Online edition: ISSN 2432-6380
[TOP] | [2018] | [2019] | [2020] | [2021] | [2022] | [2023] | [2024] | [Japanese] / [English]
ISEC2024-87
Distinguishing Attacks against Docked Double Decker
Takahiro Kaneko, Tetsu Iwata (Nagoya Univ.)
pp. 1 - 7
ISEC2024-88
A study on computational evaluation of higher order differentials in lightweight blockcipher ASCON
Aya Hirokawa (JGSDF), Hidema Tanaka (NDA)
pp. 8 - 15
ISEC2024-89
Improved new Linear Bias of Stream Cipher Salsa20
Asahi Oishi, Atsuko Miyaji (Osaka Univ.)
pp. 16 - 23
ISEC2024-90
Higher Order Differential Property of Lightweight Block Cipher NLBCIT
Naoki Shibayama, Keigo Katsuta, Yasutaka Igarashi (Tokyo Univ. of Science)
pp. 24 - 31
ISEC2024-91
Double Insertion Correcting Algorithm for Sima's Double Deletion Correcting Code
Yinwei Du, Ken Nakamura, Takayuki Nozaki (Yamaguchi Univ.)
pp. 32 - 37
ISEC2024-92
Hiyori Murakami, Nozaki Takayuki (Yamaguchi Univ.)
pp. 38 - 43
ISEC2024-93
Proposal of Adjacent Lee-Weighted Indel Distance and Its Approximation using Dynamic Programming
Ginga Ito, Akiko Manada (NUT)
pp. 44 - 49
ISEC2024-94
A Study on Inner Coding of Synchronization Error Correcting Concatenated Code Satisfying Run-Length and Balance Constraints
Shogo Takada, Haruhiko Kaneko (Science Tokyo)
pp. 50 - 55
ISEC2024-95
Extended Linear Interference Suppression for SIC-Free Time-Domain NOMA
Tomonari Kurayama, Teruyuki Miyajima (Ibaraki Univ.)
pp. 56 - 61
ISEC2024-96
A Study on Extrinsic Value Generation of Iterative Signal Detection for Coded MIMO Systems With High-Order QAM
Fuga Kobayashi, Takahashi Takumi (Osaka Univ,), Shinsuke Ibi (Doshisya Univ.), Ochiai Hideki (Osaka Univ,)
pp. 62 - 67
ISEC2024-97
A Study on Three-Dimensional Wireless Indoor Localization Based on Quaternion-Domain Super MDS
Keigo Masuoka, Takumi Takahashi (Osaka Univ), Giuseppe Abreu (CU), Hideki Ochiai (Osaka Univ)
pp. 68 - 73
ISEC2024-98
Positioning Accuracy Performance of FOA/TOA Based Position Detection System Using Single Non-Geostationary Satellite
Ryota Shimizu, Jo Tamura, Hiroyasu Ishikawa (Nihon Univ.)
pp. 74 - 79
ISEC2024-99
Survey of security measures targeting SMEs
Yoshinaga Tatsuya, Minami Yoda, Yuichiro Gomi, Yutaka Matsuno (Nihon Univ.)
pp. 80 - 87
ISEC2024-100
Consideration on Semantic Similarity of Adversarial Attacks against Natural Language Processing
Yuto Nakamura, Kazuki Yoneyama (Ibaraki Univ.)
pp. 88 - 95
ISEC2024-101
Analysis of Extension of Kannan’s Embedding for Module-LWE Problem
Kosuke Tamura, Astuko Miyaji, Shinya Okumura (Osaka Univ.)
pp. 96 - 103
ISEC2024-102
Examination of Defense Methods Against Membership Inference Attacks
Kenta Okada, Atsuko Miyaji (Osaka Univ)
pp. 104 - 110
ISEC2024-103
Evaluation of Variable Coding Rate and Code Length Employing Relaxed Polar Codes
Nobuhiko Miki (Kagawa Univ.), Tatsunori Obara, Satoshi Nagata, Satoshi Suyama (NTT DOCOMO)
pp. 111 - 116
ISEC2024-104
A Note on Parameters of Binary Cooperative Locally Repairable Codes Achieving the Singleton-like bound
Koki Kazama (Shonan Institute of Technology)
pp. 117 - 122
ISEC2024-105
A Numerical Study on Squashed Entanglement using Semidefinite Programming with Exponential Representation
Hiroki Kawashima, Tomohiro Ogawa (UEC)
pp. 123 - 128
ISEC2024-106
[Invited Talk]
Security analysis for modern cryptography based on mathematical approach
Noboru Kunihiro (Univ. of Tsukuba)
p. 129
ISEC2024-107
[Invited Talk]
An Encouragement of Quantum Error-Correcting Codes
Manabu Hagiwara (Chiba Univ.)
pp. 130 - 134
ISEC2024-108
Security notions of key combiner against adaptive chosen ciphertext attacks
Ann Kasakawa, Toki Sasaki, Astushi Fujioka (Kanagawa Univ.), Akira Nagai, Kan Yasuda (NTT)
pp. 135 - 142
ISEC2024-109
Multi-party Private Set Intersection with Dynamically Updatable Preprocessing
Kota Sugimoto (UEC), Ryo Hiromasa (MELCO), Mitsugu Iwamoto, Yohei Watanabe (UEC)
pp. 143 - 150
ISEC2024-110
Proposal of Interactive Zero-Knowledge Proof using Lattice-Based Polynomial Commitment
Toshiyuki Mineta, Yurie Okada, Akira Fujimoto (OU), Hideaki Miyaji (Ritsumei), Atsuko Miyaji (OU)
pp. 151 - 157
ISEC2024-111
Upper and Lower Bounds on the DNA Storage Capacity of Compound Shuffling-Sampling Channels with an Eavesdropper
Tomoya Fujimori, Tetsunao Matsuta (Saitama Univ.)
pp. 158 - 163
ISEC2024-112
On the Minimum Download Cost for Private Information Retrieval Systems Allowing Information Leakage of Subsets of Messages
Yuto Tamura, Tetsunao Matsuta (Saitama univ.)
pp. 164 - 169
ISEC2024-113
(See Japanese page.)
pp. 170 - 175
ISEC2024-114
Comparison of pulse width multi-level modulation for VLC using orthogonally aligned rolling shutter cameras
Ayumu Otsuka, Shan Lu, Takaya Yamazato (Nagoya Univ), Zhengqiang Tang (Shizuoka Univ), Hiraku Okada (Nagoya Univ)
pp. 176 - 181
ISEC2024-115
Visible-light communication that effectively combines lighting patterns and emission color patterns of RGB-LED
Tatsuyuki Kiyokawa, Hiromasa Habuchi, Yusuke Kozawa (Ibaraki Univ.)
pp. 182 - 187
ISEC2024-116
Experimental Evaluation of Parallel Delay Transmission for Varying Communication Ranges in Rolling Shutter Based Visible Light Communication
Hikari Koga, Masayuki Kinoshita, Koji Kamakura (Chiba Inst. of Tech.), Takaya Yamazato (Nagoya Univ.)
pp. 188 - 193
ISEC2024-117
Construction of Short Identity-Based Signature from Codes
Ryoma Kinjo, Shingo Sato, Junji Shikata (Yokohama National Univ.)
pp. 194 - 201
ISEC2024-118
Detection of Deepfake Images based on Embedding Geometry of Data Manifolds
Han Wang, Hajime Tasaki, Jinhui Chao (Chuo Univ.)
pp. 202 - 207
ISEC2024-119
Efficient CCA-secure Public Key Encryption with Publicly Verifiability
Masaya Yoshimura (UEC), Kyoichi Asano (UEC/AIST), Mitsugu Iwamoto (UEC), Yohei Watanabe (UEC/AIST)
pp. 208 - 215
ISEC2024-120
An Extension of the Information Bottleneck Problem based on Statistical Decision Theory
Akira Kamatsuka (SIT), Takahiro Yoshida (Nihon Univ.)
pp. 216 - 221
ISEC2024-121
An Analysis on Least Squares Superposition Codes Without Random Coding
Yoshinari Takeishi (Kyushu Univ.), Andrew Barron (Yale Univ.)
pp. 222 - 225
ISEC2024-122
Converse Coding Theorems for the Distributed Hypothesis Testing
Yasutada Oohama (UEC)
pp. 226 - 231
ISEC2024-123
Design Based on Frequency Analysis for Prediction Model Using RNN with HiPPO Blocks
Akinobu Naruse, Syunta Katsuma, Ryousuke Adachi, Yugi Wakasa (Yamaguchi Univ)
pp. 232 - 235
ISEC2024-124
Design of Event-Triggering Conditions Based on Non-Monotonic Lyapunov Functions
Koichi Kobayashi, Masaki Yanai (Hokkaido Univ.)
pp. 236 - 238
ISEC2024-125
Proposal and Evaluation of a Deep Learning Model for Lattice Problems
Keita Yamakawa, Junji Shikata (YNU)
pp. 239 - 245
ISEC2024-126
(See Japanese page.)
pp. 246 - 253
ISEC2024-127
Introduction of "cyclic isomorphism" in two-party non-commitment card protocols that limits card input and related topics
Yuji Suga (IIJ)
pp. 254 - 260
ISEC2024-128
Propose of Digital Signatures Without Random Oracle model Using Linear Hash Functions
Kodai Hayashida, Atsuko Miyaji (Osaka Univ.)
pp. 261 - 267
ISEC2024-129
On the Verification of the Security of Ring-LWE over Function Fields
Sayumi Shibata, Shinya Okumura, Atsuko Miyaji (Osaka Univ.)
pp. 268 - 275
ISEC2024-130
Analysis of the χ^2-Attack on the Module-LWE Problem in the Dual Space and its Comparison with Ring-LWE
Sosuke Funatsu, Atsuko Miyaji, Shinya Okumura (OU)
pp. 276 - 283
ISEC2024-131
(Quasi-)Linear-Time Algorithms for the Closest Vector Problem in Equiangular Lattices
Kenta Takahashi, Wataru Nakamura (Hitachi)
pp. 284 - 289
ISEC2024-132
A Consideration of the relationship between GNB and n-th traces using the roots of the cyclotomic polynomial
Akane Miyoshi, Kazuma Ikesaka, Yuta Kodera, Yasuyuki Nogami (Okayama Univ)
pp. 290 - 295
ISEC2024-133
Experiment and Evaluation of Mis-operation Resistant Homomorphic Encryption in ELiPS
Kai Tokisue, Naoya Saito, Yuta Kodera, Yasuyuki Nogami (Okayama Univ.)
pp. 296 - 301
ISEC2024-134
Implementation and Performance Evaluation of Real-Number Supported Homomorphic Computation Combining Pairing-Based and Lattice-Based Cryptography
Naoya Saito, Kai Tokisue, Yuta Kodera, Yasuyuki Nogami (Okayama Univ)
pp. 302 - 307
Note: Each article is a technical report without peer review, and its polished version will be published elsewhere.