Junji Shikata

836 total citations
49 papers, 125 citations indexed

About

Junji Shikata is a scholar working on Artificial Intelligence, Computer Vision and Pattern Recognition and Computer Networks and Communications. According to data from OpenAlex, Junji Shikata has authored 49 papers receiving a total of 125 indexed citations (citations by other indexed papers that have themselves been cited), including 32 papers in Artificial Intelligence, 17 papers in Computer Vision and Pattern Recognition and 16 papers in Computer Networks and Communications. Recurrent topics in Junji Shikata's work include Cryptography and Data Security (22 papers), Chaos-based Image/Signal Encryption (14 papers) and Wireless Communication Security Techniques (10 papers). Junji Shikata is often cited by papers focused on Cryptography and Data Security (22 papers), Chaos-based Image/Signal Encryption (14 papers) and Wireless Communication Security Techniques (10 papers). Junji Shikata collaborates with scholars based in Japan and Australia. Junji Shikata's co-authors include Hideki Ochiai, Mitsugu Iwamoto, Tsutomu Matsumoto, Kazuo Ohta, Hideki Imai, Katsunari Yoshioka, Yoshinori Ogawa, Shingo Sato, Yuliang Zheng and Yasutaka Fujimoto and has published in prestigious journals such as IEEE Transactions on Information Theory, IEEE Access and IEEE Internet of Things Journal.

In The Last Decade

Junji Shikata

39 papers receiving 122 citations

Peers — A (Enhanced Table)

Peers by citation overlap · career bar shows stage (early→late) cites · hero ref

Name h Career Trend Papers Cites
Junji Shikata Japan 6 70 40 38 29 29 49 125
Ju-Sung Kang South Korea 5 70 1.0× 45 1.1× 61 1.6× 24 0.8× 12 0.4× 22 121
Olivier Billet France 4 99 1.4× 44 1.1× 43 1.1× 23 0.8× 25 0.9× 5 135
Shengyu Zhang China 7 65 0.9× 45 1.1× 64 1.7× 15 0.5× 50 1.7× 26 179
Sourabh Chandra India 6 113 1.6× 100 2.5× 66 1.7× 68 2.3× 22 0.8× 14 209
Olivier Blazy France 7 117 1.7× 23 0.6× 62 1.6× 54 1.9× 36 1.2× 23 171
Marek Klonowski Poland 7 49 0.7× 22 0.6× 69 1.8× 29 1.0× 21 0.7× 39 130
Matthias J. Kannwischer Germany 6 181 2.6× 50 1.3× 28 0.7× 63 2.2× 42 1.4× 13 244
Sebastian Schlag Germany 7 44 0.6× 44 1.1× 77 2.0× 26 0.9× 64 2.2× 13 177
Marc Girault France 8 109 1.6× 59 1.5× 47 1.2× 26 0.9× 26 0.9× 11 175
Walter Fumy Germany 5 94 1.3× 42 1.1× 37 1.0× 37 1.3× 19 0.7× 14 134

Countries citing papers authored by Junji Shikata

Since Specialization
Citations

This map shows the geographic impact of Junji Shikata's research. It shows the number of citations coming from papers published by authors working in each country. You can also color the map by specialization and compare the number of citations received by Junji Shikata with the expected number of citations based on a country's size and research output (numbers larger than one mean the country cites Junji Shikata more than expected).

Fields of papers citing papers by Junji Shikata

Since Specialization
Physical SciencesHealth SciencesLife SciencesSocial Sciences

This network shows the impact of papers produced by Junji Shikata. Nodes represent research fields, and links connect fields that are likely to share authors. Colored nodes show fields that tend to cite the papers produced by Junji Shikata. The network helps show where Junji Shikata may publish in the future.

Co-authorship network of co-authors of Junji Shikata

This figure shows the co-authorship network connecting the top 25 collaborators of Junji Shikata. A scholar is included among the top collaborators of Junji Shikata based on the total number of citations received by their joint publications. Widths of edges represent the number of papers authors have co-authored together. Node borders signify the number of papers an author published with Junji Shikata. Junji Shikata is excluded from the visualization to improve readability, since they are connected to all nodes in the network.

All Works

20 of 20 papers shown
1.
Ochiai, Hideki, et al.. (2025). Quantum Algorithms for the Physical Layer: Potential Applications to Physical Layer Security. IEEE Access. 13. 13988–14009.
2.
Ochiai, Hideki, et al.. (2025). Physical Layer Security for Integrated Sensing and Communication: A Survey. IEEE Open Journal of the Communications Society. 6. 6690–6743.
3.
Ochiai, Hideki, et al.. (2024). An Efficient Information Reconciliation Scheme via Partial Encoding for Physical Layer Secret Key Generation. IEEE Communications Letters. 28(6). 1263–1267. 1 indexed citations
4.
Minematsu, Kazuhiko, et al.. (2024). Lightweight Yet Nonce-Misuse Secure Authenticated Encryption for Very Short Inputs. IEEE Internet of Things Journal. 12(3). 2807–2824. 1 indexed citations
5.
Nakao, Koji, Katsunari Yoshioka, Takayuki Sasaki, et al.. (2023). Mitigate: Toward Comprehensive Research and Development for Analyzing and Combating IoT Malware. IEICE Transactions on Information and Systems. E106.D(9). 1302–1315. 2 indexed citations
6.
Ochiai, Hideki, et al.. (2023). A Data-Driven Analysis of Secret Key Rate for Physical Layer Secret Key Generation From Wireless Channels. IEEE Communications Letters. 27(12). 3166–3170. 2 indexed citations
7.
Yanai, Naoto, et al.. (2023). Designated Verifier Signature with Claimability. 21–32. 3 indexed citations
8.
Li, Yue, et al.. (2023). Exact Markov Chain of Random Propagation of Malware With Network-Level Mitigation. IEEE Internet of Things Journal. 10(12). 10933–10947. 8 indexed citations
9.
Minematsu, Kazuhiko, et al.. (2023). Anonymous Broadcast Authentication With One-to-Many Transmission to Control IoT Devices. IEEE Access. 11. 62955–62969. 1 indexed citations
10.
Hirose, Shoichi & Junji Shikata. (2023). Group-Testing Aggregate Entity Authentication. 227–231.
12.
Hirose, Shoichi & Junji Shikata. (2020). Aggregate Message Authentication Code Capable of Non-Adaptive Group-Testing. IEEE Access. 8. 216116–216126. 3 indexed citations
13.
Konno, Norio, et al.. (2018). Numerical and Non-Asymptotic Analysis of Elias’s and Peres’s Extractors with Finite Input Sequences. Entropy. 20(10). 729–729. 3 indexed citations
14.
Iwamoto, Mitsugu, Kazuo Ohta, & Junji Shikata. (2017). Security Formalizations and Their Relationships for Encryption and Key Agreement in Information-Theoretic Cryptography. IEEE Transactions on Information Theory. 64(1). 654–685. 13 indexed citations
15.
Matsumoto, Tsutomu, et al.. (2009). Electro Magnetic Analysis and Local Information of Cryptographic Hardware - part 2 -. IEICE Technical Report; IEICE Tech. Rep.. 109(200). 29–35. 3 indexed citations
16.
Shikata, Junji, et al.. (2005). On Shared Attribute Certification. IEICE Technical Report; IEICE Tech. Rep.. 105(194). 73–80. 2 indexed citations
17.
Yoshioka, Katsunari, Junji Shikata, & Tsutomu Matsumoto. (2004). Collusion Secure Codes : Systematic Security Definitions and Their Relations( Discrete Mathematics and Its Applications). IEICE Transactions on Fundamentals of Electronics Communications and Computer Sciences. 87(5). 1162–1171. 2 indexed citations
18.
Hanaoka, Goichiro, et al.. (2004). Information-theoretically Secure Key insulated encryption: Models, bounds and constructions. IEICE Transactions on Fundamentals of Electronics Communications and Computer Sciences. 87(10). 2521–2532. 1 indexed citations
19.
Shikata, Junji, Goichiro Hanaoka, Yuliang Zheng, Tsutomu Matsumoto, & Hideki Imai. (2004). Unconditionally secure authenticated encryption. IEICE Transactions on Fundamentals of Electronics Communications and Computer Sciences. 87(5). 1119–1131. 5 indexed citations
20.
Hanaoka, Goichiro, Junji Shikata, Yuliang Zheng, & Hideki Imai. (2004). Efficient Unconditionally Secure Digital Signatures. IEICE Transactions on Fundamentals of Electronics Communications and Computer Sciences. 87(1). 120–130. 2 indexed citations

Rankless uses publication and citation data sourced from OpenAlex, an open and comprehensive bibliographic database. While OpenAlex provides broad and valuable coverage of the global research landscape, it—like all bibliographic datasets—has inherent limitations. These include incomplete records, variations in author disambiguation, differences in journal indexing, and delays in data updates. As a result, some metrics and network relationships displayed in Rankless may not fully capture the entirety of a scholar's output or impact.

Explore authors with similar magnitude of impact

Rankless by CCL
2026