IEICE Technical Report

Online edition: ISSN 2432-6380

Volume 120, Number 410

Information Theory

Workshop Date : 2021-03-04 - 2021-03-05 / Issue Date : 2021-02-25

[PREV] [NEXT]

[TOP] | [2017] | [2018] | [2019] | [2020] | [2021] | [2022] | [2023] | [Japanese] / [English]

[PROGRAM] [BULK PDF DOWNLOAD]


Table of contents

IT2020-112
List-Pruning SCL Decoder for Polar Codes Using Parity-Check Bits
Yusuke Oki, Ryo Shibata, Hiroyuki Yashima (TUS)
pp. 1 - 6

IT2020-113
Variable spreading factor codes for optical code-division multiple access
Kyohei Ono, Shoichiro Yamasaki, Tomoko K. Matsushima (Polytechnic Univ.)
pp. 7 - 12

IT2020-114
Error Performances of Synchronous Optical Code-Division Multiple Access Schemes Using Chip-Pair Codes
Tomoko K. Matsushima, Shoichiro Yamasaki, Kyohei Ono (Polytechnic Univ.)
pp. 13 - 18

IT2020-115
An Efficient Bayes Coding Algorithm for the Source Based on Context Tree Models that Vary from Section to Section
Koshi Shimada, Shota Saito, Toshiyasu Matsushima (Waseda Univ.)
pp. 19 - 24

IT2020-116
A note on sufficient condition for reconstructable substring of CSE method
Shungo Tanaka, Hiroshi Kamabe, Shan Lu (Gifu Univ.)
pp. 25 - 30

IT2020-117
Streaming Data Compression and Decompression by One-Way Quantum Finite-State Automata, Leading to Quantum Finite-State Deep and Shallow Information (Preliminary Report)
Tomoyuki Yamakami (U of Fukui)
pp. 31 - 36

IT2020-118
Four-Block Type-2 Feistel Cipher from Tweakable Block Ciphers
Kazuki Nakaya, Tetsu Iwata (Nagoya Univ.)
pp. 37 - 44

IT2020-119
Integral Attack with Bit-Based Division Property against lightweight block cipher MANTRA
Hiroki Komatsu, Yasutaka Igarashi, Toshinobu Kaneko (TUS)
pp. 45 - 51

IT2020-120
Analysis of a new linear bias in the input/output difference of Salsa20
Ryo Watanabe, Atsuko Miyaji (Osaka Univ.)
pp. 52 - 57

IT2020-121
Solving Shortest Vector Problem using annealing computation -- How to generate a hamiltonian using pseudo multispin flip method --
Junpei Yamaguchi (Fujitsu Llaboratories), Takuya Ohwa (Kyushu Institute of Technology), Kazuyoshi Furukawa (Fujitsu Llaboratories)
pp. 58 - 65

IT2020-122
An Attack on Search Ring-LWE Problem for Even Relative Degree
Yasuhisa Okumura, Shinya Okumura, Atsuko Miyaji (Osaka Univ)
pp. 66 - 72

IT2020-123
Security analysis for the isogeny-based cryptography CSIDH
Hayato Arai, Atsuko Miyaji, Kenta Kodera (Osaka Univ.)
pp. 73 - 80

IT2020-124
Efficient parallel computing method of isogeny based cryptography
Ryota Udani, Koutarou Suzuki (TUT)
pp. 81 - 85

IT2020-125
[Poster Presentation] Experimental Evaluation for Alamouti-type Spatio-temporal Coding in Image Sensor Communication Using a Rotary LED Transmitter
Zhengqiang Tang, Shintaro Arai (Okayama Univ. of Sci.), Takaya Yamazato (Nagoya Univ.)
pp. 86 - 91

IT2020-126
[Poster Presentation] Performance evaluation of ACO-OFDM method with dither signal for PAPR reduction
Daiki Harada, Kouji Ohuchi (Shizuoka Univ.)
pp. 92 - 97

IT2020-127
[Poster Presentation] Recovery of Partially Missing OFDM Signal in Time-Domain
Chengbo Liu, Na Chen, Minoru Okada (NAIST)
pp. 98 - 103

IT2020-128
[Poster Presentation] Performance Evaluation of Secure Communication based on OFDM and DFT-Precoded OFDM over Fading Channel
Airi Kaneko, Hideki Ochiai, Junji Shikata (YNU)
pp. 104 - 109

IT2020-129
[Poster Presentation] Performance Enhancement of Rolling Shutter Based Visible Light Communication by Selective Reception Using Dual Camera
Sora Ibaraki, Takumi Toguma, Shun Yamaguchi, Masayuki Kinoshita, Koji Kamakura (Chiba Inst. of Tech.), Takaya Yamazato (Nagoya Univ.)
pp. 110 - 114

IT2020-130
[Poster Presentation] Non-asymptotic converse theorem on the overflow probability of variable-to-fixed length codes
Shota Saito, Toshiyasu Matsushima (Waseda Univ.)
pp. 115 - 116

IT2020-131
An Optimal Construction of the Basis Matrices of a Visual Cryptography Scheme for Multiple Secret Images Allowing the Rotation of Shares
Kyohei Sekine, Hiroki Koga (Tsukuba Univ.)
pp. 117 - 122

IT2020-132
A Consideration on Evolving Secret Sharing Schemes using Linear Codes
Hiroki Toriumi, Nozomi Miya, Hajime Jinushi (Aoyama Gakuin Univ.)
pp. 123 - 127

IT2020-133
Upper and Lower Bounds on the Capacity of Private Information Retrieval Allowing Information Leakage from Queries with Different Limits for Each Database
Naoto Toyoda, Tetsunao Matsuta, Uyematsu Tomohiko (Tokyo Tech)
pp. 128 - 133

IT2020-134
[Invited Talk] Management of Multiple Wireless Access for IOWN in the 6G era
Yasushi Takatori (NTT)
pp. 134 - 138

IT2020-135
A Physical Zero-knowledge Proof for Cryptarithmetic Using Dihedral Cards
Raimu Isuzugawa (Tohoku Univ.), Daiki Miyahara, Takaaki Mizuki (Tohoku Univ./AIST), Hideaki Sone (Tohoku Univ.)
pp. 139 - 145

IT2020-136
On Some Principles of Security Analysis for Physical-Ciphered Communication Systems
Kentaro Kato (Tamagawa Univ.)
pp. 146 - 151

IT2020-137
A Real-Time Bluetooth Protocol Fuzzing System
Bo Wang, Suzuki Ako (JVCKW), Yuichi Kaji (NU)
pp. 152 - 159

IT2020-138
Blind Estimation of Carrier Frequency Offset and Symbol Time Offset using WFrFT
Toshifumi Kojima, Kouji Ohuchi (Shizuoka Univ.)
pp. 160 - 165

IT2020-139
Performance Evaluation of VN-CSK Type Parallel Indoor Optical Wireless Communication Using RGB-LED with Different Color Power
Koki Taruishi, Hiromasa Habuchi, Yusuke Kozawa (Ibaraki Univ.)
pp. 166 - 170

IT2020-140
Indoor Long Distance High Speed Imaging MIMO System With Linear Transmitting Element Array
Chedlia Ben Naila, Hiraku Okada, Masaaki Katayama (Nagoya University)
pp. 171 - 175

IT2020-141
Vehicle Speed and Driving Distance Estimation using Millimeter-wave Radar
Keiji Jimi, Takeki Ogitsu (Gunma Univ.)
pp. 176 - 180

IT2020-142
Improving of Interference Reduction Scheme Using Replica Signals for FMCW Radar
Fumiya Tako, Kohei Ohno (Meiji Univ.)
pp. 181 - 186

IT2020-143
Relationships among Security Notions and Lower Bounds on Tags in Anonymous Broadcast Authentication
Hirokazu Kobayashi (Yokohama National Univ..), Yohei Watanabe (The Univ. of Electro-Communications/AIST), Junji Shikata (Yokohama National Univ..)
pp. 187 - 194

IT2020-144
Construction of non-malleable codes based on graph theory
Shohei Satake (Kumamoto Univ.), Yujie Gu, Kouichi Sakurai (Kyushu Univ.)
pp. 195 - 200

IT2020-145
Constant-Round Two-Party Exponentiation Based on Additive Secret Sharing
Yi Lu, Keisuke Hara (Tokyo Tech/AIST), Kazuma Ohara, Jacob Schuldt (AIST), Keisuke Tanaka (Tokyo Tech)
pp. 201 - 207

IT2020-146
A Proposal for Causal Inference with Subjective Evaluation
Daichi Ikeda, Hikaru Morita (Graduate School of Kanagawa Univ.)
pp. 208 - 212

IT2020-147
Digital Signatures with Wildcards
Tomoki Miyazawa, Junji Shikata (Yokohama National Univ.)
pp. 213 - 218

IT2020-148
Non-interactive multiparty computation adapt to dynamic participants
Shota Mazawa, Junji Shikata (Yokohama National Univ.)
pp. 219 - 224

IT2020-149
A Proposal of Decentralized Multi-authority Traceable Anonymous Credential Scheme and Its Generic Construction
Hiroaki Anada (Univ. of Nagasaki)
pp. 225 - 231

IT2020-150
Fast Multiparty Threshold ECDSA With Robustness
Wang zhaobo, Atsuko Miyaji (Osaka Univ.)
pp. 232 - 238

IT2020-151
Improvement of Cicalese-Gargano-Vaccaro Algorithm for the Minimum-Entropy Couplings Problem
Kohei Sakatani, Ken-ichi Iwata (Univ. of Fukui), Hiroshi Fujisaki (Kanazawa Univ.)
pp. 239 - 244

IT2020-152
Analysis of Optimal Error Exponents on Classification for Markov Sources
Hiroto Kuramata, Hideki Yagi, Tsutomu Kawabata (UEC)
pp. 245 - 250

IT2020-153
[Invited Talk] Lee Metric Error Correcting Codes on Two-Dimensional Lattices
Hiroyoshi Morita (UEC)
pp. 251 - 256

IT2020-154
Information retrieval for security reports using behavior of cyber attacker
Yuki Kawaguchi, Mayo Yamasaki (NTT)
pp. 257 - 264

IT2020-155
Analysis of Attack Activities for Honeypot Installation in Ethereum Network.
Chin Kota, Omote Kazumasa (Univ. Tsukuba)
pp. 265 - 272

IT2020-156
Learning Contract-Wide Code Representations for Vulnerability Detection on Ethereum Smart Contracts
Nami Ashizawa, Naoto Yanai, Jason Paul Cruz (Osaka Univ.), Singo Okamura (NITNC)
pp. 273 - 280

IT2020-157
Consideration of embedding methods and machine learning models for detecting malicious URLs
Qisheng Chen, Kazumasa omote (Univ. of Tsukuba)
pp. 281 - 287

Note: Each article is a technical report without peer review, and its polished version will be published elsewhere.


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan