2008 |
42 | EE | Nari Tanabe,
Toshihiro Furukawa,
Hideaki Matsue,
Shigeo Tsujii:
Kalman filter for robust noise suppression in white and colored noises.
ISCAS 2008: 1172-1175 |
41 | EE | Ryou Fujita,
Kohtaro Tadaki,
Shigeo Tsujii:
Nonlinear Piece In Hand Perturbation Vector Method for Enhancing Security of Multivariate Public Key Cryptosystems.
PQCrypto 2008: 148-164 |
40 | EE | Nari Tanabe,
Toshihiro Furukawa,
Shigeo Tsujii:
Robust Noise Suppression Algorithm with the Kalman Filter Theory for White and Colored Disturbance.
IEICE Transactions 91-A(3): 818-829 (2008) |
2007 |
39 | EE | Shigeo Tsujii,
Kohtaro Tadaki,
Ryou Fujita:
Proposal for Piece in Hand Matrix: General Concept for Enhancing Security of Multivariate Public Key Cryptosystems.
IEICE Transactions 90-A(5): 992-999 (2007) |
2005 |
38 | EE | Shigeo Tsujii:
Information Security as Interdisciplinary Science Based on Ethics.
ICISC 2005: 2 |
37 | EE | Masaki Gonda,
Kazuto Matsuo,
Kazumaro Aoki,
Jinhui Chao,
Shigeo Tsujii:
Improvements of Addition Algorithm on Genus 3 Hyperelliptic Curves and Their Implementation.
IEICE Transactions 88-A(1): 89-96 (2005) |
36 | EE | Tsutomu Iijima,
Mahoro Shimura,
Jinhui Chao,
Shigeo Tsujii:
An Extension of GHS Weil Descent Attack.
IEICE Transactions 88-A(1): 97-104 (2005) |
35 | EE | Nari Tanabe,
Toshihiro Furukawa,
Kohichi Sakaniwa,
Shigeo Tsujii:
A Subspace Blind Identification Algorithm with Reduced Computational Complexity - Colored Noise Case - .
IEICE Transactions 88-A(7): 2015-2018 (2005) |
34 | EE | Yukio Itakura,
Shigeo Tsujii:
Proposal on a multifactor biometric authentication method based on cryptosystem keys containing biometric signatures.
Int. J. Inf. Sec. 4(4): 288-296 (2005) |
2004 |
33 | EE | Shigeo Tsujii:
Paradigm of Information Security as Interdisciplinary Comprehensive Science.
CW 2004: 9-20 |
2002 |
32 | EE | Kazuto Matsuo,
Jinhui Chao,
Shigeo Tsujii:
An Improved Baby Step Giant Step Algorithm for Point Counting of Hyperelliptic Curves over Finite Fields.
ANTS 2002: 461-474 |
31 | EE | Yukio Itakura,
Masaki Hashiyada,
Toshio Nagashima,
Shigeo Tsujii:
Proposal on personal identifiers generated from the STR information of DNA.
Int. J. Inf. Sec. 1(3): 149-160 (2002) |
2000 |
30 | EE | Jinhui Chao,
Kazuto Matsuo,
Hiroto Kawashiro,
Shigeo Tsujii:
Construction of Hyperelliptic Curves with CM and Its Application to Cryptosystems.
ASIACRYPT 2000: 259-273 |
29 | | Jinhui Chao,
Kazuto Matsuo,
Shigeo Tsujii:
Fast Construction of Secure Discrete Logarithm Problems over Jacobian Varieties.
SEC 2000: 241-250 |
1999 |
28 | EE | Masahiro Fukumoto,
Hajime Kubota,
Shigeo Tsujii:
Simplification of stochastic fastest NLMS algorithm.
ISCAS (3) 1999: 158-161 |
1998 |
27 | EE | Jinhui Chao,
Osamu Nakamura,
Kohji Sobataka,
Shigeo Tsujii:
Construction of Secure Elliptic Cryptosystems Using CM Tests and Liftings.
ASIACRYPT 1998: 95-109 |
1997 |
26 | | Jinhui Chao,
Nori Matsuda,
Shigeo Tsujii:
Efficient construction of secure hyperelliptic discrete logarithm problems.
ICICS 1997: 292-301 |
1996 |
25 | | Shigeo Tsujii:
Electronic Money and Key Management from Global and Regional Points of View.
ASIACRYPT 1996: 173-184 |
24 | | Toshiya Itoh,
Masafumi Hoshi,
Shigeo Tsujii:
A Low Communication Competitive Interactive Proof System for Promised Quadratic Residuosity.
J. Cryptology 9(2): 101-109 (1996) |
1995 |
23 | | Masahiro Fukumoto,
Hajime Kubota,
Shigeo Tsujii:
Improvement in Stability and Convergence Speed on Normalized LMS Algorithm.
ISCAS 1995: 1243-1246 |
22 | EE | Kaoru Kurosawa,
Koji Okada,
Shigeo Tsujii:
Low Exponent Attack Against Elliptic Curve RSA.
Inf. Process. Lett. 53(2): 77-83 (1995) |
1994 |
21 | | Kaoru Kurosawa,
Koji Okada,
Shigeo Tsujii:
Low Exponent Attack against Elliptic Curve RSA.
ASIACRYPT 1994: 376-383 |
20 | | Masahiro Fukumoto,
Hajime Kubota,
Shigeo Tsujii:
New Block Adaptive Algorithm using the Conjugate Gradient Method.
Applied Informatics 1994: 231-234 |
19 | EE | Jinhui Chao,
Kazuo Tanada,
Shigeo Tsujii:
Design of Elliptic Curves with Controllable Lower Boundary of Extension Degree for Reduction Attacks.
CRYPTO 1994: 50-55 |
18 | | Jinhui Chao,
Teruyuki Sato,
Kohichi Sakaniwa,
Shigeo Tsujii:
New Results on Stability Theory of Time-Varying Linear Systems.
ISCAS 1994: 245-248 |
17 | | Jinhui Chao,
Shinobu Kawabe,
Shigeo Tsujii:
Convergence Analysis of Gradient Adaptive Algorithms for Arbitrary Inputs.
ISCAS 1994: 41-44 |
1993 |
16 | EE | Toshiya Itoh,
Masafumi Hoshi,
Shigeo Tsujii:
A Low Communication Competitive Interactive Proof System for Promised Quadratic Residuosity.
CRYPTO 1993: 61-72 |
15 | EE | Kaoru Kurosawa,
Koji Okada,
Keiichi Sakano,
Wakaha Ogata,
Shigeo Tsujii:
Nonperfect Secret Sharing Schemes and Matroids.
EUROCRYPT 1993: 126-141 |
14 | EE | Choonsik Park,
Kaoru Kurosawa,
Tatsuaki Okamoto,
Shigeo Tsujii:
On Key Distribution and Authentication in Mobile Radio Networks.
EUROCRYPT 1993: 461-465 |
13 | | Kaoru Kurosawa,
Kouichi Kawabe,
Shigeo Tsujii:
Stability and zeros of a complex polynomial.
ISCAS 1993: 2279-2282 |
12 | | Kaoru Kurosawa,
Isao Yamada,
Tetsunari Yokokawa,
Shigeo Tsujii:
A fast stability test for multidimensional systems.
ISCAS 1993: 579-582 |
11 | | Shigeo Tsujii,
Jinhui Chao,
Kiyomiche Araki:
A Simple ID-Based Scheme for Key Sharing.
IEEE Journal on Selected Areas in Communications 11(5): 730-734 (1993) |
1992 |
10 | | Takashi Satoh,
Kaoru Kurosawa,
Shigeo Tsujii:
Privacy for Multi-Party Protocols.
AUSCRYPT 1992: 252-260 |
9 | | Wakaha Ogata,
Kaoru Kurosawa,
Shigeo Tsujii:
Nonperfect Secret Sharing Schemes.
AUSCRYPT 1992: 56-66 |
1991 |
8 | EE | Shigeo Tsujii,
Jinhui Chao:
A New ID-Based Key Sharing System.
CRYPTO 1991: 288-299 |
1990 |
7 | EE | Kaoru Kurosawa,
Shigeo Tsujii:
Multi-Language Zero Knowledge Interactive Proof Systems.
CRYPTO 1990: 339-352 |
6 | EE | S. Shinozaki,
Toshiya Itoh,
Atsushi Fujioka,
Shigeo Tsujii:
Provably Secure Key-Updating Schemes in Identity-Based Systems.
EUROCRYPT 1990: 16-30 |
5 | EE | Kaoru Kurosawa,
Yutaka Katayama,
Wakaha Ogata,
Shigeo Tsujii:
General Public Key Residue Cryptosystems and Mental Poker Protocols.
EUROCRYPT 1990: 374-388 |
1989 |
4 | | Toshiya Itoh,
Shigeo Tsujii:
Structure of Parallel Multipliers for a Class of Fields GF(2^m)
Inf. Comput. 83(1): 21-40 (1989) |
3 | | Toshiya Itoh,
Shigeo Tsujii:
An Efficient Algorithm for Deciding Quadratic Residuosity in Finite Fields GF(p_m).
Inf. Process. Lett. 30(3): 111-114 (1989) |
1988 |
2 | | Toshiya Itoh,
Shigeo Tsujii:
A Fast Algorithm for Computing Multiplicative Inverses in GF(2^m) Using Normal Bases
Inf. Comput. 78(3): 171-177 (1988) |
1986 |
1 | | Kaoru Kurosawa,
Shigeo Tsujii:
An Efficient Method to Find Invalid Loops in a Communication Protocol and Its Application to HDLC.
ICC 1986: 563-567 |