Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
ISEC, IT, WBS |
2011-03-04 10:50 |
Osaka |
Osaka University |
Rate-Splitting for Multiple Receiver Channels Hideki Yagi (Univ. of Electro-Comm.), H. Vincent Poor (Princeton Univ.) IT2010-108 ISEC2010-112 WBS2010-87 |
Generalized time-sharing schemes, in which rate-splitting and successive decoding are used, have been developed for memo... [more] |
IT2010-108 ISEC2010-112 WBS2010-87 pp.263-269 |
ISEC, IT, WBS |
2011-03-04 11:15 |
Osaka |
Osaka University |
Performance evaluation of MC-CDMA system which permits time and frequency offsets Tatsuma Kuwazaki, Tohru Kohda, Yutaka Jitsumatsu (Kyushu Univ.) IT2010-109 ISEC2010-113 WBS2010-88 |
In code division multiple access (CDMA) systems, spreading code is introduced as the third axis in addition
to the time... [more] |
IT2010-109 ISEC2010-113 WBS2010-88 pp.271-276 |
ISEC, IT, WBS |
2011-03-04 11:40 |
Osaka |
Osaka University |
Performance Evaluation of Non-binary LDPC Code with APSK Modulation Keiya Ishikawa, Hideki Ochiai (Yokohama National Univ.) IT2010-110 ISEC2010-114 WBS2010-89 |
Non-binary LDPC codes are known to perform better than binary LDPC codes. On the other hand, the use of higher-order mod... [more] |
IT2010-110 ISEC2010-114 WBS2010-89 pp.277-282 |
ISEC, IT, WBS |
2011-03-04 13:25 |
Osaka |
Osaka University |
Secure Multiplex Coding with a Common Message Ryutaroh Matsumoto (Tokyo Inst. of Tech.), Masahito Hayashi (Tohoku Univ./NUS) IT2010-111 ISEC2010-115 WBS2010-90 |
We determine the capacity region of the secure multiplex coding
with a common message, improve the exponent of mutual i... [more] |
IT2010-111 ISEC2010-115 WBS2010-90 pp.283-287 |
ISEC, IT, WBS |
2011-03-04 13:50 |
Osaka |
Osaka University |
A consideration on unconditionally secure key distribution schemes considering leakage of secret information of key distribution centers Takahiro Yoshida, Hajime Jinushi (Aoyama Gakuin Univ.), Toshiyasu Matsushima (Waseda Univ.) IT2010-112 ISEC2010-116 WBS2010-91 |
A key distribution scheme (KDS) is a method of distributing secret keys in the network. In the conventional KDS, the sec... [more] |
IT2010-112 ISEC2010-116 WBS2010-91 pp.289-294 |
ISEC, IT, WBS |
2011-03-04 14:15 |
Osaka |
Osaka University |
Dual universality of hash functions and its applications to quantum cryptography Toyohiro Tsurumaru (Mitsubishi Electric Corp.), Masahito Hayashi (Tohoku Univ./ NUS) IT2010-113 ISEC2010-117 WBS2010-92 |
[more] |
IT2010-113 ISEC2010-117 WBS2010-92 pp.295-302 |
ISEC, IT, WBS |
2011-03-04 14:55 |
Osaka |
Osaka University |
On an extended version of Rashmi-Shah-Kumar regenerating codes and secret sharing for distributed storage Masazumi Kurihara (Univ. of Electro-Comm), Hidenori Kuwakado (Kobe Univ.) IT2010-114 ISEC2010-118 WBS2010-93 |
In this paper, an extended version of Rashmi-Shah-Kumar Minimum Storage Regenerating(MSR) codes is proposed. In Rashmi-S... [more] |
IT2010-114 ISEC2010-118 WBS2010-93 pp.303-310 |
ISEC, IT, WBS |
2011-03-04 15:20 |
Osaka |
Osaka University |
A (3,3)-Threshold Scheme Secure against Ordinary and Extended Impersonation Attacks Kazuya Koyano, Hiroki Koga (Tsukuba Univ.) IT2010-115 ISEC2010-119 WBS2010-94 |
[more] |
IT2010-115 ISEC2010-119 WBS2010-94 pp.311-318 |
ISEC, IT, WBS |
2011-03-04 15:45 |
Osaka |
Osaka University |
Identifiability of Malicious Users of the Digital Fingerprinting Code Based on a Finite Projective Plane Yusuke Fujii, Hiroki Koga (Tsukuba Univ.) IT2010-116 ISEC2010-120 WBS2010-95 |
[more] |
IT2010-116 ISEC2010-120 WBS2010-95 pp.319-326 |
ISEC, IT, WBS |
2011-03-04 09:00 |
Osaka |
Osaka University |
Efficient Privacy Amplification Algorithms for Quantum Key Distribution Takeshi Asai, Toyohiro Tsurumaru (Mitsubishi Electric Corporation) IT2010-117 ISEC2010-121 WBS2010-96 |
[more] |
IT2010-117 ISEC2010-121 WBS2010-96 pp.327-332 |
ISEC, IT, WBS |
2011-03-04 09:25 |
Osaka |
Osaka University |
