IEICE Technical Report

Print edition: ISSN 0913-5685      Online edition: ISSN 2432-6380

Volume 114, Number 470

Information Theory

Workshop Date : 2015-03-02 - 2015-03-03 / Issue Date : 2015-02-23

[PREV] [NEXT]

[TOP] | [2011] | [2012] | [2013] | [2014] | [2015] | [2016] | [2017] | [Japanese] / [English]

[PROGRAM] [BULK PDF DOWNLOAD]


Table of contents

IT2014-62
Accelerating QUAD Stream Cipher using Optimal Extension Field on GPU
Satoshi Tanaka (ISIT/Kyushu Univ.), Chen-Mou Cheng (Kyushu Univ.), Takanori Yasuda (ISIT), Kouichi Sakurai (ISIT/Kyushu Univ.)
pp. 1 - 4

IT2014-63
A Consideration of NTRU Whose Modular Polynomial Is All One Polynomial
Koki Misumi, Yasuyuki Nogami (Okayama Univ)
pp. 5 - 10

IT2014-64
Efficient Calculation of Pairing with Supersingular Curve on 2-dimentional Extension Field
Akito Kumano, Yasuyuki Nogami (Okayama Univ.), Masaaki Shirase (Future University Hakodate)
pp. 11 - 17

IT2014-65
On the construction of the nonlinear function-based stream cipher
Toru Sorimachi, Yusuke Naito (MITSUBISHI ELECTRIC)
pp. 19 - 24

IT2014-66
A Construction of Attribute-based Aggregate Signatures
Ryo Takahashi, Shingo Hasegawa, Shuji Isobe, Eisuke Koizumi, Hiroki Shizuya (Tohoku Univ.)
pp. 25 - 32

IT2014-67
On the Limit of Security Proof for Homomorphic Encryption
Daiki Takahashi, Shingo Hasegawa, Shuji Isobe, Eisuke Koizumi, Hiroki Shizuya (Tohoku Univ.)
pp. 33 - 38

IT2014-68
An Extension of the Polynomial Ring-based Fully Homomorphic Encryption Scheme to a Multikey Scheme
Tomoki Hayafuji, Masahiro Mambo (Kanazawa Univ.)
pp. 39 - 46

IT2014-69
decoding error probability for q-ary linear block code with soft dicision demodulation
Takuya Kawashima, Kazuhiko Yamaguchi (UEC)
pp. 47 - 52

IT2014-70
An Error Probability Analysis for QAM Classification by Two Amplitude Moments
Tomoaki Ono, Ikuo Oka, Shingo Ata (Osaka City Univ.)
pp. 53 - 57

IT2014-71
SNR Estimation for QAM by Likelihood Mothods
Shinji Nishijima, Ikuo Oka, Shingo Ata (Osaka City Univ.)
pp. 59 - 62

IT2014-72
Channel Sounders for Acoustic Communications Employing Acoustic Electronic Equipment -- Basic Structure of Channel Sounders for Acoustic Communications --
Takahide Ichikawa, Takashi Shimizu, Dai Aizawa, Hiroshi Kubo (Ritsumeikan Univ)
pp. 63 - 68

IT2014-73
Network Coded Phase Modulation and its Blind Startup Demodulation Using Per-Survivor Processing
Ryo Michio, Hiroshi Kubo (Ritsumeikan Univ)
pp. 69 - 74

IT2014-74
Block Differential Detection Employing Higher Order Channel Prediction for Multi-Carrier Differential Space-Time Block Coding
Kouki Nakamura, Ritsuko Miyazaki, Hiroshi Kubo (Ritsumeikan Univ.)
pp. 75 - 80

IT2014-75
Method of selecting anonymous communication circuit using a dynamic trust graph
Yuma Shinohara, Naoshi Kaneko, Tomohiko Saito, Kazuhiko Sumi (Aoyama Gakuin Univ.)
pp. 81 - 88

IT2014-76
Analysis on isomorphism classes of elliptic curves subjected to GHS attack over prime degree extensions of finite fields with odd characteristic
Takayuki Hosogaya (Chuo Univ.), Tsutomu Iijima (Koden), Mahoro Shimura (Tokai Univ.), Jinhui Chao (Chuo Univ.)
pp. 89 - 95

IT2014-77
A Relation between Autocorrelations of Sequences Generated by the Logistic Map over Prime Fields and Loops whose Periods are Almost Same as Precisions
Takeru Miyazaki (The Univ. of Kitakyushu), Shunsuke Araki (Kyushu Inst. of Tech.), Satoshi Uehara (The Univ. of Kitakyushu), Yasuyuki Nogami (Okayama Univ.)
pp. 97 - 102

IT2014-78
A Study of Two-dimensional Antidictionary Coding Using Automata
Takahiro Ota (NPIT), Hiroyoshi Morita (UEC)
pp. 103 - 109

IT2014-79
(k,n)-Threshold Secret Sharing Schemes to Detect Substitution Attacks
Wataru Nakamura, Hirosuke Yamamoto (UTokyo)
pp. 111 - 116

