|
|
All Technical Committee Conferences (Searched in: All Years)
|
|
Search Results: Conference Papers |
Conference Papers (Available on Advance Programs) (Sort by: Date Descending) |
|
Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
PRMU |
2022-12-16 16:00 |
Toyama |
Toyama International Conference Center (Primary: On-site, Secondary: Online) |
Extraction of Feature Flow for Deforming Non-rigid Objects and Its Analysis Method Yuki Fukuda, Munetoshi Iwakiri, Takumi Fujiwara (NDA) PRMU2022-53 |
Most of the current methods for motion and action recognition acquire skeletal information by tracking feature points su... [more] |
PRMU2022-53 pp.110-115 |
ISEC, WBS, IT |
2017-03-09 13:35 |
Tokyo |
TOKAI University |
A consideration of Meet-in-the-middle Attack for Multiple Encryption Algorithm Yohei Maezawa, Munetoshi Iwakiri (NDA) IT2016-103 ISEC2016-93 WBS2016-79 |
It is known that the security strength can be lower than the total key length used for multiple encryption with meet-in-... [more] |
IT2016-103 ISEC2016-93 WBS2016-79 pp.25-31 |
MVE, IE, WIT, IMQ, CQ (Joint) [detail] |
2013-03-12 10:35 |
Fukuoka |
Fukuoka Institute of Technology |
The feature point correspondence method with 3D motion vectors of sequential point clouds Kazuma Uenishi, Munetoshi Iwakiri (NDA) IMQ2012-71 IE2012-175 MVE2012-132 WIT2012-81 |
Recently, research to model by integrating sequential point cloud is active.
The registration to integrate point cloud ... [more] |
IMQ2012-71 IE2012-175 MVE2012-132 WIT2012-81 pp.209-214 |
ISEC |
2010-05-21 13:50 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
A Study on Non Linear Function and cryptanalysis of K2 Takashi Ohshima, Munetoshi Iwakiri (NDA) ISEC2010-3 |
K2 is the LFSR type stream cipher which outputs 64 bits of key stream every cycle with 128 bits secret key, used for BRE... [more] |
ISEC2010-3 pp.11-15 |
WBS, IT, ISEC |
2009-03-10 11:15 |
Hokkaido |
Hakodate Mirai Univ. |
Bit Slice Cryptanalysis of Simplified K2 Stream Cipher Takashi Ohshima, Munetoshi Iwakiri (National Defense Academy) IT2008-83 ISEC2008-141 WBS2008-96 |
K2 is a stream cipher based on 32 bits LFSR, outputs 64 bits random number sequences with 128 bits secret key at every p... [more] |
IT2008-83 ISEC2008-141 WBS2008-96 pp.253-258 |
NLP |
2009-02-28 11:00 |
Kanagawa |
|
A Theoretical Consideration about Table Lookup Cryptanalysis Method and Its Countermeasure Kazuho Kakiwaki, Munetoshi Iwakiri (National Defense Academy) NLP2008-136 |
[more] |
NLP2008-136 pp.27-32 |
ISEC |
2007-12-19 10:45 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
An Integration Method of Incomplete Cryptographic System and Spread Spectrum Encoder Ta Minh Thanh, Munetoshi Iwakiri (NDA) ISEC2007-115 |
Digital contents can be copied without degradation, so that problems of illegal distribution of contents occur. Digital ... [more] |
ISEC2007-115 pp.19-24 |
ISEC |
2007-12-19 11:10 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
An Applied Method of AES algorithm to Incomplete Cryptographic System. Ta Minh Thanh, Munetoshi Iwakiri (NDA) ISEC2007-116 |
This report proposes a Digital Rights Management (DRM) technique with an applied method of AES algorithm to incomplete c... [more] |
ISEC2007-116 pp.25-31 |
|
|
|
Copyright and reproduction :
All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)
|
[Return to Top Page]
[Return to IEICE Web Page]
|