2009 | ||
---|---|---|
99 | EE | Fagen Li, Masaaki Shirase, Tsuyoshi Takagi: Certificateless Hybrid Signcryption. ISPEC 2009: 112-123 |
2008 | ||
98 | EE | Chunhua Su, Feng Bao, Jianying Zhou, Tsuyoshi Takagi, Kouichi Sakurai: A New Scheme for Distributed Density Estimation based Privacy-Preserving Clustering. ARES 2008: 112-119 |
97 | EE | Kyosuke Osaka, Shuang Chang, Tsuyoshi Takagi, Kenichi Yamazaki, Osamu Takahashi: A Secure RFID Protocol based on Insubvertible Encryption Using Guardian Proxy. ARES 2008: 733-740 |
96 | EE | Fagen Li, Masaaki Shirase, Tsuyoshi Takagi: On the Security of Online/Offline Signatures and Multisignatures from ACISP'06. CANS 2008: 108-119 |
95 | EE | Masaaki Shirase, Tsuyoshi Takagi, Eiji Okamoto: An Efficient Countermeasure against Side Channel Attacks for Pairing Computation. ISPEC 2008: 290-303 |
94 | EE | Keisuke Hakuta, Hisayoshi Sato, Tsuyoshi Takagi: Efficient Arithmetic on Subfield Elliptic Curves over Small Finite Fields of Odd Characteristic. ISPEC 2008: 304-318 |
93 | EE | Fagen Li, Masaaki Shirase, Tsuyoshi Takagi: Efficient Multi-PKG ID-Based Signcryption for Ad Hoc Networks. Inscrypt 2008: 289-304 |
92 | EE | Fagen Li, Masaaki Shirase, Tsuyoshi Takagi: Efficient Signcryption Key Encapsulation without Random Oracles. Inscrypt 2008: 47-59 |
91 | EE | Akira Otaka, Tsuyoshi Takagi, Osamu Takahashi: Network Forensics on Mobile Ad-Hoc Networks. KES (3) 2008: 175-182 |
90 | EE | Fagen Li, Masaaki Shirase, Tsuyoshi Takagi: Key Management Using Certificateless Public Key Cryptography in Ad Hoc Networks. NPC 2008: 116-126 |
89 | EE | Erik Dahmen, Katsuyuki Okeya, Tsuyoshi Takagi, Camille Vuillaume: Digital Signatures Out of Second-Preimage Resistant Hash Functions. PQCrypto 2008: 109-123 |
88 | EE | Yuto Kawahara, Kazumaro Aoki, Tsuyoshi Takagi: Faster Implementation of eta-T Pairing over GF(3m) Using Minimum Number of Logical Instructions for GF(3)-Addition. Pairing 2008: 282-296 |
87 | EE | Jean-Luc Beuchat, Nicolas Brisebarre, Jérémie Detrey, Eiji Okamoto, Masaaki Shirase, Tsuyoshi Takagi: Algorithms and Arithmetic Operators for Computing the etaT Pairing in Characteristic Three. IEEE Trans. Computers 57(11): 1454-1468 (2008) |
86 | EE | Camille Vuillaume, Katsuyuki Okeya, Tsuyoshi Takagi: Short-Memory Scalar Multiplication for Koblitz Curves. IEEE Trans. Computers 57(4): 481-489 (2008) |
85 | EE | Masaaki Shirase, Tsuyoshi Takagi, Eiji Okamoto: Some Efficient Algorithms for the Final Exponentiation of etaT Pairing. IEICE Transactions 91-A(1): 221-228 (2008) |
84 | EE | Toshiya Nakajima, Tetsuya Izu, Tsuyoshi Takagi: Reduction Optimal Trinomials for Efficient Software Implementation of the etaT Pairing. IEICE Transactions 91-A(9): 2379-2386 (2008) |
83 | EE | Motoi Yoshitomi, Tsuyoshi Takagi, Shinsaku Kiyomoto, Toshiaki Tanaka: Efficient Implementation of the Pairing on Mobilephones Using BREW. IEICE Transactions 91-D(5): 1330-1337 (2008) |
2007 | ||
82 | Tsuyoshi Takagi, Tatsuaki Okamoto, Eiji Okamoto, Takeshi Okamoto: Pairing-Based Cryptography - Pairing 2007, First International Conference, Tokyo, Japan, July 2-4, 2007, Proceedings Springer 2007 | |
81 | EE | Masaaki Shirase, Dong-Guk Han, Yasushi Hibino, Ho Won Kim, Tsuyoshi Takagi: Compressed XTR. ACNS 2007: 420-431 |
80 | EE | Chunhua Su, Feng Bao, Jianying Zhou, Tsuyoshi Takagi, Kouichi Sakurai: Privacy-Preserving Two-Party K-Means Clustering via Secure Approximation. AINA Workshops (1) 2007: 385-391 |
79 | EE | Eun-Kyung Ryu, Tsuyoshi Takagi: Efficient Conjunctive Keyword-Searchable Encryption. AINA Workshops (1) 2007: 409-414 |
78 | EE | Jean-Luc Beuchat, Masaaki Shirase, Tsuyoshi Takagi, Eiji Okamoto: An Algorithm for the nt Pairing Calculation in Characteristic Three and its Hardware Implementation. IEEE Symposium on Computer Arithmetic 2007: 97-104 |
77 | EE | Chunhua Su, Jianying Zhou, Feng Bao, Tsuyoshi Takagi, Kouichi Sakurai: Two-Party Privacy-Preserving Agglomerative Document Clustering. ISPEC 2007: 193-208 |
76 | EE | Masaaki Shirase, Tsuyoshi Takagi, Eiji Okamoto: Some Efficient Algorithms for the Final Exponentiation of eta T Pairing. ISPEC 2007: 254-268 |
75 | EE | Toshiya Nakajima, Tetsuya Izu, Tsuyoshi Takagi: Reduction Optimal Trinomials for Efficient Software Implementation of the etaT Pairing. IWSEC 2007: 44-57 |
74 | EE | Jean-Luc Beuchat, Nicolas Brisebarre, Masaaki Shirase, Tsuyoshi Takagi, Eiji Okamoto: A Coprocessor for the Final Exponentiation of the eta T Pairing in Characteristic Three. WAIFI 2007: 25-39 |
73 | EE | Masaaki Shirase, Yuto Kawahara, Tsuyoshi Takagi, Eiji Okamoto: Universal etaT Pairing Algorithm over Arbitrary Extension Degree. WISA 2007: 1-15 |
72 | EE | Motoi Yoshitomi, Tsuyoshi Takagi, Shinsaku Kiyomoto, Toshiaki Tanaka: Efficient Implementation of the Pairing on Mobilephones Using BREW. WISA 2007: 203-214 |
71 | EE | Erik Dahmen, Katsuyuki Okeya, Tsuyoshi Takagi: A New Upper Bound for the Minimal Density of Joint Representations in Elliptic Curve Cryptosystems. IEICE Transactions 90-A(5): 952-959 (2007) |
2006 | ||
70 | EE | Kaoru Kurosawa, Tsuyoshi Takagi: New Approach for Selectively Convertible Undeniable Signature Schemes. ASIACRYPT 2006: 428-443 |
69 | EE | Tae-Hyun Kim, Tsuyoshi Takagi, Dong-Guk Han, Ho Won Kim, Jongin Lim: Side Channel Attacks and Countermeasures on Pairing Based Cryptosystems over Binary Fields. CANS 2006: 168-181 |
68 | EE | Toru Akishita, Tsuyoshi Takagi: Power Analysis to ECC Using Differential Power Between Multiplication and Squaring. CARDIS 2006: 151-164 |
67 | EE | Yuto Kawahara, Tsuyoshi Takagi, Eiji Okamoto: Efficient Implementation of Tate Pairing on a Mobile Phone Using Java. CIS 2006: 396-405 |
66 | EE | Kyosuke Osaka, Tsuyoshi Takagi, Kenichi Yamazaki, Osamu Takahashi: An Efficient and Secure RFID Security Method with Ownership Transfer. CIS 2006: 778-787 |
65 | EE | Dong-Guk Han, Tsuyoshi Takagi, Howon Kim, Kyoil Chung: New Security Problem in RFID Systems "Tag Killing". ICCSA (3) 2006: 375-384 |
64 | EE | Dong-Guk Han, Tsuyoshi Takagi, Jongin Lim: Further Security Analysis of XTR. ISPEC 2006: 33-44 |
63 | EE | Katja Schmidt-Samoa, Olivier Semay, Tsuyoshi Takagi: Analysis of Fractional Window Recoding Methods and Their Application to Elliptic Curve Cryptosystems. IEEE Trans. Computers 55(1): 48-57 (2006) |
62 | EE | Tsuyoshi Takagi, David Reis Jr., Sung-Ming Yen, Bo-Ching Wu: Radix-r Non-Adjacent Form and Its Application to Pairing-Based Cryptosystem. IEICE Transactions 89-A(1): 115-123 (2006) |
61 | EE | Masanobu Katagi, Toru Akishita, Izuru Kitamura, Tsuyoshi Takagi: Efficient Hyperelliptic Curve Cryptosystems Using Theta Divisors. IEICE Transactions 89-A(1): 151-160 (2006) |
60 | EE | Katsuyuki Okeya, Tsuyoshi Takagi, Camille Vuillaume: Security Analysis of the SPA-Resistant Fractional Width Method. IEICE Transactions 89-A(1): 161-168 (2006) |
59 | EE | Hisayoshi Sato, Tsuyoshi Takagi, Satoru Tezuka, Kazuo Takaragi: Generalized Powering Functions and Their Application to Digital Signatures. IEICE Transactions 89-A(1): 81-89 (2006) |
58 | EE | Camille Vuillaume, Katsuyuki Okeya, Tsuyoshi Takagi: Defeating Simple Power Analysis on Koblitz Curves. IEICE Transactions 89-A(5): 1362-1369 (2006) |
57 | EE | Katsuyuki Okeya, Tsuyoshi Takagi: Security analysis of CRT-based cryptosystems. Int. J. Inf. Sec. 5(3): 177-185 (2006) |
2005 | ||
56 | EE | Izuru Kitamura, Masanobu Katagi, Tsuyoshi Takagi: A Complete Divisor Class Halving Algorithm for Hyperelliptic Curve Cryptosystems of Genus Two. ACISP 2005: 146-157 |
55 | EE | Katsuyuki Okeya, Tsuyoshi Takagi, Camille Vuillaume: Efficient Representations on Koblitz Curves with Resistance to Side Channel Attacks. ACISP 2005: 218-229 |
54 | EE | Katsuyuki Okeya, Tsuyoshi Takagi, Camille Vuillaume: Short Memory Scalar Multiplication on Koblitz Curves. CHES 2005: 91-105 |
53 | EE | Lihua Wang, Takeshi Okamoto, Tsuyoshi Takagi, Eiji Okamoto: Insider Impersonation-MIM Attack to Tripartite Key Agreement Scheme and an Efficient Protocol for Multiple Keys. CIS (2) 2005: 198-203 |
52 | Raylin Tso, Takeshi Okamoto, Tsuyoshi Takagi, Eiji Okamoto: An id-based non-interactive tripartite key agreement protocol with K-resilience. Communications and Computer Networks 2005: 38-42 | |
51 | EE | Erik Dahmen, Katsuyuki Okeya, Tsuyoshi Takagi: An Advanced Method for Joint Scalar Multiplications on Memory Constraint Devices. ESAS 2005: 189-204 |
50 | EE | Dong-Guk Han, Tsuyoshi Takagi, Tae-Hyun Kim, Howon Kim, Kyoil Chung: Collision Attack on XTR and a Countermeasure with a Fixed Pattern. EUC Workshops 2005: 864-873 |
49 | EE | Katja Schmidt-Samoa, Tsuyoshi Takagi: Paillier's Cryptosystem Modulo p2q and Its Applications to Trapdoor Commitment Schemes. Mycrypt 2005: 296-313 |
48 | EE | Katsuyuki Okeya, Tsuyoshi Takagi, Camille Vuillaume: On the Importance of Protecting in SFLASH against Side Channel Attacks. IEICE Transactions 88-A(1): 123-131 (2005) |
47 | EE | Toru Akishita, Tsuyoshi Takagi: Zero-Value Register Attack on Elliptic Curve Cryptosystem. IEICE Transactions 88-A(1): 132-139 (2005) |
46 | EE | Toru Akishita, Tsuyoshi Takagi: On the Optimal Parameter Choice for Elliptic Curve Cryptosystems Using Isogeny. IEICE Transactions 88-A(1): 140-146 (2005) |
45 | EE | Tetsuya Izu, Tsuyoshi Takagi: Fast Elliptic Curve Multiplications Resistant against Side Channel Attacks. IEICE Transactions 88-A(1): 161-171 (2005) |
2004 | ||
44 | EE | Katsuyuki Okeya, Tsuyoshi Takagi, Camille Vuillaume: On the Exact Flexibility of the Flexible Countermeasure Against Side Channel Attacks. ACISP 2004: 466-477 |
43 | EE | Katsuyuki Okeya, Tsuyoshi Takagi: Security Analysis of CRT-Based Cryptosystems. ACNS 2004: 383-397 |
42 | EE | Katsuyuki Okeya, Katja Schmidt-Samoa, Christian Spahn, Tsuyoshi Takagi: Signed Binary Representations Revisited. CRYPTO 2004: 123-139 |
41 | EE | Masanobu Katagi, Toru Akishita, Izuru Kitamura, Tsuyoshi Takagi: Some Improved Algorithms for Hyperelliptic Curve Cryptosystems Using Degenerate Divisors. ICISC 2004: 296-312 |
40 | EE | Yukiko Hoshino, Tsuyoshi Takagi, Ugo Di Profio, Masahiro Fujita: Behavior Description and Control using Behavior Module for Personal Robot. ICRA 2004: 4165-4171 |
39 | EE | David Galindo, Sebastià Martín Molleví, Tsuyoshi Takagi, Jorge Luis Villar: A Provably Secure Elliptic Curve Scheme with Fast Encryption. INDOCRYPT 2004: 245-259 |
38 | EE | Hisayoshi Sato, Daniel Schepers, Tsuyoshi Takagi: Exact Analysis of Montgomery Multiplication. INDOCRYPT 2004: 290-304 |
37 | EE | Tsuyoshi Takagi, Sung-Ming Yen, Bo-Ching Wu: Radix-r Non-Adjacent Form. ISC 2004: 99-110 |
36 | EE | Katsuyuki Okeya, Tsuyoshi Takagi, Camille Vuillaume: On the Importance of Protecting Delta in SFLASH against Side Channel Attacks. ITCC (2) 2004: 560-568 |
35 | EE | Toru Akishita, Tsuyoshi Takagi: On the Optimal Parameter Choice for Elliptic Curve Cryptosystems Using Isogeny. Public Key Cryptography 2004: 346-359 |
34 | EE | Masanobu Katagi, Izuru Kitamura, Toru Akishita, Tsuyoshi Takagi: Novel Efficient Implementations of Hyperelliptic Curve Cryptosystems Using Degenerate Divisors. WISA 2004: 345-359 |
33 | EE | Ingrid Biehl, Sachar Paulus, Tsuyoshi Takagi: Efficient Undeniable Signature Schemes Based on Ideal Arithmetic in Quadratic Orders. Des. Codes Cryptography 31(2): 99-123 (2004) |
32 | EE | Katsuyuki Okeya, Tsuyoshi Takagi: SCA-Resistant and Fast Elliptic Scalar Multiplication Based on wNAF. IEICE Transactions 87-A(1): 75-84 (2004) |
31 | EE | Tetsuya Izu, Tsuyoshi Takagi: Fast Elliptic Curve Multiplications with SIMD Operations. IEICE Transactions 87-A(1): 85-93 (2004) |
30 | EE | Tsuyoshi Takagi: A Fast RSA-Type Public-Key Primitive Modulo pkq Using Hensel Lifting. IEICE Transactions 87-A(1): 94-101 (2004) |
2003 | ||
29 | EE | Kaoru Kurosawa, Tsuyoshi Takagi: Some RSA-Based Encryption Schemes with Tight Security Reduction. ASIACRYPT 2003: 19-36 |
28 | EE | Hisayoshi Sato, Tsuyoshi Takagi, Satoru Tezuka, Kazuo Takaragi: Generalized Powering Functions and Their Application to Digital Signatures. ASIACRYPT 2003: 434-451 |
27 | EE | Kaoru Kurosawa, Katja Schmidt-Samoa, Tsuyoshi Takagi: A Complete and Explicit Security Reduction Algorithm for RSA-Based Cryptosystems. ASIACRYPT 2003: 474-491 |
26 | EE | Katsuyuki Okeya, Tsuyoshi Takagi: A More Flexible Countermeasure against Side Channel Attacks Using Window Method. CHES 2003: 397-410 |
25 | EE | Katsuyuki Okeya, Tsuyoshi Takagi: The Width-w NAF Method Provides Small Memory and Fast Elliptic Scalar Multiplications Secure against Side Channel Attacks. CT-RSA 2003: 328-342 |
24 | EE | Toru Akishita, Tsuyoshi Takagi: Zero-Value Point Attacks on Elliptic Curve Cryptosystem. ISC 2003: 218-233 |
23 | EE | Tetsuya Izu, Tsuyoshi Takagi: Exceptional Procedure Attack on Elliptic Curve Cryptosystems. Public Key Cryptography 2003: 224-239 |
22 | EE | Ronald C. Arkin, Masahiro Fujita, Tsuyoshi Takagi, Rika Hasegawa: An ethological and emotional basis for human-robot interaction. Robotics and Autonomous Systems 42(3-4): 191-201 (2003) |
2002 | ||
21 | EE | Ingrid Biehl, Tsuyoshi Takagi: A New Distributed Primality Test for Shared RSA Keys Using Quadratic Fields. ACISP 2002: 1-16 |
20 | EE | Kouichi Sakurai, Tsuyoshi Takagi: On the Security of a Modified Paillier Public-Key Primitive. ACISP 2002: 436-448 |
19 | EE | Tetsuya Izu, Tsuyoshi Takagi: Fast Elliptic Curve Multiplications with SIMD Operations. ICICS 2002: 217-230 |
18 | EE | Tetsuya Izu, Tsuyoshi Takagi: Efficient Computations of the Tate Pairingfor the Large MOV Degrees. ICISC 2002: 283-297 |
17 | EE | Kouichi Sakurai, Tsuyoshi Takagi: A Reject Timing Attackon an IND-CCA2 Public-Key Cryptosystem. ICISC 2002: 359-373 |
16 | EE | Tetsuya Izu, Bodo Möller, Tsuyoshi Takagi: Improved Elliptic Curve Multiplication Methods Resistant against Side Channel Attacks. INDOCRYPT 2002: 296-313 |
15 | EE | Kouichi Sakurai, Tsuyoshi Takagi: New Semantically Secure Public-Key Cryptosystems from the RSA-Primitive. Public Key Cryptography 2002: 1-16 |
14 | EE | Tetsuya Izu, Tsuyoshi Takagi: A Fast Parallel Elliptic Curve Multiplication Resistant against Side Channel Attacks. Public Key Cryptography 2002: 280-296 |
2001 | ||
13 | EE | Masahiro Fujita, Gabriel Costa, Rika Hasegawa, Tsuyoshi Takagi, Jun Yokono, Hideki Shimomura: Architecture and preliminary experimental results for emotionally grounded symbol acquisition. Agents 2001: 35-36 |
12 | EE | Johannes Buchmann, Kouichi Sakurai, Tsuyoshi Takagi: An IND-CCA2 Public-Key Cryptosystem with Fast Decryption. ICISC 2001: 51-71 |
11 | Ronald C. Arkin, Masahiro Fujita, Tsuyoshi Takagi, Rika Hasegawa: Ethological Modeling and Architecture for an Entertainment Robot. ICRA 2001: 453-458 | |
10 | Marc Joye, Jean-Jacques Quisquater, Tsuyoshi Takagi: How to Choose Secret Parameters for RSA-Type Cryptosystems over Elliptic Curves. Des. Codes Cryptography 23(3): 297-316 (2001) | |
2000 | ||
9 | EE | Sachar Paulus, Tsuyoshi Takagi: A New Public-Key Cryptosystem over a Quadratic Order with Quadratic Decryption Time. J. Cryptology 13(2): 263-272 (2000) |
1999 | ||
8 | Detlef Hühnlein, Tsuyoshi Takagi: Reducing Logarithms in Totally Non-maximal Imaginary Quadratic Orders to Logarithms in Finite Fields. ASIACRYPT 1999: 219-231 | |
7 | EE | Michael Hartmann, Sachar Paulus, Tsuyoshi Takagi: NICE - New Ideal Coset Encryption. CHES 1999: 328-339 |
1998 | ||
6 | EE | Tsuyoshi Takagi: Fast RSA-Type Cryptosystem Modulo pkq. CRYPTO 1998: 318-326 |
5 | EE | Detlef Hühnlein, Michael J. Jacobson Jr., Sachar Paulus, Tsuyoshi Takagi: A Cryptosystem Based on Non-maximal Imaginary Quadratic Orders with Fast Decryption. EUROCRYPT 1998: 294-307 |
4 | Sachar Paulus, Tsuyoshi Takagi: A generalization of the Diffie-Hellman problem and related cryptosystems allowing fast decryption. ICISC 1998: 211-220 | |
3 | Detlef Hühnlein, Andreas Meyer, Tsuyoshi Takagi: Rabin and RSA analogues based on non-maximal imaginary quadratic orders. ICISC 1998: 221-240 | |
1997 | ||
2 | EE | Tsuyoshi Takagi: Fast RSA-Type Cryptosystems Using N-Adic Expansion. CRYPTO 1997: 372-384 |
1996 | ||
1 | Tsuyoshi Takagi, Shozo Naito: The Multi-variable Modular Polynomial and Its Applications to Cryptography. ISAAC 1996: 386-396 |