IEICE Technical Report

Print edition: ISSN 0913-5685      Online edition: ISSN 2432-6380

Volume 117, Number 370

Theoretical Foundations of Computing

Workshop Date : 2017-12-21 - 2017-12-22 / Issue Date : 2017-12-14

[PREV] [NEXT]

[TOP] | [2014] | [2015] | [2016] | [2017] | [2018] | [2019] | [2020] | [Japanese] / [English]

[PROGRAM] [BULK PDF DOWNLOAD]


Table of contents

COMP2017-26
Fundamental Study of Classification of Attackers by Multiple Honeypots
Kazuya Yamashita, Okino Koji (Univ. of Toyama)
pp. 1 - 5

COMP2017-27
Effect on Mix Columns to the Security of Minalpher -- Experimental Results for 6 Rounds --
Yuki Kishi, Taroh Sasaki, Athushi Fujioka (Kanagawa Univ)
pp. 7 - 10

COMP2017-28
Space Efficient Algorithms for Maximum (Weight) Independent Set on Circular Arcs
Shohei Urakawa (Kobe Univ.), Tom C. van der Zanden (Utrecht Univ.), Toshiki Saitoh (Kyutech), Ryuhei Uehara (JAIST)
pp. 11 - 18

COMP2017-29
O(n^{1/3})-space algorithm for the grid graph reachability problem
Ryo Ashida, Kotaro Nakagawa (Tokyo Tech)
pp. 19 - 24

COMP2017-30
Maximum k-path Vertex Cover Problem on Graph Classes
Tsuyoshi Yagita, Eiji Miyano, Toshiki Saitoh (Kyutech), Ryuhei Uehara (JAIST), Tom C. van der Zanden (Utrecht U.)
pp. 25 - 31

COMP2017-31
An optimal strategy of the second player for the 1-round voronoi game on trees
Akihiro Sugimoto (Kobe Univ.), Toshiki Saitoh (Kyushu Inst. of Tech.)
pp. 33 - 39

COMP2017-32
[Invited Talk] Foundations and practical studies of secure computation
Ryo Kikuchi (NTT)
p. 41

COMP2017-33
Implementation Results of Privacy-Preserving and Public-Verifiable Data Aggregation Protocols
Tatsuya Suzuki (Tokai Univ.), Keita Emura (NICT), Hayato Kimura, Toshihiro Ohigashi (Tokai Univ.)
pp. 43 - 50

COMP2017-34
Security and Enhancement of a Searchable Public-key Encryption Secure against Keyword Guessing Attack
Takanori Saito, Toru Nakanishi (Hiroshima Univ)
pp. 51 - 57

COMP2017-35
Blacklistable Anonymous Credential System with Reputation Using Accumulator
Takeshi Kanatani, Toru Nakanishi (Hiroshima Univ.)
pp. 59 - 65

COMP2017-36
Implementation Difficulty of Dynamic Self-Modifying Based Self Destructive Tamper Response
Kazuomi Oishi (SIST)
pp. 67 - 74

COMP2017-37
Reputation System with Confidentiality to Administrator Using Linear Homomorophic Signatures
Daiki Uenoyama, Toru nakanishi (Hiroshima Univ.)
pp. 75 - 81

COMP2017-38
Optimizing Bleichenbacher's Attack on Schnorr-Type Signatures with Barely Biased Nonces
Akira Takahashi (Kyoto Univ.), Mehdi Tibouchi, Masayuki Abe, Tatsuaki Okamoto (NTT)
pp. 83 - 88

COMP2017-39
A Note on Security Notions of Anonymity in Identity-Based Encryption -- Relationship between LOR security and SW security --
Honomu Ohtomo, Taroh Sasaki, Atsushi Fujioka (Kanagawa Univ.)
pp. 89 - 94

COMP2017-40
A Note on Rearrangement Errors in a Card-Based Protocol
Takaaki Mizuki (Tohoku Univ.), Yuichi Komano (Toshiba)
pp. 95 - 101

COMP2017-41
[Invited Talk]
Ryuhei Mori (Tokyo Tech)
pp. 103 - 105

COMP2017-42
An ILP Formulation for Maximum Lengh Interval Graph Decomposition Problem
Keisuke Inoue (KTC)
pp. 107 - 110

COMP2017-43
Efficient Enumeration of Dominating Sets in K-Degenerate graphs
Kazuhiro Kurita (HU), Kunihiro Wasa, Takeaki Uno (NII), Hiroki Arimura (HU)
pp. 111 - 117

COMP2017-44
Physical Bucket Sort with Restricted take Operations
Atsuki Nagao, Wei Wu (Seikei Univ.), Hiro Ito (UEC)
pp. 119 - 122

Note: Each article is a technical report without peer review, and its polished version will be published elsewhere.


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan