Junji Shikata
(四方 順司)
Modified on: 2022/08/30
Profile Information
- Affiliation
- Faculty of Environment and Information Sciences Division of Social Environment and Information, Yokohama National University
- Degree
-
Ph.D.(Osaka University)
- J-GLOBAL ID
- 200901057404000594
- researchmap Member ID
- 5000006077
- External link
Research Areas
3Research History
2-
Apr, 2000 - Mar, 2002
Education
3Awards
10-
Jul, 2017
-
Sep, 2013
-
Sep, 2013
-
Nov, 2007
-
Jan, 2005
-
Sep, 2003
Papers
224-
Proceedings of The 12th International Conference on Provable Security (ProvSec 2018), LNCS 11192 406-414, Oct, 2018 Peer-reviewed
-
Proceedings of The 12th International Conference on Provable Security (ProvSec 2018), LNCS 11192 295-312, Oct, 2018 Peer-reviewed
-
Entropy, 20(10), Sep, 2018 Peer-reviewed
-
Proceedings of The 14th International Conference on Information Security Practice and Experience (ISPEC 2018), LNCS 11125 357-372, Sep, 2018 Peer-reviewed
-
Proceedings of CRYPTO 2018, LNCS 10992 608-637, Aug, 2018 Peer-reviewed
-
Designs, Codes and Cryptography, 1-29, Jun, 2018 Peer-reviewed
-
IEEE International Symposium on Information Theory - Proceedings, 2018- 259-263, Jan 31, 2018 Peer-reviewed
-
Designs, Codes, and Cryptography, 86(1) 17-54, Jan 1, 2018 Peer-reviewed
-
IEEE Transactions on Information Theory, 64(1) 654-685, Jan 1, 2018 Peer-reviewed
-
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 10786 331-351, 2018 Peer-reviewed
-
Proc. of 2017 Annual Conference on Information Science and Systems (CISS), Mar, 2017 Peer-reviewed
-
Proc. of 2017 Annual Conference on Information Science and Systems (CISS), Mar, 2017 Peer-reviewed
-
International Journal on Applied Cryptography (IJACT), 3(3) 288-311, 2017 Peer-reviewed
-
Information Theoretic Security (ICITS 2016), 10015 213-237, Nov, 2016 Peer-reviewed
-
Journal of Information Processing, 24(4) 680-689, Jul, 2016 Peer-reviewed
-
Special Section on Discrete Mathematics and Its Applications, IEICE Transactions, 99(6) 1097-1106, Jun, 2016 Peer-reviewed
-
Proc. of the 2016 ACM International Workshop on Traffic Measurements for Cybersecurity (WTMC 2016), 3-11, May, 2016 Peer-reviewed
-
50th Annual Conference on Information Sciences and Systems (CISS 2016), 192-197, Mar, 2016 Peer-reviewed
-
PUBLIC-KEY CRYPTOGRAPHY - PKC 2016, PT I, 9614 255-279, 2016 Peer-reviewed
-
Information Security and Cryptology (ICISC 2015), LNCS 9558 278-293, Dec, 2015 Peer-reviewed
Misc.
5-
IEICE Trans. Fundamentals., E84-A(4) 61-67, Apr, 2001
-
日本評論社, 30-33, 2001
-
臨時別冊数理科学, サイエンス社, 48-56, 2000
-
数理科学, サイエンス社, 41-47, 2000
-
Computer Today, サイエンス社, 15-20, 1999
Presentations
7-
情報ネットワーク科学研究会, May 16, 2014, 電子情報通信学会 Invited
-
Annual Workshop on Mathematics and Computer Science, Mar 25, 2014, 城西大学ワークショップ Invited
-
電子情報通信学会ISEC-IT-WBS合同研究会, Mar, 2014 Invited
-
JSPS-DST Asian Academic Seminar 2013, Nov 3, 2013, Discrete Mathematics and its Applications, Graduate School of Mathematical Sciences, the University of Tokyo Invited
-
本願寺文化財団特別講, Jul 21, 2013 Invited
-
北陸先端科学技術大学院大学, Sep 24, 2010 Invited
-
情報・物理セキュリティ研究ワークショップ, Nov, 2009 Invited