IEICE Technical Report

Online edition: ISSN 2432-6380

Volume 124, Number 399

Reliable Communication and Control

Workshop Date : 2025-03-05 - 2025-03-06 / Issue Date : 2025-02-26

[PREV] [NEXT]

[TOP] | [2018] | [2019] | [2020] | [2021] | [2022] | [2023] | [2024] | [Japanese] / [English]

[PROGRAM] [BULK PDF DOWNLOAD]


Table of contents

RCC2024-75
Distinguishing Attacks against Docked Double Decker
Takahiro Kaneko, Tetsu Iwata (Nagoya Univ.)
pp. 1 - 7

RCC2024-76
A study on computational evaluation of higher order differentials in lightweight blockcipher ASCON
Aya Hirokawa (JGSDF), Hidema Tanaka (NDA)
pp. 8 - 15

RCC2024-77
Improved new Linear Bias of Stream Cipher Salsa20
Asahi Oishi, Atsuko Miyaji (Osaka Univ.)
pp. 16 - 23

RCC2024-78
Higher Order Differential Property of Lightweight Block Cipher NLBCIT
Naoki Shibayama, Keigo Katsuta, Yasutaka Igarashi (Tokyo Univ. of Science)
pp. 24 - 31

RCC2024-79
Double Insertion Correcting Algorithm for Sima's Double Deletion Correcting Code
Yinwei Du, Ken Nakamura, Takayuki Nozaki (Yamaguchi Univ.)
pp. 32 - 37

RCC2024-80

Hiyori Murakami, Nozaki Takayuki (Yamaguchi Univ.)
pp. 38 - 43

RCC2024-81
Proposal of Adjacent Lee-Weighted Indel Distance and Its Approximation using Dynamic Programming
Ginga Ito, Akiko Manada (NUT)
pp. 44 - 49

RCC2024-82
A Study on Inner Coding of Synchronization Error Correcting Concatenated Code Satisfying Run-Length and Balance Constraints
Shogo Takada, Haruhiko Kaneko (Science Tokyo)
pp. 50 - 55

RCC2024-83
Extended Linear Interference Suppression for SIC-Free Time-Domain NOMA
Tomonari Kurayama, Teruyuki Miyajima (Ibaraki Univ.)
pp. 56 - 61

RCC2024-84
A Study on Extrinsic Value Generation of Iterative Signal Detection for Coded MIMO Systems With High-Order QAM
Fuga Kobayashi, Takahashi Takumi (Osaka Univ,), Shinsuke Ibi (Doshisya Univ.), Ochiai Hideki (Osaka Univ,)
pp. 62 - 67

RCC2024-85
A Study on Three-Dimensional Wireless Indoor Localization Based on Quaternion-Domain Super MDS
Keigo Masuoka, Takumi Takahashi (Osaka Univ), Giuseppe Abreu (CU), Hideki Ochiai (Osaka Univ)
pp. 68 - 73

RCC2024-86
Positioning Accuracy Performance of FOA/TOA Based Position Detection System Using Single Non-Geostationary Satellite
Ryota Shimizu, Jo Tamura, Hiroyasu Ishikawa (Nihon Univ.)
pp. 74 - 79

RCC2024-87
Survey of security measures targeting SMEs
Yoshinaga Tatsuya, Minami Yoda, Yuichiro Gomi, Yutaka Matsuno (Nihon Univ.)
pp. 80 - 87

RCC2024-88
Consideration on Semantic Similarity of Adversarial Attacks against Natural Language Processing
Yuto Nakamura, Kazuki Yoneyama (Ibaraki Univ.)
pp. 88 - 95

RCC2024-89
Analysis of Extension of Kannan’s Embedding for Module-LWE Problem
Kosuke Tamura, Astuko Miyaji, Shinya Okumura (Osaka Univ.)
pp. 96 - 103

RCC2024-90
Examination of Defense Methods Against Membership Inference Attacks
Kenta Okada, Atsuko Miyaji (Osaka Univ)
pp. 104 - 110

RCC2024-91
Evaluation of Variable Coding Rate and Code Length Employing Relaxed Polar Codes
Nobuhiko Miki (Kagawa Univ.), Tatsunori Obara, Satoshi Nagata, Satoshi Suyama (NTT DOCOMO)
pp. 111 - 116

RCC2024-92
A Note on Parameters of Binary Cooperative Locally Repairable Codes Achieving the Singleton-like bound
Koki Kazama (Shonan Institute of Technology)
pp. 117 - 122

RCC2024-93
A Numerical Study on Squashed Entanglement using Semidefinite Programming with Exponential Representation
Hiroki Kawashima, Tomohiro Ogawa (UEC)
pp. 123 - 128

RCC2024-94
[Invited Talk] Security analysis for modern cryptography based on mathematical approach
Noboru Kunihiro (Univ. of Tsukuba)
p. 129

RCC2024-95
[Invited Talk] An Encouragement of Quantum Error-Correcting Codes
Manabu Hagiwara (Chiba Univ.)
pp. 130 - 134

RCC2024-96
Security notions of key combiner against adaptive chosen ciphertext attacks
Ann Kasakawa, Toki Sasaki, Astushi Fujioka (Kanagawa Univ.), Akira Nagai, Kan Yasuda (NTT)
pp. 135 - 142

RCC2024-97
Multi-party Private Set Intersection with Dynamically Updatable Preprocessing
Kota Sugimoto (UEC), Ryo Hiromasa (MELCO), Mitsugu Iwamoto, Yohei Watanabe (UEC)
pp. 143 - 150

RCC2024-98
Proposal of Interactive Zero-Knowledge Proof using Lattice-Based Polynomial Commitment
Toshiyuki Mineta, Yurie Okada, Akira Fujimoto (OU), Hideaki Miyaji (Ritsumei), Atsuko Miyaji (OU)
pp. 151 - 157

RCC2024-99
Upper and Lower Bounds on the DNA Storage Capacity of Compound Shuffling-Sampling Channels with an Eavesdropper
Tomoya Fujimori, Tetsunao Matsuta (Saitama Univ.)
pp. 158 - 163

RCC2024-100
On the Minimum Download Cost for Private Information Retrieval Systems Allowing Information Leakage of Subsets of Messages
Yuto Tamura, Tetsunao Matsuta (Saitama univ.)
pp. 164 - 169

RCC2024-101
(See Japanese page.)
pp. 170 - 175

RCC2024-102
Comparison of pulse width multi-level modulation for VLC using orthogonally aligned rolling shutter cameras
Ayumu Otsuka, Shan Lu, Takaya Yamazato (Nagoya Univ), Zhengqiang Tang (Shizuoka Univ), Hiraku Okada (Nagoya Univ)
pp. 176 - 181

RCC2024-103
Visible-light communication that effectively combines lighting patterns and emission color patterns of RGB-LED
Tatsuyuki Kiyokawa, Hiromasa Habuchi, Yusuke Kozawa (Ibaraki Univ.)
pp. 182 - 187

RCC2024-104
Experimental Evaluation of Parallel Delay Transmission for Varying Communication Ranges in Rolling Shutter Based Visible Light Communication
Hikari Koga, Masayuki Kinoshita, Koji Kamakura (Chiba Inst. of Tech.), Takaya Yamazato (Nagoya Univ.)
pp. 188 - 193

RCC2024-105
Construction of Short Identity-Based Signature from Codes
Ryoma Kinjo, Shingo Sato, Junji Shikata (Yokohama National Univ.)
pp. 194 - 201

RCC2024-106
Detection of Deepfake Images based on Embedding Geometry of Data Manifolds
Han Wang, Hajime Tasaki, Jinhui Chao (Chuo Univ.)
pp. 202 - 207

RCC2024-107
Efficient CCA-secure Public Key Encryption with Publicly Verifiability
Masaya Yoshimura (UEC), Kyoichi Asano (UEC/AIST), Mitsugu Iwamoto (UEC), Yohei Watanabe (UEC/AIST)
pp. 208 - 215

RCC2024-108
An Extension of the Information Bottleneck Problem based on Statistical Decision Theory
Akira Kamatsuka (SIT), Takahiro Yoshida (Nihon Univ.)
pp. 216 - 221

RCC2024-109
An Analysis on Least Squares Superposition Codes Without Random Coding
Yoshinari Takeishi (Kyushu Univ.), Andrew Barron (Yale Univ.)
pp. 222 - 225

RCC2024-110
Converse Coding Theorems for the Distributed Hypothesis Testing
Yasutada Oohama (UEC)
pp. 226 - 231

RCC2024-111
Design Based on Frequency Analysis for Prediction Model Using RNN with HiPPO Blocks
Akinobu Naruse, Syunta Katsuma, Ryousuke Adachi, Yugi Wakasa (Yamaguchi Univ)
pp. 232 - 235

RCC2024-112
Design of Event-Triggering Conditions Based on Non-Monotonic Lyapunov Functions
Koichi Kobayashi, Masaki Yanai (Hokkaido Univ.)
pp. 236 - 238

RCC2024-113
Proposal and Evaluation of a Deep Learning Model for Lattice Problems
Keita Yamakawa, Junji Shikata (YNU)
pp. 239 - 245

RCC2024-114
(See Japanese page.)
pp. 246 - 253

RCC2024-115
Introduction of "cyclic isomorphism" in two-party non-commitment card protocols that limits card input and related topics
Yuji Suga (IIJ)
pp. 254 - 260

RCC2024-116
Propose of Digital Signatures Without Random Oracle model Using Linear Hash Functions
Kodai Hayashida, Atsuko Miyaji (Osaka Univ.)
pp. 261 - 267

RCC2024-117
On the Verification of the Security of Ring-LWE over Function Fields
Sayumi Shibata, Shinya Okumura, Atsuko Miyaji (Osaka Univ.)
pp. 268 - 275

RCC2024-118
Analysis of the χ^2-Attack on the Module-LWE Problem in the Dual Space and its Comparison with Ring-LWE
Sosuke Funatsu, Atsuko Miyaji, Shinya Okumura (OU)
pp. 276 - 283

RCC2024-119
(Quasi-)Linear-Time Algorithms for the Closest Vector Problem in Equiangular Lattices
Kenta Takahashi, Wataru Nakamura (Hitachi)
pp. 284 - 289

RCC2024-120
A Consideration of the relationship between GNB and n-th traces using the roots of the cyclotomic polynomial
Akane Miyoshi, Kazuma Ikesaka, Yuta Kodera, Yasuyuki Nogami (Okayama Univ)
pp. 290 - 295

RCC2024-121
Experiment and Evaluation of Mis-operation Resistant Homomorphic Encryption in ELiPS
Kai Tokisue, Naoya Saito, Yuta Kodera, Yasuyuki Nogami (Okayama Univ.)
pp. 296 - 301

RCC2024-122
Implementation and Performance Evaluation of Real-Number Supported Homomorphic Computation Combining Pairing-Based and Lattice-Based Cryptography
Naoya Saito, Kai Tokisue, Yuta Kodera, Yasuyuki Nogami (Okayama Univ)
pp. 302 - 307

Note: Each article is a technical report without peer review, and its polished version will be published elsewhere.


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan