IEICE Technical Committee Submission System
Conference Schedule
Online Proceedings
[Sign in]
Tech. Rep. Archives
    [Japanese] / [English] 
( Committee/Place/Topics  ) --Press->
 
( Paper Keywords:  /  Column:Title Auth. Affi. Abst. Keyword ) --Press->

All Technical Committee Conferences  (Searched in: All Years)

Search Results: Conference Papers
 Conference Papers (Available on Advance Programs)  (Sort by: Date Descending)
 Results 1 - 17 of 17  /   
Committee Date Time Place Paper Title / Authors Abstract Paper #
RCC, ISEC, IT, WBS 2024-03-13
09:40
Osaka Osaka Univ. (Suita Campus) An improvement method and security evaluation for the method of protecting ownership using digital watermark
Dung Ta Anh, Hidema Tanaka (NDA) IT2023-76 ISEC2023-75 WBS2023-64 RCC2023-58
Since developing high-performance AI models requires significant time and cost, it is common to customize publicly avail... [more] IT2023-76 ISEC2023-75 WBS2023-64 RCC2023-58
pp.5-11
LOIS, SITE, ISEC 2023-11-10
12:10
Hiroshima Satellite Campus Hiroshima
(Primary: On-site, Secondary: Online)
Zero-Knowledge Proofs for ownership of Deep Neural Network
Shungo Sato, Hidema Tanaka (NDA) ISEC2023-67 SITE2023-61 LOIS2023-25
Because AI technologies have rapidly spread and developed in our society, Neural Networks, which are one of Machine Lear... [more] ISEC2023-67 SITE2023-61 LOIS2023-25
pp.86-92
LOIS, ISEC, SITE 2020-11-06
10:55
Online Online Information theoretical evaluation for visual secret sharing
Le Thanh Thai Binh, Hidema Tanaka (NDA) ISEC2020-33 SITE2020-30 LOIS2020-13
 [more] ISEC2020-33 SITE2020-30 LOIS2020-13
pp.7-12
ISEC 2016-05-19
10:25
Tokyo Kikai-Shinko-Kaikan Bldg. IDS using Discrete Fourier Transform with window functions
Yusuke Tsuge, Keisuke Iwai, Hidema Tanaka, Takakazu Kurokawa (NDA) ISEC2016-2
An Intrusion Detection System (IDS) is countermeasure against network attack. There are mainly two types of detections; ... [more] ISEC2016-2
pp.5-11
IT, ISEC, WBS 2016-03-10
13:40
Tokyo The University of Electro-Communications Collision-Free Rainbow Table Structure
Yuki Tabata, Keisuke Iwai, Hidema Tanaka, Takakazu Kurokawa (NDA) IT2015-114 ISEC2015-73 WBS2015-97
Rainbow table is a method to crack the password in high speed from hash values. Collision of password candidates occurs,... [more] IT2015-114 ISEC2015-73 WBS2015-97
pp.81-88
ISEC 2015-12-18
13:55
Tokyo Kikai-Shinko-Kaikan Bldg. Evaluation of authenticated encryptions implemented on FPGA with high-level synthesis
Makoto Kotegawa, Keisuke Iwai, Hidema Tanaka, Takakazu Kurokawa (NDA) ISEC2015-55
Competition for Authenticated Encryption Security, Applicability, and Robustness (CAESAR) which is a development and eva... [more] ISEC2015-55
pp.9-16
ISEC 2015-09-04
10:55
Tokyo Kikai-Shinko-Kaikan Bldg. Improvement of RainbowCrack Reduction Function
Yuki Tabata, Keisuke Iwai, Hidema Tanaka, Takakazu Kurokawa (NDA) ISEC2015-26
Rainbow table is a method to crack the password in high speed from hash values. Rainbow table can crack passwords only i... [more] ISEC2015-26
pp.9-14
ISEC 2015-09-04
11:20
Tokyo Kikai-Shinko-Kaikan Bldg. High speed implementation of Hash function on GPU
Nguyen Dat Thuong, Keisuke Iwai, Hidema Tanaka, Takakazu Kurokawa (NDA) ISEC2015-27
In order to protect the personal information and high confidential information, encryption technology and hash function ... [more] ISEC2015-27
pp.15-19
IA, ICSS 2015-06-11
14:35
Fukuoka Kyushu Institute of Technology Univ. An Efficient Rainbow Table Compression
Yuki Tabata, Keisuke Iwai, Hidema Tanaka, Takakazu Kurokawa (NDA) IA2015-3 ICSS2015-3
Rainbow table is a method to crack the password in high speed from hash values. Rainbow table can crack passwords only i... [more] IA2015-3 ICSS2015-3
pp.9-14
ISEC 2014-09-05
15:35
Tokyo Kikai-Shinko-Kaikan Bldg. GPU implementation of Ciphers using Schematic to Program Translator(SPT)
Masashi Watanabe, Keisuke Iwai, Hidema Tanaka, Takakazu Kurokawa (NDA) ISEC2014-52
With the spread of heterogeneous computing, accelerators such as GPU are widely used. However, it is not easy to develop... [more] ISEC2014-52
pp.35-42
CPSY, DC
(Joint)
2014-07-29
17:50
Niigata Toki Messe, Niigata Development of Cipher implementation tool using GUI
Masashi Watanabe, Keisuke Iwai, Hidema Tanaka, Takakazu Kurokawa (NDA) CPSY2014-31
With the spread of heterogeneous computing, accelerators such as GPU are widely used. However, it
is not easy to write ... [more]
CPSY2014-31
pp.125-129
ISEC 2014-05-09
14:40
Tokyo Kikai-Shinko-Kaikan Bldg. A Study of IDS using Discrete Fourier Transform
Enkhbold Chimedtseren, Keisuke Iwai, Hidema Tanaka, Takakazu Kurokawa (NDA) ISEC2014-4
Intrusion Detection System (IDS) detects an attack with an identifying pattern file which is known as called a signature... [more] ISEC2014-4
pp.21-27
ISEC 2013-05-23
13:45
Tokyo Kikai-Shinko-Kaikan Bldg. Information theoretical analysis of side-channel attack (2)
Hiroaki Mizuno, Keisuke Iwai, Hidema Tanaka, Takakazu Kurokawa (National Defense Academy) ISEC2013-3
In the evaluation of side-channel resistance, it is argued how many observation of physical phenomena which is caused by... [more] ISEC2013-3
pp.15-22
SANE, SAT
(Joint)
2011-02-25
15:30
Hyogo NICT Kobe Research Laboratories Study on high speed mobile laser communications and secure global quantum key distribution technology
Morio Toyoshima, Takashi Sasaki, Hideki Takenaka, Yoshihisa Takayama, Mikio Fujiwara, Masahiro Takeoka, Masahide Sasaki, Zhen Wang, Shigehito Miki, Taro Yamashita, Hidema Tanaka, Atsushi Waseda, Seiho Uratsuka, Toshihiko Umehara, Jyunpei Uemoto (NICT) SANE2010-167
National Institute of Information and Communications Technology (NICT) successfully developed the quantum entanglement s... [more] SANE2010-167
pp.49-51
IT, ISEC, WBS 2007-03-16
13:00
Gunma Gunma Univ. (Kiryu Campus) Linearization method and linear complexity
Hidema Tanaka (NICT)
 [more] IT2006-101 ISEC2006-156 WBS2006-98
pp.93-98
ISEC 2005-12-16
14:15
Tokyo Kikai-Shinko-Kaikan Bldg. Anonymous Password-Based Authenticated Key Exchange
Duong Viet Quang, Akihiro Yamamura, Hidema Tanaka (NICT)
We propose and discuss an {\it anonymous password-based authenticated key exchange scheme} that allows a user in a group... [more] ISEC2005-116
pp.35-42
ISEC, LOIS 2005-11-14
16:35
Fukuoka Kitakyushu Science and Research Park A study of the reconstruction of display image on a PC's monitor by unintiontional electromagnetic emanation -- Emanated electromagnetic signal measurement method and reconstructed display image using measured signal emanation --
Hidenori Sekiguchi, Hidema Tanaka, Shinji Seto, Akihiro Yamamura (NICT)
 [more] ISEC2005-97 OIS2005-60
pp.53-58
 Results 1 - 17 of 17  /   
Choose a download format for default settings. [NEW !!]
Text format pLaTeX format CSV format BibTeX format
Copyright and reproduction : All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan