IEICE Technical Report

Online edition: ISSN 2432-6380

Volume 124, Number 397

Information Security

Workshop Date : 2025-03-05 - 2025-03-06 / Issue Date : 2025-02-26

[PREV] [NEXT]

[TOP] | [2018] | [2019] | [2020] | [2021] | [2022] | [2023] | [2024] | [Japanese] / [English]

[PROGRAM] [BULK PDF DOWNLOAD]


Table of contents

ISEC2024-87
Distinguishing Attacks against Docked Double Decker
Takahiro Kaneko, Tetsu Iwata (Nagoya Univ.)
pp. 1 - 7

ISEC2024-88
A study on computational evaluation of higher order differentials in lightweight blockcipher ASCON
Aya Hirokawa (JGSDF), Hidema Tanaka (NDA)
pp. 8 - 15

ISEC2024-89
Improved new Linear Bias of Stream Cipher Salsa20
Asahi Oishi, Atsuko Miyaji (Osaka Univ.)
pp. 16 - 23

ISEC2024-90
Higher Order Differential Property of Lightweight Block Cipher NLBCIT
Naoki Shibayama, Keigo Katsuta, Yasutaka Igarashi (Tokyo Univ. of Science)
pp. 24 - 31

ISEC2024-91
Double Insertion Correcting Algorithm for Sima's Double Deletion Correcting Code
Yinwei Du, Ken Nakamura, Takayuki Nozaki (Yamaguchi Univ.)
pp. 32 - 37

ISEC2024-92

Hiyori Murakami, Nozaki Takayuki (Yamaguchi Univ.)
pp. 38 - 43

ISEC2024-93
Proposal of Adjacent Lee-Weighted Indel Distance and Its Approximation using Dynamic Programming
Ginga Ito, Akiko Manada (NUT)
pp. 44 - 49

ISEC2024-94
A Study on Inner Coding of Synchronization Error Correcting Concatenated Code Satisfying Run-Length and Balance Constraints
Shogo Takada, Haruhiko Kaneko (Science Tokyo)
pp. 50 - 55

ISEC2024-95
Extended Linear Interference Suppression for SIC-Free Time-Domain NOMA
Tomonari Kurayama, Teruyuki Miyajima (Ibaraki Univ.)
pp. 56 - 61

ISEC2024-96
A Study on Extrinsic Value Generation of Iterative Signal Detection for Coded MIMO Systems With High-Order QAM
Fuga Kobayashi, Takahashi Takumi (Osaka Univ,), Shinsuke Ibi (Doshisya Univ.), Ochiai Hideki (Osaka Univ,)
pp. 62 - 67

ISEC2024-97
A Study on Three-Dimensional Wireless Indoor Localization Based on Quaternion-Domain Super MDS
Keigo Masuoka, Takumi Takahashi (Osaka Univ), Giuseppe Abreu (CU), Hideki Ochiai (Osaka Univ)
pp. 68 - 73

ISEC2024-98
Positioning Accuracy Performance of FOA/TOA Based Position Detection System Using Single Non-Geostationary Satellite
Ryota Shimizu, Jo Tamura, Hiroyasu Ishikawa (Nihon Univ.)
pp. 74 - 79

ISEC2024-99
Survey of security measures targeting SMEs
Yoshinaga Tatsuya, Minami Yoda, Yuichiro Gomi, Yutaka Matsuno (Nihon Univ.)
pp. 80 - 87

ISEC2024-100
Consideration on Semantic Similarity of Adversarial Attacks against Natural Language Processing
Yuto Nakamura, Kazuki Yoneyama (Ibaraki Univ.)
pp. 88 - 95

ISEC2024-101
Analysis of Extension of Kannan’s Embedding for Module-LWE Problem
Kosuke Tamura, Astuko Miyaji, Shinya Okumura (Osaka Univ.)
pp. 96 - 103

ISEC2024-102
Examination of Defense Methods Against Membership Inference Attacks
Kenta Okada, Atsuko Miyaji (Osaka Univ)
pp. 104 - 110

ISEC2024-103
Evaluation of Variable Coding Rate and Code Length Employing Relaxed Polar Codes
Nobuhiko Miki (Kagawa Univ.), Tatsunori Obara, Satoshi Nagata, Satoshi Suyama (NTT DOCOMO)
pp. 111 - 116

ISEC2024-104
A Note on Parameters of Binary Cooperative Locally Repairable Codes Achieving the Singleton-like bound
Koki Kazama (Shonan Institute of Technology)
pp. 117 - 122

ISEC2024-105
A Numerical Study on Squashed Entanglement using Semidefinite Programming with Exponential Representation
Hiroki Kawashima, Tomohiro Ogawa (UEC)
pp. 123 - 128

ISEC2024-106
[Invited Talk] Security analysis for modern cryptography based on mathematical approach
Noboru Kunihiro (Univ. of Tsukuba)
p. 129

ISEC2024-107
[Invited Talk] An Encouragement of Quantum Error-Correcting Codes
Manabu Hagiwara (Chiba Univ.)
pp. 130 - 134

ISEC2024-108
Security notions of key combiner against adaptive chosen ciphertext attacks
Ann Kasakawa, Toki Sasaki, Astushi Fujioka (Kanagawa Univ.), Akira Nagai, Kan Yasuda (NTT)
pp. 135 - 142

ISEC2024-109
Multi-party Private Set Intersection with Dynamically Updatable Preprocessing
Kota Sugimoto (UEC), Ryo Hiromasa (MELCO), Mitsugu Iwamoto, Yohei Watanabe (UEC)
pp. 143 - 150

ISEC2024-110
Proposal of Interactive Zero-Knowledge Proof using Lattice-Based Polynomial Commitment
Toshiyuki Mineta, Yurie Okada, Akira Fujimoto (OU), Hideaki Miyaji (Ritsumei), Atsuko Miyaji (OU)
pp. 151 - 157

ISEC2024-111
Upper and Lower Bounds on the DNA Storage Capacity of Compound Shuffling-Sampling Channels with an Eavesdropper
Tomoya Fujimori, Tetsunao Matsuta (Saitama Univ.)
pp. 158 - 163

ISEC2024-112
On the Minimum Download Cost for Private Information Retrieval Systems Allowing Information Leakage of Subsets of Messages
Yuto Tamura, Tetsunao Matsuta (Saitama univ.)
pp. 164 - 169

ISEC2024-113
(See Japanese page.)
pp. 170 - 175

ISEC2024-114
Comparison of pulse width multi-level modulation for VLC using orthogonally aligned rolling shutter cameras
Ayumu Otsuka, Shan Lu, Takaya Yamazato (Nagoya Univ), Zhengqiang Tang (Shizuoka Univ), Hiraku Okada (Nagoya Univ)
pp. 176 - 181

ISEC2024-115
Visible-light communication that effectively combines lighting patterns and emission color patterns of RGB-LED
Tatsuyuki Kiyokawa, Hiromasa Habuchi, Yusuke Kozawa (Ibaraki Univ.)
pp. 182 - 187

ISEC2024-116
Experimental Evaluation of Parallel Delay Transmission for Varying Communication Ranges in Rolling Shutter Based Visible Light Communication
Hikari Koga, Masayuki Kinoshita, Koji Kamakura (Chiba Inst. of Tech.), Takaya Yamazato (Nagoya Univ.)
pp. 188 - 193

ISEC2024-117
Construction of Short Identity-Based Signature from Codes
Ryoma Kinjo, Shingo Sato, Junji Shikata (Yokohama National Univ.)
pp. 194 - 201

ISEC2024-118
Detection of Deepfake Images based on Embedding Geometry of Data Manifolds
Han Wang, Hajime Tasaki, Jinhui Chao (Chuo Univ.)
pp. 202 - 207

ISEC2024-119
Efficient CCA-secure Public Key Encryption with Publicly Verifiability
Masaya Yoshimura (UEC), Kyoichi Asano (UEC/AIST), Mitsugu Iwamoto (UEC), Yohei Watanabe (UEC/AIST)
pp. 208 - 215

ISEC2024-120
An Extension of the Information Bottleneck Problem based on Statistical Decision Theory
Akira Kamatsuka (SIT), Takahiro Yoshida (Nihon Univ.)
pp. 216 - 221

ISEC2024-121
An Analysis on Least Squares Superposition Codes Without Random Coding
Yoshinari Takeishi (Kyushu Univ.), Andrew Barron (Yale Univ.)
pp. 222 - 225

ISEC2024-122
Converse Coding Theorems for the Distributed Hypothesis Testing
Yasutada Oohama (UEC)
pp. 226 - 231

ISEC2024-123
Design Based on Frequency Analysis for Prediction Model Using RNN with HiPPO Blocks
Akinobu Naruse, Syunta Katsuma, Ryousuke Adachi, Yugi Wakasa (Yamaguchi Univ)
pp. 232 - 235

ISEC2024-124
Design of Event-Triggering Conditions Based on Non-Monotonic Lyapunov Functions
Koichi Kobayashi, Masaki Yanai (Hokkaido Univ.)
pp. 236 - 238

ISEC2024-125
Proposal and Evaluation of a Deep Learning Model for Lattice Problems
Keita Yamakawa, Junji Shikata (YNU)
pp. 239 - 245

ISEC2024-126
(See Japanese page.)
pp. 246 - 253

ISEC2024-127
Introduction of "cyclic isomorphism" in two-party non-commitment card protocols that limits card input and related topics
Yuji Suga (IIJ)
pp. 254 - 260

ISEC2024-128
Propose of Digital Signatures Without Random Oracle model Using Linear Hash Functions
Kodai Hayashida, Atsuko Miyaji (Osaka Univ.)
pp. 261 - 267

ISEC2024-129
On the Verification of the Security of Ring-LWE over Function Fields
Sayumi Shibata, Shinya Okumura, Atsuko Miyaji (Osaka Univ.)
pp. 268 - 275

ISEC2024-130
Analysis of the χ^2-Attack on the Module-LWE Problem in the Dual Space and its Comparison with Ring-LWE
Sosuke Funatsu, Atsuko Miyaji, Shinya Okumura (OU)
pp. 276 - 283

ISEC2024-131
(Quasi-)Linear-Time Algorithms for the Closest Vector Problem in Equiangular Lattices
Kenta Takahashi, Wataru Nakamura (Hitachi)
pp. 284 - 289

ISEC2024-132
A Consideration of the relationship between GNB and n-th traces using the roots of the cyclotomic polynomial
Akane Miyoshi, Kazuma Ikesaka, Yuta Kodera, Yasuyuki Nogami (Okayama Univ)
pp. 290 - 295

ISEC2024-133
Experiment and Evaluation of Mis-operation Resistant Homomorphic Encryption in ELiPS
Kai Tokisue, Naoya Saito, Yuta Kodera, Yasuyuki Nogami (Okayama Univ.)
pp. 296 - 301

ISEC2024-134
Implementation and Performance Evaluation of Real-Number Supported Homomorphic Computation Combining Pairing-Based and Lattice-Based Cryptography
Naoya Saito, Kai Tokisue, Yuta Kodera, Yasuyuki Nogami (Okayama Univ)
pp. 302 - 307

Note: Each article is a technical report without peer review, and its polished version will be published elsewhere.


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan