192 | -- | 0 | Noboru Kunihiko. Foreword |
193 | -- | 202 | Rikuhiro Kojima, Jacob C. N. Schuldt, Goichiro Hanaoka. A New Pairing-Based Two-Round Tightly-Secure Multi-Signature Scheme with Key Aggregation |
203 | -- | 217 | Kyosuke Yamashita, Keisuke Hara, Yohei Watanabe 0001, Naoto Yanai, Junji Shikata. Designated Verifier Signature with Claimability |
218 | -- | 233 | Hirotomo Shinoki, Koji Nuida. On Extension of Evaluation Algorithms in Keyed-Homomorphic Encryption |
234 | -- | 247 | Daisuke Maeda, Koki Morimura, Shintaro Narisada, Kazuhide Fukushima, Takashi Nishide. Efficient Homomorphic Evaluation of Arbitrary Uni/Bivariate Integer Functions and Their Applications |
248 | -- | 259 | Kyoichi Asano, Keita Emura, Atsushi Takayasu. More Efficient Adaptively Secure Lattice-Based IBE with Equality Test in the Standard Model |
260 | -- | 274 | Keita Emura. Generic Construction of Public-Key Authenticated Encryption with Keyword Search Revisited |
275 | -- | 282 | Yasuhiko Ikematsu, Tsunekazu Saito. Hilbert Series for Systems of UOV Polynomials |
283 | -- | 290 | Keitaro Hiwatashi, Koji Nuida. Correlated Randomness Reduction in Domain-Restricted Secure Two-Party Computation |
291 | -- | 305 | Takayuki Sasaki, Mami Kawaguchi, Takuhiro Kumagai, Katsunari Yoshioka, Tsutomu Matsumoto. Observation of Human-Operated Accesses Using Remote Management Device Honeypot |
306 | -- | 318 | Ren Takeuchi, Rikima Mitsuhashi, Masakatsu Nishigaki, Tetsushi Ohki. Ensemble Malware Classifier Considering PE Section Information |
319 | -- | 330 | Vu Trung Duong Le, Hoai Luan Pham, Thi Hong Tran, Yasuhiko Nakashima. Flexible and Energy-Efficient Crypto-Processor for Arbitrary Input Length Processing in Blockchain-Based IoT Applications |
331 | -- | 343 | Hanae Nozaki, Kazukuni Kobara. Power Analysis of Floating-Point Operations for Leakage Resistance Evaluation of Neural Network Model Parameters |
344 | -- | 354 | Tatsuya Oyama, Kota Yoshida, Shunsuke Okura, Takeshi Fujino. Adversarial Examples Created by Fault Injection Attack on Image Sensor Interface |
355 | -- | 358 | Shingo Yashiki, Chako Takahashi, Koutarou Suzuki. Backdoor Attacks on Graph Neural Networks Trained with Data Augmentation |
359 | -- | 0 | Yuichi Kaji. Foreword |
360 | -- | 372 | Mitsugu Iwamoto. Information-Theoretic Perspectives for Simulation-Based Security in Multi-Party Computation |
373 | -- | 383 | Shoichiro Yamasaki, Tomoko K. Matsushima, Kyohei Ono, Hirokazu Tanaka. Variable-Length Orthogonal Codes over Finite Fields Realizing Data Multiplexing and Error Correction Coding Simultaneously |
384 | -- | 392 | Sho Higuchi, Yuta Sakai. A Fundamental Limit of Variable-Length Compression with Worst-Case Criteria in Terms of Side Information |
393 | -- | 403 | Tomohiko Uyematsu, Tetsunao Matsuta. Equivalences among Some Information Measures for Individual Sequences and Their Applications for Fixed-Length Coding Problems |
404 | -- | 408 | Mikihiko Nishiara, Yuki Ito. Proof of Achievability Part of Rate-Distortion Theorem without Random Coding |
409 | -- | 416 | Takahiro Ota, Akiko Manada. A Reconstruction of Circular Binary String Using Substrings and Minimal Absent Words |
417 | -- | 447 | Kengo Hashimoto, Ken-ichi Iwata. k-Bit Delay Decodable Codes |
448 | -- | 457 | Koshi Shimada, Shota Saito, Toshiyasu Matsushima. An Efficient Bayes Coding Algorithm for Changing Context Tree Model |
458 | -- | 463 | Masaki Hori, Mikihiko Nishiara. Channel Capacity with Cost Constraint Allowing Cost Overrun |
464 | -- | 475 | Toru Nakanishi 0001, Atsuki Iriboshi, Katsunobu Imai. Short DL-Based Blacklistable Ring Signatures from DualRing |
476 | -- | 485 | Daisuke Hibino, Tomoharu Shibuya. Efficient Construction of Encoding Polynomials in a Distributed Coded Computing Scheme |
486 | -- | 492 | Asahi Mizukoshi, Ayano Nakai-Kasai, Tadashi Wadayama. PSOR-Jacobi Algorithm for Accelerated MMSE MIMO Detection |
493 | -- | 502 | Ken Hisanaga, Motohiko Isaka. Communication-Efficient Distributed Orthogonal Approximate Message Passing for Sparse Signal Recovery |
503 | -- | 509 | Shota Saito. Meta-Bound on Lower Bounds of Bayes Risk in Parameter Estimation |
510 | -- | 518 | Jun Suzuki. Bayesian Nagaoka-Hayashi Bound for Multiparameter Quantum-State Estimation Problem |
519 | -- | 522 | Minami Sato, Sosuke Minamoto, Ryuichi Sakai, Yasuyuki Murakami. High-Density Knapsack Cryptosystem Using Shifted-Odd and Super-Increasing Sequence |
523 | -- | 525 | Yuta Nakahara, Toshiyasu Matsushima. Batch Updating of a Posterior Tree Distribution Over a Meta-Tree |
526 | -- | 529 | Shogo Chiwaki, Ryutaroh Matsumoto. Performance Comparison of the Two Reconstruction Methods for Stabilizer-Based Quantum Secret Sharing |
530 | -- | 0 | Nozomu Togawa. Foreword |
531 | -- | 539 | Masahiro Nishimura, Taito Manabe, Yuichiro Shibata. Pipelined ADPCM Compression for HDR Synthesis on an FPGA |
540 | -- | 548 | Jiaxuan Lu, Yutaka Masuda, Tohru Ishihara. Identification of Redundant Flip-Flops Using Fault Injection for Low-Power Approximate Computing Circuits |
549 | -- | 556 | Momoko Fukuda, Makoto Ikeda. Template-Based Design Optimization for Selecting Pairing-Friendly Curve Parameters |
557 | -- | 565 | Sohei Shimomai, Kei Ueda, Shinji Kimura. Input Data Format for Sparse Matrix in Quantum Annealing Emulator |
566 | -- | 574 | Ryosuke Matsuo, Shin-ichi Minato. A Complete Library of Cross-Bar Gate Logic with Three Control Inputs |
575 | -- | 582 | Kotaro Abe, Makoto Ikeda. Template Attacks on ECDSA Hardware and Theoretical Estimation of the Success Rate |
583 | -- | 591 | Masayoshi Yoshimura, Atsuya Tsujikawa, Toshinori Hosokawa. CRLock: A SAT and FALL Attacks Resistant Logic Locking Method for Controller at Register Transfer Level |
592 | -- | 599 | Tomohiro Nishiguchi, Nobutaka Kuroki, Masahiro Numa. Technology Remapping Approach Using Multi-Gate Reconfigurable Cells for Post-Mask Functional ECO |
600 | -- | 609 | Yuya Ushioda, Mineo Kaneko. ILP Based Approaches for Optimizing Early Decompute in Two Level Adiabatic Logic Circuits |