• Search Research Projects
  • Search Researchers
  • How to Use
  1. Back to previous page

Studies towards the Network Coding Theory Based on Multi user Information Theory and Cryptography

Research Project

Project/Area Number 18360179
Research Category

Grant-in-Aid for Scientific Research (B)

Allocation TypeSingle-year Grants
Section一般
Research Field Communication/Network engineering
Research InstitutionThe University of Electro-Communications

Principal Investigator

KOBAYASHI Kingo  The University of Electro-Communications, 電気通信学部, 教授 (20029515)

Co-Investigator(Kenkyū-buntansha) SAKATA Shojiro  電気通信大学, 名誉教授 (20064157)
OHTA Kazuo  電気通信大学, 電気通信学部, 教授 (80333491)
YAMAGUCHI Kazuhiko  電気通信大学, 電気通信学部, 准教授 (60220258)
BRIAN Kurkoski  電気通信大学, 電気通信学部, 准教授 (80444123)
KURIHARA Masazumi  電気通信大学, 電気通信学部, 助教 (90242346)
國廣 昇  東京大学, 大学院・新領域創成科学研究科, 准教授 (60345436)
Project Period (FY) 2006 – 2008
Project Status Completed (Fiscal Year 2008)
Budget Amount *help
¥14,940,000 (Direct Cost: ¥12,600,000、Indirect Cost: ¥2,340,000)
Fiscal Year 2008: ¥4,680,000 (Direct Cost: ¥3,600,000、Indirect Cost: ¥1,080,000)
Fiscal Year 2007: ¥5,460,000 (Direct Cost: ¥4,200,000、Indirect Cost: ¥1,260,000)
Fiscal Year 2006: ¥4,800,000 (Direct Cost: ¥4,800,000)
Keywordsマルチユーザ情報理論 / 暗号・情報セキュリティ / ネットワーク符号化 / ネットワーク・セキュリティ / 安全性解析 / 電子透かし / LDPC符号 / 代数幾何符号 / 電子指紋 / 有限状態通信路 / 誤り訂正符号 / 非2元LDPC符号 / マルチキャストネットワーク / ランプ型秘密分散符号化 / 暗号理論 / 干渉通信路
Research Abstract

マルチユーザ情報理論と暗号理論の視点から, ネットワーク符号化におけるロバスト性とセキュア性の両立を意識して, 線形ネットワーク符号の新しい構成法, ネットワーク誤り訂正符号の復号に関する基本概念の確立と, 具体的復号アルゴリズムの提案, および, 計算量の評価を行った。さらに, 多重アクセス・ブロードキャスト・ネットワークに適するセキュリティ・プロトコル, 安全なコンテンツ配信のための電子透かし法等の提案をした。

Report

(4 results)
  • 2008 Annual Research Report   Final Research Report ( PDF )
  • 2007 Annual Research Report
  • 2006 Annual Research Report
  • Research Products

    (243 results)

All 2009 2008 2007 2006 Other

All Journal Article (98 results) (of which Peer Reviewed: 37 results) Presentation (130 results) Book (10 results) Remarks (1 results) Patent(Industrial Property Rights) (4 results)

  • [Journal Article] "Power-Constrained Communications Using LDLC Lattices"in Proc. of the Intl2009

    • Author(s)
      Brian Kurkoski, Justin Dauwels and Hans-Andrea Loeliger
    • Journal Title

      Symposium on Information Theory

      Pages: 5-5

    • Related Report
      2008 Final Research Report
    • Peer Reviewed
  • [Journal Article] Attribute Based Encryption with Partially Hidden Ciphertext Policies2009

    • Author(s)
      Takashi Nishide, Kazuki Yoneyama, Kazuo Ohta
    • Journal Title

      IEICE Trans, on Fundamentals Vol.E92, A, No.1

      Pages: 22-32

    • NAID

      10026854718

    • Related Report
      2008 Final Research Report
    • Peer Reviewed
  • [Journal Article] A New 'On the Fly' Identification Scheme : A Trade off of Asymptoticity between ZK and Correctness2009

    • Author(s)
      Bagus Santoso and Kazuo Ohta
    • Journal Title

      IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences Vol.E92-A, No.1

      Pages: 122-136

    • Related Report
      2008 Final Research Report
    • Peer Reviewed
  • [Journal Article] Extended Password Recovery Attacks against APOP, SIP, and igest Authenticaiton2009

    • Author(s)
      Yu Sasaki, Lei Wang, Kazuo Ohta and No.boru Kunihiro
    • Journal Title

      IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences Vol.E92-A, No.1

      Pages: 96-104

    • Related Report
      2008 Final Research Report
    • Peer Reviewed
  • [Journal Article] Attribute-Based Encryption with Partially Hidden Ciphertext Policies2009

    • Author(s)
      Takashi Nishide
    • Journal Title

      IEICE Trans, on Fundamentals vol. E92. A, No. 1

      Pages: 22-32

    • Related Report
      2008 Annual Research Report
    • Peer Reviewed
  • [Journal Article] A New ' On the Fly' Identification Scheme : A Trade-off of Asymptoticity between ZK and Correctness2009

    • Author(s)
      Bagus Santoso
    • Journal Title

      IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences Vol. E92-A, No. 1

      Pages: 122-136

    • Related Report
      2008 Annual Research Report
    • Peer Reviewed
  • [Journal Article] Does Secure Password-based Authenticated Key Exchange against Leakage of Internal States Exist?2009

    • Author(s)
      Kazuki Yoneyama
    • Journal Title

      IEICE Trans, on Fundamentals vo1. E92. A, No. 1

      Pages: 113-121

    • Related Report
      2008 Annual Research Report
    • Peer Reviewed
  • [Journal Article] Extended Password Recovery Attacks against APOP, SIP, and Digest Authenticaiton2009

    • Author(s)
      Yu Sasaki
    • Journal Title

      IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences Vol. E92-A, No. 1

      Pages: 96-104

    • Related Report
      2008 Annual Research Report
    • Peer Reviewed
  • [Journal Article] Near-Collision Attacks on MD4 : Applied to MD4-Based Protocols2009

    • Author(s)
      Lei Wang
    • Journal Title

      IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences Vol. E92-A, No. 1

      Pages: 76-86

    • Related Report
      2008 Annual Research Report
    • Peer Reviewed
  • [Journal Article] Davies-Meyer Merkle-Damgard Revisited : Variants of Indifferentiability and Random Oracles2009

    • Author(s)
      Yusuke Naito
    • Journal Title

      IACR e-print Archive: 2009/075

      Pages: 1-25

    • Related Report
      2008 Annual Research Report
  • [Journal Article] How to Prove the Security of Practical Cryptosystems with Merkle-Damgard Hashing by Adopting Indifferentiability2009

    • Author(s)
      Yusuke Naito
    • Journal Title

      IACR e-print Archive: 2009/040

      Pages: 1-25

    • Related Report
      2008 Annual Research Report
  • [Journal Article] DetectioNo.f BPCS StegaNo.graphy Using SMWCF Steganalysis and SVM2008

    • Author(s)
      Lopez Hernandez, Julio, Martinez No.riega, Raul, Nakano Miyatake, Mariko, Yamaguchi, Kazuhiko
    • Journal Title

      Society on Information Theory and its App.lications, 2008 International Symposium on Information Theory and its Applications(ISITA2008) No.157

    • Related Report
      2008 Final Research Report
    • Peer Reviewed
  • [Journal Article] No.ise Thresholds for Discrete LDPC Decoding Mappings2008

    • Author(s)
      Brian M. Kurkoski, Kazuhiko Yamaguchi, Kingo Kobayashi
    • Journal Title

      in Proc. of IEEE Global Communications Conf, (GLOBECOM 2008)

      Pages: 1-5

    • Related Report
      2008 Final Research Report
    • Peer Reviewed
  • [Journal Article] Task-Structured PIOAフレームワークを用いた適応的攻撃者に対するDiffie-Hellman鍵交換の安全性解析2008

    • Author(s)
      米山一樹, 國分雄一, 太田和夫
    • Journal Title

      電子情報通信学会論文誌D分冊 Vol.,J91-D, No.4

      Pages: 859-872

    • NAID

      110007381034

    • Related Report
      2008 Final Research Report
    • Peer Reviewed
  • [Journal Article] 代数的符号理論2008

    • Author(s)
      阪田省二郎
    • Journal Title

      IEICE Fundamentals Review Vol.,1,No.3

      Pages: 44-57

    • NAID

      130004554532

    • Related Report
      2008 Final Research Report
    • Peer Reviewed
  • [Journal Article] Full Index Embedding Patchwork Algorithm for Audio Watermarking2008

    • Author(s)
      Hyunho Kang, Koutarou Yamaguchi, Brian Kurkoski, Kazuhiko Yamaguchi, and Kingo Kobayashi
    • Journal Title

      IEICE Trans, Inf, & Syst,, Vol.ume and Number Vol., E91-D, No.11

      Pages: 2731-2734

    • NAID

      10026806611

    • Related Report
      2008 Final Research Report
    • Peer Reviewed
  • [Journal Article] Watermarking for Tamper Detection and Recovery2008

    • Author(s)
      Youngran Park, Hyunho Kang, Kazuhiko Yamaguchi, Kingo Kobayashi
    • Journal Title

      IEICE Electron, Express Vol.,5, No.,17

      Pages: 689-696

    • NAID

      130000088248

    • Related Report
      2008 Final Research Report
    • Peer Reviewed
  • [Journal Article] FactorizatioNo.f Square Free Integers with High Bits Kno.wn2008

    • Author(s)
      Bagus SANTOSO No.boru KUNIHIRO Naoki ANAYAMA Kazuo OHTA
    • Journal Title

      IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences Vol.E91-A, No.1

      Pages: 306-315

    • Related Report
      2008 Final Research Report
    • Peer Reviewed
  • [Journal Article] Task-Structured PIOAフレームワークを用いた適応的攻撃者に対するDiffie-Hellman鍵交換の安全性解析2008

    • Author(s)
      米山一樹
    • Journal Title

      電子情報通信学会論文誌D分冊 vol. J91-D, No. 4

      Pages: 859-872

    • Related Report
      2008 Annual Research Report
    • Peer Reviewed
  • [Journal Article] Elliptic Curve Cryptography on Embedded Multicore Systems2008

    • Author(s)
      Junfeng Fan
    • Journal Title

      Des. Autom. Embed. Syst. Vol. 12, No. 3

      Pages: 231-242

    • Related Report
      2008 Annual Research Report
    • Peer Reviewed
  • [Journal Article] Elliptic Curve Based Security Processor for RFID2008

    • Author(s)
      Yong Ki Lee
    • Journal Title

      IEEE Trans. Computers Vol. 57, No. 11

      Pages: 1514-1527

    • Related Report
      2008 Annual Research Report
    • Peer Reviewed
  • [Journal Article] RSA暗号に対する格子理論に基づく攻撃2008

    • Author(s)
      國廣 昇
    • Journal Title

      応用数理学会誌 Vol. 18 No1

      Pages: 23-29

    • NAID

      110006633782

    • Related Report
      2008 Annual Research Report
  • [Journal Article] RSA暗号に対する格子理論に基づく攻撃(その2)2008

    • Author(s)
      國廣 昇
    • Journal Title

      応用数理学会誌 Vol. 18 No3

      Pages: 44-51

    • NAID

      110006935933

    • Related Report
      2008 Annual Research Report
  • [Journal Article] 暗号学における双対性---ゴールとシナリオの間には---2008

    • Author(s)
      太田 和夫
    • Journal Title

      応用数理学会誌 Vol. 18 No2

      Pages: 71-78

    • Related Report
      2008 Annual Research Report
  • [Journal Article] 暗号における理論と実装のギャップ---置き換えアプローチの二面性---2008

    • Author(s)
      太田 和夫
    • Journal Title

      応用数理学会誌 Vol. 18 No4

      Pages: 62-73

    • Related Report
      2008 Annual Research Report
  • [Journal Article] APOPが破られた2008

    • Author(s)
      國廣 昇
    • Journal Title

      電子情報通信学会誌 Vol. 91 N0. 9

      Pages: 822-825

    • NAID

      110006894546

    • Related Report
      2008 Annual Research Report
  • [Journal Article] 安全性を証明可能なハッジュ関数の設計論2008

    • Author(s)
      太田 和夫
    • Journal Title

      電子情報通信学会誌 Vol. 91 No. 3

      Pages: 218-223

    • Related Report
      2008 Annual Research Report
  • [Journal Article] 暗号への脅威「サイドチャネル攻撃」とその対策2008

    • Author(s)
      崎山 一男
    • Journal Title

      「科学」報告・解説, 岩波書店 2008年10月号

      Pages: 1080-1083

    • Related Report
      2008 Annual Research Report
  • [Journal Article] Full-Index-Embedding Patchwork Algorithm for Audio Watermarking2008

    • Author(s)
      Hyunho Kang
    • Journal Title

      IEICE Trans. Inf. & Syst. Vol. E91-D, No. 11

      Pages: 2731-2734

    • Related Report
      2008 Annual Research Report
    • Peer Reviewed
  • [Journal Article] Watermarking for Tamper Detection and Recovery2008

    • Author(s)
      Youngran Park
    • Journal Title

      IEICE Electron. Express Vol. 5, No. 17

      Pages: 689-696

    • Related Report
      2008 Annual Research Report
    • Peer Reviewed
  • [Journal Article] Detection of BPCS-Steganography Using SMWCF Steganalysis and SVM2008

    • Author(s)
      Lopez-Hernandez
    • Journal Title

      Society on Information Theory and its Applications, 2008 International Symposiumon Information Theory and its Applications (ISITA2008) No. 157

      Pages: 157-157

    • Related Report
      2008 Annual Research Report
    • Peer Reviewed
  • [Journal Article] 代数的符号理論2008

    • Author(s)
      阪田省二郎
    • Journal Title

      IEICE Fundamentals Review vol.1, No.3

      Pages: 44-57

    • NAID

      130004554532

    • Related Report
      2007 Annual Research Report
    • Peer Reviewed
  • [Journal Article] Improved Collision Search for Hash Functions:New Advanced Message Modification2008

    • Author(s)
      Yusuke NAITO
    • Journal Title

      IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences Vol. E91-A, No.1

      Pages: 46-54

    • Related Report
      2007 Annual Research Report
    • Peer Reviewed
  • [Journal Article] New Message Differences for Collision Attacks on MD4 and MD52008

    • Author(s)
      Yu SASAKI
    • Journal Title

      IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences Vol. E91-A, No.1

      Pages: 55-63

    • Related Report
      2007 Annual Research Report
    • Peer Reviewed
  • [Journal Article] Provably Secure Multisignatures in Formal Security Model and Their Optimality2008

    • Author(s)
      Yuichi KOMANO
    • Journal Title

      IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences Vol. E91-A, No.1

      Pages: 107-118

    • Related Report
      2007 Annual Research Report
    • Peer Reviewed
  • [Journal Article] Factorization of Square-Free Integers with High Bits Known2008

    • Author(s)
      Bagus SANTOSO
    • Journal Title

      IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences Vol. E91-A, No.1

      Pages: 306-315

    • Related Report
      2007 Annual Research Report
    • Peer Reviewed
  • [Journal Article] Tracing illegal users of video : reconsideration of tree specific and endbuyer specific methods2007

    • Author(s)
      Hyunho Kang, Brian Kurkoski, Kazuhiko Yamaguchi and Kingo Kobayashi
    • Journal Title

      Lecture notes in Computer Science, Springer Verlag Vol.4707, Part III

      Pages: 1046-1055

    • Related Report
      2008 Final Research Report
  • [Journal Article] Constant Round Multiparty Computation for Interval Test, Equality Test, and Comparison2007

    • Author(s)
      T. Nishide and K. Ohta
    • Journal Title

      IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences Vol., E90-A, No.,5

      Pages: 960-968

    • NAID

      110007519160

    • Related Report
      2008 Final Research Report
    • Peer Reviewed
  • [Journal Article] The Quantum Fourier Transform on a Linear Nearest Neighbor Architechture2007

    • Author(s)
      Yasuhiro Takahashi
    • Journal Title

      Quantum Information and Computation Vol.7 No.4

      Pages: 383-391

    • Related Report
      2007 Annual Research Report
    • Peer Reviewed
  • [Journal Article] Provably Secure Untraceable Electronic Cash against Insider Attacks2007

    • Author(s)
      Y. Hanatani
    • Journal Title

      IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences Vol. E90-A, No.5

      Pages: 980-991

    • Related Report
      2007 Annual Research Report
    • Peer Reviewed
  • [Journal Article] Constant-Round Multiparty Computation for Interval Test, Equality Test, and Comparison2007

    • Author(s)
      T. Nishide
    • Journal Title

      IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences Vol. E90-A, No.5

      Pages: 960-968

    • Related Report
      2007 Annual Research Report
    • Peer Reviewed
  • [Journal Article] 素因数分解ハードウェアの研究・開発動向について2007

    • Author(s)
      伊豆哲也
    • Journal Title

      情報処理学会論文誌 Vol.48,No.9

      Pages: 2956-2965

    • Related Report
      2007 Annual Research Report
    • Peer Reviewed
  • [Journal Article] Ring Signatures: Universally Composable Definitions and Constructions2007

    • Author(s)
      Kazuki Yoneyama
    • Journal Title

      情報処理学会論文誌 Vol.48,No.9

      Pages: 2976-2989

    • Related Report
      2007 Annual Research Report
    • Peer Reviewed
  • [Journal Article] Universally Composable Client-to-Client General Authenticated Key Exchange2007

    • Author(s)
      Haruki Ota
    • Journal Title

      情報処理学会論文誌 Vol.48,No.9

      Pages: 3073-3088

    • NAID

      130000058245

    • Related Report
      2007 Annual Research Report
    • Peer Reviewed
  • [Journal Article] A novel steganographic system with information integrity2007

    • Author(s)
      Youngran Park
    • Journal Title

      IEICE EIectron. Express Vol.4,No.12

      Pages: 393-399

    • Related Report
      2007 Annual Research Report
    • Peer Reviewed
  • [Journal Article] Tracing Illegal Users of Video: Reconsideration of Tree-Specific and Endbuyer-Specific Methods2007

    • Author(s)
      Hyunho Kang
    • Journal Title

      Lecture Notes in Computer Science, Springer-Verlag Vol.4707,Part III

      Pages: 1046-1055

    • Related Report
      2007 Annual Research Report
    • Peer Reviewed
  • [Journal Article] A further consideration on the HK and the CMG regions for the interference channel2007

    • Author(s)
      Kingo Kobayashi
    • Journal Title

      Proceeding on 2006 Information Theory and Applications Workshop

      Pages: 18-18

    • Related Report
      2006 Annual Research Report
  • [Journal Article] Tracing Illegal Users of Video : Reconsideration of Tree-Specific and Endbuyer-Specific Methods2007

    • Author(s)
      Hyunho Kang
    • Journal Title

      Lecture Notes in Computer Science Springer-Verlag (will be published)

    • Related Report
      2006 Annual Research Report
  • [Journal Article] ウェーブレット変換に基づく誤り訂正符号を用いた改ざん復元可能電子透かし2007

    • Author(s)
      辰巳 輝洋
    • Journal Title

      2007年 暗号と情報セキュリティシンポジウム

    • Related Report
      2006 Annual Research Report
  • [Journal Article] 攻撃に応じた復号を行う振幅変調型電子透かし法の提案2007

    • Author(s)
      久保田 淳哉
    • Journal Title

      2007年 暗号と情報セキュリティシンポジウム

    • Related Report
      2006 Annual Research Report
  • [Journal Article] Watermarking with permissible alterations2007

    • Author(s)
      姜 玄浩
    • Journal Title

      2007年 暗号と情報セキュリテイシンポジウム

    • Related Report
      2006 Annual Research Report
  • [Journal Article] 心理聴覚モデルとパッチワークアルゴリズムを用いた音楽電子透かし2007

    • Author(s)
      山口 恒太郎
    • Journal Title

      2007年 暗号と情報セキュリテイシンポジウム

    • Related Report
      2006 Annual Research Report
  • [Journal Article] QIM Audio Watermarking with Distortion Compensated Property2007

    • Author(s)
      R.Martinez-Noriega
    • Journal Title

      2007年 暗号と情報セキュリテイシンポジウム

    • Related Report
      2006 Annual Research Report
  • [Journal Article] Pixel Based Steganography with Integrity2007

    • Author(s)
      朴 英蘭
    • Journal Title

      2007年 暗号と情報セキュリティシンポジウム

    • Related Report
      2006 Annual Research Report
  • [Journal Article] 電子透かし方式における誤り証符号と符号化変調に関する諸問題2007

    • Author(s)
      山口和彦
    • Journal Title

      電子情報通信学会ブソサイエティ合同研究会技術報告情報理論・情報セキュリティワイドバンドシステム IT2006-84

      Pages: 135-140

    • Related Report
      2006 Annual Research Report
  • [Journal Article] Improved Collision Attacks on MD4 and MD52007

    • Author(s)
      Yu SASAKI
    • Journal Title

      IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences E90-A, No.1

      Pages: 36-47

    • Related Report
      2006 Annual Research Report
  • [Journal Article] Toward the Fair Anonymous Signatures : Deniable Ring Signatures2007

    • Author(s)
      Yuichi KOMANO
    • Journal Title

      IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, E90-A, No.1

      Pages: 54-64

    • Related Report
      2006 Annual Research Report
  • [Journal Article] Universally Composable Hierarchical Hybrid Authenticated Key Exchange2007

    • Author(s)
      Haruki OTA
    • Journal Title

      IEICE Transactions on Fundamentals of Electronics, Communicaticns and Computer Sciences, E90-A, No.1

      Pages: 139-151

    • NAID

      110007519082

    • Related Report
      2006 Annual Research Report
  • [Journal Article] The Quantum Fourier Transform on a Linear Nearest Neighbor Architecture2007

    • Author(s)
      Yasuhiro Takahashi
    • Journal Title

      Quantum Information and Computation Vol.7 No.4

      Pages: 383-391

    • Related Report
      2006 Annual Research Report
  • [Journal Article] Provably Secure Untraceable Electronic Cash against Insider Attacks2007

    • Author(s)
      Yoshikazu Hanatani
    • Journal Title

      IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences E90-A, No.5(to appear)

    • Related Report
      2006 Annual Research Report
  • [Journal Article] Constant-Round Multiparty Computation for Interval Test, Equality Test, and Comparison2007

    • Author(s)
      Takashi Nishide
    • Journal Title

      IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences E90-A, No.5(to appear)

    • Related Report
      2006 Annual Research Report
  • [Journal Article] New Message Difference for MD42007

    • Author(s)
      Yu Sasaki
    • Journal Title

      Proc. of FSE 2007 (to appear)

    • Related Report
      2006 Annual Research Report
  • [Journal Article] Deterministic Polynomial Time Equivalence between Factoring and Key-Reco very Attack on Takagi's RSA2007

    • Author(s)
      Noboru Kunihiro
    • Journal Title

      Proc. of PKC2007, LNCS4450

      Pages: 412-425

    • NAID

      10026851468

    • Related Report
      2006 Annual Research Report
  • [Journal Article] Multiparty Computation for Interval, Equality, and Comparison without Bit-Decomposition Protocol2007

    • Author(s)
      Takashi Nishide
    • Journal Title

      Proc. of PKC2007, LNCS4450

      Pages: 343-360

    • Related Report
      2006 Annual Research Report
  • [Journal Article] A Sanitizable Signature Scheme with Aggregation2007

    • Author(s)
      Tetsuya Izu
    • Journal Title

      Proc. of ISPEC2007 (to appear)

    • Related Report
      2006 Annual Research Report
  • [Journal Article] Visual Secret Sharing Schemes for Multiple Secret Images Allowing the Rotationof Shares2006

    • Author(s)
      M. Iwamoto, L. Wang, K. Yoneyama, N. Kunihiro and K. Ohta
    • Journal Title

      IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences Vol.E89-A, No.5

      Pages: 1382-1395

    • Related Report
      2008 Final Research Report
    • Peer Reviewed
  • [Journal Article] Percolation on a k-ary Tree2006

    • Author(s)
      Kingo Kobayashi
    • Journal Title

      Lecture Notes in Computer Science 4123

      Pages: 633-638

    • Related Report
      2006 Annual Research Report
  • [Journal Article] Capacity Problem of Trapdoor Channel2006

    • Author(s)
      Kingo Kobayashi
    • Journal Title

      Lecture Notes in Computer Science 4123

      Pages: 1084-1087

    • Related Report
      2006 Annual Research Report
  • [Journal Article] Multi-user Information Theory Revisited2006

    • Author(s)
      Kingo Kobayashi
    • Journal Title

      Proceeding on International Symposium on Advanced Robotics and Machine Intelligence

      Pages: 67-67

    • Related Report
      2006 Annual Research Report
  • [Journal Article] A note on the capacity problem for interference channels2006

    • Author(s)
      Kingo Kobayashi
    • Journal Title

      Proceeding on 2006 Information Theory and Applications Workshop

      Pages: 105-105

    • Related Report
      2006 Annual Research Report
  • [Journal Article] A comparison between WB algorithm and BM algorithm2006

    • Author(s)
      S.Sakata
    • Journal Title

      Proceedings of 2006 International Symposium on Information Theory and its Applications, Seoul. Korea (CD-ROM)

      Pages: 5-5

    • Related Report
      2006 Annual Research Report
  • [Journal Article] Turbo Equalization with Single-Parity Check Codes and Unequal Error Protection Codes2006

    • Author(s)
      B.Kurkoski
    • Journal Title

      IEEE Trans. on Magnetics 42・10

      Pages: 2579-2581

    • Related Report
      2006 Annual Research Report
  • [Journal Article] A viable system for tracing illegal users of video2006

    • Author(s)
      Hyunho Kang
    • Journal Title

      Lecture Notes in Computer Science Springer-Verlag 3917

      Pages: 156-158

    • Related Report
      2006 Annual Research Report
  • [Journal Article] Turbo Equalization as a Post-Processor for Partial-Response Channels2006

    • Author(s)
      B.Kurkoski
    • Journal Title

      IEEE Int. Magnetics Conf.

      Pages: 303-304

    • Related Report
      2006 Annual Research Report
  • [Journal Article] Tracing Illegal Users of Video : Practical Use of Content Distribution Tree2006

    • Author(s)
      Hyunho Kang
    • Journal Title

      International Symposium on Advanced ICT (AICT2006)

    • Related Report
      2006 Annual Research Report
  • [Journal Article] Study on Turbo Decoding Using Hard Decision Decoder-Principle of Hard-in Soft-out Decoding2006

    • Author(s)
      K.Yamaguchi
    • Journal Title

      2006 International Symposium on Information Theory and Its Applications (ISITA2006)

      Pages: 114-118

    • Related Report
      2006 Annual Research Report
  • [Journal Article] Specifying the Subtree Number of a Content Distribution Tree Using Visual Cryptography2006

    • Author(s)
      H.Kang
    • Journal Title

      2006 International Symposium on Information Theory and Its Applications (ISITA2006)

      Pages: 161-165

    • Related Report
      2006 Annual Research Report
  • [Journal Article] Improvements and Extensions of Low-Rate Turbo-Hadamard Codes2006

    • Author(s)
      N.Shimanuki
    • Journal Title

      2006 International Symposium on Information Theory and Its Applications (ISITA2006)

      Pages: 218-223

    • Related Report
      2006 Annual Research Report
  • [Journal Article] Detecting malicious attacks using semi-fragile watermark based on visual model2006

    • Author(s)
      H.Kang
    • Journal Title

      IEEE Mexican Conf. on Informatics Security 2006 (MCIS2006)

    • Related Report
      2006 Annual Research Report
  • [Journal Article] Increasing Robustness of Audio Watermarking DM using ATHC Codes2006

    • Author(s)
      R.Martinez-Noriega
    • Journal Title

      IEEE Mexican Conf. on Informatics Security 2006 (MCIS2006)

    • Related Report
      2006 Annual Research Report
  • [Journal Article] Noise Thresholds for GF(q) LDPC Codes Using Reduced-Complexity Decoding2006

    • Author(s)
      Brian Kurkoski
    • Journal Title

      第29回 情報理論とその応用シンポジウム予稿集

      Pages: 827-830

    • Related Report
      2006 Annual Research Report
  • [Journal Article] Integrity Verification of Secret Information in Image Steganography2006

    • Author(s)
      Youngran PARK
    • Journal Title

      第29回 情報理論とその応用シンポジウム予稿集

      Pages: 481-484

    • Related Report
      2006 Annual Research Report
  • [Journal Article] 魔方陣を利用するビデオの違法配信の探知2006

    • Author(s)
      姜 玄浩
    • Journal Title

      第29回 情報理論とその応用シンポジウム予稿集

      Pages: 485-487

    • Related Report
      2006 Annual Research Report
  • [Journal Article] ネットワーク符号化を用いた効率的なファイル配布法2006

    • Author(s)
      青柳慎一
    • Journal Title

      第29回情報理論とその応用シンポジウム予稿集,函館,Nov.28-Dec.1, 2006 I

      Pages: 223-226

    • Related Report
      2006 Annual Research Report
  • [Journal Article] ネットワーク符号化とある種の線型変換2006

    • Author(s)
      栗原正純
    • Journal Title

      電子情報通信学会 技術研究報告 情報理論 IT2006-41

      Pages: 37-42

    • NAID

      110004811964

    • Related Report
      2006 Annual Research Report
  • [Journal Article] セキュアネットワーク符号化アルゴリズム2006

    • Author(s)
      栗原正純
    • Journal Title

      第29回情報理論とその応用シンポジウム予稿集,函館,Nov.28-Dec.1, 2006 II

      Pages: 763-766

    • Related Report
      2006 Annual Research Report
  • [Journal Article] A quantum circuit for Shot's factoring algorithm using 2n+2 qubits2006

    • Author(s)
      Yasuhiro Takahashi
    • Journal Title

      Quantum Information and Computation, 6・2

      Pages: 184-192

    • Related Report
      2006 Annual Research Report
  • [Journal Article] Taxonomical Security Consideration of OAEP Variants2006

    • Author(s)
      Yuichi Komano
    • Journal Title

      IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences E89-A, No.5

      Pages: 1233-1245

    • Related Report
      2006 Annual Research Report
  • [Journal Article] Visual Secret Sharing Schemes for Multiple Secret Images Allowing the Rotation of Shares2006

    • Author(s)
      Mitsugu Iwamoto
    • Journal Title

      IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, E89-A, No.5

      Pages: 1382-1395

    • Related Report
      2006 Annual Research Report
  • [Journal Article] Maurer-Yacobi ID based Key Distribution Revisited2006

    • Author(s)
      N.Kunihiro
    • Journal Title

      IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, E89-A, No.5

      Pages: 1421-1424

    • NAID

      110007502858

    • Related Report
      2006 Annual Research Report
  • [Journal Article] 双線形写像を用い墨塗り署名方式の安全性について2006

