# Tentative program (all presentations)

1. Structurally aggregate message authentication codes
2. How to Detect Malicious Behaviors in a Card-Based Majority Voting Protocol with Three Inputs
3. Cache-22: A Highly Deployable Encrypted Cache System
4. Designing a Symbol Classifier for Inaudible Sound Communication Systems Using a Neural Network
5. A Study on Randomness of Sequences Obtained from Piecewise Logistic Map over Integers
6. A Decentralized Secure Email System based on Conventional RSA Signature
7. Memory Efficient and Provably Secure Virus Detection
8. Fountain Codes for Private Distributed Matrix-Matrix Multiplication
9. Coding Theorems on the Simple Capacity for Digital Fingerprinting Codes
10. Data Anonymization for Service Strategy Development and Information Recommendation to Users Based on TF-IDF Method
11. Client-Aided Bit-Composition Protocol with Guaranteed Output Delivery
12. Design of ZDF code using uniform shift enumerator
13. A Design of Differentially Encoded LDPC Coding Based on Multi-Edge Framework
14. New Instances of Quantum Error-Correcting Codes for Single Deletion Errors
15. Independent User Partition Multicast Scheme for the Groupcast Index Coding Problem
16. A family of perfectness of the Levenshtein codes $$\mathrm{L}_a(n;2n)$$
17. The 5G New Radio Code: Elementary Absorbing Sets and Error Floor Performance
18. Theoretical Estimates of Error Burst Probability for Convolutional Codes
19. Performance of Non-Binary LDPC Codes on Two-Dimensional Array Erasure Models
20. On the dependency between the code symmetries and the decoding efficiency
21. Hamming Weight of Product of Random Sparse Polynomials
22. Randomized Nested Polar Subcode Constructions for Privacy, Secrecy, and Storage
23. On Optimal Finite-length Binary Codes of Four Codewords for Binary Symmetric Channels
24. Segmented Reverse Concatenation: A New Approach to Constrained ECC
25. Upper Bounds on the Error Probability for the Ensemble of Linear Block Codes with Mismatched Decoding
26. Finding Self-Dual Quasi-Cyclic Codes with Large Minimum Weight via Polynomial Matrices
27. Encoding Algorithm of Binary and Non-binary Irregular LDPC Codes via Block Triangular Matrices with Low Weight Diagonal Submatrices
28. Property of Quantum Decoding for Sourlas Codes of Which Tuples Are Randomly Decimated
29. Encoding Algorithm for Run-Length Limited Single Insertion/Deletion Correcting Code
30. Upper and Lower Estimates of Frame Error Rate for Convolutional Codes
31. Analysis of UEP QC-LDPC Codes Using Density Evolution
32. Algebraic List Decoding of Elliptic Codes Through Module Basis Reduction
33. Orthogonal Sparse Superposition Codes
34. Complexity-efficient Fano Decoding of Polarization-adjusted Convolutional (PAC) Codes
35. Generator Polynomial Matrices of Reversed and Reversible Quasi-Cyclic Codes
36. Codes for high-noise memoryless channels
37. NB-LDPC Codes with High Rates Achieving Low BER over the AWGN Channel with QAM Signaling
38. An Iterative Bit-Flipping Decoding Algorithm For Binary Reed-Muller Codes
39. A Construction of Binary Punctured Linear Codes and A Supporting Method for Best Code Search
40. Decoder Error Propagation Mitigation for Spatially Coupled LDPC Codes
41. Decoding LDPC Codes with Probabilistic Local Maximum Likelihood Bit Flipping
42. Experimental Evaluation Results of Acoustic Spread Spectrum Communications Employing Orthogonal Gold Sequences
43. Multi-Carrier Differential Trellis-Coded Modulation/Demodulation Employing Multiple Differential Detection with Channel Prediction
44. Differential OFDM Employing AFC for Fast Time-Varying Doppler Shifts in Underwater Acoustic Communications
45. Doubly Differential OFDM Employing an Intercarrier Interference Self-Canceller for Underwater Acoustic Communications
46. Study on a delay and Doppler estimation performance of 2-dimensional BPSK signal using discrete gaussian wave
47. Single Quantum Deletion Error-Correcting Codes
48. Maximum Likelihood Channel Decoding with Quantum Annealing Machine
49. Effect of Non-Gaussian Noise Due to Beam Wandering on Error Performance of Quantum Measurement
50. Quantum Illumination using Quasi-Bell States
51. A Parallel Blum-Micali Generator Based on the Gauss Periods
52. Coded Computing for Boolean Functions
53. Almost perfect sequence family with perfect crosscorrelation
54. A Study on Binary Sequences Located in Hadamard Matrices of Order $$2^n$$
55. Detection Bottleneck links without multiple nodes
56. Score Fusion Method by Neural Network Using GPS and Wi-Fi Log Data
57. Packer Identification Method for Multi-layer Executables with k-Nearest Neighbor of Entropies
58. Rényi Entropy Power and Normal Transport
59. On Two Information Quantities Relating Two Distortion Balls
60. An Effective Learning Scheme for Weighted-BP with Parallel Permutation Decoding
61. Improvement of accuracy of UWB Positioning System within the intersection using a Long Short-Term Memory Network
