Junji Shikata
Orcid: 0000-0003-2861-359X
According to our database1,
Junji Shikata
authored at least 123 papers
between 1999 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
An Efficient Information Reconciliation Scheme via Partial Encoding for Physical Layer Secret Key Generation.
IEEE Commun. Lett., June, 2024
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2024
IACR Cryptol. ePrint Arch., 2024
IACR Cryptol. ePrint Arch., 2024
Proceedings of the Post-Quantum Cryptography - 15th International Workshop, 2024
Proceedings of the Cryptology and Network Security - 23rd International Conference, 2024
Proceedings of the Cryptology and Network Security - 23rd International Conference, 2024
2023
A Data-Driven Analysis of Secret Key Rate for Physical Layer Secret Key Generation From Wireless Channels.
IEEE Commun. Lett., December, 2023
Mitigate: Toward Comprehensive Research and Development for Analyzing and Combating IoT Malware.
IEICE Trans. Inf. Syst., September, 2023
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., March, 2023
IEEE Internet Things J., 2023
IACR Cryptol. ePrint Arch., 2023
IACR Cryptol. ePrint Arch., 2023
Identity-Based Matchmaking Encryption, Revisited: Strong Security and Practical Constructions from Standard Classical and Post-Quantum Assumptions.
IACR Cryptol. ePrint Arch., 2023
Anonymous Broadcast Authentication with Logarithmic-order Ciphertexts from DLP or LWE.
IACR Cryptol. ePrint Arch., 2023
Tight lower bounds and optimal constructions of anonymous broadcast encryption and authentication.
Des. Codes Cryptogr., 2023
Anonymous Broadcast Authentication With One-to-Many Transmission to Control IoT Devices.
IEEE Access, 2023
Proceedings of the Information Security Applications - 24th International Conference, 2023
Proceedings of the IEEE Radio and Wireless Symposium, 2023
Proceedings of the Provable and Practical Security, 2023
Proceedings of the Post-Quantum Cryptography - 14th International Workshop, 2023
Proceedings of the Mobile Internet Security - 7th International Conference, 2023
Proceedings of the Mobile Internet Security - 7th International Conference, 2023
Proceedings of the IEEE Information Theory Workshop, 2023
IoT-REX: A Secure Remote-Control System for IoT Devices from Centralized Multi-designated Verifier Signatures.
Proceedings of the Information Security Practice and Experience, 2023
Chosen Ciphertext Security for Blind Identity-Based Encryption with Certified Identities.
Proceedings of the Information Security Practice and Experience, 2023
Forward and Backward Private Dynamic Searchable Encryption with Better Space Efficiency.
Proceedings of the 57th Annual Conference on Information Sciences and Systems, 2023
Proceedings of the Cryptology and Network Security - 22nd International Conference, 2023
2022
SO-CCA Secure PKE in the Quantum Random Oracle Model or the Quantum Ideal Cipher Model.
IACR Cryptol. ePrint Arch., 2022
IACR Cryptol. ePrint Arch., 2022
Security Gap Improvement of BICM Systems Through Bit-Labeling Optimization for the Gaussian Wiretap Channel.
IEEE Access, 2022
Proceedings of the Information Security and Cryptology - ICISC 2022, 2022
Proceedings of the Information Security and Cryptology - ICISC 2022, 2022
Proceedings of the 56th Annual Conference on Information Sciences and Systems, 2022
2021
Performance Analysis of Wireless Steganography based on OFDM and DFT-s-OFDM Signals over Frequency-Selective Rayleigh Fading Channels.
Proceedings of the 24th International Symposium on Wireless Personal Multimedia Communications, 2021
Asymptotically Tight Lower Bounds in Anonymous Broadcast Encryption and Authentication.
Proceedings of the Cryptography and Coding - 18th IMA International Conference, 2021
Efficient Threshold Public Key Encryption from the Computational Bilinear Diffie-Hellman Assumption.
Proceedings of the 8th on ASIA Public-Key Cryptography Workshop, 2021
Proceedings of the Advanced Information Networking and Applications, 2021
2020
IACR Cryptol. ePrint Arch., 2020
Interactive Aggregate Message Authentication Equipped with Detecting Functionality from Adaptive Group Testing.
IACR Cryptol. ePrint Arch., 2020
IEEE Access, 2020
A Physical-Layer Security Based on Wireless Steganography Through OFDM and DFT-Precoded OFDM Signals.
Proceedings of the 91st IEEE Vehicular Technology Conference, 2020
Proceedings of the International Symposium on Information Theory and Its Applications, 2020
Aggregate Message Authentication Codes with Detecting Functionality from Biorthogonal Codes.
Proceedings of the IEEE International Symposium on Information Theory, 2020
2019
J. Internet Serv. Inf. Secur., 2019
Des. Codes Cryptogr., 2019
Proceedings of the Provable Security, 2019
Proceedings of the Network and System Security - 13th International Conference, 2019
Proceedings of the Cryptography and Coding - 17th IMA International Conference, 2019
Proceedings of the Seventh International Symposium on Computing and Networking Workshops, 2019
Proceedings of the Advanced Information Networking and Applications, 2019
2018
Security Formalizations and Their Relationships for Encryption and Key Agreement in Information-Theoretic Cryptography.
IEEE Trans. Inf. Theory, 2018
IACR Cryptol. ePrint Arch., 2018
Numerical and Non-Asymptotic Analysis of Elias's and Peres's Extractors with Finite Input Sequences.
Entropy, 2018
Des. Codes Cryptogr., 2018
Proceedings of the Provable Security, 2018
Proceedings of the Post-Quantum Cryptography - 9th International Conference, 2018
2017
CCA-secure revocable identity-based encryption schemes with decryption key exposure resistance.
Int. J. Appl. Cryptogr., 2017
Proceedings of the 2017 IEEE Information Theory Workshop, 2017
Proceedings of the 51st Annual Conference on Information Sciences and Systems, 2017
Proceedings of the 51st Annual Conference on Information Sciences and Systems, 2017
2016
J. Inf. Process., 2016
Unconditionally Secure Broadcast Encryption Schemes with Trade-Offs between Communication and Storage.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2016
Unconditionally Secure Revocable Storage: Tight Bounds, Optimal Construction, and Robustness.
IACR Cryptol. ePrint Arch., 2016
Proceedings of the 2016 Annual Conference on Information Science and Systems, 2016
2015
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2015
IACR Cryptol. ePrint Arch., 2015
Design and Analysis of Information-Theoretically Secure Authentication Codes with Non-Uniformly Random Keys.
IACR Cryptol. ePrint Arch., 2015
A Compiler of Two-Party Protocols for Composable and Game-Theoretic Security, and Its Application to Oblivious Transfer.
IACR Cryptol. ePrint Arch., 2015
Constructions of Unconditionally Secure Broadcast Encryption from Key Predistribution Systems with Trade-Offs Between Communication and Storage.
Proceedings of the Provable Security, 2015
Proceedings of the IEEE International Symposium on Information Theory, 2015
Detecting Obfuscated Suspicious JavaScript Based on Information-Theoretic Measures and Novelty Detection.
Proceedings of the Information Security and Cryptology - ICISC 2015, 2015
Proceedings of the Information Security and Privacy - 20th Australasian Conference, 2015
2014
Proceedings of the Provable Security - 8th International Conference, 2014
Proceedings of the 2014 IEEE International Symposium on Information Theory, Honolulu, HI, USA, June 29, 2014
Proceedings of the Cryptography and Information Security in the Balkans, 2014
2013
IACR Cryptol. ePrint Arch., 2013
Proceedings of the 2013 IEEE International Symposium on Information Theory, 2013
Constructions of Signcryption in the Multi-user Setting from Identity-Based Encryption.
Proceedings of the Cryptography and Coding - 14th IMA International Conference, 2013
Proceedings of the Information Security and Cryptology - ICISC 2013, 2013
Information-Theoretically Secure Aggregate Authentication Code: Model, Bounds, and Constructions.
Proceedings of the Security Engineering and Intelligence Informatics, 2013
2012
Information-Theoretic Timed-Release Security: Key-Agreement, Encryption, and Authentication Codes.
IACR Cryptol. ePrint Arch., 2012
Formalization of Information-Theoretic Security for Encryption and Key Agreement, Revisited.
IACR Cryptol. ePrint Arch., 2012
Proceedings of the 12th IEEE/IPSJ International Symposium on Applications and the Internet, 2012
2011
An Empirical Evaluation of an Unpacking Method Implemented with Dynamic Binary Instrumentation.
IEICE Trans. Inf. Syst., 2011
Proceedings of the 2011 IEEE Information Theory Workshop, 2011
Bit Commitment in the Bounded Storage Model: Tight Bound and Simple Optimal Construction.
Proceedings of the Cryptography and Coding - 13th IMA International Conference, 2011
Constructing Secure Hybrid Encryption from Key Encapsulation Mechanism with Authenticity.
Proceedings of the Cryptography and Coding - 13th IMA International Conference, 2011
2010
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2010
Proceedings of the Progress in Cryptology, 2010
2009
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2009
Unconditionally Secure Blind Authentication Codes: The Model, Constructions, and Links to Commitment.
Proceedings of the Formal to Practical Security, 2009
2008
IEEE Trans. Inf. Theory, 2008
On the Use of Bhattacharyya Distance as a Measure of the Detectability of Steganographic Systems.
Trans. Data Hiding Multim. Secur., 2008
2007
Proceedings of the Information Theoretic Security - Second International Conference, 2007
Proceedings of the Information Theoretic Security - Second International Conference, 2007
Construction of Threshold (Hybrid) Encryption in the Random Oracle Model: How to Construct Secure Threshold Tag-KEM from Weakly Secure Threshold KEM.
Proceedings of the Information Security and Privacy, 12th Australasian Conference, 2007
2006
Comput. J., 2006
2005
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2005
Proceedings of the IEEE Information Theory Workshop on Theory and Practice in Information-Theoretic Security, 2005
2004
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2004
IACR Cryptol. ePrint Arch., 2004
2003
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2003
Relation among simulator-based and comparison-based definitions of semantic security.
IACR Cryptol. ePrint Arch., 2003
IACR Cryptol. ePrint Arch., 2003
Systematic Treatment of Collusion Secure Codes: Security Definitions and Their Relations.
Proceedings of the Information Security, 6th International Conference, 2003
Proceedings of the Information Security, 6th International Conference, 2003
2002
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2002
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2002
Equivalence between semantic security and indistinguishability against chosen ciphertext attacks.
IACR Cryptol. ePrint Arch., 2002
Efficient and Unconditionally Secure Digital Signatures and a Security Analysis of a Multireceiver Authentication Code.
Proceedings of the Public Key Cryptography, 2002
Proceedings of the 2002 IEEE Information Theory Workshop, 2002
Proceedings of the Information Security, 5th International Conference, 2002
Unconditionally Secure Key Insulated Cryptosystems: Models, Bounds and Constructions.
Proceedings of the Information and Communications Security, 4th International Conference, 2002
Proceedings of the Advances in Cryptology - EUROCRYPT 2002, International Conference on the Theory and Applications of Cryptographic Techniques, Amsterdam, The Netherlands, April 28, 2002
2000
Proceedings of the Advances in Cryptology, 2000
1999
Proceedings of the Advances in Cryptology, 1999
Optimizing the Menezes-Okamoto-Vanstone (MOV) Algorithm for Non-supersingular Elliptic Curves.
Proceedings of the Advances in Cryptology, 1999