    • Author(s)
      伊豆哲也
    • Journal Title

      情報処理学会論文誌 Vol.47, No.7

      Pages: 2409-2416

    • Related Report
      2006 Annual Research Report
  • [Journal Article] Toward the Fair Anonymous Signatures : Deniable Ring Signatures2006

    • Author(s)
      Yuichi Komano
    • Journal Title

      Proceedings of CT-RSA2006, LNCS 3860

      Pages: 174-191

    • Related Report
      2006 Annual Research Report
  • [Journal Article] Provable Secure Electronic Cash based on Blind Multisignature schemes2006

    • Author(s)
      Yoshikazu Hanatani
    • Journal Title

      In Proceedings of Financial Cryptography 2006, LNCS4107

      Pages: 198-212

    • Related Report
      2006 Annual Research Report
  • [Journal Article] Formal Security Model of Multisignatures2006

    • Author(s)
      Yuichi Komano
    • Journal Title

      In Proc. of ISC2006,LNCS4l76

      Pages: 146-160

    • Related Report
      2006 Annual Research Report
  • [Journal Article] How to Construct Sufficient Conditions for Hash Functions2006

    • Author(s)
      Yu Sasaki
    • Journal Title

      In Proc. of Vietcrypt2006, LNCS434l

      Pages: 115-130

    • Related Report
      2006 Annual Research Report
  • [Journal Article] Factoring Square-free Composite Integer by solving Multivariate Integer Polynomial Equations2006

    • Author(s)
      Bagus Santoso
    • Journal Title

      Proc. of Vietcrypt2006, LNCS4341

      Pages: 243-259

    • Related Report
      2006 Annual Research Report
  • [Journal Article] Universally Composable Ring Signature2006

    • Author(s)
      Kazuki Yoneyama
    • Journal Title

      Proc. of IWSEC2006

    • Related Report
      2006 Annual Research Report
  • [Journal Article] Improved Collision Search for SHA-02006

    • Author(s)
      Yusuke Naito
    • Journal Title

      Proc.of Asiacrypt2006. LNCS4284

      Pages: 21-36

    • Related Report
      2006 Annual Research Report
  • [Presentation] An overview of Multi User Information Theory2009

    • Author(s)
      K. Kobayashi
    • Organizer
      Invited Lecture at Xidian University
    • Place of Presentation
      Xian, China
    • Year and Date
      2009-06-13
    • Related Report
      2008 Final Research Report
  • [Presentation] 暗号系の安全性証明不可能性の統一的アプローチを目指して--設計ゴール, 攻撃シナリオ, 数論仮定のトレードオフ--2009

    • Author(s)
      太田和夫
    • Organizer
      第3回公開鍵暗号の安全な構成とその応用ワークショップ
    • Place of Presentation
      東京
    • Year and Date
      2009-03-23
    • Related Report
      2008 Annual Research Report
  • [Presentation] A New Approach for Implementing the MPL Method toward Higher SPA Resistance2009

    • Author(s)
      Masami Izumi
    • Organizer
      The Forth International Conference on Availability, Reliability and Security (AReS 2009)
    • Place of Presentation
      Fukuoka, Japan
    • Year and Date
      2009-03-17
    • Related Report
      2008 Annual Research Report
  • [Presentation] An Overview of Multi-User Information Theory2009

    • Author(s)
      K. Kobayashi
    • Organizer
      Invited Lecture at Xidian University
    • Place of Presentation
      Xian, China
    • Year and Date
      2009-03-13
    • Related Report
      2008 Annual Research Report
  • [Presentation] ランプ型秘密分散法を利用した動画像向け電子透かし2009

    • Author(s)
      齋藤真吾
    • Organizer
      電子情報通信学会, サブソサイエティ合同研究会研究会, IT2008-105, ISEC2008-168, WBS2008-118, pp. 409-414
    • Place of Presentation
      公立はこだて未来大学
    • Year and Date
      2009-03-10
    • Related Report
      2008 Annual Research Report
  • [Presentation] クリッピング攻撃耐性を有するLDPC符号化による音楽電子透かし方式とその自己同期復号-抽出アルゴリズム(2)2009

    • Author(s)
      阿部功
    • Organizer
      電子情報通信学会, サブソサイエティ合同研究. 会研究会, IT2008-106, ISEC2008-169, WBS2008-119, pp. 415-420
    • Place of Presentation
      公立はこだて未来大学
    • Year and Date
      2009-03-10
    • Related Report
      2008 Annual Research Report
  • [Presentation] Capacity Problem of Finite State Channels2009

    • Author(s)
      K. Kobayashi
    • Organizer
      Invited Lecture at Xidian University
    • Place of Presentation
      Xian, China
    • Year and Date
      2009-03-09
    • Related Report
      2008 Annual Research Report 2008 Final Research Report
  • [Presentation] CryptoVerif の証明能力の改良 : 誤った判定の回避2009

    • Author(s)
      花谷嘉一
    • Organizer
      日本応用数理学会2009年春の研究部会連合発表会, 「数理的技法による情報セキュリティ」研究部会(FAIS)
    • Place of Presentation
      京都
    • Year and Date
      2009-03-07
    • Related Report
      2008 Annual Research Report
  • [Presentation] Considerations on the capacity problem of finite state channels2009

    • Author(s)
      K. Kobayashi
    • Organizer
      2009 Information Theory and Applications Workshop
    • Place of Presentation
      San Diego, USA
    • Year and Date
      2009-02-09
    • Related Report
      2008 Final Research Report
  • [Presentation] Considerations on the capacity problem of finite statechannels2009

    • Author(s)
      K. Kobayashi
    • Organizer
      2009 Information Theory and Applications Workshop
    • Place of Presentation
      San Diego, USA
    • Year and Date
      2009-02-09
    • Related Report
      2008 Annual Research Report
  • [Presentation] Improvement of a Lattice Based Cryptosystem Using Polynomial Ring2009

    • Author(s)
      Tomotaka Hanawa
    • Organizer
      暗号と情報セキュリティシンポジウム(SCIS2009)
    • Place of Presentation
      大津
    • Year and Date
      2009-01-23
    • Related Report
      2008 Annual Research Report
  • [Presentation] CryptoVerifを用いたFDH署名の緊密な安全性証明の検討2009

    • Author(s)
      花谷 嘉一
    • Organizer
      暗号と情報セキュyティシンポジウム(SCIS2009)
    • Place of Presentation
      大津
    • Year and Date
      2009-01-23
    • Related Report
      2008 Annual Research Report
  • [Presentation] 安全性検証ツールCryptoVerifの改良 : 異常終了に対する一対策2009

    • Author(s)
      角野 陽輔
    • Organizer
      暗号と情報セキュリティシンポジウム(SCIS2009)
    • Place of Presentation
      大津
    • Year and Date
      2009-01-23
    • Related Report
      2008 Annual Research Report
  • [Presentation] 委託可能検証者指定署名の改良2009

    • Author(s)
      牛田 芽生恵
    • Organizer
      暗号と情報セキュリティシンポジウム(SCIS2009)
    • Place of Presentation
      大津
    • Year and Date
      2009-01-23
    • Related Report
      2008 Annual Research Report
  • [Presentation] Improved Authentication Steganography using the Variance of Adjacent Pixels : Block-based approach2009

    • Author(s)
      Youngran Park
    • Organizer
      電子情報通信学会, 2009年暗号と情報セキュリティシンポジウム(SCIS2009), 4F2-5, No. 2D2-6
    • Place of Presentation
      大津
    • Year and Date
      2009-01-23
    • Related Report
      2008 Annual Research Report
  • [Presentation] Universally Composable Fair Voucher Exchange2009

    • Author(s)
      Kazuki Yoneyama
    • Organizer
      暗号と情報セキュリティシンポジウム(SCIS2009)
    • Place of Presentation
      大津
    • Year and Date
      2009-01-22
    • Related Report
      2008 Annual Research Report
  • [Presentation] Yet Another New ' On the Fly' Identification Scheme : Reducing Memory Cost by Improving Zero-Knowledgeness2009

    • Author(s)
      Bagus Santoso
    • Organizer
      暗号と情報セキュリティシンポジウム(SCIS2009)
    • Place of Presentation
      大津
    • Year and Date
      2009-01-22
    • Related Report
      2008 Annual Research Report
  • [Presentation] ブルームフィルタの設計論とそのAPOPパスワード復元攻撃検知への応用2009

    • Author(s)
      坂井 祐介
    • Organizer
      暗号と情報セキュリティシンポジウム(SCIS2009)
    • Place of Presentation
      大津
    • Year and Date
      2009-01-22
    • Related Report
      2008 Annual Research Report
  • [Presentation] APOP攻撃検知法の提案とシミュレーションによる検証 : 目には目を, 歯には歯を2009

    • Author(s)
      奥秋 清次
    • Organizer
      暗号と情報セキュリティシンポジウム(SCIS2009)
    • Place of Presentation
      大津
    • Year and Date
      2009-01-22
    • Related Report
      2008 Annual Research Report
  • [Presentation] 計算量仮定を考慮した一般的なメタ帰着の構成2009

    • Author(s)
      川合 豊
    • Organizer
      暗号と情報セキュリティシンポジウム(SCIS2009)
    • Place of Presentation
      大津
    • Year and Date
      2009-01-22
    • Related Report
      2008 Annual Research Report
  • [Presentation] Public-key Encryption with Fuzzy Keyword Search2009

    • Author(s)
      服部充洋
    • Organizer
      暗号と情報セキュリティシンポジウム(SCIS2009)
    • Place of Presentation
      大津
    • Year and Date
      2009-01-22
    • Related Report
      2008 Annual Research Report
  • [Presentation] A faster attack on MD5-based challenge and response protocols2009

    • Author(s)
      Lei Wang
    • Organizer
      暗号と情報セキュリティシンポジウム(SCIS2009)
    • Place of Presentation
      大津
    • Year and Date
      2009-01-21
    • Related Report
      2008 Annual Research Report
  • [Presentation] 高周波クロックによるRSL技術を用いたAESへのフォールド攻撃実験2009

    • Author(s)
      八木達哉
    • Organizer
      暗号と情報セキュリティシンポジウム(SCIS2009)
    • Place of Presentation
      大津
    • Year and Date
      2009-01-21
    • Related Report
      2008 Annual Research Report
  • [Presentation] フォールド混入時におけるRSL 技術による暗号回路モデルを用いた安全性解析2009

    • Author(s)
      泉 雅巳
    • Organizer
      暗号と情報セキュリティシンポジウム(SCIS2009)
    • Place of Presentation
      大津
    • Year and Date
      2009-01-21
    • Related Report
      2008 Annual Research Report
  • [Presentation] より効率的な秘匿情報検索2009

    • Author(s)
      北原 恵介
    • Organizer
      暗号と情報セキュリティシンポジウム(SCIS2009)
    • Place of Presentation
      大津
    • Year and Date
      2009-01-21
    • Related Report
      2008 Annual Research Report
  • [Presentation] Merkle-Damgard構造の強識別不可能性(Indifferentiability)の再考2009

    • Author(s)
      内藤 祐介
    • Organizer
      暗号と情報セキュリティシンポジウム(SCIS2009)
    • Place of Presentation
      大津
    • Year and Date
      2009-01-21
    • Related Report
      2008 Annual Research Report
  • [Presentation] Authentication Condition Hidingを満たす複数グループ用Secret Handshakeの提案2009

    • Author(s)
      丹野 翔太郎
    • Organizer
      暗号と情報セキュリティシンポジウム(SCIS2009)
    • Place of Presentation
      大津
    • Year and Date
      2009-01-21
    • Related Report
      2008 Annual Research Report
  • [Presentation] 証明可能安全なアルゴリズム的耐タンパ認証装置(その2)2009

    • Author(s)
      駒野 雄一
    • Organizer
      暗号と情報セキュリティシンポジウム(SCIS2009)
    • Place of Presentation
      大津
    • Year and Date
      2009-01-21
    • Related Report
      2008 Annual Research Report
  • [Presentation] Adaptive Dither Modulation Audio Watermarking with LDPC Decoding Based on Rayleigh Fading Channel2009

    • Author(s)
      Martinez-Noriega Raul
    • Organizer
      電子情報通信学会, 2009年暗号と情報セキュリティシンポジウム(SCIS2009), NO. 2D2-3
    • Place of Presentation
      大津
    • Year and Date
      2009-01-21
    • Related Report
      2008 Annual Research Report
  • [Presentation] Adaptive Image Data Hiding using DCT Steganographic and Error Correcting Codes2009

    • Author(s)
      Velasco-Bautista Carlos
    • Organizer
      電子情報通信学会, 2009年暗号と情報セキュリティシンポジウム(SCIS2009), No. 2D2-5
    • Place of Presentation
      大津
    • Year and Date
      2009-01-21
    • Related Report
      2008 Annual Research Report
  • [Presentation] LDPC符号を用いた音楽電子透かし方式のクリツピング攻撃耐性に関する研究2009

    • Author(s)
      小林佑介
    • Organizer
      電子情報通信学会, 2009年暗号と情報セキュリティシンポジウム(SCIS2009), No. 2D2-6
    • Place of Presentation
      大津
    • Year and Date
      2009-01-21
    • Related Report
      2008 Annual Research Report
  • [Presentation] Visual Secret Sharing Schemes for Multiple Secret Images Allowing the 90-degree Rotation of Shares2009

    • Author(s)
      Yang Li
    • Organizer
      暗号と情報セキュリティシンポジウム(SCIS2009)
    • Place of Presentation
      大津
    • Year and Date
      2009-01-20
    • Related Report
      2008 Annual Research Report
  • [Presentation] コンテンツ配信における追跡率向上可能な結託耐性符号の新しい運用法2009

    • Author(s)
      入口 吉信
    • Organizer
      電子情報通信学会, 2009年暗号と情報セキュリティシンポジウム(SCIS2009), No. lDl-2
    • Place of Presentation
      大津
    • Year and Date
      2009-01-20
    • Related Report
      2008 Annual Research Report
  • [Presentation] Efficient and Strongly Secure Password-based Server Aided Key Exchange2008

    • Author(s)
      Kazuki Yoneyama
    • Organizer
      International Conference on Cryptology in India (IND0CRYPT2008), LNCS5365, pp. 172-184, 2008
    • Place of Presentation
      Kharagpur, India
    • Year and Date
      2008-12-16
    • Related Report
      2008 Annual Research Report
  • [Presentation] Security Analyses on Cryptographic Protocols against Strong Adversaries using Task-structured PIOA Framework2008

    • Author(s)
      Kazuki Yoneyaraa
    • Organizer
      The 4th Franco-Japanese Computer Security Workshop
    • Place of Presentation
      Tokyo, Japan
    • Year and Date
      2008-12-05
    • Related Report
      2008 Annual Research Report
  • [Presentation] Leaky Random Oracle2008

    • Author(s)
      Kazuki Yoneyama
    • Organizer
      International Conference on Provable Security (ProvSec2008), LNCS5324, pp. 226-240, 2008
    • Place of Presentation
      Shanghai, China
    • Year and Date
      2008-10-31
    • Related Report
      2008 Annual Research Report
  • [Presentation] 証明可能安全なアルゴリズム的対タンパ認証装置2008

    • Author(s)
      駒野 雄一
    • Organizer
      コンピュータセキュリティシンポジウムCSS2008
    • Place of Presentation
      沖縄
    • Year and Date
      2008-10-10
    • Related Report
      2008 Annual Research Report
  • [Presentation] 安全性証明ツールCryptoVerif の証明能力に関する一考察2008

    • Author(s)
      花谷 嘉一
    • Organizer
      コンピュータセキュリティシンポジウムCSS2008
    • Place of Presentation
      沖縄
    • Year and Date
      2008-10-10
    • Related Report
      2008 Annual Research Report
  • [Presentation] グループ管理者に対する匿名性を考慮したSecret Handshake2008

    • Author(s)
      川合 豊
    • Organizer
      コンピュータセキュリティシンポジウムCSS2008
    • Place of Presentation
      沖縄
    • Year and Date
      2008-10-10
    • Related Report
      2008 Annual Research Report
  • [Presentation] 委託可能検証者指定署名の再考2008

    • Author(s)
      牛田 芽生恵
    • Organizer
      コンピュータセキュリティシンポジウムCSS2008
    • Place of Presentation
      沖縄
    • Year and Date
      2008-10-10
    • Related Report
      2008 Annual Research Report
  • [Presentation] eTCR性とTCR性の間の定義の考察2008

    • Author(s)
      内藤祐介
    • Organizer
      コンピュータセキュリティシンポジウムCSS2008
    • Place of Presentation
      沖縄
    • Year and Date
      2008-10-10
    • Related Report
      2008 Annual Research Report
  • [Presentation] Steganography in Color Images Using Entropy Thresholding Scheme2008

    • Author(s)
      Carlos Velasco
    • Organizer
      情報理論とその応用学会, 第31回情報理論とその応用シンポジウム, No. 6.2.1
    • Place of Presentation
      鬼怒川
    • Year and Date
      2008-10-09
    • Related Report
      2008 Annual Research Report
  • [Presentation] Improved Authentication Steganography Using the Variance of Adjacent Pixels2008

    • Author(s)
      Youngran Park
    • Organizer
      情報理論とその応用学会, 第31回情報理論とその応用シンポジウム, No. 6.2.2
    • Place of Presentation
      鬼怒川
    • Year and Date
      2008-10-09
    • Related Report
      2008 Annual Research Report
  • [Presentation] クリツピング攻撃耐性を有するLDPC符号化による音声電子透かし方式とその自己同期復号-抽出アルゴリズム2008

    • Author(s)
      小林佑介
    • Organizer
      情報理論とその応用学会, 第31回情報理論とその応用シンポジウム, No. 7.2.2
    • Place of Presentation
      鬼怒川
    • Year and Date
      2008-10-09
    • Related Report
      2008 Annual Research Report
  • [Presentation] Performance of Quantization-Based Watermarking Methods Using LDPC Codes2008

    • Author(s)
      Isao Abe
    • Organizer
      情報理論とその応用学会, 第31回情報理論とその応用シンポジウム, No. 7.2.5
    • Place of Presentation
      鬼怒川
    • Year and Date
      2008-10-09
    • Related Report
      2008 Annual Research Report
  • [Presentation] ネットワークコーディングにおける誤り訂正符号の復号法についての一検討2008

    • Author(s)
      栗原正純
    • Organizer
      情報理論とその応用学会2008情報理論とその応用シンポジウム
    • Place of Presentation
      鬼怒川温泉あさやホテル(栃木県日光市)(No.4.1.5)
    • Year and Date
      2008-10-08
    • Related Report
      2008 Final Research Report
  • [Presentation] Does The Montgomery Powering Ladder Method Really Offer SPA Resistance?2008

    • Author(s)
      Masami Izumi
    • Organizer
      Triangle Symposium on Advanced ICT 2008 (TriSAI 2008), pp. 328-333, 2008.
    • Place of Presentation
      Daejeon, Korea
    • Year and Date
      2008-10-08
    • Related Report
      2008 Annual Research Report
  • [Presentation] Extension of Secret Handshake Protocols with Multiple Groups in Monotone Condition under DDH Assumption2008

    • Author(s)
      Shotaro Tanno
    • Organizer
      Triangle Symposium on Advanced ICT 2008 (TriSAI 2008), pp. 181-186, Oct. 2008
    • Place of Presentation
      Daejeon, Korea
    • Year and Date
      2008-10-08
    • Related Report
      2008 Annual Research Report
  • [Presentation] [特別講演]いくつかの有限状態通信路の通信路容量について2008

    • Author(s)
      小林欣吾
    • Organizer
      電子情報通信学会情報理論研究会
    • Place of Presentation
      鬼怒川温泉あさやホテル(栃木県日光市)
    • Year and Date
      2008-10-07
    • Related Report
      2008 Final Research Report
  • [Presentation] いくつかの有限状態通信路の通信路容量について2008

    • Author(s)
      小林欣吾
    • Organizer
      電子情報通信学会情報理論研究専門委員会若手のための講演会, 電子情報通信学会技術報告情報理論, IT2008-39, pp. 1-5
    • Place of Presentation
      鬼怒川
    • Year and Date
      2008-10-07
    • Related Report
      2008 Annual Research Report
  • [Presentation] Extension of Secret Handshake Protocols with Multiple Groups in Monotone Condition2008

    • Author(s)
      Yutaka Kawai
    • Organizer
      International Workshop on Information Security Applications (WISA2008), 2008
    • Place of Presentation
      Jeju Island, Korea
    • Year and Date
      2008-09-24
    • Related Report
      2008 Annual Research Report
  • [Presentation] PINを用いるアルゴリズム的耐タンパ認証装置の安全性について2008

    • Author(s)
      駒野 雄一
    • Organizer
      電子情報通信学会2008年ソサイェテイ大会
    • Place of Presentation
      川崎
    • Year and Date
      2008-09-16
    • Related Report
      2008 Annual Research Report
  • [Presentation] MD4を用いたチャレンジ&レスポンス認証に対する現実的な攻撃2008

    • Author(s)
      佐々木悠
    • Organizer
      電子情報通信学会2008年ソサイエティ大会
    • Place of Presentation
      川崎
    • Year and Date
      2008-09-16
    • Related Report
      2008 Annual Research Report
  • [Presentation] 複数の計算量仮定を組み込んだメタ帰着技法による安全性解析〜ElGamal暗号の場合〜2008

    • Author(s)
      川合 豊
    • Organizer
      情報セキュリティ研究会(ISEC)ISEC2008-70, pp. 47-54
    • Place of Presentation
      東京
    • Year and Date
      2008-09-12
    • Related Report
      2008 Annual Research Report
  • [Presentation] Performance of LDPC Codes in Quantization-Based Watermarking2008

    • Author(s)
      Kazuhiko YAMAGUCHI
    • Organizer
      LDPC符号ワークショップ実行委員会およびIEEEIT Society Japan Chapter, LDPC符号ワークショップ
    • Place of Presentation
      沖縄
    • Year and Date
      2008-09-12
    • Related Report
      2008 Annual Research Report
  • [Presentation] Anonymous Message Authentication : Universally Composable Definition and Construction2008

    • Author(s)
      Kazuki Yoneyama
    • Organizer
      International Conference on Security and Cryptography (SECRYPT2008), pp. 351-354, 2008
    • Place of Presentation
      Porto, Portugal
    • Year and Date
      2008-07-28
    • Related Report
      2008 Annual Research Report
  • [Presentation] 結託耐性符号の追跡率を上げる運用法2008

    • Author(s)
      入口吉信
    • Organizer
      電子情報通信学会, 情報理論研究会, IT2008-14, pp. 33-38
    • Place of Presentation
      柏
    • Year and Date
      2008-07-24
    • Related Report
      2008 Annual Research Report
  • [Presentation] Modular Multiplication in GF(2n)without Pre-computational Phase2008

    • Author(s)
      Miroslav Knezevic
    • Organizer
      WAIFI2008, LNCS5130, pp. 77-87, 2008
    • Place of Presentation
      Siena, Italy
    • Year and Date
      2008-07-08
    • Related Report
      2008 Annual Research Report
  • [Presentation] On the High-Throughput Implementation of RIPEMD-160 Hash Algorithm2008

    • Author(s)
      Miroslav Knezevic
    • Organizer
      ASAP2008, pp. 85-90, 2008
    • Place of Presentation
      Leuven, Belgium
    • Year and Date
      2008-07-02
    • Related Report
      2008 Annual Research Report
  • [Presentation] Attribute-Based Encryption with Partially Hidden Encryptor-Specified Access Structures2008

    • Author(s)
      Takashi Nishide
    • Organizer
      International Conference on Applied Cryptography and Network Security (ACNS2008), LNCS5037, pp. 111-129, 2008
    • Place of Presentation
      New York, USA
    • Year and Date
      2008-06-03
    • Related Report
      2008 Annual Research Report
  • [Presentation] PINを用いるアルゴリズム的耐タンパ認証装置の再考(その2)2008

    • Author(s)
      駒野 雄一
    • Organizer
      情報セキュリティ研究会(ISEC)
    • Place of Presentation
      東京
    • Year and Date
      2008-05-16
    • Related Report
      2008 Annual Research Report
  • [Presentation] New Key Recovery Attack on HMAC/NMAC-MD4 and NMAC-MD52008

    • Author(s)
      Lei Wang
    • Organizer
      Eurocrypt2008, LNCS vol. 4965, pp. 27-253, 2008
    • Place of Presentation
      Istanbul, Turkey
    • Year and Date
      2008-04-15
    • Related Report
      2008 Annual Research Report
  • [Presentation] パスワードベース認証つき鍵交換の安全性における(不)可能性2008

    • Author(s)
      米山, 一樹
    • Organizer
      電子情報通信学会 総合大会
    • Place of Presentation
      北九州
    • Year and Date
      2008-03-20
    • Related Report
      2007 Annual Research Report
  • [Presentation] Password Recovery Attack on Authentication Protocol MD4(Password||Challenge)2008

    • Author(s)
      Lei Wang
    • Organizer
      ACM Symposium on Information, Computer & Communication Security(ASIACCS'08)
    • Place of Presentation
      Tokyo, Japan
    • Year and Date
      2008-03-18
    • Related Report
      2007 Annual Research Report
  • [Presentation] A Strict Evaluation Method on the Number of Conditions for the SHA-1 Collision Search2008

    • Author(s)
      Jun Yajima
    • Organizer
      ACM Symposium on Information, Computer & Communication Security(ASIACCS'08)
    • Place of Presentation
      Tokyo, Japan
    • Year and Date
      2008-03-18
    • Related Report
      2007 Annual Research Report
  • [Presentation] 研究グループが脆弱性を発見した場合にとるべき行動についての法的考察2008

    • Author(s)
      太田和夫
    • Organizer
      情報セキュリティ関係者を対象とした「暗号講座」
    • Place of Presentation
      東京
    • Year and Date
      2008-03-15
    • Related Report
      2007 Annual Research Report
  • [Presentation] Blanchet フレームワークにおけるCDH仮定の定式化方針について2008

    • Author(s)
      花谷, 嘉一
    • Organizer
      日本応用数理学会2008年春の研究部会連合発表会
    • Place of Presentation
      東京
    • Year and Date
      2008-03-08
    • Related Report
      2007 Annual Research Report
  • [Presentation] Task-PIOA:電子署名に対する能動的攻撃者の扱いについて2008

    • Author(s)
      米山, 一樹
    • Organizer
      日本応用数理学会2008年春の研究部会連合発表会
    • Place of Presentation
      東京
    • Year and Date
      2008-03-08
    • Related Report
      2007 Annual Research Report
  • [Presentation] 多重リング構造を用いたk-out-of-n署名方式の問題点と修正提案2008

    • Author(s)
      池田光明
    • Organizer
      電子情報通信学会 基礎境界ソサイエティ 情報セキュリティ研究会(ISEC)
    • Place of Presentation
      東京
    • Year and Date
      2008-02-29
    • Related Report
      2007 Annual Research Report
  • [Presentation] ハッシュリストの閲覧可能なランダムオラクルモデル2008

    • Author(s)
      米山一樹
    • Organizer
      電子情報通信学会 基礎境界ソサイエティ 情報セキュリティ研究会(ISEC)
    • Place of Presentation
      東京
    • Year and Date
      2008-02-28
    • Related Report
      2007 Annual Research Report
  • [Presentation] ハッシュ関数についての話題提供-APOP攻撃実験報告2008

    • Author(s)
      太田和夫
    • Organizer
      日本銀行金融研究所第10回情報セキュリティシンポジウム
    • Place of Presentation
      東京
    • Year and Date
      2008-02-05
    • Related Report
      2007 Annual Research Report
  • [Presentation] Attribute-Based Encryption with Hidden Encryptor-Specified Policies2008

    • Author(s)
      Takashi Nishide
    • Organizer
      暗号と情報セキュリティシンポジウム(SCIS2008)
    • Place of Presentation
      宮崎
    • Year and Date
      2008-01-25
    • Related Report
      2007 Annual Research Report
  • [Presentation] BlanchetのフレームワークにおけるCDH仮定の取り扱い2008

    • Author(s)
      花谷嘉一
    • Organizer
      暗号と情報セキュリティシンポジウム(SCIS2008)
    • Place of Presentation
      宮崎
    • Year and Date
      2008-01-25
    • Related Report
      2007 Annual Research Report
  • [Presentation] 複数グループ用Secret Handshakeの拡張方式の提案2008

    • Author(s)
      丹野 翔太郎
    • Organizer
      暗号と情報セキュリティシンポジウム(SCIS2008)
    • Place of Presentation
      宮崎
    • Year and Date
      2008-01-24
    • Related Report
      2007 Annual Research Report
  • [Presentation] MD5チャレンジ・レスポンス方式の安全性について:APOPパスワード復元攻撃の拡張2008

    • Author(s)
      佐々木悠
    • Organizer
      暗号と情報セキュリティシンポジウム(SCIS2008)
    • Place of Presentation
      宮崎
    • Year and Date
      2008-01-24
    • Related Report
      2007 Annual Research Report
  • [Presentation] 実環境におけるAPOP攻撃実験2008

    • Author(s)
      佐藤 玲
    • Organizer
      暗号と情報セキュリティシンポジウム(SCIS2008)
    • Place of Presentation
      宮崎
    • Year and Date
      2008-01-24
    • Related Report
      2007 Annual Research Report
  • [Presentation] Password Recovery Attack on Authentication Protocol MD4 (Password II Challenge)2008

    • Author(s)
      Lei Wang
    • Organizer
      暗号と情報セキュリティシンポジウム(SCIS2008)
    • Place of Presentation
      宮崎
    • Year and Date
      2008-01-24
    • Related Report
      2007 Annual Research Report
  • [Presentation] Small Secret Key Attack on Takagi's Variant of RSA (Part2)2008

    • Author(s)
      伊藤孝一
    • Organizer
      暗号と情報セキュリティシンポジウム(SCIS2008)
    • Place of Presentation
      宮崎
    • Year and Date
      2008-01-24
    • Related Report
      2007 Annual Research Report
  • [Presentation] 拡張small inverse問題に対する解法2008

    • Author(s)
      國廣昇
    • Organizer
      暗号と情報セキュリティシンポジウム(SCIS2008)
    • Place of Presentation
      宮崎
    • Year and Date
      2008-01-24
    • Related Report
      2007 Annual Research Report
  • [Presentation] 委託可能検証者指定署名2008

    • Author(s)
      牛田芽生恵
    • Organizer
      暗号と情報セキュリティシンポジウム(SCIS2008)
    • Place of Presentation
      宮崎
    • Year and Date
      2008-01-24
    • Related Report
      2007 Annual Research Report
  • [Presentation] Generalizing Micropayment System based on Probabilistic Polling2008

    • Author(s)
      Bagus Santoso
    • Organizer
      暗号と情報セキュリティシンポジウム(SCIS2008)
    • Place of Presentation
      宮崎
    • Year and Date
      2008-01-24
    • Related Report
      2007 Annual Research Report
  • [Presentation] Subset Difference Methodのメッセージ長の評価2008

    • Author(s)
      奥秋 清次
    • Organizer
      暗号と情報セキュリティシンポジウム(SCIS2008)
    • Place of Presentation
      宮崎
    • Year and Date
      2008-01-23
    • Related Report
      2007 Annual Research Report
  • [Presentation] 暗号学における双対性〜ディジタル署名の場合〜2008

    • Author(s)
      川合 豊
    • Organizer
      暗号と情報セキュリティシンポジウム(SCIS2008)
    • Place of Presentation
      宮崎
    • Year and Date
      2008-01-23
    • Related Report
      2007 Annual Research Report
  • [Presentation] LNN上における効率的な位数発見量子回路の構成2008

    • Author(s)
      小関恵梨
    • Organizer
      暗号と情報セキュリティシンポジウム(SCIS2008)
    • Place of Presentation
      宮崎
    • Year and Date
      2008-01-23
    • Related Report
      2007 Annual Research Report
  • [Presentation] On the (Im) possibility of Security for Password-based Authenticated Key Exchange2008

    • Author(s)
      Kazuki Yoneyama
    • Organizer
      暗号と情報セキュリティシンポジウム(SCIS2008)
    • Place of Presentation
      宮崎
    • Year and Date
      2008-01-23
    • Related Report
      2007 Annual Research Report
  • [Presentation] PINを用いるアルゴリズム的耐タンパ認証装置の再考2008

    • Author(s)
      駒野 雄一
    • Organizer
      暗号と情報セキュリティシンポジウム(SCIS2008)
    • Place of Presentation
      宮崎
    • Year and Date
      2008-01-23
    • Related Report
      2007 Annual Research Report
  • [Presentation] A New 'On the Fly' Identification Scheme: A Trade-off of Asymptoticity between ZK and Correctness2008

    • Author(s)
      Bagus Santoso
    • Organizer
      暗号と情報セキュリティシンポジウム(SCIS2008)
    • Place of Presentation
      宮崎
    • Year and Date
      2008-01-23
    • Related Report
      2007 Annual Research Report
  • [Presentation] Provably Secure Authenticated Group Key Exchange without PKI2008

    • Author(s)
      Haruki Ota
    • Organizer
      暗号と情報セキュリティシンポジウム(SCIS2008)
    • Place of Presentation
      宮崎
    • Year and Date
      2008-01-22
    • Related Report
      2007 Annual Research Report
  • [Presentation] 多項式環を用いた格子暗号の改良2008

    • Author(s)
      塙 知剛
    • Organizer
      暗号と情報セキュリティシンポジウム(SCIS2008)
    • Place of Presentation
      宮崎
    • Year and Date
      2008-01-22
    • Related Report
      2007 Annual Research Report
  • [Presentation] 1点代数曲線符号に対するarray-vector BMS 復号法に関する一考察2008

    • Author(s)
      藤沢匡哉
    • Organizer
      第31回情報理論とその応用シンポジウム
    • Place of Presentation
      栃木県鬼怒川
    • Related Report
      2008 Annual Research Report
  • [Presentation] ネットワークコーディングにおける誤り訂正符号の復号法についての一検討2008

    • Author(s)
      栗原正純
    • Organizer
      第31回情報理論とその応用シンポジウム
    • Place of Presentation
      栃木県鬼怒川
    • Related Report
      2008 Annual Research Report
  • [Presentation] Security of MD5 Challenge and Response : Extension of APOP Password Recovery Attack2008

    • Author(s)
      Yu Sasaki
    • Organizer
      CT-RSA2008, LNCS vol. 4964, pp. 1-18, 2008.
    • Place of Presentation
      サンフランシスコ
    • Related Report
      2008 Annual Research Report
  • [Presentation] Password Recovery on Challenge and Response : Impossible Differential Attack on Hash Function2008

    • Author(s)
      Yu Sasaki
    • Organizer
      AFRICACRYPT 2008, LNCS vol. 5023, pp. 290-307, 2008
    • Place of Presentation
      Casablanca, Morocco
    • Related Report
      2008 Annual Research Report
  • [Presentation] 結託耐性を有する音楽電子透かし法2008

    • Author(s)
      山口恒太郎
    • Organizer
      電子情報通信学会2008年 暗号と情報セキュリティシンポジウム(SCIS2008)
    • Place of Presentation
      宮崎
    • Related Report
      2007 Annual Research Report
  • [Presentation] A Survey of Wavelet Domain Steganalysis Methods2008

    • Author(s)
      Lopez Hernandez Julio Cesar
    • Organizer
      電子情報通信学会2008年 暗号と情報セキュリティシンポジウム(SCIS2008)
    • Place of Presentation
      宮崎
    • Related Report
      2007 Annual Research Report
  • [Presentation] Block-based Fragile Watermarking Scheme for Tamper Detection and Recovery2008

    • Author(s)
      Youngran Park
    • Organizer
      電子情報通信学会2008年 暗号と情報セキュリティシンポジウム(SCIS2008)
    • Place of Presentation
      宮崎
    • Related Report
      2007 Annual Research Report
  • [Presentation] Negative Correlation-Based Collusion-Resistant Watermarking2008

    • Author(s)
      Hyunho Kang
    • Organizer
      電子情報通信学会2008年 暗号と情報セキュリティシンポジウム(SCIS2008)
    • Place of Presentation
      宮崎
    • Related Report
      2007 Annual Research Report
  • [Presentation] Secure Cross-Realm Client-to-Client Password-based Key Exchange against Undetectable On-line Dictionary Attacks2007

    • Author(s)
      Kazuki Yoneyama
    • Organizer
      17th Applied Algebra, Algebraic Algorithms, and Error Correcting Codes Symposium AAECC-17
    • Place of Presentation
      Bangalore, India
    • Year and Date
      2007-12-20
    • Related Report
      2007 Annual Research Report
  • [Presentation] Attribute-Based Encryption with Partially Hidden Ciphertext Policies2007

    • Author(s)
      Takashi Nishide
    • Organizer
      電子情報通信学会 基礎境界ソサイエティ 情報セキュリティ研究会(ISEC)
    • Place of Presentation
      東京
    • Year and Date
      2007-12-19
    • Related Report
      2007 Annual Research Report
  • [Presentation] Modeling Agreement Problems in the Universal Composability Framework2007

    • Author(s)
      Masayuki Terada
    • Organizer
      International Conference on Information and Communications Security ICICS2007
    • Place of Presentation
      Zhengzhou, China
    • Year and Date
      2007-12-14
    • Related Report
      2007 Annual Research Report
  • [Presentation] 暗号学における双対性について-デジタル署名を例として2007

    • Author(s)
      太田和夫
    • Organizer
      計算世界観ワークショップ「暗号理論」
    • Place of Presentation
      東京
    • Year and Date
      2007-12-11
    • Related Report
      2007 Annual Research Report
  • [Presentation] ナップザック暗号に対する格子攻撃の再考2007

    • Author(s)
      國廣昇
    • Organizer
      計算世界観ワークショップ「暗号理論」
    • Place of Presentation
      東京
    • Year and Date
      2007-12-11
    • Related Report
      2007 Annual Research Report
  • [Presentation] Small Secret Key Attack on Takagi's Variant of RSA (Part1)2007

    • Author(s)
      Noboru Kunihiro
    • Organizer
      電子情報通信学会 基礎境界ソサイエティ 情報セキュリティ研究会(ISEC)
    • Place of Presentation
      神戸
    • Year and Date
      2007-11-21
    • Related Report
      2007 Annual Research Report
  • [Presentation] ドメイン横断型C2C-PAKEにおける強い安全性モデルと構成法2007

    • Author(s)
      米山 一樹
    • Organizer
      コンピュータセキュリティシンポジウムCSS2007
    • Place of Presentation
      奈良
    • Year and Date
      2007-11-02
    • Related Report
      2007 Annual Research Report
  • [Presentation] 研究グループが脆弱性を発見した場合にとるべき行動についての法的考察2007

    • Author(s)
      猪股佑介
    • Organizer
      SITE2007-42
    • Place of Presentation
      東京
    • Year and Date
      2007-11-02
    • Related Report
      2007 Annual Research Report
  • [Presentation] FCS-ARSPA'07参加報告2007

    • Author(s)
      米山 一樹
    • Organizer
      日本応用数理学会2007年度年会
    • Place of Presentation
      札幌
    • Year and Date
      2007-09-15
    • Related Report
      2007 Annual Research Report
  • [Presentation] task-PIOAフレームワークとBlanchetのフレームワークの証明能力に関する一考察2007

    • Author(s)
      花谷 嘉一
    • Organizer
      日本応用数理学会2007年度年会
    • Place of Presentation
      札幌
    • Year and Date
      2007-09-15
    • Related Report
      2007 Annual Research Report
  • [Presentation] マルチパーティモデルでの署名交換の公平性の再考2007

    • Author(s)
      駒野, 雄一
    • Organizer
      電子情報通信学会 基礎境界ソサイエティ大会
    • Place of Presentation
      鳥取
    • Year and Date
      2007-09-13
    • Related Report
      2007 Annual Research Report
  • [Presentation] 公開鍵暗号系における双対性へのアプローチ2007

    • Author(s)
      太田和夫
    • Organizer
      電子情報通信学会 基礎境界ソサイエティ 情報セキュリティ研究会(ISEC)
    • Place of Presentation
      東京
    • Year and Date
      2007-09-07
    • Related Report
      2007 Annual Research Report
  • [Presentation] The Quantum Fourier Transform on a Linear Nearest Neighbor Architecture2007

    • Author(s)
      Yasuhiro Takahashi
    • Organizer
      AQIS2007
    • Place of Presentation
      Kyoto, Japan
    • Year and Date
      2007-09-03
    • Related Report
      2007 Annual Research Report
  • [Presentation] Yet Another Sanitizable Signature from Bilinear Maps2007

    • Author(s)
      Tetsuya Izu
    • Organizer
      JWIS2007
    • Place of Presentation
      Tokyo, Japan
    • Year and Date
      2007-08-07
    • Related Report
      2007 Annual Research Report
  • [Presentation] 墨塗り・削除署名の拡張2007

    • Author(s)
      泉雅巳
    • Organizer
      電子情報通信学会 基礎境界ソサイエティ 情報セキュリティ研究会(ISEC)
    • Place of Presentation
      函館
    • Year and Date
      2007-07-20
    • Related Report
      2007 Annual Research Report
  • [Presentation] Non-Malleability Definitions Reconsidered2007

