IEICE Technical Committee Submission System
Conference Schedule
Online Proceedings
[Sign in]
Tech. Rep. Archives
    [Japanese] / [English] 
( Committee/Place/Topics  ) --Press->
 
( Paper Keywords:  /  Column:Title Auth. Affi. Abst. Keyword ) --Press->

Technical Committee on Theoretical Foundations of Computing (COMP)  (Searched in: 2016)

Search Results: Keywords 'from:2016-12-21 to:2016-12-21'

[Go to Official COMP Homepage (Japanese)] 
Search Results: Conference Papers
 Conference Papers (Available on Advance Programs)  (Sort by: Date Ascending)
 Results 1 - 19 of 19  /   
Committee Date Time Place Paper Title / Authors Abstract Paper #
COMP, ISEC 2016-12-21
09:30
Hiroshima Hiroshima University Improvements of Blacklistable Anonymous Credential System Using Accumulator
Yuu Aikou, Toru Nakanishi (Hiroshima Univ) ISEC2016-70 COMP2016-31
In current ID-based user authentication schemes, privacy issues may occur, since users’ behavior histories are collected... [more] ISEC2016-70 COMP2016-31
pp.1-7
COMP, ISEC 2016-12-21
09:50
Hiroshima Hiroshima University A note on security notions of anonymity in Identity-based encryption
Honomu Ootomo, Taroh Sasaki, Atsushi Fujioka (Kanagawa Univ.) ISEC2016-71 COMP2016-32
Discussing security of the ID-based encryption, a kind of the public key encryption, one criterion of security is the an... [more] ISEC2016-71 COMP2016-32
pp.9-13
COMP, ISEC 2016-12-21
10:30
Hiroshima Hiroshima University [Invited Talk] New frontier of machine learning and computation initiated by quantum annealing
Masayuki Ohzeki (Tohoku Univ.) ISEC2016-72 COMP2016-33
 [more] ISEC2016-72 COMP2016-33
pp.15-22
COMP, ISEC 2016-12-21
12:40
Hiroshima Hiroshima University [Invited Talk] Fast and Scalable Bilinear-Type Conversion Using Integer Programming
Fumitaka Hoshino, Masayuki Abe (NTT), Miyako Ohkubo (NICT) ISEC2016-73 COMP2016-34
 [more] ISEC2016-73 COMP2016-34
p.23
COMP, ISEC 2016-12-21
13:10
Hiroshima Hiroshima University [Invited Talk] Cryptanalysis of GGH15 Multilinear Maps (from CRYPTO 2016)
Mehdi Tibouchi (NTT) ISEC2016-74 COMP2016-35
 [more] ISEC2016-74 COMP2016-35
p.25
COMP, ISEC 2016-12-21
13:40
Hiroshima Hiroshima University [Invited Talk] Backdoors in Pseudorandom Number Generators: Possibility and Impossibility Results
Jean Paul Degabriele, Kenneth Paterson (RHUL), Jacob Schuldt (AIST), Joanne Woodage (RHUL) ISEC2016-75 COMP2016-36
In this talk, we continue the foundational work on backdoored pseudorandom generators (PRGs) initiated by Dodis et al., ... [more] ISEC2016-75 COMP2016-36
p.27
COMP, ISEC 2016-12-21
14:30
Hiroshima Hiroshima University
Miki Miyauchi (NTT) ISEC2016-76 COMP2016-37
(To be available after the conference date) [more] ISEC2016-76 COMP2016-37
pp.29-35
COMP, ISEC 2016-12-21
14:50
Hiroshima Hiroshima University ISEC2016-77 COMP2016-38  [more] ISEC2016-77 COMP2016-38
pp.37-42
COMP, ISEC 2016-12-21
15:10
Hiroshima Hiroshima University A Loosely-Stabilizing Population Protocol for Maximal Independent Set
Seiken Kiyosu, Yuichi Sudo, Hirotsugu Kakugawa, Toshimitsu Masuzawa (Osaka Univ.) ISEC2016-78 COMP2016-39
Self–stabilizing population protocols are impossible to design for some problems. For example, leader election on ... [more] ISEC2016-78 COMP2016-39
pp.43-49
COMP, ISEC 2016-12-21
15:30
Hiroshima Hiroshima University Theoretical Model of Interconnection Networks Consisting of Hosts and Switches
Ryota Yasudo (Keio Univ.), Michihiro Koibuchi (NII), Hideharu Amano (Keio Univ.), Koji Nakano (Hiroshima Univ.) ISEC2016-79 COMP2016-40
Designing interconnection networks with low average shortest path length (ASPL) is an important object for researchers o... [more] ISEC2016-79 COMP2016-40
pp.51-58
COMP, ISEC 2016-12-22
09:30
Hiroshima Hiroshima University Effect on Mix Columns to the Security of Minalpher
Yuki Kishi, Taroh Sasaki, Atsushi Fujioka (Kanagawa Univ) ISEC2016-80 COMP2016-41
This article is about Mix Columns in Minalpher. SPN strcture have Mix Columns. Mix Columns have an influence on sa... [more] ISEC2016-80 COMP2016-41
pp.59-62
COMP, ISEC 2016-12-22
09:50
Hiroshima Hiroshima University Reconsideration on Re-keying scheme from CARDIS 2015 (part 2)
Yuichi Komano (Toshiba) ISEC2016-81 COMP2016-42
 [more] ISEC2016-81 COMP2016-42
pp.63-69
COMP, ISEC 2016-12-22
10:30
Hiroshima Hiroshima University [Invited Talk] Theory and Practice of Succinct Data Structures
Kunihiko Sadakane (Univ. of Tokyo) ISEC2016-82 COMP2016-43
Succinct data structures are data structures that can compress data to the limit and perform search and other operations... [more] ISEC2016-82 COMP2016-43
p.71
COMP, ISEC 2016-12-22
12:30
Hiroshima Hiroshima University [Invited Talk] Adversary-dependent Lossy Trapdoor Function from Hardness of Factoring Semi-smooth RSA Subgroup
Takashi Yamakawa (UT), Shota Yamada, Goichiro Hanaoka (AIST), Noboru Kunihiro (UT) ISEC2016-83 COMP2016-44
 [more] ISEC2016-83 COMP2016-44
p.73
COMP, ISEC 2016-12-22
13:00
Hiroshima Hiroshima University [Invited Talk] Extended Tower Number Field Sieve: A New Complexity for the Medium Prime Case (from CRYPTO 2015)
Taechan Kim (NTT) ISEC2016-84 COMP2016-45
In this invited talk, we introduce the paper, "Extended tower number field sieve: A new complexity for the medium prime ... [more] ISEC2016-84 COMP2016-45
p.75
COMP, ISEC 2016-12-22
13:30
Hiroshima Hiroshima University [Invited Talk] The SKINNY Family of Block Ciphers and its Low-Latency Variant MANTIS
Yu Sasaki (NTT) ISEC2016-85 COMP2016-46
 [more] ISEC2016-85 COMP2016-46
p.77
COMP, ISEC 2016-12-22
14:20
Hiroshima Hiroshima University [Invited Talk] How small can the diameter of an undirected graph be? -- Toward low-latency large-scale interconnection networks --
Ikki Fujiwara (NICT) ISEC2016-86 COMP2016-47
 [more] ISEC2016-86 COMP2016-47
p.79
COMP, ISEC 2016-12-22
15:40
Hiroshima Hiroshima University Reduction of Search Number for Equivalence Structure Extraction Under Equivalence Structure Conservation Assumption
Seiya Satoh (AIST), Yoshinobu Takahashi (University of Electro-Communications), Hiroshi Yamakawa (Dwango AI Lab) ISEC2016-87 COMP2016-48
We consider $K$-tuples that are composed of IDs that identify $K$D sequences where the number of IDs is $N$. An equivale... [more] ISEC2016-87 COMP2016-48
pp.81-86
COMP, ISEC 2016-12-22
16:00
Hiroshima Hiroshima University Improvement of Finger Outlines Extraction in Hand Images Including Unusual Patterns with a Color Glove
Kotaro Moriuchi, Noriaki Fujishima (NIT, Matsue College) ISEC2016-88 COMP2016-49
In this study, the authors have investigated problems which cause mistakes when finger outlines are extracted using palm... [more] ISEC2016-88 COMP2016-49
pp.87-91
 Results 1 - 19 of 19  /   
Choose a download format for default settings. [NEW !!]
Text format pLaTeX format CSV format BibTeX format
Copyright and reproduction : All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan