| 2008 |
| 27 | EE | Tetsuya Izu,
Noboru Kunihiro,
Kazuo Ohta,
Makoto Sano,
Masahiko Takenaka:
Sanitizable and Deletable Signature.
WISA 2008: 130-144 |
| 26 | EE | Toshiya Nakajima,
Tetsuya Izu,
Tsuyoshi Takagi:
Reduction Optimal Trinomials for Efficient Software Implementation of the etaT Pairing.
IEICE Transactions 91-A(9): 2379-2386 (2008) |
| 2007 |
| 25 | EE | Tetsuya Izu,
Masahiko Takenaka,
Takeshi Shimoyama:
Analysis on Bleichenbacher's Forgery Attack.
ARES 2007: 1167-1174 |
| 24 | EE | Tetsuya Izu,
Jun Kogure,
Takeshi Shimoyama:
CAIRN 2: An FPGA Implementation of the Sieving Step in the Number Field Sieve Method.
CHES 2007: 364-377 |
| 23 | EE | Tetsuya Izu,
Takeshi Shimoyama,
Masahiko Takenaka:
How to Forge a Time-Stamp Which Adobe's Acrobat Accepts.
IMA Int. Conf. 2007: 54-72 |
| 22 | EE | Tetsuya Izu,
Noboru Kunihiro,
Kazuo Ohta,
Masahiko Takenaka,
Takashi Yoshioka:
A Sanitizable Signature Scheme with Aggregation.
ISPEC 2007: 51-64 |
| 21 | EE | Toshiya Nakajima,
Tetsuya Izu,
Tsuyoshi Takagi:
Reduction Optimal Trinomials for Efficient Software Implementation of the etaT Pairing.
IWSEC 2007: 44-57 |
| 20 | EE | Tetsuya Izu,
Jun Kogure,
Takeshi Koshiba,
Takeshi Shimoyama:
Low-density attack revisited.
Des. Codes Cryptography 43(1): 47-59 (2007) |
| 2006 |
| 19 | EE | Kouichi Itoh,
Tetsuya Izu,
Masahiko Takenaka:
Improving the Randomized Initial Point Countermeasure Against DPA.
ACNS 2006: 459-469 |
| 2005 |
| 18 | EE | Tetsuya Izu,
Nobuyuki Kanaya,
Masahiko Takenaka,
Takashi Yoshioka:
PIATS: A Partially Sanitizable Signature Scheme.
ICICS 2005: 72-83 |
| 17 | EE | Tetsuya Izu,
Noboru Kunihiro,
Kazuo Ohta,
Takeshi Shimoyama:
Analysis on the Clockwise Transposition Routing for Dedicated Factoring Devices.
WISA 2005: 232-242 |
| 16 | EE | Tetsuya Izu,
Tsuyoshi Takagi:
Fast Elliptic Curve Multiplications Resistant against Side Channel Attacks.
IEICE Transactions 88-A(1): 161-171 (2005) |
| 15 | EE | Dong-Guk Han,
Tetsuya Izu,
Jongin Lim,
Kouichi Sakurai:
Side Channel Cryptanalysis on XTR Public Key Cryptosystem.
IEICE Transactions 88-A(5): 1214-1223 (2005) |
| 2004 |
| 14 | | Kouichi Itoh,
Tetsuya Izu,
Masahiko Takenaka:
Efficient Countermeasures against Power Analysis for Elliptic Curve Cryptosystems.
CARDIS 2004: 99-114 |
| 13 | EE | Dong-Guk Han,
Tetsuya Izu,
Jongin Lim,
Kouichi Sakurai:
Modified Power-Analysis Attacks on XTR and an Efficient Countermeasure.
ICICS 2004: 305-317 |
| 12 | EE | Tetsuya Izu:
A Note on the Lattice Factoring Method.
IEICE Transactions 87-A(1): 221-223 (2004) |
| 11 | EE | Tetsuya Izu,
Tsuyoshi Takagi:
Fast Elliptic Curve Multiplications with SIMD Operations.
IEICE Transactions 87-A(1): 85-93 (2004) |
| 2003 |
| 10 | EE | Kouichi Itoh,
Tetsuya Izu,
Masahiko Takenaka:
A Practical Countermeasure against Address-Bit Differential Power Analysis.
CHES 2003: 382-396 |
| 9 | EE | Tetsuya Izu,
Tsuyoshi Takagi:
Exceptional Procedure Attack on Elliptic Curve Cryptosystems.
Public Key Cryptography 2003: 224-239 |
| 2002 |
| 8 | EE | Kouichi Itoh,
Tetsuya Izu,
Masahiko Takenaka:
Address-Bit Differential Power Analysis of Cryptographic Schemes OK-ECDH and OK-ECDSA.
CHES 2002: 129-143 |
| 7 | EE | Tetsuya Izu,
Tsuyoshi Takagi:
Fast Elliptic Curve Multiplications with SIMD Operations.
ICICS 2002: 217-230 |
| 6 | EE | Tetsuya Izu,
Tsuyoshi Takagi:
Efficient Computations of the Tate Pairingfor the Large MOV Degrees.
ICISC 2002: 283-297 |
| 5 | EE | Tetsuya Izu,
Bodo Möller,
Tsuyoshi Takagi:
Improved Elliptic Curve Multiplication Methods Resistant against Side Channel Attacks.
INDOCRYPT 2002: 296-313 |
| 4 | EE | Tetsuya Izu,
Tsuyoshi Takagi:
A Fast Parallel Elliptic Curve Multiplication Resistant against Side Channel Attacks.
Public Key Cryptography 2002: 280-296 |
| 2000 |
| 3 | | Tetsuya Izu,
Jun Kogure,
Kazuhiro Yokoyama:
Efficient Implementation of Schoof's Algorithm in Case of Characteristic 2.
Public Key Cryptography 2000: 210-222 |
| 1998 |
| 2 | EE | Tetsuya Izu,
Jun Kogure,
Masayuki Noro,
Kazuhiro Yokoyama:
Efficient Implementation of Schoof's Algorithm.
ASIACRYPT 1998: 66-79 |
| 1 | EE | Tetsuya Izu,
Jun Kogure,
Masayuki Noro,
Kazuhiro Yokoyama:
Parameters for Secure Elliptic Curve Cryptosystem - Improvements on Schoof's Algorithm.
Public Key Cryptography 1998: 253-257 |