New Differential Fault Analysis on Trivium Based on Setup-Time Violations Qi Li, Shigeto Gomisawa, Mitsugu Iwamoto, Kazuo Ohta, Kazuo Sakiyama (Univ. of Electro-Comm) IT2010-118 ISEC2010-122 WBS2010-97 |
This paper presents new differential fault analysis (DFA) on a stream cipher Trivium based on setup–time violation... [more] |
IT2010-118 ISEC2010-122 WBS2010-97 pp.333-339 |
ISEC, IT, WBS |
2011-03-04 09:50 |
Osaka |
Osaka University |
Higher Order Differential Attack on HyRAL Naoki Shibayama, Yasutaka Igarashi, Toshinobu Kaneko, Seiichiro Hangai (Tokyo Univ. of Science) IT2010-119 ISEC2010-123 WBS2010-98 |
In this paper, we focuse on the higher order differential attack on block cipher HyRAL that was proposed by Hirata in 20... [more] |
IT2010-119 ISEC2010-123 WBS2010-98 pp.341-347 |
ISEC, IT, WBS |
2011-03-04 10:25 |
Osaka |
Osaka University |
A New Class of Secret Sharing Schemes, KSS(I), and Its Application to Biometrics Masao Kasahara (O.G.U) IT2010-120 ISEC2010-124 WBS2010-99 |
In this paper, we present a new secret sharing scheme, referred to as KSS(I) on the basis of systematic Reed-Solomon cod... [more] |
IT2010-120 ISEC2010-124 WBS2010-99 pp.349-352 |
ISEC, IT, WBS |
2011-03-04 10:50 |
Osaka |
Osaka University |
A Method of Fingerprint Authentication Using KSS(I) Hiroki Satomura, Tetsushi Ohki, Naohisa Komatsu (Waseda Univ.), Masao Kasahara (Osaka Gakuin Univ.) IT2010-121 ISEC2010-125 WBS2010-100 |
We propose a method of fingerprint authentication using KSS(I). KSS(I)
requires to recover user's biometric sample corr... [more] |
IT2010-121 ISEC2010-125 WBS2010-100 pp.353-360 |
ISEC, IT, WBS |
2011-03-04 11:15 |
Osaka |
Osaka University |
Digital Watermark Method with Maximum Detection Amplitude Value of Complex Signature Impulse Toshinori Ueda, Toshiyuki Uto, Kenji Ohue (Ehime Univ.) IT2010-122 ISEC2010-126 WBS2010-101 |
This paper proposes a digital watermark method with maximum detection amplitude value of complex signature impulse.
Si... [more] |
IT2010-122 ISEC2010-126 WBS2010-101 pp.361-366 |
ISEC, IT, WBS |
2011-03-04 11:40 |
Osaka |
Osaka University |
Digital Watermark Method Using Extended Smear-Desmearing Transform and High-pass filter Masataka Ohno, Toshiyuki Uto, Kenji Ohue (Ehime Univ.) IT2010-123 ISEC2010-127 WBS2010-102 |
This paper proposes an digital watermark method using extended smear-desmearing transform and high-pass filter.In this m... [more] |
IT2010-123 ISEC2010-127 WBS2010-102 pp.367-372 |
ISEC, IT, WBS |
2011-03-04 13:25 |
Osaka |
Osaka University |
A Construction of New Class of Knapsack-Type Public Key Cryptosystem, K(III)ΣPKC Masao Kasahara (Osaka Gakuin Univ.) IT2010-124 ISEC2010-128 WBS2010-103 |
In this paper, we present a new class of knapsack type PKC referred to as K(?)ΣPKC. In a sharp contrast with the convent... [more] |
IT2010-124 ISEC2010-128 WBS2010-103 pp.373-376 |
ISEC, IT, WBS |
2011-03-04 13:50 |
Osaka |
Osaka University |
Public Key Cryptosystems Constructed Based on Pseudo Cyclic Codes, K(VIII)SE(1)PKC and K(XI)SE(2)PKC
-- Modification of K(VII)SE(1)PKC -- Masao Kasahara (Osaka Gakuin Univ.) IT2010-125 ISEC2010-129 WBS2010-104 |
In this paper, we present a new class of public-key cryptosystems, K(VIII)SE(1)PKC and K(XI)SE(2)PKC based on error-corr... [more] |
IT2010-125 ISEC2010-129 WBS2010-104 pp.377-382 |
ISEC, IT, WBS |
2011-03-04 14:15 |
Osaka |
Osaka University |
Proposal of Hidden Pair of Bijection Signature Scheme Masahito Gotaishi, Shigeo Tsujii (Chuo Univ.) IT2010-126 ISEC2010-130 WBS2010-105 |
[more] |
IT2010-126 ISEC2010-130 WBS2010-105 pp.383-388 |
ISEC, IT, WBS |
2011-03-04 14:55 |
Osaka |
Osaka University |
On the self-reducibility and the many-one-like reducibilities for multi-valued functions Ji-Won Huh, Shuji Isobe, Eisuke Koizumi, Hiroki Shizuya (Tohoku Univ.) IT2010-127 ISEC2010-131 WBS2010-106 |
In this paper, we investigate a relationship between the self-reducibility and the many-one-like reducibilities for mult... [more] |
IT2010-127 ISEC2010-131 WBS2010-106 pp.389-394 |