2008 |
19 | EE | Junji Shikata,
Tsutomu Matsumoto:
Unconditionally Secure Steganography Against Active Attacks.
IEEE Transactions on Information Theory 54(6): 2690-2705 (2008) |
18 | EE | Valery I. Korzhik,
Hideki Imai,
Junji Shikata,
Guillermo Morales-Luna,
Ekaterina Gerling:
On the Use of Bhattacharyya Distance as a Measure of the Detectability of Steganographic Systems.
T. Data Hiding and Multimedia Security 3: 23-32 (2008) |
2007 |
17 | EE | Takeru Ishihara,
Hiroshi Aono,
Sadayuki Hongo,
Junji Shikata:
Construction of Threshold (Hybrid) Encryption in the Random Oracle Model: How to Construct Secure Threshold Tag-KEM from Weakly Secure Threshold KEM.
ACISP 2007: 259-273 |
2006 |
16 | EE | Goichiro Hanaoka,
Junji Shikata,
Yumiko Hanaoka,
Hideki Imai:
Unconditionally Secure Anonymous Encryption and Group Authentication.
Comput. J. 49(3): 310-321 (2006) |
2005 |
15 | EE | Yumiko Hanaoka,
Goichiro Hanaoka,
Junji Shikata,
Hideki Imai:
Identity-Based Hierarchical Strongly Key-Insulated Encryption and Its Application.
ASIACRYPT 2005: 495-514 |
14 | EE | Katsunari Yoshioka,
Junji Shikata,
Tsutomu Matsumoto:
On Collusion Security of Random Codes.
IEICE Transactions 88-A(1): 296-304 (2005) |
2004 |
13 | EE | Rui Zhang,
Goichiro Hanaoka,
Junji Shikata,
Hideki Imai:
On the Security of Multiple Encryption or CCA-security+CCA-security=CCA-security?
Public Key Cryptography 2004: 360-374 |
12 | EE | Goichiro Hanaoka,
Junji Shikata,
Yuliang Zheng,
Hideki Imai:
Efficient Unconditionally Secure Digital Signatures.
IEICE Transactions 87-A(1): 120-130 (2004) |
2003 |
11 | EE | Katsunari Yoshioka,
Junji Shikata,
Tsutomu Matsumoto:
Systematic Treatment of Collusion Secure Codes: Security Definitions and Their Relations.
ISC 2003: 408-421 |
10 | EE | Goichiro Hanaoka,
Junji Shikata,
Yumiko Hanaoka,
Hideki Imai:
The Role of Arbiters in Asymmetric Authentication Schemes.
ISC 2003: 428-441 |
9 | EE | Yodai Watanabe,
Junji Shikata,
Hideki Imai:
Equivalence between Semantic Security and Indistinguishability against Chosen Ciphertext Attacks.
Public Key Cryptography 2003: 71-84 |
2002 |
8 | EE | Goichiro Hanaoka,
Junji Shikata,
Yumiko Hanaoka,
Hideki Imai:
Unconditionally Secure Anonymous Encryption and Group Authentication.
ASIACRYPT 2002: 81-99 |
7 | EE | Junji Shikata,
Goichiro Hanaoka,
Yuliang Zheng,
Hideki Imai:
Security Notions for Unconditionally Secure Signature Schemes.
EUROCRYPT 2002: 434-449 |
6 | EE | Yumiko Hanaoka,
Goichiro Hanaoka,
Junji Shikata,
Hideki Imai:
Unconditionally Secure Key Insulated Cryptosystems: Models, Bounds and Constructions.
ICICS 2002: 85-96 |
5 | EE | Shoko Yonezawa,
Goichiro Hanaoka,
Junji Shikata,
Hideki Imai:
Traceability Schemes for Signed Documents.
ISC 2002: 257-271 |
4 | EE | Goichiro Hanaoka,
Junji Shikata,
Yuliang Zheng,
Hideki Imai:
Efficient and Unconditionally Secure Digital Signatures and a Security Analysis of a Multireceiver Authentication Code.
Public Key Cryptography 2002: 64-79 |
2000 |
3 | EE | Goichiro Hanaoka,
Junji Shikata,
Yuliang Zheng,
Hideki Imai:
Unconditionally Secure Digital Signature Schemes Admitting Transferability.
ASIACRYPT 2000: 130-142 |
1999 |
2 | | Junji Shikata,
Yuliang Zheng,
Joe Suzuki,
Hideki Imai:
Optimizing the Menezes-Okamoto-Vanstone (MOV) Algorithm for Non-supersingular Elliptic Curves.
ASIACRYPT 1999: 86-102 |
1 | EE | Ryuichi Harasawa,
Junji Shikata,
Joe Suzuki,
Hideki Imai:
Comparing the MOV and FR Reductions in Elliptic Curve Cryptography.
EUROCRYPT 1999: 190-205 |