Name
Papers
Collaborators
EIICHIRO FUJISAKI
37
58
Citations 
PageRank 
Referers 
1526
114.30
1967
Referees 
References 
355
455
Search Limit
1001000
Title
Citations
PageRank
Year
Improved Lattice Enumeration Algorithms by Primal and Dual Reordering Methods00.342021
A Constant-Size Signature Scheme with a Tighter Reduction from the CDH Assumption.00.342020
Improving Practical UC-Secure Commitments based on the DDH Assumption.20.392016
Public-Key Cryptosystems Resilient to Continuous Tampering and Leakage of Arbitrary Functions.30.372016
Note on the RKA security of Continuously Non-Malleable Key-Derivation Function from PKC 2015.00.342015
Post-Challenge Leakage Resilient Public-Key Cryptosystem In Split State Model00.342015
Non-Malleable Multiple Public-Key Encryption00.342014
Secure Integration of Asymmetric and Symmetric Encryption Schemes43641.972013
A Multi-Trapdoor Commitment Scheme from the RSA Assumption.00.342012
A Multi-trapdoor Commitment Scheme from the RSA Assumption30.392012
A Framework for Efficient Fully-Equipped UC Commitments.10.352012
New constructions of efficient simulation-sound commitments using encryption and their applications30.382012
An Efficient Non-interactive Universally Composable String-Commitment Scheme.00.342012
Sub-linear Size Traceable Ring Signatures without Random Oracles50.422012
Sub-linear Size Traceable Ring Signatures without Random Oracles50.422012
Sub-Linear Size Traceable Ring Signatures without Random Oracles.00.342012
On the Insecurity of the Fiat-Shamir Signatures with Iterative Hash Functions00.342009
Efficient Non-interactive Universally Composable String-Commitment Schemes160.632009
Advances in Information and Computer Security, Third International Workshop on Security, IWSEC 2008, Kagawa, Japan, November 25-27, 2008. Proceedings191.482008
Special Section on Cryptography and Information Security00.342008
Formal security treatments for signatures from identity-based encryption70.452007
Security of ESIGN-PSS10.352007
Formal Security Treatments For Ibe-To-Signature Transformation: Relations Among Security Notions110.562007
Traceable Ring Signature130.592006
Plaintext Simulatability40.392006
Forward-Secure Authenticated-Encryption in Multi-Receiver Setting00.342006
Plaintext-Simulatability.00.342004
RSA-OAEP Is Secure under the RSA Assumption1549.882004
A Simple Approach To Secretly Sharing A Factoring Witness In A Publicly-Verifiable Manner00.342002
A Statistically-Hiding Integer Commitment Scheme Based on Groups with Hidden Order1304.712002
An Integer Commitment Scheme based on Groups with Hidden Order.473.792001
How to Enhance the Security of Public-Key Encryption at Minimum Cost1437.231999
A Practical and Provably Secure Scheme for Publicly Verifiable Secret Sharing and Its Applications885.791998
Statistical Zero Knowledge Protocols to Prove Modular Polynomial Relations27621.871997
Practical Escrow Cash System160.891996
How to Date Blind Signatures1385.571996
An Efficient Digital Signature Scheme Based on an Elliptic Curve Over the Ring Zn51.041992