dblp.uni-trier.dewww.uni-trier.de

Tsuyoshi Takagi

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeer - CSB - Google - MSN - Yahoo
Home Page

2009
99EEFagen Li, Masaaki Shirase, Tsuyoshi Takagi: Certificateless Hybrid Signcryption. ISPEC 2009: 112-123
2008
98EEChunhua Su, Feng Bao, Jianying Zhou, Tsuyoshi Takagi, Kouichi Sakurai: A New Scheme for Distributed Density Estimation based Privacy-Preserving Clustering. ARES 2008: 112-119
97EEKyosuke Osaka, Shuang Chang, Tsuyoshi Takagi, Kenichi Yamazaki, Osamu Takahashi: A Secure RFID Protocol based on Insubvertible Encryption Using Guardian Proxy. ARES 2008: 733-740
96EEFagen Li, Masaaki Shirase, Tsuyoshi Takagi: On the Security of Online/Offline Signatures and Multisignatures from ACISP'06. CANS 2008: 108-119
95EEMasaaki Shirase, Tsuyoshi Takagi, Eiji Okamoto: An Efficient Countermeasure against Side Channel Attacks for Pairing Computation. ISPEC 2008: 290-303
94EEKeisuke Hakuta, Hisayoshi Sato, Tsuyoshi Takagi: Efficient Arithmetic on Subfield Elliptic Curves over Small Finite Fields of Odd Characteristic. ISPEC 2008: 304-318
93EEFagen Li, Masaaki Shirase, Tsuyoshi Takagi: Efficient Multi-PKG ID-Based Signcryption for Ad Hoc Networks. Inscrypt 2008: 289-304
92EEFagen Li, Masaaki Shirase, Tsuyoshi Takagi: Efficient Signcryption Key Encapsulation without Random Oracles. Inscrypt 2008: 47-59
91EEAkira Otaka, Tsuyoshi Takagi, Osamu Takahashi: Network Forensics on Mobile Ad-Hoc Networks. KES (3) 2008: 175-182
90EEFagen Li, Masaaki Shirase, Tsuyoshi Takagi: Key Management Using Certificateless Public Key Cryptography in Ad Hoc Networks. NPC 2008: 116-126
89EEErik Dahmen, Katsuyuki Okeya, Tsuyoshi Takagi, Camille Vuillaume: Digital Signatures Out of Second-Preimage Resistant Hash Functions. PQCrypto 2008: 109-123
88EEYuto Kawahara, Kazumaro Aoki, Tsuyoshi Takagi: Faster Implementation of eta-T Pairing over GF(3m) Using Minimum Number of Logical Instructions for GF(3)-Addition. Pairing 2008: 282-296
87EEJean-Luc Beuchat, Nicolas Brisebarre, Jérémie Detrey, Eiji Okamoto, Masaaki Shirase, Tsuyoshi Takagi: Algorithms and Arithmetic Operators for Computing the etaT Pairing in Characteristic Three. IEEE Trans. Computers 57(11): 1454-1468 (2008)
86EECamille Vuillaume, Katsuyuki Okeya, Tsuyoshi Takagi: Short-Memory Scalar Multiplication for Koblitz Curves. IEEE Trans. Computers 57(4): 481-489 (2008)
85EEMasaaki Shirase, Tsuyoshi Takagi, Eiji Okamoto: Some Efficient Algorithms for the Final Exponentiation of etaT Pairing. IEICE Transactions 91-A(1): 221-228 (2008)
84EEToshiya Nakajima, Tetsuya Izu, Tsuyoshi Takagi: Reduction Optimal Trinomials for Efficient Software Implementation of the etaT Pairing. IEICE Transactions 91-A(9): 2379-2386 (2008)
83EEMotoi Yoshitomi, Tsuyoshi Takagi, Shinsaku Kiyomoto, Toshiaki Tanaka: Efficient Implementation of the Pairing on Mobilephones Using BREW. IEICE Transactions 91-D(5): 1330-1337 (2008)
2007
82 Tsuyoshi Takagi, Tatsuaki Okamoto, Eiji Okamoto, Takeshi Okamoto: Pairing-Based Cryptography - Pairing 2007, First International Conference, Tokyo, Japan, July 2-4, 2007, Proceedings Springer 2007
81EEMasaaki Shirase, Dong-Guk Han, Yasushi Hibino, Ho Won Kim, Tsuyoshi Takagi: Compressed XTR. ACNS 2007: 420-431
80EEChunhua Su, Feng Bao, Jianying Zhou, Tsuyoshi Takagi, Kouichi Sakurai: Privacy-Preserving Two-Party K-Means Clustering via Secure Approximation. AINA Workshops (1) 2007: 385-391
79EEEun-Kyung Ryu, Tsuyoshi Takagi: Efficient Conjunctive Keyword-Searchable Encryption. AINA Workshops (1) 2007: 409-414
78EEJean-Luc Beuchat, Masaaki Shirase, Tsuyoshi Takagi, Eiji Okamoto: An Algorithm for the nt Pairing Calculation in Characteristic Three and its Hardware Implementation. IEEE Symposium on Computer Arithmetic 2007: 97-104
77EEChunhua Su, Jianying Zhou, Feng Bao, Tsuyoshi Takagi, Kouichi Sakurai: Two-Party Privacy-Preserving Agglomerative Document Clustering. ISPEC 2007: 193-208
76EEMasaaki Shirase, Tsuyoshi Takagi, Eiji Okamoto: Some Efficient Algorithms for the Final Exponentiation of eta T Pairing. ISPEC 2007: 254-268
75EEToshiya Nakajima, Tetsuya Izu, Tsuyoshi Takagi: Reduction Optimal Trinomials for Efficient Software Implementation of the etaT Pairing. IWSEC 2007: 44-57
74EEJean-Luc Beuchat, Nicolas Brisebarre, Masaaki Shirase, Tsuyoshi Takagi, Eiji Okamoto: A Coprocessor for the Final Exponentiation of the eta T Pairing in Characteristic Three. WAIFI 2007: 25-39
73EEMasaaki Shirase, Yuto Kawahara, Tsuyoshi Takagi, Eiji Okamoto: Universal etaT Pairing Algorithm over Arbitrary Extension Degree. WISA 2007: 1-15
72EEMotoi Yoshitomi, Tsuyoshi Takagi, Shinsaku Kiyomoto, Toshiaki Tanaka: Efficient Implementation of the Pairing on Mobilephones Using BREW. WISA 2007: 203-214
71EEErik Dahmen, Katsuyuki Okeya, Tsuyoshi Takagi: A New Upper Bound for the Minimal Density of Joint Representations in Elliptic Curve Cryptosystems. IEICE Transactions 90-A(5): 952-959 (2007)
2006
70EEKaoru Kurosawa, Tsuyoshi Takagi: New Approach for Selectively Convertible Undeniable Signature Schemes. ASIACRYPT 2006: 428-443
69EETae-Hyun Kim, Tsuyoshi Takagi, Dong-Guk Han, Ho Won Kim, Jongin Lim: Side Channel Attacks and Countermeasures on Pairing Based Cryptosystems over Binary Fields. CANS 2006: 168-181
68EEToru Akishita, Tsuyoshi Takagi: Power Analysis to ECC Using Differential Power Between Multiplication and Squaring. CARDIS 2006: 151-164
67EEYuto Kawahara, Tsuyoshi Takagi, Eiji Okamoto: Efficient Implementation of Tate Pairing on a Mobile Phone Using Java. CIS 2006: 396-405
66EEKyosuke Osaka, Tsuyoshi Takagi, Kenichi Yamazaki, Osamu Takahashi: An Efficient and Secure RFID Security Method with Ownership Transfer. CIS 2006: 778-787
65EEDong-Guk Han, Tsuyoshi Takagi, Howon Kim, Kyoil Chung: New Security Problem in RFID Systems "Tag Killing". ICCSA (3) 2006: 375-384
64EEDong-Guk Han, Tsuyoshi Takagi, Jongin Lim: Further Security Analysis of XTR. ISPEC 2006: 33-44
63EEKatja Schmidt-Samoa, Olivier Semay, Tsuyoshi Takagi: Analysis of Fractional Window Recoding Methods and Their Application to Elliptic Curve Cryptosystems. IEEE Trans. Computers 55(1): 48-57 (2006)
62EETsuyoshi Takagi, David Reis Jr., Sung-Ming Yen, Bo-Ching Wu: Radix-r Non-Adjacent Form and Its Application to Pairing-Based Cryptosystem. IEICE Transactions 89-A(1): 115-123 (2006)
61EEMasanobu Katagi, Toru Akishita, Izuru Kitamura, Tsuyoshi Takagi: Efficient Hyperelliptic Curve Cryptosystems Using Theta Divisors. IEICE Transactions 89-A(1): 151-160 (2006)
60EEKatsuyuki Okeya, Tsuyoshi Takagi, Camille Vuillaume: Security Analysis of the SPA-Resistant Fractional Width Method. IEICE Transactions 89-A(1): 161-168 (2006)
59EEHisayoshi Sato, Tsuyoshi Takagi, Satoru Tezuka, Kazuo Takaragi: Generalized Powering Functions and Their Application to Digital Signatures. IEICE Transactions 89-A(1): 81-89 (2006)
58EECamille Vuillaume, Katsuyuki Okeya, Tsuyoshi Takagi: Defeating Simple Power Analysis on Koblitz Curves. IEICE Transactions 89-A(5): 1362-1369 (2006)
57EEKatsuyuki Okeya, Tsuyoshi Takagi: Security analysis of CRT-based cryptosystems. Int. J. Inf. Sec. 5(3): 177-185 (2006)
2005
56EEIzuru Kitamura, Masanobu Katagi, Tsuyoshi Takagi: A Complete Divisor Class Halving Algorithm for Hyperelliptic Curve Cryptosystems of Genus Two. ACISP 2005: 146-157
55EEKatsuyuki Okeya, Tsuyoshi Takagi, Camille Vuillaume: Efficient Representations on Koblitz Curves with Resistance to Side Channel Attacks. ACISP 2005: 218-229
54EEKatsuyuki Okeya, Tsuyoshi Takagi, Camille Vuillaume: Short Memory Scalar Multiplication on Koblitz Curves. CHES 2005: 91-105
53EELihua Wang, Takeshi Okamoto, Tsuyoshi Takagi, Eiji Okamoto: Insider Impersonation-MIM Attack to Tripartite Key Agreement Scheme and an Efficient Protocol for Multiple Keys. CIS (2) 2005: 198-203
52 Raylin Tso, Takeshi Okamoto, Tsuyoshi Takagi, Eiji Okamoto: An id-based non-interactive tripartite key agreement protocol with K-resilience. Communications and Computer Networks 2005: 38-42
51EEErik Dahmen, Katsuyuki Okeya, Tsuyoshi Takagi: An Advanced Method for Joint Scalar Multiplications on Memory Constraint Devices. ESAS 2005: 189-204
50EEDong-Guk Han, Tsuyoshi Takagi, Tae-Hyun Kim, Howon Kim, Kyoil Chung: Collision Attack on XTR and a Countermeasure with a Fixed Pattern. EUC Workshops 2005: 864-873
49EEKatja Schmidt-Samoa, Tsuyoshi Takagi: Paillier's Cryptosystem Modulo p2q and Its Applications to Trapdoor Commitment Schemes. Mycrypt 2005: 296-313
48EEKatsuyuki Okeya, Tsuyoshi Takagi, Camille Vuillaume: On the Importance of Protecting in SFLASH against Side Channel Attacks. IEICE Transactions 88-A(1): 123-131 (2005)
47EEToru Akishita, Tsuyoshi Takagi: Zero-Value Register Attack on Elliptic Curve Cryptosystem. IEICE Transactions 88-A(1): 132-139 (2005)
46EEToru Akishita, Tsuyoshi Takagi: On the Optimal Parameter Choice for Elliptic Curve Cryptosystems Using Isogeny. IEICE Transactions 88-A(1): 140-146 (2005)
45EETetsuya Izu, Tsuyoshi Takagi: Fast Elliptic Curve Multiplications Resistant against Side Channel Attacks. IEICE Transactions 88-A(1): 161-171 (2005)
2004
44EEKatsuyuki Okeya, Tsuyoshi Takagi, Camille Vuillaume: On the Exact Flexibility of the Flexible Countermeasure Against Side Channel Attacks. ACISP 2004: 466-477
43EEKatsuyuki Okeya, Tsuyoshi Takagi: Security Analysis of CRT-Based Cryptosystems. ACNS 2004: 383-397
42EEKatsuyuki Okeya, Katja Schmidt-Samoa, Christian Spahn, Tsuyoshi Takagi: Signed Binary Representations Revisited. CRYPTO 2004: 123-139
41EEMasanobu Katagi, Toru Akishita, Izuru Kitamura, Tsuyoshi Takagi: Some Improved Algorithms for Hyperelliptic Curve Cryptosystems Using Degenerate Divisors. ICISC 2004: 296-312
40EEYukiko Hoshino, Tsuyoshi Takagi, Ugo Di Profio, Masahiro Fujita: Behavior Description and Control using Behavior Module for Personal Robot. ICRA 2004: 4165-4171
39EEDavid Galindo, Sebastià Martín Molleví, Tsuyoshi Takagi, Jorge Luis Villar: A Provably Secure Elliptic Curve Scheme with Fast Encryption. INDOCRYPT 2004: 245-259
38EEHisayoshi Sato, Daniel Schepers, Tsuyoshi Takagi: Exact Analysis of Montgomery Multiplication. INDOCRYPT 2004: 290-304
37EETsuyoshi Takagi, Sung-Ming Yen, Bo-Ching Wu: Radix-r Non-Adjacent Form. ISC 2004: 99-110
36EEKatsuyuki Okeya, Tsuyoshi Takagi, Camille Vuillaume: On the Importance of Protecting Delta in SFLASH against Side Channel Attacks. ITCC (2) 2004: 560-568
35EEToru Akishita, Tsuyoshi Takagi: On the Optimal Parameter Choice for Elliptic Curve Cryptosystems Using Isogeny. Public Key Cryptography 2004: 346-359
34EEMasanobu Katagi, Izuru Kitamura, Toru Akishita, Tsuyoshi Takagi: Novel Efficient Implementations of Hyperelliptic Curve Cryptosystems Using Degenerate Divisors. WISA 2004: 345-359
33EEIngrid Biehl, Sachar Paulus, Tsuyoshi Takagi: Efficient Undeniable Signature Schemes Based on Ideal Arithmetic in Quadratic Orders. Des. Codes Cryptography 31(2): 99-123 (2004)
32EEKatsuyuki Okeya, Tsuyoshi Takagi: SCA-Resistant and Fast Elliptic Scalar Multiplication Based on wNAF. IEICE Transactions 87-A(1): 75-84 (2004)
31EETetsuya Izu, Tsuyoshi Takagi: Fast Elliptic Curve Multiplications with SIMD Operations. IEICE Transactions 87-A(1): 85-93 (2004)
30EETsuyoshi Takagi: A Fast RSA-Type Public-Key Primitive Modulo pkq Using Hensel Lifting. IEICE Transactions 87-A(1): 94-101 (2004)
2003
29EEKaoru Kurosawa, Tsuyoshi Takagi: Some RSA-Based Encryption Schemes with Tight Security Reduction. ASIACRYPT 2003: 19-36
28EEHisayoshi Sato, Tsuyoshi Takagi, Satoru Tezuka, Kazuo Takaragi: Generalized Powering Functions and Their Application to Digital Signatures. ASIACRYPT 2003: 434-451
27EEKaoru Kurosawa, Katja Schmidt-Samoa, Tsuyoshi Takagi: A Complete and Explicit Security Reduction Algorithm for RSA-Based Cryptosystems. ASIACRYPT 2003: 474-491
26EEKatsuyuki Okeya, Tsuyoshi Takagi: A More Flexible Countermeasure against Side Channel Attacks Using Window Method. CHES 2003: 397-410
25EEKatsuyuki Okeya, Tsuyoshi Takagi: The Width-w NAF Method Provides Small Memory and Fast Elliptic Scalar Multiplications Secure against Side Channel Attacks. CT-RSA 2003: 328-342
24EEToru Akishita, Tsuyoshi Takagi: Zero-Value Point Attacks on Elliptic Curve Cryptosystem. ISC 2003: 218-233
23EETetsuya Izu, Tsuyoshi Takagi: Exceptional Procedure Attack on Elliptic Curve Cryptosystems. Public Key Cryptography 2003: 224-239
22EERonald C. Arkin, Masahiro Fujita, Tsuyoshi Takagi, Rika Hasegawa: An ethological and emotional basis for human-robot interaction. Robotics and Autonomous Systems 42(3-4): 191-201 (2003)
2002
21EEIngrid Biehl, Tsuyoshi Takagi: A New Distributed Primality Test for Shared RSA Keys Using Quadratic Fields. ACISP 2002: 1-16
20EEKouichi Sakurai, Tsuyoshi Takagi: On the Security of a Modified Paillier Public-Key Primitive. ACISP 2002: 436-448
19EETetsuya Izu, Tsuyoshi Takagi: Fast Elliptic Curve Multiplications with SIMD Operations. ICICS 2002: 217-230
18EETetsuya Izu, Tsuyoshi Takagi: Efficient Computations of the Tate Pairingfor the Large MOV Degrees. ICISC 2002: 283-297
17EEKouichi Sakurai, Tsuyoshi Takagi: A Reject Timing Attackon an IND-CCA2 Public-Key Cryptosystem. ICISC 2002: 359-373
16EETetsuya Izu, Bodo Möller, Tsuyoshi Takagi: Improved Elliptic Curve Multiplication Methods Resistant against Side Channel Attacks. INDOCRYPT 2002: 296-313
15EEKouichi Sakurai, Tsuyoshi Takagi: New Semantically Secure Public-Key Cryptosystems from the RSA-Primitive. Public Key Cryptography 2002: 1-16
14EETetsuya Izu, Tsuyoshi Takagi: A Fast Parallel Elliptic Curve Multiplication Resistant against Side Channel Attacks. Public Key Cryptography 2002: 280-296
2001
13EEMasahiro Fujita, Gabriel Costa, Rika Hasegawa, Tsuyoshi Takagi, Jun Yokono, Hideki Shimomura: Architecture and preliminary experimental results for emotionally grounded symbol acquisition. Agents 2001: 35-36
12EEJohannes Buchmann, Kouichi Sakurai, Tsuyoshi Takagi: An IND-CCA2 Public-Key Cryptosystem with Fast Decryption. ICISC 2001: 51-71
11 Ronald C. Arkin, Masahiro Fujita, Tsuyoshi Takagi, Rika Hasegawa: Ethological Modeling and Architecture for an Entertainment Robot. ICRA 2001: 453-458
10 Marc Joye, Jean-Jacques Quisquater, Tsuyoshi Takagi: How to Choose Secret Parameters for RSA-Type Cryptosystems over Elliptic Curves. Des. Codes Cryptography 23(3): 297-316 (2001)
2000
9EESachar Paulus, Tsuyoshi Takagi: A New Public-Key Cryptosystem over a Quadratic Order with Quadratic Decryption Time. J. Cryptology 13(2): 263-272 (2000)
1999
8 Detlef Hühnlein, Tsuyoshi Takagi: Reducing Logarithms in Totally Non-maximal Imaginary Quadratic Orders to Logarithms in Finite Fields. ASIACRYPT 1999: 219-231
7EEMichael Hartmann, Sachar Paulus, Tsuyoshi Takagi: NICE - New Ideal Coset Encryption. CHES 1999: 328-339
1998
6EETsuyoshi Takagi: Fast RSA-Type Cryptosystem Modulo pkq. CRYPTO 1998: 318-326
5EEDetlef Hühnlein, Michael J. Jacobson Jr., Sachar Paulus, Tsuyoshi Takagi: A Cryptosystem Based on Non-maximal Imaginary Quadratic Orders with Fast Decryption. EUROCRYPT 1998: 294-307
4 Sachar Paulus, Tsuyoshi Takagi: A generalization of the Diffie-Hellman problem and related cryptosystems allowing fast decryption. ICISC 1998: 211-220
3 Detlef Hühnlein, Andreas Meyer, Tsuyoshi Takagi: Rabin and RSA analogues based on non-maximal imaginary quadratic orders. ICISC 1998: 221-240
1997
2EETsuyoshi Takagi: Fast RSA-Type Cryptosystems Using N-Adic Expansion. CRYPTO 1997: 372-384
1996
1 Tsuyoshi Takagi, Shozo Naito: The Multi-variable Modular Polynomial and Its Applications to Cryptography. ISAAC 1996: 386-396

Coauthor Index

1Toru Akishita [24] [34] [35] [41] [46] [47] [61] [68]
2Kazumaro Aoki [88]
3Ronald C. Arkin [11] [22]
4Feng Bao [77] [80] [98]
5Jean-Luc Beuchat [74] [78] [87]
6Ingrid Biehl [21] [33]
7Nicolas Brisebarre [74] [87]
8Johannes Buchmann [12]
9Shuang Chang [97]
10Kyoil Chung [50] [65]
11Gabriel Costa [13]
12Erik Dahmen [51] [71] [89]
13Jérémie Detrey [87]
14Masahiro Fujita [11] [13] [22] [40]
15David Galindo [39]
16Keisuke Hakuta [94]
17Dong-Guk Han [50] [64] [65] [69] [81]
18Michael Hartmann [7]
19Rika Hasegawa [11] [13] [22]
20Yasushi Hibino [81]
21Yukiko Hoshino [40]
22Detlef Hühnlein [3] [5] [8]
23Tetsuya Izu [14] [16] [18] [19] [23] [31] [45] [75] [84]
24Michael J. Jacobson Jr. [5]
25Marc Joye [10]
26Masanobu Katagi [34] [41] [56] [61]
27Yuto Kawahara [67] [73] [88]
28Howon Kim (Ho Won Kim) [50] [65] [69] [81]
29Tae-Hyun Kim [50] [69]
30Izuru Kitamura [34] [41] [56] [61]
31Shinsaku Kiyomoto [72] [83]
32Kaoru Kurosawa [27] [29] [70]
33Fagen Li [90] [92] [93] [96] [99]
34Jongin Lim (Jong In Lim) [64] [69]
35Andreas Meyer [3]
36Bodo Möller [16]
37Sebastià Martín Molleví [39]
38Shozo Naito [1]
39Toshiya Nakajima [75] [84]
40Eiji Okamoto [52] [53] [67] [73] [74] [76] [78] [82] [85] [87] [95]
41Takeshi Okamoto [52] [53] [82]
42Tatsuaki Okamoto [82]
43Katsuyuki Okeya [25] [26] [32] [36] [42] [43] [44] [48] [51] [54] [55] [57] [58] [60] [71] [86] [89]
44Kyosuke Osaka [66] [97]
45Akira Otaka [91]
46Sachar Paulus [4] [5] [7] [9] [33]
47Ugo Di Profio [40]
48Jean-Jacques Quisquater [10]
49David Reis Jr. [62]
50Eun-Kyung Ryu [79]
51Kouichi Sakurai [12] [15] [17] [20] [77] [80] [98]
52Hisayoshi Sato [28] [38] [59] [94]
53Daniel Schepers [38]
54Katja Schmidt-Samoa [27] [42] [49] [63]
55Olivier Semay [63]
56Hideki Shimomura [13]
57Masaaki Shirase [73] [74] [76] [78] [81] [85] [87] [90] [92] [93] [95] [96] [99]
58Christian Spahn [42]
59Chunhua Su [77] [80] [98]
60Osamu Takahashi [66] [91] [97]
61Kazuo Takaragi [28] [59]
62Toshiaki Tanaka [72] [83]
63Satoru Tezuka [28] [59]
64Raylin Tso [52]
65Jorge Luis Villar [39]
66Camille Vuillaume [36] [44] [48] [54] [55] [58] [60] [86] [89]
67Lihua Wang [53]
68Bo-Ching Wu [37] [62]
69Kenichi Yamazaki [66] [97]
70Sung-Ming Yen [37] [62]
71Jun Yokono [13]
72Motoi Yoshitomi [72] [83]
73Jianying Zhou [77] [80] [98]

Colors in the list of coauthors

Copyright © Sun May 17 03:24:02 2009 by Michael Ley (ley@uni-trier.de)