Cryptographers' World
 

Shigeo Tsujii


Author's Web Page Link

15 papers in database with 225 citations 

H-number: 9

Journal Papers

[Sort papers chronologically] [Sort papers by citations count]

 
1. Toshiya Itoh,  Masafumi Hoshi,  Shigeo Tsujii,  A Low Communication Competitive Interactive Proof System for Promised Quadratic Residuosity, Journal of Cryptology, Volume 9(2), pp. 101 - 109, Springer, 1996.

[Cited 1 times ]

Conference Papers

[Sort papers chronologically] [Sort papers by citations count]

1. Jinhui Chao,  Kazuto Matsuo,  Hiroto Kawashiro,  Shigeo Tsujii,  Construction of Hyperelliptic Curves with CM and Its Application to Cryptosystems, pp. 259 - 273, ASIACRYPT 2000.

[Electronic Edition][Cited 12 times ]

2. Jinhui Chao,  Osamu Nakamura,  Kohji Sobataka,  Shigeo Tsujii,  Construction of Secure Elliptic Cryptosystems Using CM Tests and Liftings, pp. 95 - 109, ASIACRYPT 1998.

[Electronic Edition][Cited 12 times ]

3. Shigeo Tsujii,  Electronic Money and Key Management from Global and Regional Points of View, pp. 173 - 184, ASIACRYPT 1996.

[Electronic Edition][No citation]

4. Kaoru Kurosawa,  Koji Okada,  Shigeo Tsujii,  Low Exponent Attack against Elliptic Curve RSA, pp. 376 - 383, ASIACRYPT 1994.

[Electronic Edition][Cited 24 times ]

5. Jinhui Chao,  Kazuo Tanada,  Shigeo Tsujii,  Design of Elliptic Curves with Controllable Lower Boundary of Extension Degree for Reduction Attacks, pp. 50 - 55, CRYPTO 1994.

[Electronic Edition][Cited 28 times ]

6. Toshiya Itoh,  Masafumi Hoshi,  Shigeo Tsujii,  A Low Communication Competitive Interactive Proof System for Promised Quadratic Residuosity, pp. 61 - 72, CRYPTO 1993.

[Electronic Edition][Cited 2 times ]

7. Choonsik Park,  Kaoru Kurosawa,  Tatsuaki Okamoto,  Shigeo Tsujii,  On Key Distribution and Authentication in Mobile Radio Networks, pp. 461 - 465, EUROCRYPT 1993.

[Electronic Edition][Cited 46 times ]

8. Kaoru Kurosawa,  Koji Okada,  Keiichi Sakano,  Wakaha Ogata,  Shigeo Tsujii,  Nonperfect Secret Sharing Schemes and Matroids, pp. 126 - 141, EUROCRYPT 1993.

[Electronic Edition][Cited 49 times ]

9. Wakaha Ogata,  Kaoru Kurosawa,  Shigeo Tsujii,  Nonperfect Secret Sharing Schemes, pp. 56 - 66, ASIACRYPT 1992.

[Electronic Edition][Cited 14 times ]

10. Takashi Satoh,  Kaoru Kurosawa,  Shigeo Tsujii,  Privacy for Multi-Party Protocols, pp. 252 - 260, ASIACRYPT 1992.

[Electronic Edition][No citation]

11. Shigeo Tsujii,  Jinhui Chao,  A New ID-Based Key Sharing System, pp. 288 - 299, CRYPTO 1991.

[Electronic Edition][Cited 15 times ]

12. S. Shinozaki,  Toshiya Itoh,  Atsushi Fujioka,  Shigeo Tsujii,  Provably Secure Key-Updating Schemes in Identity-Based Systems, pp. 16 - 30, EUROCRYPT 1990.

[Electronic Edition][Cited 2 times ]

13. Kaoru Kurosawa,  Yutaka Katayama,  Wakaha Ogata,  Shigeo Tsujii,  General Public Key Residue Cryptosystems and Mental Poker Protocols, pp. 374 - 388, EUROCRYPT 1990.

[Electronic Edition][Cited 18 times ]

14. Kaoru Kurosawa,  Shigeo Tsujii,  Multi-Language Zero Knowledge Interactive Proof Systems, pp. 339 - 352, CRYPTO 1990.

[Electronic Edition][Cited 3 times ]



Database status:
3755 authors,
5428 conference papers from 177 conference proceedings,
559 journal papers from 8 journals
Highly Cited...