IEICE Technical Committee Submission System
Conference Schedule
Online Proceedings
[Sign in]
Tech. Rep. Archives
    [Japanese] / [English] 
( Committee/Place/Topics  ) --Press->
 
( Paper Keywords:  /  Column:Title Auth. Affi. Abst. Keyword ) --Press->

All Technical Committee Conferences  (Searched in: All Years)

Search Results: Conference Papers
 Conference Papers (Available on Advance Programs)  (Sort by: Date Descending)
 Results 1 - 20 of 30  /  [Next]  
Committee Date Time Place Paper Title / Authors Abstract Paper #
RCC, ISEC, IT, WBS 2024-03-13
- 2024-03-14
Osaka Osaka Univ. (Suita Campus) Reconstruction of Boyer quantum algorithm and its application to hash puzzles
Chris Idota, Yuichi Kaji (Nagoya Univ.) IT2023-132 ISEC2023-131 WBS2023-120 RCC2023-114
This study investigates the computational complexity of solving hash puzzles using quantum algorithms. A hash puzzle is ... [more] IT2023-132 ISEC2023-131 WBS2023-120 RCC2023-114
pp.358-365
LOIS, SITE, ISEC 2023-11-09
13:30
Hiroshima Satellite Campus Hiroshima
(Primary: On-site, Secondary: Online)
Optimum Median-Sum Fingerprinting for Winternitz One-Time Signature
Motonari Honda, Yuichi Kaji (NU) ISEC2023-57 SITE2023-51 LOIS2023-15
Winternitz one-time signature (OTS) plays a core role in practical quantum-secure hash-based digital signature schemes. ... [more] ISEC2023-57 SITE2023-51 LOIS2023-15
pp.18-25
WBS, IT, ISEC 2021-03-04
15:45
Online Online A Real-Time Bluetooth Protocol Fuzzing System
Bo Wang, Suzuki Ako (JVCKW), Yuichi Kaji (NU) IT2020-137 ISEC2020-67 WBS2020-56
In recent years, with the practical use and spread of Bluetooth IoT (Internet of Things) devices, there are concerns abo... [more] IT2020-137 ISEC2020-67 WBS2020-56
pp.152-159
ISEC 2019-05-17
14:55
Tokyo Kikai-Shinko-Kaikan Bldg. The amount of information leakage of decryption keys through timing attacks on RSA decryption system
Tomonori Hirata, Yuichi Kaji (Nagoya Univ.) ISEC2019-7
 [more] ISEC2019-7
pp.29-36
SITE, ISEC, LOIS 2018-11-04
15:40
Fukuoka   An improvement on Winternitz OTS with puncturing of signing keys
Yukichi Kashiwakura, Yuichi Kaji (Nagoya Univ.) ISEC2018-80 SITE2018-58 LOIS2018-40
A hash-based digital signature is a quantum-immune alternative of conventional digital signatures. This study improves a... [more] ISEC2018-80 SITE2018-58 LOIS2018-40
pp.95-102
EMM, ISEC, SITE, ICSS, IPSJ-CSEC, IPSJ-SPT [detail] 2016-07-15
10:20
Yamaguchi   Improvement of Winternitz one time signature and its security proof
Yoshio Yatani, Jason Paul Cruz, Yuichi Kaji (NAIST) ISEC2016-29 SITE2016-23 ICSS2016-29 EMM2016-37
 [more] ISEC2016-29 SITE2016-23 ICSS2016-29 EMM2016-37
pp.121-128
EMM, IT 2015-05-22
10:00
Kyoto Kyoto International Community House On the Computational Complexity of Information Flow Problem with Hierarchy Constraint
Yuki Takeda, Yuichi Kaji, Minoru Ito (NAIST) IT2015-11 EMM2015-11
An information flow problem discusses how to distribute information over a complicated network. It is known that the te... [more] IT2015-11 EMM2015-11
pp.57-62
IT 2014-07-17
15:50
Hyogo Kobe University A Flash Code Utilizing Dynamic Segment Allocation
Kazuki Kumagai, Yuichi Kaji (NAIST) IT2014-22
A novel flash code is proposed, and shown to have good average-case performance through computer simulation.
The propo... [more]
IT2014-22
pp.59-64
IT 2014-07-17
16:15
Hyogo Kobe University Bounds on the Entropy of Multinomial Distribution
Yuichi Kaji (NAIST) IT2014-23
The purpose of this study is to derive an upper-bound and a lower-bound of the entropy of a multinomial distribution. In... [more] IT2014-23
pp.65-70
ICSS, ISEC, SITE, EMM, IPSJ-CSEC, IPSJ-SPT [detail] 2014-07-03
15:45
Hokkaido San-Refure Hakodate Data authentication scheme suitable for broadcast in the sensor networks
Akihito Sakai, Yuichi Kaji, Minoru Ito (NAIST) ISEC2014-25 SITE2014-20 ICSS2014-29 EMM2014-25
Data broadcasting is often utilized in a sensor network system, but the authentication of the broadcast data is not a si... [more] ISEC2014-25 SITE2014-20 ICSS2014-29 EMM2014-25
pp.155-162
ICSS, ISEC, SITE, EMM, IPSJ-CSEC, IPSJ-SPT [detail] 2014-07-04
11:30
Hokkaido San-Refure Hakodate Quantitative Evaluation of the Key Information That is Learned through Timing Attack -- The Contribution of Bucketing Technique for RSA Cryptosystem --
Yasuyuki Kobayashi, Yuichi Kaji (NAIST), Hiroyuki Seki (Nagoya Univ.), Minoru Ito (NAIST) ISEC2014-35 SITE2014-30 ICSS2014-39 EMM2014-35
Timing attacks are regarded as serious threats to many practical cryptographic algorithms, but it is difficult to estima... [more] ISEC2014-35 SITE2014-30 ICSS2014-39 EMM2014-35
pp.253-258
IT 2014-05-16
10:15
Oita Beppu International Convention Center Flash Code with Block Deflation and Discrete Cell-Levels
Michael Joseph Tan, Yuichi Kaji (NAIST) IT2014-2
Several ideas are discussed for possible realization of a coding
scheme for flash memory that allow the operation of bl... [more]
IT2014-2
pp.5-10
IT, ISEC, WBS 2013-03-07
15:30
Osaka Kwansei Gakuin Univ., Osaka-Umeda Campus Verification of a Conjecture on Performance of Floating codes using Hamming Codes
Naoyoshi Okamae, Toru Fujiwara (Osaka Univ.), Yuichi Kaji (NAIST) IT2012-80 ISEC2012-98 WBS2012-66
Floating codes aim to store rewritable data in irreversible memories
like flash memories, whose value can only transit ... [more]
IT2012-80 ISEC2012-98 WBS2012-66
pp.119-124
IT 2013-01-21
15:10
Tokyo Univ. of Electro-Communications Multi-Mode Encoding with Binary-Indexed Flash Code
Michael Joseph Tan (NAIST), Proceso Fernandez, Nino Salazar, Jayzon Ty (ADMU), Yuichi Kaji (NAIST) IT2012-56
A new flash code is proposed in this paper. This flash code has two modes of encoding: one extending the binary-indexed ... [more] IT2012-56
pp.41-46
IT 2012-07-19
15:45
Aichi Toyota Technological Institute Uniform-Compartment Flash Code and Binary-Indexed Flash Code
Michael Joseph N. Tan, Yuichi Kaji (NAIST) IT2012-13
A slice-based flash code is one of the most promising approaches to design a good flash code. In this approach, a block ... [more] IT2012-13
pp.25-30
IT 2012-01-20
16:00
Ibaraki University of Tsukuba Performance Evaluation of Index-Less Flash Codes for Non-Uniform Write Operations
Yuichi Kaji (NAIST) IT2011-43
The performance of a flash code is often evaluated in terms of the number of possible write operations. A write operatio... [more] IT2011-43
pp.25-30
IT 2011-01-18
10:40
Nara   Index-Less Flash Codes with Reduced Block Size with Little Overhead
Yuichi Kaji (NAIST) IT2010-54
An improvement of the index-less indexed flash codes (ILIFC) is
investigated. A flash code is a coding scheme for flash... [more]
IT2010-54
pp.1-6
SS 2010-12-14
17:30
Gunma Ikaho-Onsen Hotel Tenbo Secure User-Role Assignment in Cross-Organizational Role-Based Access Control
Yuki Tomotani, Yuichi Kaji, Hiroyuki Seki (NAIST) SS2010-46
This paper proposes a mechanism for representing user-role assignments
of the role-based access control (RBAC) system. ... [more]
SS2010-46
pp.43-48
IT 2010-01-07
15:30
Overseas Univ. of Hawaii Two-dimensional barcode system with extreme density -- some investigation on the error correcting mechanism --
Yuichi Kaji (NAIST) IT2009-56
A preliminary issue of the error correcting mechanism for a
two-dimensional barcode system is studied. To write down in... [more]
IT2009-56
pp.29-34
SR, AN, USN
(Joint)
2009-10-22
13:40
Miyagi Tohoku Univ. Proposal and Evaluation of a Group Key Management Scheme for Ad-hoc Sensor Networks
Jun Noda (NEC), Yuichi Kaji (Nara Inst. of Science and Tech.), Toshiyasu Nakao (NEC) USN2009-28
We propose a new group key management scheme for ad-hoc sensor networks. In ad-hoc sensor networks, we need an appropria... [more] USN2009-28
pp.1-6
 Results 1 - 20 of 30  /  [Next]  
Choose a download format for default settings. [NEW !!]
Text format pLaTeX format CSV format BibTeX format
Copyright and reproduction : All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan