Name
Papers
Collaborators
SHIGEO TSUJII
75
83
Citations 
PageRank 
Referers 
598
131.15
1162
Referees 
References 
338
414
Search Limit
1001000
Title
Citations
PageRank
Year
3-Layer Public Key Cryptosystem with Short Tandem Repeat DNA.00.342020
Proposal of Multivariate Public Key Cryptosystem Based on Modulus of Numerous Prime Numbers and CRT with Security of IND-CPA.00.342020
Organizational Cryptography for Access Control.00.342018
Privacy Preserving Logic Formula Calculation in Cloud00.342016
Secure Semantic Computing00.342016
Proposal Of The Multivariate Public Key Cryptosystem Relying On The Difficulty Of Factoring A Product Of Two Large Prime Numbers00.342016
Privacy Preserving Data Processing10.402015
Privacy Preserving Data Processing with Collaboration of Homomorphic Cryptosystems.20.382013
Privacy Preserving Problem Solving Scheme00.342013
Construction of the Tsujii-Shamir-Kasahara (TSK) Type Multivariate Public Key Cryptosystem, which relies on the Difficulty of Prime Factorization.20.382012
Hidden Pair of Bijection Signature Scheme.10.362011
Enhanced STS using Check Equation -Extended Version of the Signature scheme proposed in the PQCrypt2010-.20.382010
Proposal of a signature scheme based on STS trapdoor130.572010
Dually-Perturbed Matsumoto-Imai Signature (Dpms) Scheme10.352010
Clarifying the specification of linear Piece In Hand matrix method00.342010
A knapsack cryptosystem based on multiple knapsacks10.352010
Key-Generation Algorithms For Linear Piece In Hand Matrix Method10.372010
Two-sided multiplications are reduced to one-sided multiplication in linear piece in hand matrix methods00.342010
Proposal of PPS Multivariate Public Key Cryptosystems.00.342009
Security Enhancement Of Various Mpkcs By 2-Layer Nonlinear Piece In Hand Method60.462009
Robust Noise Suppression Algorithm with the Kalman Filter Theory for White and Colored Disturbance40.642008
Nonlinear Piece In Hand Perturbation Vector Method for Enhancing Security of Multivariate Public Key Cryptosystems50.432008
Fast Noise Suppression Algorithm with Kalman Filter Theory10.632008
Nonlinear Piece In Hand Matrix Method for Enhancing Security of Multivariate Public Key Cryptosystems.40.412008
Proposal for Piece in Hand Matrix: General Concept for Enhancing Security of Multivariate Public Key Cryptosystems80.532007
Proposal for Piece In Hand Matrix Ver.2: General Concept for Enhancing Security of Multivariate Public Key Cryptosystems10.352006
A Subspace Blind Identification Algorithm with Reduced Computational Complexity—Colored Noise Case—00.342005
An Extension of GHS Weil Descent Attack.00.342005
Proposal on a multifactor biometric authentication method based on cryptosystem keys containing biometric signatures50.452005
An Extension of GHS Weil Descent Attack00.342005
Improvements of Addition Algorithm on Genus 3 Hyperelliptic Curves and Their Implementation.00.342005
Improvements Of Addition Algorithm On Genus 3 Hyperelliptic Curves And Their Implementation161.332005
Information security as interdisciplinary science based on ethics00.342005
Paradigm of Information Security as Interdisciplinary Comprehensive Science40.552004
Piece In Hand Concept for Enhancing the Security of Multivariate Type Public Key Cryptosystems: Public Key Without Containing All the Information of Secret Key.00.342004
Baby Step Giant Step Algorithms In Point Counting Of Hyperelliptic Curves30.462003
Proposal on Personal Authentication System in which Biological Information is embedded in Cryptosystem Key.00.342003
Proposal on personal identifiers generated from the STR information of DNA60.732002
An Improved Baby Step Giant Step Algorithm for Point Counting of Hyperelliptic Curves over Finite Fields181.242002
A consideration on the blind estimation of single-input double-output system using orthogonal direct sum decomposition of received signal space.00.342001
Fast Construction of Secure Discrete Logarithm Problems over Jacobian Varieties10.372000
Construction of Hyperelliptic Curves with CM and Its Application to Cryptosystems20.502000
Simplification of stochastic fastest NLMS algorithm00.341999
Construction of Secure Elliptic Cryptosystems Using CM Tests and Liftings72.651998
Revolution of civilisation and information security00.341998
Efficient construction of secure hyperelliptic discrete logarithm problems62.131997
Electronic Money and Key Management from Global and Regional Points of View00.341996
A Low Communication Competitive Interactive Proof System for Promised Quadratic Residuosity.10.351996
Low exponent attack against elliptic curve RSA111.761995
Improvement In Stability And Convergence Speed On Normalized Lms Algorithm10.631995
  • 1
  • 2