169 | -- | 0 | Tetsuya Izu. Foreword |
170 | -- | 184 | Ouyang Junjie, Naoto Yanai, Tatsuya Takemura, Masayuki Okada, Shingo Okamura, Jason Paul Cruz. APVAS: Reducing the Memory Requirement of AS_PATH Validation by Introducing Aggregate Signatures into BGPsec |
185 | -- | 192 | Yasufumi Hashimoto. Solving the Problem of Blockwise Isomorphism of Polynomials with Circulant Matrices |
193 | -- | 202 | Keita Emura, Atsushi Takayasu. A Generic Construction of CCA-Secure Identity-Based Encryption with Equality Test against Insider Attacks |
203 | -- | 211 | Shuhei Nakamura, Yacheng Wang, Yasuhiko Ikematsu. A New Analysis of the Kipnis-Shamir Method Solving the MinRank Problem |
212 | -- | 227 | Seiya Nuta, Jacob C. N. Schuldt, Takashi Nishide. PoS Blockchain-Based Forward-Secure Public Key Encryption with Immutable Keys and Post-Compromise Security Guarantees |
228 | -- | 240 | Kaisei Kajita, Go Ohtake, Kazuto Ogawa, Koji Nuida, Tsuyoshi Takagi. Short Lattice Signature Scheme with Tighter Reduction under Ring-SIS Assumption |
241 | -- | 252 | Shintaro Narisada, Kazuhide Fukushima, Shinsaku Kiyomoto. Multiparallel MMT: Faster ISD Algorithm Solving High-Dimensional Syndrome Decoding Problem |
253 | -- | 262 | Nobuyuki Takeuchi, Kosei Sakamoto, Takanori Isobe 0001. Security Evaluation of Initialization Phases and Round Functions of Rocca and AEGIS |
263 | -- | 271 | Reo Eriguchi, Noboru Kunihiro, Koji Nuida. Linear Algebraic Approach to Strongly Secure Ramp Secret Sharing for General Access Structures with Application to Symmetric PIR |
272 | -- | 280 | Atsunori Ichikawa, Wakaha Ogata. Perfectly Secure Oblivious Priority Queue |
281 | -- | 293 | Mitsuru Shiozaki, Takeshi Sugawara 0001, Takeshi Fujino. Exploring Effect of Residual Electric Charges on Cryptographic Circuits: Extended Version |
294 | -- | 305 | Yuta Fukuda, Kota Yoshida, Hisashi Hashimoto, Kunihiro Kuroda, Takeshi Fujino. Profiling Deep Learning Side-Channel Attacks Using Multi-Label against AES Circuits with RSM Countermeasure |
306 | -- | 314 | Kazumasa Shinagawa, Kengo Miyamoto. Automorphism Shuffles for Graphs and Hypergraphs and Its Applications |
315 | -- | 324 | Yoshiki Abe, Takeshi Nakai, Yohei Watanabe 0001, Mitsugu Iwamoto, Kazuo Ohta. A Computationally Efficient Card-Based Majority Voting Protocol with Fewer Cards in the Private Model |
325 | -- | 332 | Kazuo Takaragi, Takashi Kubota, Sven Wohlgemuth, Katsuyuki Umezawa, Hiroki Koyanagi. Secure Revocation Features in eKYC - Privacy Protection in Central Bank Digital Currency |
333 | -- | 340 | Takaki Asanuma, Takanori Isobe 0001. mPoW: How to Make Proof of Work Meaningful |
341 | -- | 349 | Yasuyuki Kawanishi, Hideaki Nishihara, Hideki Yamamoto, Hirotaka Yoshida, Hiroyuki Inoue. A Study of The Risk Quantification Method of Cyber-Physical Systems focusing on Direct-Access Attacks to In-Vehicle Networks |
350 | -- | 354 | Kenji Yasunaga, Kosuke Yuzawa. On the Limitations of Computational Fuzzy Extractors |
355 | -- | 357 | Ryuto Omachi, Yasuyuki Murakami. k-Nearest Neighbor Algorithm |
358 | -- | 0 | Hiroki Koga. Foreword |
359 | -- | 367 | Tadashi Wadayama, Satoshi Takabe. Proximal Decoding for LDPC Codes |
368 | -- | 374 | Manabu Hagiwara. Multi Deletion/Substitution/Erasure Error-Correcting Codes for Information in Array Design |
375 | -- | 381 | Sen Moriya, Hiroshi Sasano. Construction of High-Rate Convolutional Codes Using Dual Codes |
382 | -- | 393 | Vamoua Yachongka, Hideki Yagi. Biometric Identification Systems with Both Chosen and Generated Secret Keys by Allowing Correlation |
394 | -- | 405 | Yohei Watanabe 0001, Takenobu Seito, Junji Shikata. Multi-Designated Receiver Authentication Codes: Models and Constructions |
406 | -- | 413 | Tomonori Hirata, Yuichi Kaji. Information Leakage Through Passive Timing Attacks on RSA Decryption System |
414 | -- | 421 | Toshihiro Yoshida, Keigo Takeuchi. Deep Learning of Damped AMP Decoding Networks for Sparse Superposition Codes via Annealing |
422 | -- | 430 | Goki Yasuda, Tota Suko, Manabu Kobayashi, Toshiyasu Matsushima. Asymptotic Evaluation of Classification in the Presence of Label Noise |
431 | -- | 439 | Hiroshi Fujisaki. k-Ary Necklaces and Its Applications |
440 | -- | 444 | Xiao-Nan Lu. Combinatorial Structures Behind Binary Generalized NTU Sequences |
445 | -- | 449 | Tomoko K. Matsushima, Shoichiro Yamasaki, Hirokazu Tanaka. Orthogonal Variable Spreading Factor Codes Suppressing Signal-Envelope Fluctuation |
450 | -- | 453 | Fanxin Zeng, Xiping He, Zhenyu Zhang 0001, Li Yan. New Construction of Z-Optimal Type-II Even-Length Quadriphase Z-Complementary Pairs |
454 | -- | 455 | Shingo Yoshizawa, Hiroshi Tsutsui. Foreword |
456 | -- | 463 | Kotaro Nagano, Masahiro Kawano, Yuhei Nagao, Hiroshi Ochi. Joint Transmission Null Beamforming for MIMO Full-Duplex Wireless Communication System |
464 | -- | 470 | Tomoya Iwasaki, Osamu Tokumasu, Jin Mitsugi. Accurate Phase Angle Measurement of Backscatter Signal under Noisy Environment |
471 | -- | 480 | Hideaki Tanaka, Akira Taguchi. Brightness Preserving Generalized Histogram Equalization with High Contrast Enhancement Ability |
481 | -- | 485 | Masahiro Yasuda, Soh Yoshida, Mitsuji Muneyasu. New Performance Evaluation Method for Data Embedding Techniques for Printed Images Using Mobile Devices Based on a GAN |
486 | -- | 489 | Shunsuke Koshita. 2-Sensitivity for All-Pass Fractional Delay Digital Filters with Normalized Lattice Structure |
490 | -- | 0 | Toshihiro Hattori. Foreword |
491 | -- | 503 | Chihiro Matsui, Ken Takeuchi. Heterogeneous Integration of Precise and Approximate Storage for Error-Tolerant Workloads |
504 | -- | 513 | Taito Manabe, Yuichiro Shibata. Real-Time Image-Based Vibration Extraction with Memory-Efficient Optical Flow and Block-Based Adaptive Filter |
514 | -- | 522 | Yutaka Masuda, Yusei Honda, Tohru Ishihara. Dynamic Verification Framework of Approximate Computing Circuits using Quality-Aware Coverage-Based Grey-Box Fuzzing |
523 | -- | 531 | Yangchao Zhang, Hiroaki Itsuji, Takumi Uezono, Tadanobu Toba, Masanori Hashimoto. Vulnerability Estimation of DNN Model Parameters with Few Fault Injections |
532 | -- | 541 | Lingxiao Hou, Yutaka Masuda, Tohru Ishihara. An Accuracy Reconfigurable Vector Accelerator based on Approximate Logarithmic Multipliers for Energy-Efficient Computing |
542 | -- | 550 | Shoya Sonoda, Jun Shiomi, Hidetoshi Onodera. Approximation-Based System Implementation for Real-Time Minimum Energy Point Tracking over a Wide Operating Performance Region |
551 | -- | 559 | Shinichi Nishizawa, Toru Nakura. Libretto: An Open Cell Timing Characterizer for Open Source VLSI Design |
560 | -- | 574 | Morihiro Kuga, Qian Zhao 0001, Yuya Nakazato, Motoki Amagasaki, Masahiro Iida. An eFPGA Generation Suite with Customizable Architecture and IDE |
575 | -- | 581 | Cui Yang, Yalu Xu, Yue Yu, Gengxin Ning, Xiaowu Zhu. A New Subsample Time Delay Estimation Algorithm for LFM-Based Detection |
582 | -- | 589 | Yoichi Hinamoto, Shotaro Nishimura. A State-Space Approach and Its Estimation Bias Analysis for Adaptive Notch Digital Filters with Constrained Poles and Zeros |
590 | -- | 599 | Kaixuan Liu, Yue Li, Peng Wang, Xiaoyan Peng, Hongshu Liao, Wanchun Li. A CFAR Detection Algorithm Based on Clutter Knowledge for Cognitive Radar |
600 | -- | 605 | Shihao Lu, Haibin Kan, Jie Peng, Chenmiao Shi. q-Ary Functions |
606 | -- | 615 | Qi Teng, Guowei Teng, Xiang Li, Ran Ma, Ping An, Zhenglong Yang. Lookahead Search-Based Low-Complexity Multi-Type Tree Pruning Method for Versatile Video Coding (VVC) Intra Coding |
616 | -- | 632 | Motohiko Kawasumi, Kenta Kasai. Concatenated Permutation Codes under Chebyshev Distance |
633 | -- | 643 | Daiki Saito, Jeyeon Kim, Tetsuya Manabe. Tourism Application Considering Waiting Time |
644 | -- | 646 | Tatsuya Kai, Ryouhei Kakurai. A Data-Driven Gain Tuning Method for Automatic Hovering Control of Multicopters via Just-in-Time Modeling |