Shigeo TSUJII


Proposal of the Multivariate Public Key Cryptosystem Relying on the Difficulty of Factoring a Product of Two Large Prime Numbers
Shigeo TSUJII Kohtaro TADAKI Ryo FUJITA Masahito GOTAISHI 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2016/01/01
Vol. E99-A  No. 1  pp. 66-72
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: 
Keyword: 
Multivariate Public Key CryptosystemPublic Key Cryptosystemprime factorizationGröbner basesrank attack
 Summary | Full Text:PDF(1.3MB)

Key-Generation Algorithms for Linear Piece In Hand Matrix Method
Kohtaro TADAKI Shigeo TSUJII 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2010/06/01
Vol. E93-A  No. 6  pp. 1102-1110
Type of Manuscript:  Special Section PAPER (Special Section on Discrete Mathematics and Its Applications)
Category: Cryptography and Information Security
Keyword: 
multivariate public-key cryptosystemPiece In Hand matrix methodplus methodkey-generation algorithmprobabilistic polynomial-time algorithmlinear algebra
 Summary | Full Text:PDF(371.2KB)

Dually-Perturbed Matsumoto-Imai Signature (DPMS) Scheme
Masahito GOTAISHI Kohtaro TADAKI Ryo FUJITA Shigeo TSUJII 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2010/06/01
Vol. E93-A  No. 6  pp. 1078-1085
Type of Manuscript:  Special Section PAPER (Special Section on Discrete Mathematics and Its Applications)
Category: Cryptography and Information Security
Keyword: 
post-quantum cryptosystemMultivariate Public Key Cryptosystemdigital signature
 Summary | Full Text:PDF(650.6KB)

Security Enhancement of Various MPKCs by 2-Layer Nonlinear Piece in Hand Method
Shigeo TSUJII Kohtaro TADAKI Ryou FUJITA Masahito GOTAISHI Toshinobu KANEKO 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2009/10/01
Vol. E92-A  No. 10  pp. 2438-2446
Type of Manuscript:  Special Section PAPER (Special Section on Information Theory and Its Applications)
Category: Cryptography and Information Security
Keyword: 
public key cryptosystemmultivariate public key cryptosystemPiece in Handmultivariate polynomial
 Summary | Full Text:PDF(399.2KB)

Robust Noise Suppression Algorithm with the Kalman Filter Theory for White and Colored Disturbance
Nari TANABE Toshihiro FURUKAWA Shigeo TSUJII 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2008/03/01
Vol. E91-A  No. 3  pp. 818-829
Type of Manuscript:  PAPER
Category: Digital Signal Processing
Keyword: 
robust noise suppressionKalman filtercanonical state space modelswhite and colored noiseshigh performancehigh qualityAR systemdriving source
 Summary | Full Text:PDF(1.6MB)

Proposal for Piece in Hand Matrix: General Concept for Enhancing Security of Multivariate Public Key Cryptosystems
Shigeo TSUJII Kohtaro TADAKI Ryou FUJITA 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2007/05/01
Vol. E90-A  No. 5  pp. 992-999
Type of Manuscript:  Special Section PAPER (Special Section on Discrete Mathematics and Its Applications)
Category: 
Keyword: 
public key cryptosystemmultivariate polynomialmultivariate public key cryptosystempiece in hand conceptsoldiers in hand
 Summary | Full Text:PDF(242.5KB)

A Subspace Blind Identification Algorithm with Reduced Computational Complexity--Colored Noise Case--
Nari TANABE Toshihiro FURUKAWA Kohichi SAKANIWA Shigeo TSUJII 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2005/07/01
Vol. E88-A  No. 7  pp. 2015-2018
Type of Manuscript:  LETTER
Category: Digital Signal Processing
Keyword: 
principal component analysissubspace methodcolored observation noisenoise variancechannel ordercomputational complexity
 Summary | Full Text:PDF(264.6KB)

An Extension of GHS Weil Descent Attack
Tsutomu IIJIMA Mahoro SHIMURA Jinhui CHAO Shigeo TSUJII 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2005/01/01
Vol. E88-A  No. 1  pp. 97-104
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: Public Key Cryptography
Keyword: 
elliptic curveshyperelliptic curvessuperelliptic curves,GHS Weil descent attackGHS conorm-norm homomorphismfunction fields
 Summary | Full Text:PDF(217.8KB)

Improvements of Addition Algorithm on Genus 3 Hyperelliptic Curves and Their Implementation
Masaki GONDA Kazuto MATSUO Kazumaro AOKI Jinhui CHAO Shigeo TSUJII 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2005/01/01
Vol. E88-A  No. 1  pp. 89-96
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: Public Key Cryptography
Keyword: 
genus 3 hyperelliptic curveshyperelliptic curve cryptosystemsaddition algorithmCantor algorithmHarley algorithmToom's multiplication
 Summary | Full Text:PDF(225.6KB)

A Practical Subspace Blind Identification Algorithm with Reduced Computational Complexity
Nari TANABE Toshihiro FURUKAWA Kohichi SAKANIWA Shigeo TSUJII 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2004/12/01
Vol. E87-A  No. 12  pp. 3360-3371
Type of Manuscript:  PAPER
Category: Digital Signal Processing
Keyword: 
principal component analysisautocorrelationsubspace methodeigenvalue and singular-value decompositioncomputational complexitychannel ordernoise variance
 Summary | Full Text:PDF(1.3MB)

An Electronic Voting Protocol Preserving Voter's Privacy
Hiroshi YAMAGUCHI Atsushi KITAZAWA Hiroshi DOI Kaoru KUROSAWA Shigeo TSUJII 
Publication:   IEICE TRANSACTIONS on Information and Systems
Publication Date: 2003/09/01
Vol. E86-D  No. 9  pp. 1868-1878
Type of Manuscript:  PAPER
Category: Applications of Information Security Techniques
Keyword: 
electronic votingprivacyprotocolcryptographic system
 Summary | Full Text:PDF(394.6KB)

Baby Step Giant Step Algorithms in Point Counting of Hyperelliptic Curves
Kazuto MATSUO Jinhui CHAO Shigeo TSUJII 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2003/05/01
Vol. E86-A  No. 5  pp. 1127-1134
Type of Manuscript:  Special Section PAPER (Special Section on Discrete Mathematics and Its Applications)
Category: 
Keyword: 
hyperelliptic curve cryptosystemshyperelliptic curvespoint counting algorithmsbaby step giant step algorithmsGaudry-Harley scheme
 Summary | Full Text:PDF(264.1KB)

Improved Higher Order Differential Attack and Its Application to Nyberg-Knudsen's Designed Block Cipher
Takeshi SHIMOYAMA Shiho MORIAI Toshinobu KANEKO Shigeo TSUJII 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 1999/09/25
Vol. E82-A  No. 9  pp. 1971-1980
Type of Manuscript:  PAPER
Category: Information Security
Keyword: 
block cipherhigher order differential attackKN cipheralgebraic equation
 Summary | Full Text:PDF(596.5KB)

On Ambiguity in Coppersmith' Attacking Method a against NIKS-TAS Scheme
Shigeo TSUJII Kiyomichi ARAKI Masao KASAHARA Eiji OKAMOTO Ryuichi SAKAI Yasuo MAEDA Tomohiko YAGISAWA 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 1996/01/25
Vol. E79-A  No. 1  pp. 66-75
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: 
Keyword: 
modulo degeneracycryptanalysisID-based key sharingNIKS-TAS
 Summary | Full Text:PDF(762.2KB)

A Key Distribution Protocol for Mobile Communication Systems
Choonsik PARK Kaoru KUROSAWA Shigeo TSUJII 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 1995/01/25
Vol. E78-A  No. 1  pp. 77-81
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: 
Keyword: 
mobile communicationkey distributionauthenticationlow exponent RSA
 Summary | Full Text:PDF(388.4KB)

4-Move Perfect ZKIP for Some Promise Problems
Kaoru KUROSAWA Wakaha OGATA Shigeo TSUJII 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 1995/01/25
Vol. E78-A  No. 1  pp. 34-41
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: 
Keyword: 
perfect ZKIPpromise problempromised BPP
 Summary | Full Text:PDF(616.6KB)

A Secure Broadcast Communication Method with Short Messages
Masahiro MAMBO Akinori NISHIKAWA Eiji OKAMOTO Shigeo TSUJII 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 1994/08/25
Vol. E77-A  No. 8  pp. 1319-1327
Type of Manuscript:  Special Section PAPER (Special Section on Information Theory and Its Applications)
Category: 
Keyword: 
secure broadcast communicationmessage length
 Summary | Full Text:PDF(793.9KB)

Unsupervised Learning of 3D objects Conserving Global Topological Order
Jinhui CHAO Kenji MINOWA Shigeo TSUJII 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 1993/05/25
Vol. E76-A  No. 5  pp. 749-753
Type of Manuscript:  Special Section PAPER (Special Section on Neural Nets,Chaos and Numerics)
Category: Neural Nets--Theory and Applications--
Keyword: 
competitive learningrepresentation of 3D objectsfeeler mechanismself-organization process
 Summary | Full Text:PDF(423.8KB)

FOREWORD
Shigeo TSUJII 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 1993/01/25
Vol. E76-A  No. 1  pp. 3-3
Type of Manuscript:  FOREWORD
Category: 
Keyword: 
 Summary | Full Text:PDF(87.5KB)

5-Move Statistical Zero Knowledge
Kaoru KUROSAWA Masahiro MAMBO Shigeo TSUJII 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 1993/01/25
Vol. E76-A  No. 1  pp. 40-45
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: 
Keyword: 
statistical ZKIPperfect ZKIPstandard ZKIPinvulnerable generatorclass K
 Summary | Full Text:PDF(529.1KB)

Quantum Noise of Optical Locking Amplification Process
Norihiro YOSHIDA Suthichai NOPPANAKEEPONG Osamu HIROTA Shigeo TSUJII 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 1992/09/25
Vol. E75-A  No. 9  pp. 1124-1127
Type of Manuscript:  Special Section LETTER (Special Section on Information Theory and Its Applications)
Category: 
Keyword: 
injection lockingquantum noiselocking amplificationPM-AM transformationnonlinear amplification
 Summary | Full Text:PDF(303.3KB)

FOREWORD
Shigeo TSUJII Fumiaki MACHIHARA 
Publication:   IEICE TRANSACTIONS on Communications
Publication Date: 1992/01/25
Vol. E75-B  No. 1  pp. 1-2
Type of Manuscript:  FOREWORD
Category: 
Keyword: 
 Summary | Full Text:PDF(63.7KB)

Collision Free-Hash Function Based on the r-th Residue Cryptosystem
Kaoru KUROSAWA Hirofumi KASAI Shigeo TSUJII 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 1991/08/25
Vol. E74-A  No. 8  pp. 2114-2117
Type of Manuscript:  Special Section PAPER (Special Issue on Cryptography and Information Security)
Category: 
Keyword: 
 Summary | Full Text:PDF(206KB)

Adaptive Crosstalk Cancellation Based on Recursive Prediction Error Method
Ping HUANG Jinhui CHAO Shigeo TSUJII 
Publication:   IEICE TRANSACTIONS on Communications
Publication Date: 1991/07/25
Vol. E74-B  No. 7  pp. 1927-1934
Type of Manuscript:  PAPER
Category: Communication Theory
Keyword: 
 Summary | Full Text:PDF(551.6KB)

FOREWORD
Shigeo TSUJII Fumiaki MACHIHARA 
Publication:   IEICE TRANSACTIONS on Communications
Publication Date: 1991/01/25
Vol. E74-B  No. 1  pp. 63-64
Type of Manuscript:  FOREWORD
Category: 
Keyword: 
 Summary | Full Text:PDF(136.2KB)

A New Global Optimization Method and Supervised Learning of Multilayer Neural Networks
Jinhui CHAO Wijak RATANASWAN Shigeo TSUJII 
Publication:   IEICE TRANSACTIONS (1976-1990)
Publication Date: 1990/11/25
Vol. E73-E  No. 11  pp. 1796-1799
Type of Manuscript:  Special Section LETTER (Special Issue on 1990 Autumn Natl. Conv. IEICE)
Category: Neural Networks
Keyword: 
 Summary | Full Text:PDF(255.5KB)

An Attacking Method for Multiplicative Knapsack Type Public Key Cryptosystem Based on Finite Field
Kaoru KUROSAWA Toshiya ITOH Hiroo SHIGETA Shigeo TSUJII 
Publication:   IEICE TRANSACTIONS (1976-1990)
Publication Date: 1987/01/25
Vol. E70-E  No. 1  pp. 37-41
Type of Manuscript:  PAPER
Category: Information and Communication Theory
Keyword: 
 Summary | Full Text:PDF(327.7KB)