2008 | ||
---|---|---|
42 | EE | Nari Tanabe, Toshihiro Furukawa, Hideaki Matsue, Shigeo Tsujii: Kalman filter for robust noise suppression in white and colored noises. ISCAS 2008: 1172-1175 |
41 | EE | Ryou Fujita, Kohtaro Tadaki, Shigeo Tsujii: Nonlinear Piece In Hand Perturbation Vector Method for Enhancing Security of Multivariate Public Key Cryptosystems. PQCrypto 2008: 148-164 |
40 | EE | Nari Tanabe, Toshihiro Furukawa, Shigeo Tsujii: Robust Noise Suppression Algorithm with the Kalman Filter Theory for White and Colored Disturbance. IEICE Transactions 91-A(3): 818-829 (2008) |
2007 | ||
39 | EE | Shigeo Tsujii, Kohtaro Tadaki, Ryou Fujita: Proposal for Piece in Hand Matrix: General Concept for Enhancing Security of Multivariate Public Key Cryptosystems. IEICE Transactions 90-A(5): 992-999 (2007) |
2005 | ||
38 | EE | Shigeo Tsujii: Information Security as Interdisciplinary Science Based on Ethics. ICISC 2005: 2 |
37 | EE | Masaki Gonda, Kazuto Matsuo, Kazumaro Aoki, Jinhui Chao, Shigeo Tsujii: Improvements of Addition Algorithm on Genus 3 Hyperelliptic Curves and Their Implementation. IEICE Transactions 88-A(1): 89-96 (2005) |
36 | EE | Tsutomu Iijima, Mahoro Shimura, Jinhui Chao, Shigeo Tsujii: An Extension of GHS Weil Descent Attack. IEICE Transactions 88-A(1): 97-104 (2005) |
35 | EE | Nari Tanabe, Toshihiro Furukawa, Kohichi Sakaniwa, Shigeo Tsujii: A Subspace Blind Identification Algorithm with Reduced Computational Complexity - Colored Noise Case - . IEICE Transactions 88-A(7): 2015-2018 (2005) |
34 | EE | Yukio Itakura, Shigeo Tsujii: Proposal on a multifactor biometric authentication method based on cryptosystem keys containing biometric signatures. Int. J. Inf. Sec. 4(4): 288-296 (2005) |
2004 | ||
33 | EE | Shigeo Tsujii: Paradigm of Information Security as Interdisciplinary Comprehensive Science. CW 2004: 9-20 |
2002 | ||
32 | EE | Kazuto Matsuo, Jinhui Chao, Shigeo Tsujii: An Improved Baby Step Giant Step Algorithm for Point Counting of Hyperelliptic Curves over Finite Fields. ANTS 2002: 461-474 |
31 | EE | Yukio Itakura, Masaki Hashiyada, Toshio Nagashima, Shigeo Tsujii: Proposal on personal identifiers generated from the STR information of DNA. Int. J. Inf. Sec. 1(3): 149-160 (2002) |
2000 | ||
30 | EE | Jinhui Chao, Kazuto Matsuo, Hiroto Kawashiro, Shigeo Tsujii: Construction of Hyperelliptic Curves with CM and Its Application to Cryptosystems. ASIACRYPT 2000: 259-273 |
29 | Jinhui Chao, Kazuto Matsuo, Shigeo Tsujii: Fast Construction of Secure Discrete Logarithm Problems over Jacobian Varieties. SEC 2000: 241-250 | |
1999 | ||
28 | EE | Masahiro Fukumoto, Hajime Kubota, Shigeo Tsujii: Simplification of stochastic fastest NLMS algorithm. ISCAS (3) 1999: 158-161 |
1998 | ||
27 | EE | Jinhui Chao, Osamu Nakamura, Kohji Sobataka, Shigeo Tsujii: Construction of Secure Elliptic Cryptosystems Using CM Tests and Liftings. ASIACRYPT 1998: 95-109 |
1997 | ||
26 | Jinhui Chao, Nori Matsuda, Shigeo Tsujii: Efficient construction of secure hyperelliptic discrete logarithm problems. ICICS 1997: 292-301 | |
1996 | ||
25 | Shigeo Tsujii: Electronic Money and Key Management from Global and Regional Points of View. ASIACRYPT 1996: 173-184 | |
24 | Toshiya Itoh, Masafumi Hoshi, Shigeo Tsujii: A Low Communication Competitive Interactive Proof System for Promised Quadratic Residuosity. J. Cryptology 9(2): 101-109 (1996) | |
1995 | ||
23 | Masahiro Fukumoto, Hajime Kubota, Shigeo Tsujii: Improvement in Stability and Convergence Speed on Normalized LMS Algorithm. ISCAS 1995: 1243-1246 | |
22 | EE | Kaoru Kurosawa, Koji Okada, Shigeo Tsujii: Low Exponent Attack Against Elliptic Curve RSA. Inf. Process. Lett. 53(2): 77-83 (1995) |
1994 | ||
21 | Kaoru Kurosawa, Koji Okada, Shigeo Tsujii: Low Exponent Attack against Elliptic Curve RSA. ASIACRYPT 1994: 376-383 | |
20 | Masahiro Fukumoto, Hajime Kubota, Shigeo Tsujii: New Block Adaptive Algorithm using the Conjugate Gradient Method. Applied Informatics 1994: 231-234 | |
19 | EE | Jinhui Chao, Kazuo Tanada, Shigeo Tsujii: Design of Elliptic Curves with Controllable Lower Boundary of Extension Degree for Reduction Attacks. CRYPTO 1994: 50-55 |
18 | Jinhui Chao, Teruyuki Sato, Kohichi Sakaniwa, Shigeo Tsujii: New Results on Stability Theory of Time-Varying Linear Systems. ISCAS 1994: 245-248 | |
17 | Jinhui Chao, Shinobu Kawabe, Shigeo Tsujii: Convergence Analysis of Gradient Adaptive Algorithms for Arbitrary Inputs. ISCAS 1994: 41-44 | |
1993 | ||
16 | EE | Toshiya Itoh, Masafumi Hoshi, Shigeo Tsujii: A Low Communication Competitive Interactive Proof System for Promised Quadratic Residuosity. CRYPTO 1993: 61-72 |
15 | EE | Kaoru Kurosawa, Koji Okada, Keiichi Sakano, Wakaha Ogata, Shigeo Tsujii: Nonperfect Secret Sharing Schemes and Matroids. EUROCRYPT 1993: 126-141 |
14 | EE | Choonsik Park, Kaoru Kurosawa, Tatsuaki Okamoto, Shigeo Tsujii: On Key Distribution and Authentication in Mobile Radio Networks. EUROCRYPT 1993: 461-465 |
13 | Kaoru Kurosawa, Kouichi Kawabe, Shigeo Tsujii: Stability and zeros of a complex polynomial. ISCAS 1993: 2279-2282 | |
12 | Kaoru Kurosawa, Isao Yamada, Tetsunari Yokokawa, Shigeo Tsujii: A fast stability test for multidimensional systems. ISCAS 1993: 579-582 | |
11 | Shigeo Tsujii, Jinhui Chao, Kiyomiche Araki: A Simple ID-Based Scheme for Key Sharing. IEEE Journal on Selected Areas in Communications 11(5): 730-734 (1993) | |
1992 | ||
10 | Takashi Satoh, Kaoru Kurosawa, Shigeo Tsujii: Privacy for Multi-Party Protocols. AUSCRYPT 1992: 252-260 | |
9 | Wakaha Ogata, Kaoru Kurosawa, Shigeo Tsujii: Nonperfect Secret Sharing Schemes. AUSCRYPT 1992: 56-66 | |
1991 | ||
8 | EE | Shigeo Tsujii, Jinhui Chao: A New ID-Based Key Sharing System. CRYPTO 1991: 288-299 |
1990 | ||
7 | EE | Kaoru Kurosawa, Shigeo Tsujii: Multi-Language Zero Knowledge Interactive Proof Systems. CRYPTO 1990: 339-352 |
6 | EE | S. Shinozaki, Toshiya Itoh, Atsushi Fujioka, Shigeo Tsujii: Provably Secure Key-Updating Schemes in Identity-Based Systems. EUROCRYPT 1990: 16-30 |
5 | EE | Kaoru Kurosawa, Yutaka Katayama, Wakaha Ogata, Shigeo Tsujii: General Public Key Residue Cryptosystems and Mental Poker Protocols. EUROCRYPT 1990: 374-388 |
1989 | ||
4 | Toshiya Itoh, Shigeo Tsujii: Structure of Parallel Multipliers for a Class of Fields GF(2^m) Inf. Comput. 83(1): 21-40 (1989) | |
3 | Toshiya Itoh, Shigeo Tsujii: An Efficient Algorithm for Deciding Quadratic Residuosity in Finite Fields GF(p_m). Inf. Process. Lett. 30(3): 111-114 (1989) | |
1988 | ||
2 | Toshiya Itoh, Shigeo Tsujii: A Fast Algorithm for Computing Multiplicative Inverses in GF(2^m) Using Normal Bases Inf. Comput. 78(3): 171-177 (1988) | |
1986 | ||
1 | Kaoru Kurosawa, Shigeo Tsujii: An Efficient Method to Find Invalid Loops in a Communication Protocol and Its Application to HDLC. ICC 1986: 563-567 |