IT2014-80
Outage Capacity of a Two-User Interference Channel for Simultaneous Information and Energy Transfer
Yutaka Osawa, Ryutaroh Matsumoto, Tetsunao Matsuta, Tomohiko Uyematsu (Tokyo Tech)
pp. 117 - 122

IT2014-81
Empirical Study For High Precision Shape Estimation Using Phase Monopulse Method in UWB Radar
Masanobu Inoue, Yohei Oishi, Keiji Jimi, Isamu Matsunami (Kitakyusyu Univ.)
pp. 123 - 128

IT2014-82
Performance Evaluation of Positioning Accuracy for User Position Detection Method using Unmanned Aerial Vehicle
Hiroyasu Ishikawa, Shouta Kogure (Nihon Univ.)
pp. 129 - 134

IT2014-83
Towards Tokyo Olympics: 5G/P2P Hybrid Designs for Streaming to Massive Wireless Crowds
Marat Zhanikeev (Kyutech)
pp. 135 - 138

IT2014-84
A rapid filtering rule management plane implementation using distributed in-memory caching system
Ruo Ando (NICT)
pp. 139 - 147

IT2014-85
Arithmetic in a Prime Field of SWIFFT/SWIFFTX
Hidenori Kuwakado (Kansai Univ.)
pp. 149 - 152

IT2014-86
Algorithms to reduce the number of output symbols on condition that discrete memoryless channel satisfies admissible mutual information
Takumi Nagahara, Yuta Sakai, Ken-ichi Iwata (Univ. of Fukui)
pp. 153 - 158

IT2014-87
Another Representation on the Second-Order Achievable Rate Region of Slepian-Wolf Coding Problem for General Sources
Shota Saito, Nozomi Miya, Toshiyasu Matsushima (Waseda Univ.)
pp. 159 - 165

IT2014-88
Throughput Analysis Considering Route Shapes in Multi-hop Communication with Node Skipping
Kohei Mimura, Kouji Ohuchi (Shizuoka Univ.)
pp. 167 - 172

IT2014-89
On Block Spreading ZCZ-CDMA for High-Speed Transmission
Sho Kuroda (FX Systems), Kazuhiro Kobayashi, Yuta Ida, Takahiro Matsumoto, Shinya Matsufuji (Yamaguchi Univ.)
pp. 173 - 178

IT2014-90
A Note on Secure Computations with Commercially Available Playing Cards
Takaaki Mizuki (Tohoku Univ.)
pp. 179 - 186

IT2014-91
Knapsack Cryptosystem Using Three Random Secret Sequences
Yasuyuki Murakami, Shinsuke Hamasho (OECU), Masao Kasahara (WU/CU)
pp. 187 - 192

IT2014-92
Bonnet Detection Using Anomaly Detection Based on Sparse Structure Learning
Shu Mukai, Yuki Kawamura, Masanori Kawakita, Jun'ichi Takeuchi (Kyushu Univ.)
pp. 193 - 198

IT2014-93
On Upper Bounds on Estimation Error of Least Squares Rgression with L1 Penalty
Yushin Toyokihara, Masanori Kawakita, Jun'ichi Takeuchi (Kyushu Univ)
pp. 199 - 204

IT2014-94
On Linear Complexity of Constant-Weight Sequences over Extension Fields -- With Correction for Numerical Examples Presented on SCIS2015 --
Takayasu Kaida (Kinki Univ.), Junru Zheng (Kyushu Women's University), Keiichi Takahashi (Kinki Univ.)
pp. 205 - 210

IT2014-95
Toward Implementation of Algebraic Coding for Wiretap Channels
Mitsuru Hamada (Tamagawa Univ.)
pp. 211 - 212

IT2014-96
Empirical Study For Improved Rapid Detection and Discrimination of Multiple Moving Targets Using UWB Radar
Yohei Oishi, Masanobu Inoue, Keiji Jimi, Isamu Matsunami (kitakyushu Univ.)
pp. 213 - 218

IT2014-97
An Empirical Study on 2D-SLAM by UWB Radar
Keiji Jimi, Masanobu Inoue, Yohei Oishi, Isamu Matsunami (Kitakyushu Univ.)
pp. 219 - 224

IT2014-98
The Interference Avoidance in Ultra-Wideband Radar Using Stepped-FM Scheme
Shoichi Hatada, Masanobu Inoue, Isamu Matsunami (Kitakyusyu Univ.)
pp. 225 - 230

IT2014-99
[Invited Talk] Fast and Secure Implementation of Cryptography and its Practical Application
Shinichi Kawamura (Toshiba)
pp. 231 - 238

IT2014-100
[Invited Talk] Security of secret sharing schemes expressed in terms of the relative parameters of linear codes
Jun Kurihara (KDDI R&D Labs), Ryutaroh Matsumoto, Tomohiko Uyematsu (Tokyo Tech.)
pp. 239 - 246

IT2014-101
[Invited Talk] Ultra-wide Band Radio Sensor System with Interference Detect-And-Avoid
Akihiro Kajiwara (Kitakyushu Univ.)
pp. 247 - 252

Note: Each article is a technical report without peer review, and its polished version will be published elsewhere.


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan