|
|
All Technical Committee Conferences (Searched in: All Years)
|
|
Search Results: Conference Papers |
Conference Papers (Available on Advance Programs) (Sort by: Date Descending) |
|
Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
IT, ISEC, WBS |
2019-03-07 14:30 |
Tokyo |
University of Electro-Communications |
A Study on the System of Detecting Falsification for Conference Records Using Echo Spread Method and Octave Similarity Shoya Ogaki (Univ. Kitakyushu), Shunsuke Araki (Kyutech), Takeru Miyazaki, Satoshi Uehara (Univ. Kitakyushu), Yasuyuki Nogami (Okayama Univ.) IT2018-84 ISEC2018-90 WBS2018-85 |
In this paper, we propose strengthen the robustness against tampering of audio data for conference recording using audio... [more] |
IT2018-84 ISEC2018-90 WBS2018-85 pp.57-64 |
IT |
2015-09-04 10:50 |
Ishikawa |
Hakusan Shobutei |
A Consideration on Trace Sequence over Finite Field Yasuyuki Nogami, Hiroto Ino (Okayama Univ.), Kazuyoshi Tsuchiya (Koden), Satoshi Uehara (Kitakyu Univ.), Robert H, Morelos Zaragoza (SJSU) IT2015-38 |
The authors have proposed a class of pseudo multi-value sequences generated by trace and power residue over nite eld. ... [more] |
IT2015-38 pp.25-29 |
ISEC, IT, WBS |
2015-03-02 16:00 |
Fukuoka |
The University of Kitakyushu |
A Relation between Autocorrelations of Sequences Generated by the Logistic Map over Prime Fields and Loops whose Periods are Almost Same as Precisions Takeru Miyazaki (The Univ. of Kitakyushu), Shunsuke Araki (Kyushu Inst. of Tech.), Satoshi Uehara (The Univ. of Kitakyushu), Yasuyuki Nogami (Okayama Univ.) IT2014-77 ISEC2014-90 WBS2014-69 |
Logistic map over prime fields is one of maps to calculate iteratively by using computers. Though a sequence generated b... [more] |
IT2014-77 ISEC2014-90 WBS2014-69 pp.97-102 |
IT |
2013-05-24 10:25 |
Fukui |
Hotel Matuya Sensen at Awara-onsen, Fukui Pref. |
A Binary Sequence Generated by Legendre Symbol and Primitive Polynomial over Odd Characteristic Yasuyuki Nogami (Okayama Univ.), Satoshi Uehara (Univ. of Kitakyushu), Kazuki Tada (Okayama Univ.) IT2013-2 |
[more] |
IT2013-2 pp.5-8 |
ISEC |
2012-05-18 14:15 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
An Approach for Constructing Primitive Polynomials of Degree 2^i over Odd Characteristic Prime Field Yasuyuki Nogami, Yusuke Takai (Okayama Univ.), Shigeki Kobayashi (Nagano National College of Technology), Tatsuo Sugimura (Shinsyu Univ.), Satoshi Uehara (Kitakyushu City Univ.) ISEC2012-4 |
This paper considers an approach to obtain primitive polynomials over odd characteristic field $\mathbb{F}_{p}$ for whic... [more] |
ISEC2012-4 pp.19-24 |
IT |
2011-07-22 10:20 |
Okayama |
Okayama University |
Paring-Friendly Curve over Extension Field of Degree r where r is The Group Order Yuki Mori, Taichi Sumo, Yasuyuki Nogami (Okayama Univ.), Tomoko K. Matsushima (Polytechnic Univ.), Satoshi Uehara (Kitakyusyu City Univ.) IT2011-18 |
This paper considers the torsion group structure
when the extension degree of the definition field of
the non-supersin... [more] |
IT2011-18 pp.47-52 |
ISEC |
2010-12-15 13:00 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
Higher Degree Traces for Rational Point Groups of Non Symmetric Ordinary Pairings Yasuyuki Nogami, Shoichi Takeuchi (Okayama Univ.), Tomoko K. Matsushima (Polytechnic Univ.), Satoshi Uehara (Univ. of Kitakyushu), Yoshitaka Morikawa (Okayama Univ.) ISEC2010-65 |
Recently, pairing--based cryptographies have received attentions. A part of its security is based on elliptic curve disc... [more] |
ISEC2010-65 pp.1-8 |
ISEC |
2009-12-16 15:45 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
A Construction Method of Basis Conversion Matrix by Using Small Multiplicative Group for Cryptographic Applications Hidehiro Kato, Yasuyuki Nogami (Okayama Univ.), Satoshi Uehara (The Univ. of Kitakyushu), Yoshitaka Morikawa (Okayama Univ.) ISEC2009-77 |
Several methods for finding a basis conversion matrix between two different bases in extension field F_{p^m}... [more] |
ISEC2009-77 pp.43-50 |
ISEC, LOIS |
2005-11-15 11:35 |
Fukuoka |
Kitakyushu Science and Research Park |
Some Results of Brute Force Attack for a Random Seed and Security Evaluation of Pseudo Random Number Generator using Logistic-Mapping Takeru Miyazaki (The Univ. of Kitakyushu), Shunsuke Araki (Kyushu Inst. of Tech.), Satoshi Uehara (The Univ. of Kitakyushu), Kyoki Imamura (Kyushu Inst. of Tech.) |
Security of Pseudo Random Number Generators(PRNGs), which means no one except valid user can
specify unknown outputs fr... [more] |
ISEC2005-103 OIS2005-66 pp.29-33 |
|
|
|
Copyright and reproduction :
All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)
|
[Return to Top Page]
[Return to IEICE Web Page]
|