Thu, Mar 4 AM Online Room A: IT 1 Chair: Takayuki Nozaki (Yamaguchi University) 09:25 - 10:40 |
(1) |
09:25-09:50 |
List-Pruning SCL Decoder for Polar Codes Using Parity-Check Bits |
Yusuke Oki, Ryo Shibata, Hiroyuki Yashima (TUS) |
(2) |
09:50-10:15 |
Variable spreading factor codes for optical code-division multiple access |
Kyohei Ono, Shoichiro Yamasaki, Tomoko K. Matsushima (Polytechnic Univ.) |
(3) |
10:15-10:40 |
Error Performances of Synchronous Optical Code-Division Multiple Access Schemes Using Chip-Pair Codes |
Tomoko K. Matsushima, Shoichiro Yamasaki, Kyohei Ono (Polytechnic Univ.) |
|
10:40-10:55 |
Break ( 15 min. ) |
Thu, Mar 4 AM Online Room A: IT 2 Chair: Nozomi Miya (Aoyama Gakuin University) 10:55 - 12:10 |
(4) |
10:55-11:20 |
An Efficient Bayes Coding Algorithm for the Source Based on Context Tree Models that Vary from Section to Section |
Koshi Shimada, Shota Saito, Toshiyasu Matsushima (Waseda Univ.) |
(5) |
11:20-11:45 |
A note on sufficient condition for reconstructable substring of CSE method |
Shungo Tanaka, Hiroshi Kamabe, Shan Lu (Gifu Univ.) |
(6) |
11:45-12:10 |
Streaming Data Compression and Decompression by One-Way Quantum Finite-State Automata, Leading to Quantum Finite-State Deep and Shallow Information (Preliminary Report) |
Tomoyuki Yamakami (U of Fukui) |
Thu, Mar 4 AM Online Room B: ISEC 1 09:25 - 10:40 |
(7) |
09:25-09:50 |
Four-Block Type-2 Feistel Cipher from Tweakable Block Ciphers |
Kazuki Nakaya, Tetsu Iwata (Nagoya Univ.) |
(8) |
09:50-10:15 |
Integral Attack with Bit-Based Division Property against lightweight block cipher MANTRA |
Hiroki Komatsu, Yasutaka Igarashi, Toshinobu Kaneko (TUS) |
(9) |
10:15-10:40 |
Analysis of a new linear bias in the input/output difference of Salsa20 |
Ryo Watanabe, Atsuko Miyaji (Osaka Univ.) |
|
10:40-10:55 |
Break ( 15 min. ) |
Thu, Mar 4 AM Online Room B: ISEC 2 10:55 - 12:35 |
(10) |
10:55-11:20 |
Solving Shortest Vector Problem using annealing computation
-- How to generate a hamiltonian using pseudo multispin flip method -- |
Junpei Yamaguchi (Fujitsu Llaboratories), Takuya Ohwa (Kyushu Institute of Technology), Kazuyoshi Furukawa (Fujitsu Llaboratories) |
(11) |
11:20-11:45 |
An Attack on Search Ring-LWE Problem for Even Relative Degree |
Yasuhisa Okumura, Shinya Okumura, Atsuko Miyaji (Osaka Univ) |
(12) |
11:45-12:10 |
Security analysis for the isogeny-based cryptography CSIDH |
Hayato Arai, Atsuko Miyaji, Kenta Kodera (Osaka Univ.) |
(13) |
12:10-12:35 |
Efficient parallel computing method of isogeny based cryptography |
Ryota Udani, Koutarou Suzuki (TUT) |
|
- |
Lunch Break |
Thu, Mar 4 PM Online Poster Session: WBS, IT Chair: Shintaro Arai (Okayama Univ. of Science) 13:20 - 14:40 |
(14) |
13:20-14:40 |
[Poster Presentation]
Experimental Evaluation for Alamouti-type Spatio-temporal Coding in Image Sensor Communication Using a Rotary LED Transmitter |
Zhengqiang Tang, Shintaro Arai (Okayama Univ. of Sci.), Takaya Yamazato (Nagoya Univ.) |
(15) |
13:20-14:40 |
[Poster Presentation]
Performance evaluation of ACO-OFDM method with dither signal for PAPR reduction |
Daiki Harada, Kouji Ohuchi (Shizuoka Univ.) |
(16) |
13:20-14:40 |
[Poster Presentation]
Recovery of Partially Missing OFDM Signal in Time-Domain |
Chengbo Liu, Na Chen, Minoru Okada (NAIST) |
(17) |
13:20-14:40 |
[Poster Presentation]
Performance Evaluation of Secure Communication based on OFDM and DFT-Precoded OFDM over Fading Channel |
Airi Kaneko, Hideki Ochiai, Junji Shikata (YNU) |
(18) |
13:20-14:40 |
[Poster Presentation]
Performance Enhancement of Rolling Shutter Based Visible Light Communication by Selective Reception Using Dual Camera |
Sora Ibaraki, Takumi Toguma, Shun Yamaguchi, Masayuki Kinoshita, Koji Kamakura (Chiba Inst. of Tech.), Takaya Yamazato (Nagoya Univ.) |
(19) |
13:20-14:40 |
[Poster Presentation]
Non-asymptotic converse theorem on the overflow probability of variable-to-fixed length codes |
Shota Saito, Toshiyasu Matsushima (Waseda Univ.) |
|
14:40-14:55 |
Break ( 15 min. ) |
Thu, Mar 4 PM Online Room A: IT 3 Chair: Hideki Yagi (The University of Electro-Communications) 14:55 - 16:10 |
(20) |
14:55-15:20 |
An Optimal Construction of the Basis Matrices of a Visual Cryptography Scheme for Multiple Secret Images Allowing the Rotation of Shares |
Kyohei Sekine, Hiroki Koga (Tsukuba Univ.) |
(21) |
15:20-15:45 |
A Consideration on Evolving Secret Sharing Schemes using Linear Codes |
Hiroki Toriumi, Nozomi Miya, Hajime Jinushi (Aoyama Gakuin Univ.) |
(22) |
15:45-16:10 |
Upper and Lower Bounds on the Capacity of Private Information Retrieval Allowing Information Leakage from Queries with Different Limits for Each Database |
Naoto Toyoda, Tetsunao Matsuta, Uyematsu Tomohiko (Tokyo Tech) |
|
16:10-16:25 |
Break ( 15 min. ) |
Thu, Mar 4 PM Online Room A: Invited Talk (WBS) Chair: Takashi Shono (INTEL) 16:25 - 17:15 |
(23) |
16:25-17:15 |
[Invited Talk]
Management of Multiple Wireless Access for IOWN in the 6G era |
Yasushi Takatori (NTT) |
Thu, Mar 4 PM Online Room B: ISEC 3 14:55 - 16:10 |
(24) |
14:55-15:20 |
A Physical Zero-knowledge Proof for Cryptarithmetic Using Dihedral Cards |
Raimu Isuzugawa (Tohoku Univ.), Daiki Miyahara, Takaaki Mizuki (Tohoku Univ./AIST), Hideaki Sone (Tohoku Univ.) |
(25) |
15:20-15:45 |
On Some Principles of Security Analysis for Physical-Ciphered Communication Systems |
Kentaro Kato (Tamagawa Univ.) |
(26) |
15:45-16:10 |
A Real-Time Bluetooth Protocol Fuzzing System |
Bo Wang, Suzuki Ako (JVCKW), Yuichi Kaji (NU) |
|
16:10-16:25 |
Break (After the break, the invited talk will be held in Session A.) ( 15 min. ) |
Fri, Mar 5 AM Online Room A: WBS 1 Chair: Masafumi Moriyama (NICT) 09:25 - 10:40 |
(27) |
09:25-09:50 |
Blind Estimation of Carrier Frequency Offset and Symbol Time Offset using WFrFT |
Toshifumi Kojima, Kouji Ohuchi (Shizuoka Univ.) |
(28) |
09:50-10:15 |
Performance Evaluation of VN-CSK Type Parallel Indoor Optical Wireless Communication Using RGB-LED with Different Color Power |
Koki Taruishi, Hiromasa Habuchi, Yusuke Kozawa (Ibaraki Univ.) |
(29) |
10:15-10:40 |
Indoor Long Distance High Speed Imaging MIMO System With Linear Transmitting Element Array |
Chedlia Ben Naila, Hiraku Okada, Masaaki Katayama (Nagoya University) |
|
10:40-10:55 |
Break ( 15 min. ) |
Fri, Mar 5 AM Online Room A: WBS 2 Chair: Ryohei Nakamura (National Defence Academy) 10:55 - 11:45 |
(30) |
10:55-11:20 |
Vehicle Speed and Driving Distance Estimation using Millimeter-wave Radar |
Keiji Jimi, Takeki Ogitsu (Gunma Univ.) |
(31) |
11:20-11:45 |
Improving of Interference Reduction Scheme Using Replica Signals for FMCW Radar |
Fumiya Tako, Kohei Ohno (Meiji Univ.) |
Fri, Mar 5 AM Online Room B: ISEC 4 09:00 - 10:40 |
(32) |
09:00-09:25 |
Relationships among Security Notions and Lower Bounds on Tags in Anonymous Broadcast Authentication |
Hirokazu Kobayashi (Yokohama National Univ..), Yohei Watanabe (The Univ. of Electro-Communications/AIST), Junji Shikata (Yokohama National Univ..) |
(33) |
09:25-09:50 |
Construction of non-malleable codes based on graph theory |
Shohei Satake (Kumamoto Univ.), Yujie Gu, Kouichi Sakurai (Kyushu Univ.) |
(34) |
09:50-10:15 |
Constant-Round Two-Party Exponentiation Based on Additive Secret Sharing |
Yi Lu, Keisuke Hara (Tokyo Tech/AIST), Kazuma Ohara, Jacob Schuldt (AIST), Keisuke Tanaka (Tokyo Tech) |
(35) |
10:15-10:40 |
A Proposal for Causal Inference with Subjective Evaluation |
Daichi Ikeda, Hikaru Morita (Graduate School of Kanagawa Univ.) |
|
10:40-10:55 |
Break ( 15 min. ) |
Fri, Mar 5 AM Online Room B: ISEC 5 10:55 - 12:35 |
(36) |
10:55-11:20 |
Digital Signatures with Wildcards |
Tomoki Miyazawa, Junji Shikata (Yokohama National Univ.) |
(37) |
11:20-11:45 |
Non-interactive multiparty computation adapt to dynamic participants |
Shota Mazawa, Junji Shikata (Yokohama National Univ.) |
(38) |
11:45-12:10 |
A Proposal of Decentralized Multi-authority Traceable Anonymous Credential Scheme and Its Generic Construction |
Hiroaki Anada (Univ. of Nagasaki) |
(39) |
12:10-12:35 |
Fast Multiparty Threshold ECDSA With Robustness |
Wang zhaobo, Atsuko Miyaji (Osaka Univ.) |
|
- |
Lunch Break |
Fri, Mar 5 PM Online Room A: IT 4 Chair: Shota Saito (Waseda University) 14:20 - 15:10 |
(40) |
14:20-14:45 |
Improvement of Cicalese-Gargano-Vaccaro Algorithm for the Minimum-Entropy Couplings Problem |
Kohei Sakatani, Ken-ichi Iwata (Univ. of Fukui), Hiroshi Fujisaki (Kanazawa Univ.) |
(41) |
14:45-15:10 |
Analysis of Optimal Error Exponents on Classification for Markov Sources |
Hiroto Kuramata, Hideki Yagi, Tsutomu Kawabata (UEC) |
|
15:10-15:25 |
Break ( 15 min. ) |
Fri, Mar 5 PM Online Room A: Invited Talk (IT) Chair: Tadashi Wadayama (Nagoya Institute of Technology) 15:25 - 16:15 |
(42) |
15:25-16:15 |
[Invited Talk]
Lee Metric Error Correcting Codes on Two-Dimensional Lattices |
Hiroyoshi Morita (UEC) |
Fri, Mar 5 PM Online Room B: ISEC 6 13:30 - 15:10 |
(43) |
13:30-13:55 |
Information retrieval for security reports using behavior of cyber attacker |
Yuki Kawaguchi, Mayo Yamasaki (NTT) |
(44) |
13:55-14:20 |
Analysis of Attack Activities for Honeypot Installation in Ethereum Network. |
Chin Kota, Omote Kazumasa (Univ. Tsukuba) |
(45) |
14:20-14:45 |
Learning Contract-Wide Code Representations for Vulnerability Detection on Ethereum Smart Contracts |
Nami Ashizawa, Naoto Yanai, Jason Paul Cruz (Osaka Univ.), Singo Okamura (NITNC) |
(46) |
14:45-15:10 |
Consideration of embedding methods and machine learning models for detecting malicious URLs |
Qisheng Chen, Kazumasa omote (Univ. of Tsukuba) |
|
15:10-15:25 |
Break (After the break, the invited talk will be held in Session A.) ( 15 min. ) |