What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Junji Shikata
Google Scholar
32
publications in security and cryptology related venues
Year
Venue
Title
2024
conf/cans
Compact Post-quantum Bounded-Collusion Identity-Based Encryption.
Shingo Sato
Junji Shikata
2024
conf/cans
How to Apply Fujisaki-Okamoto Transformation to Registration-Based Encryption.
Sohto Chiku
Keisuke Hara
Keitaro Hashimoto
Toi Tomita
Junji Shikata
2023
conf/provsec
Identity-Based Matchmaking Encryption Secure Against Key Generation Center.
Sohto Chiku
Keisuke Hara
Junji Shikata
2023
conf/asiapkc
Designated Verifier Signature with Claimability.
Kyosuke Yamashita
Keisuke Hara
Yohei Watanabe
Naoto Yanai
Junji Shikata
2023
conf/wisa
Bloomier Filters on 3-Hypergraphs.
Hyungrok Jo
Junji Shikata
2023
conf/ctrsa
Authenticated Encryption for Very Short Inputs.
Alexandre Adomnicai
Kazuhiko Minematsu
Junji Shikata
2023
conf/cans
Anonymous Broadcast Authentication with Logarithmic-Order Ciphertexts from LWE.
Yoshinori Aono
Junji Shikata
2022
conf/icisc
Group Testing Aggregate Signatures with Soundness.
Shingo Sato
Junji Shikata
Tsutomu Matsumoto
2022
conf/icisc
Identity-based Interactive Aggregate Signatures from Lattices.
Shingo Sato
Junji Shikata
2021
conf/ccs
Efficient Threshold Public Key Encryption from the Computational Bilinear Diffie-Hellman Assumption.
Masahiro Ebina
Jumpei Mita
Junji Shikata
Yohei Watanabe
2019
conf/provsec
History-Free Sequential Aggregate MAC Revisited.
Shoichi Hirose
Junji Shikata
2018
conf/crypto
Lower Bounds on Lattice Enumeration with Extreme Pruning.
Yoshinori Aono
Phong Q. Nguyen
Takenobu Seito
Junji Shikata
2018
conf/provsec
Signcryption with Quantum Random Oracles.
Shingo Sato
Junji Shikata
2018
conf/provsec
Generic Construction of Sequential Aggregate MACs from Any MACs.
Shingo Sato
Shoichi Hirose
Junji Shikata
2016
conf/pkc
Identity-Based Hierarchical Key-Insulated Encryption Without Random Oracles.
Yohei Watanabe
Junji Shikata
2015
conf/acisp
Constructions of CCA-Secure Revocable Identity-Based Encryption.
Yuu Ishida
Yohei Watanabe
Junji Shikata
2015
conf/icisc
Detecting Obfuscated Suspicious JavaScript Based on Information-Theoretic Measures and Novelty Detection.
Jiawei Su
Katsunari Yoshioka
Junji Shikata
Tsutomu Matsumoto
2015
conf/provsec
Constructions of Unconditionally Secure Broadcast Encryption from Key Predistribution Systems with Trade-Offs Between Communication and Storage.
Yohei Watanabe
Junji Shikata
2014
conf/provsec
Timed-Release Computational Secret Sharing Scheme and Its Applications.
Yohei Watanabe
Junji Shikata
2013
conf/icisc
Information-Theoretically Secure Entity Authentication in the Multi-user Setting.
Shogo Hajime
Yohei Watanabe
Junji Shikata
2010
conf/africacrypt
Information-Theoretically Secure Key-Insulated Multireceiver Authentication Codes.
Takenobu Seito
Tadashi Aikawa
Junji Shikata
Tsutomu Matsumoto
2007
conf/acisp
Construction of Threshold (Hybrid) Encryption in the Random Oracle Model: How to Construct Secure Threshold Tag-KEM from Weakly Secure Threshold KEM.
Takeru Ishihara
Hiroshi Aono
Sadayuki Hongo
Junji Shikata
2005
conf/asiacrypt
Identity-Based Hierarchical Strongly Key-Insulated Encryption and Its Application.
Yumiko Hanaoka
Goichiro Hanaoka
Junji Shikata
Hideki Imai
2004
conf/pkc
On the Security of Multiple Encryption or CCA-security+CCA-security=CCA-security?
Rui Zhang
Goichiro Hanaoka
Junji Shikata
Hideki Imai
2003
conf/pkc
Equivalence between Semantic Security and Indistinguishability against Chosen Ciphertext Attacks.
Yodai Watanabe
Junji Shikata
Hideki Imai
2002
conf/pkc
Efficient and Unconditionally Secure Digital Signatures and a Security Analysis of a Multireceiver Authentication Code.
Goichiro Hanaoka
Junji Shikata
Yuliang Zheng
Hideki Imai
2002
conf/icics
Unconditionally Secure Key Insulated Cryptosystems: Models, Bounds and Constructions.
Yumiko Hanaoka
Goichiro Hanaoka
Junji Shikata
Hideki Imai
2002
conf/eurocrypt
Security Notions for Unconditionally Secure Signature Schemes.
Junji Shikata
Goichiro Hanaoka
Yuliang Zheng
Hideki Imai
2002
conf/asiacrypt
Unconditionally Secure Anonymous Encryption and Group Authentication.
Goichiro Hanaoka
Junji Shikata
Yumiko Hanaoka
Hideki Imai
2000
conf/asiacrypt
Unconditionally Secure Digital Signature Schemes Admitting Transferability.
Goichiro Hanaoka
Junji Shikata
Yuliang Zheng
Hideki Imai
1999
conf/eurocrypt
Comparing the MOV and FR Reductions in Elliptic Curve Cryptography.
Ryuichi Harasawa
Junji Shikata
Joe Suzuki
Hideki Imai
1999
conf/asiacrypt
Optimizing the Menezes-Okamoto-Vanstone (MOV) Algorithm for Non-supersingular Elliptic Curves.
Junji Shikata
Yuliang Zheng
Joe Suzuki
Hideki Imai
Coauthors
Alexandre Adomnicai
(1)
Goichiro Hanaoka
(7)
Hideki Imai
(10)
Hiroshi Aono
(1)
Hyungrok Jo
(1)
Jiawei Su
(1)
Joe Suzuki
(2)
Jumpei Mita
(1)
Junji Shikata
(32)
Katsunari Yoshioka
(1)
Kazuhiko Minematsu
(1)
Keisuke Hara
(3)
Keitaro Hashimoto
(1)
Kyosuke Yamashita
(1)
Masahiro Ebina
(1)
Naoto Yanai
(1)
Phong Q. Nguyen
(1)
Rui Zhang
(1)
Ryuichi Harasawa
(1)
Sadayuki Hongo
(1)
Shingo Sato
(5)
Shogo Hajime
(1)
Shoichi Hirose
(2)
Sohto Chiku
(2)
Tadashi Aikawa
(1)
Takenobu Seito
(2)
Takeru Ishihara
(1)
Toi Tomita
(1)
Tsutomu Matsumoto
(3)
Yodai Watanabe
(1)
Yohei Watanabe
(7)
Yoshinori Aono
(2)
Yuliang Zheng
(4)
Yumiko Hanaoka
(3)
Yuu Ishida
(1)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to