IEICE Technical Committee Submission System
Conference Schedule
Online Proceedings
[Sign in]
Tech. Rep. Archives
    [Japanese] / [English] 
( Committee/Place/Topics  ) --Press->
 
( Paper Keywords:  /  Column:Title Auth. Affi. Abst. Keyword ) --Press->

All Technical Committee Conferences  (Searched in: All Years)

Search Results: Conference Papers
 Conference Papers (Available on Advance Programs)  (Sort by: Date Descending)
 Results 1 - 10 of 10  /   
Committee Date Time Place Paper Title / Authors Abstract Paper #
EMM 2024-01-17
09:55
Miyagi Tohoku Univ.
(Primary: On-site, Secondary: Online)
An encryption method of JPEG bitstreams for partially disclosing visual information
Mare Hirose, Shoko Imaizumi (Chiba Univ.), Kiya Hitoshi (Tokyo Metropolitan Univ) EMM2023-85
In this paper, we propose an encryption method for JPEG codestreams in which the file size is invariant before and after... [more] EMM2023-85
pp.26-31
EMM 2018-03-05
14:35
Kagoshima Naze Community Center (Amami-Shi, Kagoshima) [Poster Presentation] A Block-Permutation-Based Image Encryption Allowing Hierarchical Decryption
Yusuke Izawa, Shoko Imaizumi (Chiba Univ.), Hitoshi Kiya (Tokyo Metro. Univ.) EMM2017-77
This paper proposes a permutation-based image encryption scheme, which allows decrypting only a particular area in the e... [more] EMM2017-77
pp.1-6
ICSS, IPSJ-SPT 2016-03-04
15:40
Kyoto Academic Center for Computing and Media Studies, Kyoto University Higher-order differential attack on the round-reduced variants of the block cipher
Yusuke Takahashi, Yasutaka Igarashi, Toshinobu Kaneko (TUS) ICSS2015-73
Midori64 proposed by Banik et al. in 2015 is an SPN-type block cipher with 128-bit secret key. The designers have evalua... [more] ICSS2015-73
pp.159-164
CS 2015-07-03
11:40
Okinawa Eef Information Plaza (Kumejima Is.) Privacy-preserving Biometric Authentication with Homomorphic Encryption by Comparing Partial Bio-information
Takumi Matsunaga, Kentaroh Toyoda, Iwao Sasase (Keio Univ.) CS2015-28
In recent years, the privacy-preserving biometric authentication executed on encrypted biometric information is getting ... [more] CS2015-28
pp.103-108
EMM 2015-01-28
14:45
Miyagi Tohoku University Reversible data embedding method using HAM with encryption
Hikaru Takeda, Shoko Imaizumi, Naokazu Aoki, Hiroyuki Kobayashi (Chiba Univ.) EMM2014-68
We propose a new embedding method with reversible data embedding method HAM(Histogram Association Mapping) in this paper... [more] EMM2014-68
pp.9-14
RECONF, VLD, CPSY, IPSJ-SLDM [detail] 2011-01-18
10:20
Kanagawa Keio Univ (Hiyoshi Campus) Evaluation of switchable AES S-box circuit using dynamic and partial reconfiguration
Naoko Yamada (Keio Univ.), Keisuke Iwai, Takakazu Kurokawa (NDA), Hideharu Amano (Keio Univ.) VLD2010-102 CPSY2010-57 RECONF2010-71
Recently, the threat of side channel attack to the hardware encryption circuits is increasing. In order
to cope with it... [more]
VLD2010-102 CPSY2010-57 RECONF2010-71
pp.127-132
ISEC, IPSJ-CSEC, SITE, ICSS [detail] 2010-07-02
11:45
Aomori Hirosaki University On the Implementation of Pubilc-key Encryption with Partial Matching Keyword Search by Using Predicate Encryption
Akira Nagai, Reo Yoshida, Gembu Morohashi (NTT Corp.) ISEC2010-29 SITE2010-25 ICSS2010-35
In this paper, we examine the Public-key Encryption with Partial Matching Keyword Search (PEPMKS), and report the result... [more] ISEC2010-29 SITE2010-25 ICSS2010-35
pp.147-152
RECONF 2008-05-22
13:50
Fukushima The University of Aizu Bitstream encryption and authentication with AES-GCM in dynamically reconfigurable systems
Yohei Hori, Akashi Satoh, Hirofumi Sakane, Kenji Toda (AIST) RECONF2008-3
A high-speed and secure dynamic partial reconfiguration (DPR) system is realized with AES-GCM that guarantees both confi... [more] RECONF2008-3
pp.13-18
CQ, LOIS, IE, IEE-CMN, ITE-ME 2007-09-27
14:15
Tokushima The university of Tokushima Cryptanalysis JPEG 2000 partial scrambled images based on statistical character
Shingo Hamaguchi, Akihiro Shimizu (Kochi Univ.of Tech.) CQ2007-46 OIS2007-36 IE2007-43
Users can recognize image outline and protect copyrights on digital images by partial-scrambling.
JPEG 2000 is suggest... [more]
CQ2007-46 OIS2007-36 IE2007-43
pp.57-60
WBS, IT, ISEC 2006-03-17
09:45
Aichi Nagoya Univ. An Encryption Method for Multiple Receivers with Different Roles
Yasuo Hatano, Kunihiko Miyazaki (Hitachi)
This paper discusses an applied cryptographic technique to disclose information selectively for multiple receivers who h... [more] IT2005-110 ISEC2005-167 WBS2005-124
pp.91-96
 Results 1 - 10 of 10  /   
Choose a download format for default settings. [NEW !!]
Text format pLaTeX format CSV format BibTeX format
Copyright and reproduction : All rights are reserved and no part of this publication may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopy, recording, or any information storage and retrieval system, without permission in writing from the publisher. Notwithstanding, instructors are permitted to photocopy isolated articles for noncommercial classroom use without fee. (License No.: 10GA0019/12GB0052/13GB0056/17GB0034/18GB0034)


[Return to Top Page]

[Return to IEICE Web Page]


The Institute of Electronics, Information and Communication Engineers (IEICE), Japan