    • Author(s)
      Satoshi Miyagawa
    • Organizer
      International Symposium on Advanced ICT AICT 2007
    • Place of Presentation
      Beijing, China
    • Year and Date
      2007-07-18
    • Related Report
      2007 Annual Research Report
  • [Presentation] A Security Analysis on Diffie-Hellman Key Exchange against Adaptive Adversaries using Task-Structured PIOA2007

    • Author(s)
      Kazuki Yoneyama
    • Organizer
      Foundations of Computer Security and Automated Reasoning for Security Protocol Analysis FCS-ARSPA2007
    • Place of Presentation
      Wroclaw, Poland
    • Year and Date
      2007-07-08
    • Related Report
      2007 Annual Research Report
  • [Presentation] A New Strategy for Finding a Differential Path of SHA-12007

    • Author(s)
      Jun Yajima
    • Organizer
      ACISP 2007
    • Place of Presentation
      Townsville, Australia
    • Year and Date
      2007-07-02
    • Related Report
      2007 Annual Research Report
  • [Presentation] 素因数分解とRSA暗号における復号鍵計算の等価性2007

    • Author(s)
      國廣昇
    • Organizer
      第2回公開鍵暗号の安全な構成とその応用ワークショップ
    • Place of Presentation
      東京
    • Year and Date
      2007-06-12
    • Related Report
      2007 Annual Research Report
  • [Presentation] 計算量的安全性を有する暗号プロトコル2007

    • Author(s)
      太田, 和夫
    • Organizer
      第12回共同研究成果報告会 産学官連携DAY in 電通大
    • Place of Presentation
      東京
    • Year and Date
      2007-06-06
    • Related Report
      2007 Annual Research Report
  • [Presentation] Paillierの観点からみたディジタル署名の安全性の再考2007

    • Author(s)
      川合豊
    • Organizer
      電子情報通信学会 基礎境界ソサイエティ 情報セキュリティ研究会(ISEC)
    • Place of Presentation
      東京
    • Year and Date
      2007-05-18
    • Related Report
      2007 Annual Research Report
  • [Presentation] 2n+O(1)個の量子ビットを用いた位数発見量子回路に対するリソースの評価2007

    • Author(s)
      小関, 恵梨
    • Organizer
      QIT16, 第16回量子情報技術研究会
    • Place of Presentation
      厚木
    • Year and Date
      2007-05-18
    • Related Report
      2007 Annual Research Report
  • [Presentation] A Sanitizable Signature Scheme with Aggregation2007

    • Author(s)
      Tetsuya Izu
    • Organizer
      ISPEC2007
    • Place of Presentation
      Hong Kong, China
    • Year and Date
      2007-05-08
    • Related Report
      2007 Annual Research Report
  • [Presentation] Deterministic Polynomial Time Equivalence between Factoring and Key-Recovery Attack on Takagi's RSA2007

    • Author(s)
      Noboru Kunihiro
    • Organizer
      PKC2007
    • Place of Presentation
      Beijing, China
    • Year and Date
      2007-04-19
    • Related Report
      2007 Annual Research Report
  • [Presentation] Multiparty Computation for Interva1, Equality, and Comparison without Bit-Decomposition Protocol.2007

    • Author(s)
      Takashi Nishide
    • Organizer
      PKC2007
    • Place of Presentation
      Beijing, China
    • Year and Date
      2007-04-19
    • Related Report
      2007 Annual Research Report
  • [Presentation] Decoding of AG codes beyond GS list decoding radius2007

    • Author(s)
      阪田省二郎
    • Organizer
      第30回情報理論とその応用シンポジウム
    • Place of Presentation
      三重県伊勢賢島
    • Related Report
      2007 Annual Research Report
  • [Presentation] Psychoacoustically-Adapted Patchwork Algorithm for Watermarking2007

    • Author(s)
      Hyunho Kang
    • Organizer
      The Third International Conference on Intelligent Information Hiding and Multimedia Signal Processing, IIHMSP07
    • Place of Presentation
      Kaohsiung City, Taiwan
    • Related Report
      2007 Annual Research Report
  • [Presentation] An Improved Image Watermarking Scheme Based on Multiresolution Wavelet Transform2007

    • Author(s)
      Bingfei Wang
    • Organizer
      The Triangle Symposium on Advanced ICT 2007,
    • Place of Presentation
      Beijing, China
    • Related Report
      2007 Annual Research Report
  • [Presentation] Audio Watermarkingbasedon Psychoacoustically-Adapted Patchwork Algorithm2007

    • Author(s)
      Kazuhiko Yamaguchi
    • Organizer
      The Triangle Symposium on Advanced ICT 2007,
    • Place of Presentation
      Beijing, China
    • Related Report
      2007 Annual Research Report
  • [Presentation] Multipurpose Watermarking: Fragile, Semifragile and Robust Watermarks2007

    • Author(s)
      Hyunho Kang
    • Organizer
      The Triangle Symposium on Advanced ICT 2007,
    • Place of Presentation
      Beijing, China
    • Related Report
      2007 Annual Research Report
  • [Presentation] Audio Watermarking Based on Wavelet Transform and Quantization Index Modulation2007

    • Author(s)
      Raul Martinez-Noriega
    • Organizer
      The 22nd International Technical Conference on Circuits/Systems, Computers and Communications, ITC-CSCC 2007
    • Place of Presentation
      Busan, Korea
    • Related Report
      2007 Annual Research Report
  • [Presentation] Multiple watermarking with semifragile property2007

    • Author(s)
      Hyunho Kang
    • Organizer
      2007 Hawaii and SITA Joint Conference on Information Theory, HISC2007
    • Place of Presentation
      Hawaii, USA
    • Related Report
      2007 Annual Research Report
  • [Presentation] [招待講演]代数的符号理論 : 夢と現実2006

    • Author(s)
      阪田省二郎
    • Organizer
      電子情報通信学会情報理論研究会,IT2006-49
    • Place of Presentation
      花びしホテル(北海道函館市)(25--32)
    • Year and Date
      2006-11-28
    • Related Report
      2008 Final Research Report
  • [Book] Coding, and Cryptography, Springer Verlag2009

    • Author(s)
      M, Sala, T, Mora, L, Perret, S. Sakata, C. Traverso(Eds.)
    • Publisher
      Groebner Bases
    • Related Report
      2008 Final Research Report
  • [Book] Groebner Bases, Coding, and Cryptography2009

    • Author(s)
      (Eds. )M. Sala, T. Mora, L. Perret, S. Sakata, C. Traverso
    • Total Pages
      430
    • Publisher
      Springer Verlag (May 30, 2009 発行予定)
    • Related Report
      2008 Annual Research Report
  • [Book] Groebner Bases, Coding, and Cryptography Part I : 8. "The BMS algorithm"Part I : 9. "The BMS algorithm and decoding of algebraic geometry codes"2009

    • Author(s)
      S. Sakata
    • Total Pages
      430
    • Publisher
      Springer Verlag(May 30, 2009 発行予定)
    • Related Report
      2008 Annual Research Report
  • [Book] 情報理論講義2008

    • Author(s)
      小林欣吾
    • Publisher
      培風館
    • Related Report
      2008 Annual Research Report 2008 Final Research Report
  • [Book] 計算理論の基礎(原著第2版)1オートマトンと言語, 2計算可能性の理論, 3複雑さの理論2008

    • Author(s)
      太田和夫
    • Publisher
      共立出版
    • Related Report
      2008 Final Research Report
  • [Book] 計算理論の基礎(原著第2版)1オートマトンと言語、2計算可能性の理論、3複雑さの理論2008

    • Author(s)
      太田和夫
    • Total Pages
      507
    • Publisher
      共立出版
    • Related Report
      2008 Annual Research Report
  • [Book] 岩波数学辞典第4版"情報理論"2007

    • Author(s)
      小林欣吾
    • Publisher
      岩波書店
    • Related Report
      2006 Annual Research Report
  • [Book] 「グレブナー基底の現在」第6章 : 符号・配列・グレブナー基底2006

    • Author(s)
      阪田省二郎, 日比孝之 (編)
    • Total Pages
      25
    • Publisher
      数学書房
    • Related Report
      2008 Final Research Report
  • [Book] 岩波数学辞典第4版 "情報理論"2006

    • Author(s)
      小林欣吾
    • Total Pages
      43
    • Publisher
      岩波書店
    • Related Report
      2008 Final Research Report
  • [Book] 日比孝之(編)「グレブナー基底の現在」第6章 : 符号・配列・グレブナー基底2006

    • Author(s)
      阪田省二郎
    • Total Pages
      25
    • Publisher
      数学書房
    • Related Report
      2006 Annual Research Report
  • [Remarks]

    • URL

      http://www.oslab.ice.uec.ac.jp/archive/list2007.html

    • Related Report
      2007 Annual Research Report
  • [Patent(Industrial Property Rights)] データ格納システム及び情報送信装置及びサーバ装置2009

    • Inventor(s)
      伊藤隆(三菱電機(株)), 北原恵介, 坂井祐介, 太田和夫
    • Industrial Property Rights Holder
      国立大学法人電気通信大学, 三菱電機株式会社
    • Industrial Property Number
      2009-008609
    • Filing Date
      2009-01-09
    • Related Report
      2008 Final Research Report
  • [Patent(Industrial Property Rights)] データ格納システム及び情報送信装置及びサーバ装置2009

    • Inventor(s)
      伊藤隆(三菱電機(株)), 北原恵介, 坂井祐介, 太田和夫
    • Industrial Property Rights Holder
      国立大学法人電気通信大学, 三菱電機株式会社
    • Industrial Property Number
      2009-008609
    • Acquisition Date
      2009-01-19
    • Related Report
      2008 Annual Research Report
  • [Patent(Industrial Property Rights)] 本人確認システム2008

    • Inventor(s)
      Bagus Santoso, 崎山一男, 太田和夫
    • Industrial Property Rights Holder
      国立大学法人電気通信大学
    • Industrial Property Number
      2009-008609
    • Filing Date
      2008-11-11
    • Related Report
      2008 Final Research Report
  • [Patent(Industrial Property Rights)] 本人確認システム2008

    • Inventor(s)
      Bagus Santoso, 崎山一男, 太田和夫
    • Industrial Property Rights Holder
      国立大学法人電気通信大学
    • Industrial Property Number
      2008-289266
    • Filing Date
      2008-11-11
    • Related Report
      2008 Annual Research Report

URL: 

Published: 2006-04-01   Modified: 2021-04-07  

Information User Guide FAQ News Terms of Use Attribution of KAKENHI

Powered by NII kakenhi