1 | -- | 0 | Tsutomu Matsumoto. Foreword |
2 | -- | 14 | Shingo Yanagihara, Tetsu Iwata. Improving the Permutation Layer of Type 1, Type 3, Source-Heavy, and Target-Heavy Generalized Feistel Structures |
15 | -- | 24 | Huajin Chen, Wenfeng Qi, Chuangui Ma. On the Construction of Boolean Functions with Optimal Algebraic Immunity Based on Factorization of Numbers of Variables |
25 | -- | 34 | Yasushi Osaki, Tetsu Iwata. Security of Hash-then-CBC Key Wrapping Revisited |
35 | -- | 41 | ChangKyun Kim, Eun-Gu Jung, Dong Hoon Lee 0002, Chang-Ho Jung, Daewan Han. Cryptanalysis of INCrypt32 in HID's iCLASS Systems |
42 | -- | 52 | Tatsuaki Okamoto, Katsuyuki Takashima. Efficient (Hierarchical) Inner-Product Encryption Tightly Reduced from the Decisional Linear Assumption |
53 | -- | 67 | Mitsuhiro Hattori, Takato Hirano, Takashi Ito, Nori Matsuda, Takumi Mori, Yusuke Sakai, Kazuo Ohta. Ciphertext-Policy Delegatable Hidden Vector Encryption and Its Application |
68 | -- | 75 | Takuho Mitsunaga, Yoshifumi Manabe, Tatsuaki Okamoto. Efficient Secure Auction Protocols Based on the Boneh-Goh-Nissim Encryption |
76 | -- | 91 | Atsushi Fujioka, Yoshiaki Okamoto, Taiichi Saito. Generic Construction of Strongly Secure Timed-Release Public-Key Encryption |
92 | -- | 100 | Masayuki Abe, Tatsuaki Okamoto, Koutarou Suzuki. Message Recovery Signature Schemes from Sigma-Protocols |
101 | -- | 110 | Mark Manulis, Koutarou Suzuki, Berkant Ustaoglu. Modeling Leakage of Ephemeral Secrets in Tripartite/Group Key Exchange |
111 | -- | 120 | Hiroaki Kikuchi, Daisuke Kagawa, Anirban Basu, Kazuhiko Ishii, Masayuki Terada, Sadayuki Hongo. Scalable Privacy-Preserving Data Mining with Asynchronously Partitioned Datasets |
121 | -- | 130 | Yu Sasaki. Meet-in-the-Middle Preimage Attacks on AES Hashing Modes and an Application to Whirlpool |
131 | -- | 140 | Yu Sasaki. Boomerang Distinguishers on MD4-Based Hash Functions: First Practical Results on Full 5-Pass HAVAL Compression Function |
141 | -- | 149 | Yu Sasaki, Kazumaro Aoki. Open-Key Distinguishers for the Internal Block Cipher of Tweaked Lesamnta |
150 | -- | 157 | Masayuki Yoshino, Noboru Kunihiro. Random Sampling Reduction with Precomputation |
158 | -- | 165 | Reo Yoshida, Katsuyuki Takashima. Computing a Sequence of 2-Isogenies on Supersingular Elliptic Curves |
166 | -- | 170 | Atsushi Waseda. Multiparty Simultaneous Quantum Identity Authentication Secure against Fake Signal Attacks |
171 | -- | 176 | Takayasu Kaida, Junru Zheng. On Constant-Weight Multi-Valued Sequences from Cyclic Difference Sets |
177 | -- | 184 | Yang Li, Kazuo Ohta, Kazuo Sakiyama. A New Type of Fault-Based Attack: Fault Behavior Analysis |
185 | -- | 195 | Hongying Liu, Xin Jin, Yukiyasu Tsunoo, Satoshi Goto. Correlated Noise Reduction for Electromagnetic Analysis |
196 | -- | 205 | Yasufumi Hashimoto, Tsuyoshi Takagi, Kouichi Sakurai. General Fault Attacks on Multivariate Public Key Cryptosystems |
206 | -- | 214 | Mun-Kyu Lee, Jung-Woo Kim, Jeong Eun Song, Kunsoo Park. Efficient Implementation of NTRU Cryptosystem Using Sliding Window Methods |
215 | -- | 224 | Kuniyasu Suzaki, Kengo Iijima, Toshiki Yagi, Cyrille Artho. Implementation of a Memory Disclosure Attack on Memory Deduplication of Virtual Machines |
225 | -- | 232 | Takahiro Kasama, Katsunari Yoshioka, Daisuke Inoue, Tsutomu Matsumoto. Catching the Behavioral Differences between Multiple Executions for Malware Detection |
233 | -- | 236 | Kazumaro Aoki. Provable Security against Cryptanalysis with Impossible Differentials |
237 | -- | 241 | Kan Yasuda. A Parallelizable PRF-Based MAC Algorithm: Well beyond the Birthday Bound |
242 | -- | 243 | Bennian Dou, Hong Zhang, Chun-Hua Chen, Chungen Xu. Rogue Key Attacks on Lu et al.'s Verifiably Encrypted Signature Scheme |
244 | -- | 245 | Bennian Dou, Hong Zhang, Chun-Hua Chen, Chungen Xu. Key Substitution Attacks on Multisignature Schemes |
246 | -- | 0 | Makoto Itami. Foreword |
247 | -- | 254 | Hidekazu Murata, Susumu Yoshida, Koji Yamamoto, Daisuke Umehara, Satoshi Denno, Masahiro Morikura. Software Radio-Based Distributed Multi-User MIMO Testbed: Towards Green Wireless Communications |
255 | -- | 263 | Poomathi Duraisamy, Lim Nguyen. Performance Analysis of Coded-Sequence Self-Encoded Spread Spectrum over Rayleigh Fading Channel |
264 | -- | 273 | Masahiro Fujii, Yu Watanabe. Primary Signal to Noise Ratio Estimation Based on AIC for UWB Systems |
274 | -- | 284 | Huan-Bang Li, Kunio Yata, Kenichi Takizawa, Noriaki Miyazaki, Takashi Okada, Kohei Ohno, Takuji Mochizuki, Eishin Nakagawa, Takehiko Kobayashi. Examination of Effective UWB Avoidance Based on Experiments for Coexistence with Other Wireless Systems |
285 | -- | 292 | Kenichi Takizawa, Hirotaka Yamane, Huan-Bang Li, Feng Lu, Kohei Ohno, Takuji Mochizuki, Takashi Okada, Kunio Yata, Hisashi Nishikawa, Takehiko Kobayashi. Detection Capability of Downlink Signals in Mobile WiMAX and 3GPP LTE with an FFT-Based UWB Receiver |
293 | -- | 295 | Tsukasa Takahashi, Teruyuki Miyajima. A Max-Min Approach to Channel Shortening in OFDM Systems |
296 | -- | 297 | Soobum Cho, Sang Kyu Park. Hybrid DCT/DST Precoding Scheme for the PAPR Reduction of OFDM Systems |
298 | -- | 303 | Shinpei Noguchi, Mamiko Inamori, Yukitoshi Sanada. Reliable Data Transmission for Resonant-Type Wireless Power Transfer |
304 | -- | 311 | SooHwan Choi, DooSeop Eom. Minimizing False Peak Errors in Generalized Cross-Correlation Time Delay Estimation Using Subsample Time Delay Estimation |
312 | -- | 321 | Kazushi Kawamura, Masao Yanagisawa, Nozomu Togawa. A Thermal-Aware High-Level Synthesis Algorithm for RDR Architectures through Binding and Allocation |
322 | -- | 331 | Sun-Mi Park, Ku-Young Chang, Dowon Hong, Changho Seo. m) Defined by Pentanomials Using Weakly Dual Basis |
332 | -- | 339 | XinJie Zhao, Shize Guo, Fan Zhang, Tao Wang, Zhijie Shi, Hao Luo. Enhanced Side-Channel Cube Attacks on PRESENT |
340 | -- | 344 | Ken Kihara, Marina Seki, Sakuichi Ohtsuka. Deterioration of Visibility of Scrolling Text Presented Nearby Image Moving in the Opposite Direction |
345 | -- | 355 | Masashi Nomura, Shigemasa Takai. Computation of Sublanguages for Synthesizing Decentralized Supervisors for Timed Discrete Event Systems |
356 | -- | 359 | Hiroshi Ninomiya, Manabu Kobayashi, Shigeyoshi Watanabe. Reduced Reconfigurable Logic Circuit Design Based on Double Gate CNTFETs Using Ambipolar Binary Decision Diagram |
360 | -- | 362 | Shaojing Fu, Chao Li, Longjiang Qu. Generalized Construction of Boolean Function with Maximum Algebraic Immunity Using Univariate Polynomial Representation |
363 | -- | 366 | Xiaoping Li, Wenping Ma, Tongjiang Yan, Xubo Zhao. Linear Complexity of Binary Whiteman Generalized Cyclotomic Sequences of Order 4 |
367 | -- | 372 | Fanxin Zeng, Xiaoping Zeng, Xiangyong Zeng, Zhenyu Zhang, Guixin Xuan. Several Types of Sequences with Optimal Autocorrelation Properties |
373 | -- | 376 | Yier Yan, Moon Ho Lee. Low Complexity Decoder Design for Non-binary LDPC Coded MIMO System Using Quasi-Orthogonal STBC |
377 | -- | 382 | Xiaoyu Chen, Chengqian Xu, Yubo Li, Kai Liu. Construction of Shift Distinct Sequence Sets with Zero or Low Correlation Zone |
383 | -- | 386 | Sungho Hwang, Kyungjun Kim. Channel Localization Mechanism for Wi-Fi Systems |
387 | -- | 390 | Jang-Kyun Ahn, Seung-Jun Yu, Hyoung-Kyu Song. Channel Condition Number Based Switching Detection Scheme in MIMO-OFDM System |
391 | -- | 393 | Haijun Liang, Hongyu Yang, Bo Yang. Traffic Flow Simulator Using Virtual Controller Model |
394 | -- | 397 | Xin He, Huiyun Jing, Qi Han, Xiamu Niu. Region Diversity Based Saliency Density Maximization for Salient Object Detection |