2007 |
10 | EE | David A. Basin,
Hironobu Kuruma,
Kunihiko Miyazaki,
Kazuo Takaragi,
Burkhart Wolff:
Verifying a signature architecture: a comparative case study.
Formal Asp. Comput. 19(1): 63-91 (2007) |
2006 |
9 | EE | Hisayoshi Sato,
Tsuyoshi Takagi,
Satoru Tezuka,
Kazuo Takaragi:
Generalized Powering Functions and Their Application to Digital Signatures.
IEICE Transactions 89-A(1): 81-89 (2006) |
2005 |
8 | EE | David A. Basin,
Hironobu Kuruma,
Kazuo Takaragi,
Burkhart Wolff:
Verification of a Signature Architecture with HOL-Z.
FM 2005: 269-285 |
2004 |
7 | EE | Dai Watanabe,
Soichi Furuya,
Hirotaka Yoshida,
Kazuo Takaragi,
Bart Preneel:
A New Keystream Generator MUGI.
IEICE Transactions 87-A(1): 37-45 (2004) |
2003 |
6 | EE | Hisayoshi Sato,
Tsuyoshi Takagi,
Satoru Tezuka,
Kazuo Takaragi:
Generalized Powering Functions and Their Application to Digital Signatures.
ASIACRYPT 2003: 434-451 |
2002 |
5 | EE | Dai Watanabe,
Soichi Furuya,
Hirotaka Yoshida,
Kazuo Takaragi,
Bart Preneel:
A New Keystream Generator MUGI.
FSE 2002: 179-194 |
4 | EE | Hiroshi Yoshiura,
Kunihiko Miyazaki,
Shinji Itoh,
Kazuo Takaragi,
Ryôichi Sasaki:
Legally Authorized and Unauthorized Digital Evidence.
Security Protocols Workshop 2002: 67-73 |
2001 |
3 | EE | Hiroshi Yoshiura,
Kunihiko Miyazaki,
Shinji Itoh,
Kazuo Takaragi,
Ryôichi Sasaki:
A Multi-OS Approach to Trusted Computer Systems.
Security Protocols Workshop 2001: 107-114 |
2 | EE | Kazuo Takaragi,
Mitsuo Usami,
Ryo Imura,
Rei Itsuki,
Tsuneo Satoh:
An Ultra Small Individual Recognition Security Chip.
IEEE Micro 21(6): 43-49 (2001) |
1998 |
1 | EE | Hiroshi Yoshiura,
Ryôichi Sasaki,
Kazuo Takaragi:
Secure Fingerprinting Using Public-Key Cryptography (Position Paper).
Security Protocols Workshop 1998: 83-89 |