ.)
pp. 189 - 194
WBS2012-79
Laser Fault Injection Attack on Non-Decapped Contact Smart Card
Hitoshi Ono, Yuu Tsuchiya, Tsuyoshi Toyama, Takeshi Kishikawa, Shohei Saito (Yokohama National Univ.), Akihiko Sasaki (MORITA TECH), Akashi Satoh (Univ. of Tokyo), Tsutomu Matsumoto (Yokohama National Univ.)
pp. 195 - 202
WBS2012-80
Preventing Unauthorized CAN Transmission by Surveillance Mechanism Built in Electronic Control Unit
Daiki Sekiguchi, Masato Tanabe, Masato Hata, Katsunari Yoshioka, Tsutomu Matsumoto (Yokohama National Univ.)
pp. 203 - 210
WBS2012-81
Software Implementation Using Quadruple-Rail Representation Against Power Analysis
Tomoyasu Suzaki, Akira Maekawa, Kazuhiko Minematsu, Toshihiko Okamura (NEC)
pp. 211 - 216
WBS2012-82
Nano Artifact-metrics based on Resist Collapsing
Tsutomu Matsumoto, Kenta Hanaki, Ryosuke Suzuki, Daiki Sekiguchi (Yokohama National Univ.), Morihisa Hoga, Yasuyuki Ohyagi (DNP), Makoto Naruse (NICT), Naoya Tate, Motoichi Ohtsu (Univ. of Tokyo)
pp. 217 - 222
WBS2012-83
On Methods for Introducing Quiet Period into Wireless LAN over TV White Space
Masumi Yuki, Shigenobu Sasaki (Niigata Univ.)
pp. 223 - 228
WBS2012-84
A study on accuracy of acquisition for DS/UWB packet radio transmission
Takuya Inoko, Shigenobu Sasaki (Niigata Univ.)
pp. 229 - 234
WBS2012-85
Theoretical analysis of tracking error on DLL with modified pseudo ternary M-sequence pair
Masaya Yamagata, Hiromasa Habuchi (Ibaraki Univ.)
pp. 235 - 239
WBS2012-86
[Invited Talk]
Distributed Source Coding and its Application to Media Processing
Takayuki Nakachi (NTT)
pp. 241 - 246
WBS2012-87
Word Prediction by PPM Algorithm in English and Thai Languages
Soukalom Sosouphanh, Tomohiro Ogawa (Univ. of Electro- Comm.)
pp. 247 - 250
WBS2012-88
Finite Length Analysis of Invertible Bloom Lookup Tables
Daichi Yugawa, Tadashi Wadayama (Nagoya Inst. of Tech.)
pp. 251 - 256
WBS2012-89
An Analysis on Non-Adaptive Group Testing based on Sparse Pooling Graphs
Tadashi Wadayama (Nagoya Inst. of Tech.)
pp. 257 - 262
WBS2012-90
Security Definitions for Public Key Encryption with Keyword Search Revisited
Hirokazu Tagai, Junji Shikata (Yokohama National Univ.)
pp. 263 - 270
WBS2012-91
How to Reconstruct dp and dq from Their Fraction
Shigeyoshi Imai, Kaoru Kurosawa, Takuma Ogasawara (Ibaraki Univ.)
pp. 271 - 277
WBS2012-92
Toward Practical Application of Searchable Encryption
Takashi Ito, Takato Hirano, Takumi Mori, Mitsuhiro Hattori, Nori Matsuda (Mitsubishi Electric)
pp. 279 - 283
WBS2012-93
Efficient Strictly CCA-Secure Proxy Re-Encryption Scheme
Shota Kanno, Kaoru Kurosawa (Ibaraki Univ.), Goichiro Hanaoka, Takahiro Matsuda (AIST)
pp. 285 - 291
WBS2012-94
Error Probability of Information and Position Estimation of Mobile Optical Transmitters using Path History
Kohei Harada, Yu Morishima, Ikuo Oka, Shingo Ata (Osaka City Univ.)
pp. 293 - 296
WBS2012-95
Threshold Algorithms for Decoding Spinal Codes
Yu Morishima, Ikuo Oka, Shingo Ata (Osaka City Univ.)
pp. 297 - 302
WBS2012-96
Peak Power Reduction of Trellis Shaped OFDM Signals by Selection Region Expansion
Masaki Matsuoka, Ryota Yoshizawa, Hideki Ochiai (Yokohama National Univ.)
pp. 303 - 308
WBS2012-97
A Selective Symbol Reconstruction Method of Space-Time Coded Transmission
Kohei Chikama, Idhsada Sa-nguanwongthong, Mikado Yotsuya, Shoichiro Yamasaki, Tomoko K. Matsushima (Polytechnic Univ.), Hirokazu Tanaka (Toshiba)
pp. 309 - 312
Note: Each article is a technical report without peer review, and its polished version will be published elsewhere.