2008 |
20 | EE | Tetsuya Izu,
Noboru Kunihiro,
Kazuo Ohta,
Makoto Sano,
Masahiko Takenaka:
Sanitizable and Deletable Signature.
WISA 2008: 130-144 |
2007 |
19 | EE | Tetsuya Izu,
Masahiko Takenaka,
Takeshi Shimoyama:
Analysis on Bleichenbacher's Forgery Attack.
ARES 2007: 1167-1174 |
18 | EE | Tetsuya Izu,
Takeshi Shimoyama,
Masahiko Takenaka:
How to Forge a Time-Stamp Which Adobe's Acrobat Accepts.
IMA Int. Conf. 2007: 54-72 |
17 | EE | Tetsuya Izu,
Noboru Kunihiro,
Kazuo Ohta,
Masahiko Takenaka,
Takashi Yoshioka:
A Sanitizable Signature Scheme with Aggregation.
ISPEC 2007: 51-64 |
2006 |
16 | EE | Kouichi Itoh,
Tetsuya Izu,
Masahiko Takenaka:
Improving the Randomized Initial Point Countermeasure Against DPA.
ACNS 2006: 459-469 |
15 | EE | Kazuyoshi Furukawa,
Masahiko Takenaka,
Kouichi Itoh:
A Fast RSA Implementation on Itanium 2 Processor.
ICICS 2006: 507-518 |
14 | EE | Shingo Fujimoto,
Masahiko Takenaka:
Adoption of the IPsec-VPN for the Ubiquitous Network.
SAINT 2006: 78-81 |
2005 |
13 | EE | Tetsuya Izu,
Nobuyuki Kanaya,
Masahiko Takenaka,
Takashi Yoshioka:
PIATS: A Partially Sanitizable Signature Scheme.
ICICS 2005: 72-83 |
12 | EE | Shoichi Masui,
Kenji Mukaida,
Masahiko Takenaka,
Naoya Torii:
Design Optimization of a High-Speed, Area-Efficient and Low-Power Montgomery Modular Multiplier for RSA Algorithm.
IEICE Transactions 88-C(4): 576-581 (2005) |
2004 |
11 | | Kouichi Itoh,
Tetsuya Izu,
Masahiko Takenaka:
Efficient Countermeasures against Power Analysis for Elliptic Curve Cryptosystems.
CARDIS 2004: 99-114 |
10 | EE | Masahiko Takenaka,
Takeshi Shimoyama,
Takeshi Koshiba:
Theoretical Analysis of chi2 Attack on RC6.
IEICE Transactions 87-A(1): 28-36 (2004) |
2003 |
9 | EE | Masahiko Takenaka,
Takeshi Shimoyama,
Takeshi Koshiba:
Theoretical Analysis of chi2 Attack on RC6.
ACISP 2003: 142-153 |
8 | EE | Kouichi Itoh,
Tetsuya Izu,
Masahiko Takenaka:
A Practical Countermeasure against Address-Bit Differential Power Analysis.
CHES 2003: 382-396 |
2002 |
7 | EE | Kouichi Itoh,
Tetsuya Izu,
Masahiko Takenaka:
Address-Bit Differential Power Analysis of Cryptographic Schemes OK-ECDH and OK-ECDSA.
CHES 2002: 129-143 |
6 | EE | Kouichi Itoh,
Jun Yajima,
Masahiko Takenaka,
Naoya Torii:
DPA Countermeasures by Improving the Window Method.
CHES 2002: 303-317 |
5 | EE | Takeshi Shimoyama,
Masahiko Takenaka,
Takeshi Koshiba:
Multiple Linear Cryptanalysis of a Reduced Round RC6.
FSE 2002: 76-88 |
2001 |
4 | EE | Takeshi Shimoyama,
Hitoshi Yanami,
Kazuhiro Yokoyama,
Masahiko Takenaka,
Kouichi Itoh,
Jun Yajima,
Naoya Torii,
Hidema Tanaka:
The Block Cipher SC2000.
FSE 2001: 312-327 |
3 | EE | Kouichi Itoh,
Masahiko Takenaka,
Naoya Torii:
DPA Countermeasure Based on the "Masking Method".
ICISC 2001: 440-456 |
2000 |
2 | EE | Souichi Okada,
Naoya Torii,
Kouichi Itoh,
Masahiko Takenaka:
Implementation of Elliptic Curve Cryptographic Coprocessor over GF(2m) on an FPGA.
CHES 2000: 25-40 |
1999 |
1 | EE | Kouichi Itoh,
Masahiko Takenaka,
Naoya Torii,
Syouji Temma,
Yasushi Kurihara:
Fast Implementation of Public-Key Cryptography ona DSP TMS320C6201.
CHES 1999: 61-72 |