Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
WBS, IT, ISEC |
2021-03-04 09:25 |
Online |
Online |
List-Pruning SCL Decoder for Polar Codes Using Parity-Check Bits Yusuke Oki, Ryo Shibata, Hiroyuki Yashima (TUS) IT2020-112 ISEC2020-42 WBS2020-31 |
In this paper, we propose encoding and decoding algorithms of polar codes which add pruning bits into the transmitted in... [more] |
IT2020-112 ISEC2020-42 WBS2020-31 pp.1-6 |
WBS, IT, ISEC |
2021-03-04 09:50 |
Online |
Online |
Variable spreading factor codes for optical code-division multiple access Kyohei Ono, Shoichiro Yamasaki, Tomoko K. Matsushima (Polytechnic Univ.) IT2020-113 ISEC2020-43 WBS2020-32 |
In this study, we propose variable spreading factor codes based on generalized modified prime sequence codes (GMPSCs), w... [more] |
IT2020-113 ISEC2020-43 WBS2020-32 pp.7-12 |
WBS, IT, ISEC |
2021-03-04 10:15 |
Online |
Online |
Error Performances of Synchronous Optical Code-Division Multiple Access Schemes Using Chip-Pair Codes Tomoko K. Matsushima, Shoichiro Yamasaki, Kyohei Ono (Polytechnic Univ.) IT2020-114 ISEC2020-44 WBS2020-33 |
This paper investigates the bit error rate performance of synchronous optical code-division multiple access (CDMA) using... [more] |
IT2020-114 ISEC2020-44 WBS2020-33 pp.13-18 |
WBS, IT, ISEC |
2021-03-04 10:55 |
Online |
Online |
An Efficient Bayes Coding Algorithm for the Source Based on Context Tree Models that Vary from Section to Section Koshi Shimada, Shota Saito, Toshiyasu Matsushima (Waseda Univ.) IT2020-115 ISEC2020-45 WBS2020-34 |
In this paper, we present an efficient coding algorithm for a non-stationary source based on context tree models that ve... [more] |
IT2020-115 ISEC2020-45 WBS2020-34 pp.19-24 |
WBS, IT, ISEC |
2021-03-04 11:20 |
Online |
Online |
A note on sufficient condition for reconstructable substring of CSE method Shungo Tanaka, Hiroshi Kamabe, Shan Lu (Gifu Univ.) IT2020-116 ISEC2020-46 WBS2020-35 |
Various data compression methods have been proposed, which can be roughly classified into two cat-egories: lossless comp... [more] |
IT2020-116 ISEC2020-46 WBS2020-35 pp.25-30 |
WBS, IT, ISEC |
2021-03-04 11:45 |
Online |
Online |
Streaming Data Compression and Decompression by One-Way Quantum Finite-State Automata, Leading to Quantum Finite-State Deep and Shallow Information (Preliminary Report) Tomoyuki Yamakami (U of Fukui) IT2020-117 ISEC2020-47 WBS2020-36 |
The logical depth of a piece of data has served as a complexity measure to
describe the amount of “useful” and "non-ran... [more] |
IT2020-117 ISEC2020-47 WBS2020-36 pp.31-36 |
WBS, IT, ISEC |
2021-03-04 09:25 |
Online |
Online |
Four-Block Type-2 Feistel Cipher from Tweakable Block Ciphers Kazuki Nakaya, Tetsu Iwata (Nagoya Univ.) IT2020-118 ISEC2020-48 WBS2020-37 |
A secure block cipher can be obtained from tweakable block ciphers (TBCs). In this paper, by using a TBC with $n$-bit bl... [more] |
IT2020-118 ISEC2020-48 WBS2020-37 pp.37-44 |
WBS, IT, ISEC |
2021-03-04 09:50 |
Online |
Online |
Integral Attack with Bit-Based Division Property against lightweight block cipher MANTRA Hiroki Komatsu, Yasutaka Igarashi, Toshinobu Kaneko (TUS) IT2020-119 ISEC2020-49 WBS2020-38 |
MANTRA is a block cipher with a Feistel structure proposed by Gaurav Bansod, Narayan Pisharoty, and Abhijit Patil in 201... [more] |
IT2020-119 ISEC2020-49 WBS2020-38 pp.45-51 |
WBS, IT, ISEC |
2021-03-04 10:15 |
Online |
Online |
Analysis of a new linear bias in the input/output difference of Salsa20 Ryo Watanabe, Atsuko Miyaji (Osaka Univ.) IT2020-120 ISEC2020-50 WBS2020-39 |
Among cryptographic techniques, Salsa20, a stream cipher, is the predecessor of ChaCha20,
which was selected for TLS 1... [more] |
IT2020-120 ISEC2020-50 WBS2020-39 pp.52-57 |
WBS, IT, ISEC |
2021-03-04 10:55 |
Online |
Online |
Solving Shortest Vector Problem using annealing computation
-- How to generate a hamiltonian using pseudo multispin flip method -- Junpei Yamaguchi (Fujitsu Llaboratories), Takuya Ohwa (Kyushu Institute of Technology), Kazuyoshi Furukawa (Fujitsu Llaboratories) IT2020-121 ISEC2020-51 WBS2020-40 |
Lattice-based cryptography is mainly based on the security of the Shortest Vector Problem (SVP) and considered to be a p... [more] |
IT2020-121 ISEC2020-51 WBS2020-40 pp.58-65 |
WBS, IT, ISEC |
2021-03-04 11:20 |
Online |
Online |
An Attack on Search Ring-LWE Problem for Even Relative Degree Yasuhisa Okumura, Shinya Okumura, Atsuko Miyaji (Osaka Univ) IT2020-122 ISEC2020-52 WBS2020-41 |
The Ring-LWE problem is used to construct homomorphic encryption and has attracted much attention because of its quantum... [more] |
IT2020-122 ISEC2020-52 WBS2020-41 pp.66-72 |
WBS, IT, ISEC |
2021-03-04 11:45 |
Online |
Online |
Security analysis for the isogeny-based cryptography CSIDH Hayato Arai, Atsuko Miyaji, Kenta Kodera (Osaka Univ.) IT2020-123 ISEC2020-53 WBS2020-42 |
CSIDH (Commutative Supersingular Isogeny Diffie Hellman) is a kind of post-quantum cryptography that uses isogenies to e... [more] |
IT2020-123 ISEC2020-53 WBS2020-42 pp.73-80 |
WBS, IT, ISEC |
2021-03-04 12:10 |
Online |
Online |
Efficient parallel computing method of isogeny based cryptography Ryota Udani, Koutarou Suzuki (TUT) IT2020-124 ISEC2020-54 WBS2020-43 |
Jao et al. proposed SIDH, a key exchange protocol based on isogeny between supersingular elliptic curves. It is expected... [more] |
IT2020-124 ISEC2020-54 WBS2020-43 pp.81-85 |
WBS, IT, ISEC |
2021-03-04 13:20 |
Online |
Online |
[Poster Presentation]
Experimental Evaluation for Alamouti-type Spatio-temporal Coding in Image Sensor Communication Using a Rotary LED Transmitter Zhengqiang Tang, Shintaro Arai (Okayama Univ. of Sci.), Takaya Yamazato (Nagoya Univ.) IT2020-125 ISEC2020-55 WBS2020-44 |
This study provides the experimental evaluations for afterimage-based Alamouti-type Spatio-temporal coding (STC) in imag... [more] |
IT2020-125 ISEC2020-55 WBS2020-44 pp.86-91 |
WBS, IT, ISEC |
2021-03-04 13:20 |
Online |
Online |
[Poster Presentation]
Performance evaluation of ACO-OFDM method with dither signal for PAPR reduction Daiki Harada, Kouji Ohuchi (Shizuoka Univ.) IT2020-126 ISEC2020-56 WBS2020-45 |
In radio communication, there is a scheme that can reduce the peak power of
the OFDM (Orthogonal Frequency Division Mul... [more] |
IT2020-126 ISEC2020-56 WBS2020-45 pp.92-97 |
WBS, IT, ISEC |
2021-03-04 13:20 |
Online |
Online |
[Poster Presentation]
Recovery of Partially Missing OFDM Signal in Time-Domain Chengbo Liu, Na Chen, Minoru Okada (NAIST) IT2020-127 ISEC2020-57 WBS2020-46 |
Orthogonal Frequency Division Multiplexing (OFDM) suffers from the partial time-domain loss which is caused by obstacles... [more] |
IT2020-127 ISEC2020-57 WBS2020-46 pp.98-103 |
WBS, IT, ISEC |
2021-03-04 13:20 |
Online |
Online |
[Poster Presentation]
Performance Evaluation of Secure Communication based on OFDM and DFT-Precoded OFDM over Fading Channel Airi Kaneko, Hideki Ochiai, Junji Shikata (YNU) IT2020-128 ISEC2020-58 WBS2020-47 |
We analyze the performance of a secure communication technique using OFDM and DFT-precoded OFDM signaling. Our approach ... [more] |
IT2020-128 ISEC2020-58 WBS2020-47 pp.104-109 |
WBS, IT, ISEC |
2021-03-04 13:20 |
Online |
Online |
[Poster Presentation]
Performance Enhancement of Rolling Shutter Based Visible Light Communication by Selective Reception Using Dual Camera Sora Ibaraki, Takumi Toguma, Shun Yamaguchi, Masayuki Kinoshita, Koji Kamakura (Chiba Inst. of Tech.), Takaya Yamazato (Nagoya Univ.) IT2020-129 ISEC2020-59 WBS2020-48 |
This paper focuses on a visible light communication (VLC) using dual rolling shutter (RS) cameras.
In VLC using a RS ca... [more] |
IT2020-129 ISEC2020-59 WBS2020-48 pp.110-114 |
WBS, IT, ISEC |
2021-03-04 13:20 |
Online |
Online |
[Poster Presentation]
Non-asymptotic converse theorem on the overflow probability of variable-to-fixed length codes Shota Saito, Toshiyasu Matsushima (Waseda Univ.) IT2020-130 ISEC2020-60 WBS2020-49 |
This study considers variable-to-fixed length codes and investigates the non-asymptotic converse theorem on the threshol... [more] |
IT2020-130 ISEC2020-60 WBS2020-49 pp.115-116 |
WBS, IT, ISEC |
2021-03-04 14:55 |
Online |
Online |
An Optimal Construction of the Basis Matrices of a Visual Cryptography Scheme for Multiple Secret Images Allowing the Rotation of Shares Kyohei Sekine, Hiroki Koga (Tsukuba Univ.) IT2020-131 ISEC2020-61 WBS2020-50 |
[more] |
IT2020-131 ISEC2020-61 WBS2020-50 pp.117-122 |