Conference Date |
Wed, Mar 5, 2025 09:50 - 16:20
Thu, Mar 6, 2025 08:50 - 15:45 |
Topics |
Joint Workshop of ISEC, IT, RCC, and WBS |
Conference Place |
Nakanoshima Center, Osaka University |
Sponsors |
This conference is co-sponsored by Graduate School of Engineering, The University of Osaka.
|
Notes on Review |
This article is a technical report without peer review, and its polished version will be published elsewhere. |
Registration Fee |
This workshop will be held as the IEICE workshop in fully electronic publishing. Registration fee will be necessary except the speakers and participants other than the participants to workshop(s) in non-electronic publishing. See the registration fee page. We request the registration fee or presentation fee to participants who will attend the workshop(s) on WBS, ISEC, IT, RCC. |
Wed, Mar 5 AM ISEC1 (Room 7A) 09:50 - 11:30 |
(1) |
09:50-10:15 |
Distinguishing Attacks against Docked Double Decker |
Takahiro Kaneko, Tetsu Iwata (Nagoya Univ.) |
(2) |
10:15-10:40 |
A study on computational evaluation of higher order differentials in lightweight blockcipher ASCON |
Aya Hirokawa (JGSDF), Hidema Tanaka (NDA) |
(3) |
10:40-11:05 |
Improved Linear Approximation Formula for the Stream Cipher Salsa |
Asahi Oishi, Atsuko Miyaji (Osaka Univ.) |
(4) |
11:05-11:30 |
Higher Order Differential Property of Lightweight Block Cipher NLBCIT |
Naoki Shibayama, Keigo Katsuta, Yasutaka Igarashi (Tokyo Univ. of Science) [updated] |
|
11:30-12:40 |
Lunch Break (Unavailable during the integration work of Rooms 7A and 7B) ( 70 min. ) |
Wed, Mar 5 AM IT1 (Room 7B) 09:50 - 11:30 |
(5) |
09:50-10:15 |
Double Insertion Correcting Algorithm for Sima's Double Deletion Correcting Code |
Yinwei Du, Takayuki Nozaki (Yamaguchi Univ.) |
(6) |
10:15-10:40 |
|
Hiyori Murakami, Nozaki Takayuki (Yamaguchi Univ.) |
(7) |
10:40-11:05 |
Approximate Solutions and Computational Complexity of the Adjacent Lee Weighted Indel Distance |
Ginga Ito, Akiko Manada (NUT) |
(8) |
11:05-11:30 |
A Study on Inner Coding of Synchronization Error Correcting Concatenated Code Satisfying Run-Length and Balance Constraints |
Shogo Takada, Haruhiko Kaneko (Science Tokyo) |
|
11:30-12:40 |
Lunch Break (Unavailable during the integration work of Rooms 7A and 7B) ( 70 min. ) |
Wed, Mar 5 AM WBS1 (Room 7C) 09:50 - 11:30 |
(9) |
09:50-10:15 |
Extended Linear Interference Suppression for SIC-Free Time-Domain NOMA |
Tomonari Kurayama, Teruyuki Miyajima (Ibaraki Univ.) |
(10) |
10:15-10:40 |
A Study on Extrinsic Value Generation Mechanism of IDD Algorithm for Coded MIMO Systems with High-Order Modulation |
Fuga Kobayashi, Takahashi Takumi (Osaka Univ,), Shinsuke Ibi (Doshisya Univ.), Ochiai Hideki (Osaka Univ,) |
(11) |
10:40-11:05 |
A Study on Three-Dimensional Wireless Indoor Localization Based on Quaternion-Domain Super MDS [updated] |
Keigo Masuoka, Takumi Takahashi (Osaka Univ), Giuseppe Abreu (CU), Hideki Ochiai (Osaka Univ) |
(12) |
11:05-11:30 |
Positioning Accuracy Performance of FOA/TOA Based Position Detection System Using Single Non-Geostationary Satellite |
Ryota Shimizu, Jo Tamura, Hiroyasu Ishikawa (Nihon Univ.) |
|
11:30-12:40 |
Lunch Break (Can be used as a waiting room, but no eating or drinking) ( 70 min. ) |
Wed, Mar 5 PM ISEC2 (Room 7A+7B) 12:40 - 14:20 |
(13) |
12:40-13:05 |
Survey of security measures targeting SMEs |
Yoshinaga Tatsuya, Minami Yoda, Yuichiro Gomi, Yutaka Matsuno (Nihon Univ.) |
(14) |
13:05-13:30 |
Consideration on Semantic Similarity of Adversarial Attacks against Natural Language Processing |
Yuto Nakamura, Kazuki Yoneyama (Ibaraki Univ.) |
(15) [updated] |
13:30-13:55 [updated] |
Analysis of Extension of Kannan’s Embedding for Module-LWE Problem |
Kosuke Tamura, Astuko Miyaji, Shinya Okumura (Osaka Univ.) |
(16) |
13:55-14:20 |
Examination of Defense Methods Against Membership Inference Attacks |
Kenta Okada, Atsuko Miyaji (Osaka Univ) |
|
14:20-14:30 |
Break ( 10 min. ) |
Wed, Mar 5 PM IT2 (Room 7C) 12:40 - 14:20 |
(17) |
12:40-13:05 |
Evaluation of Variable Coding Rate and Code Length Employing Relaxed Polar Codes |
Nobuhiko Miki (Kagawa Univ.), Tatsunori Obara, Satoshi Nagata, Satoshi Suyama (NTT DOCOMO) |
(18) |
13:05-13:30 |
A note on parameters of binary cooperative locally repairable codes attaining the Singleton-like bound |
Koki Kazama (Shonan Institute of Technology) |
(19) |
13:30-13:55 |
Efficient Secret Reconstruction Quantum Circuit for Binary Stabilizer-Based Quantum Secret Sharing |
Shoo Chiwaki, Ryutaroh Matsumoto (Science Tokyo) |
(20) |
13:55-14:20 |
A Numerical Study on Squashed Entanglement using Semidefinite Programming with Exponential Representation |
Hiroki Kawashima, Tomohiro Ogawa (UEC) |
|
14:20-14:30 |
Break ( 10 min. ) |
|
14:30-15:20 |
Waiting room ( 50 min. ) |
|
15:20-15:30 |
Break ( 10 min. ) |
|
15:30-16:20 |
Waiting room ( 50 min. ) |
Wed, Mar 5 PM ISEC Invited Presentation (Room 7A+7B) 14:30 - 15:20 |
(21) |
14:30-15:20 |
[Invited Talk]
Security analysis for modern cryptography based on mathematical approach |
Noboru Kunihiro (Univ. of Tsukuba) |
|
15:20-15:30 |
Break ( 10 min. ) |
Wed, Mar 5 PM IT Invited Presentation (Room 7A+7B) 15:30 - 16:20 |
(22) |
15:30-16:20 |
[Invited Talk]
An Encouragement of Quantum Error-Correcting Codes |
Manabu Hagiwara (Chiba Univ.) |
Thu, Mar 6 AM ISEC3 (Room 7A) 08:50 - 10:05 |
(23) |
08:50-09:15 |
Security notions of key combiner against adaptive chosen ciphertext attacks |
Ann Kasakawa, Toki Sasaki, Astushi Fujioka (Kanagawa Univ.), Akira Nagai, Kan Yasuda (NTT) [updated] |
(24) |
09:15-09:40 |
Multi-party Private Set Intersection with Dynamically Updatable Preprocessing |
Kota Sugimoto (UEC), Ryo Hiromasa (MELCO), Mitsugu Iwamoto, Yohei Watanabe (UEC) |
(25) |
09:40-10:05 |
Proposal of Interactive Zero-Knowledge Proof using Lattice-Based Polynomial Commitment |
Toshiyuki Mineta, Yurie Okada, Akira Fujimoto (OU), Hideaki Miyaji (Ritsumei), Atsuko Miyaji (OU) |
|
10:05-10:15 |
Break ( 10 min. ) |
Thu, Mar 6 AM IT3 (Room 7B) 08:50 - 10:05 |
(26) |
08:50-09:15 |
On the DNA Storage Capacity of Compound Shuffling-Sampling Channels with an Eavesdropper |
Tomoya Fujimori, Tetsunao Matsuta (Saitama Univ.) |
(27) |
09:15-09:40 |
On the Minimum Download Cost for Private Information Retrieval Systems Allowing Information Leakage of Subsets of Messages |
Yuto Tamura, Tetsunao Matsuta (Saitama univ.) |
(28) |
09:40-10:05 |
|
|
|
10:05-10:15 |
Break ( 10 min. ) |
Thu, Mar 6 AM WBS2 (Room 7C) 08:50 - 10:05 |
(29) |
08:50-09:15 |
Comparison of pulse width multi-level modulation for VLC using orthogonally aligned rolling shutter cameras |
Ayumu Otsuka, Shan Lu, Takaya Yamazato (Nagoya Univ), Zhengqiang Tang (Shizuoka Univ), Hiraku Okada (Nagoya Univ) |
(30) |
09:15-09:40 |
Visible-light communication that effectively combines lighting patterns and emission color patterns of RGB-LED |
Tatsuyuki Kiyokawa, Hiromasa Habuchi, Yusuke Kozawa (Ibaraki Univ.) |
(31) |
09:40-10:05 |
Experimental Evaluation of Parallel Delay Transmission for Varying Communication Ranges in Rolling Shutter Based Visible Light Communication |
Hikari Koga, Masayuki Kinoshita, Koji Kamakura (Chiba Inst. of Tech.), Takaya Yamazato (Nagoya Univ.) |
|
10:05-10:15 |
Break ( 10 min. ) |
Thu, Mar 6 AM ISEC4 (Room 7A) 10:15 - 11:30 |
(32) |
10:15-10:40 |
Short Identity-Based Signature with Code |
Ryoma Kinjo, Shingo Sato, Junji Shikata (Yokohama National Univ.) |
(33) [updated] |
10:40-11:05 [updated] |
Detection of Deepfake Images based on Embedding Geometry of Data Manifolds |
Han Wang, Hajime Tasaki, Jinhui Chao (Chuo Univ.) |
(34) |
11:05-11:30 |
Efficient CCA-secure Public Key Encryption with Publicly Verifiability |
Masaya Yoshimura (UEC), Kyoichi Asano (UEC/AIST), Mitsugu Iwamoto (UEC), Yohei Watanabe (UEC/AIST) |
|
11:30-12:40 |
Lunch Break ( 70 min. ) |
Thu, Mar 6 AM IT4 (Room 7B) 10:15 - 11:30 |
(35) |
10:15-10:40 |
An Extension of the Information Bottleneck Problem based on Statistical Decision Theory |
Akira Kamatsuka (SIT), Takahiro Yoshida (Nihon Univ.) |
(36) |
10:40-11:05 |
An Analysis on Least Squares Superposition Codes Without Random Coding |
Yoshinari Takeishi (Kyushu Univ.), Andrew Barron (Yale Univ.) |
(37) |
11:05-11:30 |
Converse Coding Theorems for the Distributed Hypothesis Testing [updated] |
Yasutada Oohama (UEC) |
|
11:30-12:30 |
Lunch Break ( 60 min. ) |
|
12:30-13:55 |
IT Committee ( 85 min. ) |
|
13:55-14:05 |
Break ( 10 min. ) |
Thu, Mar 6 AM RCC (Room 7C) 10:15 - 11:05 |
(38) |
10:15-10:40 |
Design Based on Frequency Analysis for Prediction Model Using RNN with HiPPo Blocks |
Akinobu Naruse, Syunta Katsuma, Ryousuke Adachi, Yugi Wakasa (Yamaguchi Univ) |
(39) |
10:40-11:05 |
Design of Event-Triggering Conditions Based on Non-Monotonic Lyapunov Functions |
Koichi Kobayashi, Masaki Yanai (Hokkaido Univ.) |
Thu, Mar 6 PM ISEC5 (Room 7A) 12:40 - 13:55 |
(40) |
12:40-13:05 |
Proposal and evaluation of a deep learning model for the lattice decision problem [updated] |
Keita Yamakawa, Junji Shikata (YNU) [updated] |
(41) |
13:05-13:30 |
|
|
(42) |
13:30-13:55 |
Introduction of "cyclic isomorphism" in two-party non-commitment card protocols that limits card input and related topics |
Yuji Suga (IIJ) |
|
13:55-14:05 |
Break ( 10 min. ) |
Thu, Mar 6 PM ISEC6 (Room 7A) 14:05 - 15:20 |
(43) [updated] |
14:05-14:30 [updated] |
Construction of BLS Signatures Without Random Oracles Using Linear Hash Functions |
Kodai Hayashida, Atsuko Miyaji (Osaka Univ.) |
(44) |
14:30-14:55 |
On the Verification of the Security of Ring-LWE over Function Fields [updated] |
Sayumi Shibata, Shinya Okumura, Atsuko Miyaji (Osaka Univ.) |
(45) |
14:55-15:20 |
Analysis of the χ^2-Attack on the Module-LWE Problem in the Dual Space and its Comparison with Ring-LWE |
Sosuke Funatsu, Atsuko Miyaji, Shinya Okumura (OU) |
Thu, Mar 6 PM IT5 (Room 7B) 14:05 - 15:45 |
(46) |
14:05-14:30 |
(Quasi-)Linear-Time Algorithms for the Closest Vector Problem in Equiangular Lattices [updated] |
Kenta Takahashi, Wataru Nakamura (Hitachi) |
(47) |
14:30-14:55 |
A Consideration of the relationship between GNB and n-th traces using the roots of the cyclotomic polynomial |
Akane Miyoshi, Kazuma Ikesaka, Yuta Kodera, Yasuyuki Nogami (Okayama Univ) |
(48) |
14:55-15:20 |
Experiment and Evaluation of Mis-operation Resistant Homomorphic Encryption in ELiPS |
Kai Tokisue, Naoya Saito, Yuta Kodera, Yasuyuki Nogami (Okayama Univ.) |
(49) |
15:20-15:45 |
Implementation and Performance Evaluation of Real-Number Supported Homomorphic Computation Combining Pairing-Based and Lattice-Based Cryptography [updated] |
Naoya Saito, Kai Tokisue, Yuta Kodera, Yasuyuki Nogami (Okayama Univ) |