dblp.uni-trier.dewww.uni-trier.de

Tetsuya Izu

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeer - CSB - Google - MSN - Yahoo

2008
27EETetsuya Izu, Noboru Kunihiro, Kazuo Ohta, Makoto Sano, Masahiko Takenaka: Sanitizable and Deletable Signature. WISA 2008: 130-144
26EEToshiya Nakajima, Tetsuya Izu, Tsuyoshi Takagi: Reduction Optimal Trinomials for Efficient Software Implementation of the etaT Pairing. IEICE Transactions 91-A(9): 2379-2386 (2008)
2007
25EETetsuya Izu, Masahiko Takenaka, Takeshi Shimoyama: Analysis on Bleichenbacher's Forgery Attack. ARES 2007: 1167-1174
24EETetsuya Izu, Jun Kogure, Takeshi Shimoyama: CAIRN 2: An FPGA Implementation of the Sieving Step in the Number Field Sieve Method. CHES 2007: 364-377
23EETetsuya Izu, Takeshi Shimoyama, Masahiko Takenaka: How to Forge a Time-Stamp Which Adobe's Acrobat Accepts. IMA Int. Conf. 2007: 54-72
22EETetsuya Izu, Noboru Kunihiro, Kazuo Ohta, Masahiko Takenaka, Takashi Yoshioka: A Sanitizable Signature Scheme with Aggregation. ISPEC 2007: 51-64
21EEToshiya Nakajima, Tetsuya Izu, Tsuyoshi Takagi: Reduction Optimal Trinomials for Efficient Software Implementation of the etaT Pairing. IWSEC 2007: 44-57
20EETetsuya Izu, Jun Kogure, Takeshi Koshiba, Takeshi Shimoyama: Low-density attack revisited. Des. Codes Cryptography 43(1): 47-59 (2007)
2006
19EEKouichi Itoh, Tetsuya Izu, Masahiko Takenaka: Improving the Randomized Initial Point Countermeasure Against DPA. ACNS 2006: 459-469
2005
18EETetsuya Izu, Nobuyuki Kanaya, Masahiko Takenaka, Takashi Yoshioka: PIATS: A Partially Sanitizable Signature Scheme. ICICS 2005: 72-83
17EETetsuya Izu, Noboru Kunihiro, Kazuo Ohta, Takeshi Shimoyama: Analysis on the Clockwise Transposition Routing for Dedicated Factoring Devices. WISA 2005: 232-242
16EETetsuya Izu, Tsuyoshi Takagi: Fast Elliptic Curve Multiplications Resistant against Side Channel Attacks. IEICE Transactions 88-A(1): 161-171 (2005)
15EEDong-Guk Han, Tetsuya Izu, Jongin Lim, Kouichi Sakurai: Side Channel Cryptanalysis on XTR Public Key Cryptosystem. IEICE Transactions 88-A(5): 1214-1223 (2005)
2004
14 Kouichi Itoh, Tetsuya Izu, Masahiko Takenaka: Efficient Countermeasures against Power Analysis for Elliptic Curve Cryptosystems. CARDIS 2004: 99-114
13EEDong-Guk Han, Tetsuya Izu, Jongin Lim, Kouichi Sakurai: Modified Power-Analysis Attacks on XTR and an Efficient Countermeasure. ICICS 2004: 305-317
12EETetsuya Izu: A Note on the Lattice Factoring Method. IEICE Transactions 87-A(1): 221-223 (2004)
11EETetsuya Izu, Tsuyoshi Takagi: Fast Elliptic Curve Multiplications with SIMD Operations. IEICE Transactions 87-A(1): 85-93 (2004)
2003
10EEKouichi Itoh, Tetsuya Izu, Masahiko Takenaka: A Practical Countermeasure against Address-Bit Differential Power Analysis. CHES 2003: 382-396
9EETetsuya Izu, Tsuyoshi Takagi: Exceptional Procedure Attack on Elliptic Curve Cryptosystems. Public Key Cryptography 2003: 224-239
2002
8EEKouichi Itoh, Tetsuya Izu, Masahiko Takenaka: Address-Bit Differential Power Analysis of Cryptographic Schemes OK-ECDH and OK-ECDSA. CHES 2002: 129-143
7EETetsuya Izu, Tsuyoshi Takagi: Fast Elliptic Curve Multiplications with SIMD Operations. ICICS 2002: 217-230
6EETetsuya Izu, Tsuyoshi Takagi: Efficient Computations of the Tate Pairingfor the Large MOV Degrees. ICISC 2002: 283-297
5EETetsuya Izu, Bodo Möller, Tsuyoshi Takagi: Improved Elliptic Curve Multiplication Methods Resistant against Side Channel Attacks. INDOCRYPT 2002: 296-313
4EETetsuya Izu, Tsuyoshi Takagi: A Fast Parallel Elliptic Curve Multiplication Resistant against Side Channel Attacks. Public Key Cryptography 2002: 280-296
2000
3 Tetsuya Izu, Jun Kogure, Kazuhiro Yokoyama: Efficient Implementation of Schoof's Algorithm in Case of Characteristic 2. Public Key Cryptography 2000: 210-222
1998
2EETetsuya Izu, Jun Kogure, Masayuki Noro, Kazuhiro Yokoyama: Efficient Implementation of Schoof's Algorithm. ASIACRYPT 1998: 66-79
1EETetsuya Izu, Jun Kogure, Masayuki Noro, Kazuhiro Yokoyama: Parameters for Secure Elliptic Curve Cryptosystem - Improvements on Schoof's Algorithm. Public Key Cryptography 1998: 253-257

Coauthor Index

1Dong-Guk Han [13] [15]
2Kouichi Itoh [8] [10] [14] [19]
3Nobuyuki Kanaya [18]
4Jun Kogure [1] [2] [3] [20] [24]
5Takeshi Koshiba [20]
6Noboru Kunihiro [17] [22] [27]
7Jongin Lim (Jong In Lim) [13] [15]
8Bodo Möller [5]
9Toshiya Nakajima [21] [26]
10Masayuki Noro [1] [2]
11Kazuo Ohta [17] [22] [27]
12Kouichi Sakurai [13] [15]
13Makoto Sano [27]
14Takeshi Shimoyama [17] [20] [23] [24] [25]
15Tsuyoshi Takagi [4] [5] [6] [7] [9] [11] [16] [21] [26]
16Masahiko Takenaka [8] [10] [14] [18] [19] [22] [23] [25] [27]
17Kazuhiro Yokoyama [1] [2] [3]
18Takashi Yoshioka [18] [22]

Colors in the list of coauthors

Copyright © Sun May 17 03:24:02 2009 by Michael Ley (ley@uni-trier.de)