BibTeX records: Tsuyoshi Takagi

download as .bib file

@article{DBLP:journals/iacr/OkadaT24,
  author       = {Hiroki Okada and
                  Tsuyoshi Takagi},
  title        = {Simulation-Secure Threshold {PKE} from Standard (Ring-)LWE},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {239},
  year         = {2024},
  url          = {https://eprint.iacr.org/2024/239},
  timestamp    = {Mon, 18 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/OkadaT24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KajitaOT24,
  author       = {Kaisei Kajita and
                  Go Ohtake and
                  Tsuyoshi Takagi},
  title        = {Generalized Adaptor Signature Scheme: From Two-Party to N-Party Settings},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {241},
  year         = {2024},
  url          = {https://eprint.iacr.org/2024/241},
  timestamp    = {Mon, 18 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/KajitaOT24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dam/NakagawaOTT23,
  author       = {Kohei Nakagawa and
                  Hiroshi Onuki and
                  Atsushi Takayasu and
                  Tsuyoshi Takagi},
  title        = {L1-norm ball for {CSIDH:} Optimal strategy for choosing the secret
                  key space},
  journal      = {Discret. Appl. Math.},
  volume       = {328},
  pages        = {70--88},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.dam.2022.12.002},
  doi          = {10.1016/J.DAM.2022.12.002},
  timestamp    = {Tue, 28 Mar 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dam/NakagawaOTT23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ffa/MoriyaOT23,
  author       = {Tomoki Moriya and
                  Hiroshi Onuki and
                  Tsuyoshi Takagi},
  title        = {How to construct {CSIDH} on Edwards curves},
  journal      = {Finite Fields Their Appl.},
  volume       = {92},
  pages        = {102310},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.ffa.2023.102310},
  doi          = {10.1016/J.FFA.2023.102310},
  timestamp    = {Sun, 10 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ffa/MoriyaOT23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieiceta/KajitaOONT23,
  author       = {Kaisei Kajita and
                  Go Ohtake and
                  Kazuto Ogawa and
                  Koji Nuida and
                  Tsuyoshi Takagi},
  title        = {Short Lattice Signature Scheme with Tighter Reduction under Ring-SIS
                  Assumption},
  journal      = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.},
  volume       = {106},
  number       = {3},
  pages        = {228--240},
  year         = {2023},
  url          = {https://doi.org/10.1587/transfun.2022cip0017},
  doi          = {10.1587/TRANSFUN.2022CIP0017},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieiceta/KajitaOONT23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iet-ifs/IkematsuNT23,
  author       = {Yasuhiko Ikematsu and
                  Shuhei Nakamura and
                  Tsuyoshi Takagi},
  title        = {Recent progress in the security evaluation of multivariate public-key
                  cryptography},
  journal      = {{IET} Inf. Secur.},
  volume       = {17},
  number       = {2},
  pages        = {210--226},
  year         = {2023},
  url          = {https://doi.org/10.1049/ise2.12092},
  doi          = {10.1049/ISE2.12092},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iet-ifs/IkematsuNT23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jsiaml/OtsukiOT23,
  author       = {Saki Otsuki and
                  Hiroshi Onuki and
                  Tsuyoshi Takagi},
  title        = {Improvement of the square-root V{\'{e}}lu's formulas for isogeny-based
                  cryptography},
  journal      = {{JSIAM} Lett.},
  volume       = {15},
  pages        = {61--64},
  year         = {2023},
  url          = {https://doi.org/10.14495/jsiaml.15.61},
  doi          = {10.14495/JSIAML.15.61},
  timestamp    = {Tue, 02 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jsiaml/OtsukiOT23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/mics/KudoNT23,
  author       = {Momonari Kudo and
                  Tasuku Nakagawa and
                  Tsuyoshi Takagi},
  title        = {Efficient Search for Superspecial Hyperelliptic Curves of Genus Four
                  with Automorphism Group Containing bfC\({}_{\mbox{6}}\)},
  journal      = {Math. Comput. Sci.},
  volume       = {17},
  number       = {3},
  pages        = {21},
  year         = {2023},
  url          = {https://doi.org/10.1007/s11786-023-00571-w},
  doi          = {10.1007/S11786-023-00571-W},
  timestamp    = {Wed, 01 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/mics/KudoNT23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/mics/KudoNT23a,
  author       = {Momonari Kudo and
                  Tasuku Nakagawa and
                  Tsuyoshi Takagi},
  title        = {Correction to: Efficient Search for Superspecial Hyperelliptic Curves
                  of Genus Four with Automorphism Group Containing bfC\({}_{\mbox{6}}\)},
  journal      = {Math. Comput. Sci.},
  volume       = {17},
  number       = {3},
  pages        = {23},
  year         = {2023},
  url          = {https://doi.org/10.1007/s11786-023-00573-8},
  doi          = {10.1007/S11786-023-00573-8},
  timestamp    = {Fri, 08 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/mics/KudoNT23a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/KimuraTT23,
  author       = {Naoto Kimura and
                  Atsushi Takayasu and
                  Tsuyoshi Takagi},
  editor       = {Leonie Simpson and
                  Mir Ali Rezazadeh Baee},
  title        = {Memory-Efficient Quantum Information Set Decoding Algorithm},
  booktitle    = {Information Security and Privacy - 28th Australasian Conference, {ACISP}
                  2023, Brisbane, QLD, Australia, July 5-7, 2023, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {13915},
  pages        = {452--468},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-35486-1\_20},
  doi          = {10.1007/978-3-031-35486-1\_20},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/KimuraTT23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/OkadaFKT23,
  author       = {Hiroki Okada and
                  Kazuhide Fukushima and
                  Shinsaku Kiyomoto and
                  Tsuyoshi Takagi},
  editor       = {Mehdi Tibouchi and
                  Xiaofeng Wang},
  title        = {Spherical Gaussian Leftover Hash Lemma via the R{\'{e}}nyi Divergence},
  booktitle    = {Applied Cryptography and Network Security - 21st International Conference,
                  {ACNS} 2023, Kyoto, Japan, June 19-22, 2023, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {13905},
  pages        = {695--724},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-33488-7\_26},
  doi          = {10.1007/978-3-031-33488-7\_26},
  timestamp    = {Wed, 26 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acns/OkadaFKT23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isw/LiuLT23,
  author       = {Keyang Liu and
                  Xingxin Li and
                  Tsuyoshi Takagi},
  editor       = {Elias Athanasopoulos and
                  Bart Mennink},
  title        = {Robust Property-Preserving Hash Meets Homomorphism},
  booktitle    = {Information Security - 26th International Conference, {ISC} 2023,
                  Groningen, The Netherlands, November 15-17, 2023, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {14411},
  pages        = {537--556},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-49187-0\_27},
  doi          = {10.1007/978-3-031-49187-0\_27},
  timestamp    = {Sun, 10 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/isw/LiuLT23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/ZhuKKT23,
  author       = {Haiming Zhu and
                  Shoichi Kamada and
                  Momonari Kudo and
                  Tsuyoshi Takagi},
  editor       = {Junji Shikata and
                  Hiroki Kuzuno},
  title        = {Improved Hybrid Attack via Error-Splitting Method for Finding Quinary
                  Short Lattice Vectors},
  booktitle    = {Advances in Information and Computer Security - 18th International
                  Workshop on Security, {IWSEC} 2023, Yokohama, Japan, August 29-31,
                  2023, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {14128},
  pages        = {117--136},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-41326-1\_7},
  doi          = {10.1007/978-3-031-41326-1\_7},
  timestamp    = {Fri, 25 Aug 2023 19:50:15 +0200},
  biburl       = {https://dblp.org/rec/conf/iwsec/ZhuKKT23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pqcrypto/FurueT23,
  author       = {Hiroki Furue and
                  Tsuyoshi Takagi},
  editor       = {Thomas Johansson and
                  Daniel Smith{-}Tone},
  title        = {Fast Enumeration Algorithm for Multivariate Polynomials over General
                  Finite Fields},
  booktitle    = {Post-Quantum Cryptography - 14th International Workshop, PQCrypto
                  2023, College Park, MD, USA, August 16-18, 2023, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {14154},
  pages        = {357--378},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-40003-2\_13},
  doi          = {10.1007/978-3-031-40003-2\_13},
  timestamp    = {Mon, 14 Aug 2023 16:42:49 +0200},
  biburl       = {https://dblp.org/rec/conf/pqcrypto/FurueT23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/OkadaFKT23,
  author       = {Hiroki Okada and
                  Kazuhide Fukushima and
                  Shinsaku Kiyomoto and
                  Tsuyoshi Takagi},
  title        = {Spherical Gaussian Leftover Hash Lemma via the R{\'{e}}nyi Divergence},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {479},
  year         = {2023},
  url          = {https://eprint.iacr.org/2023/479},
  timestamp    = {Wed, 26 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/OkadaFKT23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/FurueT23,
  author       = {Hiroki Furue and
                  Tsuyoshi Takagi},
  title        = {Fast Enumeration Algorithm for Multivariate Polynomials over General
                  Finite Fields},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {619},
  year         = {2023},
  url          = {https://eprint.iacr.org/2023/619},
  timestamp    = {Mon, 05 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/FurueT23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MoriyaOAT23,
  author       = {Tomoki Moriya and
                  Hiroshi Onuki and
                  Yusuke Aikawa and
                  Tsuyoshi Takagi},
  title        = {Lower bound of costs of formulas to compute image curves of 3-isogenies
                  in the framework of generalized Montgomery coordinates},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1511},
  year         = {2023},
  url          = {https://eprint.iacr.org/2023/1511},
  timestamp    = {Thu, 09 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/MoriyaOAT23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/SakataT23,
  author       = {Kosuke Sakata and
                  Tsuyoshi Takagi},
  title        = {An Efficient Algorithm for Solving the {MQ} Problem using Hilbert
                  Series},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1650},
  year         = {2023},
  url          = {https://eprint.iacr.org/2023/1650},
  timestamp    = {Thu, 09 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/SakataT23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieiceta/OkadaTFKT22,
  author       = {Hiroki Okada and
                  Atsushi Takayasu and
                  Kazuhide Fukushima and
                  Shinsaku Kiyomoto and
                  Tsuyoshi Takagi},
  title        = {Erratum: {A} Compact Digital Signature Scheme Based on the Module-LWR
                  Problem {[IEICE} Transactions on Fundamentals of Electronics, Communications
                  and Computer Sciences Vol. {E104.A} (2021), No. 9 pp.1219-1234]},
  journal      = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.},
  volume       = {105-A},
  number       = {2},
  pages        = {130},
  year         = {2022},
  url          = {https://doi.org/10.1587/transfun.2022eae0001},
  doi          = {10.1587/TRANSFUN.2022EAE0001},
  timestamp    = {Wed, 26 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieiceta/OkadaTFKT22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieiceta/YuWXT22,
  author       = {Xiaoling Yu and
                  Yuntao Wang and
                  Chungen Xu and
                  Tsuyoshi Takagi},
  title        = {Revisiting the Orthogonal Lattice Algorithm in Solving General Approximate
                  Common Divisor Problem},
  journal      = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.},
  volume       = {105-A},
  number       = {3},
  pages        = {195--202},
  year         = {2022},
  url          = {https://doi.org/10.1587/transfun.2021cip0021},
  doi          = {10.1587/TRANSFUN.2021CIP0021},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieiceta/YuWXT22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jsiaml/TakahashiOT22,
  author       = {Shu Takahashi and
                  Hiroshi Onuki and
                  Tsuyoshi Takagi},
  title        = {Explicit construction of the square-root V{\'{e}}lu's formula
                  on Edwards curves},
  journal      = {{JSIAM} Lett.},
  volume       = {14},
  pages        = {108--110},
  year         = {2022},
  url          = {https://doi.org/10.14495/jsiaml.14.108},
  doi          = {10.14495/JSIAML.14.108},
  timestamp    = {Wed, 24 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jsiaml/TakahashiOT22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/arith/AokiMOT22,
  author       = {Daichi Aoki and
                  Kazuhiko Minematsu and
                  Toshihiko Okamura and
                  Tsuyoshi Takagi},
  title        = {Efficient Word Size Modular Multiplication over Signed Integers},
  booktitle    = {29th {IEEE} Symposium on Computer Arithmetic, {ARITH} 2022, Lyon,
                  France, September 12-14, 2022},
  pages        = {94--101},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/ARITH54963.2022.00026},
  doi          = {10.1109/ARITH54963.2022.00026},
  timestamp    = {Thu, 29 Dec 2022 15:06:50 +0100},
  biburl       = {https://dblp.org/rec/conf/arith/AokiMOT22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/KatoKT22,
  author       = {Taku Kato and
                  Yutaro Kiyomura and
                  Tsuyoshi Takagi},
  editor       = {Chen{-}Mou Cheng and
                  Mitsuaki Akiyama},
  title        = {Improving Fault Attacks on Rainbow with Fixing Random Vinegar Values},
  booktitle    = {Advances in Information and Computer Security - 17th International
                  Workshop on Security, {IWSEC} 2022, Tokyo, Japan, August 31 - September
                  2, 2022, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {13504},
  pages        = {147--165},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-15255-9\_8},
  doi          = {10.1007/978-3-031-15255-9\_8},
  timestamp    = {Thu, 18 Aug 2022 14:32:38 +0200},
  biburl       = {https://dblp.org/rec/conf/iwsec/KatoKT22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pqcrypto/FurueKNT22,
  author       = {Hiroki Furue and
                  Yutaro Kiyomura and
                  Tatsuya Nagasawa and
                  Tsuyoshi Takagi},
  editor       = {Jung Hee Cheon and
                  Thomas Johansson},
  title        = {A New Fault Attack on {UOV} Multivariate Signature Scheme},
  booktitle    = {Post-Quantum Cryptography - 13th International Workshop, PQCrypto
                  2022, Virtual Event, September 28-30, 2022, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {13512},
  pages        = {124--143},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-17234-2\_7},
  doi          = {10.1007/978-3-031-17234-2\_7},
  timestamp    = {Sun, 12 Nov 2023 02:15:49 +0100},
  biburl       = {https://dblp.org/rec/conf/pqcrypto/FurueKNT22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MoriyaOAT22,
  author       = {Tomoki Moriya and
                  Hiroshi Onuki and
                  Yusuke Aikawa and
                  Tsuyoshi Takagi},
  title        = {The Generalized Montgomery Coordinate: {A} New Computational Tool
                  for Isogeny-based Cryptography},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {150},
  year         = {2022},
  url          = {https://eprint.iacr.org/2022/150},
  timestamp    = {Tue, 22 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/MoriyaOAT22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KajitaOONT22,
  author       = {Kaisei Kajita and
                  Go Ohtake and
                  Kazuto Ogawa and
                  Koji Nuida and
                  Tsuyoshi Takagi},
  title        = {Short Lattice Signature Scheme with Tighter Reduction under Ring-SIS
                  Assumption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {479},
  year         = {2022},
  url          = {https://eprint.iacr.org/2022/479},
  timestamp    = {Mon, 16 May 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KajitaOONT22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieiceta/OkadaTFKT21,
  author       = {Hiroki Okada and
                  Atsushi Takayasu and
                  Kazuhide Fukushima and
                  Shinsaku Kiyomoto and
                  Tsuyoshi Takagi},
  title        = {A Compact Digital Signature Scheme Based on the Module-LWR Problem},
  journal      = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.},
  volume       = {104-A},
  number       = {9},
  pages        = {1219--1234},
  year         = {2021},
  url          = {https://doi.org/10.1587/transfun.2020dmp0012},
  doi          = {10.1587/TRANSFUN.2020DMP0012},
  timestamp    = {Wed, 26 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieiceta/OkadaTFKT21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iet-ifs/0005FXKT21,
  author       = {Ye Yuan and
                  Kazuhide Fukushima and
                  Junting Xiao and
                  Shinsaku Kiyomoto and
                  Tsuyoshi Takagi},
  title        = {Memory-constrained implementation of lattice-based encryption scheme
                  on standard Java Card platform},
  journal      = {{IET} Inf. Secur.},
  volume       = {15},
  number       = {4},
  pages        = {267--281},
  year         = {2021},
  url          = {https://doi.org/10.1049/ise2.12012},
  doi          = {10.1049/ISE2.12012},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iet-ifs/0005FXKT21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijisec/WangT21,
  author       = {Yuntao Wang and
                  Tsuyoshi Takagi},
  title        = {Studying lattice reduction algorithms improved by quick reordering
                  technique},
  journal      = {Int. J. Inf. Sec.},
  volume       = {20},
  number       = {2},
  pages        = {257--268},
  year         = {2021},
  url          = {https://doi.org/10.1007/s10207-020-00501-y},
  doi          = {10.1007/S10207-020-00501-Y},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijisec/WangT21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcs/NakamuraIWDT21,
  author       = {Shuhei Nakamura and
                  Yasuhiko Ikematsu and
                  Yacheng Wang and
                  Jintai Ding and
                  Tsuyoshi Takagi},
  title        = {New complexity estimation on the Rainbow-Band-Separation attack},
  journal      = {Theor. Comput. Sci.},
  volume       = {896},
  pages        = {1--18},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.tcs.2021.09.043},
  doi          = {10.1016/J.TCS.2021.09.043},
  timestamp    = {Fri, 12 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tcs/NakamuraIWDT21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/FurueIKT21,
  author       = {Hiroki Furue and
                  Yasuhiko Ikematsu and
                  Yutaro Kiyomura and
                  Tsuyoshi Takagi},
  editor       = {Mehdi Tibouchi and
                  Huaxiong Wang},
  title        = {A New Variant of Unbalanced Oil and Vinegar Using Quotient Ring: {QR-UOV}},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2021 - 27th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Singapore, December 6-10, 2021, Proceedings, Part {IV}},
  series       = {Lecture Notes in Computer Science},
  volume       = {13093},
  pages        = {187--217},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-92068-5\_7},
  doi          = {10.1007/978-3-030-92068-5\_7},
  timestamp    = {Fri, 03 Dec 2021 17:36:41 +0100},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/FurueIKT21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/UemuraFKKT21,
  author       = {Shusaku Uemura and
                  Kazuhide Fukushima and
                  Shinsaku Kiyomoto and
                  Momonari Kudo and
                  Tsuyoshi Takagi},
  editor       = {Toru Nakanishi and
                  Ryo Nojima},
  title        = {Shortest Vectors in Lattices of Bai-Galbraith's Embedding Attack on
                  the {LWR} Problem},
  booktitle    = {Advances in Information and Computer Security - 16th International
                  Workshop on Security, {IWSEC} 2021, Virtual Event, September 8-10,
                  2021, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {12835},
  pages        = {23--41},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-85987-9\_2},
  doi          = {10.1007/978-3-030-85987-9\_2},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwsec/UemuraFKKT21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/YinWT21,
  author       = {Changze Yin and
                  Yacheng Wang and
                  Tsuyoshi Takagi},
  editor       = {Toru Nakanishi and
                  Ryo Nojima},
  title        = {(Short Paper) Simple Matrix Signature Scheme},
  booktitle    = {Advances in Information and Computer Security - 16th International
                  Workshop on Security, {IWSEC} 2021, Virtual Event, September 8-10,
                  2021, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {12835},
  pages        = {227--237},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-85987-9\_13},
  doi          = {10.1007/978-3-030-85987-9\_13},
  timestamp    = {Fri, 03 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwsec/YinWT21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pqcrypto/FurueNT21,
  author       = {Hiroki Furue and
                  Shuhei Nakamura and
                  Tsuyoshi Takagi},
  editor       = {Jung Hee Cheon and
                  Jean{-}Pierre Tillich},
  title        = {Improving Thomae-Wolf Algorithm for Solving Underdetermined Multivariate
                  Quadratic Polynomial Problem},
  booktitle    = {Post-Quantum Cryptography - 12th International Workshop, PQCrypto
                  2021, Daejeon, South Korea, July 20-22, 2021, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {12841},
  pages        = {65--78},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-81293-5\_4},
  doi          = {10.1007/978-3-030-81293-5\_4},
  timestamp    = {Wed, 21 Jul 2021 15:51:05 +0200},
  biburl       = {https://dblp.org/rec/conf/pqcrypto/FurueNT21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/OkadaTFKT21,
  author       = {Hiroki Okada and
                  Atsushi Takayasu and
                  Kazuhide Fukushima and
                  Shinsaku Kiyomoto and
                  Tsuyoshi Takagi},
  title        = {A Compact Digital Signature Scheme Based on the Module-LWR problem},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1699},
  year         = {2021},
  url          = {https://eprint.iacr.org/2021/1699},
  timestamp    = {Wed, 26 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/OkadaTFKT21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/OkadaTFKT20,
  author       = {Hiroki Okada and
                  Atsushi Takayasu and
                  Kazuhide Fukushima and
                  Shinsaku Kiyomoto and
                  Tsuyoshi Takagi},
  title        = {On the Complexity of the LWR-Solving {BKW} Algorithm},
  journal      = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.},
  volume       = {103-A},
  number       = {1},
  pages        = {173--182},
  year         = {2020},
  url          = {http://search.ieice.org/bin/summary.php?id=e103-a\_1\_173},
  doi          = {10.1587/TRANSFUN.2019CIP0022},
  timestamp    = {Wed, 26 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieicet/OkadaTFKT20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieiceta/OnukiAYT20,
  author       = {Hiroshi Onuki and
                  Yusuke Aikawa and
                  Tsutomu Yamazaki and
                  Tsuyoshi Takagi},
  title        = {A Constant-Time Algorithm of {CSIDH} Keeping Two Points},
  journal      = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.},
  volume       = {103-A},
  number       = {10},
  pages        = {1174--1182},
  year         = {2020},
  url          = {https://doi.org/10.1587/transfun.2019DMP0008},
  doi          = {10.1587/TRANSFUN.2019DMP0008},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieiceta/OnukiAYT20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnc/FurueDT20,
  author       = {Hiroki Furue and
                  Dung Hoang Duong and
                  Tsuyoshi Takagi},
  title        = {An Efficient MQ-based Signature with Tight Security Proof},
  journal      = {Int. J. Netw. Comput.},
  volume       = {10},
  number       = {2},
  pages        = {308--324},
  year         = {2020},
  url          = {http://www.ijnc.org/index.php/ijnc/article/view/238},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnc/FurueDT20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/Okada0T20,
  author       = {Satoshi Okada and
                  Yuntao Wang and
                  Tsuyoshi Takagi},
  editor       = {Joseph K. Liu and
                  Hui Cui},
  title        = {Improving Key Mismatch Attack on NewHope with Fewer Queries},
  booktitle    = {Information Security and Privacy - 25th Australasian Conference, {ACISP}
                  2020, Perth, WA, Australia, November 30 - December 2, 2020, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {12248},
  pages        = {505--524},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-55304-3\_26},
  doi          = {10.1007/978-3-030-55304-3\_26},
  timestamp    = {Wed, 17 Aug 2022 14:32:12 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/Okada0T20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/MoriyaOT20,
  author       = {Tomoki Moriya and
                  Hiroshi Onuki and
                  Tsuyoshi Takagi},
  editor       = {Shiho Moriai and
                  Huaxiong Wang},
  title        = {SiGamal: {A} Supersingular Isogeny-Based {PKE} and Its Application
                  to a {PRF}},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2020 - 26th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Daejeon, South Korea, December 7-11, 2020, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12492},
  pages        = {551--580},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-64834-3\_19},
  doi          = {10.1007/978-3-030-64834-3\_19},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/MoriyaOT20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/WangIAT20,
  author       = {Yuntao Wang and
                  Yasuhiko Ikematsu and
                  Koichiro Akiyama and
                  Tsuyoshi Takagi},
  editor       = {Keita Emura and
                  Naoto Yanai},
  title        = {Cryptanalysis of GiophantusTM Schemes against Hybrid Attack},
  booktitle    = {Proceedings of the 7th on {ASIA} Public-Key Cryptography Workshop,
                  APKC@AsiaCCS 2020, Taipei, Taiwan, October 6, 2020},
  pages        = {28--35},
  publisher    = {{ACM}},
  year         = {2020},
  url          = {https://doi.org/10.1145/3384940.3388958},
  doi          = {10.1145/3384940.3388958},
  timestamp    = {Tue, 29 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/WangIAT20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ctrsa/MoriyaOT20,
  author       = {Tomoki Moriya and
                  Hiroshi Onuki and
                  Tsuyoshi Takagi},
  editor       = {Stanislaw Jarecki},
  title        = {How to Construct {CSIDH} on Edwards Curves},
  booktitle    = {Topics in Cryptology - {CT-RSA} 2020 - The Cryptographers' Track at
                  the {RSA} Conference 2020, San Francisco, CA, USA, February 24-28,
                  2020, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {12006},
  pages        = {512--537},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-40186-3\_22},
  doi          = {10.1007/978-3-030-40186-3\_22},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ctrsa/MoriyaOT20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icics/OkadaTFKT20,
  author       = {Hiroki Okada and
                  Atsushi Takayasu and
                  Kazuhide Fukushima and
                  Shinsaku Kiyomoto and
                  Tsuyoshi Takagi},
  editor       = {Weizhi Meng and
                  Dieter Gollmann and
                  Christian Damsgaard Jensen and
                  Jianying Zhou},
  title        = {A Compact Digital Signature Scheme Based on the Module-LWR Problem},
  booktitle    = {Information and Communications Security - 22nd International Conference,
                  {ICICS} 2020, Copenhagen, Denmark, August 24-26, 2020, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {12282},
  pages        = {73--90},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-61078-4\_5},
  doi          = {10.1007/978-3-030-61078-4\_5},
  timestamp    = {Wed, 26 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icics/OkadaTFKT20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icisc/KawashimaTAT20,
  author       = {Tomoki Kawashima and
                  Katsuyuki Takashima and
                  Yusuke Aikawa and
                  Tsuyoshi Takagi},
  editor       = {Deukjo Hong},
  title        = {An Efficient Authenticated Key Exchange from Random Self-reducibility
                  on {CSIDH}},
  booktitle    = {Information Security and Cryptology - {ICISC} 2020 - 23rd International
                  Conference, Seoul, South Korea, December 2-4, 2020, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {12593},
  pages        = {58--84},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-68890-5\_4},
  doi          = {10.1007/978-3-030-68890-5\_4},
  timestamp    = {Thu, 11 Feb 2021 16:04:17 +0100},
  biburl       = {https://dblp.org/rec/conf/icisc/KawashimaTAT20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isita/OnukiAT20,
  author       = {Hiroshi Onuki and
                  Yusuke Aikawa and
                  Tsuyoshi Takagi},
  title        = {The Existence of Cycles in the Supersingular Isogeny Graphs Used in
                  {SIKE}},
  booktitle    = {International Symposium on Information Theory and Its Applications,
                  {ISITA} 2020, Kapolei, HI, USA, October 24-27, 2020},
  pages        = {358--362},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://ieeexplore.ieee.org/document/9366119},
  timestamp    = {Mon, 22 Mar 2021 15:48:59 +0100},
  biburl       = {https://dblp.org/rec/conf/isita/OnukiAT20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/OnukiT20,
  author       = {Hiroshi Onuki and
                  Tsuyoshi Takagi},
  editor       = {Kazumaro Aoki and
                  Akira Kanaoka},
  title        = {On Collisions Related to an Ideal Class of Order 3 in {CSIDH}},
  booktitle    = {Advances in Information and Computer Security - 15th International
                  Workshop on Security, {IWSEC} 2020, Fukui, Japan, September 2-4, 2020,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {12231},
  pages        = {131--148},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-58208-1\_8},
  doi          = {10.1007/978-3-030-58208-1\_8},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwsec/OnukiT20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pqcrypto/FurueKIWT20,
  author       = {Hiroki Furue and
                  Koha Kinjo and
                  Yasuhiko Ikematsu and
                  Yacheng Wang and
                  Tsuyoshi Takagi},
  editor       = {Jintai Ding and
                  Jean{-}Pierre Tillich},
  title        = {A Structural Attack on Block-Anti-Circulant {UOV} at {SAC} 2019},
  booktitle    = {Post-Quantum Cryptography - 11th International Conference, PQCrypto
                  2020, Paris, France, April 15-17, 2020, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {12100},
  pages        = {323--339},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-44223-1\_18},
  doi          = {10.1007/978-3-030-44223-1\_18},
  timestamp    = {Wed, 15 Apr 2020 17:34:50 +0200},
  biburl       = {https://dblp.org/rec/conf/pqcrypto/FurueKIWT20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pqcrypto/YasudaWT20,
  author       = {Takanori Yasuda and
                  Yacheng Wang and
                  Tsuyoshi Takagi},
  editor       = {Jintai Ding and
                  Jean{-}Pierre Tillich},
  title        = {Multivariate Encryption Schemes Based on Polynomial Equations over
                  Real Numbers},
  booktitle    = {Post-Quantum Cryptography - 11th International Conference, PQCrypto
                  2020, Paris, France, April 15-17, 2020, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {12100},
  pages        = {402--421},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-44223-1\_22},
  doi          = {10.1007/978-3-030-44223-1\_22},
  timestamp    = {Wed, 15 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pqcrypto/YasudaWT20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/provsec/KajitaONT20,
  author       = {Kaisei Kajita and
                  Kazuto Ogawa and
                  Koji Nuida and
                  Tsuyoshi Takagi},
  editor       = {Khoa Nguyen and
                  Wenling Wu and
                  Kwok{-}Yan Lam and
                  Huaxiong Wang},
  title        = {Short Lattice Signatures in the Standard Model with Efficient Tag
                  Generation},
  booktitle    = {Provable and Practical Security - 14th International Conference, ProvSec
                  2020, Singapore, November 29 - December 1, 2020, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {12505},
  pages        = {85--102},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-62576-4\_5},
  doi          = {10.1007/978-3-030-62576-4\_5},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/provsec/KajitaONT20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/WangINT20,
  author       = {Yacheng Wang and
                  Yasuhiko Ikematsu and
                  Shuhei Nakamura and
                  Tsuyoshi Takagi},
  editor       = {Ilsun You},
  title        = {Revisiting the Minrank Problem on Multivariate Cryptography},
  booktitle    = {Information Security Applications - 21st International Conference,
                  {WISA} 2020, Jeju Island, South Korea, August 26-28, 2020, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {12583},
  pages        = {291--307},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-65299-9\_22},
  doi          = {10.1007/978-3-030-65299-9\_22},
  timestamp    = {Sat, 12 Dec 2020 14:20:23 +0100},
  biburl       = {https://dblp.org/rec/conf/wisa/WangINT20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/NakagawaOTT20,
  author       = {Kohei Nakagawa and
                  Hiroshi Onuki and
                  Atsushi Takayasu and
                  Tsuyoshi Takagi},
  title        = {L\({}_{\mbox{1}}\)-Norm Ball for {CSIDH:} Optimal Strategy for Choosing
                  the Secret Key Space},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {181},
  year         = {2020},
  url          = {https://eprint.iacr.org/2020/181},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/NakagawaOTT20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/OnukiAT20,
  author       = {Hiroshi Onuki and
                  Yusuke Aikawa and
                  Tsuyoshi Takagi},
  title        = {The Existence of Cycles in the Supersingular Isogeny Graphs Used in
                  {SIKE}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {439},
  year         = {2020},
  url          = {https://eprint.iacr.org/2020/439},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/OnukiAT20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/OkadaWT20,
  author       = {Satoshi Okada and
                  Yuntao Wang and
                  Tsuyoshi Takagi},
  title        = {Improving Key Mismatch Attack on NewHope with Fewer Queries},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {585},
  year         = {2020},
  url          = {https://eprint.iacr.org/2020/585},
  timestamp    = {Wed, 27 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/OkadaWT20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MoriyaOT20,
  author       = {Tomoki Moriya and
                  Hiroshi Onuki and
                  Tsuyoshi Takagi},
  title        = {SiGamal: {A} supersingular isogeny-based {PKE} and its application
                  to a {PRF}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {613},
  year         = {2020},
  url          = {https://eprint.iacr.org/2020/613},
  timestamp    = {Tue, 30 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/MoriyaOT20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/NakamuraIWDT20,
  author       = {Shuhei Nakamura and
                  Yasuhiko Ikematsu and
                  Yacheng Wang and
                  Jintai Ding and
                  Tsuyoshi Takagi},
  title        = {New Complexity Estimation on the Rainbow-Band-Separation Attack},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {703},
  year         = {2020},
  url          = {https://eprint.iacr.org/2020/703},
  timestamp    = {Tue, 30 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/NakamuraIWDT20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KawashimaTAT20,
  author       = {Tomoki Kawashima and
                  Katsuyuki Takashima and
                  Yusuke Aikawa and
                  Tsuyoshi Takagi},
  title        = {An Efficient Authenticated Key Exchange from Random Self-Reducibility
                  on {CSIDH}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1178},
  year         = {2020},
  url          = {https://eprint.iacr.org/2020/1178},
  timestamp    = {Fri, 30 Oct 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/KawashimaTAT20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/FurueIKT20,
  author       = {Hiroki Furue and
                  Yasuhiko Ikematsu and
                  Yutaro Kiyomura and
                  Tsuyoshi Takagi},
  title        = {A New Variant of Unbalanced Oil and Vinegar Using Quotient Ring: {QR-UOV}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1243},
  year         = {2020},
  url          = {https://eprint.iacr.org/2020/1243},
  timestamp    = {Fri, 30 Oct 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/FurueIKT20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/WangIDT19,
  author       = {Yacheng Wang and
                  Yasuhiko Ikematsu and
                  Dung Hoang Duong and
                  Tsuyoshi Takagi},
  title        = {The Secure Parameters and Efficient Decryption Algorithm for Multivariate
                  Public Key Cryptosystem {EFC}},
  journal      = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.},
  volume       = {102-A},
  number       = {9},
  pages        = {1028--1036},
  year         = {2019},
  url          = {https://doi.org/10.1587/transfun.E102.A.1028},
  doi          = {10.1587/TRANSFUN.E102.A.1028},
  timestamp    = {Thu, 21 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieicet/WangIDT19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/MatsudaTT19,
  author       = {Kotaro Matsuda and
                  Atsushi Takayasu and
                  Tsuyoshi Takagi},
  title        = {Explicit Relation between Low-Dimensional LLL-Reduced Bases and Shortest
                  Vectors},
  journal      = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.},
  volume       = {102-A},
  number       = {9},
  pages        = {1091--1100},
  year         = {2019},
  url          = {https://doi.org/10.1587/transfun.E102.A.1091},
  doi          = {10.1587/TRANSFUN.E102.A.1091},
  timestamp    = {Thu, 21 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieicet/MatsudaTT19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jip/HashimotoIT19,
  author       = {Yasufumi Hashimoto and
                  Yasuhiko Ikematsu and
                  Tsuyoshi Takagi},
  title        = {Chosen Message Attack on Multivariate Signature {ELSA} at Asiacrypt
                  2017},
  journal      = {J. Inf. Process.},
  volume       = {27},
  pages        = {517--524},
  year         = {2019},
  url          = {https://doi.org/10.2197/ipsjjip.27.517},
  doi          = {10.2197/IPSJJIP.27.517},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jip/HashimotoIT19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tsg/ChengQLJT19,
  author       = {Chi Cheng and
                  Yue Qin and
                  Rongxing Lu and
                  Tao Jiang and
                  Tsuyoshi Takagi},
  title        = {Batten Down the Hatches: Securing Neighborhood Area Networks of Smart
                  Grid in the Quantum Era},
  journal      = {{IEEE} Trans. Smart Grid},
  volume       = {10},
  number       = {6},
  pages        = {6386--6395},
  year         = {2019},
  url          = {https://doi.org/10.1109/TSG.2019.2903836},
  doi          = {10.1109/TSG.2019.2903836},
  timestamp    = {Thu, 07 Nov 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tsg/ChengQLJT19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/DingGTW19,
  author       = {Jintai Ding and
                  Xinwei Gao and
                  Tsuyoshi Takagi and
                  Yuntao Wang},
  editor       = {Robert H. Deng and
                  Val{\'{e}}rie Gauthier{-}Uma{\~{n}}a and
                  Mart{\'{\i}}n Ochoa and
                  Moti Yung},
  title        = {One Sample Ring-LWE with Rounding and Its Application to Key Exchange},
  booktitle    = {Applied Cryptography and Network Security - 17th International Conference,
                  {ACNS} 2019, Bogota, Colombia, June 5-7, 2019, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11464},
  pages        = {323--343},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-21568-2\_16},
  doi          = {10.1007/978-3-030-21568-2\_16},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acns/DingGTW19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cisc/MoriyaTT19,
  author       = {Tomoki Moriya and
                  Katsuyuki Takashima and
                  Tsuyoshi Takagi},
  editor       = {Zhe Liu and
                  Moti Yung},
  title        = {Group Key Exchange from {CSIDH} and Its Application to Trusted Setup
                  in Supersingular Isogeny Cryptosystems},
  booktitle    = {Information Security and Cryptology - 15th International Conference,
                  Inscrypt 2019, Nanjing, China, December 6-8, 2019, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {12020},
  pages        = {86--98},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-42921-8\_5},
  doi          = {10.1007/978-3-030-42921-8\_5},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cisc/MoriyaTT19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ctrsa/MizuideTT19,
  author       = {Taiga Mizuide and
                  Atsushi Takayasu and
                  Tsuyoshi Takagi},
  editor       = {Mitsuru Matsui},
  title        = {Tight Reductions for Diffie-Hellman Variants in the Algebraic Group
                  Model},
  booktitle    = {Topics in Cryptology - {CT-RSA} 2019 - The Cryptographers' Track at
                  the {RSA} Conference 2019, San Francisco, CA, USA, March 4-8, 2019,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11405},
  pages        = {169--188},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-12612-4\_9},
  doi          = {10.1007/978-3-030-12612-4\_9},
  timestamp    = {Fri, 27 Dec 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ctrsa/MizuideTT19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ic-nc/FurueDT19,
  author       = {Hiroki Furue and
                  Dung Hoang Duong and
                  Tsuyoshi Takagi},
  title        = {An Efficient MQ-Based Signature in the {QROM}},
  booktitle    = {2019 Seventh International Symposium on Computing and Networking,
                  {CANDAR} 2019, Nagasaki, Japan, November 25-28, 2019},
  pages        = {10--17},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/CANDAR.2019.00010},
  doi          = {10.1109/CANDAR.2019.00010},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ic-nc/FurueDT19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icissp/0001MFKT19,
  author       = {Partha Sarathi Roy and
                  Kirill Morozov and
                  Kazuhide Fukushima and
                  Shinsaku Kiyomoto and
                  Tsuyoshi Takagi},
  editor       = {Paolo Mori and
                  Steven Furnell and
                  Olivier Camp},
  title        = {Security Analysis and Efficient Implementation of Code-based Signature
                  Schemes},
  booktitle    = {Proceedings of the 5th International Conference on Information Systems
                  Security and Privacy, {ICISSP} 2019, Prague, Czech Republic, February
                  23-25, 2019},
  pages        = {213--220},
  publisher    = {SciTePress},
  year         = {2019},
  url          = {https://doi.org/10.5220/0007259102130220},
  doi          = {10.5220/0007259102130220},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icissp/0001MFKT19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/OnukiAYT19,
  author       = {Hiroshi Onuki and
                  Yusuke Aikawa and
                  Tsutomu Yamazaki and
                  Tsuyoshi Takagi},
  editor       = {Nuttapong Attrapadung and
                  Takeshi Yagi},
  title        = {(Short Paper) {A} Faster Constant-Time Algorithm of {CSIDH} Keeping
                  Two Points},
  booktitle    = {Advances in Information and Computer Security - 14th International
                  Workshop on Security, {IWSEC} 2019, Tokyo, Japan, August 28-30, 2019,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11689},
  pages        = {23--33},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-26834-3\_2},
  doi          = {10.1007/978-3-030-26834-3\_2},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwsec/OnukiAYT19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/OnukiAYT19,
  author       = {Hiroshi Onuki and
                  Yusuke Aikawa and
                  Tsutomu Yamazaki and
                  Tsuyoshi Takagi},
  title        = {A Faster Constant-time Algorithm of {CSIDH} keeping Two Torsion Points},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {353},
  year         = {2019},
  url          = {https://eprint.iacr.org/2019/353},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/OnukiAYT19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MoriyaOT19,
  author       = {Tomoki Moriya and
                  Hiroshi Onuki and
                  Tsuyoshi Takagi},
  title        = {How to Construct {CSIDH} on Edwards Curves},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {843},
  year         = {2019},
  url          = {https://eprint.iacr.org/2019/843},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/MoriyaOT19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DingKTW19,
  author       = {Jintai Ding and
                  Seungki Kim and
                  Tsuyoshi Takagi and
                  Yuntao Wang},
  title        = {{LLL} and stochastic sandpile models},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1009},
  year         = {2019},
  url          = {https://eprint.iacr.org/2019/1009},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DingKTW19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/OnukiT19,
  author       = {Hiroshi Onuki and
                  Tsuyoshi Takagi},
  title        = {On collisions related to an ideal class of order 3 in {CSIDH}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1209},
  year         = {2019},
  url          = {https://eprint.iacr.org/2019/1209},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/OnukiT19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/Takagi18,
  author       = {Tsuyoshi Takagi},
  title        = {Recent Developments in Post-Quantum Cryptography},
  journal      = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.},
  volume       = {101-A},
  number       = {1},
  pages        = {3--11},
  year         = {2018},
  url          = {https://doi.org/10.1587/transfun.E101.A.3},
  doi          = {10.1587/TRANSFUN.E101.A.3},
  timestamp    = {Sat, 11 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieicet/Takagi18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/IkematsuDPT18,
  author       = {Yasuhiko Ikematsu and
                  Dung Hoang Duong and
                  Albrecht Petzoldt and
                  Tsuyoshi Takagi},
  title        = {An Efficient Key Generation of {ZHFE} Public Key Cryptosystem},
  journal      = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.},
  volume       = {101-A},
  number       = {1},
  pages        = {29--38},
  year         = {2018},
  url          = {https://doi.org/10.1587/transfun.E101.A.29},
  doi          = {10.1587/TRANSFUN.E101.A.29},
  timestamp    = {Mon, 26 Oct 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieicet/IkematsuDPT18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/WangAT18,
  author       = {Yuntao Wang and
                  Yoshinori Aono and
                  Tsuyoshi Takagi},
  title        = {Hardness Evaluation for Search {LWE} Problem Using Progressive {BKZ}
                  Simulator},
  journal      = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.},
  volume       = {101-A},
  number       = {12},
  pages        = {2162--2170},
  year         = {2018},
  url          = {https://doi.org/10.1587/transfun.E101.A.2162},
  doi          = {10.1587/TRANSFUN.E101.A.2162},
  timestamp    = {Tue, 29 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieicet/WangAT18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/YuanXFKT18,
  author       = {Ye Yuan and
                  Junting Xiao and
                  Kazuhide Fukushima and
                  Shinsaku Kiyomoto and
                  Tsuyoshi Takagi},
  title        = {Portable Implementation of Postquantum Encryption Schemes and Key
                  Exchange Protocols on JavaScript-Enabled Platforms},
  journal      = {Secur. Commun. Networks},
  volume       = {2018},
  pages        = {9846168:1--9846168:14},
  year         = {2018},
  url          = {https://doi.org/10.1155/2018/9846168},
  doi          = {10.1155/2018/9846168},
  timestamp    = {Mon, 26 Oct 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/scn/YuanXFKT18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/WangIDT18,
  author       = {Yacheng Wang and
                  Yasuhiko Ikematsu and
                  Dung Hoang Duong and
                  Tsuyoshi Takagi},
  editor       = {Willy Susilo and
                  Guomin Yang},
  title        = {Efficient Decryption Algorithms for Extension Field Cancellation Type
                  Encryption Schemes},
  booktitle    = {Information Security and Privacy - 23rd Australasian Conference, {ACISP}
                  2018, Wollongong, NSW, Australia, July 11-13, 2018, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10946},
  pages        = {487--501},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-93638-3\_28},
  doi          = {10.1007/978-3-319-93638-3\_28},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/WangIDT18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/WangT18,
  author       = {Yuntao Wang and
                  Tsuyoshi Takagi},
  editor       = {Willy Susilo and
                  Guomin Yang},
  title        = {Improving the {BKZ} Reduction Algorithm by Quick Reordering Technique},
  booktitle    = {Information Security and Privacy - 23rd Australasian Conference, {ACISP}
                  2018, Wollongong, NSW, Australia, July 11-13, 2018, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10946},
  pages        = {787--795},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-93638-3\_47},
  doi          = {10.1007/978-3-319-93638-3\_47},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/WangT18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icisc/OkadaTFKT18,
  author       = {Hiroki Okada and
                  Atsushi Takayasu and
                  Kazuhide Fukushima and
                  Shinsaku Kiyomoto and
                  Tsuyoshi Takagi},
  editor       = {Kwangsu Lee},
  title        = {On the Complexity of the LWR-Solving {BKW} Algorithm},
  booktitle    = {Information Security and Cryptology - {ICISC} 2018 - 21st International
                  Conference, Seoul, South Korea, November 28-30, 2018, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {11396},
  pages        = {196--214},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-12146-4\_13},
  doi          = {10.1007/978-3-030-12146-4\_13},
  timestamp    = {Wed, 26 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icisc/OkadaTFKT18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isita/IkematsuAT18,
  author       = {Yasuhiko Ikematsu and
                  Koichiro Akiyama and
                  Tsuyoshi Takagi},
  title        = {An Improvement on the Linear Algebraic Attack for the Indeterminate
                  Equation Encryption Scheme},
  booktitle    = {International Symposium on Information Theory and Its Applications,
                  {ISITA} 2018, Singapore, October 28-31, 2018},
  pages        = {389--393},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.23919/ISITA.2018.8664254},
  doi          = {10.23919/ISITA.2018.8664254},
  timestamp    = {Wed, 11 Aug 2021 11:51:25 +0200},
  biburl       = {https://dblp.org/rec/conf/isita/IkematsuAT18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/HashimotoIT18,
  author       = {Yasufumi Hashimoto and
                  Yasuhiko Ikematsu and
                  Tsuyoshi Takagi},
  editor       = {Atsuo Inomata and
                  Kan Yasuda},
  title        = {Chosen Message Attack on Multivariate Signature {ELSA} at Asiacrypt
                  2017},
  booktitle    = {Advances in Information and Computer Security - 13th International
                  Workshop on Security, {IWSEC} 2018, Sendai, Japan, September 3-5,
                  2018, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11049},
  pages        = {3--18},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-97916-8\_1},
  doi          = {10.1007/978-3-319-97916-8\_1},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwsec/HashimotoIT18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/WangWTT18,
  author       = {Weiyao Wang and
                  Yuntao Wang and
                  Atsushi Takayasu and
                  Tsuyoshi Takagi},
  editor       = {Atsuo Inomata and
                  Kan Yasuda},
  title        = {Estimated Cost for Solving Generalized Learning with Errors Problem
                  via Embedding Techniques},
  booktitle    = {Advances in Information and Computer Security - 13th International
                  Workshop on Security, {IWSEC} 2018, Sendai, Japan, September 3-5,
                  2018, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11049},
  pages        = {87--103},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-97916-8\_6},
  doi          = {10.1007/978-3-319-97916-8\_6},
  timestamp    = {Tue, 17 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwsec/WangWTT18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pqcrypto/IkematsuPSTV18,
  author       = {Yasuhiko Ikematsu and
                  Ray A. Perlner and
                  Daniel Smith{-}Tone and
                  Tsuyoshi Takagi and
                  Jeremy Vates},
  editor       = {Tanja Lange and
                  Rainer Steinwandt},
  title        = {{HFERP} - {A} New Multivariate Encryption Scheme},
  booktitle    = {Post-Quantum Cryptography - 9th International Conference, PQCrypto
                  2018, Fort Lauderdale, FL, USA, April 9-11, 2018, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10786},
  pages        = {396--416},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-79063-3\_19},
  doi          = {10.1007/978-3-319-79063-3\_19},
  timestamp    = {Tue, 14 May 2019 10:00:42 +0200},
  biburl       = {https://dblp.org/rec/conf/pqcrypto/IkematsuPSTV18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/fcs2/2018,
  editor       = {Fagen Li and
                  Tsuyoshi Takagi and
                  Chunxiang Xu and
                  Xiaosong Zhang},
  title        = {Frontiers in Cyber Security - First International Conference, {FCS}
                  2018, Chengdu, China, November 5-7, 2018, Proceedings},
  series       = {Communications in Computer and Information Science},
  volume       = {879},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-981-13-3095-7},
  doi          = {10.1007/978-981-13-3095-7},
  isbn         = {978-981-13-3094-0},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/fcs2/2018.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1804-03285,
  author       = {Jintai Ding and
                  Seungki Kim and
                  Tsuyoshi Takagi and
                  Yuntao Wang},
  title        = {Why 1.02? The root Hermite factor of {LLL} and stochastic sandpile
                  models},
  journal      = {CoRR},
  volume       = {abs/1804.03285},
  year         = {2018},
  url          = {http://arxiv.org/abs/1804.03285},
  eprinttype    = {arXiv},
  eprint       = {1804.03285},
  timestamp    = {Fri, 06 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1804-03285.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HashimotoIT18,
  author       = {Yasufumi Hashimoto and
                  Yasuhiko Ikematsu and
                  Tsuyoshi Takagi},
  title        = {Chosen Message Attack on Multivariate Signature {ELSA} at Asiacrypt
                  2017},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {310},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/310},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/HashimotoIT18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MizuideTT18,
  author       = {Taiga Mizuide and
                  Atsushi Takayasu and
                  Tsuyoshi Takagi},
  title        = {Tight Reductions for Diffie-Hellman Variants in the Algebraic Group
                  Model},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1220},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/1220},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/MizuideTT18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/YuanFXKT18,
  author       = {Ye Yuan and
                  Kazuhide Fukushima and
                  Junting Xiao and
                  Shinsaku Kiyomoto and
                  Tsuyoshi Takagi},
  title        = {Memory-Constrained Implementation of Lattice-based Encryption Scheme
                  on the Standard Java Card Platform},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1238},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/1238},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/YuanFXKT18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cm/ChengLPT17,
  author       = {Chi Cheng and
                  Rongxing Lu and
                  Albrecht Petzoldt and
                  Tsuyoshi Takagi},
  title        = {Securing the Internet of Things in a Quantum World},
  journal      = {{IEEE} Commun. Mag.},
  volume       = {55},
  number       = {2},
  pages        = {116--120},
  year         = {2017},
  url          = {https://doi.org/10.1109/MCOM.2017.1600522CM},
  doi          = {10.1109/MCOM.2017.1600522CM},
  timestamp    = {Tue, 25 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cm/ChengLPT17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/XuMYZT17,
  author       = {Rui Xu and
                  Kirill Morozov and
                  Yanjiang Yang and
                  Jianying Zhou and
                  Tsuyoshi Takagi},
  title        = {Efficient outsourcing of secure k-nearest neighbour query over encrypted
                  database},
  journal      = {Comput. Secur.},
  volume       = {69},
  pages        = {65--83},
  year         = {2017},
  url          = {https://doi.org/10.1016/j.cose.2016.11.012},
  doi          = {10.1016/J.COSE.2016.11.012},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/XuMYZT17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/XuMT17,
  author       = {Rui Xu and
                  Kirill Morozov and
                  Tsuyoshi Takagi},
  title        = {Secret Sharing with Cheaters Using Multi-Receiver Authentication},
  journal      = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.},
  volume       = {100-A},
  number       = {1},
  pages        = {115--125},
  year         = {2017},
  url          = {https://doi.org/10.1587/transfun.E100.A.115},
  doi          = {10.1587/TRANSFUN.E100.A.115},
  timestamp    = {Sat, 11 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieicet/XuMT17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/JoPT17,
  author       = {Hyungrok Jo and
                  Christophe Petit and
                  Tsuyoshi Takagi},
  title        = {Full Cryptanalysis of Hash Functions Based on Cubic Ramanujan Graphs},
  journal      = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.},
  volume       = {100-A},
  number       = {9},
  pages        = {1891--1899},
  year         = {2017},
  url          = {https://doi.org/10.1587/transfun.E100.A.1891},
  doi          = {10.1587/TRANSFUN.E100.A.1891},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieicet/JoPT17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/DuongPT17,
  author       = {Dung Hoang Duong and
                  Albrecht Petzoldt and
                  Tsuyoshi Takagi},
  title        = {CyclicSRP - {A} Multivariate Encryption Scheme with a Partially Cyclic
                  Public Key},
  journal      = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.},
  volume       = {100-A},
  number       = {12},
  pages        = {2691--2698},
  year         = {2017},
  url          = {https://doi.org/10.1587/transfun.E100.A.2691},
  doi          = {10.1587/TRANSFUN.E100.A.2691},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieicet/DuongPT17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jsiaml/TachibanaTT17,
  author       = {Hikari Tachibana and
                  Katsuyuki Takashima and
                  Tsuyoshi Takagi},
  title        = {Constructing an efficient hash function from {\textdollar}3{\textdollar}-isogenies},
  journal      = {{JSIAM} Lett.},
  volume       = {9},
  pages        = {29--32},
  year         = {2017},
  url          = {https://doi.org/10.14495/jsiaml.9.29},
  doi          = {10.14495/JSIAML.9.29},
  timestamp    = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jsiaml/TachibanaTT17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/KiyomuraIKYTK17,
  author       = {Yutaro Kiyomura and
                  Akiko Inoue and
                  Yuto Kawahara and
                  Masaya Yasuda and
                  Tsuyoshi Takagi and
                  Tetsutaro Kobayashi},
  editor       = {Dieter Gollmann and
                  Atsuko Miyaji and
                  Hiroaki Kikuchi},
  title        = {Secure and Efficient Pairing at 256-Bit Security Level},
  booktitle    = {Applied Cryptography and Network Security - 15th International Conference,
                  {ACNS} 2017, Kanazawa, Japan, July 10-12, 2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10355},
  pages        = {59--79},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-61204-1\_4},
  doi          = {10.1007/978-3-319-61204-1\_4},
  timestamp    = {Tue, 14 May 2019 10:00:54 +0200},
  biburl       = {https://dblp.org/rec/conf/acns/KiyomuraIKYTK17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/XuYFTSKH17,
  author       = {Rui Xu and
                  Sze Ling Yeo and
                  Kazuhide Fukushima and
                  Tsuyoshi Takagi and
                  Hwajung Seo and
                  Shinsaku Kiyomoto and
                  Matt Henricksen},
  editor       = {Dieter Gollmann and
                  Atsuko Miyaji and
                  Hiroaki Kikuchi},
  title        = {An Experimental Study of the {BDD} Approach for the Search {LWE} Problem},
  booktitle    = {Applied Cryptography and Network Security - 15th International Conference,
                  {ACNS} 2017, Kanazawa, Japan, July 10-12, 2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10355},
  pages        = {253--272},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-61204-1\_13},
  doi          = {10.1007/978-3-319-61204-1\_13},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acns/XuYFTSKH17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/c2si/IkematsuDPT17,
  author       = {Yasuhiko Ikematsu and
                  Dung Hoang Duong and
                  Albrecht Petzoldt and
                  Tsuyoshi Takagi},
  editor       = {Said El Hajji and
                  Abderrahmane Nitaj and
                  El Mamoun Souidi},
  title        = {Revisiting the Efficient Key Generation of {ZHFE}},
  booktitle    = {Codes, Cryptology and Information Security - Second International
                  Conference, {C2SI} 2017, Rabat, Morocco, April 10-12, 2017, Proceedings
                  - In Honor of Claude Carlet},
  series       = {Lecture Notes in Computer Science},
  volume       = {10194},
  pages        = {195--212},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-55589-8\_13},
  doi          = {10.1007/978-3-319-55589-8\_13},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/c2si/IkematsuDPT17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/host/YuanFKT17,
  author       = {Ye Yuan and
                  Kazuhide Fukushima and
                  Shinsaku Kiyomoto and
                  Tsuyoshi Takagi},
  title        = {Memory-constrained implementation of lattice-based encryption scheme
                  on standard Java Card},
  booktitle    = {2017 {IEEE} International Symposium on Hardware Oriented Security
                  and Trust, {HOST} 2017, McLean, VA, USA, May 1-5, 2017},
  pages        = {47--50},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/HST.2017.7951796},
  doi          = {10.1109/HST.2017.7951796},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/host/YuanFKT17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icics/WangAT17,
  author       = {Yuntao Wang and
                  Yoshinori Aono and
                  Tsuyoshi Takagi},
  editor       = {Sihan Qing and
                  Chris Mitchell and
                  Liqun Chen and
                  Dongmei Liu},
  title        = {An Experimental Study of Kannan's Embedding Technique for the Search
                  {LWE} Problem},
  booktitle    = {Information and Communications Security - 19th International Conference,
                  {ICICS} 2017, Beijing, China, December 6-8, 2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10631},
  pages        = {541--553},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-89500-0\_47},
  doi          = {10.1007/978-3-319-89500-0\_47},
  timestamp    = {Fri, 06 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icics/WangAT17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isw/DuongYT17,
  author       = {Dung Hoang Duong and
                  Masaya Yasuda and
                  Tsuyoshi Takagi},
  editor       = {Phong Q. Nguyen and
                  Jianying Zhou},
  title        = {Choosing Parameters for the Subfield Lattice Attack Against Overstretched
                  {NTRU}},
  booktitle    = {Information Security - 20th International Conference, {ISC} 2017,
                  Ho Chi Minh City, Vietnam, November 22-24, 2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10599},
  pages        = {79--91},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-69659-1\_5},
  doi          = {10.1007/978-3-319-69659-1\_5},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isw/DuongYT17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/AlsayighDTW17,
  author       = {Saed Alsayigh and
                  Jintai Ding and
                  Tsuyoshi Takagi and
                  Yuntao Wang},
  editor       = {Satoshi Obana and
                  Koji Chida},
  title        = {The Beauty and the Beasts - The Hard Cases in {LLL} Reduction},
  booktitle    = {Advances in Information and Computer Security - 12th International
                  Workshop on Security, {IWSEC} 2017, Hiroshima, Japan, August 30 -
                  September 1, 2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10418},
  pages        = {19--35},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-64200-0\_2},
  doi          = {10.1007/978-3-319-64200-0\_2},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwsec/AlsayighDTW17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sacrypt/AkiyamaGOTNH17,
  author       = {Koichiro Akiyama and
                  Yasuhiro Goto and
                  Shinya Okumura and
                  Tsuyoshi Takagi and
                  Koji Nuida and
                  Goichiro Hanaoka},
  editor       = {Carlisle Adams and
                  Jan Camenisch},
  title        = {A Public-Key Encryption Scheme Based on Non-linear Indeterminate Equations},
  booktitle    = {Selected Areas in Cryptography - {SAC} 2017 - 24th International Conference,
                  Ottawa, ON, Canada, August 16-18, 2017, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {10719},
  pages        = {215--234},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-72565-9\_11},
  doi          = {10.1007/978-3-319-72565-9\_11},
  timestamp    = {Tue, 14 May 2019 10:00:38 +0200},
  biburl       = {https://dblp.org/rec/conf/sacrypt/AkiyamaGOTNH17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:books/sp/17/Takagi17,
  author       = {Tsuyoshi Takagi},
  editor       = {Tsuyoshi Takagi and
                  Masato Wakayama and
                  Keisuke Tanaka and
                  Noboru Kunihiro and
                  Kazufumi Kimoto and
                  Dung Hoang Duong},
  title        = {Introduction to {CREST} Crypto-Math Project},
  booktitle    = {Mathematical Modelling for Next-Generation Cryptography: {CREST} Crypto-Math
                  Project},
  series       = {Mathematics for Industry},
  pages        = {1--14},
  publisher    = {Springer Singapore},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-981-10-5065-7\_1},
  doi          = {10.1007/978-981-10-5065-7\_1},
  timestamp    = {Tue, 18 Jun 2019 19:22:00 +0200},
  biburl       = {https://dblp.org/rec/books/sp/17/Takagi17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@book{DBLP:books/sp/17/TWTK2017,
  editor       = {Tsuyoshi Takagi and
                  Masato Wakayama and
                  Keisuke Tanaka and
                  Noboru Kunihiro and
                  Kazufumi Kimoto and
                  Dung Hoang Duong},
  title        = {Mathematical Modelling for Next-Generation Cryptography: {CREST} Crypto-Math
                  Project},
  series       = {Mathematics for Industry},
  publisher    = {Springer Singapore},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-981-10-5065-7},
  doi          = {10.1007/978-981-10-5065-7},
  isbn         = {978-981-10-5064-0},
  timestamp    = {Tue, 18 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/books/sp/17/TWTK2017.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/asiacrypt/2017-1,
  editor       = {Tsuyoshi Takagi and
                  Thomas Peyrin},
  title        = {Advances in Cryptology - {ASIACRYPT} 2017 - 23rd International Conference
                  on the Theory and Applications of Cryptology and Information Security,
                  Hong Kong, China, December 3-7, 2017, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10624},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-70694-8},
  doi          = {10.1007/978-3-319-70694-8},
  isbn         = {978-3-319-70693-1},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/2017-1.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/asiacrypt/2017-2,
  editor       = {Tsuyoshi Takagi and
                  Thomas Peyrin},
  title        = {Advances in Cryptology - {ASIACRYPT} 2017 - 23rd International Conference
                  on the Theory and Applications of Cryptology and Information Security,
                  Hong Kong, China, December 3-7, 2017, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10625},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-70697-9},
  doi          = {10.1007/978-3-319-70697-9},
  isbn         = {978-3-319-70696-2},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/2017-2.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/asiacrypt/2017-3,
  editor       = {Tsuyoshi Takagi and
                  Thomas Peyrin},
  title        = {Advances in Cryptology - {ASIACRYPT} 2017 - 23rd International Conference
                  on the Theory and Applications of Cryptology and Information Security,
                  Hong Kong, China, December 3-7, 2017, Proceedings, Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10626},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-70700-6},
  doi          = {10.1007/978-3-319-70700-6},
  isbn         = {978-3-319-70699-3},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/2017-3.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/pqcrypto/2017,
  editor       = {Tanja Lange and
                  Tsuyoshi Takagi},
  title        = {Post-Quantum Cryptography - 8th International Workshop, PQCrypto 2017,
                  Utrecht, The Netherlands, June 26-28, 2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10346},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-59879-6},
  doi          = {10.1007/978-3-319-59879-6},
  isbn         = {978-3-319-59878-9},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pqcrypto/2017.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DuongYT17,
  author       = {Dung Hoang Duong and
                  Masaya Yasuda and
                  Tsuyoshi Takagi},
  title        = {Choosing Parameters for the Subfield Lattice Attack against overstretched
                  {NTRU}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {959},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/959},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DuongYT17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AkiyamaGOTNHSI17,
  author       = {Koichiro Akiyama and
                  Yasuhiro Goto and
                  Shinya Okumura and
                  Tsuyoshi Takagi and
                  Koji Nuida and
                  Goichiro Hanaoka and
                  Hideo Shimizu and
                  Yasuhiko Ikematsu},
  title        = {A Public-key Encryption Scheme Based on Non-linear Indeterminate Equations
                  (Giophantus)},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1241},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/1241},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AkiyamaGOTNHSI17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/amco/HakutaST16,
  author       = {Keisuke Hakuta and
                  Hisayoshi Sato and
                  Tsuyoshi Takagi},
  title        = {On tameness of Matsumoto-Imai central maps in three variables over
                  the finite field {\unicode{54589}}\({}_{\mbox{2}}\)},
  journal      = {Adv. Math. Commun.},
  volume       = {10},
  number       = {2},
  pages        = {221--228},
  year         = {2016},
  url          = {https://doi.org/10.3934/amc.2016002},
  doi          = {10.3934/AMC.2016002},
  timestamp    = {Fri, 10 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/amco/HakutaST16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnc/YuanCKMT16,
  author       = {Ye Yuan and
                  Chen{-}Mou Cheng and
                  Shinsaku Kiyomoto and
                  Yutaka Miyake and
                  Tsuyoshi Takagi},
  title        = {Portable Implementation of Lattice-based Cryptography using JavaScript},
  journal      = {Int. J. Netw. Comput.},
  volume       = {6},
  number       = {2},
  pages        = {309--327},
  year         = {2016},
  url          = {http://www.ijnc.org/index.php/ijnc/article/view/130},
  timestamp    = {Tue, 16 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnc/YuanCKMT16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jpdc/ZhuHT16,
  author       = {Youwen Zhu and
                  Zhiqiu Huang and
                  Tsuyoshi Takagi},
  title        = {Secure and controllable k-NN query over encrypted cloud data with
                  key confidentiality},
  journal      = {J. Parallel Distributed Comput.},
  volume       = {89},
  pages        = {1--12},
  year         = {2016},
  url          = {https://doi.org/10.1016/j.jpdc.2015.11.004},
  doi          = {10.1016/J.JPDC.2015.11.004},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jpdc/ZhuHT16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/JiangTW16,
  author       = {Shaoquan Jiang and
                  Tsuyoshi Takagi and
                  Guilin Wang},
  title        = {Special issue on provable security},
  journal      = {Secur. Commun. Networks},
  volume       = {9},
  number       = {12},
  pages        = {1635--1637},
  year         = {2016},
  url          = {https://doi.org/10.1002/sec.1496},
  doi          = {10.1002/SEC.1496},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/JiangTW16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/LiuZHT16,
  author       = {Zhenhua Liu and
                  Xiangsong Zhang and
                  Yupu Hu and
                  Tsuyoshi Takagi},
  title        = {Revocable and strongly unforgeable identity-based signature scheme
                  in the standard model},
  journal      = {Secur. Commun. Networks},
  volume       = {9},
  number       = {14},
  pages        = {2422--2433},
  year         = {2016},
  url          = {https://doi.org/10.1002/sec.1513},
  doi          = {10.1002/SEC.1513},
  timestamp    = {Wed, 22 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/LiuZHT16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/ChengLJT16,
  author       = {Chi Cheng and
                  Jemin Lee and
                  Tao Jiang and
                  Tsuyoshi Takagi},
  title        = {Security Analysis and Improvements on Two Homomorphic Authentication
                  Schemes for Network Coding},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {11},
  number       = {5},
  pages        = {993--1002},
  year         = {2016},
  url          = {https://doi.org/10.1109/TIFS.2016.2515517},
  doi          = {10.1109/TIFS.2016.2515517},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/ChengLJT16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/LiZT16,
  author       = {Fagen Li and
                  Di Zhong and
                  Tsuyoshi Takagi},
  title        = {Efficient Deniably Authenticated Encryption and Its Application to
                  E-Mail},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {11},
  number       = {11},
  pages        = {2477--2486},
  year         = {2016},
  url          = {https://doi.org/10.1109/TIFS.2016.2585086},
  doi          = {10.1109/TIFS.2016.2585086},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/LiZT16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/XuMYZT16,
  author       = {Rui Xu and
                  Kirill Morozov and
                  Yanjiang Yang and
                  Jianying Zhou and
                  Tsuyoshi Takagi},
  editor       = {Joseph K. Liu and
                  Ron Steinfeld},
  title        = {Privacy-Preserving k-Nearest Neighbour Query on Outsourced Database},
  booktitle    = {Information Security and Privacy - 21st Australasian Conference, {ACISP}
                  2016, Melbourne, VIC, Australia, July 4-6, 2016, Proceedings, Part
                  {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9722},
  pages        = {181--197},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-40253-6\_11},
  doi          = {10.1007/978-3-319-40253-6\_11},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/XuMYZT16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/DuongPT16,
  author       = {Dung Hoang Duong and
                  Albrecht Petzoldt and
                  Tsuyoshi Takagi},
  editor       = {Joseph K. Liu and
                  Ron Steinfeld},
  title        = {Reducing the Key Size of the {SRP} Encryption Scheme},
  booktitle    = {Information Security and Privacy - 21st Australasian Conference, {ACISP}
                  2016, Melbourne, VIC, Australia, July 4-6, 2016, Proceedings, Part
                  {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9723},
