2009 |
99 | EE | Fagen Li,
Masaaki Shirase,
Tsuyoshi Takagi:
Certificateless Hybrid Signcryption.
ISPEC 2009: 112-123 |
2008 |
98 | EE | Chunhua Su,
Feng Bao,
Jianying Zhou,
Tsuyoshi Takagi,
Kouichi Sakurai:
A New Scheme for Distributed Density Estimation based Privacy-Preserving Clustering.
ARES 2008: 112-119 |
97 | EE | Kyosuke Osaka,
Shuang Chang,
Tsuyoshi Takagi,
Kenichi Yamazaki,
Osamu Takahashi:
A Secure RFID Protocol based on Insubvertible Encryption Using Guardian Proxy.
ARES 2008: 733-740 |
96 | EE | Fagen Li,
Masaaki Shirase,
Tsuyoshi Takagi:
On the Security of Online/Offline Signatures and Multisignatures from ACISP'06.
CANS 2008: 108-119 |
95 | EE | Masaaki Shirase,
Tsuyoshi Takagi,
Eiji Okamoto:
An Efficient Countermeasure against Side Channel Attacks for Pairing Computation.
ISPEC 2008: 290-303 |
94 | EE | Keisuke Hakuta,
Hisayoshi Sato,
Tsuyoshi Takagi:
Efficient Arithmetic on Subfield Elliptic Curves over Small Finite Fields of Odd Characteristic.
ISPEC 2008: 304-318 |
93 | EE | Fagen Li,
Masaaki Shirase,
Tsuyoshi Takagi:
Efficient Multi-PKG ID-Based Signcryption for Ad Hoc Networks.
Inscrypt 2008: 289-304 |
92 | EE | Fagen Li,
Masaaki Shirase,
Tsuyoshi Takagi:
Efficient Signcryption Key Encapsulation without Random Oracles.
Inscrypt 2008: 47-59 |
91 | EE | Akira Otaka,
Tsuyoshi Takagi,
Osamu Takahashi:
Network Forensics on Mobile Ad-Hoc Networks.
KES (3) 2008: 175-182 |
90 | EE | Fagen Li,
Masaaki Shirase,
Tsuyoshi Takagi:
Key Management Using Certificateless Public Key Cryptography in Ad Hoc Networks.
NPC 2008: 116-126 |
89 | EE | Erik Dahmen,
Katsuyuki Okeya,
Tsuyoshi Takagi,
Camille Vuillaume:
Digital Signatures Out of Second-Preimage Resistant Hash Functions.
PQCrypto 2008: 109-123 |
88 | EE | Yuto Kawahara,
Kazumaro Aoki,
Tsuyoshi Takagi:
Faster Implementation of eta-T Pairing over GF(3m) Using Minimum Number of Logical Instructions for GF(3)-Addition.
Pairing 2008: 282-296 |
87 | EE | Jean-Luc Beuchat,
Nicolas Brisebarre,
Jérémie Detrey,
Eiji Okamoto,
Masaaki Shirase,
Tsuyoshi Takagi:
Algorithms and Arithmetic Operators for Computing the etaT Pairing in Characteristic Three.
IEEE Trans. Computers 57(11): 1454-1468 (2008) |
86 | EE | Camille Vuillaume,
Katsuyuki Okeya,
Tsuyoshi Takagi:
Short-Memory Scalar Multiplication for Koblitz Curves.
IEEE Trans. Computers 57(4): 481-489 (2008) |
85 | EE | Masaaki Shirase,
Tsuyoshi Takagi,
Eiji Okamoto:
Some Efficient Algorithms for the Final Exponentiation of etaT Pairing.
IEICE Transactions 91-A(1): 221-228 (2008) |
84 | EE | Toshiya Nakajima,
Tetsuya Izu,
Tsuyoshi Takagi:
Reduction Optimal Trinomials for Efficient Software Implementation of the etaT Pairing.
