Online edition: ISSN 2432-6380
[TOP] | [2017] | [2018] | [2019] | [2020] | [2021] | [2022] | [2023] | [Japanese] / [English]
WBS2020-31
List-Pruning SCL Decoder for Polar Codes Using Parity-Check Bits
Yusuke Oki, Ryo Shibata, Hiroyuki Yashima (TUS)
pp. 1 - 6
WBS2020-32
Variable spreading factor codes for optical code-division multiple access
Kyohei Ono, Shoichiro Yamasaki, Tomoko K. Matsushima (Polytechnic Univ.)
pp. 7 - 12
WBS2020-33
Error Performances of Synchronous Optical Code-Division Multiple Access Schemes Using Chip-Pair Codes
Tomoko K. Matsushima, Shoichiro Yamasaki, Kyohei Ono (Polytechnic Univ.)
pp. 13 - 18
WBS2020-34
An Efficient Bayes Coding Algorithm for the Source Based on Context Tree Models that Vary from Section to Section
Koshi Shimada, Shota Saito, Toshiyasu Matsushima (Waseda Univ.)
pp. 19 - 24
WBS2020-35
A note on sufficient condition for reconstructable substring of CSE method
Shungo Tanaka, Hiroshi Kamabe, Shan Lu (Gifu Univ.)
pp. 25 - 30
WBS2020-36
Streaming Data Compression and Decompression by One-Way Quantum Finite-State Automata, Leading to Quantum Finite-State Deep and Shallow Information (Preliminary Report)
Tomoyuki Yamakami (U of Fukui)
pp. 31 - 36
WBS2020-37
Four-Block Type-2 Feistel Cipher from Tweakable Block Ciphers
Kazuki Nakaya, Tetsu Iwata (Nagoya Univ.)
pp. 37 - 44
WBS2020-38
Integral Attack with Bit-Based Division Property against lightweight block cipher MANTRA
Hiroki Komatsu, Yasutaka Igarashi, Toshinobu Kaneko (TUS)
pp. 45 - 51
WBS2020-39
Analysis of a new linear bias in the input/output difference of Salsa20
Ryo Watanabe, Atsuko Miyaji (Osaka Univ.)
pp. 52 - 57
WBS2020-40
Solving Shortest Vector Problem using annealing computation
-- How to generate a hamiltonian using pseudo multispin flip method --
Junpei Yamaguchi (Fujitsu Llaboratories), Takuya Ohwa (Kyushu Institute of Technology), Kazuyoshi Furukawa (Fujitsu Llaboratories)
pp. 58 - 65
WBS2020-41
An Attack on Search Ring-LWE Problem for Even Relative Degree
Yasuhisa Okumura, Shinya Okumura, Atsuko Miyaji (Osaka Univ)
pp. 66 - 72
WBS2020-42
Security analysis for the isogeny-based cryptography CSIDH
Hayato Arai, Atsuko Miyaji, Kenta Kodera (Osaka Univ.)
pp. 73 - 80
WBS2020-43
Efficient parallel computing method of isogeny based cryptography
Ryota Udani, Koutarou Suzuki (TUT)
pp. 81 - 85
WBS2020-44
[Poster Presentation]
Experimental Evaluation for Alamouti-type Spatio-temporal Coding in Image Sensor Communication Using a Rotary LED Transmitter
Zhengqiang Tang, Shintaro Arai (Okayama Univ. of Sci.), Takaya Yamazato (Nagoya Univ.)
pp. 86 - 91
WBS2020-45
[Poster Presentation]
Performance evaluation of ACO-OFDM method with dither signal for PAPR reduction
Daiki Harada, Kouji Ohuchi (Shizuoka Univ.)
pp. 92 - 97
WBS2020-46
[Poster Presentation]
Recovery of Partially Missing OFDM Signal in Time-Domain
Chengbo Liu, Na Chen, Minoru Okada (NAIST)
pp. 98 - 103
WBS2020-47
[Poster Presentation]
Performance Evaluation of Secure Communication based on OFDM and DFT-Precoded OFDM over Fading Channel
Airi Kaneko, Hideki Ochiai, Junji Shikata (YNU)
pp. 104 - 109
WBS2020-48
[Poster Presentation]
Performance Enhancement of Rolling Shutter Based Visible Light Communication by Selective Reception Using Dual Camera
Sora Ibaraki, Takumi Toguma, Shun Yamaguchi, Masayuki Kinoshita, Koji Kamakura (Chiba Inst. of Tech.), Takaya Yamazato (Nagoya Univ.)
pp. 110 - 114
WBS2020-49
[Poster Presentation]
Non-asymptotic converse theorem on the overflow probability of variable-to-fixed length codes
Shota Saito, Toshiyasu Matsushima (Waseda Univ.)
pp. 115 - 116
WBS2020-50
An Optimal Construction of the Basis Matrices of a Visual Cryptography Scheme for Multiple Secret Images Allowing the Rotation of Shares
Kyohei Sekine, Hiroki Koga (Tsukuba Univ.)
pp. 117 - 122
WBS2020-51
A Consideration on Evolving Secret Sharing Schemes using Linear Codes
Hiroki Toriumi, Nozomi Miya, Hajime Jinushi (Aoyama Gakuin Univ.)
pp. 123 - 127
WBS2020-52
Upper and Lower Bounds on the Capacity of Private Information Retrieval Allowing Information Leakage from Queries with Different Limits for Each Database
Naoto Toyoda, Tetsunao Matsuta, Uyematsu Tomohiko (Tokyo Tech)
pp. 128 - 133
WBS2020-53
[Invited Talk]
Management of Multiple Wireless Access for IOWN in the 6G era
Yasushi Takatori (NTT)
pp. 134 - 138
WBS2020-54
A Physical Zero-knowledge Proof for Cryptarithmetic Using Dihedral Cards
Raimu Isuzugawa (Tohoku Univ.), Daiki Miyahara, Takaaki Mizuki (Tohoku Univ./AIST), Hideaki Sone (Tohoku Univ.)
pp. 139 - 145
WBS2020-55
On Some Principles of Security Analysis for Physical-Ciphered Communication Systems
Kentaro Kato (Tamagawa Univ.)
pp. 146 - 151
WBS2020-56
A Real-Time Bluetooth Protocol Fuzzing System
Bo Wang, Suzuki Ako (JVCKW), Yuichi Kaji (NU)
pp. 152 - 159
WBS2020-57
Blind Estimation of Carrier Frequency Offset and Symbol Time Offset using WFrFT
Toshifumi Kojima, Kouji Ohuchi (Shizuoka Univ.)
pp. 160 - 165
WBS2020-58
Performance Evaluation of VN-CSK Type Parallel Indoor Optical Wireless Communication Using RGB-LED with Different Color Power
Koki Taruishi, Hiromasa Habuchi, Yusuke Kozawa (Ibaraki Univ.)
pp. 166 - 170
WBS2020-59
Indoor Long Distance High Speed Imaging MIMO System With Linear Transmitting Element Array
Chedlia Ben Naila, Hiraku Okada, Masaaki Katayama (Nagoya University)
pp. 171 - 175
WBS2020-60
Vehicle Speed and Driving Distance Estimation using Millimeter-wave Radar
Keiji Jimi, Takeki Ogitsu (Gunma Univ.)
pp. 176 - 180
WBS2020-61
Improving of Interference Reduction Scheme Using Replica Signals for FMCW Radar
Fumiya Tako, Kohei Ohno (Meiji Univ.)
pp. 181 - 186
WBS2020-62
Relationships among Security Notions and Lower Bounds on Tags in Anonymous Broadcast Authentication
Hirokazu Kobayashi (Yokohama National Univ..), Yohei Watanabe (The Univ. of Electro-Communications/AIST), Junji Shikata (Yokohama National Univ..)
pp. 187 - 194
WBS2020-63
Construction of non-malleable codes based on graph theory
Shohei Satake (Kumamoto Univ.), Yujie Gu, Kouichi Sakurai (Kyushu Univ.)
pp. 195 - 200
WBS2020-64
Constant-Round Two-Party Exponentiation Based on Additive Secret Sharing
Yi Lu, Keisuke Hara (Tokyo Tech/AIST), Kazuma Ohara, Jacob Schuldt (AIST), Keisuke Tanaka (Tokyo Tech)
pp. 201 - 207
WBS2020-65
A Proposal for Causal Inference with Subjective Evaluation
Daichi Ikeda, Hikaru Morita (Graduate School of Kanagawa Univ.)
pp. 208 - 212
WBS2020-66
Digital Signatures with Wildcards
Tomoki Miyazawa, Junji Shikata (Yokohama National Univ.)
pp. 213 - 218
WBS2020-67
Non-interactive multiparty computation adapt to dynamic participants
Shota Mazawa, Junji Shikata (Yokohama National Univ.)
pp. 219 - 224
WBS2020-68
A Proposal of Decentralized Multi-authority Traceable Anonymous Credential Scheme and Its Generic Construction
Hiroaki Anada (Univ. of Nagasaki)
pp. 225 - 231
WBS2020-69
Fast Multiparty Threshold ECDSA With Robustness
Wang zhaobo, Atsuko Miyaji (Osaka Univ.)
pp. 232 - 238
WBS2020-70
Improvement of Cicalese-Gargano-Vaccaro Algorithm for the Minimum-Entropy Couplings Problem
Kohei Sakatani, Ken-ichi Iwata (Univ. of Fukui), Hiroshi Fujisaki (Kanazawa Univ.)
pp. 239 - 244
WBS2020-71
Analysis of Optimal Error Exponents on Classification for Markov Sources
Hiroto Kuramata, Hideki Yagi, Tsutomu Kawabata (UEC)
pp. 245 - 250
WBS2020-72
[Invited Talk]
Lee Metric Error Correcting Codes on Two-Dimensional Lattices
Hiroyoshi Morita (UEC)
pp. 251 - 256
WBS2020-73
Information retrieval for security reports using behavior of cyber attacker
Yuki Kawaguchi, Mayo Yamasaki (NTT)
pp. 257 - 264
WBS2020-74
Analysis of Attack Activities for Honeypot Installation in Ethereum Network.
Chin Kota, Omote Kazumasa (Univ. Tsukuba)
pp. 265 - 272
WBS2020-75
Learning Contract-Wide Code Representations for Vulnerability Detection on Ethereum Smart Contracts
Nami Ashizawa, Naoto Yanai, Jason Paul Cruz (Osaka Univ.), Singo Okamura (NITNC)
pp. 273 - 280
WBS2020-76
Consideration of embedding methods and machine learning models for detecting malicious URLs
Qisheng Chen, Kazumasa omote (Univ. of Tsukuba)
pp. 281 - 287
Note: Each article is a technical report without peer review, and its polished version will be published elsewhere.