Print edition: ISSN 0913-5685 Online edition: ISSN 2432-6380
[TOP] | [2013] | [2014] | [2015] | [2016] | [2017] | [2018] | [2019] | [Japanese] / [English]
COMP2016-31
Improvements of Blacklistable Anonymous Credential System Using Accumulator
Yuu Aikou, Toru Nakanishi (Hiroshima Univ)
pp. 1 - 7
COMP2016-32
A note on security notions of anonymity in Identity-based encryption
Honomu Ootomo, Taroh Sasaki, Atsushi Fujioka (Kanagawa Univ.)
pp. 9 - 13
COMP2016-33
[Invited Talk]
New frontier of machine learning and computation initiated by quantum annealing
Masayuki Ohzeki (Tohoku Univ.)
pp. 15 - 22
COMP2016-34
[Invited Talk]
Fast and Scalable Bilinear-Type Conversion Using Integer Programming
Fumitaka Hoshino, Masayuki Abe (NTT), Miyako Ohkubo (NICT)
p. 23
COMP2016-35
[Invited Talk]
Cryptanalysis of GGH15 Multilinear Maps (from CRYPTO 2016)
Mehdi Tibouchi (NTT)
p. 25
COMP2016-36
[Invited Talk]
Backdoors in Pseudorandom Number Generators: Possibility and Impossibility Results
Jean Paul Degabriele, Kenneth Paterson (RHUL), Jacob Schuldt (AIST), Joanne Woodage (RHUL)
p. 27
COMP2016-37
Miki Miyauchi (NTT)
pp. 29 - 35
COMP2016-38
(See Japanese page.)
pp. 37 - 42
COMP2016-39
A Loosely-Stabilizing Population Protocol for Maximal Independent Set
Seiken Kiyosu, Yuichi Sudo, Hirotsugu Kakugawa, Toshimitsu Masuzawa (Osaka Univ.)
pp. 43 - 49
COMP2016-40
Theoretical Model of Interconnection Networks Consisting of Hosts and Switches
Ryota Yasudo (Keio Univ.), Michihiro Koibuchi (NII), Hideharu Amano (Keio Univ.), Koji Nakano (Hiroshima Univ.)
pp. 51 - 58
COMP2016-41
Effect on Mix Columns to the Security of Minalpher
Yuki Kishi, Taroh Sasaki, Atsushi Fujioka (Kanagawa Univ)
pp. 59 - 62
COMP2016-42
Reconsideration on Re-keying scheme from CARDIS 2015 (part 2)
Yuichi Komano (Toshiba)
pp. 63 - 69
COMP2016-43
[Invited Talk]
Theory and Practice of Succinct Data Structures
Kunihiko Sadakane (Univ. of Tokyo)
p. 71
COMP2016-44
[Invited Talk]
Adversary-dependent Lossy Trapdoor Function from Hardness of Factoring Semi-smooth RSA Subgroup
Takashi Yamakawa (UT), Shota Yamada, Goichiro Hanaoka (AIST), Noboru Kunihiro (UT)
p. 73
COMP2016-45
[Invited Talk]
Extended Tower Number Field Sieve: A New Complexity for the Medium Prime Case (from CRYPTO 2015)
Taechan Kim (NTT)
p. 75
COMP2016-46
[Invited Talk]
The SKINNY Family of Block Ciphers and its Low-Latency Variant MANTIS
Yu Sasaki (NTT)
p. 77
COMP2016-47
[Invited Talk]
How small can the diameter of an undirected graph be?
-- Toward low-latency large-scale interconnection networks --
Ikki Fujiwara (NICT)
p. 79
COMP2016-48
Reduction of Search Number for Equivalence Structure Extraction Under Equivalence Structure Conservation Assumption
Seiya Satoh (AIST), Yoshinobu Takahashi (University of Electro-Communications), Hiroshi Yamakawa (Dwango AI Lab)
pp. 81 - 86
COMP2016-49
Improvement of Finger Outlines Extraction in Hand Images Including Unusual Patterns with a Color Glove
Kotaro Moriuchi, Noriaki Fujishima (NIT, Matsue College)
pp. 87 - 91
Note: Each article is a technical report without peer review, and its polished version will be published elsewhere.