Thu, Mar 15 AM 09:55 - 12:00 |
(1) |
09:55-10:20 |
A Study on Detection method of Interference using Kullback-Leibler Information for UWB MB-OFDM systems |
Tetsunao Matsuta, Masahiro Fujii, Yu Watanabe (Utsunomiya Univ.) |
(2) |
10:20-10:45 |
Experimental Validation of Simulated Interference Effects from UWB Systems to a QPSK Digital Transmission System |
Atsushi Tomiki, Takehiko Kobayashi (TDU) |
(3) |
10:45-11:10 |
On Adaptive Equalization for Direct Sequence-Ultra Wideband System |
Keat Beng Toh, Masatoshi Yokota, Shin'ichi Tachikawa (Nagaoka Univ. of Tech.) |
(4) |
11:10-11:35 |
Evaluation and Compensation of Channel Characteristics around Human Body for UWB System |
Takashi Yamada, Takashi Kobayashi, Hirotsugu Matsuda, Nobu Yamazaki, Kohei Ohno, Tetsushi Ikegami (Meiji Univ.) |
(5) |
11:35-12:00 |
Analysis and Experiment of Communication Distance in Visible Light Communication System |
Hidemitsu Sugiyama, Shinichiro Haruyama, Masao Nakagawa (Keio Univ.) |
Thu, Mar 15 PM 16:30 - 17:45 |
(6) |
16:30-16:55 |
efficient frequency usage system |
Naoki Suehiro (Univ. of Tsukuba), Chenggao Han (Univ. of Electro-comm.), Rongzhen Jin (Univ. of Tsukuba), Takeshi Hashimoto (Univ. of Electro-comm.) |
(7) |
16:55-17:20 |
A Study on Site Diversity Effect in Up-link multi-site communication systems |
Keisuke Matsuzaki, Masahiro Fujii, Yu Watanabe (Utsunomiya Univ.) |
(8) |
17:20-17:45 |
Reverse Link System Capacity Enhancement in W-CDMA Two-Hop Cellular Systems with Fixed Hop Station |
Yoichiro Mizuno, Masao Nakagawa (Keio Univ) |
Thu, Mar 15 AM 10:20 - 12:00 |
(9) |
10:20-10:45 |
On the Study of the Effect of Variable Parameter in Pseudo Random Number Generation using 1-Dimensional Linear Mapping |
Takashi Iwano, Manabu Kaneda, Hidetoshi Okutomi (Toshiba Information Systems) |
(10) |
10:45-11:10 |
A Study on Discrete Fourier Transform Test Included in NIST Randomness Test Suite |
Manabu Kaneda, Hidetoshi Okutomi (Toshiba Information Systems), Katsuhiro Nakamura (Chiba Univ.) |
(11) |
11:10-11:35 |
A evaluation of tamper-resistant hardware implementation for a hash function. |
Jun Kitahara (Hitachi,Ltd.) |
(12) |
11:35-12:00 |
Fault Attack on RSA using INSTAC-32 compliant platform |
Koichi Fujisaki, Hideo Shimizu (TOSHIBA) |
Thu, Mar 15 PM 13:00 - 16:20 |
(13) |
13:00-14:00 |
[Invited Talk]
Legal System for Information Security |
Koichiro Hayashi (IISEC) |
|
14:00-14:10 |
Break ( 10 min. ) |
(14) |
14:10-15:10 |
[Invited Talk]
Adaptive Equalization Techniques for Broad-Band Communication Systems |
Hiroshi Kubo, Akihiro Shibuya (Mitsubishi Electric) |
|
15:10-15:20 |
Break ( 10 min. ) |
(15) |
15:20-16:20 |
[Invited Talk]
A Note on my studies of coding theory, cryptography and their applications in my life |
Katsuhiro Nakamura (Chiba Univ.) |
Thu, Mar 15 PM 16:30 - 17:45 |
(16) |
16:30-16:55 |
Efficient Elliptic Curve Scalar Multiplication with triple bases |
Kenji Mizosoe, Atsuko Miyaji, Toshiaki Kamei (JAIST) |
(17) |
16:55-17:20 |
Universal $\eta_T$ Pairing Algorithm over Arbitrary Extension Degrees |
Masaaki Shirase, Tsuyoshi Takagi (Future Univ. Hakodate), Eiji Okamoto (Univ of Tsukuba) |
(18) |
17:20-17:45 |
New Definition of Density on Knapsack Cryptosystems |
Noboru Kunihiro, Keisuke Kitahara, Kazuo Ohta (UEC) |
Thu, Mar 15 AM 10:20 - 12:00 |
(19) |
10:20-10:45 |
A Study on Construction of LDPC Code
-- 空欄 -- |
Yusuke Mori, Kazuhiko Yamaguchi (UEC) |
(20) |
10:45-11:10 |
An Algebraic Derivation of the Minimum Weight of Simple Full-length Array-LDPC Code with Certain Parameters |
Kenji Sugiyama, Yuichi Kaji (NAIST) |
(21) |
11:10-11:35 |
Application of S semi-random interleaver to Multiple Turbo Codes |
Hide Matsuhira, Haruo Ogiwara (NUT) |
(22) |
11:35-12:00 |
Error Probability Analysis of Majority Decision in Tree Networks Composed of Binary Symmetric Channels |
Shunsuke Koyama, Ikuo Oka, Shingo Ata (Osaka City Univ.) |
Thu, Mar 15 PM 16:30 - 17:45 |
(23) |
16:30-16:55 |
Reduction of Energy Function by Bit Flipping for Multi-User Detection |
Ryuichi Hane, Yutaka Jitsumatsu, Tohru Kohda (Kyushu Univ) |
(24) |
16:55-17:20 |
Wireless Steganography by Embed Predistortion Spectrum Spread Signal in Digital Mobile Communication |
Takayasu Kitano, Hisato Iwai, Hideichi Sasaoka (Doshisha Univ.) |
(25) |
17:20-17:45 |
Condig and Coded Modulation in Digital Watermark Systems |
Kazuhiko Yamaguchi, Junya Kubota, Raul Martinez-Noriega, Hyunho Kang, Brian Kurkoski (UEC) |
Fri, Mar 16 AM 10:20 - 12:00 |
(26) |
10:20-10:45 |
On performances of M-ary/OFDM communication system |
Hideyuki Murata, Shin'ichi Tachikawa (Nagaoka Univ. of Tech.) |
(27) |
10:45-11:10 |
On Bit-Error Rate Performance of Approximately Synchronized CDMA System |
Tatsuya Hisada, Shinya Matsufuji, Takahiro Matsumoto, Yoshihiro Tanada (Yamaguchi Univ.), Noriyoshi Kuroyanagi (Chubu Univ.), Naoki Suehiro (Tsukuba Univ.) |
(28) |
11:10-11:35 |
On Noncoherent FH Pattern Likelihood Ratio Decision Methods |
Takuma Maeda, Shin'ichi Tachikawa (Nagaoka Univ of Tech) |
(29) |
11:35-12:00 |
A Construction Method of Spread Spectrum Codes |
Takumi Sugawara, Kouichi Ohnuma (Tohoku Gakuin Univ.) |
Fri, Mar 16 PM 13:00 - 14:40 |
(30) |
13:00-13:25 |
MMSE Signal Detection with Adaptive Antenna Array for BS/CDMA Communication Systems |
Satoshi Kawashimo, Tsuyoshi Ichikawa, Kohei Otake (Hosei Univ), Noriyoshi Kuroyanagi (Chubu Univ) |
(31) |
13:25-13:50 |
Capacity increase in block-spreading MIMO CDMA systems due to path diversity effect |
Mitsuhiro Tomita (Tokyo Univ. of Tech.), Noriyoshi Kuroyanagi (Chubu Univ.), Kohei Otake (Hosei Univ.), Naoki Suehiro (Univ. of Tsukuba) |
(32) |
13:50-14:15 |
Proposal of Twin Turbo MIMO-OFDM |
Yasuyuki Hatakawa, Noriaki Miyazaki, Toshinori Suzuki (KDDI R&D Lab.) |
(33) |
14:15-14:40 |
A Consideration of Time Domain Precoder on MIMO Frequency Selective Channels |
Yusuke Goto, Yasunori Iwanami, Eiji Okamoto (N.I.T) |
Fri, Mar 16 AM 08:30 - 10:10 |
(34) |
08:30-08:55 |
On the Security of Secret Handshake |
Kazuki Yoneyama, Yutaka Kawai, Takahiro Kondo, Kazuo Ohta, Noboru Kunihiro (UEC) |
(35) |
08:55-09:20 |
On a Secure Function Evaluation for Comparator Networks |
Koji Chida (NTT), Hiroaki Kikuchi (Tokai Univ.), Gembu Morohashi, Keiichi Hirota (NTT) |
(36) |
09:20-09:45 |
Computationally Sound Symbolic Criteria for UC-secure Multi-Party Mutual Authentication and Key Exchange Protocols |
Hirofumi Muratani, Yoshikazu Hanatani (Toshiba) |
(37) |
09:45-10:10 |
Key Update by Broadcast Encryption for Wireless Sensor Networks |
Taketsugu Yao, Ryohei Konuma, Shigeru Fukunaga, Toshihisa Nakai (OKI) |
Fri, Mar 16 AM 10:20 - 12:00 |
(38) |
10:20-10:45 |
QPKI:Construction of Ubiquitous PKI Systems Using Two-Dimensional Barcode |
Ken Umeno (NICT) |
(39) |
10:45-11:10 |
Proposal of P2P network architechture where data acquisition can be controlled |
Naoki Sasamura, Hidehiko Tanaka (iisec) |
(40) |
11:10-11:35 |
Design and Analysis of 3way Authentication Based on Trusted Device |
Hiromi Fukaya (Pastel), Kenji Imamoto, Kouichi Sakurai (Kyushu Univ.) |
(41) |
11:35-12:00 |
The proposal of low-processing load authentication method for two parties using disposable ID |
Kazuo Fushimi, Noboru Kunihiro, Kazuo Ohta (UEC) |
Fri, Mar 16 PM 13:00 - 14:40 |
(42) |
13:00-13:25 |
Linearization method and linear complexity |
Hidema Tanaka (NICT) |
(43) |
13:25-13:50 |
On the Linear Characteristic of HyRAL16 |
Yasutaka Igarashi, Toshinobu Kaneko, Naoto Fukubayashi (Tokyo Univ. of Science) |
(44) |
13:50-14:15 |
Performance Evaluation of Block Encryption Algorithms on Core2 |
Junko Nakajima, Mitsuru Matsui (Mitsubishi Electric Corp.) |
(45) |
14:15-14:40 |
Performance Comparison of the ISO standard block ciphers in ASICs |
Takeshi Sugawara, Naofumi Homma, Takafumi Aoki (Tohoku Univ.), Akashi Satoh (IBM Japan) |
Fri, Mar 16 PM 14:50 - 15:40 |
(46) |
14:50-15:15 |
A technique for making PKI robust |
Masaki Yoshida, Shingo Hasegawa, Shuji Isobe, Eisuke Koizumi, Masao Sakai, Hiroki Shizuya (Tohoku Univ.), Yuichi Futa, Manabu Maeda (Matsushita) |
(47) |
15:15-15:40 |
A Digital Watermarking for Audio Information: Randomized Method and Beat-Frequency Method |
Shinya Miura, Masao Sakai, Hiroki Shizuya (Tohoku Univ.) |
Fri, Mar 16 AM 08:55 - 10:10 |
(48) |
08:55-09:20 |
A Study on Relation between Orthogonal Design and Dual Codes |
Yoshifumi Ukita (YCC), Toshiyasu Matsushima (Waseda Univ.) |
(49) |
09:20-09:45 |
Another Form of Coding Theorems for General Source Coding and Shannon:s Cipher System |
Hiroki Koga (Univ. of Tsukuba) |
(50) |
09:45-10:10 |
Quantum key distribution with guarantteed security by weak coherent light |
Masahito Hayashi, Akihisa Tomita, Jun Hasegawa, Tohya Hiroshima (JST ERATO-SORST) |
Fri, Mar 16 AM 10:20 - 12:00 |
(51) |
10:20-10:45 |
A Study on Performance of Reed-Solomon coded Code Selection method |
Kyung Woon Jang, Hirokazu Tanaka (Toshiba), Shoichiro Yamasaki (POLITECHINIC Univ.) |
(52) |
10:45-11:10 |
Study on Turbo Decoding Using Error and Erasure Decoder of RS codes As a Hard-in Soft-out Decoder |
Shinya Maehara, Brian Kurkoski, Kazuhiko Yamaguchi, Kingo Kobayashi (UEC) |
(53) |
11:10-11:35 |
On a soft-input and output iterative decoding algorithm for Reed-Solomon codes |
Hitoshi Tokushige, Kenichi Arimoto, Masami Mohri, Yasutada Oohama (Univ. of Tokushima) |
(54) |
11:35-12:00 |
Method for Reducing Computational Complexity of Soft-Decision Decoding Based on Ordered Statistics |
Takayuki Shimizu, Kenya Horai, Hisato Iwai, Hideichi Sasaoka (Doshisha Univ.) |
Fri, Mar 16 PM 13:00 - 14:15 |
(55) |
13:00-13:25 |
Share selectable secret sharing scheme on inefficiency concentrated for particular user |
Keita Emura (JAIST), Akito Nomura (Kanazwa Univ.), Masakazu Soshi, Atsuko Miyaji (JAIST) |
(56) |
13:25-13:50 |
Group Signature with Efficient Revocation |
Nao Nomura, Atsuko Miyaji, Keita Emura (JAIST) |
(57) |
13:50-14:15 |
On Quantum Secret Sharing between Multiparty and Multiparty without Quantum Memory |
Takayuki Takagi, Atsushi Waseda, Masakazu Soshi, Atsuko Miyaji (Jaist) |
Fri, Mar 16 PM 14:50 - 16:05 |
(58) |
14:50-15:15 |
A Study on Huffman Coding for Binomial Sources |
Hisao Fukuoka (Matsue NCT) |
(59) |
15:15-15:40 |
Updating algorithms for Jones splay code with a multiway tree |
Yoshiyuki Suimon, Hirosuke Yamamoto (Univ. of Tokyo) |
(60) |
15:40-16:05 |
Information-Hiding Schemes Based on the Algorithm of gzip |
Satoshi Tomioka, Hiroki Koga (Univ. of Tsukuba) |