Shigeo Tsujii
According to our database1,
Shigeo Tsujii
authored at least 87 papers
between 1986 and 2020.
Collaborative distances:
Collaborative distances:
Awards
IEEE Fellow
IEEE Fellow 1990, "For contributions to the development of digital signal processing in communication systems.".
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2020
IACR Cryptol. ePrint Arch., 2020
Proposal of Multivariate Public Key Cryptosystem Based on Modulus of Numerous Prime Numbers and CRT with Security of IND-CPA.
IACR Cryptol. ePrint Arch., 2020
2018
2016
Proposal of the Multivariate Public Key Cryptosystem Relying on the Difficulty of Factoring a Product of Two Large Prime Numbers.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2016
Proceedings of the Tenth IEEE International Conference on Semantic Computing, 2016
Proceedings of the IEEE Second International Conference on Multimedia Big Data, 2016
2015
Proceedings of the 9th IEEE International Conference on Semantic Computing, 2015
Proceedings of the 29th IEEE International Conference on Advanced Information Networking and Applications, 2015
2013
Proceedings of the 2013 International Conference on IT Convergence and Security, 2013
Proceedings of the Financial Cryptography and Data Security, 2013
2012
Construction of the Tsujii-Shamir-Kasahara (TSK) Type Multivariate Public Key Cryptosystem, which relies on the Difficulty of Prime Factorization.
IACR Cryptol. ePrint Arch., 2012
Proceedings of the International Symposium on Information Theory and its Applications, 2012
2011
2010
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2010
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2010
IACR Cryptol. ePrint Arch., 2010
Enhanced STS using Check Equation -Extended Version of the Signature scheme proposed in the PQCrypt2010-.
IACR Cryptol. ePrint Arch., 2010
Proceedings of the International Symposium on Information Theory and its Applications, 2010
Two-sided multiplications are reduced to one-sided multiplication in linear piece in hand matrix methods.
Proceedings of the International Symposium on Information Theory and its Applications, 2010
Proceedings of the International Symposium on Information Theory and its Applications, 2010
2009
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2009
IACR Cryptol. ePrint Arch., 2009
2008
Robust Noise Suppression Algorithm with the Kalman Filter Theory for White and Colored Disturbance.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2008
Nonlinear Piece In Hand Matrix Method for Enhancing Security of Multivariate Public Key Cryptosystems.
IACR Cryptol. ePrint Arch., 2008
Nonlinear Piece In Hand Perturbation Vector Method for Enhancing Security of Multivariate Public Key Cryptosystems.
IACR Cryptol. ePrint Arch., 2008
Proceedings of the ISUC 2008, 2008
Proceedings of the International Symposium on Circuits and Systems (ISCAS 2008), 2008
2007
Proposal for Piece in Hand Matrix: General Concept for Enhancing Security of Multivariate Public Key Cryptosystems.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2007
2006
Proposal for Piece In Hand Matrix Ver.2: General Concept for Enhancing Security of Multivariate Public Key Cryptosystems.
IACR Cryptol. ePrint Arch., 2006
2005
Proposal on a multifactor biometric authentication method based on cryptosystem keys containing biometric signatures.
Int. J. Inf. Sec., 2005
A Subspace Blind Identification Algorithm with Reduced Computational Complexity - Colored Noise Case - .
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2005
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2005
Improvements of Addition Algorithm on Genus 3 Hyperelliptic Curves and Their Implementation.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2005
Proceedings of the Information Security and Cryptology, 2005
2004
Piece In Hand Concept for Enhancing the Security of Multivariate Type Public Key Cryptosystems: Public Key Without Containing All the Information of Secret Key.
IACR Cryptol. ePrint Arch., 2004
Proceedings of the 3rd International Conference on Cyberworlds (CW 2004), 2004
2003
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2003
Proposal on Personal Authentication System in which Biological Information is embedded in Cryptosystem Key.
IACR Cryptol. ePrint Arch., 2003
2002
Int. J. Inf. Sec., 2002
A consideration on the blind channel estimation based on IIR type model with bias compensation.
Proceedings of the IEEE International Conference on Acoustics, 2002
An Improved Baby Step Giant Step Algorithm for Point Counting of Hyperelliptic Curves over Finite Fields.
Proceedings of the Algorithmic Number Theory, 5th International Symposium, 2002
2001
A consideration on the blind estimation of single-input double-output system using orthogonal direct sum decomposition of received signal space.
Proceedings of the IEEE International Conference on Acoustics, 2001
2000
Fast Construction of Secure Discrete Logarithm Problems over Jacobian Varieties.
Proceedings of the Information Security for Global Information Infrastructures, 2000
Proceedings of the Advances in Cryptology, 2000
1999
Proceedings of the 1999 International Symposium on Circuits and Systems, ISCAS 1999, Orlando, Florida, USA, May 30, 1999
1998
Int. J. Medical Informatics, 1998
Proceedings of the Advances in Cryptology, 1998
1997
Proceedings of the Information and Communication Security, First International Conference, 1997
1996
A Low Communication Competitive Interactive Proof System for Promised Quadratic Residuosity.
J. Cryptol., 1996
Proceedings of the Advances in Cryptology, 1996
1995
Proceedings of the 1995 IEEE International Symposium on Circuits and Systems, ISCAS 1995, Seattle, Washington, USA, April 30, 1995
1994
A multidimensional isomorphic operator and its properties-a proposal of finite-extent multidimensional cepstrum.
IEEE Trans. Signal Process., 1994
Proceedings of the 1994 IEEE International Symposium on Circuits and Systems, ISCAS 1994, London, England, UK, May 30, 1994
Proceedings of the 1994 IEEE International Symposium on Circuits and Systems, ISCAS 1994, London, England, UK, May 30, 1994
Proceedings of ICASSP '94: IEEE International Conference on Acoustics, 1994
Design of Elliptic Curves with Controllable Lower Boundary of Extension Degree for Reduction Attacks.
Proceedings of the Advances in Cryptology, 1994
New Block Adaptive Algorithm using the Conjugate Gradient Method.
Proceedings of the 12st IASTED International Conference on Applied Informatics, 1994
1993
A fast stability test for multidimensional systems.
Proceedings of the 1993 IEEE International Symposium on Circuits and Systems, 1993
Stability and zeros of a complex polynomial.
Proceedings of the 1993 IEEE International Symposium on Circuits and Systems, 1993
Proceedings of the Advances in Cryptology, 1993
Proceedings of the Advances in Cryptology, 1993
1992
Syst. Comput. Jpn., 1992
1991
IEEE Trans. Signal Process., 1991
IEEE Trans. Signal Process., 1991
IEEE Trans. Signal Process., 1991
J. Circuits Syst. Comput., 1991
1990
IEEE Trans. Acoust. Speech Signal Process., 1990
Effect of floating-point error reduction with recursive least square for parallel architecture.
Proceedings of the 1990 International Conference on Acoustics, 1990
Proceedings of the Advances in Cryptology, 1990
Proceedings of the Advances in Cryptology, 1990
1989
Inf. Comput., October, 1989
IEEE Trans. Acoust. Speech Signal Process., 1989
IEEE Trans. Commun., 1989
IEEE J. Sel. Areas Commun., 1989
Inf. Process. Lett., 1989
Proceedings of the IEEE International Conference on Acoustics, 1989
1988
Inf. Comput., September, 1988
A public-key cryptosystem based on the difficulty of solving a system of nonlinear equations.
Syst. Comput. Jpn., 1988
Proceedings of the IEEE International Conference on Acoustics, 1988
1986
An Efficient Method to Find Invalid Loops in a Communication Protocol and Its Application to HDLC.
Proceedings of the IEEE International Conference on Communications: Integrating the World Through Communications, 1986
Proceedings of the IEEE International Conference on Acoustics, 1986