IEICE Transactions 91-A(9): 2379-2386 (2008) |
83 | EE | Motoi Yoshitomi,
Tsuyoshi Takagi,
Shinsaku Kiyomoto,
Toshiaki Tanaka:
Efficient Implementation of the Pairing on Mobilephones Using BREW.
IEICE Transactions 91-D(5): 1330-1337 (2008) |
2007 |
82 | | Tsuyoshi Takagi,
Tatsuaki Okamoto,
Eiji Okamoto,
Takeshi Okamoto:
Pairing-Based Cryptography - Pairing 2007, First International Conference, Tokyo, Japan, July 2-4, 2007, Proceedings
Springer 2007 |
81 | EE | Masaaki Shirase,
Dong-Guk Han,
Yasushi Hibino,
Ho Won Kim,
Tsuyoshi Takagi:
Compressed XTR.
ACNS 2007: 420-431 |
80 | EE | Chunhua Su,
Feng Bao,
Jianying Zhou,
Tsuyoshi Takagi,
Kouichi Sakurai:
Privacy-Preserving Two-Party K-Means Clustering via Secure Approximation.
AINA Workshops (1) 2007: 385-391 |
79 | EE | Eun-Kyung Ryu,
Tsuyoshi Takagi:
Efficient Conjunctive Keyword-Searchable Encryption.
AINA Workshops (1) 2007: 409-414 |
78 | EE | Jean-Luc Beuchat,
Masaaki Shirase,
Tsuyoshi Takagi,
Eiji Okamoto:
An Algorithm for the nt Pairing Calculation in Characteristic Three and its Hardware Implementation.
IEEE Symposium on Computer Arithmetic 2007: 97-104 |
77 | EE | Chunhua Su,
Jianying Zhou,
Feng Bao,
Tsuyoshi Takagi,
Kouichi Sakurai:
Two-Party Privacy-Preserving Agglomerative Document Clustering.
ISPEC 2007: 193-208 |
76 | EE | Masaaki Shirase,
Tsuyoshi Takagi,
Eiji Okamoto:
Some Efficient Algorithms for the Final Exponentiation of eta T Pairing.
ISPEC 2007: 254-268 |
75 | EE | Toshiya Nakajima,
Tetsuya Izu,
Tsuyoshi Takagi:
Reduction Optimal Trinomials for Efficient Software Implementation of the etaT Pairing.
IWSEC 2007: 44-57 |
74 | EE | Jean-Luc Beuchat,
Nicolas Brisebarre,
Masaaki Shirase,
Tsuyoshi Takagi,
Eiji Okamoto:
A Coprocessor for the Final Exponentiation of the eta T Pairing in Characteristic Three.
WAIFI 2007: 25-39 |
73 | EE | Masaaki Shirase,
Yuto Kawahara,
Tsuyoshi Takagi,
Eiji Okamoto:
Universal etaT Pairing Algorithm over Arbitrary Extension Degree.
WISA 2007: 1-15 |
72 | EE | Motoi Yoshitomi,
Tsuyoshi Takagi,
Shinsaku Kiyomoto,
Toshiaki Tanaka:
Efficient Implementation of the Pairing on Mobilephones Using BREW.
WISA 2007: 203-214 |
71 | EE | Erik Dahmen,
Katsuyuki Okeya,
Tsuyoshi Takagi:
A New Upper Bound for the Minimal Density of Joint Representations in Elliptic Curve Cryptosystems.
IEICE Transactions 90-A(5): 952-959 (2007) |
2006 |
70 | EE | Kaoru Kurosawa,
Tsuyoshi Takagi:
New Approach for Selectively Convertible Undeniable Signature Schemes.
ASIACRYPT 2006: 428-443 |
69 | EE | Tae-Hyun Kim,
Tsuyoshi Takagi,
Dong-Guk Han,
Ho Won Kim,
Jongin Lim:
Side Channel Attacks and Countermeasures on Pairing Based Cryptosystems over Binary Fields.
