Shigeo Tsujii

According to our database1, Shigeo Tsujii authored at least 87 papers between 1986 and 2020.

Collaborative distances:

Awards

IEEE Fellow

IEEE Fellow 1990, "For contributions to the development of digital signal processing in communication systems.".

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2020
3-Layer Public Key Cryptosystem with Short Tandem Repeat DNA.
IACR Cryptol. ePrint Arch., 2020

Proposal of Multivariate Public Key Cryptosystem Based on Modulus of Numerous Prime Numbers and CRT with Security of IND-CPA.
IACR Cryptol. ePrint Arch., 2020

2018
Organizational Cryptography for Access Control.
IACR Cryptol. ePrint Arch., 2018

2016
Proposal of the Multivariate Public Key Cryptosystem Relying on the Difficulty of Factoring a Product of Two Large Prime Numbers.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2016

Privacy Preserving Logic Formula Calculation in Cloud.
Proceedings of the Tenth IEEE International Conference on Semantic Computing, 2016

Secure Semantic Computing.
Proceedings of the IEEE Second International Conference on Multimedia Big Data, 2016

2015
Secure problems solving scheme.
Proceedings of the 9th IEEE International Conference on Semantic Computing, 2015

Privacy Preserving Data Processing.
Proceedings of the 29th IEEE International Conference on Advanced Information Networking and Applications, 2015

2013
Privacy Preserving Problem Solving Scheme.
Proceedings of the 2013 International Conference on IT Convergence and Security, 2013

Privacy Preserving Data Processing with Collaboration of Homomorphic Cryptosystems.
Proceedings of the Financial Cryptography and Data Security, 2013

2012
Construction of the Tsujii-Shamir-Kasahara (TSK) Type Multivariate Public Key Cryptosystem, which relies on the Difficulty of Prime Factorization.
IACR Cryptol. ePrint Arch., 2012

Scheme overcoming incompatibility of privacy and utilization of personal data.
Proceedings of the International Symposium on Information Theory and its Applications, 2012

2011
Hidden Pair of Bijection Signature Scheme.
IACR Cryptol. ePrint Arch., 2011

2010
Key-Generation Algorithms for Linear Piece In Hand Matrix Method.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2010

Dually-Perturbed Matsumoto-Imai Signature (DPMS) Scheme.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2010

Proposal of a Signature Scheme based on STS Trapdoor.
IACR Cryptol. ePrint Arch., 2010

Enhanced STS using Check Equation -Extended Version of the Signature scheme proposed in the PQCrypt2010-.
IACR Cryptol. ePrint Arch., 2010

Clarifying the specification of linear Piece In Hand matrix method.
Proceedings of the International Symposium on Information Theory and its Applications, 2010

Two-sided multiplications are reduced to one-sided multiplication in linear piece in hand matrix methods.
Proceedings of the International Symposium on Information Theory and its Applications, 2010

A knapsack cryptosystem based on multiple knapsacks.
Proceedings of the International Symposium on Information Theory and its Applications, 2010

2009
Security Enhancement of Various MPKCs by 2-Layer Nonlinear Piece in Hand Method.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2009

Proposal of PPS Multivariate Public Key Cryptosystems.
IACR Cryptol. ePrint Arch., 2009

2008
Robust Noise Suppression Algorithm with the Kalman Filter Theory for White and Colored Disturbance.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2008

Nonlinear Piece In Hand Matrix Method for Enhancing Security of Multivariate Public Key Cryptosystems.
IACR Cryptol. ePrint Arch., 2008

Nonlinear Piece In Hand Perturbation Vector Method for Enhancing Security of Multivariate Public Key Cryptosystems.
IACR Cryptol. ePrint Arch., 2008

Fast Noise Suppression Algorithm with Kalman Filter Theory.
Proceedings of the ISUC 2008, 2008

Kalman filter for robust noise suppression in white and colored noises.
Proceedings of the International Symposium on Circuits and Systems (ISCAS 2008), 2008

2007
Proposal for Piece in Hand Matrix: General Concept for Enhancing Security of Multivariate Public Key Cryptosystems.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2007

2006
Proposal for Piece In Hand Matrix Ver.2: General Concept for Enhancing Security of Multivariate Public Key Cryptosystems.
IACR Cryptol. ePrint Arch., 2006

2005
Proposal on a multifactor biometric authentication method based on cryptosystem keys containing biometric signatures.
Int. J. Inf. Sec., 2005

A Subspace Blind Identification Algorithm with Reduced Computational Complexity - Colored Noise Case - .
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2005

An Extension of GHS Weil Descent Attack.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2005

Improvements of Addition Algorithm on Genus 3 Hyperelliptic Curves and Their Implementation.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2005

Information Security as Interdisciplinary Science Based on Ethics.
Proceedings of the Information Security and Cryptology, 2005

2004
Piece In Hand Concept for Enhancing the Security of Multivariate Type Public Key Cryptosystems: Public Key Without Containing All the Information of Secret Key.
IACR Cryptol. ePrint Arch., 2004

Paradigm of Information Security as Interdisciplinary Comprehensive Science.
Proceedings of the 3rd International Conference on Cyberworlds (CW 2004), 2004

2003
Baby Step Giant Step Algorithms in Point Counting of Hyperelliptic Curves.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2003

Proposal on Personal Authentication System in which Biological Information is embedded in Cryptosystem Key.
IACR Cryptol. ePrint Arch., 2003

2002
Proposal on personal identifiers generated from the STR information of DNA.
Int. J. Inf. Sec., 2002

A consideration on the blind channel estimation based on IIR type model with bias compensation.
Proceedings of the IEEE International Conference on Acoustics, 2002

An Improved Baby Step Giant Step Algorithm for Point Counting of Hyperelliptic Curves over Finite Fields.
Proceedings of the Algorithmic Number Theory, 5th International Symposium, 2002

2001
A consideration on the blind estimation of single-input double-output system using orthogonal direct sum decomposition of received signal space.
Proceedings of the IEEE International Conference on Acoustics, 2001

2000
Fast Construction of Secure Discrete Logarithm Problems over Jacobian Varieties.
Proceedings of the Information Security for Global Information Infrastructures, 2000

Construction of Hyperelliptic Curves with CM and Its Application to Cryptosystems.
Proceedings of the Advances in Cryptology, 2000

1999
Simplification of stochastic fastest NLMS algorithm.
Proceedings of the 1999 International Symposium on Circuits and Systems, ISCAS 1999, Orlando, Florida, USA, May 30, 1999

1998
Revolution of civilisation and information security.
Int. J. Medical Informatics, 1998

Construction of Secure Elliptic Cryptosystems Using CM Tests and Liftings.
Proceedings of the Advances in Cryptology, 1998

1997
Efficient construction of secure hyperelliptic discrete logarithm problems.
Proceedings of the Information and Communication Security, First International Conference, 1997

1996
A Low Communication Competitive Interactive Proof System for Promised Quadratic Residuosity.
J. Cryptol., 1996

Electronic Money and Key Management from Global and Regional Points of View.
Proceedings of the Advances in Cryptology, 1996

1995
Low Exponent Attack Against Elliptic Curve RSA.
Inf. Process. Lett., 1995

Improvement in Stability and Convergence Speed on Normalized LMS Algorithm.
Proceedings of the 1995 IEEE International Symposium on Circuits and Systems, ISCAS 1995, Seattle, Washington, USA, April 30, 1995

1994
A multidimensional isomorphic operator and its properties-a proposal of finite-extent multidimensional cepstrum.
IEEE Trans. Signal Process., 1994

A new IIR adaptive echo canceler: GIVE.
IEEE J. Sel. Areas Commun., 1994

New Results on Stability Theory of Time-Varying Linear Systems.
Proceedings of the 1994 IEEE International Symposium on Circuits and Systems, ISCAS 1994, London, England, UK, May 30, 1994

Convergence Analysis of Gradient Adaptive Algorithms for Arbitrary Inputs.
Proceedings of the 1994 IEEE International Symposium on Circuits and Systems, ISCAS 1994, London, England, UK, May 30, 1994

A stable and globally convergent OEM IIR ADF.
Proceedings of ICASSP '94: IEEE International Conference on Acoustics, 1994

Design of Elliptic Curves with Controllable Lower Boundary of Extension Degree for Reduction Attacks.
Proceedings of the Advances in Cryptology, 1994

New Block Adaptive Algorithm using the Conjugate Gradient Method.
Proceedings of the 12st IASTED International Conference on Applied Informatics, 1994

1993
A Simple ID-Based Scheme for Key Sharing.
IEEE J. Sel. Areas Commun., 1993

A fast stability test for multidimensional systems.
Proceedings of the 1993 IEEE International Symposium on Circuits and Systems, 1993

Stability and zeros of a complex polynomial.
Proceedings of the 1993 IEEE International Symposium on Circuits and Systems, 1993

On Key Distribution and Authentication in Mobile Radio Networks.
Proceedings of the Advances in Cryptology, 1993

Nonperfect Secret Sharing Schemes and Matroids.
Proceedings of the Advances in Cryptology, 1993

1992
Communication protocols with untraceability of sender and receiver.
Syst. Comput. Jpn., 1992

Privacy for Multi-Party Protocols.
Proceedings of the Advances in Cryptology, 1992

Nonperfect Secret Sharing Schemes.
Proceedings of the Advances in Cryptology, 1992

1991
A fast parallel form IIR adaptive filter algorithm.
IEEE Trans. Signal Process., 1991

A system identification algorithm using orthogonal functions.
IEEE Trans. Signal Process., 1991

A stable and distortion-free IIR echo and howling canceler.
IEEE Trans. Signal Process., 1991

Provably Secure Key-Updating Schemes in Identity-Based Systems.
J. Circuits Syst. Comput., 1991

A New ID-Based Key Sharing System.
Proceedings of the Advances in Cryptology, 1991

1990
A fast adaptive filter algorithm using eigenvalue reciprocals as stepsizes.
IEEE Trans. Acoust. Speech Signal Process., 1990

Effect of floating-point error reduction with recursive least square for parallel architecture.
Proceedings of the 1990 International Conference on Acoustics, 1990

General Public Key Residue Cryptosystems and Mental Poker Protocols.
Proceedings of the Advances in Cryptology, 1990

Multi-Language Zero Knowledge Interactive Proof Systems.
Proceedings of the Advances in Cryptology, 1990

1989
Structure of Parallel Multipliers for a Class of Fields GF(2^m)
Inf. Comput., October, 1989

An IIR parallel-type adaptive algorithm using the fast least squares method.
IEEE Trans. Acoust. Speech Signal Process., 1989

A new configuration for echo canceller adaptable during double talk periods.
IEEE Trans. Commun., 1989

An ID-based cryptosystem based on the discrete logarithm problem.
IEEE J. Sel. Areas Commun., 1989

An Efficient Algorithm for Deciding Quadratic Residuosity in Finite Fields GF(p_m).
Inf. Process. Lett., 1989

The orthogonal projection algorithm for block adaptive signal processing.
Proceedings of the IEEE International Conference on Acoustics, 1989

1988
A Fast Algorithm for Computing Multiplicative Inverses in GF(2^m) Using Normal Bases
Inf. Comput., September, 1988

A public-key cryptosystem based on the difficulty of solving a system of nonlinear equations.
Syst. Comput. Jpn., 1988

A stable and distortion-free echo and howling canceller [telephone networks].
Proceedings of the IEEE International Conference on Acoustics, 1988

1986
An Efficient Method to Find Invalid Loops in a Communication Protocol and Its Application to HDLC.
Proceedings of the IEEE International Conference on Communications: Integrating the World Through Communications, 1986

A new IIR type adaptive algorithm of parallel type structure.
Proceedings of the IEEE International Conference on Acoustics, 1986


  Loading...