The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Shigeo Tsujii: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Kazuto Matsuo, Jinhui Chao, Shigeo Tsujii
    An Improved Baby Step Giant Step Algorithm for Point Counting of Hyperelliptic Curves over Finite Fields. [Citation Graph (0, 0)][DBLP]
    ANTS, 2002, pp:461-474 [Conf]
  2. Masahiro Fukumoto, Hajime Kubota, Shigeo Tsujii
    New Block Adaptive Algorithm using the Conjugate Gradient Method. [Citation Graph (0, 0)][DBLP]
    Applied Informatics, 1994, pp:231-234 [Conf]
  3. Jinhui Chao, Kazuto Matsuo, Hiroto Kawashiro, Shigeo Tsujii
    Construction of Hyperelliptic Curves with CM and Its Application to Cryptosystems. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 2000, pp:259-273 [Conf]
  4. Jinhui Chao, Osamu Nakamura, Kohji Sobataka, Shigeo Tsujii
    Construction of Secure Elliptic Cryptosystems Using CM Tests and Liftings. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 1998, pp:95-109 [Conf]
  5. Kaoru Kurosawa, Koji Okada, Shigeo Tsujii
    Low Exponent Attack against Elliptic Curve RSA. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 1994, pp:376-383 [Conf]
  6. Wakaha Ogata, Kaoru Kurosawa, Shigeo Tsujii
    Nonperfect Secret Sharing Schemes. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 1992, pp:56-66 [Conf]
  7. Takashi Satoh, Kaoru Kurosawa, Shigeo Tsujii
    Privacy for Multi-Party Protocols. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 1992, pp:252-260 [Conf]
  8. Shigeo Tsujii
    Electronic Money and Key Management from Global and Regional Points of View. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 1996, pp:173-184 [Conf]
  9. Jinhui Chao, Kazuo Tanada, Shigeo Tsujii
    Design of Elliptic Curves with Controllable Lower Boundary of Extension Degree for Reduction Attacks. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1994, pp:50-55 [Conf]
  10. Toshiya Itoh, Masafumi Hoshi, Shigeo Tsujii
    A Low Communication Competitive Interactive Proof System for Promised Quadratic Residuosity. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1993, pp:61-72 [Conf]
  11. Kaoru Kurosawa, Shigeo Tsujii
    Multi-Language Zero Knowledge Interactive Proof Systems. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1990, pp:339-352 [Conf]
  12. Shigeo Tsujii, Jinhui Chao
    A New ID-Based Key Sharing System. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1991, pp:288-299 [Conf]
  13. Shigeo Tsujii
    Paradigm of Information Security as Interdisciplinary Comprehensive Science. [Citation Graph (0, 0)][DBLP]
    CW, 2004, pp:9-20 [Conf]
  14. Kaoru Kurosawa, Koji Okada, Keiichi Sakano, Wakaha Ogata, Shigeo Tsujii
    Nonperfect Secret Sharing Schemes and Matroids. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1993, pp:126-141 [Conf]
  15. Kaoru Kurosawa, Yutaka Katayama, Wakaha Ogata, Shigeo Tsujii
    General Public Key Residue Cryptosystems and Mental Poker Protocols. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1990, pp:374-388 [Conf]
  16. Choonsik Park, Kaoru Kurosawa, Tatsuaki Okamoto, Shigeo Tsujii
    On Key Distribution and Authentication in Mobile Radio Networks. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1993, pp:461-465 [Conf]
  17. S. Shinozaki, Toshiya Itoh, Atsushi Fujioka, Shigeo Tsujii
    Provably Secure Key-Updating Schemes in Identity-Based Systems. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1990, pp:16-30 [Conf]
  18. Kaoru Kurosawa, Shigeo Tsujii
    An Efficient Method to Find Invalid Loops in a Communication Protocol and Its Application to HDLC. [Citation Graph (0, 0)][DBLP]
    ICC, 1986, pp:563-567 [Conf]
  19. Jinhui Chao, Nori Matsuda, Shigeo Tsujii
    Efficient construction of secure hyperelliptic discrete logarithm problems. [Citation Graph (0, 0)][DBLP]
    ICICS, 1997, pp:292-301 [Conf]
  20. Shigeo Tsujii
    Information Security as Interdisciplinary Science Based on Ethics. [Citation Graph (0, 0)][DBLP]
    ICISC, 2005, pp:2- [Conf]
  21. Jinhui Chao, Shinobu Kawabe, Shigeo Tsujii
    Convergence Analysis of Gradient Adaptive Algorithms for Arbitrary Inputs. [Citation Graph (0, 0)][DBLP]
    ISCAS, 1994, pp:41-44 [Conf]
  22. Jinhui Chao, Teruyuki Sato, Kohichi Sakaniwa, Shigeo Tsujii
    New Results on Stability Theory of Time-Varying Linear Systems. [Citation Graph (0, 0)][DBLP]
    ISCAS, 1994, pp:245-248 [Conf]
  23. Masahiro Fukumoto, Hajime Kubota, Shigeo Tsujii
    Improvement in Stability and Convergence Speed on Normalized LMS Algorithm. [Citation Graph (0, 0)][DBLP]
    ISCAS, 1995, pp:1243-1246 [Conf]
  24. Kaoru Kurosawa, Kouichi Kawabe, Shigeo Tsujii
    Stability and zeros of a complex polynomial. [Citation Graph (0, 0)][DBLP]
    ISCAS, 1993, pp:2279-2282 [Conf]
  25. Kaoru Kurosawa, Isao Yamada, Tetsunari Yokokawa, Shigeo Tsujii
    A fast stability test for multidimensional systems. [Citation Graph (0, 0)][DBLP]
    ISCAS, 1993, pp:579-582 [Conf]
  26. Masahiro Fukumoto, Hajime Kubota, Shigeo Tsujii
    Simplification of stochastic fastest NLMS algorithm. [Citation Graph (0, 0)][DBLP]
    ISCAS (3), 1999, pp:158-161 [Conf]
  27. Jinhui Chao, Kazuto Matsuo, Shigeo Tsujii
    Fast Construction of Secure Discrete Logarithm Problems over Jacobian Varieties. [Citation Graph (0, 0)][DBLP]
    SEC, 2000, pp:241-250 [Conf]
  28. Toshiya Itoh, Shigeo Tsujii
    A Fast Algorithm for Computing Multiplicative Inverses in GF(2^m) Using Normal Bases [Citation Graph (0, 0)][DBLP]
    Inf. Comput., 1988, v:78, n:3, pp:171-177 [Journal]
  29. Toshiya Itoh, Shigeo Tsujii
    Structure of Parallel Multipliers for a Class of Fields GF(2^m) [Citation Graph (0, 0)][DBLP]
    Inf. Comput., 1989, v:83, n:1, pp:21-40 [Journal]
  30. Masaki Gonda, Kazuto Matsuo, Kazumaro Aoki, Jinhui Chao, Shigeo Tsujii
    Improvements of Addition Algorithm on Genus 3 Hyperelliptic Curves and Their Implementation. [Citation Graph (0, 0)][DBLP]
    IEICE Transactions, 2005, v:88, n:1, pp:89-96 [Journal]
  31. Tsutomu Iijima, Mahoro Shimura, Jinhui Chao, Shigeo Tsujii
    An Extension of GHS Weil Descent Attack. [Citation Graph (0, 0)][DBLP]
    IEICE Transactions, 2005, v:88, n:1, pp:97-104 [Journal]
  32. Yukio Itakura, Masaki Hashiyada, Toshio Nagashima, Shigeo Tsujii
    Proposal on personal identifiers generated from the STR information of DNA. [Citation Graph (0, 0)][DBLP]
    Int. J. Inf. Sec., 2002, v:1, n:3, pp:149-160 [Journal]
  33. Yukio Itakura, Shigeo Tsujii
    Proposal on a multifactor biometric authentication method based on cryptosystem keys containing biometric signatures. [Citation Graph (0, 0)][DBLP]
    Int. J. Inf. Sec., 2005, v:4, n:4, pp:288-296 [Journal]
  34. Toshiya Itoh, Shigeo Tsujii
    An Efficient Algorithm for Deciding Quadratic Residuosity in Finite Fields GF(p_m). [Citation Graph (0, 0)][DBLP]
    Inf. Process. Lett., 1989, v:30, n:3, pp:111-114 [Journal]
  35. Kaoru Kurosawa, Koji Okada, Shigeo Tsujii
    Low Exponent Attack Against Elliptic Curve RSA. [Citation Graph (0, 0)][DBLP]
    Inf. Process. Lett., 1995, v:53, n:2, pp:77-83 [Journal]
  36. Toshiya Itoh, Masafumi Hoshi, Shigeo Tsujii
    A Low Communication Competitive Interactive Proof System for Promised Quadratic Residuosity. [Citation Graph (0, 0)][DBLP]
    J. Cryptology, 1996, v:9, n:2, pp:101-109 [Journal]
  37. Shigeo Tsujii, Jinhui Chao, Kiyomiche Araki
    A Simple ID-Based Scheme for Key Sharing. [Citation Graph (0, 0)][DBLP]
    IEEE Journal on Selected Areas in Communications, 1993, v:11, n:5, pp:730-734 [Journal]

  38. Kalman filter for robust noise suppression in white and colored noises. [Citation Graph (, )][DBLP]


  39. Nonlinear Piece In Hand Perturbation Vector Method for Enhancing Security of Multivariate Public Key Cryptosystems. [Citation Graph (, )][DBLP]


  40. Proposal of a Signature Scheme Based on STS Trapdoor. [Citation Graph (, )][DBLP]


  41. Fast Noise Suppression Algorithm with Kalman Filter Theory. [Citation Graph (, )][DBLP]


Search in 0.003secs, Finished in 0.302secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002