CANS 2006: 168-181 |
68 | EE | Toru Akishita,
Tsuyoshi Takagi:
Power Analysis to ECC Using Differential Power Between Multiplication and Squaring.
CARDIS 2006: 151-164 |
67 | EE | Yuto Kawahara,
Tsuyoshi Takagi,
Eiji Okamoto:
Efficient Implementation of Tate Pairing on a Mobile Phone Using Java.
CIS 2006: 396-405 |
66 | EE | Kyosuke Osaka,
Tsuyoshi Takagi,
Kenichi Yamazaki,
Osamu Takahashi:
An Efficient and Secure RFID Security Method with Ownership Transfer.
CIS 2006: 778-787 |
65 | EE | Dong-Guk Han,
Tsuyoshi Takagi,
Howon Kim,
Kyoil Chung:
New Security Problem in RFID Systems "Tag Killing".
ICCSA (3) 2006: 375-384 |
64 | EE | Dong-Guk Han,
Tsuyoshi Takagi,
Jongin Lim:
Further Security Analysis of XTR.
ISPEC 2006: 33-44 |
63 | EE | Katja Schmidt-Samoa,
Olivier Semay,
Tsuyoshi Takagi:
Analysis of Fractional Window Recoding Methods and Their Application to Elliptic Curve Cryptosystems.
IEEE Trans. Computers 55(1): 48-57 (2006) |
62 | EE | Tsuyoshi Takagi,
David Reis Jr.,
Sung-Ming Yen,
Bo-Ching Wu:
Radix-r Non-Adjacent Form and Its Application to Pairing-Based Cryptosystem.
IEICE Transactions 89-A(1): 115-123 (2006) |
61 | EE | Masanobu Katagi,
Toru Akishita,
Izuru Kitamura,
Tsuyoshi Takagi:
Efficient Hyperelliptic Curve Cryptosystems Using Theta Divisors.
IEICE Transactions 89-A(1): 151-160 (2006) |
60 | EE | Katsuyuki Okeya,
Tsuyoshi Takagi,
Camille Vuillaume:
Security Analysis of the SPA-Resistant Fractional Width Method.
IEICE Transactions 89-A(1): 161-168 (2006) |
59 | EE | Hisayoshi Sato,
Tsuyoshi Takagi,
Satoru Tezuka,
Kazuo Takaragi:
Generalized Powering Functions and Their Application to Digital Signatures.
IEICE Transactions 89-A(1): 81-89 (2006) |
58 | EE | Camille Vuillaume,
Katsuyuki Okeya,
Tsuyoshi Takagi:
Defeating Simple Power Analysis on Koblitz Curves.
IEICE Transactions 89-A(5): 1362-1369 (2006) |
57 | EE | Katsuyuki Okeya,
Tsuyoshi Takagi:
Security analysis of CRT-based cryptosystems.
Int. J. Inf. Sec. 5(3): 177-185 (2006) |
2005 |
56 | EE | Izuru Kitamura,
Masanobu Katagi,
Tsuyoshi Takagi:
A Complete Divisor Class Halving Algorithm for Hyperelliptic Curve Cryptosystems of Genus Two.
ACISP 2005: 146-157 |
55 | EE | Katsuyuki Okeya,
Tsuyoshi Takagi,
Camille Vuillaume:
Efficient Representations on Koblitz Curves with Resistance to Side Channel Attacks.
ACISP 2005: 218-229 |
54 | EE | Katsuyuki Okeya,
Tsuyoshi Takagi,
Camille Vuillaume:
Short Memory Scalar Multiplication on Koblitz Curves.
CHES 2005: 91-105 |
53 | EE | Lihua Wang,
Takeshi Okamoto,
Tsuyoshi Takagi,
Eiji Okamoto:
Insider Impersonation-MIM Attack to Tripartite Key Agreement Scheme and an Efficient Protocol for Multiple Keys.
CIS (2) 2005: 198-203 |
52 | | Raylin Tso,
Takeshi Okamoto,
Tsuyoshi Takagi,
Eiji Okamoto:
An id-based non-interactive tripartite key agreement protocol with K-resilience.
Communications and Computer Networks 2005: 38-42 |
51 | EE | Erik Dahmen,
Katsuyuki Okeya,
Tsuyoshi Takagi:
An Advanced Method for Joint Scalar Multiplications on Memory Constraint Devices.
ESAS 2005: 189-204 |
50 | EE | Dong-Guk Han,
Tsuyoshi Takagi,
Tae-Hyun Kim,
Howon Kim,
Kyoil Chung:
Collision Attack on XTR and a Countermeasure with a Fixed Pattern.
EUC Workshops 2005: 864-873 |
49 | EE | Katja Schmidt-Samoa,
Tsuyoshi Takagi:
Paillier's Cryptosystem Modulo p2q and Its Applications to Trapdoor Commitment Schemes.
Mycrypt 2005: 296-313 |
48 | EE | Katsuyuki Okeya,
Tsuyoshi Takagi,
Camille Vuillaume:
On the Importance of Protecting in SFLASH against Side Channel Attacks.
IEICE Transactions 88-A(1): 123-131 (2005) |
47 | EE | Toru Akishita,
Tsuyoshi Takagi:
Zero-Value Register Attack on Elliptic Curve Cryptosystem.
IEICE Transactions 88-A(1): 132-139 (2005) |
46 | EE | Toru Akishita,
Tsuyoshi Takagi:
On the Optimal Parameter Choice for Elliptic Curve Cryptosystems Using Isogeny.
IEICE Transactions 88-A(1): 140-146 (2005) |
45 | EE | Tetsuya Izu,
Tsuyoshi Takagi:
Fast Elliptic Curve Multiplications Resistant against Side Channel Attacks.
IEICE Transactions 88-A(1): 161-171 (2005) |
2004 |
44 | EE | Katsuyuki Okeya,
Tsuyoshi Takagi,
Camille Vuillaume:
On the Exact Flexibility of the Flexible Countermeasure Against Side Channel Attacks.
ACISP 2004: 466-477 |
43 | EE | Katsuyuki Okeya,
Tsuyoshi Takagi:
Security Analysis of CRT-Based Cryptosystems.
ACNS 2004: 383-397 |
42 | EE | Katsuyuki Okeya,
Katja Schmidt-Samoa,
Christian Spahn,
Tsuyoshi Takagi:
Signed Binary Representations Revisited.
CRYPTO 2004: 123-139 |
41 | EE | Masanobu Katagi,
Toru Akishita,
Izuru Kitamura,
Tsuyoshi Takagi:
Some Improved Algorithms for Hyperelliptic Curve Cryptosystems Using Degenerate Divisors.
ICISC 2004: 296-312 |
40 | EE | Yukiko Hoshino,
Tsuyoshi Takagi,
Ugo Di Profio,
Masahiro Fujita:
Behavior Description and Control using Behavior Module for Personal Robot.
ICRA 2004: 4165-4171 |
39 | EE | David Galindo,
Sebastià Martín Molleví,
Tsuyoshi Takagi,
Jorge Luis Villar:
A Provably Secure Elliptic Curve Scheme with Fast Encryption.
INDOCRYPT 2004: 245-259 |
38 | EE | Hisayoshi Sato,
Daniel Schepers,
Tsuyoshi Takagi:
Exact Analysis of Montgomery Multiplication.
INDOCRYPT 2004: 290-304 |
37 | EE | Tsuyoshi Takagi,
Sung-Ming Yen,
Bo-Ching Wu:
Radix-r Non-Adjacent Form.
ISC 2004: 99-110 |
36 | EE | Katsuyuki Okeya,
Tsuyoshi Takagi,
Camille Vuillaume:
On the Importance of Protecting Delta in SFLASH against Side Channel Attacks.
ITCC (2) 2004: 560-568 |
35 | EE | Toru Akishita,
Tsuyoshi Takagi:
On the Optimal Parameter Choice for Elliptic Curve Cryptosystems Using Isogeny.
Public Key Cryptography 2004: 346-359 |
34 | EE | Masanobu Katagi,
Izuru Kitamura,
Toru Akishita,
Tsuyoshi Takagi:
Novel Efficient Implementations of Hyperelliptic Curve Cryptosystems Using Degenerate Divisors.
WISA 2004: 345-359 |
33 | EE | Ingrid Biehl,
Sachar Paulus,
Tsuyoshi Takagi:
Efficient Undeniable Signature Schemes Based on Ideal Arithmetic in Quadratic Orders.
Des. Codes Cryptography 31(2): 99-123 (2004) |
32 | EE | Katsuyuki Okeya,
Tsuyoshi Takagi:
SCA-Resistant and Fast Elliptic Scalar Multiplication Based on wNAF.
IEICE Transactions 87-A(1): 75-84 (2004) |
31 | EE | Tetsuya Izu,
Tsuyoshi Takagi:
Fast Elliptic Curve Multiplications with SIMD Operations.
IEICE Transactions 87-A(1): 85-93 (2004) |
30 | EE | Tsuyoshi Takagi:
A Fast RSA-Type Public-Key Primitive Modulo pkq Using Hensel Lifting.
IEICE Transactions 87-A(1): 94-101 (2004) |
2003 |
29 | EE | Kaoru Kurosawa,
Tsuyoshi Takagi:
Some RSA-Based Encryption Schemes with Tight Security Reduction.
ASIACRYPT 2003: 19-36 |
28 | EE | Hisayoshi Sato,
Tsuyoshi Takagi,
Satoru Tezuka,
Kazuo Takaragi:
Generalized Powering Functions and Their Application to Digital Signatures.
ASIACRYPT 2003: 434-451 |
27 | EE | Kaoru Kurosawa,
Katja Schmidt-Samoa,
Tsuyoshi Takagi:
A Complete and Explicit Security Reduction Algorithm for RSA-Based Cryptosystems.
ASIACRYPT 2003: 474-491 |
26 | EE | Katsuyuki Okeya,
Tsuyoshi Takagi:
A More Flexible Countermeasure against Side Channel Attacks Using Window Method.
CHES 2003: 397-410 |
25 | EE | Katsuyuki Okeya,
Tsuyoshi Takagi:
The Width-w NAF Method Provides Small Memory and Fast Elliptic Scalar Multiplications Secure against Side Channel Attacks.
CT-RSA 2003: 328-342 |
24 | EE | Toru Akishita,
Tsuyoshi Takagi:
Zero-Value Point Attacks on Elliptic Curve Cryptosystem.
ISC 2003: 218-233 |
23 | EE | Tetsuya Izu,
Tsuyoshi Takagi:
Exceptional Procedure Attack on Elliptic Curve Cryptosystems.
Public Key Cryptography 2003: 224-239 |
22 | EE | Ronald C. Arkin,
Masahiro Fujita,
Tsuyoshi Takagi,
Rika Hasegawa:
An ethological and emotional basis for human-robot interaction.
Robotics and Autonomous Systems 42(3-4): 191-201 (2003) |
2002 |
21 | EE | Ingrid Biehl,
Tsuyoshi Takagi:
A New Distributed Primality Test for Shared RSA Keys Using Quadratic Fields.
ACISP 2002: 1-16 |
20 | EE | Kouichi Sakurai,
Tsuyoshi Takagi:
On the Security of a Modified Paillier Public-Key Primitive.
ACISP 2002: 436-448 |
19 | EE | Tetsuya Izu,
Tsuyoshi Takagi:
Fast Elliptic Curve Multiplications with SIMD Operations.
ICICS 2002: 217-230 |
18 | EE | Tetsuya Izu,
Tsuyoshi Takagi:
Efficient Computations of the Tate Pairingfor the Large MOV Degrees.
ICISC 2002: 283-297 |
17 | EE | Kouichi Sakurai,
Tsuyoshi Takagi:
A Reject Timing Attackon an IND-CCA2 Public-Key Cryptosystem.
ICISC 2002: 359-373 |
16 | EE | Tetsuya Izu,
Bodo Möller,
Tsuyoshi Takagi:
Improved Elliptic Curve Multiplication Methods Resistant against Side Channel Attacks.
INDOCRYPT 2002: 296-313 |
15 | EE | Kouichi Sakurai,
Tsuyoshi Takagi:
New Semantically Secure Public-Key Cryptosystems from the RSA-Primitive.
Public Key Cryptography 2002: 1-16 |
14 | EE | Tetsuya Izu,
Tsuyoshi Takagi:
A Fast Parallel Elliptic Curve Multiplication Resistant against Side Channel Attacks.
Public Key Cryptography 2002: 280-296 |
2001 |
13 | EE | Masahiro Fujita,
Gabriel Costa,
Rika Hasegawa,
Tsuyoshi Takagi,
Jun Yokono,
Hideki Shimomura:
Architecture and preliminary experimental results for emotionally grounded symbol acquisition.
Agents 2001: 35-36 |
12 | EE | Johannes Buchmann,
Kouichi Sakurai,
Tsuyoshi Takagi:
An IND-CCA2 Public-Key Cryptosystem with Fast Decryption.
ICISC 2001: 51-71 |
11 | | Ronald C. Arkin,
Masahiro Fujita,
Tsuyoshi Takagi,
Rika Hasegawa:
Ethological Modeling and Architecture for an Entertainment Robot.
ICRA 2001: 453-458 |
10 | | Marc Joye,
Jean-Jacques Quisquater,
Tsuyoshi Takagi:
How to Choose Secret Parameters for RSA-Type Cryptosystems over Elliptic Curves.
Des. Codes Cryptography 23(3): 297-316 (2001) |
2000 |
9 | EE | Sachar Paulus,
Tsuyoshi Takagi:
A New Public-Key Cryptosystem over a Quadratic Order with Quadratic Decryption Time.
J. Cryptology 13(2): 263-272 (2000) |
1999 |
8 | | Detlef Hühnlein,
Tsuyoshi Takagi:
Reducing Logarithms in Totally Non-maximal Imaginary Quadratic Orders to Logarithms in Finite Fields.
ASIACRYPT 1999: 219-231 |
7 | EE | Michael Hartmann,
Sachar Paulus,
Tsuyoshi Takagi:
NICE - New Ideal Coset Encryption.
CHES 1999: 328-339 |
1998 |
6 | EE | Tsuyoshi Takagi:
Fast RSA-Type Cryptosystem Modulo pkq.
CRYPTO 1998: 318-326 |
5 | EE | Detlef Hühnlein,
Michael J. Jacobson Jr.,
Sachar Paulus,
Tsuyoshi Takagi:
A Cryptosystem Based on Non-maximal Imaginary Quadratic Orders with Fast Decryption.
EUROCRYPT 1998: 294-307 |
4 | | Sachar Paulus,
Tsuyoshi Takagi:
A generalization of the Diffie-Hellman problem and related cryptosystems allowing fast decryption.
ICISC 1998: 211-220 |
3 | | Detlef Hühnlein,
Andreas Meyer,
Tsuyoshi Takagi:
Rabin and RSA analogues based on non-maximal imaginary quadratic orders.
ICISC 1998: 221-240 |
1997 |
2 | EE | Tsuyoshi Takagi:
Fast RSA-Type Cryptosystems Using N-Adic Expansion.
CRYPTO 1997: 372-384 |
1996 |
1 | | Tsuyoshi Takagi,
Shozo Naito:
The Multi-variable Modular Polynomial and Its Applications to Cryptography.
ISAAC 1996: 386-396 |