default search action
Tsuyoshi Takagi
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c169]Quan Yuan, Chao Sun, Tsuyoshi Takagi:
Revisiting the Security of Fiat-Shamir Signature Schemes Under Superposition Attacks. ACISP (2) 2024: 164-184 - [c168]Keyang Liu, Xingxin Li, Tsuyoshi Takagi:
Review the Cuckoo Hash-Based Unbalanced Private Set Union: Leakage, Fix, and Optimization. ESORICS (2) 2024: 331-352 - [c167]Shota Inoue, Yusuke Aikawa, Tsuyoshi Takagi:
A Faster Variant of CGL Hash Function via Efficient Backtracking Checks. ISC (2) 2024: 81-100 - [c166]Naoki Yoshiguchi, Yusuke Aikawa, Tsuyoshi Takagi:
Sieving Method for SDP with the Zero Window: An Improvement in Low Memory Environments. IWSEC 2024: 158-176 - [i63]Hiroki Okada, Tsuyoshi Takagi:
Simulation-Secure Threshold PKE from Standard (Ring-)LWE. IACR Cryptol. ePrint Arch. 2024: 239 (2024) - [i62]Kaisei Kajita, Go Ohtake, Tsuyoshi Takagi:
Generalized Adaptor Signature Scheme: From Two-Party to N-Party Settings. IACR Cryptol. ePrint Arch. 2024: 241 (2024) - [i61]Quan Yuan, Chao Sun, Tsuyoshi Takagi:
Revisiting the Security of Fiat-Shamir Signature Schemes under Superposition Attacks. IACR Cryptol. ePrint Arch. 2024: 590 (2024) - 2023
- [j121]Kohei Nakagawa, Hiroshi Onuki, Atsushi Takayasu, Tsuyoshi Takagi:
L1-norm ball for CSIDH: Optimal strategy for choosing the secret key space. Discret. Appl. Math. 328: 70-88 (2023) - [j120]Tomoki Moriya, Hiroshi Onuki, Tsuyoshi Takagi:
How to construct CSIDH on Edwards curves. Finite Fields Their Appl. 92: 102310 (2023) - [j119]Kaisei Kajita, Go Ohtake, Kazuto Ogawa, Koji Nuida, Tsuyoshi Takagi:
Short Lattice Signature Scheme with Tighter Reduction under Ring-SIS Assumption. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 106(3): 228-240 (2023) - [j118]Yasuhiko Ikematsu, Shuhei Nakamura, Tsuyoshi Takagi:
Recent progress in the security evaluation of multivariate public-key cryptography. IET Inf. Secur. 17(2): 210-226 (2023) - [j117]Saki Otsuki, Hiroshi Onuki, Tsuyoshi Takagi:
Improvement of the square-root Vélu's formulas for isogeny-based cryptography. JSIAM Lett. 15: 61-64 (2023) - [j116]Momonari Kudo, Tasuku Nakagawa, Tsuyoshi Takagi:
Efficient Search for Superspecial Hyperelliptic Curves of Genus Four with Automorphism Group Containing bfC6. Math. Comput. Sci. 17(3): 21 (2023) - [j115]Momonari Kudo, Tasuku Nakagawa, Tsuyoshi Takagi:
Correction to: Efficient Search for Superspecial Hyperelliptic Curves of Genus Four with Automorphism Group Containing bfC6. Math. Comput. Sci. 17(3): 23 (2023) - [c165]Naoto Kimura, Atsushi Takayasu, Tsuyoshi Takagi:
Memory-Efficient Quantum Information Set Decoding Algorithm. ACISP 2023: 452-468 - [c164]Hiroki Okada, Kazuhide Fukushima, Shinsaku Kiyomoto, Tsuyoshi Takagi:
Spherical Gaussian Leftover Hash Lemma via the Rényi Divergence. ACNS (1) 2023: 695-724 - [c163]Keyang Liu, Xingxin Li, Tsuyoshi Takagi:
Robust Property-Preserving Hash Meets Homomorphism. ISC 2023: 537-556 - [c162]Haiming Zhu, Shoichi Kamada, Momonari Kudo, Tsuyoshi Takagi:
Improved Hybrid Attack via Error-Splitting Method for Finding Quinary Short Lattice Vectors. IWSEC 2023: 117-136 - [c161]Hiroki Furue, Tsuyoshi Takagi:
Fast Enumeration Algorithm for Multivariate Polynomials over General Finite Fields. PQCrypto 2023: 357-378 - [i60]Hiroki Okada, Kazuhide Fukushima, Shinsaku Kiyomoto, Tsuyoshi Takagi:
Spherical Gaussian Leftover Hash Lemma via the Rényi Divergence. IACR Cryptol. ePrint Arch. 2023: 479 (2023) - [i59]Hiroki Furue, Tsuyoshi Takagi:
Fast Enumeration Algorithm for Multivariate Polynomials over General Finite Fields. IACR Cryptol. ePrint Arch. 2023: 619 (2023) - [i58]Tomoki Moriya, Hiroshi Onuki, Yusuke Aikawa, Tsuyoshi Takagi:
Lower bound of costs of formulas to compute image curves of 3-isogenies in the framework of generalized Montgomery coordinates. IACR Cryptol. ePrint Arch. 2023: 1511 (2023) - [i57]Kosuke Sakata, Tsuyoshi Takagi:
An Efficient Algorithm for Solving the MQ Problem using Hilbert Series. IACR Cryptol. ePrint Arch. 2023: 1650 (2023) - 2022
- [j114]Hiroki Okada, Atsushi Takayasu, Kazuhide Fukushima, Shinsaku Kiyomoto, Tsuyoshi Takagi:
Erratum: A Compact Digital Signature Scheme Based on the Module-LWR Problem [IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences Vol. E104.A (2021), No. 9 pp.1219-1234]. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 105-A(2): 130 (2022) - [j113]Xiaoling Yu, Yuntao Wang, Chungen Xu, Tsuyoshi Takagi:
Revisiting the Orthogonal Lattice Algorithm in Solving General Approximate Common Divisor Problem. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 105-A(3): 195-202 (2022) - [j112]Shu Takahashi, Hiroshi Onuki, Tsuyoshi Takagi:
Explicit construction of the square-root Vélu's formula on Edwards curves. JSIAM Lett. 14: 108-110 (2022) - [c160]Daichi Aoki, Kazuhiko Minematsu, Toshihiko Okamura, Tsuyoshi Takagi:
Efficient Word Size Modular Multiplication over Signed Integers. ARITH 2022: 94-101 - [c159]Taku Kato, Yutaro Kiyomura, Tsuyoshi Takagi:
Improving Fault Attacks on Rainbow with Fixing Random Vinegar Values. IWSEC 2022: 147-165 - [c158]Hiroki Furue, Yutaro Kiyomura, Tatsuya Nagasawa, Tsuyoshi Takagi:
A New Fault Attack on UOV Multivariate Signature Scheme. PQCrypto 2022: 124-143 - [i56]Tomoki Moriya, Hiroshi Onuki, Yusuke Aikawa, Tsuyoshi Takagi:
The Generalized Montgomery Coordinate: A New Computational Tool for Isogeny-based Cryptography. IACR Cryptol. ePrint Arch. 2022: 150 (2022) - [i55]Kaisei Kajita, Go Ohtake, Kazuto Ogawa, Koji Nuida, Tsuyoshi Takagi:
Short Lattice Signature Scheme with Tighter Reduction under Ring-SIS Assumption. IACR Cryptol. ePrint Arch. 2022: 479 (2022) - 2021
- [j111]Hiroki Okada, Atsushi Takayasu, Kazuhide Fukushima, Shinsaku Kiyomoto, Tsuyoshi Takagi:
A Compact Digital Signature Scheme Based on the Module-LWR Problem. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 104-A(9): 1219-1234 (2021) - [j110]Ye Yuan, Kazuhide Fukushima, Junting Xiao, Shinsaku Kiyomoto, Tsuyoshi Takagi:
Memory-constrained implementation of lattice-based encryption scheme on standard Java Card platform. IET Inf. Secur. 15(4): 267-281 (2021) - [j109]Yuntao Wang, Tsuyoshi Takagi:
Studying lattice reduction algorithms improved by quick reordering technique. Int. J. Inf. Sec. 20(2): 257-268 (2021) - [j108]Shuhei Nakamura, Yasuhiko Ikematsu, Yacheng Wang, Jintai Ding, Tsuyoshi Takagi:
New complexity estimation on the Rainbow-Band-Separation attack. Theor. Comput. Sci. 896: 1-18 (2021) - [c157]Hiroki Furue, Yasuhiko Ikematsu, Yutaro Kiyomura, Tsuyoshi Takagi:
A New Variant of Unbalanced Oil and Vinegar Using Quotient Ring: QR-UOV. ASIACRYPT (4) 2021: 187-217 - [c156]Shusaku Uemura, Kazuhide Fukushima, Shinsaku Kiyomoto, Momonari Kudo, Tsuyoshi Takagi:
Shortest Vectors in Lattices of Bai-Galbraith's Embedding Attack on the LWR Problem. IWSEC 2021: 23-41 - [c155]Changze Yin, Yacheng Wang, Tsuyoshi Takagi:
(Short Paper) Simple Matrix Signature Scheme. IWSEC 2021: 227-237 - [c154]Hiroki Furue, Shuhei Nakamura, Tsuyoshi Takagi:
Improving Thomae-Wolf Algorithm for Solving Underdetermined Multivariate Quadratic Polynomial Problem. PQCrypto 2021: 65-78 - [i54]Hiroki Okada, Atsushi Takayasu, Kazuhide Fukushima, Shinsaku Kiyomoto, Tsuyoshi Takagi:
A Compact Digital Signature Scheme Based on the Module-LWR problem. IACR Cryptol. ePrint Arch. 2021: 1699 (2021) - 2020
- [j107]Hiroki Okada, Atsushi Takayasu, Kazuhide Fukushima, Shinsaku Kiyomoto, Tsuyoshi Takagi:
On the Complexity of the LWR-Solving BKW Algorithm. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 103-A(1): 173-182 (2020) - [j106]Hiroshi Onuki, Yusuke Aikawa, Tsutomu Yamazaki, Tsuyoshi Takagi:
A Constant-Time Algorithm of CSIDH Keeping Two Points. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 103-A(10): 1174-1182 (2020) - [j105]Hiroki Furue, Dung Hoang Duong, Tsuyoshi Takagi:
An Efficient MQ-based Signature with Tight Security Proof. Int. J. Netw. Comput. 10(2): 308-324 (2020) - [c153]Satoshi Okada, Yuntao Wang, Tsuyoshi Takagi:
Improving Key Mismatch Attack on NewHope with Fewer Queries. ACISP 2020: 505-524 - [c152]Tomoki Moriya, Hiroshi Onuki, Tsuyoshi Takagi:
SiGamal: A Supersingular Isogeny-Based PKE and Its Application to a PRF. ASIACRYPT (2) 2020: 551-580 - [c151]Yuntao Wang, Yasuhiko Ikematsu, Koichiro Akiyama, Tsuyoshi Takagi:
Cryptanalysis of GiophantusTM Schemes against Hybrid Attack. APKC@AsiaCCS 2020: 28-35 - [c150]Tomoki Moriya, Hiroshi Onuki, Tsuyoshi Takagi:
How to Construct CSIDH on Edwards Curves. CT-RSA 2020: 512-537 - [c149]Hiroki Okada, Atsushi Takayasu, Kazuhide Fukushima, Shinsaku Kiyomoto, Tsuyoshi Takagi:
A Compact Digital Signature Scheme Based on the Module-LWR Problem. ICICS 2020: 73-90 - [c148]Tomoki Kawashima, Katsuyuki Takashima, Yusuke Aikawa, Tsuyoshi Takagi:
An Efficient Authenticated Key Exchange from Random Self-reducibility on CSIDH. ICISC 2020: 58-84 - [c147]Hiroshi Onuki, Yusuke Aikawa, Tsuyoshi Takagi:
The Existence of Cycles in the Supersingular Isogeny Graphs Used in SIKE. ISITA 2020: 358-362 - [c146]Hiroshi Onuki, Tsuyoshi Takagi:
On Collisions Related to an Ideal Class of Order 3 in CSIDH. IWSEC 2020: 131-148 - [c145]Hiroki Furue, Koha Kinjo, Yasuhiko Ikematsu, Yacheng Wang, Tsuyoshi Takagi:
A Structural Attack on Block-Anti-Circulant UOV at SAC 2019. PQCrypto 2020: 323-339 - [c144]Takanori Yasuda, Yacheng Wang, Tsuyoshi Takagi:
Multivariate Encryption Schemes Based on Polynomial Equations over Real Numbers. PQCrypto 2020: 402-421 - [c143]Kaisei Kajita, Kazuto Ogawa, Koji Nuida, Tsuyoshi Takagi:
Short Lattice Signatures in the Standard Model with Efficient Tag Generation. ProvSec 2020: 85-102 - [c142]Yacheng Wang, Yasuhiko Ikematsu, Shuhei Nakamura, Tsuyoshi Takagi:
Revisiting the Minrank Problem on Multivariate Cryptography. WISA 2020: 291-307 - [i53]Kohei Nakagawa, Hiroshi Onuki, Atsushi Takayasu, Tsuyoshi Takagi:
L1-Norm Ball for CSIDH: Optimal Strategy for Choosing the Secret Key Space. IACR Cryptol. ePrint Arch. 2020: 181 (2020) - [i52]Hiroshi Onuki, Yusuke Aikawa, Tsuyoshi Takagi:
The Existence of Cycles in the Supersingular Isogeny Graphs Used in SIKE. IACR Cryptol. ePrint Arch. 2020: 439 (2020) - [i51]Satoshi Okada, Yuntao Wang, Tsuyoshi Takagi:
Improving Key Mismatch Attack on NewHope with Fewer Queries. IACR Cryptol. ePrint Arch. 2020: 585 (2020) - [i50]Tomoki Moriya, Hiroshi Onuki, Tsuyoshi Takagi:
SiGamal: A supersingular isogeny-based PKE and its application to a PRF. IACR Cryptol. ePrint Arch. 2020: 613 (2020) - [i49]Shuhei Nakamura, Yasuhiko Ikematsu, Yacheng Wang, Jintai Ding, Tsuyoshi Takagi:
New Complexity Estimation on the Rainbow-Band-Separation Attack. IACR Cryptol. ePrint Arch. 2020: 703 (2020) - [i48]Tomoki Kawashima, Katsuyuki Takashima, Yusuke Aikawa, Tsuyoshi Takagi:
An Efficient Authenticated Key Exchange from Random Self-Reducibility on CSIDH. IACR Cryptol. ePrint Arch. 2020: 1178 (2020) - [i47]Hiroki Furue, Yasuhiko Ikematsu, Yutaro Kiyomura, Tsuyoshi Takagi:
A New Variant of Unbalanced Oil and Vinegar Using Quotient Ring: QR-UOV. IACR Cryptol. ePrint Arch. 2020: 1243 (2020)
2010 – 2019
- 2019
- [j104]Yacheng Wang, Yasuhiko Ikematsu, Dung Hoang Duong, Tsuyoshi Takagi:
The Secure Parameters and Efficient Decryption Algorithm for Multivariate Public Key Cryptosystem EFC. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 102-A(9): 1028-1036 (2019) - [j103]Kotaro Matsuda, Atsushi Takayasu, Tsuyoshi Takagi:
Explicit Relation between Low-Dimensional LLL-Reduced Bases and Shortest Vectors. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 102-A(9): 1091-1100 (2019) - [j102]Yasufumi Hashimoto, Yasuhiko Ikematsu, Tsuyoshi Takagi:
Chosen Message Attack on Multivariate Signature ELSA at Asiacrypt 2017. J. Inf. Process. 27: 517-524 (2019) - [j101]Chi Cheng, Yue Qin, Rongxing Lu, Tao Jiang, Tsuyoshi Takagi:
Batten Down the Hatches: Securing Neighborhood Area Networks of Smart Grid in the Quantum Era. IEEE Trans. Smart Grid 10(6): 6386-6395 (2019) - [c141]Jintai Ding, Xinwei Gao, Tsuyoshi Takagi, Yuntao Wang:
One Sample Ring-LWE with Rounding and Its Application to Key Exchange. ACNS 2019: 323-343 - [c140]Tomoki Moriya, Katsuyuki Takashima, Tsuyoshi Takagi:
Group Key Exchange from CSIDH and Its Application to Trusted Setup in Supersingular Isogeny Cryptosystems. Inscrypt 2019: 86-98 - [c139]Taiga Mizuide, Atsushi Takayasu, Tsuyoshi Takagi:
Tight Reductions for Diffie-Hellman Variants in the Algebraic Group Model. CT-RSA 2019: 169-188 - [c138]Hiroki Furue, Dung Hoang Duong, Tsuyoshi Takagi:
An Efficient MQ-Based Signature in the QROM. CANDAR 2019: 10-17 - [c137]Partha Sarathi Roy, Kirill Morozov, Kazuhide Fukushima, Shinsaku Kiyomoto, Tsuyoshi Takagi:
Security Analysis and Efficient Implementation of Code-based Signature Schemes. ICISSP 2019: 213-220 - [c136]Hiroshi Onuki, Yusuke Aikawa, Tsutomu Yamazaki, Tsuyoshi Takagi:
(Short Paper) A Faster Constant-Time Algorithm of CSIDH Keeping Two Points. IWSEC 2019: 23-33 - [i46]Hiroshi Onuki, Yusuke Aikawa, Tsutomu Yamazaki, Tsuyoshi Takagi:
A Faster Constant-time Algorithm of CSIDH keeping Two Torsion Points. IACR Cryptol. ePrint Arch. 2019: 353 (2019) - [i45]Tomoki Moriya, Hiroshi Onuki, Tsuyoshi Takagi:
How to Construct CSIDH on Edwards Curves. IACR Cryptol. ePrint Arch. 2019: 843 (2019) - [i44]Jintai Ding, Seungki Kim, Tsuyoshi Takagi, Yuntao Wang:
LLL and stochastic sandpile models. IACR Cryptol. ePrint Arch. 2019: 1009 (2019) - [i43]Hiroshi Onuki, Tsuyoshi Takagi:
On collisions related to an ideal class of order 3 in CSIDH. IACR Cryptol. ePrint Arch. 2019: 1209 (2019) - 2018
- [j100]Tsuyoshi Takagi:
Recent Developments in Post-Quantum Cryptography. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 101-A(1): 3-11 (2018) - [j99]Yasuhiko Ikematsu, Dung Hoang Duong, Albrecht Petzoldt, Tsuyoshi Takagi:
An Efficient Key Generation of ZHFE Public Key Cryptosystem. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 101-A(1): 29-38 (2018) - [j98]Yuntao Wang, Yoshinori Aono, Tsuyoshi Takagi:
Hardness Evaluation for Search LWE Problem Using Progressive BKZ Simulator. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 101-A(12): 2162-2170 (2018) - [j97]Ye Yuan, Junting Xiao, Kazuhide Fukushima, Shinsaku Kiyomoto, Tsuyoshi Takagi:
Portable Implementation of Postquantum Encryption Schemes and Key Exchange Protocols on JavaScript-Enabled Platforms. Secur. Commun. Networks 2018: 9846168:1-9846168:14 (2018) - [c135]Yacheng Wang, Yasuhiko Ikematsu, Dung Hoang Duong, Tsuyoshi Takagi:
Efficient Decryption Algorithms for Extension Field Cancellation Type Encryption Schemes. ACISP 2018: 487-501 - [c134]Yuntao Wang, Tsuyoshi Takagi:
Improving the BKZ Reduction Algorithm by Quick Reordering Technique. ACISP 2018: 787-795 - [c133]Hiroki Okada, Atsushi Takayasu, Kazuhide Fukushima, Shinsaku Kiyomoto, Tsuyoshi Takagi:
On the Complexity of the LWR-Solving BKW Algorithm. ICISC 2018: 196-214 - [c132]Yasuhiko Ikematsu, Koichiro Akiyama, Tsuyoshi Takagi:
An Improvement on the Linear Algebraic Attack for the Indeterminate Equation Encryption Scheme. ISITA 2018: 389-393 - [c131]Yasufumi Hashimoto, Yasuhiko Ikematsu, Tsuyoshi Takagi:
Chosen Message Attack on Multivariate Signature ELSA at Asiacrypt 2017. IWSEC 2018: 3-18 - [c130]Weiyao Wang, Yuntao Wang, Atsushi Takayasu, Tsuyoshi Takagi:
Estimated Cost for Solving Generalized Learning with Errors Problem via Embedding Techniques. IWSEC 2018: 87-103 - [c129]Yasuhiko Ikematsu, Ray A. Perlner, Daniel Smith-Tone, Tsuyoshi Takagi, Jeremy Vates:
HFERP - A New Multivariate Encryption Scheme. PQCrypto 2018: 396-416 - [e13]Fagen Li, Tsuyoshi Takagi, Chunxiang Xu, Xiaosong Zhang:
Frontiers in Cyber Security - First International Conference, FCS 2018, Chengdu, China, November 5-7, 2018, Proceedings. Communications in Computer and Information Science 879, Springer 2018, ISBN 978-981-13-3094-0 [contents] - [i42]Jintai Ding, Seungki Kim, Tsuyoshi Takagi, Yuntao Wang:
Why 1.02? The root Hermite factor of LLL and stochastic sandpile models. CoRR abs/1804.03285 (2018) - [i41]Yasufumi Hashimoto, Yasuhiko Ikematsu, Tsuyoshi Takagi:
Chosen Message Attack on Multivariate Signature ELSA at Asiacrypt 2017. IACR Cryptol. ePrint Arch. 2018: 310 (2018) - [i40]Taiga Mizuide, Atsushi Takayasu, Tsuyoshi Takagi:
Tight Reductions for Diffie-Hellman Variants in the Algebraic Group Model. IACR Cryptol. ePrint Arch. 2018: 1220 (2018) - [i39]Ye Yuan, Kazuhide Fukushima, Junting Xiao, Shinsaku Kiyomoto, Tsuyoshi Takagi:
Memory-Constrained Implementation of Lattice-based Encryption Scheme on the Standard Java Card Platform. IACR Cryptol. ePrint Arch. 2018: 1238 (2018) - 2017
- [j96]Chi Cheng, Rongxing Lu, Albrecht Petzoldt, Tsuyoshi Takagi:
Securing the Internet of Things in a Quantum World. IEEE Commun. Mag. 55(2): 116-120 (2017) - [j95]Rui Xu, Kirill Morozov, Yanjiang Yang, Jianying Zhou, Tsuyoshi Takagi:
Efficient outsourcing of secure k-nearest neighbour query over encrypted database. Comput. Secur. 69: 65-83 (2017) - [j94]Rui Xu, Kirill Morozov, Tsuyoshi Takagi:
Secret Sharing with Cheaters Using Multi-Receiver Authentication. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 100-A(1): 115-125 (2017) - [j93]Hyungrok Jo, Christophe Petit, Tsuyoshi Takagi:
Full Cryptanalysis of Hash Functions Based on Cubic Ramanujan Graphs. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 100-A(9): 1891-1899 (2017) - [j92]Dung Hoang Duong, Albrecht Petzoldt, Tsuyoshi Takagi:
CyclicSRP - A Multivariate Encryption Scheme with a Partially Cyclic Public Key. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 100-A(12): 2691-2698 (2017) - [j91]Hikari Tachibana, Katsuyuki Takashima, Tsuyoshi Takagi:
Constructing an efficient hash function from $3$-isogenies. JSIAM Lett. 9: 29-32 (2017) - [c128]Yutaro Kiyomura, Akiko Inoue, Yuto Kawahara, Masaya Yasuda, Tsuyoshi Takagi, Tetsutaro Kobayashi:
Secure and Efficient Pairing at 256-Bit Security Level. ACNS 2017: 59-79 - [c127]Rui Xu, Sze Ling Yeo, Kazuhide Fukushima, Tsuyoshi Takagi, Hwajung Seo, Shinsaku Kiyomoto, Matt Henricksen:
An Experimental Study of the BDD Approach for the Search LWE Problem. ACNS 2017: 253-272 - [c126]Yasuhiko Ikematsu, Dung Hoang Duong, Albrecht Petzoldt, Tsuyoshi Takagi:
Revisiting the Efficient Key Generation of ZHFE. C2SI 2017: 195-212 - [c125]Ye Yuan, Kazuhide Fukushima, Shinsaku Kiyomoto, Tsuyoshi Takagi:
Memory-constrained implementation of lattice-based encryption scheme on standard Java Card. HOST 2017: 47-50 - [c124]Yuntao Wang, Yoshinori Aono, Tsuyoshi Takagi:
An Experimental Study of Kannan's Embedding Technique for the Search LWE Problem. ICICS 2017: 541-553 - [c123]Dung Hoang Duong, Masaya Yasuda, Tsuyoshi Takagi:
Choosing Parameters for the Subfield Lattice Attack Against Overstretched NTRU. ISC 2017: 79-91 - [c122]Saed Alsayigh, Jintai Ding, Tsuyoshi Takagi, Yuntao Wang:
The Beauty and the Beasts - The Hard Cases in LLL Reduction. IWSEC 2017: 19-35 - [c121]Koichiro Akiyama, Yasuhiro Goto, Shinya Okumura, Tsuyoshi Takagi, Koji Nuida, Goichiro Hanaoka:
A Public-Key Encryption Scheme Based on Non-linear Indeterminate Equations. SAC 2017: 215-234 - [p1]Tsuyoshi Takagi:
Introduction to CREST Crypto-Math Project. CREST Crypto-Math Project 2017: 1-14 - [e12]Tsuyoshi Takagi, Masato Wakayama, Keisuke Tanaka, Noboru Kunihiro, Kazufumi Kimoto, Dung Hoang Duong:
Mathematical Modelling for Next-Generation Cryptography: CREST Crypto-Math Project. Mathematics for Industry, Springer Singapore 2017, ISBN 978-981-10-5064-0 [contents] - [e11]Tsuyoshi Takagi, Thomas Peyrin:
Advances in Cryptology - ASIACRYPT 2017 - 23rd International Conference on the Theory and Applications of Cryptology and Information Security, Hong Kong, China, December 3-7, 2017, Proceedings, Part I. Lecture Notes in Computer Science 10624, Springer 2017, ISBN 978-3-319-70693-1 [contents] - [e10]Tsuyoshi Takagi, Thomas Peyrin:
Advances in Cryptology - ASIACRYPT 2017 - 23rd International Conference on the Theory and Applications of Cryptology and Information Security, Hong Kong, China, December 3-7, 2017, Proceedings, Part II. Lecture Notes in Computer Science 10625, Springer 2017, ISBN 978-3-319-70696-2 [contents] - [e9]Tsuyoshi Takagi, Thomas Peyrin:
Advances in Cryptology - ASIACRYPT 2017 - 23rd International Conference on the Theory and Applications of Cryptology and Information Security, Hong Kong, China, December 3-7, 2017, Proceedings, Part III. Lecture Notes in Computer Science 10626, Springer 2017, ISBN 978-3-319-70699-3 [contents] - [e8]Tanja Lange, Tsuyoshi Takagi:
Post-Quantum Cryptography - 8th International Workshop, PQCrypto 2017, Utrecht, The Netherlands, June 26-28, 2017, Proceedings. Lecture Notes in Computer Science 10346, Springer 2017, ISBN 978-3-319-59878-9 [contents] - [i38]Dung Hoang Duong, Masaya Yasuda, Tsuyoshi Takagi:
Choosing Parameters for the Subfield Lattice Attack against overstretched NTRU. IACR Cryptol. ePrint Arch. 2017: 959 (2017) - [i37]Koichiro Akiyama, Yasuhiro Goto, Shinya Okumura, Tsuyoshi Takagi, Koji Nuida, Goichiro Hanaoka, Hideo Shimizu, Yasuhiko Ikematsu:
A Public-key Encryption Scheme Based on Non-linear Indeterminate Equations (Giophantus). IACR Cryptol. ePrint Arch. 2017: 1241 (2017) - 2016
- [j90]Keisuke Hakuta, Hisayoshi Sato, Tsuyoshi Takagi:
On tameness of Matsumoto-Imai central maps in three variables over the finite field 픽2. Adv. Math. Commun. 10(2): 221-228 (2016) - [j89]Ye Yuan, Chen-Mou Cheng, Shinsaku Kiyomoto, Yutaka Miyake, Tsuyoshi Takagi:
Portable Implementation of Lattice-based Cryptography using JavaScript. Int. J. Netw. Comput. 6(2): 309-327 (2016) - [j88]Youwen Zhu, Zhiqiu Huang, Tsuyoshi Takagi:
Secure and controllable k-NN query over encrypted cloud data with key confidentiality. J. Parallel Distributed Comput. 89: 1-12 (2016) - [j87]Shaoquan Jiang, Tsuyoshi Takagi, Guilin Wang:
Special issue on provable security. Secur. Commun. Networks 9(12): 1635-1637 (2016) - [j86]Zhenhua Liu, Xiangsong Zhang, Yupu Hu, Tsuyoshi Takagi:
Revocable and strongly unforgeable identity-based signature scheme in the standard model. Secur. Commun. Networks 9(14): 2422-2433 (2016) - [j85]Chi Cheng, Jemin Lee, Tao Jiang, Tsuyoshi Takagi:
Security Analysis and Improvements on Two Homomorphic Authentication Schemes for Network Coding. IEEE Trans. Inf. Forensics Secur. 11(5): 993-1002 (2016) - [j84]Fagen Li, Di Zhong, Tsuyoshi Takagi:
Efficient Deniably Authenticated Encryption and Its Application to E-Mail. IEEE Trans. Inf. Forensics Secur. 11(11): 2477-2486 (2016) - [c120]Rui Xu, Kirill Morozov, Yanjiang Yang, Jianying Zhou, Tsuyoshi Takagi:
Privacy-Preserving k-Nearest Neighbour Query on Outsourced Database. ACISP (1) 2016: 181-197 - [c119]Dung Hoang Duong, Albrecht Petzoldt, Tsuyoshi Takagi:
Reducing the Key Size of the SRP Encryption Scheme. ACISP (2) 2016: 427-434 - [c118]Tsuyoshi Takagi, Hwajung Seo, Toshikatsu Sakai, Hiroshi Ohtake, Mamoru Furuta:
Image Sensor with Organic Photoconductive Films by Stacking Red/Green and Blue Components. IMSE 2016: 1-4 - [c117]Yoshinori Aono, Yuntao Wang, Takuya Hayashi, Tsuyoshi Takagi:
Improved Progressive BKZ Algorithms and Their Precise Cost Estimation by Sharp Simulator. EUROCRYPT (1) 2016: 789-819 - [c116]Shinya Okumura, Koichiro Akiyama, Tsuyoshi Takagi:
An Estimate of the Complexity of the Section Finding Problem on Algebraic Surfaces. CANDAR 2016: 28-36 - [c115]Dung Hoang Duong, Albrecht Petzoldt, Yacheng Wang, Tsuyoshi Takagi:
Revisiting the Cubic UOV Signature Scheme. ICISC 2016: 223-238 - [c114]Jintai Ding, Momonari Kudo, Shinya Okumura, Tsuyoshi Takagi, Chengdong Tao:
Cryptanalysis of a Public Key Cryptosystem Based on Diophantine Equations via Weighted LLL Reduction. IWSEC 2016: 305-315 - [e7]Jung Hee Cheon, Tsuyoshi Takagi:
Advances in Cryptology - ASIACRYPT 2016 - 22nd International Conference on the Theory and Application of Cryptology and Information Security, Hanoi, Vietnam, December 4-8, 2016, Proceedings, Part I. Lecture Notes in Computer Science 10031, 2016, ISBN 978-3-662-53886-9 [contents] - [e6]Jung Hee Cheon, Tsuyoshi Takagi:
Advances in Cryptology - ASIACRYPT 2016 - 22nd International Conference on the Theory and Application of Cryptology and Information Security, Hanoi, Vietnam, December 4-8, 2016, Proceedings, Part II. Lecture Notes in Computer Science 10032, 2016, ISBN 978-3-662-53889-0 [contents] - [e5]Tsuyoshi Takagi:
Post-Quantum Cryptography - 7th International Workshop, PQCrypto 2016, Fukuoka, Japan, February 24-26, 2016, Proceedings. Lecture Notes in Computer Science 9606, Springer 2016, ISBN 978-3-319-29359-2 [contents] - [i36]Yoshinori Aono, Yuntao Wang, Takuya Hayashi, Tsuyoshi Takagi:
Improved Progressive BKZ Algorithms and their Precise Cost Estimation by Sharp Simulator. IACR Cryptol. ePrint Arch. 2016: 146 (2016) - [i35]Dung Hoang Duong, Albrecht Petzoldt, Tsuyoshi Takagi:
Reducing the Key Size of the SRP Encryption Scheme - Extended version. IACR Cryptol. ePrint Arch. 2016: 383 (2016) - [i34]Yasuhiko Ikematsu, Dung Hoang Duong, Albrecht Petzoldt, Tsuyoshi Takagi:
Revisiting the Efficient Key Generation of ZHFE. IACR Cryptol. ePrint Arch. 2016: 1065 (2016) - [i33]Dung Hoang Duong, Albrecht Petzoldt, Yacheng Wang, Tsuyoshi Takagi:
Revisiting the Cubic UOV Signature Scheme. IACR Cryptol. ePrint Arch. 2016: 1079 (2016) - 2015
- [j83]Takanori Yasuda, Xavier Dahan, Yun-Ju Huang, Tsuyoshi Takagi, Kouichi Sakurai:
A multivariate quadratic challenge toward post-quantum generation cryptography. ACM Commun. Comput. Algebra 49(3): 105-107 (2015) - [j82]Mingwu Zhang, Chunzhi Wang, Tsuyoshi Takagi, Yi Mu:
Functional Encryption Resilient to Hard-to-Invert Leakage. Comput. J. 58(4): 735-749 (2015) - [j81]Rui Xu, Kirill Morozov, Tsuyoshi Takagi:
Note on Some Recent Cheater Identifiable Secret Sharing Schemes. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 98-A(8): 1814-1819 (2015) - [j80]Rong Hu, Kirill Morozov, Tsuyoshi Takagi:
Zero-Knowledge Protocols for Code-Based Public-Key Encryption. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 98-A(10): 2139-2151 (2015) - [j79]Youwen Zhu, Tsuyoshi Takagi:
Efficient scalar product protocol and its privacy-preserving application. Int. J. Electron. Secur. Digit. Forensics 7(1): 1-19 (2015) - [j78]Xiangsong Zhang, Zhenhua Liu, Yupu Hu, Tsuyoshi Takagi:
Revocable Identity-based Signcryption Scheme Without Random Oracles. Int. J. Netw. Secur. 17(2): 110-122 (2015) - [j77]Youwen Zhu, Zhiqiu Huang, Liusheng Huang, Tsuyoshi Takagi:
On the Security of A Privacy-Preserving Product Calculation Scheme. IEEE Trans. Dependable Secur. Comput. 12(3): 373-374 (2015) - [c113]Ye Yuan, Chen-Mou Cheng, Shinsaku Kiyomoto, Yutaka Miyake, Tsuyoshi Takagi:
Portable Implementation of Lattice-Based Cryptography Using JavaScript. CANDAR 2015: 58-67 - [c112]Takanori Yasuda, Tsuyoshi Takagi, Kouichi Sakurai:
Constructing Pairing-Friendly Elliptic Curves Using Global Number Fields. CANDAR 2015: 477-483 - [i32]Takanori Yasuda, Xavier Dahan, Yun-Ju Huang, Tsuyoshi Takagi, Kouichi Sakurai:
MQ Challenge: Hardness Evaluation of Solving Multivariate Quadratic Problems. IACR Cryptol. ePrint Arch. 2015: 275 (2015) - [i31]Yun-Ju Huang, Christophe Petit, Naoyuki Shinohara, Tsuyoshi Takagi:
On Generalized First Fall Degree Assumptions. IACR Cryptol. ePrint Arch. 2015: 358 (2015) - [i30]Shinya Okumura, Shingo Sugiyama, Masaya Yasuda, Tsuyoshi Takagi:
Security Analysis of Cryptosystems Using Short Generators over Ideal Lattices. IACR Cryptol. ePrint Arch. 2015: 1004 (2015) - [i29]Kenichiro Hayasaka, Kazumaro Aoki, Tetsutaro Kobayashi, Tsuyoshi Takagi:
A construction of 3-dimensional lattice sieve for number field sieve over F_{p^n}. IACR Cryptol. ePrint Arch. 2015: 1179 (2015) - [i28]Jintai Ding, Momonari Kudo, Shinya Okumura, Tsuyoshi Takagi, Chengdong Tao:
Cryptanalysis of a public key cryptosystem based on Diophantine equations via weighted LLL reduction. IACR Cryptol. ePrint Arch. 2015: 1229 (2015) - 2014
- [j76]Naoyuki Shinohara, Takeshi Shimoyama, Takuya Hayashi, Tsuyoshi Takagi:
Key Length Estimation of Pairing-Based Cryptosystems Using ηT Pairing over GF(3n). IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 97-A(1): 236-244 (2014) - [j75]Takanori Yasuda, Tsuyoshi Takagi, Kouichi Sakurai:
Security of Multivariate Signature Scheme Using Non-commutative Rings. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 97-A(1): 245-252 (2014) - [j74]Youwen Zhu, Tsuyoshi Takagi:
Efficient Privacy-Preserving Reputation Evaluation in Decentralized Environments. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 97-A(1): 409-412 (2014) - [j73]Youwen Zhu, Tsuyoshi Takagi, Rong Hu:
Security Analysis of Collusion-Resistant Nearest Neighbor Query Scheme on Encrypted Cloud Data. IEICE Trans. Inf. Syst. 97-D(2): 326-330 (2014) - [j72]Hiroyuki Miura, Yasufumi Hashimoto, Tsuyoshi Takagi:
Extended Algorithm for Solving Underdefined Multivariate Quadratic Equations. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 97-A(6): 1418-1425 (2014) - [j71]Hui Zhang, Tsuyoshi Takagi:
Improved Attacks on Multi-Prime RSA with Small Prime Difference. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 97-A(7): 1533-1541 (2014) - [j70]Yutaro Kiyomura, Tsuyoshi Takagi:
Efficient Algorithm for Tate Pairing of Composite Order. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 97-A(10): 2055-2063 (2014) - [j69]Mingwu Zhang, Takashi Nishide, Bo Yang, Tsuyoshi Takagi:
Anonymous encryption with partial-order subset delegation and its application in privacy email systems. IET Inf. Secur. 8(4): 240-249 (2014) - [j68]Mingwu Zhang, Chunzhi Wang, Bo Yang, Tsuyoshi Takagi:
Fully secure constructions of spatial encryption with vector privacy. Int. J. Commun. Syst. 27(12): 4307-4327 (2014) - [j67]Mingwu Zhang, Bo Yang, Tsuyoshi Takagi:
Anonymous spatial encryption under affine space delegation functionality with full security. Inf. Sci. 277: 715-730 (2014) - [j66]Takanori Yasuda, Tsuyoshi Takagi, Kouichi Sakurai:
Efficient variant of Rainbow using sparse secret keys. J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 5(3): 3-13 (2014) - [j65]Takumi Tomita, Tsuyoshi Takagi:
Efficient system parameters for Identity-Based Encryption using supersingular elliptic curves. JSIAM Lett. 6: 13-16 (2014) - [j64]Kenichiro Hayasaka, Kazumaro Aoki, Tetsutaro Kobayashi, Tsuyoshi Takagi:
An experiment of number field sieve for discrete logarithm problem over $\text{GF}(p^n)$. JSIAM Lett. 6: 53-56 (2014) - [j63]Yutaro Kiyomura, Noriyasu Iwamoto, Shun'ichi Yokoyama, Kenichiro Hayasaka, Yuntao Wang, Takanori Yasuda, Katsuyuki Takashima, Tsuyoshi Takagi:
Heuristic counting of Kachisa-Schaefer-Scott curves. JSIAM Lett. 6: 73-76 (2014) - [j62]Chunhua Su, Jianying Zhou, Feng Bao, Tsuyoshi Takagi, Kouichi Sakurai:
Collaborative agglomerative document clustering with limited information disclosure. Secur. Commun. Networks 7(6): 964-978 (2014) - [j61]Mingwu Zhang, Bo Yang, Chunzhi Wang, Tsuyoshi Takagi:
Unbounded anonymous hierarchical IBE with continual-key-leakage tolerance. Secur. Commun. Networks 7(11): 1974-1987 (2014) - [c111]Takanori Yasuda, Tsuyoshi Takagi, Kouichi Sakurai:
Efficient Variant of Rainbow without Triangular Matrix Representation. ICT-EurAsia 2014: 532-541 - [c110]Rui Xu, Kirill Morozov, Tsuyoshi Takagi:
Cheater Identifiable Secret Sharing Schemes via Multi-Receiver Authentication. IWSEC 2014: 72-87 - [c109]Tsukasa Ishiguro, Shinsaku Kiyomoto, Yutaka Miyake, Tsuyoshi Takagi:
Parallel Gauss Sieve Algorithm: Solving the SVP Challenge over a 128-Dimensional Ideal Lattice. Public Key Cryptography 2014: 411-428 - [c108]Chen-Mou Cheng, Yasufumi Hashimoto, Hiroyuki Miura, Tsuyoshi Takagi:
A Polynomial-Time Algorithm for Solving a Class of Underdetermined Multivariate Quadratic Equations over Fields of Odd Characteristics. PQCrypto 2014: 40-58 - [i27]Keisuke Hakuta, Hisayoshi Sato, Tsuyoshi Takagi:
Some properties of $τ$-adic expansions on hyperelliptic Koblitz curves. CoRR abs/1402.1865 (2014) - 2013
- [j60]Mingwu Zhang, Bo Yang, Tsuyoshi Takagi:
Bounded Leakage-Resilient Functional Encryption with Hidden Vector Predicate. Comput. J. 56(4): 464-477 (2013) - [j59]Fagen Li, Fahad Bin Muhaya, Muhammad Khurram Khan, Tsuyoshi Takagi:
Lattice-based signcryption. Concurr. Comput. Pract. Exp. 25(14): 2112-2122 (2013) - [j58]Yasufumi Hashimoto, Tsuyoshi Takagi, Kouichi Sakurai:
General Fault Attacks on Multivariate Public Key Cryptosystems. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 96-A(1): 196-205 (2013) - [j57]Youwen Zhu, Rui Xu, Tsuyoshi Takagi:
Secure k-NN query on encrypted cloud database without key-sharing. Int. J. Electron. Secur. Digit. Forensics 5(3/4): 201-217 (2013) - [j56]Mingwu Zhang, Jintao Yao, Chunzhi Wang, Tsuyoshi Takagi:
Public Key Replacement and Universal Forgery of a SCLS Scheme. Int. J. Netw. Secur. 15(2): 133-138 (2013) - [j55]Fagen Li, Masaaki Shirase, Tsuyoshi Takagi:
Certificateless hybrid signcryption. Math. Comput. Model. 57(3-4): 324-343 (2013) - [j54]Fagen Li, Tsuyoshi Takagi:
Secure identity-based signcryption in the standard model. Math. Comput. Model. 57(11-12): 2685-2694 (2013) - [j53]Fagen Li, Mingwu Zhang, Tsuyoshi Takagi:
Identity-based partially blind signature in the standard model for electronic cash. Math. Comput. Model. 58(1-2): 196-203 (2013) - [j52]Mingwu Zhang, Bo Yang, Zhenhua Chen, Tsuyoshi Takagi:
Efficient and adaptively secure broadcast encryption systems. Secur. Commun. Networks 6(8): 1044-1052 (2013) - [j51]Mingwu Zhang, Tsuyoshi Takagi:
Efficient Constructions of Anonymous Multireceiver Encryption Protocol and Their Deployment in Group E-mail Systems With Privacy Preservation. IEEE Syst. J. 7(3): 410-419 (2013) - [j50]Fagen Li, Hui Zhang, Tsuyoshi Takagi:
Efficient Signcryption for Heterogeneous Systems. IEEE Syst. J. 7(3): 420-429 (2013) - [j49]Fagen Li, Tsuyoshi Takagi:
Cryptanalysis and Improvement of Robust Deniable Authentication Protocol. Wirel. Pers. Commun. 69(4): 1391-1398 (2013) - [c107]Hui Zhang, Tsuyoshi Takagi:
Attacks on Multi-Prime RSA with Small Prime Difference. ACISP 2013: 41-56 - [c106]Rong Hu, Kirill Morozov, Tsuyoshi Takagi:
On Zero-Knowledge Identification Based on Q-ary Syndrome Decoding. AsiaJCIS 2013: 12-18 - [c105]Kenichiro Hayasaka, Kazumaro Aoki, Tetsutaro Kobayashi, Tsuyoshi Takagi:
An Experiment of Number Field Sieve for Discrete Logarithm Problem over GF(p 12). Number Theory and Cryptography 2013: 108-120 - [c104]Youwen Zhu, Rui Xu, Tsuyoshi Takagi:
Secure k-NN computation on encrypted cloud data without sharing key with query users. SCC@ASIACCS 2013: 55-60 - [c103]Takanori Yasuda, Jintai Ding, Tsuyoshi Takagi, Kouichi Sakurai:
A variant of rainbow with shorter secret key and faster signature generation. AsiaPKC@AsiaCCS 2013: 57-62 - [c102]Rong Hu, Kirill Morozov, Tsuyoshi Takagi:
Proof of plaintext knowledge for code-based public-key encryption revisited. AsiaCCS 2013: 535-540 - [c101]Zhenhua Liu, Xiangsong Zhang, Tsuyoshi Takagi:
Post-quantum Strongly Unforgeable Identity-Based Signature Scheme from Lattices without Random Oracles. INCoS 2013: 578-585 - [c100]Yun-Ju Huang, Christophe Petit, Naoyuki Shinohara, Tsuyoshi Takagi:
Improvement of Faugère et al.'s Method to Solve ECDLP. IWSEC 2013: 115-132 - [c99]Yutaro Kiyomura, Tsuyoshi Takagi:
Efficient Algorithm for Tate Pairing of Composite Order. IWSEC 2013: 201-216 - [c98]Rui Xu, Kirill Morozov, Tsuyoshi Takagi:
On Cheater Identifiable Secret Sharing Schemes Secure against Rushing Adversary. IWSEC 2013: 258-271 - [c97]Hiroyuki Miura, Yasufumi Hashimoto, Tsuyoshi Takagi:
Extended Algorithm for Solving Underdefined Multivariate Quadratic Equations. PQCrypto 2013: 118-135 - [c96]Takanori Yasuda, Tsuyoshi Takagi, Kouichi Sakurai:
Multivariate Signature Scheme Using Quadratic Forms. PQCrypto 2013: 243-258 - [i26]Tsukasa Ishiguro, Shinsaku Kiyomoto, Yutaka Miyake, Tsuyoshi Takagi:
Parallel Gauss Sieve Algorithm: Solving the SVP in the Ideal Lattice of 128 dimensions. IACR Cryptol. ePrint Arch. 2013: 388 (2013) - 2012
- [j48]Fagen Li, Yongjian Liao, Zhiguang Qin, Tsuyoshi Takagi:
Further improvement of an identity-based signcryption scheme in the standard model. Comput. Electr. Eng. 38(2): 413-421 (2012) - [j47]Fagen Li, Mingwu Zhang, Tsuyoshi Takagi:
Efficient signcryption in the standard model. Concurr. Comput. Pract. Exp. 24(17): 1977-1989 (2012) - [j46]Takuya Hayashi, Naoyuki Shinohara, Lihua Wang, Shin'ichiro Matsuo, Masaaki Shirase, Tsuyoshi Takagi:
Solving a 676-Bit Discrete Logarithm Problem in GF(36n). IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 95-A(1): 204-212 (2012) - [j45]Mingwu Zhang, Tsuyoshi Takagi, Bo Yang, Fagen Li:
Cryptanalysis of Strong Designated Verifier Signature Scheme with Non-delegatability and Non-transferability. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 95-A(1): 259-262 (2012) - [j44]Mingwu Zhang, Fagen Li, Tsuyoshi Takagi:
Analysis and Improvement of a Secret Broadcast with Binding Encryption in Broadcasting Networks. IEICE Trans. Inf. Syst. 95-D(2): 686-689 (2012) - [j43]Youwen Zhu, Liusheng Huang, Tsuyoshi Takagi, Mingwu Zhang:
Privacy-Preserving OLAP for Accurate Answer. J. Circuits Syst. Comput. 21(1) (2012) - [j42]Fagen Li, Muhammad Khurram Khan, Khaled Alghathbar, Tsuyoshi Takagi:
Identity-based online/offline signcryption for low power devices. J. Netw. Comput. Appl. 35(1): 340-347 (2012) - [j41]Hui Zhang, Tsuyoshi Takagi:
An exhaustive search method to find all small solutions of a multivariate modular linear equation. JSIAM Lett. 4: 37-40 (2012) - [j40]Mingwu Zhang, Bo Yang, Tsuyoshi Takagi:
Reconciling and improving of multi-receiver signcryption protocols with threshold decryption. Secur. Commun. Networks 5(12): 1430-1440 (2012) - [j39]Fagen Li, Di Zhong, Tsuyoshi Takagi:
Practical Identity-Based Signature for Wireless Sensor Networks. IEEE Wirel. Commun. Lett. 1(6): 637-640 (2012) - [c95]Kirill Morozov, Tsuyoshi Takagi:
Zero-Knowledge Protocols for the McEliece Encryption. ACISP 2012: 180-193 - [c94]Takuya Hayashi, Takeshi Shimoyama, Naoyuki Shinohara, Tsuyoshi Takagi:
Breaking Pairing-Based Cryptosystems Using η T Pairing over GF(397). ASIACRYPT 2012: 43-60 - [c93]Takanori Yasuda, Kouichi Sakurai, Tsuyoshi Takagi:
Reducing the Key Size of Rainbow Using Non-commutative Rings. CT-RSA 2012: 68-83 - [c92]Keisuke Hakuta, Yosuke Katoh, Hisayoshi Sato, Tsuyoshi Takagi:
Batch Verification Suitable for Efficiently Verifying a Limited Number of Signatures. ICISC 2012: 425-440 - [c91]Naoyuki Shinohara, Takeshi Shimoyama, Takuya Hayashi, Tsuyoshi Takagi:
Key Length Estimation of Pairing-Based Cryptosystems Using η T Pairing. ISPEC 2012: 228-244 - [c90]Takanori Yasuda, Tsuyoshi Takagi, Kouichi Sakurai:
Application of Scalar Multiplication of Edwards Curves to Pairing-Based Cryptography. IWSEC 2012: 19-36 - [c89]Youwen Zhu, Tsuyoshi Takagi, Liusheng Huang:
Efficient Secure Primitive for Privacy Preserving Distributed Computations. IWSEC 2012: 233-243 - [e4]Tsuyoshi Takagi, Guilin Wang, Zhiguang Qin, Shaoquan Jiang, Yong Yu:
Provable Security - 6th International Conference, ProvSec 2012, Chengdu, China, September 26-28, 2012. Proceedings. Lecture Notes in Computer Science 7496, Springer 2012, ISBN 978-3-642-33271-5 [contents] - [i25]Naoyuki Shinohara, Takeshi Shimoyama, Takuya Hayashi, Tsuyoshi Takagi:
Key Length Estimation of Pairing-based Cryptosystems using ηT Pairing. IACR Cryptol. ePrint Arch. 2012: 42 (2012) - [i24]Takuya Hayashi, Takeshi Shimoyama, Naoyuki Shinohara, Tsuyoshi Takagi:
Breaking pairing-based cryptosystems using ηT pairing over GF(397). IACR Cryptol. ePrint Arch. 2012: 345 (2012) - 2011
- [j38]Yuto Kawahara, Tetsutaro Kobayashi, Gen Takahashi, Tsuyoshi Takagi:
Faster MapToPoint on Supersingular Elliptic Curves in Characteristic 3. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 94-A(1): 150-155 (2011) - [j37]Fagen Li, Jiang Deng, Tsuyoshi Takagi:
An Improved Authenticated Encryption Scheme. IEICE Trans. Inf. Syst. 94-D(11): 2171-2172 (2011) - [j36]Mingwu Zhang, Bo Yang, Wenzheng Zhang, Tsuyoshi Takagi:
Multibiometric Based Secure Encryption, Authentication Scheme with Fuzzy Extractor. Int. J. Netw. Secur. 12(1): 50-57 (2011) - [j35]Mingwu Zhang, Bo Yang, Yusheng Zhong, Pengcheng Li, Tsuyoshi Takagi:
Cryptanalysis and Fixed of Short Signature Scheme without Random Oracle from Bilinear Parings. Int. J. Netw. Secur. 12(3): 130-136 (2011) - [j34]Mingwu Zhang, Bo Yang, Tsuyoshi Takagi:
Group-oriented setting's multisigncryption scheme with threshold designcryption. Inf. Sci. 181(18): 4041-4050 (2011) - [c88]Mingwu Zhang, Tsuyoshi Takagi:
GeoEnc: Geometric Area Based Keys and Policies in Functional Encryption Systems. ACISP 2011: 241-258 - [c87]Kenichiro Hayasaka, Tsuyoshi Takagi:
An Experiment of Number Field Sieve over GF(p) of Low Hamming Weight Characteristic. IWCC 2011: 191-200 - [c86]Mingwu Zhang, Tsuyoshi Takagi, Bo Yang:
Dual-Verifiers DVS with Message Recovery for Tolerant Routing in Wireless Sensor Networks. PAISI 2011: 71-84 - [c85]Yasufumi Hashimoto, Tsuyoshi Takagi, Kouichi Sakurai:
General Fault Attacks on Multivariate Public Key Cryptosystems. PQCrypto 2011: 1-18 - [c84]Fagen Li, Fahad Bin Muhaya, Mingwu Zhang, Tsuyoshi Takagi:
Efficient Identity-Based Signcryption in the Standard Model. ProvSec 2011: 120-137 - [c83]Mingwu Zhang, Takashi Nishide, Bo Yang, Tsuyoshi Takagi:
Anonymous Encryption with Partial-Order Subset Delegation Functionality. ProvSec 2011: 154-169 - [e3]Bart Preneel, Tsuyoshi Takagi:
Cryptographic Hardware and Embedded Systems - CHES 2011 - 13th International Workshop, Nara, Japan, September 28 - October 1, 2011. Proceedings. Lecture Notes in Computer Science 6917, Springer 2011, ISBN 978-3-642-23950-2 [contents] - [i23]Yosuke Katoh, Yun-Ju Huang, Chen-Mou Cheng, Tsuyoshi Takagi:
Efficient Implementation of the etaT Pairing on GPU. IACR Cryptol. ePrint Arch. 2011: 540 (2011) - 2010
- [j33]Jean-Luc Beuchat, Hiroshi Doi, Kaoru Fujita, Atsuo Inomata, Piseth Ith, Akira Kanaoka, Masayoshi Katouno, Masahiro Mambo, Eiji Okamoto, Takeshi Okamoto, Takaaki Shiga, Masaaki Shirase, Ryuji Soga, Tsuyoshi Takagi, Ananda Vithanage, Hiroyasu Yamamoto:
FPGA and ASIC implementations of the etaT pairing in characteristic three. Comput. Electr. Eng. 36(1): 73-87 (2010) - [j32]Fagen Li, Masaaki Shirase, Tsuyoshi Takagi:
Cryptanalysis of efficient proxy signature schemes for mobile communication. Sci. China Inf. Sci. 53(10): 2016-2021 (2010) - [j31]Keisuke Hakuta, Hisayoshi Sato, Tsuyoshi Takagi:
Efficient arithmetic on subfield elliptic curves over small finite fields of odd characteristic. J. Math. Cryptol. 4(3): 199-238 (2010) - [c82]Tadashi Iyama, Shinsaku Kiyomoto, Kazuhide Fukushima, Toshiaki Tanaka, Tsuyoshi Takagi:
Efficient Implementation of Pairing on BREW Mobile Phones. IWSEC 2010: 326-336 - [c81]Mingwu Zhang, Bo Yang, Tsuyoshi Takagi, Yanping Shen, Wenzheng Zhang:
Fuzzy Biometric Signcryption Scheme with Bilinear Pairings in the Standard Model. PAISI 2010: 77-87 - [c80]Mingwu Zhang, Pengcheng Li, Bo Yang, Hao Wang, Tsuyoshi Takagi:
Towards Confidentiality of ID-Based Signcryption Schemes under without Random Oracle Model. PAISI 2010: 98-104 - [c79]Takuya Hayashi, Naoyuki Shinohara, Lihua Wang, Shin'ichiro Matsuo, Masaaki Shirase, Tsuyoshi Takagi:
Solving a 676-Bit Discrete Logarithm Problem in GF(36n). Public Key Cryptography 2010: 351-367 - [i22]Takuya Hayashi, Naoyuki Shinohara, Lihua Wang, Shin'ichiro Matsuo, Masaaki Shirase, Tsuyoshi Takagi:
Solving a 676-bit Discrete Logarithm Problem in GF(36n). IACR Cryptol. ePrint Arch. 2010: 90 (2010)
2000 – 2009
- 2009
- [j30]Eun-Kyung Ryu, Tsuyoshi Takagi:
A hybrid approach for privacy-preserving RFID tags. Comput. Stand. Interfaces 31(4): 812-815 (2009) - [j29]Chunhua Su, Feng Bao, Jianying Zhou, Tsuyoshi Takagi, Kouichi Sakurai:
Security and Correctness Analysis on Privacy-Preserving k-Means Clustering Schemes. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 92-A(4): 1246-1250 (2009) - [j28]Masaaki Shirase, Yukinori Miyazaki, Tsuyoshi Takagi, Dong-Guk Han, Dooho Choi:
Efficient Implementation of Pairing-Based Cryptography on a Sensor Node. IEICE Trans. Inf. Syst. 92-D(5): 909-917 (2009) - [j27]Chunhua Su, Feng Bao, Jianying Zhou, Tsuyoshi Takagi, Kouichi Sakurai:
Distributed Noise Generation for Density Estimation Based Clustering without Trusted Third Party. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 92-A(8): 1868-1871 (2009) - [j26]Kaoru Kurosawa, Tsuyoshi Takagi:
One-wayness equivalent to general factoring. IEEE Trans. Inf. Theory 55(9): 4249-4262 (2009) - [c78]Fagen Li, Masaaki Shirase, Tsuyoshi Takagi:
Identity-Based Hybrid Signcryption. ARES 2009: 534-539 - [c77]Fagen Li, Masaaki Shirase, Tsuyoshi Takagi:
Certificateless Hybrid Signcryption. ISPEC 2009: 112-123 - [c76]Yuta Sasaki, Satsuki Nishina, Masaaki Shirase, Tsuyoshi Takagi:
An Efficient Residue Group Multiplication for the etaT Pairing over F3m. Selected Areas in Cryptography 2009: 364-375 - [e2]Tsuyoshi Takagi, Masahiro Mambo:
Advances in Information and Computer Security, 4th International Workshop on Security, IWSEC 2009, Toyama, Japan, October 28-30, 2009, Proceedings. Lecture Notes in Computer Science 5824, Springer 2009, ISBN 978-3-642-04845-6 [contents] - [i21]Fagen Li, Masaaki Shirase, Tsuyoshi Takagi:
Certificateless Hybrid Signcryption. IACR Cryptol. ePrint Arch. 2009: 162 (2009) - [i20]Fagen Li, Masaaki Shirase, Tsuyoshi Takagi:
Identity-Based Hybrid Signcryption. IACR Cryptol. ePrint Arch. 2009: 455 (2009) - 2008
- [j25]Masaaki Shirase, Tsuyoshi Takagi, Eiji Okamoto:
Some Efficient Algorithms for the Final Exponentiation of etaT Pairing. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 91-A(1): 221-228 (2008) - [j24]Motoi Yoshitomi, Tsuyoshi Takagi, Shinsaku Kiyomoto, Toshiaki Tanaka:
Efficient Implementation of the Pairing on Mobilephones Using BREW. IEICE Trans. Inf. Syst. 91-D(5): 1330-1337 (2008) - [j23]Toshiya Nakajima, Tetsuya Izu, Tsuyoshi Takagi:
Reduction Optimal Trinomials for Efficient Software Implementation of the etaT Pairing. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 91-A(9): 2379-2386 (2008) - [j22]Masaaki Shirase, Dong-Guk Han, Yasushi Hibino, Howon Kim, Tsuyoshi Takagi:
A More Compact Representation of XTR Cryptosystem. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 91-A(10): 2843-2850 (2008) - [j21]Camille Vuillaume, Katsuyuki Okeya, Tsuyoshi Takagi:
Short-Memory Scalar Multiplication for Koblitz Curves. IEEE Trans. Computers 57(4): 481-489 (2008) - [j20]Jean-Luc Beuchat, Nicolas Brisebarre, Jérémie Detrey, Eiji Okamoto, Masaaki Shirase, Tsuyoshi Takagi:
Algorithms and Arithmetic Operators for Computing the etaT Pairing in Characteristic Three. IEEE Trans. Computers 57(11): 1454-1468 (2008) - [c75]Chunhua Su, Feng Bao, Jianying Zhou, Tsuyoshi Takagi, Kouichi Sakurai:
A New Scheme for Distributed Density Estimation based Privacy-Preserving Clustering. ARES 2008: 112-119 - [c74]Kyosuke Osaka, Shuang Chang, Tsuyoshi Takagi, Kenichi Yamazaki, Osamu Takahashi:
A Secure RFID Protocol based on Insubvertible Encryption Using Guardian Proxy. ARES 2008: 733-740 - [c73]Fagen Li, Masaaki Shirase, Tsuyoshi Takagi:
On the Security of Online/Offline Signatures and Multisignatures from ACISP'06. CANS 2008: 108-119 - [c72]Fagen Li, Masaaki Shirase, Tsuyoshi Takagi:
Efficient Signcryption Key Encapsulation without Random Oracles. Inscrypt 2008: 47-59 - [c71]Fagen Li, Masaaki Shirase, Tsuyoshi Takagi:
Efficient Multi-PKG ID-Based Signcryption for Ad Hoc Networks. Inscrypt 2008: 289-304 - [c70]Masaaki Shirase, Tsuyoshi Takagi, Eiji Okamoto:
An Efficient Countermeasure against Side Channel Attacks for Pairing Computation. ISPEC 2008: 290-303 - [c69]Keisuke Hakuta, Hisayoshi Sato, Tsuyoshi Takagi:
Efficient Arithmetic on Subfield Elliptic Curves over Small Finite Fields of Odd Characteristic. ISPEC 2008: 304-318 - [c68]Akira Otaka, Tsuyoshi Takagi, Osamu Takahashi:
Network Forensics on Mobile Ad-Hoc Networks. KES (3) 2008: 175-182 - [c67]Fagen Li, Masaaki Shirase, Tsuyoshi Takagi:
Key Management Using Certificateless Public Key Cryptography in Ad Hoc Networks. NPC 2008: 116-126 - [c66]Yuto Kawahara, Kazumaro Aoki, Tsuyoshi Takagi:
Faster Implementation of eta-T Pairing over GF(3m) Using Minimum Number of Logical Instructions for GF(3)-Addition. Pairing 2008: 282-296 - [c65]Erik Dahmen, Katsuyuki Okeya, Tsuyoshi Takagi, Camille Vuillaume:
Digital Signatures Out of Second-Preimage Resistant Hash Functions. PQCrypto 2008: 109-123 - [i19]Jean-Luc Beuchat, Hiroshi Doi, Kaoru Fujita, Atsuo Inomata, Piseth Ith, Akira Kanaoka, Masayoshi Katouno, Masahiro Mambo, Eiji Okamoto, Takeshi Okamoto, Takaaki Shiga, Masaaki Shirase, Ryuji Soga, Tsuyoshi Takagi, Ananda Vithanage, Hiroyasu Yamamoto:
FPGA and ASIC Implementations of the etaT Pairing in Characteristic Three. IACR Cryptol. ePrint Arch. 2008: 280 (2008) - [i18]Fagen Li, Masaaki Shirase, Tsuyoshi Takagi:
Analysis and Improvement of Authenticatable Ring Signcryption Scheme. IACR Cryptol. ePrint Arch. 2008: 373 (2008) - 2007
- [j19]Erik Dahmen, Katsuyuki Okeya, Tsuyoshi Takagi:
A New Upper Bound for the Minimal Density of Joint Representations in Elliptic Curve Cryptosystems. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 90-A(5): 952-959 (2007) - [c64]Masaaki Shirase, Dong-Guk Han, Yasushi Hibino, Ho Won Kim, Tsuyoshi Takagi:
Compressed XTR. ACNS 2007: 420-431 - [c63]Chunhua Su, Feng Bao, Jianying Zhou, Tsuyoshi Takagi, Kouichi Sakurai:
Privacy-Preserving Two-Party K-Means Clustering via Secure Approximation. AINA Workshops (1) 2007: 385-391 - [c62]Eun-Kyung Ryu, Tsuyoshi Takagi:
Efficient Conjunctive Keyword-Searchable Encryption. AINA Workshops (1) 2007: 409-414 - [c61]Jean-Luc Beuchat, Masaaki Shirase, Tsuyoshi Takagi, Eiji Okamoto:
An Algorithm for the nt Pairing Calculation in Characteristic Three and its Hardware Implementation. IEEE Symposium on Computer Arithmetic 2007: 97-104 - [c60]Chunhua Su, Jianying Zhou, Feng Bao, Tsuyoshi Takagi, Kouichi Sakurai:
Two-Party Privacy-Preserving Agglomerative Document Clustering. ISPEC 2007: 193-208 - [c59]Masaaki Shirase, Tsuyoshi Takagi, Eiji Okamoto:
Some Efficient Algorithms for the Final Exponentiation of eta T Pairing. ISPEC 2007: 254-268 - [c58]Toshiya Nakajima, Tetsuya Izu, Tsuyoshi Takagi:
Reduction Optimal Trinomials for Efficient Software Implementation of the etaT Pairing. IWSEC 2007: 44-57 - [c57]Jean-Luc Beuchat, Nicolas Brisebarre, Masaaki Shirase, Tsuyoshi Takagi, Eiji Okamoto:
A Coprocessor for the Final Exponentiation of the eta T Pairing in Characteristic Three. WAIFI 2007: 25-39 - [c56]Masaaki Shirase, Yuto Kawahara, Tsuyoshi Takagi, Eiji Okamoto:
Universal etaT Pairing Algorithm over Arbitrary Extension Degree. WISA 2007: 1-15 - [c55]Motoi Yoshitomi, Tsuyoshi Takagi, Shinsaku Kiyomoto, Toshiaki Tanaka:
Efficient Implementation of the Pairing on Mobilephones Using BREW. WISA 2007: 203-214 - [e1]Tsuyoshi Takagi, Tatsuaki Okamoto, Eiji Okamoto, Takeshi Okamoto:
Pairing-Based Cryptography - Pairing 2007, First International Conference, Tokyo, Japan, July 2-4, 2007, Proceedings. Lecture Notes in Computer Science 4575, Springer 2007, ISBN 978-3-540-73488-8 [contents] - [i17]Jean-Luc Beuchat, Nicolas Brisebarre, Masaaki Shirase, Tsuyoshi Takagi, Eiji Okamoto:
A Coprocessor for the Final Exponentiation of the etaT Pairing in Characteristic Three. IACR Cryptol. ePrint Arch. 2007: 45 (2007) - [i16]Jean-Luc Beuchat, Masaaki Shirase, Tsuyoshi Takagi, Eiji Okamoto:
A Refined Algorithm for the etaT Pairing Calculation in Characteristic Three. IACR Cryptol. ePrint Arch. 2007: 311 (2007) - [i15]Motoi Yoshitomi, Tsuyoshi Takagi, Shinsaku Kiyomoto, Toshiaki Tanaka:
Efficient Implementation of the Pairing on Mobilephones using BREW. IACR Cryptol. ePrint Arch. 2007: 340 (2007) - [i14]Jean-Luc Beuchat, Nicolas Brisebarre, Jérémie Detrey, Eiji Okamoto, Masaaki Shirase, Tsuyoshi Takagi:
Algorithms and Arithmetic Operators for Computing the etaT Pairing in Characteristic Three. IACR Cryptol. ePrint Arch. 2007: 417 (2007) - 2006
- [j18]Hisayoshi Sato, Tsuyoshi Takagi, Satoru Tezuka, Kazuo Takaragi:
Generalized Powering Functions and Their Application to Digital Signatures. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 89-A(1): 81-89 (2006) - [j17]Tsuyoshi Takagi, David Reis Jr., Sung-Ming Yen, Bo-Ching Wu:
Radix-r Non-Adjacent Form and Its Application to Pairing-Based Cryptosystem. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 89-A(1): 115-123 (2006) - [j16]Masanobu Katagi, Toru Akishita, Izuru Kitamura, Tsuyoshi Takagi:
Efficient Hyperelliptic Curve Cryptosystems Using Theta Divisors. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 89-A(1): 151-160 (2006) - [j15]Katsuyuki Okeya, Tsuyoshi Takagi, Camille Vuillaume:
Security Analysis of the SPA-Resistant Fractional Width Method. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 89-A(1): 161-168 (2006) - [j14]Camille Vuillaume, Katsuyuki Okeya, Tsuyoshi Takagi:
Defeating Simple Power Analysis on Koblitz Curves. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 89-A(5): 1362-1369 (2006) - [j13]Katsuyuki Okeya, Tsuyoshi Takagi:
Security analysis of CRT-based cryptosystems. Int. J. Inf. Sec. 5(3): 177-185 (2006) - [j12]Katja Schmidt-Samoa, Olivier Semay, Tsuyoshi Takagi:
Analysis of Fractional Window Recoding Methods and Their Application to Elliptic Curve Cryptosystems. IEEE Trans. Computers 55(1): 48-57 (2006) - [c54]Kaoru Kurosawa, Tsuyoshi Takagi:
New Approach for Selectively Convertible Undeniable Signature Schemes. ASIACRYPT 2006: 428-443 - [c53]Tae Hyun Kim, Tsuyoshi Takagi, Dong-Guk Han, Ho Won Kim, Jongin Lim:
Side Channel Attacks and Countermeasures on Pairing Based Cryptosystems over Binary Fields. CANS 2006: 168-181 - [c52]Toru Akishita, Tsuyoshi Takagi:
Power Analysis to ECC Using Differential Power Between Multiplication and Squaring. CARDIS 2006: 151-164 - [c51]Yuto Kawahara, Tsuyoshi Takagi, Eiji Okamoto:
Efficient Implementation of Tate Pairing on a Mobile Phone Using Java. CIS 2006: 396-405 - [c50]Kyosuke Osaka, Tsuyoshi Takagi, Kenichi Yamazaki, Osamu Takahashi:
An Efficient and Secure RFID Security Method with Ownership Transfer. CIS 2006: 778-787 - [c49]Dong-Guk Han, Tsuyoshi Takagi, Howon Kim, Kyoil Chung:
New Security Problem in RFID Systems "Tag Killing". ICCSA (3) 2006: 375-384 - [c48]Dong-Guk Han, Tsuyoshi Takagi, Jongin Lim:
Further Security Analysis of XTR. ISPEC 2006: 33-44 - [i13]Tae Hyun Kim, Tsuyoshi Takagi, Dong-Guk Han, Ho Won Kim, Jongin Lim:
Side Channel Attacks and Countermeasures on Pairing Based Cryptosystems over Binary Fields. IACR Cryptol. ePrint Arch. 2006: 243 (2006) - [i12]Yuto Kawahara, Tsuyoshi Takagi, Eiji Okamoto:
Efficient Implementation of Tate Pairing on a Mobile Phone using Java. IACR Cryptol. ePrint Arch. 2006: 299 (2006) - [i11]Jean-Luc Beuchat, Masaaki Shirase, Tsuyoshi Takagi, Eiji Okamoto:
An Algorithm for the ηT Pairing Calculation in Characteristic Three and its Hardware Implementation. IACR Cryptol. ePrint Arch. 2006: 327 (2006) - [i10]Masaaki Shirase, Tsuyoshi Takagi, Eiji Okamoto:
Some Efficient Algorithms for the Final Exponentiation of ηT Pairing. IACR Cryptol. ePrint Arch. 2006: 431 (2006) - 2005
- [j11]Katsuyuki Okeya, Tsuyoshi Takagi, Camille Vuillaume:
On the Importance of Protecting in SFLASH against Side Channel Attacks. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 88-A(1): 123-131 (2005) - [j10]Toru Akishita, Tsuyoshi Takagi:
Zero-Value Register Attack on Elliptic Curve Cryptosystem. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 88-A(1): 132-139 (2005) - [j9]Toru Akishita, Tsuyoshi Takagi:
On the Optimal Parameter Choice for Elliptic Curve Cryptosystems Using Isogeny. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 88-A(1): 140-146 (2005) - [j8]Tetsuya Izu, Tsuyoshi Takagi:
Fast Elliptic Curve Multiplications Resistant against Side Channel Attacks. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 88-A(1): 161-171 (2005) - [c47]Izuru Kitamura, Masanobu Katagi, Tsuyoshi Takagi:
A Complete Divisor Class Halving Algorithm for Hyperelliptic Curve Cryptosystems of Genus Two. ACISP 2005: 146-157 - [c46]Katsuyuki Okeya, Tsuyoshi Takagi, Camille Vuillaume:
Efficient Representations on Koblitz Curves with Resistance to Side Channel Attacks. ACISP 2005: 218-229 - [c45]Raylin Tso, Takeshi Okamoto, Tsuyoshi Takagi, Eiji Okamoto:
An id-based non-interactive tripartite key agreement protocol with K-resilience. Communications and Computer Networks 2005: 38-42 - [c44]Katsuyuki Okeya, Tsuyoshi Takagi, Camille Vuillaume:
Short Memory Scalar Multiplication on Koblitz Curves. CHES 2005: 91-105 - [c43]Lihua Wang, Takeshi Okamoto, Tsuyoshi Takagi, Eiji Okamoto:
Insider Impersonation-MIM Attack to Tripartite Key Agreement Scheme and an Efficient Protocol for Multiple Keys. CIS (2) 2005: 198-203 - [c42]Erik Dahmen, Katsuyuki Okeya, Tsuyoshi Takagi:
An Advanced Method for Joint Scalar Multiplications on Memory Constraint Devices. ESAS 2005: 189-204 - [c41]Dong-Guk Han, Tsuyoshi Takagi, Tae Hyun Kim, Howon Kim, Kyoil Chung:
Collision Attack on XTR and a Countermeasure with a Fixed Pattern. EUC Workshops 2005: 864-873 - [c40]Katja Schmidt-Samoa, Tsuyoshi Takagi:
Paillier's Cryptosystem Modulo p2q and Its Applications to Trapdoor Commitment Schemes. Mycrypt 2005: 296-313 - [i9]Dong-Guk Han, Tsuyoshi Takagi, Tae Hyun Kim, Ho Won Kim, Kyoil Chung:
Collision Attack on XTR and a Countermeasure with a Fixed Pattern. IACR Cryptol. ePrint Arch. 2005: 316 (2005) - [i8]Kaoru Kurosawa, Tsuyoshi Takagi:
One-Wayness Equivalent to General Factoring. IACR Cryptol. ePrint Arch. 2005: 382 (2005) - [i7]Dong-Guk Han, Tetsuya Izu, Tsuyoshi Takagi:
Some Explicit Formulae of NAF and its Left-to-Right Analogue. IACR Cryptol. ePrint Arch. 2005: 384 (2005) - [i6]Dong-Guk Han, Tsuyoshi Takagi:
Some Analysis of Radix-r Representations. IACR Cryptol. ePrint Arch. 2005: 402 (2005) - [i5]Keisuke Hakuta, Hisayoshi Sato, Tsuyoshi Takagi:
Efficient Arithmetic on Subfield Elliptic Curves over Small Odd Characteristics. IACR Cryptol. ePrint Arch. 2005: 454 (2005) - 2004
- [j7]Ingrid Biehl, Sachar Paulus, Tsuyoshi Takagi:
Efficient Undeniable Signature Schemes Based on Ideal Arithmetic in Quadratic Orders. Des. Codes Cryptogr. 31(2): 99-123 (2004) - [j6]Katsuyuki Okeya, Tsuyoshi Takagi:
SCA-Resistant and Fast Elliptic Scalar Multiplication Based on wNAF. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 87-A(1): 75-84 (2004) - [j5]Tetsuya Izu, Tsuyoshi Takagi:
Fast Elliptic Curve Multiplications with SIMD Operations. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 87-A(1): 85-93 (2004) - [j4]Tsuyoshi Takagi:
A Fast RSA-Type Public-Key Primitive Modulo pkq Using Hensel Lifting. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 87-A(1): 94-101 (2004) - [c39]Katsuyuki Okeya, Tsuyoshi Takagi, Camille Vuillaume:
On the Exact Flexibility of the Flexible Countermeasure Against Side Channel Attacks. ACISP 2004: 466-477 - [c38]Katsuyuki Okeya, Tsuyoshi Takagi:
Security Analysis of CRT-Based Cryptosystems. ACNS 2004: 383-397 - [c37]Katsuyuki Okeya, Katja Schmidt-Samoa, Christian Spahn, Tsuyoshi Takagi:
Signed Binary Representations Revisited. CRYPTO 2004: 123-139 - [c36]Tsutomu Sawada, Tsuyoshi Takagi, Yukiko Hoshino, Masahiro Fujita:
Learning behavior selection through interaction based on emotionally grounded symbol concept. Humanoids 2004: 450-469 - [c35]Masanobu Katagi, Toru Akishita, Izuru Kitamura, Tsuyoshi Takagi:
Some Improved Algorithms for Hyperelliptic Curve Cryptosystems Using Degenerate Divisors. ICISC 2004: 296-312 - [c34]Yukiko Hoshino, Tsuyoshi Takagi, Ugo Di Profio, Masahiro Fujita:
Behavior Description and Control using Behavior Module for Personal Robot. ICRA 2004: 4165-4171 - [c33]David Galindo, Sebastià Martín Molleví, Tsuyoshi Takagi, Jorge Luis Villar:
A Provably Secure Elliptic Curve Scheme with Fast Encryption. INDOCRYPT 2004: 245-259 - [c32]Hisayoshi Sato, Daniel Schepers, Tsuyoshi Takagi:
Exact Analysis of Montgomery Multiplication. INDOCRYPT 2004: 290-304 - [c31]Tsutomu Sawada, Tsuyoshi Takagi, Masahiro Fujita:
Behavior selection and motion modulation in emotionally grounded architecture for QRIO SDR-4XII. IROS 2004: 2514-2519 - [c30]Tsuyoshi Takagi, Sung-Ming Yen, Bo-Ching Wu:
Radix-r Non-Adjacent Form. ISC 2004: 99-110 - [c29]Katsuyuki Okeya, Tsuyoshi Takagi, Camille Vuillaume:
On the Importance of Protecting Delta in SFLASH against Side Channel Attacks. ITCC (2) 2004: 560-568 - [c28]Toru Akishita, Tsuyoshi Takagi:
On the Optimal Parameter Choice for Elliptic Curve Cryptosystems Using Isogeny. Public Key Cryptography 2004: 346-359 - [c27]Masanobu Katagi, Izuru Kitamura, Toru Akishita, Tsuyoshi Takagi:
Novel Efficient Implementations of Hyperelliptic Curve Cryptosystems Using Degenerate Divisors. WISA 2004: 345-359 - [i4]Katsuyuki Okeya, Katja Schmidt-Samoa, Christian Spahn, Tsuyoshi Takagi:
Signed Binary Representations Revisited. IACR Cryptol. ePrint Arch. 2004: 195 (2004) - [i3]Izuru Kitamura, Masanobu Katagi, Tsuyoshi Takagi:
A Complete Divisor Class Halving Algorithm for Hyperelliptic Curve Cryptosystems of Genus Two. IACR Cryptol. ePrint Arch. 2004: 255 (2004) - 2003
- [j3]Ronald C. Arkin, Masahiro Fujita, Tsuyoshi Takagi, Rika Hasegawa:
An ethological and emotional basis for human-robot interaction. Robotics Auton. Syst. 42(3-4): 191-201 (2003) - [c26]Kaoru Kurosawa, Tsuyoshi Takagi:
Some RSA-Based Encryption Schemes with Tight Security Reduction. ASIACRYPT 2003: 19-36 - [c25]Hisayoshi Sato, Tsuyoshi Takagi, Satoru Tezuka, Kazuo Takaragi:
Generalized Powering Functions and Their Application to Digital Signatures. ASIACRYPT 2003: 434-451 - [c24]Kaoru Kurosawa, Katja Schmidt-Samoa, Tsuyoshi Takagi:
A Complete and Explicit Security Reduction Algorithm for RSA-Based Cryptosystems. ASIACRYPT 2003: 474-491 - [c23]Katsuyuki Okeya, Tsuyoshi Takagi:
A More Flexible Countermeasure against Side Channel Attacks Using Window Method. CHES 2003: 397-410 - [c22]Katsuyuki Okeya, Tsuyoshi Takagi:
The Width-w NAF Method Provides Small Memory and Fast Elliptic Scalar Multiplications Secure against Side Channel Attacks. CT-RSA 2003: 328-342 - [c21]Toru Akishita, Tsuyoshi Takagi:
Zero-Value Point Attacks on Elliptic Curve Cryptosystem. ISC 2003: 218-233 - [c20]Tetsuya Izu, Tsuyoshi Takagi:
Exceptional Procedure Attack on Elliptic Curve Cryptosystems. Public Key Cryptography 2003: 224-239 - [i2]Kaoru Kurosawa, Tsuyoshi Takagi:
Some RSA-based Encryption Schemes with Tight Security Reduction. IACR Cryptol. ePrint Arch. 2003: 157 (2003) - [i1]Masanobu Katagi, Izuru Kitamura, Toru Akishita, Tsuyoshi Takagi:
Novel Efficient Implementations of Hyperelliptic Curve Cryptosystems using Degenerate Divisors. IACR Cryptol. ePrint Arch. 2003: 203 (2003) - 2002
- [c19]Ingrid Biehl, Tsuyoshi Takagi:
A New Distributed Primality Test for Shared RSA Keys Using Quadratic Fields. ACISP 2002: 1-16 - [c18]Kouichi Sakurai, Tsuyoshi Takagi:
On the Security of a Modified Paillier Public-Key Primitive. ACISP 2002: 436-448 - [c17]Tetsuya Izu, Tsuyoshi Takagi:
Fast Elliptic Curve Multiplications with SIMD Operations. ICICS 2002: 217-230 - [c16]Tetsuya Izu, Tsuyoshi Takagi:
Efficient Computations of the Tate Pairingfor the Large MOV Degrees. ICISC 2002: 283-297 - [c15]Kouichi Sakurai, Tsuyoshi Takagi:
A Reject Timing Attackon an IND-CCA2 Public-Key Cryptosystem. ICISC 2002: 359-373 - [c14]Tetsuya Izu, Bodo Möller, Tsuyoshi Takagi:
Improved Elliptic Curve Multiplication Methods Resistant against Side Channel Attacks. INDOCRYPT 2002: 296-313 - [c13]Kouichi Sakurai, Tsuyoshi Takagi:
New Semantically Secure Public-Key Cryptosystems from the RSA-Primitive. Public Key Cryptography 2002: 1-16 - [c12]Tetsuya Izu, Tsuyoshi Takagi:
A Fast Parallel Elliptic Curve Multiplication Resistant against Side Channel Attacks. Public Key Cryptography 2002: 280-296 - 2001
- [b1]Tsuyoshi Takagi:
New public-key cryptosystems with fast decryption. Darmstadt University of Technology, Germany, 2001 - [j2]Marc Joye, Jean-Jacques Quisquater, Tsuyoshi Takagi:
How to Choose Secret Parameters for RSA-Type Cryptosystems over Elliptic Curves. Des. Codes Cryptogr. 23(3): 297-316 (2001) - [c11]Masahiro Fujita, Gabriel Costa, Rika Hasegawa, Tsuyoshi Takagi, Jun Yokono, Hideki Shimomura:
Architecture and preliminary experimental results for emotionally grounded symbol acquisition. Agents 2001: 35-36 - [c10]Johannes Buchmann, Kouichi Sakurai, Tsuyoshi Takagi:
An IND-CCA2 Public-Key Cryptosystem with Fast Decryption. ICISC 2001: 51-71 - [c9]Ronald C. Arkin, Masahiro Fujita, Tsuyoshi Takagi, Rika Hasegawa:
Ethological Modeling and Architecture for an Entertainment Robot. ICRA 2001: 453-458 - 2000
- [j1]Sachar Paulus, Tsuyoshi Takagi:
A New Public-Key Cryptosystem over a Quadratic Order with Quadratic Decryption Time. J. Cryptol. 13(2): 263-272 (2000)
1990 – 1999
- 1999
- [c8]Detlef Hühnlein, Tsuyoshi Takagi:
Reducing Logarithms in Totally Non-maximal Imaginary Quadratic Orders to Logarithms in Finite Fields. ASIACRYPT 1999: 219-231 - [c7]Michael Hartmann, Sachar Paulus, Tsuyoshi Takagi:
NICE - New Ideal Coset Encryption. CHES 1999: 328-339 - 1998
- [c6]Tsuyoshi Takagi:
Fast RSA-Type Cryptosystem Modulo pkq. CRYPTO 1998: 318-326 - [c5]Detlef Hühnlein, Michael J. Jacobson Jr., Sachar Paulus, Tsuyoshi Takagi:
A Cryptosystem Based on Non-maximal Imaginary Quadratic Orders with Fast Decryption. EUROCRYPT 1998: 294-307 - [c4]Sachar Paulus, Tsuyoshi Takagi:
A generalization of the Diffie-Hellman problem and related cryptosystems allowing fast decryption. ICISC 1998: 211-220 - [c3]Detlef Hühnlein, Andreas Meyer, Tsuyoshi Takagi:
Rabin and RSA analogues based on non-maximal imaginary quadratic orders. ICISC 1998: 221-240 - 1997
- [c2]Tsuyoshi Takagi:
Fast RSA-Type Cryptosystems Using N-Adic Expansion. CRYPTO 1997: 372-384 - 1996
- [c1]Tsuyoshi Takagi, Shozo Naito:
The Multi-variable Modular Polynomial and Its Applications to Cryptography. ISAAC 1996: 386-396
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-04 21:43 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint