Thu, Mar 10 AM IT(1) Room 301 Chair: Ken-ichi Iwata (Univ. of Fukui) 09:50 - 11:30 |
(1) |
09:50-10:15 |
Studies on Sudoku Puzzle Based on Coding Theory |
Nobumasa Nanami, Shinsuke Hirano, Kazuhiko Yamaguchi (UEC) |
(2) |
10:15-10:40 |
Acceleration of the Arimoto algorithm for computation of random coding exponent function |
Hiroki Watanabe, Hiroshi Nagaoka (UEC) |
(3) |
10:40-11:05 |
Redundancy of Bayesian Code with Markov Fractal Prior Distributions |
Naoya Matsukami, Tsutomu Kawabata (UEC) |
(4) |
11:05-11:30 |
Bayesian Estimation of the Virus Source of an Infection in a Network Using Any Prior Distribution |
Ryousuke Kido, Tetsunao Matsuta, Ryutaroh Matsumoto, Tomohiko Uyematsu (Tokyo Tech.) |
Thu, Mar 10 AM WBS(1) Room 306 Chair: Ryohei Nakamura (National Defense Academy) 10:40 - 11:30 |
(5) |
10:40-11:05 |
Performance Evaluation on Service Area Constitution for Position Detection Method using Two Unmanned Aerial Vehicle |
Hiroyasu Ishikawa, Shin Herai, Shunsuke Sato (Nihon Univ.) |
(6) |
11:05-11:30 |
A Study on PAPR Reduction based on Iterative PTS without Side Information in OFDM Systems |
Moeko Yoshida, Teruyuki Miyajima (Ibaraki Univ.) |
|
11:30-12:50 |
Lunch Break ( 80 min. ) |
Thu, Mar 10 PM IT(2) Room 301 Chair: Hiroki Koga (Univ. of Tsukuba) 12:50 - 14:55 |
(7) |
12:50-13:15 |
Application of MUI cancellers using bipolar MPSC in CDMA radio communication systems |
Hiroki Sato, Shinichiro Miyazaki, Tomoko K. Matsushima, Kotoku Omura, Shoichiro Yamasaki (Polytechnic Univ.) |
(8) |
13:15-13:40 |
A Synchronization Method using Fixed-Symbol for Insertion/Deletion/Substitution Channels |
Ryo Shibata, Gou Hosoya, Hiroyuki Yashima (TUS) |
(9) |
13:40-14:05 |
Relations Between Conditional Shannon Entropy and Expectation of Norm and Their Applications |
Yuta Sakai, Ken-ichi Iwata (Univ. of Fukui) |
(10) |
14:05-14:30 |
The Minimum Codelength of Multiple-Uniprior Index Coding |
Masaru Takahashi, Tetsunao Matsuta, Ryutaroh Matsumoto, Tomohiko Uyematsu (Tokyo Tech) |
(11) |
14:30-14:55 |
Intrinsic Randomness Problem for Correlated General Sources |
Tomohiko Uyematsu, Tetsunao Matsuta (Tokyo Tech.) |
Thu, Mar 10 PM ISEC(1) Room 306 Chair: Yuichi Komano (Toshiba) 12:50 - 14:55 |
(12) |
12:50-13:15 |
Revisiting Isomorphism of Polynomials with Two Secrets |
Bagus Santoso (UEC) |
(13) |
13:15-13:40 |
Improvement in detection performance of Tardos's fingerprinting code using detailed score distribution |
Ryo Inoue, Kazuhiko Yamaguchi (UEC) |
(14) |
13:40-14:05 |
Collision-Free Rainbow Table Structure |
Yuki Tabata, Keisuke Iwai, Hidema Tanaka, Takakazu Kurokawa (NDA) |
(15) |
14:05-14:30 |
Message Preprocessing for MD Hash Functions |
Hidenori Kuwakado (Kansai Univ.), Shoichi Hirose (Univ. of Fukui) |
(16) |
14:30-14:55 |
A Multiplier Architecture for Finite Field of 254bit-Prime Square Order Based on Pipelined 32bit Montgomery Multipliers |
Yusuke Nagahama, Daisuke Fujimoto, Tsutomu Matsumoto (YNU) |
|
14:55-15:05 |
Break ( 10 min. ) |
Thu, Mar 10 PM IT(3) Room 301 Chair: Akiko Manada (Univ. of Electro-Comm.) 15:05 - 16:45 |
(17) |
15:05-15:30 |
Distance and Correlation Properties for Constant-Weight Codes from an (11,5,2)-Cyclic Difference Set |
Takayasu Kaida (Kinki Univ.), Junru Zheng (Kyuhsu Women's Univ.) |
(18) |
15:30-15:55 |
The Effective Method of Improving Berlekamp-Preparata Convolutional Codes Decoding by Tail-Biting Technology |
Tianyi Zhang, Masato Kitakami (Chiba Univ.) |
(19) |
15:55-16:20 |
On the bit error probability for constant log-MAP decoding of convolutional codes |
Hideki Yoshikawa (Tohoku Gakuin Univ.) |
(20) |
16:20-16:45 |
Algebraic Construction of KV Trellises for Linear Block Codes |
Masato Tajima |
Thu, Mar 10 PM IT(4) Room 306 Chair: Hidenori Kuwakado (Kansai Univ.) 15:05 - 16:45 |
(21) |
15:05-15:30 |
Improved Key Rate of the Semi-Quantum Key Distribution Protocol |
Kento Yamada, Ryutaroh Matumoto (Tokyo Tech) |
(22) |
15:30-15:55 |
Secrecy Rates for the Gaussian Wiretap Channel with an Energy Transfer Cooperative Jammer |
Tomoya Komiyama, Ryutaroh Matsumoto, Tetsunao Matsuta, Tomohiko Uyematsu (Tokyo Tech) |
(23) |
15:55-16:20 |
Fundamental Properties on a Secret-key Cryptosystem with Guessing Secrecy for Plaintexts and Keys |
Shota Kamiya, Hiroki Koga (Tsukuba Unv.) |
(24) |
16:20-16:45 |
Evaluation of the Joint Capacity of Digital Fingerprinting Codes against the Interleaving Attack |
Hiroki Koga, Kaoru Itabashi (Univ. Tsukuba) |
|
16:45-16:55 |
Break ( 10 min. ) |
Thu, Mar 10 PM Invited Talk (1) Room 301 Chair: Yasutada Oohama (Univ. of Electro-Comm.) 16:55 - 17:45 |
(25) |
16:55-17:45 |
[Invited Talk]
Security of quantum cryptography and the hash function |
Toyohiro Tsurumaru (Mitsubishi Electric) |
Fri, Mar 11 AM IT(5) Room 301 Chair: Hideki Yoshikawa (Tohoku Gakuin Univ.) 10:00 - 12:05 |
(26) |
10:00-10:25 |
studies on evaluating system for q-ary linear block codes based on q-input r-output symmetric channels |
Tomohiro Fujikawa, Yamaguchi Kazuhiko (UEC) |
(27) |
10:25-10:50 |
Performance Analysis of Spatially-Coupled MacKay-Neal Codes on Channels with Memory |
Takuya Okazaki, Kenta Kasai (Tokyo Tech) |
(28) |
10:50-11:15 |
An improvement of sum-product decoding of LDPC codes by a local search method |
Yuki Kawauchi, Hiroshi Enoki, Kohtaro Watanabe, Seiji Kataoka (NDA) |
(29) |
11:15-11:40 |
Construction of WOM codes for multilevel flash memories based of integer programming |
Yoju Fujino, Tadashi Wadayama (NIT) |
(30) |
11:40-12:05 |
Asymptotics Zero Error Capacity on Nearest Neighbor Error Channels with Multilevel Alphabet |
Takafumi Nakano, Tadashi Wadayama (NIT) |
Fri, Mar 11 AM ISEC(2) Room 306 Chair: Noritaka Yamashita (NEC) 10:00 - 12:05 |
(31) |
10:00-10:25 |
Reconsideration of Fail-Stop Signature Schemes and Their UC-Security |
Masahiro Nomura (Ex-Chiba Univ.), Katsuhiro Nakamura (Chiba Univ.) |
(32) |
10:25-10:50 |
Expressive Attribute-Based Encryption with Fast Decryption |
Tsuchida Hikaru, Kanayama Naoki, Nishide Takashi, Okamoto Eiji (Univ. of Tsukuba) |
(33) |
10:50-11:15 |
Provable Secure Decentralized Multi-Authority Attribute-Based Encryption on Non-Programmable Random Oracle Model |
Tsuchida Hikaru, Kanayama Naoki, Nishide Takashi, Okamoto Eiji (Univ. of Tsukuba) |
(34) |
11:15-11:40 |
Performance Comparison of Multivariate Polynomial Encryption Schemes SRP and ABC |
Takanori Yasuda (ISIT), Kouichi Sakurai (Kyushu Univ.) |
(35) |
11:40-12:05 |
k-Anonymization Techinque for Encrypted Data |
Masayuki Yoshino, Hisayoshi Sato, Ken Naganuma, Yasuko Fukuzawa (Hitachi) |
|
12:05-13:05 |
Lunch Break ( 60 min. ) |
Fri, Mar 11 PM Invited Talk (2) Room 301 Chair: Kazuto Ogawa (NHK) 13:05 - 13:55 |
(36) |
13:05-13:55 |
[Invited Talk]
A Brief Overview and Survey on Some Advanced Cryptographic Primitives and Tools |
Takahiro Matsuda (AIST) |
|
13:55-14:05 |
Break ( 10 min. ) |
Fri, Mar 11 PM Invited Talk (3) Room 301 Chair: Fumiaki Maehara (Waseda University) 14:05 - 14:55 |
(37) |
14:05-14:55 |
[Invited Talk]
Refined Analysis of Optimum Coding Rate for Channels with States |
Hideki Yagi (Univ. of Electro-Communications) |