62. Differential Description Length for Hyperparameter Selection in Supervised Learning
63. Deep Convolutional Autoencoders for Deblurring and Denoising Low-Resolution Images
64. Optimal Construction of the Basis Matrices of an Extended Visual Cryptography Scheme Satisfying an Additional Security Requirement
65. A Linear Algebraic Approach to Strongly Secure Ramp Secret Sharing for General Access Structures
66. Information leakage through passive timing attacks on RSA decryption system
67. On the Capacity of Gaussian Multiple-Access Wiretap Channels with Feedback
68. New Constructions of an Evolving 2-Threshold Scheme Based on Binary or D-ary Prefix Codes
69. Secure Index Coding with Security Constraints on Receivers
70. On the Power of Interaction in Signcryption
71. The Existence of Cycles in the Supersingular Isogeny Graphs Used in SIKE
72. Delegatable proof of knowledge systems
73. Scalable Security in Interference Channels With Arbitrary Number of Users
74. Formal Verification of Merkle-Damgård Construction in ProVerif
75. Compact Verifiably Multiplicative Secret Sharing
76. A Capacity-achieving One-way Key Agreement with Improved Finite Blocklength Analysis
77. A Channel Model of Transceivers for Multiterminal Secret Key Agreement
78. Fourier-based Verifiable Function Secret Sharing
79. Biometric Identification Systems with Both Chosen and Generated Secrecy
80. Formal Verification and Code-Generation of Mersenne-Twister Algorithm
81. A Simple Capacity Outer Bound for Two-Way Channels and Capacity Approximation Results
82. Asymmetry models and model selection in square contingency tables with ordinal categories
83. On MDL Estimation for Simple Contaminated Gaussian Location Families
84. Conversion Method from Erasure Codes to Multi-Deletion Error-Correcting Codes for Information in Array Design
85. Addressing Information Using Data Hiding for DNA-based Storage Systems
86. Bonds of Constrained Systems and Their Characteristics
87. On the Capacity of the Flash Memory Channel with Feedback
88. Repair of Multiple Descriptions on Distributed Storage
89. Optimal Reconstruction Codes for Deletion Channels
90. Cooperative Locality and Availability of the MacDonald Codes for Multiple Symbol Erasures
91. Decoding Algorithms of Monotone Codes and Azinv Codes and Their Unified View
92. Polar Coding for Oversampling Drift Channel
93. A Note on a Relationship between Smooth Locally Decodable Codes and Private Information Retrieval
94. Codes Correcting Bounded Length Tandem Duplication
95. Criss-Cross Deletion Correcting Codes
96. Rack-Aware Cooperative Regenerating Codes
97. Achievable Rates of Concatenated Codes in DNA Storage under Substitution Errors
98. The time-adaptive statistical testing for random number generators
99. Statistical Testing of Randomness
100. Optimal Resolution of Change-Point Detection with Empirically Observed Statistics and Erasures
101. Gauss-Markov Source Tracking with Side Information: Lower Bounds
102. Synergy and Redundancy Duality Between Gaussian Multiple Access and Broadcast Channels
103. An Equivalent Expression for the Wyner-Ziv Source Coding Problem
104. A Study on the Overflow Probability of Variable-to-Fixed Length Codes
105. Exponent Function for the Gel'fand-Pinsker Channel at Rates above the Capacity
106. Entropy to Control Planning in Video-Games
107. Trellis Code Error Exponent From Results for Asynchronous Multiple Access Channels
108. Third-Order Asymptotics of Variable-Length Compression Allowing Errors
109. Minimum Energy Analysis for Robust Gaussian Joint Source-Channel Coding with a Square-Law Profile
110. Address-Event Variable-Length Compression for Time-Encoded Data
111. Autoregressive Image Generative Models with Normal and t-distributed Noise and the Bayes Codes for Them
112. On an Alternative Approach to Congestion Detection in Ad Hoc Networks
113. The relation between Proportion test and Uniformity test in NIST SP800-22
114. Simplification of the Calculation of the Channel Matrix for AMPM Coherent-state Signals
115. Formalization of VT Codes and Their Single-Deletion Correcting Property in Lean
116. Optimal Power Allocation of Cooperative Superposition-Coded Relaying with Finite-Blocklength Transmission over Quasi-Static Rayleigh Channels
117. Latency-Energy Tradeoff with Realistic Hardware Models
118. Performance Evaluation of Ghost Imaging with Orthogonal/Non-orthogonal Quantum States in Terms of Image Quality
119. A Construction of Robustly Reusable Fuzzy Extractors over Blockchains
120. Visible Video Data Hiding Techniques Based on Visual Effects Utilizing Barcodes
121. Remote Empirical Coordination
122. On Berger-Tung Inner Bound for Sum-Rate versus Sum-Distortion Problem
123. A Key Recovery Algorithm Using Random Key Leakage from AES Key Schedule
124. A Coding Theory Perspective on Multiplexed Molecular Profiling of Biological Tissues