


Остановите войну!
for scientists:


default search action
Junji Shikata
Person information

Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [j23]Yohei Watanabe, Takenobu Seito, Junji Shikata:
Multi-Designated Receiver Authentication Codes: Models and Constructions. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 106(3): 394-405 (2023) - [c69]Yexuan Liu, Yohei Watanabe, Junji Shikata:
Forward and Backward Private Dynamic Searchable Encryption with Better Space Efficiency. CISS 2023: 1-6 - [c68]Alexandre Adomnicai
, Kazuhiko Minematsu
, Junji Shikata
:
Authenticated Encryption for Very Short Inputs. CT-RSA 2023: 553-572 - [c67]Yuto Hama, Kazuaki Hanazawa, Hideki Ochiai, Junji Shikata:
Performance Analysis for Coded Wireless Steganography System with OFDM Signaling. RWS 2023: 7-10 - [i24]Yoshinori Aono, Junji Shikata:
Anonymous Broadcast Authentication with Logarithmic-order Ciphertexts from DLP or LWE. IACR Cryptol. ePrint Arch. 2023: 351 (2023) - [i23]Alexandre Adomnicai, Kazuhiko Minematsu, Junji Shikata:
Authenticated Encryption for Very Short Inputs. IACR Cryptol. ePrint Arch. 2023: 361 (2023) - [i22]Hyungrok Jo, Shingo Sato, Junji Shikata:
A Tightly Secure Identity-based Signature Scheme from Isogenies. IACR Cryptol. ePrint Arch. 2023: 426 (2023) - 2022
- [j22]Toshiki Matsumine
, Hideki Ochiai
, Junji Shikata
:
Security Gap Improvement of BICM Systems Through Bit-Labeling Optimization for the Gaussian Wiretap Channel. IEEE Access 10: 47805-47813 (2022) - [c66]Shingo Sato, Junji Shikata:
Quantum-Secure Aggregate One-time Signatures with Detecting Functionality. AINA (2) 2022: 573-585 - [c65]Takenobu Seito, Junji Shikata, Yohei Watanabe:
Multi-Designated Receiver Authentication-Codes with Information-Theoretic Security. CISS 2022: 84-89 - [c64]Shingo Sato, Junji Shikata, Tsutomu Matsumoto:
Group Testing Aggregate Signatures with Soundness. ICISC 2022: 363-381 - [c63]Shingo Sato, Junji Shikata:
Identity-based Interactive Aggregate Signatures from Lattices. ICISC 2022: 408-432 - [e3]Goichiro Hanaoka, Junji Shikata, Yohei Watanabe:
Public-Key Cryptography - PKC 2022 - 25th IACR International Conference on Practice and Theory of Public-Key Cryptography, Virtual Event, March 8-11, 2022, Proceedings, Part I. Lecture Notes in Computer Science 13177, Springer 2022, ISBN 978-3-030-97120-5 [contents] - [e2]Goichiro Hanaoka, Junji Shikata, Yohei Watanabe:
Public-Key Cryptography - PKC 2022 - 25th IACR International Conference on Practice and Theory of Public-Key Cryptography, Virtual Event, March 8-11, 2022, Proceedings, Part II. Lecture Notes in Computer Science 13178, Springer 2022, ISBN 978-3-030-97130-4 [contents] - [i21]Yohei Watanabe, Naoto Yanai, Junji Shikata:
IoT-REX: A Secure Remote-Control System for IoT Devices from Centralized Multi-Designated Verifier Signatures. CoRR abs/2208.03781 (2022) - [i20]Shingo Sato, Junji Shikata:
Quantum-Secure Aggregate One-time Signatures with Detecting Functionality. IACR Cryptol. ePrint Arch. 2022: 272 (2022) - [i19]Shingo Sato, Junji Shikata:
SO-CCA Secure PKE in the Quantum Random Oracle Model or the Quantum Ideal Cipher Model. IACR Cryptol. ePrint Arch. 2022: 617 (2022) - 2021
- [c62]Yohei Watanabe, Naoto Yanai, Junji Shikata:
Anonymous Broadcast Authentication for Securely Remote-Controlling IoT Devices. AINA (2) 2021: 679-690 - [c61]Masahiro Ebina, Jumpei Mita, Junji Shikata, Yohei Watanabe:
Efficient Threshold Public Key Encryption from the Computational Bilinear Diffie-Hellman Assumption. APKC@AsiaCCS 2021: 23-32 - [c60]Hirokazu Kobayashi, Yohei Watanabe, Junji Shikata:
Asymptotically Tight Lower Bounds in Anonymous Broadcast Encryption and Authentication. IMACC 2021: 105-128 - [c59]Yuto Hama, Hideki Ochiai, Junji Shikata:
Performance Analysis of Wireless Steganography based on OFDM and DFT-s-OFDM Signals over Frequency-Selective Rayleigh Fading Channels. WPMC 2021: 1-6 - 2020
- [j21]Shoichi Hirose
, Junji Shikata:
Aggregate Message Authentication Code Capable of Non-Adaptive Group-Testing. IEEE Access 8: 216116-216126 (2020) - [c58]Yoshinori Ogawa, Shingo Sato
, Junji Shikata, Hideki Imai:
Aggregate Message Authentication Codes with Detecting Functionality from Biorthogonal Codes. ISIT 2020: 868-873 - [c57]Junichi Ida, Junji Shikata, Yohei Watanabe:
On the Power of Interaction in Signcryption. ISITA 2020: 348-352 - [c56]Ryohei Yamaguchi, Hideki Ochiai, Junji Shikata:
A Physical-Layer Security Based on Wireless Steganography Through OFDM and DFT-Precoded OFDM Signals. VTC Spring 2020: 1-5 - [i18]Shingo Sato, Junji Shikata:
Interactive Aggregate Message Authentication Equipped with Detecting Functionality from Adaptive Group Testing. IACR Cryptol. ePrint Arch. 2020: 1218 (2020) - [i17]Shingo Sato, Junji Shikata, Tsutomu Matsumoto:
Aggregate Signature with Detecting Functionality from Group Testing. IACR Cryptol. ePrint Arch. 2020: 1219 (2020)
2010 – 2019
- 2019
- [j20]Junji Shikata, Yohei Watanabe
:
Identity-based encryption with hierarchical key-insulation in the standard model. Des. Codes Cryptogr. 87(5): 1005-1033 (2019) - [j19]Shingo Sato
, Shoichi Hirose, Junji Shikata:
Sequential Aggregate MACs from Any MACs: Aggregation and Detecting Functionality. J. Internet Serv. Inf. Secur. 9(1): 2-23 (2019) - [c55]Shingo Sato
, Junji Shikata:
Interactive Aggregate Message Authentication Scheme with Detecting Functionality. AINA 2019: 1316-1328 - [c54]Shoichi Hirose, Junji Shikata:
Provable Security of the Ma-Tsudik Forward-Secure Sequential Aggregate MAC Scheme. CANDAR Workshops 2019: 327-332 - [c53]Shingo Sato
, Junji Shikata:
Quantum-Secure (Non-)Sequential Aggregate Message Authentication Codes. IMACC 2019: 295-316 - [c52]Shingo Sato
, Junji Shikata:
SO-CCA Secure PKE in the Quantum Random Oracle Model or the Quantum Ideal Cipher Model. IMACC 2019: 317-341 - [c51]Shingo Sato
, Shoichi Hirose, Junji Shikata:
Sequential Aggregate MACs with Detecting Functionality Revisited. NSS 2019: 387-407 - [c50]Shoichi Hirose
, Junji Shikata
:
History-Free Sequential Aggregate MAC Revisited. ProvSec 2019: 77-93 - 2018
- [j18]Yohei Watanabe
, Junji Shikata:
Timed-release computational secret sharing and threshold encryption. Des. Codes Cryptogr. 86(1): 17-54 (2018) - [j17]Amonrat Prasitsupparote
, Norio Konno
, Junji Shikata
:
Numerical and Non-Asymptotic Analysis of Elias's and Peres's Extractors with Finite Input Sequences. Entropy 20(10): 729 (2018) - [j16]Mitsugu Iwamoto
, Kazuo Ohta
, Junji Shikata
:
Security Formalizations and Their Relationships for Encryption and Key Agreement in Information-Theoretic Cryptography. IEEE Trans. Inf. Theory 64(1): 654-685 (2018) - [c49]Yoshinori Aono, Phong Q. Nguyen, Takenobu Seito, Junji Shikata:
Lower Bounds on Lattice Enumeration with Extreme Pruning. CRYPTO (2) 2018: 608-637 - [c48]Shoichi Hirose
, Junji Shikata:
Non-adaptive Group-Testing Aggregate MAC Scheme. ISPEC 2018: 357-372 - [c47]Shingo Sato
, Junji Shikata:
Lattice-Based Signcryption Without Random Oracles. PQCrypto 2018: 331-351 - [c46]Shingo Sato
, Shoichi Hirose, Junji Shikata:
Generic Construction of Sequential Aggregate MACs from Any MACs. ProvSec 2018: 295-312 - [c45]Shingo Sato
, Junji Shikata:
Signcryption with Quantum Random Oracles. ProvSec 2018: 406-414 - [i16]Shoichi Hirose, Junji Shikata:
Non-adaptive Group-Testing Aggregate MAC Scheme. IACR Cryptol. ePrint Arch. 2018: 448 (2018) - [i15]Yoshinori Aono, Phong Q. Nguyen, Takenobu Seito, Junji Shikata:
Lower Bounds on Lattice Enumeration with Extreme Pruning. IACR Cryptol. ePrint Arch. 2018: 586 (2018) - 2017
- [j15]Yuu Ishida, Junji Shikata, Yohei Watanabe:
CCA-secure revocable identity-based encryption schemes with decryption key exposure resistance. Int. J. Appl. Cryptogr. 3(3): 288-311 (2017) - [c44]Amonrat Prasitsupparote, Norio Konno, Junji Shikata:
Numerical analysis of Elias's and Peres's deterministic extractors. CISS 2017: 1-6 - [c43]Takahiro Yoshizawa, Yohei Watanabe, Junji Shikata:
Unconditionally secure searchable encryption. CISS 2017: 1-6 - [c42]Junji Shikata:
Tighter bounds on entropy of secret keys in authentication codes. ITW 2017: 259-263 - [e1]Junji Shikata:
Information Theoretic Security - 10th International Conference, ICITS 2017, Hong Kong, China, November 29 - December 2, 2017, Proceedings. Lecture Notes in Computer Science 10681, Springer 2017, ISBN 978-3-319-72088-3 [contents] - 2016
- [j14]Yohei Watanabe, Junji Shikata:
Unconditionally Secure Broadcast Encryption Schemes with Trade-Offs between Communication and Storage. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 99-A(6): 1097-1106 (2016) - [j13]Yohei Watanabe, Junji Shikata:
Information-theoretically Secure Timed-release Secret Sharing Schemes. J. Inf. Process. 24(4): 680-689 (2016) - [c41]Shinichiro Tomita, Yohei Watanabe, Junji Shikata:
Sequential aggregate authentication codes with information theoretic security. CISS 2016: 192-197 - [c40]Yohei Watanabe, Goichiro Hanaoka
, Junji Shikata:
Unconditionally Secure Revocable Storage: Tight Bounds, Optimal Construction, and Robustness. ICITS 2016: 213-237 - [c39]Yohei Watanabe, Junji Shikata:
Identity-Based Hierarchical Key-Insulated Encryption Without Random Oracles. Public Key Cryptography (1) 2016: 255-279 - [i14]Yohei Watanabe, Goichiro Hanaoka, Junji Shikata:
Unconditionally Secure Revocable Storage: Tight Bounds, Optimal Construction, and Robustness. IACR Cryptol. ePrint Arch. 2016: 64 (2016) - 2015
- [j12]Junji Shikata:
Trends and Development of Information-Theoretic Cryptography. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 98-A(1): 16-25 (2015) - [c38]Yuu Ishida, Yohei Watanabe, Junji Shikata:
Constructions of CCA-Secure Revocable Identity-Based Encryption. ACISP 2015: 174-191 - [c37]Jiawei Su, Katsunari Yoshioka, Junji Shikata, Tsutomu Matsumoto:
Detecting Obfuscated Suspicious JavaScript Based on Information-Theoretic Measures and Novelty Detection. ICISC 2015: 278-293 - [c36]Shota Goto, Junji Shikata:
A Compiler of Two-Party Protocols for Composable and Game-Theoretic Security, and Its Application to Oblivious Transfer. IMACC 2015: 133-151 - [c35]Mitsugu Iwamoto, Junji Shikata:
Constructions of symmetric-key encryption with guessing secrecy. ISIT 2015: 725-729 - [c34]Yohei Watanabe, Junji Shikata:
Constructions of Unconditionally Secure Broadcast Encryption from Key Predistribution Systems with Trade-Offs Between Communication and Storage. ProvSec 2015: 489-502 - [i13]Junji Shikata:
Design and Analysis of Information-Theoretically Secure Authentication Codes with Non-Uniformly Random Keys. IACR Cryptol. ePrint Arch. 2015: 250 (2015) - [i12]Shota Goto, Junji Shikata:
A Compiler of Two-Party Protocols for Composable and Game-Theoretic Security, and Its Application to Oblivious Transfer. IACR Cryptol. ePrint Arch. 2015: 950 (2015) - [i11]Yohei Watanabe, Junji Shikata:
Identity-based Hierarchical Key-insulated Encryption without Random Oracles. IACR Cryptol. ePrint Arch. 2015: 1254 (2015) - 2014
- [c33]Yohei Watanabe, Junji Shikata:
Timed-Release Secret Sharing Schemes with Information Theoretic Security. BalkanCryptSec 2014: 219-236 - [c32]Mitsugu Iwamoto, Junji Shikata:
Secret sharing schemes based on min-entropies. ISIT 2014: 401-405 - [c31]Yohei Watanabe, Junji Shikata:
Timed-Release Computational Secret Sharing Scheme and Its Applications. ProvSec 2014: 326-333 - [i10]Yohei Watanabe, Junji Shikata:
Timed-Release Secret Sharing Scheme with Information Theoretic Security. CoRR abs/1401.5895 (2014) - [i9]Mitsugu Iwamoto, Junji Shikata:
Secret Sharing Schemes Based on Min-Entropies. CoRR abs/1401.5896 (2014) - [i8]Mitsugu Iwamoto, Kazuo Ohta, Junji Shikata:
Security Formalizations and Their Relationships for Encryption and Key Agreement in Information-Theoretic Cryptography. CoRR abs/1410.1120 (2014) - 2013
- [c30]Asato Kubai, Junji Shikata, Yohei Watanabe:
Information-Theoretically Secure Aggregate Authentication Code: Model, Bounds, and Constructions. CD-ARES Workshops 2013: 16-28 - [c29]Shogo Hajime, Yohei Watanabe, Junji Shikata:
Information-Theoretically Secure Entity Authentication in the Multi-user Setting. ICISC 2013: 400-417 - [c28]Mitsugu Iwamoto, Junji Shikata:
Information Theoretic Security for Encryption Based on Conditional Rényi Entropies. ICITS 2013: 103-121 - [c27]Rintaro Nakano, Junji Shikata:
Constructions of Signcryption in the Multi-user Setting from Identity-Based Encryption. IMACC 2013: 324-343 - [c26]Junji Shikata:
Formalization of information-theoretic security for key agreement, revisited. ISIT 2013: 2720-2724 - [i7]Mitsugu Iwamoto, Junji Shikata:
Information Theoretic Security for Encryption Based on Conditional Renyi Entropies. IACR Cryptol. ePrint Arch. 2013: 440 (2013) - 2012
- [c25]Yohei Watanabe, Takenobu Seito, Junji Shikata:
Information-Theoretic Timed-Release Security: Key-Agreement, Encryption, and Authentication Codes. ICITS 2012: 167-186 - [c24]Takayoshi Fujii, Katsunari Yoshioka
, Junji Shikata, Tsutomu Matsumoto:
An Efficient Dynamic Detection Method for Various x86 Shellcodes. SAINT 2012: 284-289 - [i6]Junji Shikata:
Formalization of Information-Theoretic Security for Encryption and Key Agreement, Revisited. IACR Cryptol. ePrint Arch. 2012: 383 (2012) - [i5]Yohei Watanabe, Takenobu Seito, Junji Shikata:
Information-Theoretic Timed-Release Security: Key-Agreement, Encryption, and Authentication Codes. IACR Cryptol. ePrint Arch. 2012: 460 (2012) - 2011
- [j11]Hyung Chan Kim, Tatsunori Orii, Katsunari Yoshioka
, Daisuke Inoue, Jungsuk Song, Masashi Eto
, Junji Shikata, Tsutomu Matsumoto, Koji Nakao:
An Empirical Evaluation of an Unpacking Method Implemented with Dynamic Binary Instrumentation. IEICE Trans. Inf. Syst. 94-D(9): 1778-1791 (2011) - [c23]Junji Shikata, Daisuke Yamanaka:
Bit Commitment in the Bounded Storage Model: Tight Bound and Simple Optimal Construction. IMACC 2011: 112-131 - [c22]Yuki Shibuya, Junji Shikata:
Constructing Secure Hybrid Encryption from Key Encapsulation Mechanism with Authenticity. IMACC 2011: 210-229 - [c21]Takenobu Seito, Junji Shikata:
Information-theoretically secure key-insulated key-agreement. ITW 2011: 287-291 - 2010
- [j10]Daigo Muramatsu, Manabu Inuma, Junji Shikata, Akira Otsuka:
Enhanced Cancelable Biometrics for Online Signature Verification. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 93-A(6): 1254-1259 (2010) - [c20]Takenobu Seito, Tadashi Aikawa, Junji Shikata, Tsutomu Matsumoto:
Information-Theoretically Secure Key-Insulated Multireceiver Authentication Codes. AFRICACRYPT 2010: 148-165
2000 – 2009
- 2009
- [j9]Takenobu Seito, Yuki Hara, Junji Shikata, Tsutomu Matsumoto:
Unconditionally Secure Group Signatures. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 92-A(8): 2067-2085 (2009) - [c19]Yuki Hara, Taiki Ishiwata, Junji Shikata, Tsutomu Matsumoto:
Unconditionally Secure Blind Authentication Codes: The Model, Constructions, and Links to Commitment. Formal to Practical Security 2009: 116-137 - 2008
- [j8]Valery I. Korzhik, Hideki Imai, Junji Shikata, Guillermo Morales-Luna, Ekaterina Gerling:
On the Use of Bhattacharyya Distance as a Measure of the Detectability of Steganographic Systems. Trans. Data Hiding Multim. Secur. 3: 23-32 (2008) - [j7]Junji Shikata, Tsutomu Matsumoto:
Unconditionally Secure Steganography Against Active Attacks. IEEE Trans. Inf. Theory 54(6): 2690-2705 (2008) - 2007
- [c18]Takeru Ishihara, Hiroshi Aono, Sadayuki Hongo, Junji Shikata:
Construction of Threshold (Hybrid) Encryption in the Random Oracle Model: How to Construct Secure Threshold Tag-KEM from Weakly Secure Threshold KEM. ACISP 2007: 259-273 - [c17]Yuki Hara, Takenobu Seito, Junji Shikata, Tsutomu Matsumoto:
Unconditionally Secure Blind Signatures. ICITS 2007: 23-43 - [c16]Junji Shikata:
Construction Methodology of Unconditionally Secure Signature Schemes. ICITS 2007: 113-114 - 2006
- [j6]Goichiro Hanaoka
, Junji Shikata, Yumiko Hanaoka, Hideki Imai:
Unconditionally Secure Anonymous Encryption and Group Authentication. Comput. J. 49(3): 310-321 (2006) - 2005
- [j5]Katsunari Yoshioka, Junji Shikata, Tsutomu Matsumoto:
On Collusion Security of Random Codes. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 88-A(1): 296-304 (2005) - [c15]Yumiko Hanaoka, Goichiro Hanaoka, Junji Shikata, Hideki Imai:
Identity-Based Hierarchical Strongly Key-Insulated Encryption and Its Application. ASIACRYPT 2005: 495-514 - [c14]Tsutomu Matsumoto, Junji Shikata:
Authenticated encryption and steganography in unconditional security setting. ICITS 2005: 1-6 - 2004
- [j4]Goichiro Hanaoka, Junji Shikata, Yuliang Zheng, Hideki Imai:
Efficient Unconditionally Secure Digital Signatures. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 87-A(1): 120-130 (2004) - [c13]Rui Zhang, Goichiro Hanaoka, Junji Shikata, Hideki Imai:
On the Security of Multiple Encryption or CCA-security+CCA-security=CCA-security? Public Key Cryptography 2004: 360-374 - [i4]Yumiko Hanaoka, Goichiro Hanaoka, Junji Shikata, Hideki Imai:
Identity-Based Hierarchical Strongly Key-Insulated Encryption and Its Application. IACR Cryptol. ePrint Arch. 2004: 338 (2004) - 2003
- [j3]Mira Kim, Junji Shikata, Hirofumi Muratani, Hideki Imai:
Constructing c-Secure CRT Codes Using Polynomials over Finite Fields. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 86-A(12): 3259-3266 (2003) - [c12]Katsunari Yoshioka, Junji Shikata, Tsutomu Matsumoto:
Systematic Treatment of Collusion Secure Codes: Security Definitions and Their Relations. ISC 2003: 408-421 - [c11]Goichiro Hanaoka, Junji Shikata, Yumiko Hanaoka, Hideki Imai:
The Role of Arbiters in Asymmetric Authentication Schemes. ISC 2003: 428-441 - [c10]Yodai Watanabe, Junji Shikata, Hideki Imai:
Equivalence between Semantic Security and Indistinguishability against Chosen Ciphertext Attacks. Public Key Cryptography 2003: 71-84 - [i3]Yodai Watanabe, Junji Shikata:
Relation among simulator-based and comparison-based definitions of semantic security. IACR Cryptol. ePrint Arch. 2003: 78 (2003) - [i2]Rui Zhang, Goichiro Hanaoka, Junji Shikata, Hideki Imai:
On the Security of Multiple Encryption or CCA-security+CCA-security=CCA-security? IACR Cryptol. ePrint Arch. 2003: 181 (2003) - 2002
- [j2]Akira Otsuka, Goichiro Hanaoka, Junji Shikata, Hideki Imai:
An Unconditionally Secure Electronic Cash Scheme with Computational Untraceability. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 85-A(1): 140-148 (2002) - [j1]Goichiro Hanaoka, Junji Shikata, Yuliang Zheng, Hideki Imai:
A Traitor Traceable Conference System with Dynamic Sender. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 85-A(1): 167-174 (2002) - [c9]Goichiro Hanaoka, Junji Shikata, Yumiko Hanaoka, Hideki Imai:
Unconditionally Secure Anonymous Encryption and Group Authentication. ASIACRYPT 2002: 81-99 - [c8]Junji Shikata, Goichiro Hanaoka, Yuliang Zheng
, Hideki Imai:
Security Notions for Unconditionally Secure Signature Schemes. EUROCRYPT 2002: 434-449 - [c7]Yumiko Hanaoka, Goichiro Hanaoka, Junji Shikata, Hideki Imai:
Unconditionally Secure Key Insulated Cryptosystems: Models, Bounds and Constructions. ICICS 2002: 85-96 - [c6]Shoko Yonezawa, Goichiro Hanaoka, Junji Shikata, Hideki Imai:
Traceability Schemes for Signed Documents. ISC 2002: 257-271 - [c5]Hideki Imai, Goichiro Hanaoka, Junji Shikata, Akira Otsuka, Anderson C. A. Nascimento
:
Cryptography with information theoretic security. ITW 2002: 73 - [c4]Goichiro Hanaoka, Junji Shikata, Yuliang Zheng
, Hideki Imai:
Efficient and Unconditionally Secure Digital Signatures and a Security Analysis of a Multireceiver Authentication Code. Public Key Cryptography 2002: 64-79 - [i1]Yodai Watanabe, Junji Shikata, Hideki Imai:
Equivalence between semantic security and indistinguishability against chosen ciphertext attacks. IACR Cryptol. ePrint Arch. 2002: 33 (2002) - 2000
- [c3]Goichiro Hanaoka, Junji Shikata, Yuliang Zheng
, Hideki Imai:
Unconditionally Secure Digital Signature Schemes Admitting Transferability. ASIACRYPT 2000: 130-142
1990 – 1999
- 1999
- [c2]Junji Shikata, Yuliang Zheng, Joe Suzuki, Hideki Imai:
Optimizing the Menezes-Okamoto-Vanstone (MOV) Algorithm for Non-supersingular Elliptic Curves. ASIACRYPT 1999: 86-102 - [c1]Ryuichi Harasawa, Junji Shikata, Joe Suzuki, Hideki Imai:
Comparing the MOV and FR Reductions in Elliptic Curve Cryptography. EUROCRYPT 1999: 190-205
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
load content from web.archive.org
Privacy notice: By enabling the option above, your browser will contact the API of web.archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net