dblp.uni-trier.dewww.uni-trier.de

Junji Shikata

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeer - CSB - Google - MSN - Yahoo

2008
19EEJunji Shikata, Tsutomu Matsumoto: Unconditionally Secure Steganography Against Active Attacks. IEEE Transactions on Information Theory 54(6): 2690-2705 (2008)
18EEValery I. Korzhik, Hideki Imai, Junji Shikata, Guillermo Morales-Luna, Ekaterina Gerling: On the Use of Bhattacharyya Distance as a Measure of the Detectability of Steganographic Systems. T. Data Hiding and Multimedia Security 3: 23-32 (2008)
2007
17EETakeru Ishihara, Hiroshi Aono, Sadayuki Hongo, Junji Shikata: Construction of Threshold (Hybrid) Encryption in the Random Oracle Model: How to Construct Secure Threshold Tag-KEM from Weakly Secure Threshold KEM. ACISP 2007: 259-273
2006
16EEGoichiro Hanaoka, Junji Shikata, Yumiko Hanaoka, Hideki Imai: Unconditionally Secure Anonymous Encryption and Group Authentication. Comput. J. 49(3): 310-321 (2006)
2005
15EEYumiko Hanaoka, Goichiro Hanaoka, Junji Shikata, Hideki Imai: Identity-Based Hierarchical Strongly Key-Insulated Encryption and Its Application. ASIACRYPT 2005: 495-514
14EEKatsunari Yoshioka, Junji Shikata, Tsutomu Matsumoto: On Collusion Security of Random Codes. IEICE Transactions 88-A(1): 296-304 (2005)
2004
13EERui Zhang, Goichiro Hanaoka, Junji Shikata, Hideki Imai: On the Security of Multiple Encryption or CCA-security+CCA-security=CCA-security? Public Key Cryptography 2004: 360-374
12EEGoichiro Hanaoka, Junji Shikata, Yuliang Zheng, Hideki Imai: Efficient Unconditionally Secure Digital Signatures. IEICE Transactions 87-A(1): 120-130 (2004)
2003
11EEKatsunari Yoshioka, Junji Shikata, Tsutomu Matsumoto: Systematic Treatment of Collusion Secure Codes: Security Definitions and Their Relations. ISC 2003: 408-421
10EEGoichiro Hanaoka, Junji Shikata, Yumiko Hanaoka, Hideki Imai: The Role of Arbiters in Asymmetric Authentication Schemes. ISC 2003: 428-441
9EEYodai Watanabe, Junji Shikata, Hideki Imai: Equivalence between Semantic Security and Indistinguishability against Chosen Ciphertext Attacks. Public Key Cryptography 2003: 71-84
2002
8EEGoichiro Hanaoka, Junji Shikata, Yumiko Hanaoka, Hideki Imai: Unconditionally Secure Anonymous Encryption and Group Authentication. ASIACRYPT 2002: 81-99
7EEJunji Shikata, Goichiro Hanaoka, Yuliang Zheng, Hideki Imai: Security Notions for Unconditionally Secure Signature Schemes. EUROCRYPT 2002: 434-449
6EEYumiko Hanaoka, Goichiro Hanaoka, Junji Shikata, Hideki Imai: Unconditionally Secure Key Insulated Cryptosystems: Models, Bounds and Constructions. ICICS 2002: 85-96
5EEShoko Yonezawa, Goichiro Hanaoka, Junji Shikata, Hideki Imai: Traceability Schemes for Signed Documents. ISC 2002: 257-271
4EEGoichiro Hanaoka, Junji Shikata, Yuliang Zheng, Hideki Imai: Efficient and Unconditionally Secure Digital Signatures and a Security Analysis of a Multireceiver Authentication Code. Public Key Cryptography 2002: 64-79
2000
3EEGoichiro Hanaoka, Junji Shikata, Yuliang Zheng, Hideki Imai: Unconditionally Secure Digital Signature Schemes Admitting Transferability. ASIACRYPT 2000: 130-142
1999
2 Junji Shikata, Yuliang Zheng, Joe Suzuki, Hideki Imai: Optimizing the Menezes-Okamoto-Vanstone (MOV) Algorithm for Non-supersingular Elliptic Curves. ASIACRYPT 1999: 86-102
1EERyuichi Harasawa, Junji Shikata, Joe Suzuki, Hideki Imai: Comparing the MOV and FR Reductions in Elliptic Curve Cryptography. EUROCRYPT 1999: 190-205

Coauthor Index

1Hiroshi Aono [17]
2Ekaterina Gerling [18]
3Goichiro Hanaoka [3] [4] [5] [6] [7] [8] [10] [12] [13] [15] [16]
4Yumiko Hanaoka [6] [8] [10] [15] [16]
5Ryuichi Harasawa [1]
6Sadayuki Hongo [17]
7Hideki Imai [1] [2] [3] [4] [5] [6] [7] [8] [9] [10] [12] [13] [15] [16] [18]
8Takeru Ishihara [17]
9Valery I. Korzhik [18]
10Tsutomu Matsumoto [11] [14] [19]
11Guillermo Morales-Luna [18]
12Joe Suzuki [1] [2]
13Yodai Watanabe [9]
14Shoko Yonezawa [5]
15Katsunari Yoshioka [11] [14]
16Rui Zhang [13]
17Yuliang Zheng [2] [3] [4] [7] [12]

Colors in the list of coauthors

Copyright © Sun May 17 03:24:02 2009 by Michael Ley (ley@uni-trier.de)