2008 |
27 | EE | Tetsuya Izu,
Noboru Kunihiro,
Kazuo Ohta,
Makoto Sano,
Masahiko Takenaka:
Sanitizable and Deletable Signature.
WISA 2008: 130-144 |
26 | EE | Toshiya Nakajima,
Tetsuya Izu,
Tsuyoshi Takagi:
Reduction Optimal Trinomials for Efficient Software Implementation of the etaT Pairing.
IEICE Transactions 91-A(9): 2379-2386 (2008) |
2007 |
25 | EE | Tetsuya Izu,
Masahiko Takenaka,
Takeshi Shimoyama:
Analysis on Bleichenbacher's Forgery Attack.
ARES 2007: 1167-1174 |
24 | EE | Tetsuya Izu,
Jun Kogure,
Takeshi Shimoyama:
CAIRN 2: An FPGA Implementation of the Sieving Step in the Number Field Sieve Method.
CHES 2007: 364-377 |
23 | EE | Tetsuya Izu,
Takeshi Shimoyama,
Masahiko Takenaka:
How to Forge a Time-Stamp Which Adobe's Acrobat Accepts.
IMA Int. Conf. 2007: 54-72 |
22 | EE | Tetsuya Izu,
Noboru Kunihiro,
Kazuo Ohta,
Masahiko Takenaka,
Takashi Yoshioka:
A Sanitizable Signature Scheme with Aggregation.
ISPEC 2007: 51-64 |
21 | EE | Toshiya Nakajima,
Tetsuya Izu,
Tsuyoshi Takagi:
Reduction Optimal Trinomials for Efficient Software Implementation of the etaT Pairing.
IWSEC 2007: 44-57 |
20 | EE | Tetsuya Izu,
Jun Kogure,
Takeshi Koshiba,
Takeshi Shimoyama:
Low-density attack revisited.
Des. Codes Cryptography 43(1): 47-59 (2007) |
2006 |
19 | EE | Kouichi Itoh,
Tetsuya Izu,
Masahiko Takenaka:
Improving the Randomized Initial Point Countermeasure Against DPA.
ACNS 2006: 459-469 |
2005 |
18 | EE | Tetsuya Izu,
Nobuyuki Kanaya,
Masahiko Takenaka,
Takashi Yoshioka:
PIATS: A Partially Sanitizable Signature Scheme.
ICICS 2005: 72-83 |
17 | EE | Tetsuya Izu,
Noboru Kunihiro,
Kazuo Ohta,
Takeshi Shimoyama:
Analysis on the Clockwise Transposition Routing for Dedicated Factoring Devices.
WISA 2005: 232-242 |
16 | EE | Tetsuya Izu,
Tsuyoshi Takagi:
Fast Elliptic Curve Multiplications Resistant against Side Channel Attacks.
IEICE Transactions 88-A(1): 161-171 (2005) |
15 | EE | Dong-Guk Han,
Tetsuya Izu,
Jongin Lim,
Kouichi Sakurai:
Side Channel Cryptanalysis on XTR Public Key Cryptosystem.
IEICE Transactions 88-A(5): 1214-1223 (2005) |
2004 |
14 | | Kouichi Itoh,
Tetsuya Izu,
Masahiko Takenaka:
Efficient Countermeasures against Power Analysis for Elliptic Curve Cryptosystems.
CARDIS 2004: 99-114 |
13 | EE | Dong-Guk Han,
Tetsuya Izu,
Jongin Lim,
Kouichi Sakurai:
Modified Power-Analysis Attacks on XTR and an Efficient Countermeasure.
ICICS 2004: 305-317 |
12 | EE | Tetsuya Izu:
A Note on the Lattice Factoring Method.
IEICE Transactions 87-A(1): 221-223 (2004) |
11 | EE | Tetsuya Izu,
Tsuyoshi Takagi:
Fast Elliptic Curve Multiplications with SIMD Operations.
IEICE Transactions 87-A(1): 85-93 (2004) |
2003 |
10 | EE | Kouichi Itoh,
Tetsuya Izu,
Masahiko Takenaka:
A Practical Countermeasure against Address-Bit Differential Power Analysis.
CHES 2003: 382-396 |
9 | EE | Tetsuya Izu,
Tsuyoshi Takagi:
Exceptional Procedure Attack on Elliptic Curve Cryptosystems.
Public Key Cryptography 2003: 224-239 |
2002 |
8 | EE | Kouichi Itoh,
Tetsuya Izu,
Masahiko Takenaka:
Address-Bit Differential Power Analysis of Cryptographic Schemes OK-ECDH and OK-ECDSA.
CHES 2002: 129-143 |
7 | EE | Tetsuya Izu,
Tsuyoshi Takagi:
Fast Elliptic Curve Multiplications with SIMD Operations.
ICICS 2002: 217-230 |
6 | EE | Tetsuya Izu,
Tsuyoshi Takagi:
Efficient Computations of the Tate Pairingfor the Large MOV Degrees.
ICISC 2002: 283-297 |
5 | EE | Tetsuya Izu,
Bodo Möller,
Tsuyoshi Takagi:
Improved Elliptic Curve Multiplication Methods Resistant against Side Channel Attacks.
INDOCRYPT 2002: 296-313 |
4 | EE | Tetsuya Izu,
Tsuyoshi Takagi:
A Fast Parallel Elliptic Curve Multiplication Resistant against Side Channel Attacks.
Public Key Cryptography 2002: 280-296 |
2000 |
3 | | Tetsuya Izu,
Jun Kogure,
Kazuhiro Yokoyama:
Efficient Implementation of Schoof's Algorithm in Case of Characteristic 2.
Public Key Cryptography 2000: 210-222 |
1998 |
2 | EE | Tetsuya Izu,
Jun Kogure,
Masayuki Noro,
Kazuhiro Yokoyama:
Efficient Implementation of Schoof's Algorithm.
ASIACRYPT 1998: 66-79 |
1 | EE | Tetsuya Izu,
Jun Kogure,
Masayuki Noro,
Kazuhiro Yokoyama:
Parameters for Secure Elliptic Curve Cryptosystem - Improvements on Schoof's Algorithm.
Public Key Cryptography 1998: 253-257 |