Tentative program (all presentations)

  1. Structurally aggregate message authentication codes
    Yuta Ishii and Mitsuru Tada (Chiba University, Japan)
  2. How to Detect Malicious Behaviors in a Card-Based Majority Voting Protocol with Three Inputs
    Yoshiki Abe, Mitsugu Iwamoto and Kazuo Ohta (The University of Electro-Communications, Japan)
  3. Cache-22: A Highly Deployable Encrypted Cache System
    Keita Emura and Shiho Moriai (National Institute of Information and Communications Technology, Japan), Takuma Nakajima and Masato Yoshimi (TIS Inc, Japan)
  4. Designing a Symbol Classifier for Inaudible Sound Communication Systems Using a Neural Network
    Naofumi Aoki (Hokkaido University, Japan)
  5. A Study on Randomness of Sequences Obtained from Piecewise Logistic Map over Integers
    Sota Eguchi and Takeru Miyazaki (The University of Kitakyushu, Japan), Shunsuke Araki (Kyushu Institute of Technology, Japan), Satoshi Uehara (The University of Kitakyushu, Japan), Yasuyuki Nogami (Okayama University, Japan)
  6. A Decentralized Secure Email System based on Conventional RSA Signature
    Kazumasa Omote (University of Tsukuba, Japan)
  7. Memory Efficient and Provably Secure Virus Detection
    Hayami Motohashi and Kazuki Yoneyama (Ibaraki University, Japan)
  8. Fountain Codes for Private Distributed Matrix-Matrix Multiplication
    Rawad Bitar and Marvin Xhemrishi (Technical University of Munich, Germany), Antonia Wachter-Zeh (Technical University of Munich (TUM), Germany)
  9. Coding Theorems on the Simple Capacity for Digital Fingerprinting Codes
    Hiroki Koga (University of Tsukuba, Japan)
  10. Data Anonymization for Service Strategy Development and Information Recommendation to Users Based on TF-IDF Method
    Kazuhiro Kono (Kansai Unviersity, Japan), Noboru Babaguchi (Osaka University, Japan)
  11. Client-Aided Bit-Composition Protocol with Guaranteed Output Delivery
    Hikaru Tsuchida (University of Tsukuba & NEC, Japan), Takashi Nishide (Tsukuba University, Japan)
  12. Design of ZDF code using uniform shift enumerator
    Yuya Naruse, Shan Lu and Hiroshi Kamabe (Gifu University, Japan)
  13. A Design of Differentially Encoded LDPC Coding Based on Multi-Edge Framework
    Yung-Tsao Hsu and Mao-Chao Lin (National Taiwan University, Taiwan)
  14. New Instances of Quantum Error-Correcting Codes for Single Deletion Errors
    Taro Shibayama (Chiba University, Japan)
  15. Independent User Partition Multicast Scheme for the Groupcast Index Coding Problem
    Arman Sharififar and Neda Aboutorab (University of New South Wales, Australia), Yucheng Liu and Parastoo Sadeghi (The Australian National University, Australia)
  16. A family of perfectness of the Levenshtein codes \( \mathrm{L}_a(n;2n) \)
    Kento Nakada (Okayama University, Japan)
  17. The 5G New Radio Code: Elementary Absorbing Sets and Error Floor Performance
    Masoome Otarinia and Thomas E Fuja (University of Notre Dame, USA)
  18. Theoretical Estimates of Error Burst Probability for Convolutional Codes
    Anastasiia Smeshko (Institute for Information Transmission Problems & National Research University Higher School of Economics, Russia), Fedor Ivanov (National Research University Higher School of Economics & Institute for Information Transmission Problems, Russia), Victor V. Zyablov (Institute for Information Transmission Problems (IITP) RAS, Russia)
  19. Performance of Non-Binary LDPC Codes on Two-Dimensional Array Erasure Models
    Gou Hosoya (Waseda University, Japan), Toshihiro Niinomi (Tokyo City University, Japan)
  20. On the dependency between the code symmetries and the decoding efficiency
    Kirill Ivanov and Ruediger L Urbanke (EPFL, Switzerland)
  21. Hamming Weight of Product of Random Sparse Polynomials
    Akinori Kawachi (Mie University, Japan)
  22. Randomized Nested Polar Subcode Constructions for Privacy, Secrecy, and Storage
    Onur Günlü (Technische Universität Berlin, Germany), Peter Trifonov (Saint-Petersburg Polytechnic University & ITMO University, Russia), Muah Kim and Rafael F. Schaefer (Technische Universität Berlin, Germany), Vladimir Sidorenko (Technical University of Munich, Germany)
  23. On Optimal Finite-length Binary Codes of Four Codewords for Binary Symmetric Channels
    Yanyan Dong and Shenghao Yang (The Chinese University of Hong Kong, Shenzhen, China)
  24. Segmented Reverse Concatenation: A New Approach to Constrained ECC
    Ryan Gabrys (SPAWAR Pacific, USA), Paul H. Siegel (University of California, San Diego, USA), Eitan Yaakobi (Technion, Israel)
  25. Upper Bounds on the Error Probability for the Ensemble of Linear Block Codes with Mismatched Decoding
    Toshihiro Niinomi (Tokyo City University, Japan), Hideki Yagi (University of Electro-Communications, Japan), Shigeichi Hirasawa (Waseda University, Japan)
  26. Finding Self-Dual Quasi-Cyclic Codes with Large Minimum Weight via Polynomial Matrices
    Masaki Kawaguchi and Hajime Matsui (Toyota Technological Institute, Japan)
  27. Encoding Algorithm of Binary and Non-binary Irregular LDPC Codes via Block Triangular Matrices with Low Weight Diagonal Submatrices
    Yuta Iketo and Takayuki Nozaki (Yamaguchi University, Japan)
  28. Property of Quantum Decoding for Sourlas Codes of Which Tuples Are Randomly Decimated
    Sangook Lee and Kazunori Iwata (Hiroshima City University, Japan), Kazushi Mimura (Hiroshima city university, Japan)
  29. Encoding Algorithm for Run-Length Limited Single Insertion/Deletion Correcting Code
    Reona Takemoto and Takayuki Nozaki (Yamaguchi University, Japan)
  30. Upper and Lower Estimates of Frame Error Rate for Convolutional Codes
    Anastasiia Smeshko (Institute for Information Transmission Problems & National Research University Higher School of Economics, Russia), Fedor Ivanov (National Research University Higher School of Economics & Institute for Information Transmission Problems, Russia), Victor V. Zyablov (Institute for Information Transmission Problems (IITP) RAS, Russia)
  31. Analysis of UEP QC-LDPC Codes Using Density Evolution
    Yi-Hsuan Chen and Yu-Ting Liu (National Tsing Hua University, Taiwan), Chung-Hsuan Wang (National Chiao Tung University, Taiwan), Chi-chao Chao (National Tsing Hua University, Taiwan)
  32. Algebraic List Decoding of Elliptic Codes Through Module Basis Reduction
    Yunqi Wan, Li Chen and Fangguo Zhang (Sun Yat-sen University, China)
  33. Orthogonal Sparse Superposition Codes
    Yunseo Nam (POSTECH, Korea (South)), SongNam Hong (Ajou University, Korea (South)), Namyoon Lee (POSTECH, Korea (South))
  34. Complexity-efficient Fano Decoding of Polarization-adjusted Convolutional (PAC) Codes
    Mohammad Rowshan (Monash University, Australia), Andreas Burg (EPFL, Switzerland), Emanuele Viterbo (Monash University, Australia)
  35. Generator Polynomial Matrices of Reversed and Reversible Quasi-Cyclic Codes
    Ramy Taki ElDin (Toyota Technological Institute & Ain Shams University, Cairo, Egypt), Hajime Matsui (Toyota Technological Institute, Japan)
  36. Codes for high-noise memoryless channels
    Ilya Dumer and Navid Gharavi (University of California at Riverside, USA)
  37. NB-LDPC Codes with High Rates Achieving Low BER over the AWGN Channel with QAM Signaling
    Gada Rezgui (ETIS Lab, ENSEA, 6 Avenue du Ponceau, Cergy-Pontoise, France), Asma Maaloui (INP-INSEEIHT, France), Iryna Andriyanova (CY Cergy Paris University & ENSEA, CNRS, France), Charly Poulliat (INP - ENSEEIHT Toulouse, France), Cyril Measson (Nokia & Qualcomm, EPFL, France)
  38. An Iterative Bit-Flipping Decoding Algorithm For Binary Reed-Muller Codes
    Yong-Ting Ni, Cheng-Yu Pai and Chao-Yu Chen (National Cheng Kung University, Taiwan)
  39. A Construction of Binary Punctured Linear Codes and A Supporting Method for Best Code Search
    Takuya Ohara (Kobe University, Japan), Makoto Takita (University of Hyogo, Japan), Masakatu Morii (Kobe University, Japan)
  40. Decoder Error Propagation Mitigation for Spatially Coupled LDPC Codes
    Min Zhu (Xidian University, China), David G. M. Mitchell (New Mexico State University, USA), Michael Lentmaier (Lund University, Sweden), Daniel J. Costello, Jr. (University of Notre Dame, USA)
  41. Decoding LDPC Codes with Probabilistic Local Maximum Likelihood Bit Flipping
    Rejoy Roy Mathews and Chris Winstead (Utah State University, USA)
  42. Experimental Evaluation Results of Acoustic Spread Spectrum Communications Employing Orthogonal Gold Sequences
    Haruka Toyota (Ritsumeikan University, Japan), Hiroshi Kubo (Ritumeikan University, Japan)
  43. Multi-Carrier Differential Trellis-Coded Modulation/Demodulation Employing Multiple Differential Detection with Channel Prediction
    Tetsuro Kubo (Ritsumeikan University, Japan), Hiroshi Kubo (Ritumeikan University, Japan)
  44. Differential OFDM Employing AFC for Fast Time-Varying Doppler Shifts in Underwater Acoustic Communications
    Yui Nakai and Yuka Tanaka (Ritsumeikan University, Japan), Hiroshi Kubo (Ritumeikan University, Japan)
  45. Doubly Differential OFDM Employing an Intercarrier Interference Self-Canceller for Underwater Acoustic Communications
    Yuka Tanaka and Yui Nakai (Ritsumeikan University, Japan), Hiroshi Kubo (Ritumeikan University, Japan)
  46. Study on a delay and Doppler estimation performance of 2-dimensional BPSK signal using discrete gaussian wave
    Masayoshi Ohashi (Fukuoka University, Japan)
  47. Single Quantum Deletion Error-Correcting Codes
    Ayumu Nakayama and Manabu Hagiwara (Chiba University, Japan)
  48. Maximum Likelihood Channel Decoding with Quantum Annealing Machine
    Naoki Ide (Sony Corporation & R&D Center, Japan), Tetsuya Asayama and Hiroshi Ueno (Sony Corporation, Japan), Masayuki Ohzeki (Sigma-i Co., Ltd, Tohoku University, Tokyo Tech, Japan)
  49. Effect of Non-Gaussian Noise Due to Beam Wandering on Error Performance of Quantum Measurement
    Tiancheng Wang and Tsuyoshi Usuda (Aichi Prefectural University, Japan)
  50. Quantum Illumination using Quasi-Bell States
    Jun Yamauchi (Aichi Prefectural University, Japan), Yuto Takahashi (Meijo University, Japan), Tiancheng Wang and Tsuyoshi Usuda (Aichi Prefectural University, Japan)
  51. A Parallel Blum-Micali Generator Based on the Gauss Periods
    Yuta Kodera, Tomoya Tatara, Takuya Kusaka and Yasuyuki Nogami (Okayama University, Japan), Satoshi Uehara (The University of Kitakyushu, Japan)
  52. Coded Computing for Boolean Functions
    Chien-Sheng Yang and Salman Avestimehr (University of Southern California, USA)
  53. Almost perfect sequence family with perfect crosscorrelation
    Gangsan Kim and Hong-Yeop Song (Yonsei University, Korea (South))
  54. A Study on Binary Sequences Located in Hadamard Matrices of Order \(2^n\)
    Kasumi Nakano, Kako Takahashi, Satoshi Uehara and Takeru Miyazaki (The University of Kitakyushu, Japan), Shunsuke Araki (Kyushu Institute of Technology, Japan), Yasuyuki Nogami (Okayama University, Japan)
  55. Detection Bottleneck links without multiple nodes
    Hiroomi Isozaki (Japan Coast Guard Academy, Japan)
  56. Score Fusion Method by Neural Network Using GPS and Wi-Fi Log Data
    Katsuya Matsuoka (The University of Tokyo, Japan), Mhd Irvan (the University of Tokyo, Japan), Ryosuke Kobayashi (Mitsubishi Electric Information Systems Corporation, Japan), Rie Shigetomi Yamaguchi (The University of Tokyo, Japan)
  57. Packer Identification Method for Multi-layer Executables with k-Nearest Neighbor of Entropies
    Omachi Ryuto and Yasuyuki Murakami (Osaka Electro-Communication University, Japan)
  58. Rényi Entropy Power and Normal Transport
    Olivier Rioul (Telecom Paris & Ecole Polytechnique, France)
  59. On Two Information Quantities Relating Two Distortion Balls
    Shota Saito and Toshiyasu Matsushima (Waseda University, Japan)
  60. An Effective Learning Scheme for Weighted-BP with Parallel Permutation Decoding
  61. Improvement of accuracy of UWB Positioning System within the intersection using a Long Short-Term Memory Network
    Yuki Noda, Shunya Asano and Makoto Itami (Tokyo University of Science, Japan), Akira Nakamura (Kanagawa University, Japan)
  62. Differential Description Length for Hyperparameter Selection in Supervised Learning
    Mojtaba Abolfazli, Anders Høst-Madsen and June Zhang (University of Hawaii, USA)
  63. Deep Convolutional Autoencoders for Deblurring and Denoising Low-Resolution Images
    Michael Fernando Mendez Jimenez, Omar DeGuchy and Roummel Marcia (University of California, Merced, USA)
  64. Optimal Construction of the Basis Matrices of an Extended Visual Cryptography Scheme Satisfying an Additional Security Requirement
    Sekine Kyohei and Hiroki Koga (University of Tsukuba, Japan)
  65. A Linear Algebraic Approach to Strongly Secure Ramp Secret Sharing for General Access Structures
    Reo Eriguchi (The University of Tokyo, Japan), Noboru Kunihiro (University of Tsukuba, Japan), Koji Nuida (The University of Tokyo & National Institute of Advanced Industrial Science and Technology, Japan)
  66. Information leakage through passive timing attacks on RSA decryption system
    Tomonori Hirata (Nagoya University, Japan), Yuichi Kaji (Nagoya University & Nara Institute of Science and Technology, Japan)
  67. On the Capacity of Gaussian Multiple-Access Wiretap Channels with Feedback
    Bin Dai (Southwest Jiaotong University, China), Chong Li (Nakamoto & Turing Labs, USA), Yingbin Liang (The Ohio State University, USA), Zheng Ma (Southwest Jiaotong University, China), Shlomo (Shitz) Shamai (The Technion, Israel)
  68. New Constructions of an Evolving 2-Threshold Scheme Based on Binary or D-ary Prefix Codes
    Ryo Okamura and Hiroki Koga (University of Tsukuba, Japan)
  69. Secure Index Coding with Security Constraints on Receivers
    Yucheng Liu (Australian National University, Australia), Parastoo Sadeghi (The Australian National University, Australia), Neda Aboutorab and Arman Sharififar (University of New South Wales, Australia)
  70. On the Power of Interaction in Signcryption
    Junichi Ida and Junji Shikata (Yokohama National University, Japan), Yohei Watanabe (The University of Electro-Communications, Japan)
  71. The Existence of Cycles in the Supersingular Isogeny Graphs Used in SIKE
    Hiroshi Onuki (The University of Tokyo, Japan), Yusuke Aikawa (Mistubishi Electric Corporation, Japan), Tsuyoshi Takagi (The University of Tokyo, Japan)
  72. Delegatable proof of knowledge systems
    Naoya Shiratori (Chiba University & Graduate School of Science and Engineering, Japan), Mitsuru Tada (Chiba University, Japan)
  73. Scalable Security in Interference Channels With Arbitrary Number of Users
    Parisa Babaheidarian (Qualcomm Technologies, USA), Somayeh Salimi (KTH Royal Institute of Technology, Sweden), Panagiotis Papadimitratos (KTH, Sweden)
  74. Formal Verification of Merkle-Damgård Construction in ProVerif
    Mieno Takehiko (2070, Kotobuki-Koaka-Matsumoto, Nagano & Epson Avasys Company, Japan), Yoshimura Togo (Graduate School of Science and Technology, Japan), Hiroyuki Okazaki (Shinshu University Graduate School, Japan), Yuichi Futa (Tokyo University of Technology, Japan), Kenichi Arai (Nagasaki University, Japan)
  75. Compact Verifiably Multiplicative Secret Sharing
    Maki Yoshida (National Institute of Information and Communications Technology, Japan), Satoshi Obana (Hosei University, Japan)
  76. A Capacity-achieving One-way Key Agreement with Improved Finite Blocklength Analysis
    Setareh Sharifian, Alireza Poostindouz and Reihaneh Safavi-Naini (University of Calgary, Canada)
  77. A Channel Model of Transceivers for Multiterminal Secret Key Agreement
    Alireza Poostindouz and Reihaneh Safavi-Naini (University of Calgary, Canada)
  78. Fourier-based Verifiable Function Secret Sharing
    Takeshi Koshiba (Waseda University, Japan)
  79. Biometric Identification Systems with Both Chosen and Generated Secrecy
    Vamoua Yachongka (The University of Electro-Communications, Japan), Hideki Yagi (University of Electro-Communications, Japan)
  80. Formal Verification and Code-Generation of Mersenne-Twister Algorithm
    Takafumi Saikawa and Kazunari Tanaka (Nagoya University, Japan), Kensaku Tanaka (RAKUDO, Japan)
  81. A Simple Capacity Outer Bound for Two-Way Channels and Capacity Approximation Results
    Jian-Jia Weng, Fady Alajaji and Tamas Linder (Queen's University, Canada)
  82. Asymmetry models and model selection in square contingency tables with ordinal categories
    Kouji Tahata, Tatsuya Ochiai and Ukyo Matsushima (Tokyo University of Science, Japan)
  83. On MDL Estimation for Simple Contaminated Gaussian Location Families
    K. Miyamoto and Junichi Takeuchi (Kyushu University, Japan)
  84. Conversion Method from Erasure Codes to Multi-Deletion Error-Correcting Codes for Information in Array Design
    Manabu Hagiwara (Chiba University, Japan)
  85. Addressing Information Using Data Hiding for DNA-based Storage Systems
    Takahiro Ota (Senshu University, Japan), Akiko Manada (Shonan Institute of Technology, Japan)
  86. Bonds of Constrained Systems and Their Characteristics
    Akiko Manada (Shonan Institute of Technology, Japan), Takahiro Ota (Senshu University, Japan), Hiroyoshi Morita (The University of Electro-Communications, Japan)
  87. On the Capacity of the Flash Memory Channel with Feedback
    V. Arvind Rameshwar (Indian Institute of Science, Bengaluru, India), Aryabhatt M. Reghu and Navin Kashyap (Indian Institute of Science, India)
  88. Repair of Multiple Descriptions on Distributed Storage
    Anders Høst-Madsen (University of Hawaii, USA), Heecheol Yang (Kumoh National Institute of Technology, Korea (South)), Minchul Kim and Jungwoo Lee (Seoul National University, Korea (South))
  89. Optimal Reconstruction Codes for Deletion Channels
    Johan Chrisnata (Nanyang Technological University, Singapore & Technion University, Israel), Han Mao Kiah (Nanyang Technological University, Singapore), Eitan Yaakobi (Technion, Israel)
  90. Cooperative Locality and Availability of the MacDonald Codes for Multiple Symbol Erasures
    Zhi Jing and Hong-Yeop Song (Yonsei University, Korea (South))
  91. Decoding Algorithms of Monotone Codes and Azinv Codes and Their Unified View
    Hokuto Takahashi (Graduate School of Science and Engineering, Chiba University, Japan), Manabu Hagiwara (Chiba University, Japan)
  92. Polar Coding for Oversampling Drift Channel
    Leo Otani and Haruhiko Kaneko (Tokyo Institute of Technology, Japan)
  93. A Note on a Relationship between Smooth Locally Decodable Codes and Private Information Retrieval
    Koki Kazama and Akira Kamatsuka (Waseda University, Japan), Takahiro Yoshida (Nihon University, Japan), Toshiyasu Matsushima (Waseda University, Japan)
  94. Codes Correcting Bounded Length Tandem Duplication
    Kamilla Nazirkhanova (Moscow Institute of Physics and Technology & Skolkovo Institute of Science and Technology, Russia), Luiza Medova (Moscow Institute of Physics and Technology & Institute for Information Transmission Problems (IITP RAS), Russia), Stanislav Kruglik (Skolkovo Institute of Science and Technology, Russia), Alexey A. Frolov (Skolkovo Institute of Science and Technology & IITP RAS, Russia)
  95. Criss-Cross Deletion Correcting Codes
    Rawad Bitar (Technical University of Munich, Germany), Ilia Smagloy (Technion - Israel Institute of Technology, Israel), Lorenz Welter (Technical University of Munich(TUM), Germany), Antonia Wachter-Zeh (Technical University of Munich (TUM), Germany), Eitan Yaakobi (Technion, Israel)
  96. Rack-Aware Cooperative Regenerating Codes
    Shreya Gupta and V. Lalitha (IIIT Hyderabad, India)
  97. Achievable Rates of Concatenated Codes in DNA Storage under Substitution Errors
    Andreas Lenz (Technische Universität München, Germany), Lorenz Welter (Technical University of Munich(TUM), Germany), Sven Puchinger (Technical University of Denmark, Denmark)
  98. The time-adaptive statistical testing for random number generators
    Boris Ryabko (Institute of Computational Technologies of SB RAS & Novosibirsk State University, Russia), Viacheslav Zhuravlev (Novosibirsk State University, Russia)
  99. Statistical Testing of Randomness
    Boris Ryabko (Institute of Computational Technologies of SB RAS & Novosibirsk State University, Russia)
  100. Optimal Resolution of Change-Point Detection with Empirically Observed Statistics and Erasures
    Haiyun He, Qiaosheng Zhang and Vincent Y. F. Tan (National University of Singapore, Singapore)
  101. Gauss-Markov Source Tracking with Side Information: Lower Bounds
    Omri Lev (Tel-Aviv University, Israel), Anatoly Khina (Tel Aviv University, Israel)
  102. Synergy and Redundancy Duality Between Gaussian Multiple Access and Broadcast Channels
    Xueyan Niu (Purdue University, USA), Christopher J Quinn (Iowa State University, USA)
  103. An Equivalent Expression for the Wyner-Ziv Source Coding Problem
    Tetsunao Matsuta and Tomohiko Uyematsu (Tokyo Institute of Technology, Japan)
  104. A Study on the Overflow Probability of Variable-to-Fixed Length Codes
    Shigeaki Kuzuoka (Wakayama University, Japan)
  105. Exponent Function for the Gel'fand-Pinsker Channel at Rates above the Capacity
    Yasutada Oohama (University of Electro-Communications, Japan)
  106. Entropy to Control Planning in Video-Games
    Eric Jacopin (CREC Saint-Cyr, France)
  107. Trellis Code Error Exponent From Results for Asynchronous Multiple Access Channels
    Lóránt Farkas (Budapest University of Technology and Economics, Hungary)
  108. Third-Order Asymptotics of Variable-Length Compression Allowing Errors
    Yuta Sakai and Vincent Y. F. Tan (National University of Singapore, Singapore)
  109. Minimum Energy Analysis for Robust Gaussian Joint Source-Channel Coding with a Square-Law Profile
    Mohammadamin Baniasadi (University of California, Riverside, USA), Ertem Tuncel (UC Riverside, USA)
  110. Address-Event Variable-Length Compression for Time-Encoded Data
    Sharu Theresa Jose and Osvaldo Simeone (King's College London, United Kingdom (Great Britain))
  111. Autoregressive Image Generative Models with Normal and t-distributed Noise and the Bayes Codes for Them
    Yuta Nakahara and Toshiyasu Matsushima (Waseda University, Japan)
  112. On an Alternative Approach to Congestion Detection in Ad Hoc Networks
    Xiaojie Liu and Ulrich Speidel (University of Auckland, New Zealand)
  113. The relation between Proportion test and Uniformity test in NIST SP800-22
    Atsushi Iwasaki (Kyoto University, Japan)
  114. Simplification of the Calculation of the Channel Matrix for AMPM Coherent-state Signals
    Ryusuke Miyazaki, Mana Yoshida, Tiancheng Wang and Tsuyoshi Usuda (Aichi Prefectural University, Japan)
  115. Formalization of VT Codes and Their Single-Deletion Correcting Property in Lean
    Yuki Kondo, Manabu Hagiwara and Midori Kudo (Chiba University, Japan)
  116. Optimal Power Allocation of Cooperative Superposition-Coded Relaying with Finite-Blocklength Transmission over Quasi-Static Rayleigh Channels
    Masaya Kambara (Doshisha University, Japan), Guanghui Song (Singapore University of Technology and Design, Singapore), Tomotaka Kimura and Jun Cheng (Doshisha University, Japan)
  117. Latency-Energy Tradeoff with Realistic Hardware Models
    Anders Høst-Madsen, Nicholas Whitcomb and Jeffrey Weldon (University of Hawaii, USA), Zixiang Xiong (Texas A&M University & Monash University, USA)
  118. Performance Evaluation of Ghost Imaging with Orthogonal/Non-orthogonal Quantum States in Terms of Image Quality
    Yuto Takahashi (Meijo University, Japan), Tiancheng Wang (Aichi Prefectural University, Japan), Shogo Usami (Meijo University, Japan), Tsuyoshi Usuda (Aichi Prefectural University, Japan)
  119. A Construction of Robustly Reusable Fuzzy Extractors over Blockchains
    Kodai Sato, Kenji Yasunaga and Toru Fujiwara (Osaka University, Japan)
  120. Visible Video Data Hiding Techniques Based on Visual Effects Utilizing Barcodes
    Tetsuya Kojima (National Institute of Technology, Tokyo College, Japan)
  121. Remote Empirical Coordination
    Michail Mylonakis, Photios A. Stavrou and Mikael Skoglund (KTH Royal Institute of Technology, Sweden)
  122. On Berger-Tung Inner Bound for Sum-Rate versus Sum-Distortion Problem
    Srinivas Avasarala (IIT Hyderabad, India), Sharang Sriram and Soumya Jana (Indian Institute of Technology, Hyderabad, India)
  123. A Key Recovery Algorithm Using Random Key Leakage from AES Key Schedule
    Tomoki Uemura, Yohei Watanabe and Yang Li (The University of Electro-Communications, Japan), Noriyuki Miura (Osaka University, Japan), Mitsugu Iwamoto, Kazuo Sakiyama and Kazuo Ohta (The University of Electro-Communications, Japan)
  124. A Coding Theory Perspective on Multiplexed Molecular Profiling of Biological Tissues
    Luca DAlessio (Broad Institute, USA), Litian Liu (Massachusetts Institute of Technology, USA), Ken R. Duffy (Hamilton Institute, Maynooth University, Ireland), Yonina C. Eldar (Weizmann Institute of Science, Israel), Muriel Médard (MIT, USA), Mehrtash Babadi (Broad Institute, USA)