IEICE Technical Committee Submission System
Conference Schedule
Online Proceedings
[Sign in]
Tech. Rep. Archives
    [Japanese] / [English] 
( Committee/Place/Topics  ) --Press->
 
( Paper Keywords:  /  Column:Title Auth. Affi. Abst. Keyword ) --Press->

Technical Committee on Information Theory (IT)  (Searched in: 2020)

Search Results: Keywords 'from:2021-03-04 to:2021-03-04'

[Go to Official IT Homepage (Japanese)] 
Search Results: Conference Papers
 Conference Papers (Available on Advance Programs)  (Sort by: Date Ascending)
 Results 1 - 20 of 46  /  [Next]  
Committee Date Time Place Paper Title / Authors Abstract Paper #
WBS, IT, ISEC 2021-03-04
09:25
Online Online List-Pruning SCL Decoder for Polar Codes Using Parity-Check Bits
Yusuke Oki, Ryo Shibata, Hiroyuki Yashima (TUS) IT2020-112 ISEC2020-42 WBS2020-31
In this paper, we propose encoding and decoding algorithms of polar codes which add pruning bits into the transmitted in... [more] IT2020-112 ISEC2020-42 WBS2020-31
pp.1-6
WBS, IT, ISEC 2021-03-04
09:50
Online Online Variable spreading factor codes for optical code-division multiple access
Kyohei Ono, Shoichiro Yamasaki, Tomoko K. Matsushima (Polytechnic Univ.) IT2020-113 ISEC2020-43 WBS2020-32
In this study, we propose variable spreading factor codes based on generalized modified prime sequence codes (GMPSCs), w... [more] IT2020-113 ISEC2020-43 WBS2020-32
pp.7-12
WBS, IT, ISEC 2021-03-04
10:15
Online Online Error Performances of Synchronous Optical Code-Division Multiple Access Schemes Using Chip-Pair Codes
Tomoko K. Matsushima, Shoichiro Yamasaki, Kyohei Ono (Polytechnic Univ.) IT2020-114 ISEC2020-44 WBS2020-33
This paper investigates the bit error rate performance of synchronous optical code-division multiple access (CDMA) using... [more] IT2020-114 ISEC2020-44 WBS2020-33
pp.13-18
WBS, IT, ISEC 2021-03-04
10:55
Online Online An Efficient Bayes Coding Algorithm for the Source Based on Context Tree Models that Vary from Section to Section
Koshi Shimada, Shota Saito, Toshiyasu Matsushima (Waseda Univ.) IT2020-115 ISEC2020-45 WBS2020-34
In this paper, we present an efficient coding algorithm for a non-stationary source based on context tree models that ve... [more] IT2020-115 ISEC2020-45 WBS2020-34
pp.19-24
WBS, IT, ISEC 2021-03-04
11:20
Online Online A note on sufficient condition for reconstructable substring of CSE method
Shungo Tanaka, Hiroshi Kamabe, Shan Lu (Gifu Univ.) IT2020-116 ISEC2020-46 WBS2020-35
Various data compression methods have been proposed, which can be roughly classified into two cat-egories: lossless comp... [more] IT2020-116 ISEC2020-46 WBS2020-35
pp.25-30
WBS, IT, ISEC 2021-03-04
11:45
Online Online Streaming Data Compression and Decompression by One-Way Quantum Finite-State Automata, Leading to Quantum Finite-State Deep and Shallow Information (Preliminary Report)
Tomoyuki Yamakami (U of Fukui) IT2020-117 ISEC2020-47 WBS2020-36
The logical depth of a piece of data has served as a complexity measure to
describe the amount of “useful” and "non-ran... [more]
IT2020-117 ISEC2020-47 WBS2020-36
pp.31-36
WBS, IT, ISEC 2021-03-04
09:25
Online Online Four-Block Type-2 Feistel Cipher from Tweakable Block Ciphers
Kazuki Nakaya, Tetsu Iwata (Nagoya Univ.) IT2020-118 ISEC2020-48 WBS2020-37
A secure block cipher can be obtained from tweakable block ciphers (TBCs). In this paper, by using a TBC with $n$-bit bl... [more] IT2020-118 ISEC2020-48 WBS2020-37
pp.37-44
WBS, IT, ISEC 2021-03-04
09:50
Online Online Integral Attack with Bit-Based Division Property against lightweight block cipher MANTRA
Hiroki Komatsu, Yasutaka Igarashi, Toshinobu Kaneko (TUS) IT2020-119 ISEC2020-49 WBS2020-38
MANTRA is a block cipher with a Feistel structure proposed by Gaurav Bansod, Narayan Pisharoty, and Abhijit Patil in 201... [more] IT2020-119 ISEC2020-49 WBS2020-38
pp.45-51
WBS, IT, ISEC 2021-03-04
10:15
Online Online Analysis of a new linear bias in the input/output difference of Salsa20
Ryo Watanabe, Atsuko Miyaji (Osaka Univ.) IT2020-120 ISEC2020-50 WBS2020-39
Among cryptographic techniques, Salsa20, a stream cipher, is the predecessor of ChaCha20,
which was selected for TLS 1... [more]
IT2020-120 ISEC2020-50 WBS2020-39
pp.52-57
WBS, IT, ISEC 2021-03-04
10:55
Online Online Solving Shortest Vector Problem using annealing computation -- How to generate a hamiltonian using pseudo multispin flip method --
Junpei Yamaguchi (Fujitsu Llaboratories), Takuya Ohwa (Kyushu Institute of Technology), Kazuyoshi Furukawa (Fujitsu Llaboratories) IT2020-121 ISEC2020-51 WBS2020-40
Lattice-based cryptography is mainly based on the security of the Shortest Vector Problem (SVP) and considered to be a p... [more] IT2020-121 ISEC2020-51 WBS2020-40
pp.58-65
WBS, IT, ISEC 2021-03-04
11:20
Online Online An Attack on Search Ring-LWE Problem for Even Relative Degree
Yasuhisa Okumura, Shinya Okumura, Atsuko Miyaji (Osaka Univ) IT2020-122 ISEC2020-52 WBS2020-41
The Ring-LWE problem is used to construct homomorphic encryption and has attracted much attention because of its quantum... [more] IT2020-122 ISEC2020-52 WBS2020-41
pp.66-72
WBS, IT, ISEC 2021-03-04
11:45
Online Online Security analysis for the isogeny-based cryptography CSIDH
Hayato Arai, Atsuko Miyaji, Kenta Kodera (Osaka Univ.) IT2020-123 ISEC2020-53 WBS2020-42
CSIDH (Commutative Supersingular Isogeny Diffie Hellman) is a kind of post-quantum cryptography that uses isogenies to e... [more] IT2020-123 ISEC2020-53 WBS2020-42
pp.73-80
WBS, IT, ISEC 2021-03-04
12:10
Online Online Efficient parallel computing method of isogeny based cryptography
Ryota Udani, Koutarou Suzuki (TUT) IT2020-124 ISEC2020-54 WBS2020-43
Jao et al. proposed SIDH, a key exchange protocol based on isogeny between supersingular elliptic curves. It is expected... [more] IT2020-124 ISEC2020-54 WBS2020-43
pp.81-85
WBS, IT, ISEC 2021-03-04
13:20
Online Online [Poster Presentation] Experimental Evaluation for Alamouti-type Spatio-temporal Coding in Image Sensor Communication Using a Rotary LED Transmitter
Zhengqiang Tang, Shintaro Arai (Okayama Univ. of Sci.), Takaya Yamazato (Nagoya Univ.) IT2020-125 ISEC2020-55 WBS2020-44
This study provides the experimental evaluations for afterimage-based Alamouti-type Spatio-temporal coding (STC) in imag... [more] IT2020-125 ISEC2020-55 WBS2020-44
pp.86-91
WBS, IT, ISEC 2021-03-04
13:20
Online Online [Poster Presentation] Performance evaluation of ACO-OFDM method with dither signal for PAPR reduction
Daiki Harada, Kouji Ohuchi (Shizuoka Univ.) IT2020-126 ISEC2020-56 WBS2020-45
In radio communication, there is a scheme that can reduce the peak power of
the OFDM (Orthogonal Frequency Division Mul... [more]
IT2020-126 ISEC2020-56 WBS2020-45
pp.92-97
WBS, IT, ISEC 2021-03-04
13:20
Online Online [Poster Presentation] Recovery of Partially Missing OFDM Signal in Time-Domain
Chengbo Liu, Na Chen, Minoru Okada (NAIST) IT2020-127 ISEC2020-57 WBS2020-46
Orthogonal Frequency Division Multiplexing (OFDM) suffers from the partial time-domain loss which is caused by obstacles... [more] IT2020-127 ISEC2020-57 WBS2020-46
pp.98-103
WBS, IT, ISEC 2021-03-04
13:20
Online Online [Poster Presentation] Performance Evaluation of Secure Communication based on OFDM and DFT-Precoded OFDM over Fading Channel
Airi Kaneko, Hideki Ochiai, Junji Shikata (YNU) IT2020-128 ISEC2020-58 WBS2020-47
We analyze the performance of a secure communication technique using OFDM and DFT-precoded OFDM signaling. Our approach ... [more] IT2020-128 ISEC2020-58 WBS2020-47
pp.104-109
WBS, IT, ISEC 2021-03-04
13:20
Online Online [Poster Presentation] Performance Enhancement of Rolling Shutter Based Visible Light Communication by Selective Reception Using Dual Camera
Sora Ibaraki, Takumi Toguma, Shun Yamaguchi, Masayuki Kinoshita, Koji Kamakura (Chiba Inst. of Tech.), Takaya Yamazato (Nagoya Univ.) IT2020-129 ISEC2020-59 WBS2020-48
This paper focuses on a visible light communication (VLC) using dual rolling shutter (RS) cameras.
In VLC using a RS ca... [more]
IT2020-129 ISEC2020-59 WBS2020-48
pp.110-114
WBS, IT, ISEC 2021-03-04
13:20
Online Online [Poster Presentation] Non-asymptotic converse theorem on the overflow probability of variable-to-fixed length codes
Shota Saito, Toshiyasu Matsushima (Waseda Univ.) IT2020-130 ISEC2020-60 WBS2020-49
This study considers variable-to-fixed length codes and investigates the non-asymptotic converse theorem on the threshol... [more] IT2020-130 ISEC2020-60 WBS2020-49
pp.115-116
WBS, IT, ISEC 2021-03-04
14:55
Online Online An Optimal Construction of the Basis Matrices of a Visual Cryptography Scheme for Multiple Secret Images Allowing the Rotation of Shares
Kyohei Sekine, Hiroki Koga (Tsukuba Univ.) IT2020-131 ISEC2020-61 WBS2020-50
 [more] IT2020-131 ISEC2020-61 WBS2020-50
pp.117-122
 Results 1 - 20 of 46  /  [Next]  
Choose a download format for default settings. [NEW !!]
Text format pLaTeX format CSV format BibTeX format
Copyright and reproduction : All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan