default search action
Shigeo Tsujii
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2020
- [i14]Shigeo Tsujii, Toshiaki Saisho, Masao Yamasawa, Masahito Gotaishi, Kou Shikata, Koji Sasaki, Nobuharu Suzuki, Masaki Hashiyada:
3-Layer Public Key Cryptosystem with Short Tandem Repeat DNA. IACR Cryptol. ePrint Arch. 2020: 305 (2020) - [i13]Shigeo Tsujii, Ryo Fujita, Masahito Gotaishi:
Proposal of Multivariate Public Key Cryptosystem Based on Modulus of Numerous Prime Numbers and CRT with Security of IND-CPA. IACR Cryptol. ePrint Arch. 2020: 314 (2020)
2010 – 2019
- 2018
- [i12]Masahito Gotaishi, Shigeo Tsujii:
Organizational Cryptography for Access Control. IACR Cryptol. ePrint Arch. 2018: 1120 (2018) - 2016
- [j31]Shigeo Tsujii, Kohtaro Tadaki, Ryo Fujita, Masahito Gotaishi:
Proposal of the Multivariate Public Key Cryptosystem Relying on the Difficulty of Factoring a Product of Two Large Prime Numbers. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 99-A(1): 66-72 (2016) - [c48]Hiroshi Yamaguchi, Ryo Fujita, Shigeo Tsujii:
Secure Semantic Computing. BigMM 2016: 390-393 - [c47]Hiroshi Yamaguchi, Shigeo Tsujii, Hiroyuki Okazaki, Yasunari Shidama:
Privacy Preserving Logic Formula Calculation in Cloud. ICSC 2016: 329-332 - 2015
- [c46]Hiroshi Yamaguchi, Masahito Gotaishi, Phillip C.-Y. Sheu, Shigeo Tsujii:
Privacy Preserving Data Processing. AINA 2015: 714-719 - [c45]Hiroshi Yamaguchi, Masahito Gotaishi, Shigeo Tsujii:
Secure problems solving scheme. ICSC 2015: 284-289 - 2013
- [c44]Shigeo Tsujii, Hiroshi Doi, Ryou Fujita, Masahito Gotaishi, Yukiyasu Tsunoo, Takahiko Syouji:
Privacy Preserving Data Processing with Collaboration of Homomorphic Cryptosystems. Financial Cryptography Workshops 2013: 201-212 - [c43]Hiroshi Yamaguchi, Masahito Gotaishi, Phillip C.-Y. Sheu, Shigeo Tsujii:
Privacy Preserving Problem Solving Scheme. ICITCS 2013: 1-4 - 2012
- [c42]Shigeo Tsujii, Kohtaro Tadaki, Ryou Fujita, Hiroshi Yamaguchi, Masahito Gotaishi, Yukiyasu Tsunoo, Takahiko Syouji, Norihisa Doi:
Scheme overcoming incompatibility of privacy and utilization of personal data. ISITA 2012: 727-730 - [i11]Shigeo Tsujii, Kohtaro Tadaki, Masahito Gotaishi, Ryou Fujita:
Construction of the Tsujii-Shamir-Kasahara (TSK) Type Multivariate Public Key Cryptosystem, which relies on the Difficulty of Prime Factorization. IACR Cryptol. ePrint Arch. 2012: 145 (2012) - 2011
- [i10]Masahito Gotaishi, Shigeo Tsujii:
Hidden Pair of Bijection Signature Scheme. IACR Cryptol. ePrint Arch. 2011: 353 (2011) - 2010
- [j30]Masahito Gotaishi, Kohtaro Tadaki, Ryou Fujita, Shigeo Tsujii:
Dually-Perturbed Matsumoto-Imai Signature (DPMS) Scheme. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 93-A(6): 1078-1085 (2010) - [j29]Kohtaro Tadaki, Shigeo Tsujii:
Key-Generation Algorithms for Linear Piece In Hand Matrix Method. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 93-A(6): 1102-1110 (2010) - [c41]Kunikatsu Kobayashi, Kohtaro Tadaki, Masao Kasahara, Shigeo Tsujii:
A knapsack cryptosystem based on multiple knapsacks. ISITA 2010: 428-432 - [c40]Kohtaro Tadaki, Shigeo Tsujii:
Two-sided multiplications are reduced to one-sided multiplication in linear piece in hand matrix methods. ISITA 2010: 900-904 - [c39]Kohtaro Tadaki, Shigeo Tsujii:
Clarifying the specification of linear Piece In Hand matrix method. ISITA 2010: 905-910 - [c38]Shigeo Tsujii, Masahito Gotaishi, Kohtaro Tadaki, Ryou Fujita:
Proposal of a Signature Scheme Based on STS Trapdoor. PQCrypto 2010: 201-217 - [i9]Shigeo Tsujii, Masahito Gotaishi, Kohtaro Tadaki, Ryou Fujita:
Proposal of a Signature Scheme based on STS Trapdoor. IACR Cryptol. ePrint Arch. 2010: 118 (2010) - [i8]Shigeo Tsujii, Masahito Gotaishi:
Enhanced STS using Check Equation -Extended Version of the Signature scheme proposed in the PQCrypt2010-. IACR Cryptol. ePrint Arch. 2010: 480 (2010)
2000 – 2009
- 2009
- [j28]Shigeo Tsujii, Kohtaro Tadaki, Ryou Fujita, Masahito Gotaishi, Toshinobu Kaneko:
Security Enhancement of Various MPKCs by 2-Layer Nonlinear Piece in Hand Method. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 92-A(10): 2438-2446 (2009) - [i7]Shigeo Tsujii, Kohtaro Tadaki, Ryou Fujita, Masahito Gotaishi, Toshinobu Kaneko:
Security Enhancement of Various MPKCs by 2-layer Nonlinear Piece In Hand Method. IACR Cryptol. ePrint Arch. 2009: 61 (2009) - [i6]Shigeo Tsujii, Kohtaro Tadaki, Masahito Gotaishi, Ryou Fujita, Masao Kasahara:
Proposal of PPS Multivariate Public Key Cryptosystems. IACR Cryptol. ePrint Arch. 2009: 264 (2009) - 2008
- [j27]Nari Tanabe, Toshihiro Furukawa, Shigeo Tsujii:
Robust Noise Suppression Algorithm with the Kalman Filter Theory for White and Colored Disturbance. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 91-A(3): 818-829 (2008) - [c37]Nari Tanabe, Toshihiro Furukawa, Hideaki Matsue, Shigeo Tsujii:
Kalman filter for robust noise suppression in white and colored noises. ISCAS 2008: 1172-1175 - [c36]Nari Tanabe, Toshihiro Furukawa, Shigeo Tsujii:
Fast Noise Suppression Algorithm with Kalman Filter Theory. ISUC 2008: 411-415 - [c35]Ryou Fujita, Kohtaro Tadaki, Shigeo Tsujii:
Nonlinear Piece In Hand Perturbation Vector Method for Enhancing Security of Multivariate Public Key Cryptosystems. PQCrypto 2008: 148-164 - [i5]Shigeo Tsujii, Kohtaro Tadaki, Ryou Fujita:
Nonlinear Piece In Hand Matrix Method for Enhancing Security of Multivariate Public Key Cryptosystems. IACR Cryptol. ePrint Arch. 2008: 77 (2008) - [i4]Ryou Fujita, Kohtaro Tadaki, Shigeo Tsujii:
Nonlinear Piece In Hand Perturbation Vector Method for Enhancing Security of Multivariate Public Key Cryptosystems. IACR Cryptol. ePrint Arch. 2008: 298 (2008) - 2007
- [j26]Shigeo Tsujii, Kohtaro Tadaki, Ryou Fujita:
Proposal for Piece in Hand Matrix: General Concept for Enhancing Security of Multivariate Public Key Cryptosystems. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 90-A(5): 992-999 (2007) - 2006
- [i3]Shigeo Tsujii, Kohtaro Tadaki, Ryou Fujita:
Proposal for Piece In Hand Matrix Ver.2: General Concept for Enhancing Security of Multivariate Public Key Cryptosystems. IACR Cryptol. ePrint Arch. 2006: 51 (2006) - 2005
- [j25]Masaki Gonda, Kazuto Matsuo, Kazumaro Aoki, Jinhui Chao, Shigeo Tsujii:
Improvements of Addition Algorithm on Genus 3 Hyperelliptic Curves and Their Implementation. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 88-A(1): 89-96 (2005) - [j24]Tsutomu Iijima, Mahoro Shimura, Jinhui Chao, Shigeo Tsujii:
An Extension of GHS Weil Descent Attack. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 88-A(1): 97-104 (2005) - [j23]Nari Tanabe, Toshihiro Furukawa, Kohichi Sakaniwa, Shigeo Tsujii:
A Subspace Blind Identification Algorithm with Reduced Computational Complexity - Colored Noise Case - . IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 88-A(7): 2015-2018 (2005) - [j22]Yukio Itakura, Shigeo Tsujii:
Proposal on a multifactor biometric authentication method based on cryptosystem keys containing biometric signatures. Int. J. Inf. Sec. 4(4): 288-296 (2005) - [c34]Shigeo Tsujii:
Information Security as Interdisciplinary Science Based on Ethics. ICISC 2005: 2 - 2004
- [c33]Shigeo Tsujii:
Paradigm of Information Security as Interdisciplinary Comprehensive Science. CW 2004: 9-20 - [i2]Shigeo Tsujii, Kohtaro Tadaki, Ryou Fujita:
Piece In Hand Concept for Enhancing the Security of Multivariate Type Public Key Cryptosystems: Public Key Without Containing All the Information of Secret Key. IACR Cryptol. ePrint Arch. 2004: 366 (2004) - 2003
- [j21]Kazuto Matsuo, Jinhui Chao, Shigeo Tsujii:
Baby Step Giant Step Algorithms in Point Counting of Hyperelliptic Curves. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 86-A(5): 1127-1134 (2003) - [i1]Yukio Itakura, Shigeo Tsujii:
Proposal on Personal Authentication System in which Biological Information is embedded in Cryptosystem Key. IACR Cryptol. ePrint Arch. 2003: 110 (2003) - 2002
- [j20]Yukio Itakura, Masaki Hashiyada, Toshio Nagashima, Shigeo Tsujii:
Proposal on personal identifiers generated from the STR information of DNA. Int. J. Inf. Sec. 1(3): 149-160 (2002) - [c32]Kazuto Matsuo, Jinhui Chao, Shigeo Tsujii:
An Improved Baby Step Giant Step Algorithm for Point Counting of Hyperelliptic Curves over Finite Fields. ANTS 2002: 461-474 - [c31]Shingo Kodama, Toshihiro Furukawa, Shigeo Tsujii:
A consideration on the blind channel estimation based on IIR type model with bias compensation. ICASSP 2002: 4169 - 2001
- [c30]Nari Tanabe, Toshihiro Furukawa, Shigeo Tsujii:
A consideration on the blind estimation of single-input double-output system using orthogonal direct sum decomposition of received signal space. ICASSP 2001: 2081-2084 - 2000
- [c29]Jinhui Chao, Kazuto Matsuo, Hiroto Kawashiro, Shigeo Tsujii:
Construction of Hyperelliptic Curves with CM and Its Application to Cryptosystems. ASIACRYPT 2000: 259-273 - [c28]Jinhui Chao, Kazuto Matsuo, Shigeo Tsujii:
Fast Construction of Secure Discrete Logarithm Problems over Jacobian Varieties. SEC 2000: 241-250
1990 – 1999
- 1999
- [c27]Masahiro Fukumoto, Hajime Kubota, Shigeo Tsujii:
Simplification of stochastic fastest NLMS algorithm. ISCAS (3) 1999: 158-161 - 1998
- [j19]Shigeo Tsujii:
Revolution of civilisation and information security. Int. J. Medical Informatics 49(1): 9-18 (1998) - [c26]Jinhui Chao, Osamu Nakamura, Kohji Sobataka, Shigeo Tsujii:
Construction of Secure Elliptic Cryptosystems Using CM Tests and Liftings. ASIACRYPT 1998: 95-109 - 1997
- [c25]Jinhui Chao, Nori Matsuda, Shigeo Tsujii:
Efficient construction of secure hyperelliptic discrete logarithm problems. ICICS 1997: 292-301 - 1996
- [j18]Toshiya Itoh, Masafumi Hoshi, Shigeo Tsujii:
A Low Communication Competitive Interactive Proof System for Promised Quadratic Residuosity. J. Cryptol. 9(2): 101-109 (1996) - [c24]Shigeo Tsujii:
Electronic Money and Key Management from Global and Regional Points of View. ASIACRYPT 1996: 173-184 - 1995
- [j17]Kaoru Kurosawa, Koji Okada, Shigeo Tsujii:
Low Exponent Attack Against Elliptic Curve RSA. Inf. Process. Lett. 53(2): 77-83 (1995) - [c23]Masahiro Fukumoto, Hajime Kubota, Shigeo Tsujii:
Improvement in Stability and Convergence Speed on Normalized LMS Algorithm. ISCAS 1995: 1243-1246 - 1994
- [j16]Jinhui Chao, Shinobu Kawabe, Shigeo Tsujii:
A new IIR adaptive echo canceler: GIVE. IEEE J. Sel. Areas Commun. 12(9): 1530-1539 (1994) - [j15]Isao Yamada, Kohichi Sakaniwa, Shigeo Tsujii:
A multidimensional isomorphic operator and its properties-a proposal of finite-extent multidimensional cepstrum. IEEE Trans. Signal Process. 42(7): 1766-1785 (1994) - [c22]Masahiro Fukumoto, Hajime Kubota, Shigeo Tsujii:
New Block Adaptive Algorithm using the Conjugate Gradient Method. Applied Informatics 1994: 231-234 - [c21]Kaoru Kurosawa, Koji Okada, Shigeo Tsujii:
Low Exponent Attack against Elliptic Curve RSA. ASIACRYPT 1994: 376-383 - [c20]Jinhui Chao, Kazuo Tanada, Shigeo Tsujii:
Design of Elliptic Curves with Controllable Lower Boundary of Extension Degree for Reduction Attacks. CRYPTO 1994: 50-55 - [c19]Jinhui Chao, Teruyuki Sato, Shigeo Tsujii:
A stable and globally convergent OEM IIR ADF. ICASSP (3) 1994: 101-104 - [c18]Jinhui Chao, Shinobu Kawabe, Shigeo Tsujii:
Convergence Analysis of Gradient Adaptive Algorithms for Arbitrary Inputs. ISCAS 1994: 41-44 - [c17]Jinhui Chao, Teruyuki Sato, Kohichi Sakaniwa, Shigeo Tsujii:
New Results on Stability Theory of Time-Varying Linear Systems. ISCAS 1994: 245-248 - 1993
- [j14]Shigeo Tsujii, Jinhui Chao, Kiyomiche Araki:
A Simple ID-Based Scheme for Key Sharing. IEEE J. Sel. Areas Commun. 11(5): 730-734 (1993) - [c16]Toshiya Itoh, Masafumi Hoshi, Shigeo Tsujii:
A Low Communication Competitive Interactive Proof System for Promised Quadratic Residuosity. CRYPTO 1993: 61-72 - [c15]Kaoru Kurosawa, Koji Okada, Keiichi Sakano, Wakaha Ogata, Shigeo Tsujii:
Nonperfect Secret Sharing Schemes and Matroids. EUROCRYPT 1993: 126-141 - [c14]Choonsik Park, Kaoru Kurosawa, Tatsuaki Okamoto, Shigeo Tsujii:
On Key Distribution and Authentication in Mobile Radio Networks. EUROCRYPT 1993: 461-465 - [c13]Kaoru Kurosawa, Isao Yamada, Tetsunari Yokokawa, Shigeo Tsujii:
A fast stability test for multidimensional systems. ISCAS 1993: 579-582 - [c12]Kaoru Kurosawa, Kouichi Kawabe, Shigeo Tsujii:
Stability and zeros of a complex polynomial. ISCAS 1993: 2279-2282 - 1992
- [j13]Masahiro Mambo, Hirotsugu Kinoshita, Shigeo Tsujii:
Communication protocols with untraceability of sender and receiver. Syst. Comput. Jpn. 23(9): 11-18 (1992) - [c11]Wakaha Ogata, Kaoru Kurosawa, Shigeo Tsujii:
Nonperfect Secret Sharing Schemes. AUSCRYPT 1992: 56-66 - [c10]Takashi Satoh, Kaoru Kurosawa, Shigeo Tsujii:
Privacy for Multi-Party Protocols. AUSCRYPT 1992: 252-260 - 1991
- [j12]Shinji Shinozaki, Atsushi Fujioka, Shigeo Tsujii, Toshiya Itoh:
Provably Secure Key-Updating Schemes in Identity-Based Systems. J. Circuits Syst. Comput. 1(3): 257-272 (1991) - [j11]Héctor Manuel Pérez Meana, Shigeo Tsujii:
A system identification algorithm using orthogonal functions. IEEE Trans. Signal Process. 39(3): 752-755 (1991) - [j10]Jinhui Chao, Shigeo Tsujii:
A stable and distortion-free IIR echo and howling canceler. IEEE Trans. Signal Process. 39(8): 1812-1821 (1991) - [j9]Héctor Manuel Pérez Meana, Shigeo Tsujii:
A fast parallel form IIR adaptive filter algorithm. IEEE Trans. Signal Process. 39(9): 2118-2122 (1991) - [c9]Shigeo Tsujii, Jinhui Chao:
A New ID-Based Key Sharing System. CRYPTO 1991: 288-299 - 1990
- [j8]Jinhui Chao, Héctor Manuel Pérez Meana, Shigeo Tsujii:
A fast adaptive filter algorithm using eigenvalue reciprocals as stepsizes. IEEE Trans. Acoust. Speech Signal Process. 38(8): 1343-1352 (1990) - [c8]Kaoru Kurosawa, Shigeo Tsujii:
Multi-Language Zero Knowledge Interactive Proof Systems. CRYPTO 1990: 339-352 - [c7]Shinji Shinozaki, Toshiya Itoh, Atsushi Fujioka, Shigeo Tsujii:
Provably Secure Key-Updating Schemes in Identity-Based Systems. EUROCRYPT 1990: 16-30 - [c6]Kaoru Kurosawa, Yutaka Katayama, Wakaha Ogata, Shigeo Tsujii:
General Public Key Residue Cryptosystems and Mental Poker Protocols. EUROCRYPT 1990: 374-388 - [c5]Hiroshi Tsubokawa, Hajime Kubota, Shigeo Tsujii:
Effect of floating-point error reduction with recursive least square for parallel architecture. ICASSP 1990: 1487-1490
1980 – 1989
- 1989
- [j7]Toshiya Itoh, Shigeo Tsujii:
Structure of Parallel Multipliers for a Class of Fields GF(2^m). Inf. Comput. 83(1): 21-40 (1989) - [j6]Toshiya Itoh, Shigeo Tsujii:
An Efficient Algorithm for Deciding Quadratic Residuosity in Finite Fields GF(p_m). Inf. Process. Lett. 30(3): 111-114 (1989) - [j5]Shigeo Tsujii, Toshiya Itoh:
An ID-based cryptosystem based on the discrete logarithm problem. IEEE J. Sel. Areas Commun. 7(4): 467-473 (1989) - [j4]Jinhui Chao, Shigeo Tsujii:
A new configuration for echo canceller adaptable during double talk periods. IEEE Trans. Commun. 37(9): 969-974 (1989) - [j3]Kaoru Kurosawa, Shigeo Tsujii:
An IIR parallel-type adaptive algorithm using the fast least squares method. IEEE Trans. Acoust. Speech Signal Process. 37(8): 1226-1230 (1989) - [c4]Toshihiro Furukawa, Hajime Kubota, Shigeo Tsujii:
The orthogonal projection algorithm for block adaptive signal processing. ICASSP 1989: 1059-1062 - 1988
- [j2]Toshiya Itoh, Shigeo Tsujii:
A Fast Algorithm for Computing Multiplicative Inverses in GF(2^m) Using Normal Bases. Inf. Comput. 78(3): 171-177 (1988) - [j1]Shigeo Tsujii, Toshiya Itoh, Atsushi Fujioka, Kaoru Kurosawa, Tsutomu Matsumoto:
A public-key cryptosystem based on the difficulty of solving a system of nonlinear equations. Syst. Comput. Jpn. 19(2): 10-18 (1988) - [c3]Jinhui Chao, Shigeo Tsujii:
A stable and distortion-free echo and howling canceller [telephone networks]. ICASSP 1988: 1620-1623 - 1986
- [c2]Kaoru Kurosawa, Shigeo Tsujii:
A new IIR type adaptive algorithm of parallel type structure. ICASSP 1986: 2091-2094 - [c1]Kaoru Kurosawa, Shigeo Tsujii:
An Efficient Method to Find Invalid Loops in a Communication Protocol and Its Application to HDLC. ICC 1986: 563-567
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 22:17 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint