Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
IT, ISEC, WBS |
2013-03-07 15:05 |
Osaka |
Kwansei Gakuin Univ., Osaka-Umeda Campus |
Construction of New Classes of Product-sum Type Public Key Cryptosystem, K(IV)PKC, Constructed Based on Maximum Length Code Masao Kasahara (Waseda Univ.) IT2012-82 ISEC2012-100 WBS2012-68 |
[more] |
IT2012-82 ISEC2012-100 WBS2012-68 pp.131-138 |
IT, ISEC, WBS |
2013-03-07 15:30 |
Osaka |
Kwansei Gakuin Univ., Osaka-Umeda Campus |
A knapsack cryptosystem with a randomly signed key Akira Hayashi (Kanazawa Inst. of Tech.) IT2012-83 ISEC2012-101 WBS2012-69 |
The knapsack cryptosystem invented by Merkle and Hellman is broken with high probability by Shamir's attack. A novel cr... [more] |
IT2012-83 ISEC2012-101 WBS2012-69 pp.139-141 |
IT, ISEC, WBS |
2013-03-07 15:55 |
Osaka |
Kwansei Gakuin Univ., Osaka-Umeda Campus |
Notes on Efficient Computing over GF(2^16) using Graphics Processing Unit Satoshi Tanaka (Kyushu Univ./ISIT), Takanori Yasuda (ISIT), Kouichi Sakurai (Kyushu Univ./ISIT) IT2012-84 ISEC2012-102 WBS2012-70 |
Multivariate cryptography uses evaluating non-linear multivariate polynomial systems over finite ields for encrypting me... [more] |
IT2012-84 ISEC2012-102 WBS2012-70 pp.143-147 |
IT, ISEC, WBS |
2013-03-07 15:05 |
Osaka |
Kwansei Gakuin Univ., Osaka-Umeda Campus |
A Study on Sparse Channel Estimation in Single Carrier Communications Yuki Nishizawa, Teruyuki Miyajima (Ibaraki Univ.) IT2012-85 ISEC2012-103 WBS2012-71 |
It has been reported that when channel estimation performance is unsatisfactory when conventional estimation methods are... [more] |
IT2012-85 ISEC2012-103 WBS2012-71 pp.149-154 |
IT, ISEC, WBS |
2013-03-07 15:30 |
Osaka |
Kwansei Gakuin Univ., Osaka-Umeda Campus |
Performance Comparison of OFDMA and SC-FDMA with Clipping and Filtering Nguyen Huu Bao Trung, Hideki Ochiai (Yokohama National Univ.) IT2012-86 ISEC2012-104 WBS2012-72 |
Recently, orthogonal frequency-division multiple access (OFDMA) has been considered as a promis- ing candidate for next-... [more] |
IT2012-86 ISEC2012-104 WBS2012-72 pp.155-160 |
IT, ISEC, WBS |
2013-03-07 15:55 |
Osaka |
Kwansei Gakuin Univ., Osaka-Umeda Campus |
Performance Evaluation of Spatial Modulation OFDM with Frequency-Domain Precoding and Iterative Parallel Interference Canceller Shosuke Nakamura, Tadatomo Sato (Tokyo City Univ.) IT2012-87 ISEC2012-105 WBS2012-73 |
In this paper, we focus on spatial modulation OFDM (SM-OFDM) which attracts attention as a new technique to realize high... [more] |
IT2012-87 ISEC2012-105 WBS2012-73 pp.161-166 |
IT, ISEC, WBS |
2013-03-07 16:35 |
Osaka |
Kwansei Gakuin Univ., Osaka-Umeda Campus |
[Invited Talk]
Road of IT security standard
-- From cryptography to cloud and M2M security -- Kazuo Takaragi (AIST) IT2012-88 ISEC2012-106 WBS2012-74 |
In 1977, security standardization activities began with encryption algorithm, followed by development of a number of imp... [more] |
IT2012-88 ISEC2012-106 WBS2012-74 p.167 |
IT, ISEC, WBS |
2013-03-07 17:25 |
Osaka |
Kwansei Gakuin Univ., Osaka-Umeda Campus |
[Invited Talk]
Space-Time Coding Technologies for Fast Time-Varying Channels Hiroshi Kubo (Ritsumeikan Univ.) IT2012-89 ISEC2012-107 WBS2012-75 |
This paper discusses differential space-time coding for fast time-varying channels. Differential space-time coding, whic... [more] |
IT2012-89 ISEC2012-107 WBS2012-75 pp.169-174 |
IT, ISEC, WBS |
2013-03-08 10:55 |
Osaka |
Kwansei Gakuin Univ., Osaka-Umeda Campus |
A Note on Linear Complexity for Constant-Weight Codes Takayasu Kaida (Kinki Univ.), Junru Zheng (Kyushu Women's Univ.) IT2012-90 ISEC2012-108 WBS2012-76 |
For cyclic codes (periodic sequences) over finite set from cyclic difference set proposed by authors, the Hamming weight... [more] |
IT2012-90 ISEC2012-108 WBS2012-76 pp.175-179 |
IT, ISEC, WBS |
2013-03-08 11:20 |
Osaka |
Kwansei Gakuin Univ., Osaka-Umeda Campus |
Evaluations of Cheating-Detection Capability in the (k,n)-Threshold Scheme Based on the Majority Rule Noriaki Shimazaki, Hiroki Koga (Univ. of Tsukuba) IT2012-91 ISEC2012-109 WBS2012-77 |
The $(k,n)$-threshold scheme is a kind of secret sharing scheme.
In this scheme,a secret is encoded to $n$ shares and ... [more] |
IT2012-91 ISEC2012-109 WBS2012-77 pp.181-188 |
IT, ISEC, WBS |
2013-03-08 11:45 |
Osaka |
Kwansei Gakuin Univ., Osaka-Umeda Campus |
On fundamental defect of rate theory of quantum key distribution and quantum repeater Osamu Hirota (Tamagawa Univ.) IT2012-92 ISEC2012-110 WBS2012-78 |
It has been pointed out many times by several researchers that the security theory of quantum key distribution(QKD) orig... [more] |
IT2012-92 ISEC2012-110 WBS2012-78 pp.189-194 |
IT, ISEC, WBS |
2013-03-08 10:30 |
Osaka |
Kwansei Gakuin Univ., Osaka-Umeda Campus |
Laser Fault Injection Attack on Non-Decapped Contact Smart Card Hitoshi Ono, Yuu Tsuchiya, Tsuyoshi Toyama, Takeshi Kishikawa, Shohei Saito (Yokohama National Univ.), Akihiko Sasaki (MORITA TECH), Akashi Satoh (Univ. of Tokyo), Tsutomu Matsumoto (Yokohama National Univ.) IT2012-93 ISEC2012-111 WBS2012-79 |
[more] |
IT2012-93 ISEC2012-111 WBS2012-79 pp.195-202 |
IT, ISEC, WBS |
2013-03-08 10:55 |
Osaka |
Kwansei Gakuin Univ., Osaka-Umeda Campus |
Preventing Unauthorized CAN Transmission by Surveillance Mechanism Built in Electronic Control Unit Daiki Sekiguchi, Masato Tanabe, Masato Hata, Katsunari Yoshioka, Tsutomu Matsumoto (Yokohama National Univ.) IT2012-94 ISEC2012-112 WBS2012-80 |
(To be available after the conference date) [more] |
IT2012-94 ISEC2012-112 WBS2012-80 pp.203-210 |
IT, ISEC, WBS |
2013-03-08 11:20 |
Osaka |
Kwansei Gakuin Univ., Osaka-Umeda Campus |
Software Implementation Using Quadruple-Rail Representation Against Power Analysis Tomoyasu Suzaki, Akira Maekawa, Kazuhiko Minematsu, Toshihiko Okamura (NEC) IT2012-95 ISEC2012-113 WBS2012-81 |
Power analysis is an attack against a crypto device that extracts the secret key by using the relation between the power... [more] |
IT2012-95 ISEC2012-113 WBS2012-81 pp.211-216 |
IT, ISEC, WBS |
2013-03-08 11:45 |
Osaka |
Kwansei Gakuin Univ., Osaka-Umeda Campus |
Nano Artifact-metrics based on Resist Collapsing Tsutomu Matsumoto, Kenta Hanaki, Ryosuke Suzuki, Daiki Sekiguchi (Yokohama National Univ.), Morihisa Hoga, Yasuyuki Ohyagi (DNP), Makoto Naruse (NICT), Naoya Tate, Motoichi Ohtsu (Univ. of Tokyo) IT2012-96 ISEC2012-114 WBS2012-82 |
Artifact-metrics is an automated method of utilizing physical artifacts based on their measurable intrinsic characterist... [more] |
IT2012-96 ISEC2012-114 WBS2012-82 pp.217-222 |
IT, ISEC, WBS |
2013-03-08 10:30 |
Osaka |
Kwansei Gakuin Univ., Osaka-Umeda Campus |
On Methods for Introducing Quiet Period into Wireless LAN over TV White Space Masumi Yuki, Shigenobu Sasaki (Niigata Univ.) IT2012-97 ISEC2012-115 WBS2012-83 |
In this paper, performance of two different methods for introducing quiet period (QP) into wireless LAN (WLAN) are evalu... [more] |
IT2012-97 ISEC2012-115 WBS2012-83 pp.223-228 |
IT, ISEC, WBS |
2013-03-08 10:55 |
Osaka |
Kwansei Gakuin Univ., Osaka-Umeda Campus |
A study on accuracy of acquisition for DS/UWB packet radio transmission Takuya Inoko, Shigenobu Sasaki (Niigata Univ.) IT2012-98 ISEC2012-116 WBS2012-84 |
[more] |
IT2012-98 ISEC2012-116 WBS2012-84 pp.229-234 |
IT, ISEC, WBS |
2013-03-08 11:20 |
Osaka |
Kwansei Gakuin Univ., Osaka-Umeda Campus |
Theoretical analysis of tracking error on DLL with modified pseudo ternary M-sequence pair Masaya Yamagata, Hiromasa Habuchi (Ibaraki Univ.) IT2012-99 ISEC2012-117 WBS2012-85 |
In this paper, the proposed tracking method for bi-orthogonal modulation system is used for the internal synchronization... [more] |
IT2012-99 ISEC2012-117 WBS2012-85 pp.235-239 |
IT, ISEC, WBS |
2013-03-08 13:40 |
Osaka |
Kwansei Gakuin Univ., Osaka-Umeda Campus |
[Invited Talk]
Distributed Source Coding and its Application to Media Processing Takayuki Nakachi (NTT) IT2012-100 ISEC2012-118 WBS2012-86 |
Distributed Source Coding (DSC) concerns encoding of correlated information sources, without letting the sources communi... [more] |
IT2012-100 ISEC2012-118 WBS2012-86 pp.241-246 |
IT, ISEC, WBS |
2013-03-08 14:45 |
Osaka |
Kwansei Gakuin Univ., Osaka-Umeda Campus |
Word Prediction by PPM Algorithm in English and Thai Languages Soukalom Sosouphanh, Tomohiro Ogawa (Univ. of Electro- Comm.) IT2012-101 ISEC2012-119 WBS2012-87 |
It is possible to develop word prediction systems in English or Japanese
by using the Trie which is constructed based o... [more] |
IT2012-101 ISEC2012-119 WBS2012-87 pp.247-250 |