IEICE Technical Report

Online edition: ISSN 2432-6380

Volume 120, Number 411

Information Security

Workshop Date : 2021-03-04 - 2021-03-05 / Issue Date : 2021-02-25

[PREV] [NEXT]

[TOP] | [2017] | [2018] | [2019] | [2020] | [2021] | [2022] | [2023] | [Japanese] / [English]

[PROGRAM] [BULK PDF DOWNLOAD]


Table of contents

ISEC2020-42
List-Pruning SCL Decoder for Polar Codes Using Parity-Check Bits
Yusuke Oki, Ryo Shibata, Hiroyuki Yashima (TUS)
pp. 1 - 6

ISEC2020-43
Variable spreading factor codes for optical code-division multiple access
Kyohei Ono, Shoichiro Yamasaki, Tomoko K. Matsushima (Polytechnic Univ.)
pp. 7 - 12

ISEC2020-44
Error Performances of Synchronous Optical Code-Division Multiple Access Schemes Using Chip-Pair Codes
Tomoko K. Matsushima, Shoichiro Yamasaki, Kyohei Ono (Polytechnic Univ.)
pp. 13 - 18

ISEC2020-45
An Efficient Bayes Coding Algorithm for the Source Based on Context Tree Models that Vary from Section to Section
Koshi Shimada, Shota Saito, Toshiyasu Matsushima (Waseda Univ.)
pp. 19 - 24

ISEC2020-46
A note on sufficient condition for reconstructable substring of CSE method
Shungo Tanaka, Hiroshi Kamabe, Shan Lu (Gifu Univ.)
pp. 25 - 30

ISEC2020-47
Streaming Data Compression and Decompression by One-Way Quantum Finite-State Automata, Leading to Quantum Finite-State Deep and Shallow Information (Preliminary Report)
Tomoyuki Yamakami (U of Fukui)
pp. 31 - 36

ISEC2020-48
Four-Block Type-2 Feistel Cipher from Tweakable Block Ciphers
Kazuki Nakaya, Tetsu Iwata (Nagoya Univ.)
pp. 37 - 44

ISEC2020-49
Integral Attack with Bit-Based Division Property against lightweight block cipher MANTRA
Hiroki Komatsu, Yasutaka Igarashi, Toshinobu Kaneko (TUS)
pp. 45 - 51

ISEC2020-50
Analysis of a new linear bias in the input/output difference of Salsa20
Ryo Watanabe, Atsuko Miyaji (Osaka Univ.)
pp. 52 - 57

ISEC2020-51
Solving Shortest Vector Problem using annealing computation -- How to generate a hamiltonian using pseudo multispin flip method --
Junpei Yamaguchi (Fujitsu Llaboratories), Takuya Ohwa (Kyushu Institute of Technology), Kazuyoshi Furukawa (Fujitsu Llaboratories)
pp. 58 - 65

ISEC2020-52
An Attack on Search Ring-LWE Problem for Even Relative Degree
Yasuhisa Okumura, Shinya Okumura, Atsuko Miyaji (Osaka Univ)
pp. 66 - 72

ISEC2020-53
Security analysis for the isogeny-based cryptography CSIDH
Hayato Arai, Atsuko Miyaji, Kenta Kodera (Osaka Univ.)
pp. 73 - 80

ISEC2020-54
Efficient parallel computing method of isogeny based cryptography
Ryota Udani, Koutarou Suzuki (TUT)
pp. 81 - 85

ISEC2020-55
[Poster Presentation] Experimental Evaluation for Alamouti-type Spatio-temporal Coding in Image Sensor Communication Using a Rotary LED Transmitter
Zhengqiang Tang, Shintaro Arai (Okayama Univ. of Sci.), Takaya Yamazato (Nagoya Univ.)
pp. 86 - 91

ISEC2020-56
[Poster Presentation] Performance evaluation of ACO-OFDM method with dither signal for PAPR reduction
Daiki Harada, Kouji Ohuchi (Shizuoka Univ.)
pp. 92 - 97

ISEC2020-57
[Poster Presentation] Recovery of Partially Missing OFDM Signal in Time-Domain
Chengbo Liu, Na Chen, Minoru Okada (NAIST)
pp. 98 - 103

ISEC2020-58
[Poster Presentation] Performance Evaluation of Secure Communication based on OFDM and DFT-Precoded OFDM over Fading Channel
Airi Kaneko, Hideki Ochiai, Junji Shikata (YNU)
pp. 104 - 109

ISEC2020-59
[Poster Presentation] Performance Enhancement of Rolling Shutter Based Visible Light Communication by Selective Reception Using Dual Camera
Sora Ibaraki, Takumi Toguma, Shun Yamaguchi, Masayuki Kinoshita, Koji Kamakura (Chiba Inst. of Tech.), Takaya Yamazato (Nagoya Univ.)
pp. 110 - 114

ISEC2020-60
[Poster Presentation] Non-asymptotic converse theorem on the overflow probability of variable-to-fixed length codes
Shota Saito, Toshiyasu Matsushima (Waseda Univ.)
pp. 115 - 116

ISEC2020-61
An Optimal Construction of the Basis Matrices of a Visual Cryptography Scheme for Multiple Secret Images Allowing the Rotation of Shares
Kyohei Sekine, Hiroki Koga (Tsukuba Univ.)
pp. 117 - 122

ISEC2020-62
A Consideration on Evolving Secret Sharing Schemes using Linear Codes
Hiroki Toriumi, Nozomi Miya, Hajime Jinushi (Aoyama Gakuin Univ.)
pp. 123 - 127

ISEC2020-63
Upper and Lower Bounds on the Capacity of Private Information Retrieval Allowing Information Leakage from Queries with Different Limits for Each Database
Naoto Toyoda, Tetsunao Matsuta, Uyematsu Tomohiko (Tokyo Tech)
pp. 128 - 133

ISEC2020-64
[Invited Talk] Management of Multiple Wireless Access for IOWN in the 6G era
Yasushi Takatori (NTT)
pp. 134 - 138

ISEC2020-65
A Physical Zero-knowledge Proof for Cryptarithmetic Using Dihedral Cards
Raimu Isuzugawa (Tohoku Univ.), Daiki Miyahara, Takaaki Mizuki (Tohoku Univ./AIST), Hideaki Sone (Tohoku Univ.)
pp. 139 - 145

ISEC2020-66
On Some Principles of Security Analysis for Physical-Ciphered Communication Systems
Kentaro Kato (Tamagawa Univ.)
pp. 146 - 151

ISEC2020-67
A Real-Time Bluetooth Protocol Fuzzing System
Bo Wang, Suzuki Ako (JVCKW), Yuichi Kaji (NU)
pp. 152 - 159

ISEC2020-68
Blind Estimation of Carrier Frequency Offset and Symbol Time Offset using WFrFT
Toshifumi Kojima, Kouji Ohuchi (Shizuoka Univ.)
pp. 160 - 165

ISEC2020-69
Performance Evaluation of VN-CSK Type Parallel Indoor Optical Wireless Communication Using RGB-LED with Different Color Power
Koki Taruishi, Hiromasa Habuchi, Yusuke Kozawa (Ibaraki Univ.)
pp. 166 - 170

ISEC2020-70
Indoor Long Distance High Speed Imaging MIMO System With Linear Transmitting Element Array
Chedlia Ben Naila, Hiraku Okada, Masaaki Katayama (Nagoya University)
pp. 171 - 175

ISEC2020-71
Vehicle Speed and Driving Distance Estimation using Millimeter-wave Radar
Keiji Jimi, Takeki Ogitsu (Gunma Univ.)
pp. 176 - 180

ISEC2020-72
Improving of Interference Reduction Scheme Using Replica Signals for FMCW Radar
Fumiya Tako, Kohei Ohno (Meiji Univ.)
pp. 181 - 186

ISEC2020-73
Relationships among Security Notions and Lower Bounds on Tags in Anonymous Broadcast Authentication
Hirokazu Kobayashi (Yokohama National Univ..), Yohei Watanabe (The Univ. of Electro-Communications/AIST), Junji Shikata (Yokohama National Univ..)
pp. 187 - 194

ISEC2020-74
Construction of non-malleable codes based on graph theory
Shohei Satake (Kumamoto Univ.), Yujie Gu, Kouichi Sakurai (Kyushu Univ.)
pp. 195 - 200

ISEC2020-75
Constant-Round Two-Party Exponentiation Based on Additive Secret Sharing
Yi Lu, Keisuke Hara (Tokyo Tech/AIST), Kazuma Ohara, Jacob Schuldt (AIST), Keisuke Tanaka (Tokyo Tech)
pp. 201 - 207

ISEC2020-76
A Proposal for Causal Inference with Subjective Evaluation
Daichi Ikeda, Hikaru Morita (Graduate School of Kanagawa Univ.)
pp. 208 - 212

ISEC2020-77
Digital Signatures with Wildcards
Tomoki Miyazawa, Junji Shikata (Yokohama National Univ.)
pp. 213 - 218

ISEC2020-78
Non-interactive multiparty computation adapt to dynamic participants
Shota Mazawa, Junji Shikata (Yokohama National Univ.)
pp. 219 - 224

ISEC2020-79
A Proposal of Decentralized Multi-authority Traceable Anonymous Credential Scheme and Its Generic Construction
Hiroaki Anada (Univ. of Nagasaki)
pp. 225 - 231

ISEC2020-80
Fast Multiparty Threshold ECDSA With Robustness
Wang zhaobo, Atsuko Miyaji (Osaka Univ.)
pp. 232 - 238

ISEC2020-81
Improvement of Cicalese-Gargano-Vaccaro Algorithm for the Minimum-Entropy Couplings Problem
Kohei Sakatani, Ken-ichi Iwata (Univ. of Fukui), Hiroshi Fujisaki (Kanazawa Univ.)
pp. 239 - 244

ISEC2020-82
Analysis of Optimal Error Exponents on Classification for Markov Sources
Hiroto Kuramata, Hideki Yagi, Tsutomu Kawabata (UEC)
pp. 245 - 250

ISEC2020-83
[Invited Talk] Lee Metric Error Correcting Codes on Two-Dimensional Lattices
Hiroyoshi Morita (UEC)
pp. 251 - 256

ISEC2020-84
Information retrieval for security reports using behavior of cyber attacker
Yuki Kawaguchi, Mayo Yamasaki (NTT)
pp. 257 - 264

ISEC2020-85
Analysis of Attack Activities for Honeypot Installation in Ethereum Network.
Chin Kota, Omote Kazumasa (Univ. Tsukuba)
pp. 265 - 272

ISEC2020-86
Learning Contract-Wide Code Representations for Vulnerability Detection on Ethereum Smart Contracts
Nami Ashizawa, Naoto Yanai, Jason Paul Cruz (Osaka Univ.), Singo Okamura (NITNC)
pp. 273 - 280

ISEC2020-87
Consideration of embedding methods and machine learning models for detecting malicious URLs
Qisheng Chen, Kazumasa omote (Univ. of Tsukuba)
pp. 281 - 287

Note: Each article is a technical report without peer review, and its polished version will be published elsewhere.


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan