Print edition: ISSN 0913-5685 Online edition: ISSN 2432-6380
[TOP] | [2013] | [2014] | [2015] | [2016] | [2017] | [2018] | [2019] | [Japanese] / [English]
IT2016-99
A Note on Key Dependency of Stream Cipher Grain v1
Satoshi Kidokoro (Tokai Univ.), Takanori Isobe (Kobe Univ.), Toshihiro Ohigashi (Tokai Univ.)
pp. 1 - 6
IT2016-100
Obfuscation of Symmetric Key Cryptography using Linear Obfuscation
Gavin Lynn Stewart (JAIST), Yuichi Futa (TUT), Atsuko Miyaji (JAIST/Osaka Univ.)
pp. 7 - 14
IT2016-101
The Security of 3-Round RSA-OAEP against Related-Key Attacks
Gembu Ito, Hiraku Morita, Tetsu Iwata (Nagoya Univ.)
pp. 15 - 22
IT2016-102
[Invited Talk]
Recent Advances in Whitebox Cryptgraphy
-- Efficient and Robust Constructions and New Attacks --
Takanori Isobe (Sony Global M&O Corp.)
p. 23
IT2016-103
A consideration of Meet-in-the-middle Attack for Multiple Encryption Algorithm
Yohei Maezawa, Munetoshi Iwakiri (NDA)
pp. 25 - 31
IT2016-104
Security Analysis of Ordinary Isogeny Diffie--Hellman
Satoshi Furukawa, Atsushi Takayasu, Noboru Kunihiro (The Univ. of Tokyo)
pp. 33 - 40
IT2016-105
Elliptic Curves Subjected to the GHS Attack on Composite Degree Extension Fields of Odd Characteristic Part II
Tappei Kobayashi (Chuo Univ.), Tsutomu Iijima (Koden Electronics), Jinhui Chao (Chuo Univ.)
pp. 41 - 48
IT2016-106
On the Design of Locally Repairable Codes Based on Code Modification
Hiroto Tamiya (Kobe Univ.), Masanori Hirotomo (Saga Univ.), Masakatu Morii (Kobe Univ.)
pp. 49 - 53
IT2016-107
Sphere packing bound and Gilbert-Varshamov bound for b-symbol read channels
Seunghoan Song, Toru Fujiwara (Osaka Univ.)
pp. 55 - 60
IT2016-108
Trellis Reduction for Tail-Biting Convolutional Codes Using Characteristic Matrices and Cyclically Shifted Code-Subsequences
Masato Tajima
pp. 61 - 66
IT2016-109
Security evaluation of elliptic curve cryptosystems with special addition formula(2)
Ryohei Morishima (Osaka Univ.), Atsuko Miyaji (Osaka Univ./JAIST)
pp. 67 - 72
IT2016-110
Security evaluation of elliptic curve cryptosystems with special addition formula
Kodera Kenta (Osaka Univ.), Miyaji Atsuko (Osaka Univ./JAIST), Cheng Chen-Mou (Osaka Univ.)
pp. 73 - 78
IT2016-111
Construction of covering curves of elliptic curves over finite fields of even characteristic using simple extension
Seiya Kukisaki (Chuo Univ.), Mahoro Simura (Tokai Univ.), Jinhui Chao (Chuo Univ.)
pp. 79 - 83
IT2016-112
Construction of (2,...,2) coverings over projective line from elliptic curves over prime degree extension fields of even characteristic.
Takuya Morishita (Chuo Univ.), Mahoro Shimura (Tokai Univ.), Jinhui Chao (Chuo Univ.)
pp. 85 - 89
IT2016-113
A study on delay profile measurements using MB-OFDM-UWB signal and cross-correlation
Takuya Okamoto, Tetsushi Ikegami (Meiji Univ.)
pp. 91 - 96
IT2016-114
Multiuser Performance Evaluation on Square-law Detection DS-UWB-IR using Modified Pseudo-orthogonal M-sequence
Takuma Matsumura, Hiromasa Habuchi (Ibaraki Univ.)
pp. 97 - 102
IT2016-115
PAPR Reduction Scheme for OFCDM Using Code Shift Keying
Yuki Hosokawa, Hiromasa Habuchi (Ibaraki Univ.)
pp. 103 - 107
IT2016-116
Different Orthogonal Code DS/CDMA with High Spectral Efficiency and Evaluations by Interference Cancellation Using Indoor Radio Wave Intensity Distriburtion
Hirofumi Nakajo, Shin'ichi Tachikawa (NIT, Nagaoka)
pp. 109 - 113
IT2016-117
[Invited Talk]
On the Wyner-Ziv Coding Problem with Delayed Side Information
Tetsunao Matsuta, Tomohiko Uyematsu (Tokyo Tech)
pp. 115 - 120
IT2016-118
Anonymous Oblivious RAM for Multi-user Environment
Satoru Takano, Su Chunhua, Atuko Miyaji (Osaka Univ.)
pp. 121 - 128
IT2016-119
A study of secure multi-party set union protocol
Katsunari Shishido, Atsuko Miyaji (OU)
pp. 129 - 135
IT2016-120
Software Protection by Hash-Table-Based Interlocking of Self Integrity Verification
Naoki Watanabe, Naoki Yoshida, Tsutomu Matsumoto (YNU)
pp. 137 - 144
IT2016-121
Diagonally Witness-Indistinguishable Proof Systems
Hiroaki Anada (Univ. Nagasaki), Seiko Arita (IISEC)
pp. 145 - 148
IT2016-122
Provable Secure Signature Scheme against Quantum Adversaries based on Decisional Isomorphism of Polynomials with Two Secrets
Bagus Santoso (UEC)
pp. 149 - 154
IT2016-123
Studies on evaluationg system for q-ary linear block codes based on q-input r-output symmetric channels(2)
Kyoshiro Furuya, Kazuhiko Yamaguchi (UEC)
pp. 155 - 160
IT2016-124
MRI Acceleration by Super Resolution
Ayaka Nakashima, Masanori Kawakita, Yutaka Jitsumatsu (Kyushu Univ.), Shigehide Kuhara (Kyorin Univ.), Jun'ichi Takeuchi (Kyushu Univ.)
pp. 161 - 166
IT2016-125
BER Prediction of Convolutional Coded OFDM Transmission with Application to IEEE 802.11 Wireless LAN
Norisato Suga, Naoto Egashira, Kazuto Yano, Tomoaki Kumagai (ATR)
pp. 167 - 172
IT2016-126
Overflow Probability of Variable-Length Codes Allowing Non-Vanishing Error Probability
Ryo Nomura (Senshu Univ.), Hideki Yagi (Univ. of Electro-Comm.)
pp. 173 - 178
IT2016-127
Notes on a new fundamental scheme K(V)Scheme for constructing secure product-sum PKC, K(V) ΣΠPKC and multivariate PKC, K(V)MVPKC
Masao Kasahara (Waseda Univ.)
pp. 179 - 185
IT2016-128
A Note on Acceptable Information Leakage of Searchable Symmetric Encryption
Takeshi Nakai, Takuya Nojima, Mitsugu Iwamoto, Kazuo Ohta (UEC)
pp. 187 - 193
IT2016-129
Efficient Verifiable Attribute-Based Keyword Search
Go Ohtake (NHK), Reihaneh Safavi-Naini (Univ. of Calgary), Liang Feng Zhang (ShanghaiTech Univ.)
pp. 195 - 202
IT2016-130
Index Coding with Information-Theoretic Secrecy for Unintended Message
Mami Takei, Hiroki Koga (Univ. Tsukuba)
pp. 203 - 208
IT2016-131
Spectrum Sensing in Cooperative with Some Secondary Users
Yuki Muranaka, Ryutaroh Matsumoto, Tetsunao Matsuta, Tomohiko Uyematsu (Tokyo Tech)
pp. 209 - 214
IT2016-132
Quantum Stabilizer Codes Can Realize Access Structures Impossible by Classical Secret Sharing
Ryutaroh Matsumoto (Tokyo Tech.)
pp. 215 - 216
IT2016-133
Secret Sharing Schemes using Modulo-2^m Operations
Hidenori Kuwakado (Kansai Univ.)
pp. 217 - 221
IT2016-134
Development of Security Incident Symptomatic Analysis function in SIAS
Mitsumu Katsuno, Hiroki Sakamoto, Hiroyuki Ookawa, Takashi Yamaguchi, Eiji Nunohiro (TUIS), Akira Orita, Tatsuya Sekiguchi (HISYS.ISR)
pp. 223 - 228
IT2016-135
Performance of Error Correcting Codes for RGB-LED Parallel Transmission
Ran Sun, Hiromasa Habuchi, Yusuke Kozawa (Ibaraki Univ.)
pp. 229 - 232
IT2016-136
Impact of Multi-Path Reflection on the Visible-Light Variable N-parallel Code-Shift Keying utilizing Modified Prime Sequence Code
Keisuke Osawa, Hiromasa Habuchi, Yusuke Kozawa (Ibaraki Univ.)
pp. 233 - 238
IT2016-137
A Study on Relay Communication using UAV with Buffer
Higashi Takahiro, Ochiai Hideki (Yokohama National Univ.)
pp. 239 - 244
IT2016-138
[Invited Talk]
A Survey on Space-, Time-, and Frequency-Domain Index Modulation
Shinya Sugiura (TUAT)
pp. 245 - 249
Note: Each article is a technical report without peer review, and its polished version will be published elsewhere.