  pages        = {427--434},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-40367-0\_27},
  doi          = {10.1007/978-3-319-40367-0\_27},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/DuongPT16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ei-iss/TakagiSSOF16,
  author       = {Tsuyoshi Takagi and
                  Hwajung Seo and
                  Toshikatsu Sakai and
                  Hiroshi Ohtake and
                  Mamoru Furuta},
  editor       = {Arnaud Darmont and
                  Antoine Dupret and
                  Ralf Widenhorn},
  title        = {Image Sensor with Organic Photoconductive Films by Stacking Red/Green
                  and Blue Components},
  booktitle    = {Image Sensors and Imaging Systems 2016, {IMSE} 2016, San Francisco,
                  CA, USA, February 14-18, 2016},
  pages        = {1--4},
  publisher    = {Society for Imaging Science and Technology},
  year         = {2016},
  url          = {https://doi.org/10.2352/ISSN.2470-1173.2016.12.IMSE-264},
  doi          = {10.2352/ISSN.2470-1173.2016.12.IMSE-264},
  timestamp    = {Wed, 02 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ei-iss/TakagiSSOF16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/AonoW0T16,
  author       = {Yoshinori Aono and
                  Yuntao Wang and
                  Takuya Hayashi and
                  Tsuyoshi Takagi},
  editor       = {Marc Fischlin and
                  Jean{-}S{\'{e}}bastien Coron},
  title        = {Improved Progressive {BKZ} Algorithms and Their Precise Cost Estimation
                  by Sharp Simulator},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2016 - 35th Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Vienna, Austria, May 8-12, 2016, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9665},
  pages        = {789--819},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-662-49890-3\_30},
  doi          = {10.1007/978-3-662-49890-3\_30},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/AonoW0T16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ic-nc/OkumuraAT16,
  author       = {Shinya Okumura and
                  Koichiro Akiyama and
                  Tsuyoshi Takagi},
  title        = {An Estimate of the Complexity of the Section Finding Problem on Algebraic
                  Surfaces},
  booktitle    = {Fourth International Symposium on Computing and Networking, {CANDAR}
                  2016, Hiroshima, Japan, November 22-25, 2016},
  pages        = {28--36},
  publisher    = {{IEEE} Computer Society},
  year         = {2016},
  url          = {https://doi.org/10.1109/CANDAR.2016.0021},
  doi          = {10.1109/CANDAR.2016.0021},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ic-nc/OkumuraAT16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icisc/DuongPWT16,
  author       = {Dung Hoang Duong and
                  Albrecht Petzoldt and
                  Yacheng Wang and
                  Tsuyoshi Takagi},
  editor       = {Seokhie Hong and
                  Jong Hwan Park},
  title        = {Revisiting the Cubic {UOV} Signature Scheme},
  booktitle    = {Information Security and Cryptology - {ICISC} 2016 - 19th International
                  Conference, Seoul, South Korea, November 30 - December 2, 2016, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {10157},
  pages        = {223--238},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-53177-9\_12},
  doi          = {10.1007/978-3-319-53177-9\_12},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icisc/DuongPWT16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/DingKOTT16,
  author       = {Jintai Ding and
                  Momonari Kudo and
                  Shinya Okumura and
                  Tsuyoshi Takagi and
                  Chengdong Tao},
  editor       = {Kazuto Ogawa and
                  Katsunari Yoshioka},
  title        = {Cryptanalysis of a Public Key Cryptosystem Based on Diophantine Equations
                  via Weighted {LLL} Reduction},
  booktitle    = {Advances in Information and Computer Security - 11th International
                  Workshop on Security, {IWSEC} 2016, Tokyo, Japan, September 12-14,
                  2016, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9836},
  pages        = {305--315},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-44524-3\_18},
  doi          = {10.1007/978-3-319-44524-3\_18},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwsec/DingKOTT16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/asiacrypt/2016-1,
  editor       = {Jung Hee Cheon and
                  Tsuyoshi Takagi},
  title        = {Advances in Cryptology - {ASIACRYPT} 2016 - 22nd International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Hanoi, Vietnam, December 4-8, 2016, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10031},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-662-53887-6},
  doi          = {10.1007/978-3-662-53887-6},
  isbn         = {978-3-662-53886-9},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/2016-1.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/asiacrypt/2016-2,
  editor       = {Jung Hee Cheon and
                  Tsuyoshi Takagi},
  title        = {Advances in Cryptology - {ASIACRYPT} 2016 - 22nd International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Hanoi, Vietnam, December 4-8, 2016, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10032},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-662-53890-6},
  doi          = {10.1007/978-3-662-53890-6},
  isbn         = {978-3-662-53889-0},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/2016-2.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/pqcrypto/2016,
  editor       = {Tsuyoshi Takagi},
  title        = {Post-Quantum Cryptography - 7th International Workshop, PQCrypto 2016,
                  Fukuoka, Japan, February 24-26, 2016, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9606},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-29360-8},
  doi          = {10.1007/978-3-319-29360-8},
  isbn         = {978-3-319-29359-2},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pqcrypto/2016.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AonoWHT16,
  author       = {Yoshinori Aono and
                  Yuntao Wang and
                  Takuya Hayashi and
                  Tsuyoshi Takagi},
  title        = {Improved Progressive {BKZ} Algorithms and their Precise Cost Estimation
                  by Sharp Simulator},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {146},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/146},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AonoWHT16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DuongPT16,
  author       = {Dung Hoang Duong and
                  Albrecht Petzoldt and
                  Tsuyoshi Takagi},
  title        = {Reducing the Key Size of the {SRP} Encryption Scheme - Extended version},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {383},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/383},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DuongPT16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/IkematsuDPT16,
  author       = {Yasuhiko Ikematsu and
                  Dung Hoang Duong and
                  Albrecht Petzoldt and
                  Tsuyoshi Takagi},
  title        = {Revisiting the Efficient Key Generation of {ZHFE}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1065},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/1065},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/IkematsuDPT16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DuongPWT16,
  author       = {Dung Hoang Duong and
                  Albrecht Petzoldt and
                  Yacheng Wang and
                  Tsuyoshi Takagi},
  title        = {Revisiting the Cubic {UOV} Signature Scheme},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1079},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/1079},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DuongPWT16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cca/YasudaDHTS15,
  author       = {Takanori Yasuda and
                  Xavier Dahan and
                  Yun{-}Ju Huang and
                  Tsuyoshi Takagi and
                  Kouichi Sakurai},
  title        = {A multivariate quadratic challenge toward post-quantum generation
                  cryptography},
  journal      = {{ACM} Commun. Comput. Algebra},
  volume       = {49},
  number       = {3},
  pages        = {105--107},
  year         = {2015},
  url          = {https://doi.org/10.1145/2850449.2850462},
  doi          = {10.1145/2850449.2850462},
  timestamp    = {Wed, 04 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cca/YasudaDHTS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cj/ZhangWTM15,
  author       = {Mingwu Zhang and
                  Chunzhi Wang and
                  Tsuyoshi Takagi and
                  Yi Mu},
  title        = {Functional Encryption Resilient to Hard-to-Invert Leakage},
  journal      = {Comput. J.},
  volume       = {58},
  number       = {4},
  pages        = {735--749},
  year         = {2015},
  url          = {https://doi.org/10.1093/comjnl/bxt105},
  doi          = {10.1093/COMJNL/BXT105},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cj/ZhangWTM15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/XuMT15,
  author       = {Rui Xu and
                  Kirill Morozov and
                  Tsuyoshi Takagi},
  title        = {Note on Some Recent Cheater Identifiable Secret Sharing Schemes},
  journal      = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.},
  volume       = {98-A},
  number       = {8},
  pages        = {1814--1819},
  year         = {2015},
  url          = {https://doi.org/10.1587/transfun.E98.A.1814},
  doi          = {10.1587/TRANSFUN.E98.A.1814},
  timestamp    = {Sat, 11 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieicet/XuMT15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/HuMT15,
  author       = {Rong Hu and
                  Kirill Morozov and
                  Tsuyoshi Takagi},
  title        = {Zero-Knowledge Protocols for Code-Based Public-Key Encryption},
  journal      = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.},
  volume       = {98-A},
  number       = {10},
  pages        = {2139--2151},
  year         = {2015},
  url          = {https://doi.org/10.1587/transfun.E98.A.2139},
  doi          = {10.1587/TRANSFUN.E98.A.2139},
  timestamp    = {Sat, 11 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieicet/HuMT15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijesdf/ZhuT15,
  author       = {Youwen Zhu and
                  Tsuyoshi Takagi},
  title        = {Efficient scalar product protocol and its privacy-preserving application},
  journal      = {Int. J. Electron. Secur. Digit. Forensics},
  volume       = {7},
  number       = {1},
  pages        = {1--19},
  year         = {2015},
  url          = {https://doi.org/10.1504/IJESDF.2015.067985},
  doi          = {10.1504/IJESDF.2015.067985},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijesdf/ZhuT15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/ZhangLHT15,
  author       = {Xiangsong Zhang and
                  Zhenhua Liu and
                  Yupu Hu and
                  Tsuyoshi Takagi},
  title        = {Revocable Identity-based Signcryption Scheme Without Random Oracles},
  journal      = {Int. J. Netw. Secur.},
  volume       = {17},
  number       = {2},
  pages        = {110--122},
  year         = {2015},
  url          = {http://ijns.jalaxy.com.tw/contents/ijns-v17-n2/ijns-2015-v17-n2-p110-122.pdf},
  timestamp    = {Wed, 22 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijnsec/ZhangLHT15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/ZhuHHT15,
  author       = {Youwen Zhu and
                  Zhiqiu Huang and
                  Liusheng Huang and
                  Tsuyoshi Takagi},
  title        = {On the Security of {A} Privacy-Preserving Product Calculation Scheme},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {12},
  number       = {3},
  pages        = {373--374},
  year         = {2015},
  url          = {https://doi.org/10.1109/TDSC.2014.2345404},
  doi          = {10.1109/TDSC.2014.2345404},
  timestamp    = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/ZhuHHT15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ic-nc/YuanCKMT15,
  author       = {Ye Yuan and
                  Chen{-}Mou Cheng and
                  Shinsaku Kiyomoto and
                  Yutaka Miyake and
                  Tsuyoshi Takagi},
  title        = {Portable Implementation of Lattice-Based Cryptography Using JavaScript},
  booktitle    = {Third International Symposium on Computing and Networking, {CANDAR}
                  2015, Sapporo, Hokkaido, Japan, December 8-11, 2015},
  pages        = {58--67},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/CANDAR.2015.36},
  doi          = {10.1109/CANDAR.2015.36},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ic-nc/YuanCKMT15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ic-nc/YasudaTS15,
  author       = {Takanori Yasuda and
                  Tsuyoshi Takagi and
                  Kouichi Sakurai},
  title        = {Constructing Pairing-Friendly Elliptic Curves Using Global Number
                  Fields},
  booktitle    = {Third International Symposium on Computing and Networking, {CANDAR}
                  2015, Sapporo, Hokkaido, Japan, December 8-11, 2015},
  pages        = {477--483},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/CANDAR.2015.28},
  doi          = {10.1109/CANDAR.2015.28},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ic-nc/YasudaTS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/YasudaDHTS15,
  author       = {Takanori Yasuda and
                  Xavier Dahan and
                  Yun{-}Ju Huang and
                  Tsuyoshi Takagi and
                  Kouichi Sakurai},
  title        = {{MQ} Challenge: Hardness Evaluation of Solving Multivariate Quadratic
                  Problems},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {275},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/275},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/YasudaDHTS15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HuangPST15,
  author       = {Yun{-}Ju Huang and
                  Christophe Petit and
                  Naoyuki Shinohara and
                  Tsuyoshi Takagi},
  title        = {On Generalized First Fall Degree Assumptions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {358},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/358},
  timestamp    = {Fri, 17 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/HuangPST15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/OkumuraSYT15,
  author       = {Shinya Okumura and
                  Shingo Sugiyama and
                  Masaya Yasuda and
                  Tsuyoshi Takagi},
  title        = {Security Analysis of Cryptosystems Using Short Generators over Ideal
                  Lattices},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1004},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/1004},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/OkumuraSYT15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HayasakaAKT15,
  author       = {Kenichiro Hayasaka and
                  Kazumaro Aoki and
                  Tetsutaro Kobayashi and
                  Tsuyoshi Takagi},
  title        = {A construction of 3-dimensional lattice sieve for number field sieve
                  over F{\_}\{p{\^{}}n\}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1179},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/1179},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/HayasakaAKT15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/DingKOTT15,
  author       = {Jintai Ding and
                  Momonari Kudo and
                  Shinya Okumura and
                  Tsuyoshi Takagi and
                  Chengdong Tao},
  title        = {Cryptanalysis of a public key cryptosystem based on Diophantine equations
                  via weighted {LLL} reduction},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1229},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/1229},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/DingKOTT15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/ShinoharaSHT14,
  author       = {Naoyuki Shinohara and
                  Takeshi Shimoyama and
                  Takuya Hayashi and
                  Tsuyoshi Takagi},
  title        = {Key Length Estimation of Pairing-Based Cryptosystems Using \emph{{\(\eta\)}\({}_{\mbox{T}}\)}
                  Pairing over \emph{GF}(3\emph{\({}^{\mbox{n}}\)})},
  journal      = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.},
  volume       = {97-A},
  number       = {1},
  pages        = {236--244},
  year         = {2014},
  url          = {https://doi.org/10.1587/transfun.E97.A.236},
  doi          = {10.1587/TRANSFUN.E97.A.236},
  timestamp    = {Sat, 11 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieicet/ShinoharaSHT14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/YasudaTS14,
  author       = {Takanori Yasuda and
                  Tsuyoshi Takagi and
                  Kouichi Sakurai},
  title        = {Security of Multivariate Signature Scheme Using Non-commutative Rings},
  journal      = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.},
  volume       = {97-A},
  number       = {1},
  pages        = {245--252},
  year         = {2014},
  url          = {https://doi.org/10.1587/transfun.E97.A.245},
  doi          = {10.1587/TRANSFUN.E97.A.245},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieicet/YasudaTS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/ZhuT14,
  author       = {Youwen Zhu and
                  Tsuyoshi Takagi},
  title        = {Efficient Privacy-Preserving Reputation Evaluation in Decentralized
                  Environments},
  journal      = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.},
  volume       = {97-A},
  number       = {1},
  pages        = {409--412},
  year         = {2014},
  url          = {https://doi.org/10.1587/transfun.E97.A.409},
  doi          = {10.1587/TRANSFUN.E97.A.409},
  timestamp    = {Sat, 11 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieicet/ZhuT14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/ZhuTH14,
  author       = {Youwen Zhu and
                  Tsuyoshi Takagi and
                  Rong Hu},
  title        = {Security Analysis of Collusion-Resistant Nearest Neighbor Query Scheme
                  on Encrypted Cloud Data},
  journal      = {{IEICE} Trans. Inf. Syst.},
  volume       = {97-D},
  number       = {2},
  pages        = {326--330},
  year         = {2014},
  url          = {https://doi.org/10.1587/transinf.E97.D.326},
  doi          = {10.1587/TRANSINF.E97.D.326},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieicet/ZhuTH14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/MiuraHT14,
  author       = {Hiroyuki Miura and
                  Yasufumi Hashimoto and
                  Tsuyoshi Takagi},
  title        = {Extended Algorithm for Solving Underdefined Multivariate Quadratic
                  Equations},
  journal      = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.},
  volume       = {97-A},
  number       = {6},
  pages        = {1418--1425},
  year         = {2014},
  url          = {https://doi.org/10.1587/transfun.E97.A.1418},
  doi          = {10.1587/TRANSFUN.E97.A.1418},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieicet/MiuraHT14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/ZhangT14,
  author       = {Hui Zhang and
                  Tsuyoshi Takagi},
  title        = {Improved Attacks on Multi-Prime {RSA} with Small Prime Difference},
  journal      = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.},
  volume       = {97-A},
  number       = {7},
  pages        = {1533--1541},
  year         = {2014},
  url          = {https://doi.org/10.1587/transfun.E97.A.1533},
  doi          = {10.1587/TRANSFUN.E97.A.1533},
  timestamp    = {Sat, 11 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieicet/ZhangT14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/KiyomuraT14,
  author       = {Yutaro Kiyomura and
                  Tsuyoshi Takagi},
  title        = {Efficient Algorithm for Tate Pairing of Composite Order},
  journal      = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.},
  volume       = {97-A},
  number       = {10},
  pages        = {2055--2063},
  year         = {2014},
  url          = {https://doi.org/10.1587/transfun.E97.A.2055},
  doi          = {10.1587/TRANSFUN.E97.A.2055},
  timestamp    = {Sat, 11 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieicet/KiyomuraT14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iet-ifs/ZhangNYT14,
  author       = {Mingwu Zhang and
                  Takashi Nishide and
                  Bo Yang and
                  Tsuyoshi Takagi},
  title        = {Anonymous encryption with partial-order subset delegation and its
                  application in privacy email systems},
  journal      = {{IET} Inf. Secur.},
  volume       = {8},
  number       = {4},
  pages        = {240--249},
  year         = {2014},
  url          = {https://doi.org/10.1049/iet-ifs.2013.0045},
  doi          = {10.1049/IET-IFS.2013.0045},
  timestamp    = {Thu, 27 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iet-ifs/ZhangNYT14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcomsys/ZhangWYT14,
  author       = {Mingwu Zhang and
                  Chunzhi Wang and
                  Bo Yang and
                  Tsuyoshi Takagi},
  title        = {Fully secure constructions of spatial encryption with vector privacy},
  journal      = {Int. J. Commun. Syst.},
  volume       = {27},
  number       = {12},
  pages        = {4307--4327},
  year         = {2014},
  url          = {https://doi.org/10.1002/dac.2613},
  doi          = {10.1002/DAC.2613},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcomsys/ZhangWYT14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isci/ZhangYT14,
  author       = {Mingwu Zhang and
                  Bo Yang and
                  Tsuyoshi Takagi},
  title        = {Anonymous spatial encryption under affine space delegation functionality
                  with full security},
  journal      = {Inf. Sci.},
  volume       = {277},
  pages        = {715--730},
  year         = {2014},
  url          = {https://doi.org/10.1016/j.ins.2014.03.012},
  doi          = {10.1016/J.INS.2014.03.012},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/isci/ZhangYT14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jowua/YasudaTS14,
  author       = {Takanori Yasuda and
                  Tsuyoshi Takagi and
                  Kouichi Sakurai},
  title        = {Efficient variant of Rainbow using sparse secret keys},
  journal      = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.},
  volume       = {5},
  number       = {3},
  pages        = {3--13},
  year         = {2014},
  url          = {https://doi.org/10.22667/JOWUA.2014.09.31.003},
  doi          = {10.22667/JOWUA.2014.09.31.003},
  timestamp    = {Sun, 17 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jowua/YasudaTS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jsiaml/TomitaT14,
  author       = {Takumi Tomita and
                  Tsuyoshi Takagi},
  title        = {Efficient system parameters for Identity-Based Encryption using supersingular
                  elliptic curves},
  journal      = {{JSIAM} Lett.},
  volume       = {6},
  pages        = {13--16},
  year         = {2014},
  url          = {https://doi.org/10.14495/jsiaml.6.13},
  doi          = {10.14495/JSIAML.6.13},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jsiaml/TomitaT14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jsiaml/HayasakaAKT14,
  author       = {Kenichiro Hayasaka and
                  Kazumaro Aoki and
                  Tetsutaro Kobayashi and
                  Tsuyoshi Takagi},
  title        = {An experiment of number field sieve for discrete logarithm problem
                  over {\textdollar}{\textbackslash}text\{GF\}(p{\^{}}n){\textdollar}},
  journal      = {{JSIAM} Lett.},
  volume       = {6},
  pages        = {53--56},
  year         = {2014},
  url          = {https://doi.org/10.14495/jsiaml.6.53},
  doi          = {10.14495/JSIAML.6.53},
  timestamp    = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jsiaml/HayasakaAKT14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jsiaml/KiyomuraIYHWYTT14,
  author       = {Yutaro Kiyomura and
                  Noriyasu Iwamoto and
                  Shun'ichi Yokoyama and
                  Kenichiro Hayasaka and
                  Yuntao Wang and
                  Takanori Yasuda and
                  Katsuyuki Takashima and
                  Tsuyoshi Takagi},
  title        = {Heuristic counting of Kachisa-Schaefer-Scott curves},
  journal      = {{JSIAM} Lett.},
  volume       = {6},
  pages        = {73--76},
  year         = {2014},
  url          = {https://doi.org/10.14495/jsiaml.6.73},
  doi          = {10.14495/JSIAML.6.73},
  timestamp    = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jsiaml/KiyomuraIYHWYTT14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/SuZBTS14,
  author       = {Chunhua Su and
                  Jianying Zhou and
                  Feng Bao and
                  Tsuyoshi Takagi and
                  Kouichi Sakurai},
  title        = {Collaborative agglomerative document clustering with limited information
                  disclosure},
  journal      = {Secur. Commun. Networks},
  volume       = {7},
  number       = {6},
  pages        = {964--978},
  year         = {2014},
  url          = {https://doi.org/10.1002/sec.811},
  doi          = {10.1002/SEC.811},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/SuZBTS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/Zhang0WT14,
  author       = {Mingwu Zhang and
                  Bo Yang and
                  Chunzhi Wang and
                  Tsuyoshi Takagi},
  title        = {Unbounded anonymous hierarchical {IBE} with continual-key-leakage
                  tolerance},
  journal      = {Secur. Commun. Networks},
  volume       = {7},
  number       = {11},
  pages        = {1974--1987},
  year         = {2014},
  url          = {https://doi.org/10.1002/sec.912},
  doi          = {10.1002/SEC.912},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/Zhang0WT14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ict-eurasia/YasudaTS14,
  author       = {Takanori Yasuda and
                  Tsuyoshi Takagi and
                  Kouichi Sakurai},
  editor       = {Linawati and
                  Made Sudiana Mahendra and
                  Erich J. Neuhold and
                  A Min Tjoa and
                  Ilsun You},
  title        = {Efficient Variant of Rainbow without Triangular Matrix Representation},
  booktitle    = {Information and Communication Technology - Second {IFIP} {TC5/8} International
                  Conference, ICT-EurAsia 2014, Bali, Indonesia, April 14-17, 2014.
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8407},
  pages        = {532--541},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-642-55032-4\_55},
  doi          = {10.1007/978-3-642-55032-4\_55},
  timestamp    = {Tue, 14 May 2019 10:00:38 +0200},
  biburl       = {https://dblp.org/rec/conf/ict-eurasia/YasudaTS14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/XuMT14,
  author       = {Rui Xu and
                  Kirill Morozov and
                  Tsuyoshi Takagi},
  editor       = {Maki Yoshida and
                  Koichi Mouri},
  title        = {Cheater Identifiable Secret Sharing Schemes via Multi-Receiver Authentication},
  booktitle    = {Advances in Information and Computer Security - 9th International
                  Workshop on Security, {IWSEC} 2014, Hirosaki, Japan, August 27-29,
                  2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8639},
  pages        = {72--87},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-09843-2\_6},
  doi          = {10.1007/978-3-319-09843-2\_6},
  timestamp    = {Tue, 14 May 2019 10:00:52 +0200},
  biburl       = {https://dblp.org/rec/conf/iwsec/XuMT14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/IshiguroKMT14,
  author       = {Tsukasa Ishiguro and
                  Shinsaku Kiyomoto and
                  Yutaka Miyake and
                  Tsuyoshi Takagi},
  editor       = {Hugo Krawczyk},
  title        = {Parallel Gauss Sieve Algorithm: Solving the {SVP} Challenge over a
                  128-Dimensional Ideal Lattice},
  booktitle    = {Public-Key Cryptography - {PKC} 2014 - 17th International Conference
                  on Practice and Theory in Public-Key Cryptography, Buenos Aires, Argentina,
                  March 26-28, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8383},
  pages        = {411--428},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-642-54631-0\_24},
  doi          = {10.1007/978-3-642-54631-0\_24},
  timestamp    = {Fri, 01 May 2020 18:32:25 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/IshiguroKMT14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pqcrypto/ChengHMT14,
  author       = {Chen{-}Mou Cheng and
                  Yasufumi Hashimoto and
                  Hiroyuki Miura and
                  Tsuyoshi Takagi},
  editor       = {Michele Mosca},
  title        = {A Polynomial-Time Algorithm for Solving a Class of Underdetermined
                  Multivariate Quadratic Equations over Fields of Odd Characteristics},
  booktitle    = {Post-Quantum Cryptography - 6th International Workshop, PQCrypto 2014,
                  Waterloo, ON, Canada, October 1-3, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8772},
  pages        = {40--58},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-11659-4\_3},
  doi          = {10.1007/978-3-319-11659-4\_3},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pqcrypto/ChengHMT14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/HakutaST14,
  author       = {Keisuke Hakuta and
                  Hisayoshi Sato and
                  Tsuyoshi Takagi},
  title        = {Some properties of {\textdollar}{\(\tau\)}{\textdollar}-adic expansions
                  on hyperelliptic Koblitz curves},
  journal      = {CoRR},
  volume       = {abs/1402.1865},
  year         = {2014},
  url          = {http://arxiv.org/abs/1402.1865},
  eprinttype    = {arXiv},
  eprint       = {1402.1865},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/HakutaST14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cj/ZhangYT13,
  author       = {Mingwu Zhang and
                  Bo Yang and
                  Tsuyoshi Takagi},
  title        = {Bounded Leakage-Resilient Functional Encryption with Hidden Vector
                  Predicate},
  journal      = {Comput. J.},
  volume       = {56},
  number       = {4},
  pages        = {464--477},
  year         = {2013},
  url          = {https://doi.org/10.1093/comjnl/bxs133},
  doi          = {10.1093/COMJNL/BXS133},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cj/ZhangYT13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/concurrency/LiMKT13,
  author       = {Fagen Li and
                  Fahad Bin Muhaya and
                  Muhammad Khurram Khan and
                  Tsuyoshi Takagi},
  title        = {Lattice-based signcryption},
  journal      = {Concurr. Comput. Pract. Exp.},
  volume       = {25},
  number       = {14},
  pages        = {2112--2122},
  year         = {2013},
  url          = {https://doi.org/10.1002/cpe.2826},
  doi          = {10.1002/CPE.2826},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/concurrency/LiMKT13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/HashimotoTS13,
  author       = {Yasufumi Hashimoto and
                  Tsuyoshi Takagi and
                  Kouichi Sakurai},
  title        = {General Fault Attacks on Multivariate Public Key Cryptosystems},
  journal      = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.},
  volume       = {96-A},
  number       = {1},
  pages        = {196--205},
  year         = {2013},
  url          = {https://doi.org/10.1587/transfun.E96.A.196},
  doi          = {10.1587/TRANSFUN.E96.A.196},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieicet/HashimotoTS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijesdf/ZhuXT13,
  author       = {Youwen Zhu and
                  Rui Xu and
                  Tsuyoshi Takagi},
  title        = {Secure k-NN query on encrypted cloud database without key-sharing},
  journal      = {Int. J. Electron. Secur. Digit. Forensics},
  volume       = {5},
  number       = {3/4},
  pages        = {201--217},
  year         = {2013},
  url          = {https://doi.org/10.1504/IJESDF.2013.058654},
  doi          = {10.1504/IJESDF.2013.058654},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijesdf/ZhuXT13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/ZhangYWT13,
  author       = {Mingwu Zhang and
                  Jintao Yao and
                  Chunzhi Wang and
                  Tsuyoshi Takagi},
  title        = {Public Key Replacement and Universal Forgery of a {SCLS} Scheme},
  journal      = {Int. J. Netw. Secur.},
  volume       = {15},
  number       = {2},
  pages        = {133--138},
  year         = {2013},
  url          = {http://ijns.jalaxy.com.tw/contents/ijns-v15-n2/ijns-2013-v15-n2-p133-138.pdf},
  timestamp    = {Mon, 04 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnsec/ZhangYWT13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/mcm/LiST13,
  author       = {Fagen Li and
                  Masaaki Shirase and
                  Tsuyoshi Takagi},
  title        = {Certificateless hybrid signcryption},
  journal      = {Math. Comput. Model.},
  volume       = {57},
  number       = {3-4},
  pages        = {324--343},
  year         = {2013},
  url          = {https://doi.org/10.1016/j.mcm.2012.06.011},
  doi          = {10.1016/J.MCM.2012.06.011},
  timestamp    = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/mcm/LiST13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/mcm/LiT13,
  author       = {Fagen Li and
                  Tsuyoshi Takagi},
  title        = {Secure identity-based signcryption in the standard model},
  journal      = {Math. Comput. Model.},
  volume       = {57},
  number       = {11-12},
  pages        = {2685--2694},
  year         = {2013},
  url          = {https://doi.org/10.1016/j.mcm.2011.06.043},
  doi          = {10.1016/J.MCM.2011.06.043},
  timestamp    = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/mcm/LiT13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/mcm/LiZT13,
  author       = {Fagen Li and
                  Mingwu Zhang and
                  Tsuyoshi Takagi},
  title        = {Identity-based partially blind signature in the standard model for
                  electronic cash},
  journal      = {Math. Comput. Model.},
  volume       = {58},
  number       = {1-2},
  pages        = {196--203},
  year         = {2013},
  url          = {https://doi.org/10.1016/j.mcm.2012.07.009},
  doi          = {10.1016/J.MCM.2012.07.009},
  timestamp    = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/mcm/LiZT13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/ZhangYCT13,
  author       = {Mingwu Zhang and
                  Bo Yang and
                  Zhenhua Chen and
                  Tsuyoshi Takagi},
  title        = {Efficient and adaptively secure broadcast encryption systems},
  journal      = {Secur. Commun. Networks},
  volume       = {6},
  number       = {8},
  pages        = {1044--1052},
  year         = {2013},
  url          = {https://doi.org/10.1002/sec.678},
  doi          = {10.1002/SEC.678},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/ZhangYCT13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sj/ZhangT13,
  author       = {Mingwu Zhang and
                  Tsuyoshi Takagi},
  title        = {Efficient Constructions of Anonymous Multireceiver Encryption Protocol
                  and Their Deployment in Group E-mail Systems With Privacy Preservation},
  journal      = {{IEEE} Syst. J.},
  volume       = {7},
  number       = {3},
  pages        = {410--419},
  year         = {2013},
  url          = {https://doi.org/10.1109/JSYST.2012.2221893},
  doi          = {10.1109/JSYST.2012.2221893},
  timestamp    = {Fri, 11 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sj/ZhangT13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sj/LiZT13,
  author       = {Fagen Li and
                  Hui Zhang and
                  Tsuyoshi Takagi},
  title        = {Efficient Signcryption for Heterogeneous Systems},
  journal      = {{IEEE} Syst. J.},
  volume       = {7},
  number       = {3},
  pages        = {420--429},
  year         = {2013},
  url          = {https://doi.org/10.1109/JSYST.2012.2221897},
  doi          = {10.1109/JSYST.2012.2221897},
  timestamp    = {Fri, 11 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sj/LiZT13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/wpc/LiT13,
  author       = {Fagen Li and
                  Tsuyoshi Takagi},
  title        = {Cryptanalysis and Improvement of Robust Deniable Authentication Protocol},
  journal      = {Wirel. Pers. Commun.},
  volume       = {69},
  number       = {4},
  pages        = {1391--1398},
  year         = {2013},
  url          = {https://doi.org/10.1007/s11277-012-0640-4},
  doi          = {10.1007/S11277-012-0640-4},
  timestamp    = {Thu, 20 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/wpc/LiT13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/ZhangT13,
  author       = {Hui Zhang and
                  Tsuyoshi Takagi},
  editor       = {Colin Boyd and
                  Leonie Simpson},
  title        = {Attacks on Multi-Prime {RSA} with Small Prime Difference},
  booktitle    = {Information Security and Privacy - 18th Australasian Conference, {ACISP}
                  2013, Brisbane, Australia, July 1-3, 2013. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7959},
  pages        = {41--56},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-39059-3\_4},
  doi          = {10.1007/978-3-642-39059-3\_4},
  timestamp    = {Tue, 14 May 2019 10:00:46 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/ZhangT13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiajcis/HuMT13,
  author       = {Rong Hu and
                  Kirill Morozov and
                  Tsuyoshi Takagi},
  title        = {On Zero-Knowledge Identification Based on Q-ary Syndrome Decoding},
  booktitle    = {Eighth Asia Joint Conference on Information Security, AsiaJCIS 2013,
                  Seoul, Korea, July 25-26, 2013},
  pages        = {12--18},
  publisher    = {{IEEE} Computer Society},
  year         = {2013},
  url          = {https://doi.org/10.1109/ASIAJCIS.2013.10},
  doi          = {10.1109/ASIAJCIS.2013.10},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/asiajcis/HuMT13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/birthday/HayasakaAKT13,
  author       = {Kenichiro Hayasaka and
                  Kazumaro Aoki and
                  Tetsutaro Kobayashi and
                  Tsuyoshi Takagi},
  editor       = {Marc Fischlin and
                  Stefan Katzenbeisser},
  title        = {An Experiment of Number Field Sieve for Discrete Logarithm Problem
                  over GF(p 12)},
  booktitle    = {Number Theory and Cryptography - Papers in Honor of Johannes Buchmann
                  on the Occasion of His 60th Birthday},
  series       = {Lecture Notes in Computer Science},
  volume       = {8260},
  pages        = {108--120},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-42001-6\_8},
  doi          = {10.1007/978-3-642-42001-6\_8},
  timestamp    = {Tue, 14 May 2019 10:00:52 +0200},
  biburl       = {https://dblp.org/rec/conf/birthday/HayasakaAKT13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/ZhuXT13,
  author       = {Youwen Zhu and
                  Rui Xu and
                  Tsuyoshi Takagi},
  editor       = {Xingming Sun and
                  Elaine Shi and
                  Kui Ren},
  title        = {Secure k-NN computation on encrypted cloud data without sharing key
                  with query users},
  booktitle    = {Proceedings of the 2013 International Workshop on Security in Cloud
                  Computing, SCC@ASIACCS '13, Hangzhou, China, May 8, 2013},
  pages        = {55--60},
  publisher    = {{ACM}},
  year         = {2013},
  url          = {https://doi.org/10.1145/2484402.2484415},
  doi          = {10.1145/2484402.2484415},
  timestamp    = {Tue, 10 Nov 2020 16:06:16 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/ZhuXT13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/YasudaDTS13,
  author       = {Takanori Yasuda and
                  Jintai Ding and
                  Tsuyoshi Takagi and
                  Kouichi Sakurai},
  editor       = {Kefei Chen and
                  Qi Xie and
                  Weidong Qiu and
                  Shouhuai Xu and
                  Yunlei Zhao},
  title        = {A variant of rainbow with shorter secret key and faster signature
                  generation},
  booktitle    = {Proceedings of the first {ACM} workshop on Asia public-key cryptography,
                  AsiaPKC'13, Hangzhou, China, May 8, 2013},
  pages        = {57--62},
  publisher    = {{ACM}},
  year         = {2013},
  url          = {https://doi.org/10.1145/2484389.2484401},
  doi          = {10.1145/2484389.2484401},
  timestamp    = {Tue, 10 Nov 2020 16:06:16 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/YasudaDTS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/HuMT13,
  author       = {Rong Hu and
                  Kirill Morozov and
                  Tsuyoshi Takagi},
  editor       = {Kefei Chen and
                  Qi Xie and
                  Weidong Qiu and
                  Ninghui Li and
                  Wen{-}Guey Tzeng},
  title        = {Proof of plaintext knowledge for code-based public-key encryption
                  revisited},
  booktitle    = {8th {ACM} Symposium on Information, Computer and Communications Security,
                  {ASIA} {CCS} '13, Hangzhou, China - May 08 - 10, 2013},
  pages        = {535--540},
  publisher    = {{ACM}},
  year         = {2013},
  url          = {https://doi.org/10.1145/2484313.2484385},
  doi          = {10.1145/2484313.2484385},
  timestamp    = {Tue, 10 Nov 2020 16:06:16 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/HuMT13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/incos/LiuZT13,
  author       = {Zhenhua Liu and
                  Xiangsong Zhang and
                  Tsuyoshi Takagi},
  title        = {Post-quantum Strongly Unforgeable Identity-Based Signature Scheme
                  from Lattices without Random Oracles},
  booktitle    = {2013 5th International Conference on Intelligent Networking and Collaborative
                  Systems, Xi'an city, Shaanxi province, China, September 9-11, 2013},
  pages        = {578--585},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/INCoS.2013.107},
  doi          = {10.1109/INCOS.2013.107},
  timestamp    = {Wed, 22 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/incos/LiuZT13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/HuangPST13,
  author       = {Yun{-}Ju Huang and
                  Christophe Petit and
                  Naoyuki Shinohara and
                  Tsuyoshi Takagi},
  editor       = {Kazuo Sakiyama and
                  Masayuki Terada},
  title        = {Improvement of Faug{\`{e}}re et al.'s Method to Solve {ECDLP}},
  booktitle    = {Advances in Information and Computer Security - 8th International
                  Workshop on Security, {IWSEC} 2013, Okinawa, Japan, November 18-20,
                  2013, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8231},
  pages        = {115--132},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-41383-4\_8},
  doi          = {10.1007/978-3-642-41383-4\_8},
  timestamp    = {Fri, 17 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iwsec/HuangPST13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/KiyomuraT13,
  author       = {Yutaro Kiyomura and
                  Tsuyoshi Takagi},
  editor       = {Kazuo Sakiyama and
                  Masayuki Terada},
  title        = {Efficient Algorithm for Tate Pairing of Composite Order},
  booktitle    = {Advances in Information and Computer Security - 8th International
                  Workshop on Security, {IWSEC} 2013, Okinawa, Japan, November 18-20,
                  2013, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8231},
  pages        = {201--216},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-41383-4\_13},
  doi          = {10.1007/978-3-642-41383-4\_13},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwsec/KiyomuraT13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/XuMT13,
  author       = {Rui Xu and
                  Kirill Morozov and
                  Tsuyoshi Takagi},
  editor       = {Kazuo Sakiyama and
                  Masayuki Terada},
  title        = {On Cheater Identifiable Secret Sharing Schemes Secure against Rushing
                  Adversary},
  booktitle    = {Advances in Information and Computer Security - 8th International
                  Workshop on Security, {IWSEC} 2013, Okinawa, Japan, November 18-20,
                  2013, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8231},
  pages        = {258--271},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-41383-4\_17},
  doi          = {10.1007/978-3-642-41383-4\_17},
  timestamp    = {Mon, 06 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwsec/XuMT13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pqcrypto/MiuraHT13,
  author       = {Hiroyuki Miura and
                  Yasufumi Hashimoto and
                  Tsuyoshi Takagi},
  editor       = {Philippe Gaborit},
  title        = {Extended Algorithm for Solving Underdefined Multivariate Quadratic
                  Equations},
  booktitle    = {Post-Quantum Cryptography - 5th International Workshop, PQCrypto 2013,
                  Limoges, France, June 4-7, 2013. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7932},
  pages        = {118--135},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-38616-9\_8},
  doi          = {10.1007/978-3-642-38616-9\_8},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pqcrypto/MiuraHT13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pqcrypto/YasudaTS13,
  author       = {Takanori Yasuda and
                  Tsuyoshi Takagi and
                  Kouichi Sakurai},
  editor       = {Philippe Gaborit},
  title        = {Multivariate Signature Scheme Using Quadratic Forms},
  booktitle    = {Post-Quantum Cryptography - 5th International Workshop, PQCrypto 2013,
                  Limoges, France, June 4-7, 2013. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7932},
  pages        = {243--258},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-38616-9\_17},
  doi          = {10.1007/978-3-642-38616-9\_17},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pqcrypto/YasudaTS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/IshiguroKMT13,
  author       = {Tsukasa Ishiguro and
                  Shinsaku Kiyomoto and
                  Yutaka Miyake and
                  Tsuyoshi Takagi},
  title        = {Parallel Gauss Sieve Algorithm: Solving the {SVP} in the Ideal Lattice
                  of 128 dimensions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {388},
  year         = {2013},
  url          = {http://eprint.iacr.org/2013/388},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/IshiguroKMT13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cee/LiLQT12,
  author       = {Fagen Li and
                  Yongjian Liao and
                  Zhiguang Qin and
                  Tsuyoshi Takagi},
  title        = {Further improvement of an identity-based signcryption scheme in the
                  standard model},
  journal      = {Comput. Electr. Eng.},
  volume       = {38},
  number       = {2},
  pages        = {413--421},
  year         = {2012},
  url          = {https://doi.org/10.1016/j.compeleceng.2011.11.001},
  doi          = {10.1016/J.COMPELECENG.2011.11.001},
  timestamp    = {Wed, 19 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cee/LiLQT12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/concurrency/LiZT12,
  author       = {Fagen Li and
                  Mingwu Zhang and
                  Tsuyoshi Takagi},
  title        = {Efficient signcryption in the standard model},
  journal      = {Concurr. Comput. Pract. Exp.},
  volume       = {24},
  number       = {17},
  pages        = {1977--1989},
  year         = {2012},
  url          = {https://doi.org/10.1002/cpe.1823},
  doi          = {10.1002/CPE.1823},
  timestamp    = {Mon, 02 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/concurrency/LiZT12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/HayashiSWMST12,
  author       = {Takuya Hayashi and
                  Naoyuki Shinohara and
                  Lihua Wang and
                  Shin'ichiro Matsuo and
                  Masaaki Shirase and
                  Tsuyoshi Takagi},
  title        = {Solving a 676-Bit Discrete Logarithm Problem in GF(3\({}^{\mbox{6\emph{n}}}\))},
  journal      = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.},
  volume       = {95-A},
  number       = {1},
  pages        = {204--212},
  year         = {2012},
  url          = {https://doi.org/10.1587/transfun.E95.A.204},
  doi          = {10.1587/TRANSFUN.E95.A.204},
  timestamp    = {Sat, 11 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieicet/HayashiSWMST12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/ZhangTYL12,
  author       = {Mingwu Zhang and
                  Tsuyoshi Takagi and
                  Bo Yang and
                  Fagen Li},
  title        = {Cryptanalysis of Strong Designated Verifier Signature Scheme with
                  Non-delegatability and Non-transferability},
  journal      = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.},
  volume       = {95-A},
  number       = {1},
  pages        = {259--262},
  year         = {2012},
  url          = {https://doi.org/10.1587/transfun.E95.A.259},
  doi          = {10.1587/TRANSFUN.E95.A.259},
  timestamp    = {Sat, 11 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieicet/ZhangTYL12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/ZhangLT12,
  author       = {Mingwu Zhang and
                  Fagen Li and
                  Tsuyoshi Takagi},
  title        = {Analysis and Improvement of a Secret Broadcast with Binding Encryption
                  in Broadcasting Networks},
  journal      = {{IEICE} Trans. Inf. Syst.},
  volume       = {95-D},
  number       = {2},
  pages        = {686--689},
  year         = {2012},
  url          = {https://doi.org/10.1587/transinf.E95.D.686},
  doi          = {10.1587/TRANSINF.E95.D.686},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieicet/ZhangLT12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jcsc/ZhuHTZ12,
  author       = {Youwen Zhu and
                  Liusheng Huang and
                  Tsuyoshi Takagi and
                  Mingwu Zhang},
  title        = {Privacy-Preserving {OLAP} for Accurate Answer},
  journal      = {J. Circuits Syst. Comput.},
  volume       = {21},
  number       = {1},
  year         = {2012},
  url          = {https://doi.org/10.1142/S0218126612500090},
  doi          = {10.1142/S0218126612500090},
  timestamp    = {Tue, 25 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jcsc/ZhuHTZ12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnca/LiKAT12,
  author       = {Fagen Li and
                  Muhammad Khurram Khan and
                  Khaled Alghathbar and
                  Tsuyoshi Takagi},
  title        = {Identity-based online/offline signcryption for low power devices},
  journal      = {J. Netw. Comput. Appl.},
  volume       = {35},
  number       = {1},
  pages        = {340--347},
  year         = {2012},
  url          = {https://doi.org/10.1016/j.jnca.2011.08.001},
  doi          = {10.1016/J.JNCA.2011.08.001},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnca/LiKAT12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jsiaml/ZhangT12,
  author       = {Hui Zhang and
                  Tsuyoshi Takagi},
  title        = {An exhaustive search method to find all small solutions of a multivariate
                  modular linear equation},
  journal      = {{JSIAM} Lett.},
  volume       = {4},
  pages        = {37--40},
  year         = {2012},
  url          = {https://doi.org/10.14495/jsiaml.4.37},
  doi          = {10.14495/JSIAML.4.37},
  timestamp    = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jsiaml/ZhangT12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/ZhangYT12,
  author       = {Mingwu Zhang and
                  Bo Yang and
                  Tsuyoshi Takagi},
  title        = {Reconciling and improving of multi-receiver signcryption protocols
                  with threshold decryption},
  journal      = {Secur. Commun. Networks},
  volume       = {5},
  number       = {12},
  pages        = {1430--1440},
  year         = {2012},
  url          = {https://doi.org/10.1002/sec.509},
  doi          = {10.1002/SEC.509},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/ZhangYT12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/wcl/LiZT12,
  author       = {Fagen Li and
                  Di Zhong and
                  Tsuyoshi Takagi},
  title        = {Practical Identity-Based Signature for Wireless Sensor Networks},
  journal      = {{IEEE} Wirel. Commun. Lett.},
  volume       = {1},
  number       = {6},
  pages        = {637--640},
  year         = {2012},
  url          = {https://doi.org/10.1109/WCL.2012.091312.120488},
  doi          = {10.1109/WCL.2012.091312.120488},
  timestamp    = {Wed, 01 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/wcl/LiZT12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/MorozovT12,
  author       = {Kirill Morozov and
                  Tsuyoshi Takagi},
  editor       = {Willy Susilo and
                  Yi Mu and
                  Jennifer Seberry},
  title        = {Zero-Knowledge Protocols for the McEliece Encryption},
  booktitle    = {Information Security and Privacy - 17th Australasian Conference, {ACISP}
                  2012, Wollongong, NSW, Australia, July 9-11, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7372},
  pages        = {180--193},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-31448-3\_14},
  doi          = {10.1007/978-3-642-31448-3\_14},
  timestamp    = {Tue, 14 May 2019 10:00:46 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/MorozovT12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/HayashiSST12,
  author       = {Takuya Hayashi and
                  Takeshi Shimoyama and
                  Naoyuki Shinohara and
                  Tsuyoshi Takagi},
  editor       = {Xiaoyun Wang and
                  Kazue Sako},
  title        = {Breaking Pairing-Based Cryptosystems Using {\(\eta\)} {T} Pairing
                  over {GF(397)}},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2012 - 18th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Beijing, China, December 2-6, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7658},
  pages        = {43--60},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-34961-4\_5},
  doi          = {10.1007/978-3-642-34961-4\_5},
  timestamp    = {Mon, 25 Nov 2019 15:32:14 +0100},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/HayashiSST12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ctrsa/YasudaST12,
  author       = {Takanori Yasuda and
                  Kouichi Sakurai and
                  Tsuyoshi Takagi},
  editor       = {Orr Dunkelman},
  title        = {Reducing the Key Size of Rainbow Using Non-commutative Rings},
  booktitle    = {Topics in Cryptology - {CT-RSA} 2012 - The Cryptographers' Track at
                  the {RSA} Conference 2012, San Francisco, CA, USA, February 27 - March
                  2, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7178},
  pages        = {68--83},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-27954-6\_5},
  doi          = {10.1007/978-3-642-27954-6\_5},
  timestamp    = {Tue, 14 May 2019 10:00:52 +0200},
  biburl       = {https://dblp.org/rec/conf/ctrsa/YasudaST12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icisc/HakutaKST12,
  author       = {Keisuke Hakuta and
                  Yosuke Katoh and
                  Hisayoshi Sato and
                  Tsuyoshi Takagi},
  editor       = {Taekyoung Kwon and
                  Mun{-}Kyu Lee and
                  Daesung Kwon},
  title        = {Batch Verification Suitable for Efficiently Verifying a Limited Number
                  of Signatures},
  booktitle    = {Information Security and Cryptology - {ICISC} 2012 - 15th International
                  Conference, Seoul, Korea, November 28-30, 2012, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7839},
  pages        = {425--440},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-37682-5\_30},
  doi          = {10.1007/978-3-642-37682-5\_30},
  timestamp    = {Thu, 12 Nov 2020 16:27:41 +0100},
  biburl       = {https://dblp.org/rec/conf/icisc/HakutaKST12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ispec/ShinoharaSHT12,
  author       = {Naoyuki Shinohara and
                  Takeshi Shimoyama and
                  Takuya Hayashi and
                  Tsuyoshi Takagi},
  editor       = {Mark Dermot Ryan and
                  Ben Smyth and
                  Guilin Wang},
  title        = {Key Length Estimation of Pairing-Based Cryptosystems Using {\(\eta\)}
                  {T} Pairing},
  booktitle    = {Information Security Practice and Experience - 8th International Conference,
                  {ISPEC} 2012, Hangzhou, China, April 9-12, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7232},
  pages        = {228--244},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-29101-2\_16},
  doi          = {10.1007/978-3-642-29101-2\_16},
  timestamp    = {Wed, 07 Dec 2022 23:12:45 +0100},
  biburl       = {https://dblp.org/rec/conf/ispec/ShinoharaSHT12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/YasudaTS12,
  author       = {Takanori Yasuda and
                  Tsuyoshi Takagi and
                  Kouichi Sakurai},
  editor       = {Goichiro Hanaoka and
                  Toshihiro Yamauchi},
  title        = {Application of Scalar Multiplication of Edwards Curves to Pairing-Based
                  Cryptography},
  booktitle    = {Advances in Information and Computer Security - 7th International
                  Workshop on Security, {IWSEC} 2012, Fukuoka, Japan, November 7-9,
                  2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7631},
  pages        = {19--36},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-34117-5\_2},
  doi          = {10.1007/978-3-642-34117-5\_2},
  timestamp    = {Tue, 14 May 2019 10:00:52 +0200},
  biburl       = {https://dblp.org/rec/conf/iwsec/YasudaTS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/ZhuTH12,
  author       = {Youwen Zhu and
                  Tsuyoshi Takagi and
                  Liusheng Huang},
  editor       = {Goichiro Hanaoka and
                  Toshihiro Yamauchi},
  title        = {Efficient Secure Primitive for Privacy Preserving Distributed Computations},
  booktitle    = {Advances in Information and Computer Security - 7th International
                  Workshop on Security, {IWSEC} 2012, Fukuoka, Japan, November 7-9,
                  2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7631},
  pages        = {233--243},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-34117-5\_15},
  doi          = {10.1007/978-3-642-34117-5\_15},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwsec/ZhuTH12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/provsec/2012,
  editor       = {Tsuyoshi Takagi and
                  Guilin Wang and
                  Zhiguang Qin and
                  Shaoquan Jiang and
                  Yong Yu},
  title        = {Provable Security - 6th International Conference, ProvSec 2012, Chengdu,
                  China, September 26-28, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7496},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-33272-2},
  doi          = {10.1007/978-3-642-33272-2},
  isbn         = {978-3-642-33271-5},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/provsec/2012.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ShinoharaSHT12,
  author       = {Naoyuki Shinohara and
                  Takeshi Shimoyama and
                  Takuya Hayashi and
                  Tsuyoshi Takagi},
  title        = {Key Length Estimation of Pairing-based Cryptosystems using {\(\eta\)}\({}_{\mbox{T}}\)
                  Pairing},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {42},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/042},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ShinoharaSHT12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HayashiSST12,
  author       = {Takuya Hayashi and
                  Takeshi Shimoyama and
                  Naoyuki Shinohara and
                  Tsuyoshi Takagi},
  title        = {Breaking pairing-based cryptosystems using {\(\eta\)}\({}_{\mbox{T}}\)
                  pairing over GF(3\({}^{\mbox{97}}\))},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {345},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/345},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/HayashiSST12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/KawaharaKTT11,
  author       = {Yuto Kawahara and
                  Tetsutaro Kobayashi and
                  Gen Takahashi and
                  Tsuyoshi Takagi},
  title        = {Faster MapToPoint on Supersingular Elliptic Curves in Characteristic
                  3},
  journal      = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.},
  volume       = {94-A},
  number       = {1},
  pages        = {150--155},
  year         = {2011},
  url          = {https://doi.org/10.1587/transfun.E94.A.150},
  doi          = {10.1587/TRANSFUN.E94.A.150},
  timestamp    = {Sat, 11 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieicet/KawaharaKTT11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/LiDT11,
  author       = {Fagen Li and
                  Jiang Deng and
                  Tsuyoshi Takagi},
  title        = {An Improved Authenticated Encryption Scheme},
  journal      = {{IEICE} Trans. Inf. Syst.},
  volume       = {94-D},
  number       = {11},
  pages        = {2171--2172},
  year         = {2011},
  url          = {https://doi.org/10.1587/transinf.E94.D.2171},
  doi          = {10.1587/TRANSINF.E94.D.2171},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieicet/LiDT11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/ZhangYZT11,
  author       = {Mingwu Zhang and
                  Bo Yang and
                  Wenzheng Zhang and
                  Tsuyoshi Takagi},
  title        = {Multibiometric Based Secure Encryption, Authentication Scheme with
                  Fuzzy Extractor},
  journal      = {Int. J. Netw. Secur.},
  volume       = {12},
  number       = {1},
  pages        = {50--57},
  year         = {2011},
  url          = {http://ijns.jalaxy.com.tw/contents/ijns-v12-n1/ijns-2011-v12-n1-p50-57.pdf},
  timestamp    = {Mon, 04 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnsec/ZhangYZT11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/ZhangYZLT11,
  author       = {Mingwu Zhang and
                  Bo Yang and
                  Yusheng Zhong and
                  Pengcheng Li and
                  Tsuyoshi Takagi},
  title        = {Cryptanalysis and Fixed of Short Signature Scheme without Random Oracle
                  from Bilinear Parings},
  journal      = {Int. J. Netw. Secur.},
  volume       = {12},
  number       = {3},
  pages        = {130--136},
  year         = {2011},
  url          = {http://ijns.jalaxy.com.tw/contents/ijns-v12-n3/ijns-2011-v12-n3-p130-136.pdf},
  timestamp    = {Mon, 04 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnsec/ZhangYZLT11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isci/ZhangYT11,
  author       = {Mingwu Zhang and
                  Bo Yang and
                  Tsuyoshi Takagi},
  title        = {Group-oriented setting's multisigncryption scheme with threshold designcryption},
  journal      = {Inf. Sci.},
  volume       = {181},
  number       = {18},
  pages        = {4041--4050},
  year         = {2011},
  url          = {https://doi.org/10.1016/j.ins.2011.05.005},
  doi          = {10.1016/J.INS.2011.05.005},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/isci/ZhangYT11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/ZhangT11,
  author       = {Mingwu Zhang and
                  Tsuyoshi Takagi},
  editor       = {Udaya Parampalli and
                  Philip Hawkes},
  title        = {GeoEnc: Geometric Area Based Keys and Policies in Functional Encryption
                  Systems},
  booktitle    = {Information Security and Privacy - 16th Australasian Conference, {ACISP}
                  2011, Melbourne, Australia, July 11-13, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6812},
  pages        = {241--258},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-22497-3\_16},
  doi          = {10.1007/978-3-642-22497-3\_16},
  timestamp    = {Tue, 14 May 2019 10:00:46 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/ZhangT11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/codcry/HayasakaT11,
  author       = {Kenichiro Hayasaka and
                  Tsuyoshi Takagi},
  editor       = {Yeow Meng Chee and
                  Zhenbo Guo and
                  San Ling and
                  Fengjing Shao and
                  Yuansheng Tang and
                  Huaxiong Wang and
                  Chaoping Xing},
  title        = {An Experiment of Number Field Sieve over GF(\emph{p}) of Low Hamming
                  Weight Characteristic},
  booktitle    = {Coding and Cryptology - Third International Workshop, {IWCC} 2011,
                  Qingdao, China, May 30-June 3, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6639},
  pages        = {191--200},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-20901-7\_11},
  doi          = {10.1007/978-3-642-20901-7\_11},
  timestamp    = {Tue, 14 May 2019 10:00:39 +0200},
  biburl       = {https://dblp.org/rec/conf/codcry/HayasakaT11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/paisi/ZhangTY11,
  author       = {Mingwu Zhang and
                  Tsuyoshi Takagi and
                  Bo Yang},
  editor       = {Michael Chau and
                  G. Alan Wang and
                  Xiaolong Zheng and
                  Hsinchun Chen and
                  Daniel Zeng and
                  Wenji Mao},
  title        = {Dual-Verifiers {DVS} with Message Recovery for Tolerant Routing in
                  Wireless Sensor Networks},
  booktitle    = {Intelligence and Security Informatics - Pacific Asia Workshop, {PAISI}
                  2011, Beijing, China, July 9, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6749},
  pages        = {71--84},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-22039-5\_8},
  doi          = {10.1007/978-3-642-22039-5\_8},
  timestamp    = {Mon, 15 May 2023 16:24:40 +0200},
  biburl       = {https://dblp.org/rec/conf/paisi/ZhangTY11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pqcrypto/HashimotoTS11,
  author       = {Yasufumi Hashimoto and
                  Tsuyoshi Takagi and
                  Kouichi Sakurai},
  editor       = {Bo{-}Yin Yang},
  title        = {General Fault Attacks on Multivariate Public Key Cryptosystems},
  booktitle    = {Post-Quantum Cryptography - 4th International Workshop, PQCrypto 2011,
                  Taipei, Taiwan, November 29 - December 2, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7071},
  pages        = {1--18},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-25405-5\_1},
  doi          = {10.1007/978-3-642-25405-5\_1},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pqcrypto/HashimotoTS11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/provsec/LiMZT11,
  author       = {Fagen Li and
                  Fahad Bin Muhaya and
                  Mingwu Zhang and
                  Tsuyoshi Takagi},
  editor       = {Xavier Boyen and
                  Xiaofeng Chen},
  title        = {Efficient Identity-Based Signcryption in the Standard Model},
  booktitle    = {Provable Security - 5th International Conference, ProvSec 2011, Xi'an,
                  China, October 16-18, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6980},
  pages        = {120--137},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-24316-5\_10},
  doi          = {10.1007/978-3-642-24316-5\_10},
  timestamp    = {Tue, 14 May 2019 10:00:45 +0200},
  biburl       = {https://dblp.org/rec/conf/provsec/LiMZT11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/provsec/ZhangNYT11,
  author       = {Mingwu Zhang and
                  Takashi Nishide and
                  Bo Yang and
                  Tsuyoshi Takagi},
  editor       = {Xavier Boyen and
                  Xiaofeng Chen},
  title        = {Anonymous Encryption with Partial-Order Subset Delegation Functionality},
  booktitle    = {Provable Security - 5th International Conference, ProvSec 2011, Xi'an,
                  China, October 16-18, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6980},
  pages        = {154--169},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-24316-5\_12},
  doi          = {10.1007/978-3-642-24316-5\_12},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/provsec/ZhangNYT11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ches/2011,
  editor       = {Bart Preneel and
                  Tsuyoshi Takagi},
  title        = {Cryptographic Hardware and Embedded Systems - {CHES} 2011 - 13th International
                  Workshop, Nara, Japan, September 28 - October 1, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6917},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-23951-9},
  doi          = {10.1007/978-3-642-23951-9},
  isbn         = {978-3-642-23950-2},
  timestamp    = {Sat, 19 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/2011.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KatohHCT11,
  author       = {Yosuke Katoh and
                  Yun{-}Ju Huang and
                  Chen{-}Mou Cheng and
                  Tsuyoshi Takagi},
  title        = {Efficient Implementation of the eta\({}_{\mbox{T}}\) Pairing on {GPU}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {540},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/540},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KatohHCT11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cee/BeuchatDFIIKKMOOSSSTVY10,
  author       = {Jean{-}Luc Beuchat and
                  Hiroshi Doi and
                  Kaoru Fujita and
                  Atsuo Inomata and
                  Piseth Ith and
                  Akira Kanaoka and
                  Masayoshi Katouno and
                  Masahiro Mambo and
                  Eiji Okamoto and
                  Takeshi Okamoto and
                  Takaaki Shiga and
                  Masaaki Shirase and
                  Ryuji Soga and
                  Tsuyoshi Takagi and
                  Ananda Vithanage and
                  Hiroyasu Yamamoto},
  title        = {{FPGA} and {ASIC} implementations of the eta\({}_{\mbox{T}}\) pairing
                  in characteristic three},
  journal      = {Comput. Electr. Eng.},
  volume       = {36},
  number       = {1},
  pages        = {73--87},
  year         = {2010},
  url          = {https://doi.org/10.1016/j.compeleceng.2009.05.001},
  doi          = {10.1016/J.COMPELECENG.2009.05.001},
  timestamp    = {Mon, 26 Oct 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cee/BeuchatDFIIKKMOOSSSTVY10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/chinaf/LiST10,
  author       = {Fagen Li and
                  Masaaki Shirase and
                  Tsuyoshi Takagi},
  title        = {Cryptanalysis of efficient proxy signature schemes for mobile communication},
  journal      = {Sci. China Inf. Sci.},
  volume       = {53},
  number       = {10},
  pages        = {2016--2021},
  year         = {2010},
  url          = {https://doi.org/10.1007/s11432-010-4012-y},
  doi          = {10.1007/S11432-010-4012-Y},
  timestamp    = {Mon, 02 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/chinaf/LiST10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jmc/HakutaST10,
  author       = {Keisuke Hakuta and
                  Hisayoshi Sato and
                  Tsuyoshi Takagi},
  title        = {Efficient arithmetic on subfield elliptic curves over small finite
                  fields of odd characteristic},
  journal      = {J. Math. Cryptol.},
  volume       = {4},
  number       = {3},
  pages        = {199--238},
  year         = {2010},
  url          = {https://doi.org/10.1515/jmc.2010.009},
  doi          = {10.1515/JMC.2010.009},
  timestamp    = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jmc/HakutaST10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/IyamaKFTT10,
  author       = {Tadashi Iyama and
                  Shinsaku Kiyomoto and
                  Kazuhide Fukushima and
                  Toshiaki Tanaka and
                  Tsuyoshi Takagi},
  editor       = {Isao Echizen and
                  Noboru Kunihiro and
                  Ry{\^{o}}ichi Sasaki},
  title        = {Efficient Implementation of Pairing on {BREW} Mobile Phones},
  booktitle    = {Advances in Information and Computer Security - 5th International
                  Workshop on Security, {IWSEC} 2010, Kobe, Japan, November 22-24, 2010.
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6434},
  pages        = {326--336},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-16825-3\_22},
  doi          = {10.1007/978-3-642-16825-3\_22},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwsec/IyamaKFTT10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/paisi/ZhangYTSZ10,
  author       = {Mingwu Zhang and
                  Bo Yang and
                  Tsuyoshi Takagi and
                  Yanping Shen and
                  Wenzheng Zhang},
  editor       = {Hsinchun Chen and
                  Michael Chau and
                  Shu{-}Hsing Li and
                  Shalini R. Urs and
                  Srinath Srinivasa and
                  G. Alan Wang},
  title        = {Fuzzy Biometric Signcryption Scheme with Bilinear Pairings in the
                  Standard Model},
  booktitle    = {Intelligence and Security Informatics, Pacific Asia Workshop, {PAISI}
                  2010, Hyderabad, India, June 21, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6122},
  pages        = {77--87},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-13601-6\_10},
  doi          = {10.1007/978-3-642-13601-6\_10},
  timestamp    = {Tue, 14 May 2019 10:00:49 +0200},
  biburl       = {https://dblp.org/rec/conf/paisi/ZhangYTSZ10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/paisi/ZhangLYWT10,
  author       = {Mingwu Zhang and
                  Pengcheng Li and
                  Bo Yang and
                  Hao Wang and
                  Tsuyoshi Takagi},
  editor       = {Hsinchun Chen and
                  Michael Chau and
                  Shu{-}Hsing Li and
                  Shalini R. Urs and
                  Srinath Srinivasa and
                  G. Alan Wang},
  title        = {Towards Confidentiality of ID-Based Signcryption Schemes under without
                  Random Oracle Model},
  booktitle    = {Intelligence and Security Informatics, Pacific Asia Workshop, {PAISI}
                  2010, Hyderabad, India, June 21, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6122},
  pages        = {98--104},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-13601-6\_12},
  doi          = {10.1007/978-3-642-13601-6\_12},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/paisi/ZhangLYWT10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/HayashiSWMST10,
  author       = {Takuya Hayashi and
                  Naoyuki Shinohara and
                  Lihua Wang and
                  Shin'ichiro Matsuo and
                  Masaaki Shirase and
                  Tsuyoshi Takagi},
  editor       = {Phong Q. Nguyen and
                  David Pointcheval},
  title        = {Solving a 676-Bit Discrete Logarithm Problem in GF(3\({}^{\mbox{6\emph{n}}}\))},
  booktitle    = {Public Key Cryptography - {PKC} 2010, 13th International Conference
                  on Practice and Theory in Public Key Cryptography, Paris, France,
                  May 26-28, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6056},
  pages        = {351--367},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-13013-7\_21},
  doi          = {10.1007/978-3-642-13013-7\_21},
  timestamp    = {Fri, 01 May 2020 18:32:25 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/HayashiSWMST10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HayashiSWMST10,
  author       = {Takuya Hayashi and
                  Naoyuki Shinohara and
                  Lihua Wang and
                  Shin'ichiro Matsuo and
                  Masaaki Shirase and
                  Tsuyoshi Takagi},
  title        = {Solving a 676-bit Discrete Logarithm Problem in GF(3\({}^{\mbox{6n}}\))},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {90},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/090},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/HayashiSWMST10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/csi/RyuT09,
  author       = {Eun{-}Kyung Ryu and
                  Tsuyoshi Takagi},
  title        = {A hybrid approach for privacy-preserving {RFID} tags},
  journal      = {Comput. Stand. Interfaces},
  volume       = {31},
  number       = {4},
  pages        = {812--815},
  year         = {2009},
  url          = {https://doi.org/10.1016/j.csi.2008.09.001},
  doi          = {10.1016/J.CSI.2008.09.001},
  timestamp    = {Thu, 20 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/csi/RyuT09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/SuBZTS09,
  author       = {Chunhua Su and
                  Feng Bao and
                  Jianying Zhou and
                  Tsuyoshi Takagi and
                  Kouichi Sakurai},
  title        = {Security and Correctness Analysis on Privacy-Preserving \emph{k}-Means
                  Clustering Schemes},
  journal      = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.},
  volume       = {92-A},
  number       = {4},
  pages        = {1246--1250},
  year         = {2009},
  url          = {https://doi.org/10.1587/transfun.E92.A.1246},
  doi          = {10.1587/TRANSFUN.E92.A.1246},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieicet/SuBZTS09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/ShiraseMTHC09,
  author       = {Masaaki Shirase and
                  Yukinori Miyazaki and
                  Tsuyoshi Takagi and
                  Dong{-}Guk Han and
                  Dooho Choi},
  title        = {Efficient Implementation of Pairing-Based Cryptography on a Sensor
                  Node},
  journal      = {{IEICE} Trans. Inf. Syst.},
  volume       = {92-D},
  number       = {5},
  pages        = {909--917},
  year         = {2009},
  url          = {https://doi.org/10.1587/transinf.E92.D.909},
  doi          = {10.1587/TRANSINF.E92.D.909},
  timestamp    = {Sat, 11 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieicet/ShiraseMTHC09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/SuBZTS09a,
  author       = {Chunhua Su and
                  Feng Bao and
                  Jianying Zhou and
                  Tsuyoshi Takagi and
                  Kouichi Sakurai},
  title        = {Distributed Noise Generation for Density Estimation Based Clustering
                  without Trusted Third Party},
  journal      = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.},
  volume       = {92-A},
  number       = {8},
  pages        = {1868--1871},
  year         = {2009},
  url          = {https://doi.org/10.1587/transfun.E92.A.1868},
  doi          = {10.1587/TRANSFUN.E92.A.1868},
  timestamp    = {Fri, 09 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieicet/SuBZTS09a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tit/KurosawaT09,
  author       = {Kaoru Kurosawa and
                  Tsuyoshi Takagi},
  title        = {One-wayness equivalent to general factoring},
  journal      = {{IEEE} Trans. Inf. Theory},
  volume       = {55},
  number       = {9},
  pages        = {4249--4262},
  year         = {2009},
  url          = {https://doi.org/10.1109/TIT.2009.2025532},
  doi          = {10.1109/TIT.2009.2025532},
  timestamp    = {Tue, 10 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tit/KurosawaT09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/LiST09,
  author       = {Fagen Li and
                  Masaaki Shirase and
                  Tsuyoshi Takagi},
  title        = {Identity-Based Hybrid Signcryption},
  booktitle    = {Proceedings of the The Forth International Conference on Availability,
                  Reliability and Security, {ARES} 2009, March 16-19, 2009, Fukuoka,
                  Japan},
  pages        = {534--539},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/ARES.2009.44},
  doi          = {10.1109/ARES.2009.44},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEares/LiST09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ispec/LiST09,
  author       = {Fagen Li and
                  Masaaki Shirase and
                  Tsuyoshi Takagi},
  editor       = {Feng Bao and
                  Hui Li and
                  Guilin Wang},
  title        = {Certificateless Hybrid Signcryption},
  booktitle    = {Information Security Practice and Experience, 5th International Conference,
                  {ISPEC} 2009, Xi'an, China, April 13-15, 2009, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5451},
  pages        = {112--123},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-00843-6\_11},
  doi          = {10.1007/978-3-642-00843-6\_11},
  timestamp    = {Tue, 14 May 2019 10:00:40 +0200},
  biburl       = {https://dblp.org/rec/conf/ispec/LiST09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sacrypt/SasakiNST09,
  author       = {Yuta Sasaki and
                  Satsuki Nishina and
                  Masaaki Shirase and
                  Tsuyoshi Takagi},
  editor       = {Michael J. Jacobson Jr. and
                  Vincent Rijmen and
                  Reihaneh Safavi{-}Naini},
  title        = {An Efficient Residue Group Multiplication for the eta\({}_{\mbox{\emph{T}}}\)
                  Pairing over F\({}_{\mbox{3\({}^{\mbox{m}}\)}}\)},
  booktitle    = {Selected Areas in Cryptography, 16th Annual International Workshop,
                  {SAC} 2009, Calgary, Alberta, Canada, August 13-14, 2009, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {5867},
  pages        = {364--375},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-05445-7\_23},
  doi          = {10.1007/978-3-642-05445-7\_23},
  timestamp    = {Tue, 14 May 2019 10:00:38 +0200},
  biburl       = {https://dblp.org/rec/conf/sacrypt/SasakiNST09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/iwsec/2009,
  editor       = {Tsuyoshi Takagi and
                  Masahiro Mambo},
  title        = {Advances in Information and Computer Security, 4th International Workshop
                  on Security, {IWSEC} 2009, Toyama, Japan, October 28-30, 2009, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5824},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-04846-3},
  doi          = {10.1007/978-3-642-04846-3},
  isbn         = {978-3-642-04845-6},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwsec/2009.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LiST09,
  author       = {Fagen Li and
                  Masaaki Shirase and
                  Tsuyoshi Takagi},
  title        = {Certificateless Hybrid Signcryption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {162},
  year         = {2009},
  url          = {http://eprint.iacr.org/2009/162},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LiST09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LiST09a,
  author       = {Fagen Li and
                  Masaaki Shirase and
                  Tsuyoshi Takagi},
  title        = {Identity-Based Hybrid Signcryption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {455},
  year         = {2009},
  url          = {http://eprint.iacr.org/2009/455},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LiST09a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/ShiraseTO08,
  author       = {Masaaki Shirase and
                  Tsuyoshi Takagi and
                  Eiji Okamoto},
  title        = {Some Efficient Algorithms for the Final Exponentiation of eta\({}^{\mbox{T}}\)
                  Pairing},
  journal      = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.},
  volume       = {91-A},
  number       = {1},
  pages        = {221--228},
  year         = {2008},
  url          = {https://doi.org/10.1093/ietfec/e91-a.1.221},
  doi          = {10.1093/IETFEC/E91-A.1.221},
  timestamp    = {Sat, 11 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieicet/ShiraseTO08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/YoshitomiTKT08,
  author       = {Motoi Yoshitomi and
                  Tsuyoshi Takagi and
                  Shinsaku Kiyomoto and
                  Toshiaki Tanaka},
  title        = {Efficient Implementation of the Pairing on Mobilephones Using {BREW}},
  journal      = {{IEICE} Trans. Inf. Syst.},
  volume       = {91-D},
  number       = {5},
  pages        = {1330--1337},
  year         = {2008},
  url          = {https://doi.org/10.1093/ietisy/e91-d.5.1330},
  doi          = {10.1093/IETISY/E91-D.5.1330},
  timestamp    = {Sat, 11 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieicet/YoshitomiTKT08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/NakajimaIT08,
  author       = {Toshiya Nakajima and
                  Tetsuya Izu and
                  Tsuyoshi Takagi},
  title        = {Reduction Optimal Trinomials for Efficient Software Implementation
                  of the eta\({}_{\mbox{T}}\) Pairing},
  journal      = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.},
  volume       = {91-A},
  number       = {9},
  pages        = {2379--2386},
  year         = {2008},
  url          = {https://doi.org/10.1093/ietfec/e91-a.9.2379},
  doi          = {10.1093/IETFEC/E91-A.9.2379},
  timestamp    = {Sat, 11 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieicet/NakajimaIT08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/ShiraseHHKT08,
  author       = {Masaaki Shirase and
                  Dong{-}Guk Han and
                  Yasushi Hibino and
                  Howon Kim and
                  Tsuyoshi Takagi},
  title        = {A More Compact Representation of {XTR} Cryptosystem},
  journal      = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.},
  volume       = {91-A},
  number       = {10},
  pages        = {2843--2850},
  year         = {2008},
  url          = {https://doi.org/10.1093/ietfec/e91-a.10.2843},
  doi          = {10.1093/IETFEC/E91-A.10.2843},
  timestamp    = {Wed, 01 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieicet/ShiraseHHKT08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tc/VuillaumeOT08,
  author       = {Camille Vuillaume and
                  Katsuyuki Okeya and
                  Tsuyoshi Takagi},
  title        = {Short-Memory Scalar Multiplication for Koblitz Curves},
  journal      = {{IEEE} Trans. Computers},
  volume       = {57},
  number       = {4},
  pages        = {481--489},
  year         = {2008},
  url          = {https://doi.org/10.1109/TC.2007.70824},
  doi          = {10.1109/TC.2007.70824},
  timestamp    = {Sat, 20 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tc/VuillaumeOT08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tc/BeuchatBDOST08,
  author       = {Jean{-}Luc Beuchat and
                  Nicolas Brisebarre and
                  J{\'{e}}r{\'{e}}mie Detrey and
                  Eiji Okamoto and
                  Masaaki Shirase and
                  Tsuyoshi Takagi},
  title        = {Algorithms and Arithmetic Operators for Computing the etaT Pairing
                  in Characteristic Three},
  journal      = {{IEEE} Trans. Computers},
  volume       = {57},
  number       = {11},
  pages        = {1454--1468},
  year         = {2008},
  url          = {https://doi.org/10.1109/TC.2008.103},
  doi          = {10.1109/TC.2008.103},
  timestamp    = {Mon, 26 Oct 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tc/BeuchatBDOST08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/SuBZTS08,
  author       = {Chunhua Su and
                  Feng Bao and
                  Jianying Zhou and
                  Tsuyoshi Takagi and
                  Kouichi Sakurai},
  title        = {A New Scheme for Distributed Density Estimation based Privacy-Preserving
                  Clustering},
  booktitle    = {Proceedings of the The Third International Conference on Availability,
                  Reliability and Security, {ARES} 2008, March 4-7, 2008, Technical
                  University of Catalonia, Barcelona , Spain},
  pages        = {112--119},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/ARES.2008.129},
  doi          = {10.1109/ARES.2008.129},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEares/SuBZTS08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/OsakaCTYT08,
  author       = {Kyosuke Osaka and
                  Shuang Chang and
                  Tsuyoshi Takagi and
                  Kenichi Yamazaki and
                  Osamu Takahashi},
  title        = {A Secure {RFID} Protocol based on Insubvertible Encryption Using Guardian
                  Proxy},
  booktitle    = {Proceedings of the The Third International Conference on Availability,
                  Reliability and Security, {ARES} 2008, March 4-7, 2008, Technical
                  University of Catalonia, Barcelona , Spain},
  pages        = {733--740},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/ARES.2008.91},
  doi          = {10.1109/ARES.2008.91},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/IEEEares/OsakaCTYT08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cans/LiST08,
  author       = {Fagen Li and
                  Masaaki Shirase and
                  Tsuyoshi Takagi},
  editor       = {Matthew K. Franklin and
                  Lucas Chi Kwong Hui and
                  Duncan S. Wong},
  title        = {On the Security of Online/Offline Signatures and Multisignatures from
                  ACISP'06},
  booktitle    = {Cryptology and Network Security, 7th International Conference, {CANS}
                  2008, Hong-Kong, China, December 2-4, 2008. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5339},
  pages        = {108--119},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-89641-8\_8},
  doi          = {10.1007/978-3-540-89641-8\_8},
  timestamp    = {Tue, 14 May 2019 10:00:50 +0200},
  biburl       = {https://dblp.org/rec/conf/cans/LiST08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cisc/LiST08,
  author       = {Fagen Li and
                  Masaaki Shirase and
                  Tsuyoshi Takagi},
  editor       = {Moti Yung and
                  Peng Liu and
                  Dongdai Lin},
  title        = {Efficient Signcryption Key Encapsulation without Random Oracles},
  booktitle    = {Information Security and Cryptology, 4th International Conference,
                  Inscrypt 2008, Beijing, China, December 14-17, 2008, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {5487},
  pages        = {47--59},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-642-01440-6\_6},
  doi          = {10.1007/978-3-642-01440-6\_6},
  timestamp    = {Tue, 14 May 2019 10:00:52 +0200},
  biburl       = {https://dblp.org/rec/conf/cisc/LiST08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cisc/LiST08a,
  author       = {Fagen Li and
                  Masaaki Shirase and
                  Tsuyoshi Takagi},
  editor       = {Moti Yung and
                  Peng Liu and
                  Dongdai Lin},
  title        = {Efficient Multi-PKG ID-Based Signcryption for Ad Hoc Networks},
  booktitle    = {Information Security and Cryptology, 4th International Conference,
                  Inscrypt 2008, Beijing, China, December 14-17, 2008, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {5487},
  pages        = {289--304},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-642-01440-6\_23},
  doi          = {10.1007/978-3-642-01440-6\_23},
  timestamp    = {Mon, 22 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cisc/LiST08a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ispec/ShiraseTO08,
  author       = {Masaaki Shirase and
                  Tsuyoshi Takagi and
                  Eiji Okamoto},
  editor       = {Liqun Chen and
                  Yi Mu and
                  Willy Susilo},
  title        = {An Efficient Countermeasure against Side Channel Attacks for Pairing
                  Computation},
  booktitle    = {Information Security Practice and Experience, 4th International Conference,
                  {ISPEC} 2008, Sydney, Australia, April 21-23, 2008, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4991},
  pages        = {290--303},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-79104-1\_21},
  doi          = {10.1007/978-3-540-79104-1\_21},
  timestamp    = {Tue, 14 May 2019 10:00:40 +0200},
  biburl       = {https://dblp.org/rec/conf/ispec/ShiraseTO08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ispec/HakutaST08,
  author       = {Keisuke Hakuta and
                  Hisayoshi Sato and
                  Tsuyoshi Takagi},
  editor       = {Liqun Chen and
                  Yi Mu and
                  Willy Susilo},
  title        = {Efficient Arithmetic on Subfield Elliptic Curves over Small Finite
                  Fields of Odd Characteristic},
  booktitle    = {Information Security Practice and Experience, 4th International Conference,
                  {ISPEC} 2008, Sydney, Australia, April 21-23, 2008, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4991},
  pages        = {304--318},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-79104-1\_22},
  doi          = {10.1007/978-3-540-79104-1\_22},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ispec/HakutaST08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/kes/OtakaTT08,
  author       = {Akira Otaka and
                  Tsuyoshi Takagi and
                  Osamu Takahashi},
  editor       = {Ignac Lovrek and
                  Robert J. Howlett and
                  Lakhmi C. Jain},
  title        = {Network Forensics on Mobile Ad-Hoc Networks},
  booktitle    = {Knowledge-Based Intelligent Information and Engineering Systems, 12th
                  International Conference, {KES} 2008, Zagreb, Croatia, September 3-5,
                  2008, Proceedings, Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {5179},
  pages        = {175--182},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-85567-5\_23},
  doi          = {10.1007/978-3-540-85567-5\_23},
  timestamp    = {Tue, 14 May 2019 10:00:51 +0200},
  biburl       = {https://dblp.org/rec/conf/kes/OtakaTT08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/npc/LiST08,
  author       = {Fagen Li and
                  Masaaki Shirase and
                  Tsuyoshi Takagi},
  editor       = {Jian Cao and
                  Minglu Li and
                  Min{-}You Wu and
                  Jinjun Chen},
  title        = {Key Management Using Certificateless Public Key Cryptography in Ad
                  Hoc Networks},
  booktitle    = {Network and Parallel Computing, {IFIP} International Conference, {NPC}
                  2008, Shanghai, China, October 18-20, 2008. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5245},
  pages        = {116--126},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-88140-7\_11},
  doi          = {10.1007/978-3-540-88140-7\_11},
  timestamp    = {Sun, 28 Feb 2021 15:43:32 +0100},
  biburl       = {https://dblp.org/rec/conf/npc/LiST08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pairing/KawaharaAT08,
  author       = {Yuto Kawahara and
                  Kazumaro Aoki and
                  Tsuyoshi Takagi},
  editor       = {Steven D. Galbraith and
                  Kenneth G. Paterson},
  title        = {Faster Implementation of eta-T Pairing over GF(3\({}^{\mbox{m}}\))
                  Using Minimum Number of Logical Instructions for GF(3)-Addition},
  booktitle    = {Pairing-Based Cryptography - Pairing 2008, Second International Conference,
                  Egham, UK, September 1-3, 2008. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5209},
  pages        = {282--296},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-85538-5\_19},
  doi          = {10.1007/978-3-540-85538-5\_19},
  timestamp    = {Tue, 14 May 2019 10:00:42 +0200},
  biburl       = {https://dblp.org/rec/conf/pairing/KawaharaAT08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pqcrypto/DahmenOTV08,
  author       = {Erik Dahmen and
                  Katsuyuki Okeya and
                  Tsuyoshi Takagi and
                  Camille Vuillaume},
  editor       = {Johannes Buchmann and
                  Jintai Ding},
  title        = {Digital Signatures Out of Second-Preimage Resistant Hash Functions},
  booktitle    = {Post-Quantum Cryptography, Second International Workshop, PQCrypto
                  2008, Cincinnati, OH, USA, October 17-19, 2008, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5299},
  pages        = {109--123},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-88403-3\_8},
  doi          = {10.1007/978-3-540-88403-3\_8},
  timestamp    = {Mon, 16 Nov 2020 15:55:50 +0100},
  biburl       = {https://dblp.org/rec/conf/pqcrypto/DahmenOTV08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BeuchatDFIIKKMOOSSSTVY08,
  author       = {Jean{-}Luc Beuchat and
                  Hiroshi Doi and
                  Kaoru Fujita and
                  Atsuo Inomata and
                  Piseth Ith and
                  Akira Kanaoka and
                  Masayoshi Katouno and
                  Masahiro Mambo and
                  Eiji Okamoto and
                  Takeshi Okamoto and
                  Takaaki Shiga and
                  Masaaki Shirase and
                  Ryuji Soga and
                  Tsuyoshi Takagi and
                  Ananda Vithanage and
                  Hiroyasu Yamamoto},
  title        = {{FPGA} and {ASIC} Implementations of the eta\({}_{\mbox{T}}\) Pairing
                  in Characteristic Three},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {280},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/280},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BeuchatDFIIKKMOOSSSTVY08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/LiST08,
  author       = {Fagen Li and
                  Masaaki Shirase and
                  Tsuyoshi Takagi},
  title        = {Analysis and Improvement of Authenticatable Ring Signcryption Scheme},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {373},
  year         = {2008},
  url          = {http://eprint.iacr.org/2008/373},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/LiST08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/DahmenOT07,
  author       = {Erik Dahmen and
                  Katsuyuki Okeya and
                  Tsuyoshi Takagi},
  title        = {A New Upper Bound for the Minimal Density of Joint Representations
                  in Elliptic Curve Cryptosystems},
  journal      = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.},
  volume       = {90-A},
  number       = {5},
  pages        = {952--959},
  year         = {2007},
  url          = {https://doi.org/10.1093/ietfec/e90-a.5.952},
  doi          = {10.1093/IETFEC/E90-A.5.952},
  timestamp    = {Sat, 11 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieicet/DahmenOT07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/ShiraseHHKT07,
  author       = {Masaaki Shirase and
                  Dong{-}Guk Han and
                  Yasushi Hibino and
                  Ho Won Kim and
                  Tsuyoshi Takagi},
  editor       = {Jonathan Katz and
                  Moti Yung},
  title        = {Compressed {XTR}},
  booktitle    = {Applied Cryptography and Network Security, 5th International Conference,
                  {ACNS} 2007, Zhuhai, China, June 5-8, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4521},
  pages        = {420--431},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-72738-5\_27},
  doi          = {10.1007/978-3-540-72738-5\_27},
  timestamp    = {Wed, 01 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/acns/ShiraseHHKT07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/aina/SuBZTS07,
  author       = {Chunhua Su and
                  Feng Bao and
                  Jianying Zhou and
                  Tsuyoshi Takagi and
                  Kouichi Sakurai},
  title        = {Privacy-Preserving Two-Party K-Means Clustering via Secure Approximation},
  booktitle    = {21st International Conference on Advanced Information Networking and
                  Applications {(AINA} 2007), Workshops Proceedings, Volume 1, May 21-23,
                  2007, Niagara Falls, Canada},
  pages        = {385--391},
  publisher    = {{IEEE} Computer Society},
  year         = {2007},
  url          = {https://doi.org/10.1109/AINAW.2007.295},
  doi          = {10.1109/AINAW.2007.295},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/aina/SuBZTS07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/aina/RyuT07,
  author       = {Eun{-}Kyung Ryu and
                  Tsuyoshi Takagi},
  title        = {Efficient Conjunctive Keyword-Searchable Encryption},
  booktitle    = {21st International Conference on Advanced Information Networking and
                  Applications {(AINA} 2007), Workshops Proceedings, Volume 1, May 21-23,
                  2007, Niagara Falls, Canada},
  pages        = {409--414},
  publisher    = {{IEEE} Computer Society},
  year         = {2007},
  url          = {https://doi.org/10.1109/AINAW.2007.166},
  doi          = {10.1109/AINAW.2007.166},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/aina/RyuT07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/arith/BeuchatSTO07,
  author       = {Jean{-}Luc Beuchat and
                  Masaaki Shirase and
                  Tsuyoshi Takagi and
                  Eiji Okamoto},
  title        = {An Algorithm for the nt Pairing Calculation in Characteristic Three
                  and its Hardware Implementation},
  booktitle    = {18th {IEEE} Symposium on Computer Arithmetic {(ARITH-18} 2007), 25-27
                  June 2007, Montpellier, France},
  pages        = {97--104},
  publisher    = {{IEEE} Computer Society},
  year         = {2007},
  url          = {https://doi.org/10.1109/ARITH.2007.10},
  doi          = {10.1109/ARITH.2007.10},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/arith/BeuchatSTO07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ispec/SuZBTS07,
  author       = {Chunhua Su and
                  Jianying Zhou and
                  Feng Bao and
                  Tsuyoshi Takagi and
                  Kouichi Sakurai},
  editor       = {Ed Dawson and
                  Duncan S. Wong},
  title        = {Two-Party Privacy-Preserving Agglomerative Document Clustering},
  booktitle    = {Information Security Practice and Experience, Third International
                  Conference, {ISPEC} 2007, Hong Kong, China, May 7-9, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4464},
  pages        = {193--208},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-72163-5\_16},
  doi          = {10.1007/978-3-540-72163-5\_16},
  timestamp    = {Tue, 14 May 2019 10:00:40 +0200},
  biburl       = {https://dblp.org/rec/conf/ispec/SuZBTS07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ispec/ShiraseTO07,
  author       = {Masaaki Shirase and
                  Tsuyoshi Takagi and
                  Eiji Okamoto},
  editor       = {Ed Dawson and
                  Duncan S. Wong},
  title        = {Some Efficient Algorithms for the Final Exponentiation of \emph{eta}
                  \({}_{\mbox{ \emph{T} }}\) Pairing},
  booktitle    = {Information Security Practice and Experience, Third International
                  Conference, {ISPEC} 2007, Hong Kong, China, May 7-9, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4464},
  pages        = {254--268},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-72163-5\_20},
  doi          = {10.1007/978-3-540-72163-5\_20},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ispec/ShiraseTO07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/NakajimaIT07,
  author       = {Toshiya Nakajima and
                  Tetsuya Izu and
                  Tsuyoshi Takagi},
  editor       = {Atsuko Miyaji and
                  Hiroaki Kikuchi and
                  Kai Rannenberg},
  title        = {Reduction Optimal Trinomials for Efficient Software Implementation
                  of the eta\({}_{\mbox{T}}\) Pairing},
  booktitle    = {Advances in Information and Computer Security, Second International
                  Workshop on Security, {IWSEC} 2007, Nara, Japan, October 29-31, 2007,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4752},
  pages        = {44--57},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-75651-4\_4},
  doi          = {10.1007/978-3-540-75651-4\_4},
  timestamp    = {Tue, 14 May 2019 10:00:52 +0200},
  biburl       = {https://dblp.org/rec/conf/iwsec/NakajimaIT07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/waifi/BeuchatBSTO07,
  author       = {Jean{-}Luc Beuchat and
                  Nicolas Brisebarre and
                  Masaaki Shirase and
                  Tsuyoshi Takagi and
                  Eiji Okamoto},
  editor       = {Claude Carlet and
                  Berk Sunar},
  title        = {A Coprocessor for the Final Exponentiation of the \emph{eta} \({}_{\mbox{
                  \emph{T} }}\) Pairing in Characteristic Three},
  booktitle    = {Arithmetic of Finite Fields, First International Workshop, {WAIFI}
                  2007, Madrid, Spain, June 21-22, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4547},
  pages        = {25--39},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-73074-3\_4},
  doi          = {10.1007/978-3-540-73074-3\_4},
  timestamp    = {Sun, 25 Oct 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/waifi/BeuchatBSTO07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/ShiraseKTO07,
  author       = {Masaaki Shirase and
                  Yuto Kawahara and
                  Tsuyoshi Takagi and
                  Eiji Okamoto},
  editor       = {Sehun Kim and
                  Moti Yung and
                  Hyung{-}Woo Lee},
  title        = {Universal \emph{eta}\({}_{\mbox{T}}\) Pairing Algorithm over Arbitrary
                  Extension Degree},
  booktitle    = {Information Security Applications, 8th International Workshop, {WISA}
                  2007, Jeju Island, Korea, August 27-29, 2007, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {4867},
  pages        = {1--15},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-77535-5\_1},
  doi          = {10.1007/978-3-540-77535-5\_1},
  timestamp    = {Tue, 14 May 2019 10:00:35 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/ShiraseKTO07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/YoshitomiTKT07,
  author       = {Motoi Yoshitomi and
                  Tsuyoshi Takagi and
                  Shinsaku Kiyomoto and
                  Toshiaki Tanaka},
  editor       = {Sehun Kim and
                  Moti Yung and
                  Hyung{-}Woo Lee},
  title        = {Efficient Implementation of the Pairing on Mobilephones Using {BREW}},
  booktitle    = {Information Security Applications, 8th International Workshop, {WISA}
                  2007, Jeju Island, Korea, August 27-29, 2007, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {4867},
  pages        = {203--214},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-77535-5\_15},
  doi          = {10.1007/978-3-540-77535-5\_15},
  timestamp    = {Sun, 21 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/YoshitomiTKT07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/pairing/2007,
  editor       = {Tsuyoshi Takagi and
                  Tatsuaki Okamoto and
                  Eiji Okamoto and
                  Takeshi Okamoto},
  title        = {Pairing-Based Cryptography - Pairing 2007, First International Conference,
                  Tokyo, Japan, July 2-4, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4575},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-73489-5},
  doi          = {10.1007/978-3-540-73489-5},
  isbn         = {978-3-540-73488-8},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pairing/2007.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BeuchatBSTO07,
  author       = {Jean{-}Luc Beuchat and
                  Nicolas Brisebarre and
                  Masaaki Shirase and
                  Tsuyoshi Takagi and
                  Eiji Okamoto},
  title        = {A Coprocessor for the Final Exponentiation of the eta\({}_{\mbox{T}}\)
                  Pairing in Characteristic Three},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {45},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/045},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BeuchatBSTO07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BeuchatSTO07,
  author       = {Jean{-}Luc Beuchat and
                  Masaaki Shirase and
                  Tsuyoshi Takagi and
                  Eiji Okamoto},
  title        = {A Refined Algorithm for the eta\({}_{\mbox{T}}\) Pairing Calculation
                  in Characteristic Three},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {311},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/311},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BeuchatSTO07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/YoshitomiTKT07,
  author       = {Motoi Yoshitomi and
                  Tsuyoshi Takagi and
                  Shinsaku Kiyomoto and
                  Toshiaki Tanaka},
  title        = {Efficient Implementation of the Pairing on Mobilephones using {BREW}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {340},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/340},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/YoshitomiTKT07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BeuchatBDOST07,
  author       = {Jean{-}Luc Beuchat and
                  Nicolas Brisebarre and
                  J{\'{e}}r{\'{e}}mie Detrey and
                  Eiji Okamoto and
                  Masaaki Shirase and
                  Tsuyoshi Takagi},
  title        = {Algorithms and Arithmetic Operators for Computing the eta\({}_{\mbox{T}}\)
                  Pairing in Characteristic Three},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {417},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/417},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BeuchatBDOST07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/SatoTTT06,
  author       = {Hisayoshi Sato and
                  Tsuyoshi Takagi and
                  Satoru Tezuka and
                  Kazuo Takaragi},
  title        = {Generalized Powering Functions and Their Application to Digital Signatures},
  journal      = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.},
  volume       = {89-A},
  number       = {1},
  pages        = {81--89},
  year         = {2006},
  url          = {https://doi.org/10.1093/ietfec/e89-a.1.81},
  doi          = {10.1093/IETFEC/E89-A.1.81},
  timestamp    = {Sat, 11 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieicet/SatoTTT06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/TakagiRYW06,
  author       = {Tsuyoshi Takagi and
                  David Reis Jr. and
                  Sung{-}Ming Yen and
                  Bo{-}Ching Wu},
  title        = {Radix-\emph{r} Non-Adjacent Form and Its Application to Pairing-Based
                  Cryptosystem},
  journal      = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.},
  volume       = {89-A},
  number       = {1},
  pages        = {115--123},
  year         = {2006},
  url          = {https://doi.org/10.1093/ietfec/e89-a.1.115},
  doi          = {10.1093/IETFEC/E89-A.1.115},
  timestamp    = {Sat, 11 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieicet/TakagiRYW06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/KatagiAKT06,
  author       = {Masanobu Katagi and
                  Toru Akishita and
                  Izuru Kitamura and
                  Tsuyoshi Takagi},
  title        = {Efficient Hyperelliptic Curve Cryptosystems Using Theta Divisors},
  journal      = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.},
  volume       = {89-A},
  number       = {1},
  pages        = {151--160},
  year         = {2006},
  url          = {https://doi.org/10.1093/ietfec/e89-a.1.151},
  doi          = {10.1093/IETFEC/E89-A.1.151},
  timestamp    = {Sat, 11 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieicet/KatagiAKT06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/OkeyaTV06,
  author       = {Katsuyuki Okeya and
                  Tsuyoshi Takagi and
                  Camille Vuillaume},
  title        = {Security Analysis of the SPA-Resistant Fractional Width Method},
  journal      = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.},
  volume       = {89-A},
  number       = {1},
  pages        = {161--168},
  year         = {2006},
  url          = {https://doi.org/10.1093/ietfec/e89-a.1.161},
  doi          = {10.1093/IETFEC/E89-A.1.161},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieicet/OkeyaTV06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/VuillaumeOT06,
  author       = {Camille Vuillaume and
                  Katsuyuki Okeya and
                  Tsuyoshi Takagi},
  title        = {Defeating Simple Power Analysis on Koblitz Curves},
  journal      = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.},
  volume       = {89-A},
  number       = {5},
  pages        = {1362--1369},
  year         = {2006},
  url          = {https://doi.org/10.1093/ietfec/e89-a.5.1362},
  doi          = {10.1093/IETFEC/E89-A.5.1362},
  timestamp    = {Sat, 11 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieicet/VuillaumeOT06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijisec/OkeyaT06,
  author       = {Katsuyuki Okeya and
                  Tsuyoshi Takagi},
  title        = {Security analysis of CRT-based cryptosystems},
  journal      = {Int. J. Inf. Sec.},
  volume       = {5},
  number       = {3},
  pages        = {177--185},
  year         = {2006},
  url          = {https://doi.org/10.1007/s10207-005-0080-1},
  doi          = {10.1007/S10207-005-0080-1},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijisec/OkeyaT06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tc/Schmidt-SamoaST06,
  author       = {Katja Schmidt{-}Samoa and
                  Olivier Semay and
                  Tsuyoshi Takagi},
  title        = {Analysis of Fractional Window Recoding Methods and Their Application
                  to Elliptic Curve Cryptosystems},
  journal      = {{IEEE} Trans. Computers},
  volume       = {55},
  number       = {1},
  pages        = {48--57},
  year         = {2006},
  url          = {https://doi.org/10.1109/TC.2006.3},
  doi          = {10.1109/TC.2006.3},
  timestamp    = {Sat, 20 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tc/Schmidt-SamoaST06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/KurosawaT06,
  author       = {Kaoru Kurosawa and
                  Tsuyoshi Takagi},
  editor       = {Xuejia Lai and
                  Kefei Chen},
  title        = {New Approach for Selectively Convertible Undeniable Signature Schemes},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2006, 12th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Shanghai, China, December 3-7, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4284},
  pages        = {428--443},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11935230\_28},
  doi          = {10.1007/11935230\_28},
  timestamp    = {Tue, 14 May 2019 10:00:40 +0200},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/KurosawaT06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cans/KimTHKL06,
  author       = {Tae Hyun Kim and
                  Tsuyoshi Takagi and
                  Dong{-}Guk Han and
                  Ho Won Kim and
                  Jongin Lim},
  editor       = {David Pointcheval and
                  Yi Mu and
                  Kefei Chen},
  title        = {Side Channel Attacks and Countermeasures on Pairing Based Cryptosystems
                  over Binary Fields},
  booktitle    = {Cryptology and Network Security, 5th International Conference, {CANS}
                  2006, Suzhou, China, December 8-10, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4301},
  pages        = {168--181},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11935070\_11},
  doi          = {10.1007/11935070\_11},
  timestamp    = {Wed, 01 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cans/KimTHKL06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cardis/AkishitaT06,
  author       = {Toru Akishita and
                  Tsuyoshi Takagi},
  editor       = {Josep Domingo{-}Ferrer and
                  Joachim Posegga and
                  Daniel Schreckling},
  title        = {Power Analysis to {ECC} Using Differential Power Between Multiplication
                  and Squaring},
  booktitle    = {Smart Card Research and Advanced Applications, 7th {IFIP} {WG} 8.8/11.2
                  International Conference, {CARDIS} 2006, Tarragona, Spain, April 19-21,
                  2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3928},
  pages        = {151--164},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11733447\_11},
  doi          = {10.1007/11733447\_11},
  timestamp    = {Tue, 14 May 2019 10:00:52 +0200},
  biburl       = {https://dblp.org/rec/conf/cardis/AkishitaT06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/KawaharaTO06,
  author       = {Yuto Kawahara and
                  Tsuyoshi Takagi and
                  Eiji Okamoto},
  editor       = {Yuping Wang and
                  Yiu{-}ming Cheung and
                  Hai{-}Lin Liu},
  title        = {Efficient Implementation of Tate Pairing on a Mobile Phone Using Java},
  booktitle    = {Computational Intelligence and Security, International Conference,
                  {CIS} 2006, Guangzhou, China, November 3-6, 2006, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {4456},
  pages        = {396--405},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/978-3-540-74377-4\_42},
  doi          = {10.1007/978-3-540-74377-4\_42},
  timestamp    = {Tue, 19 Nov 2019 12:34:54 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/KawaharaTO06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/OsakaTYT06,
  author       = {Kyosuke Osaka and
                  Tsuyoshi Takagi and
                  Kenichi Yamazaki and
                  Osamu Takahashi},
  editor       = {Yuping Wang and
                  Yiu{-}ming Cheung and
                  Hai{-}Lin Liu},
  title        = {An Efficient and Secure {RFID} Security Method with Ownership Transfer},
  booktitle    = {Computational Intelligence and Security, International Conference,
                  {CIS} 2006, Guangzhou, China, November 3-6, 2006, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {4456},
  pages        = {778--787},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/978-3-540-74377-4\_81},
  doi          = {10.1007/978-3-540-74377-4\_81},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cis/OsakaTYT06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccsa/HanTKC06,
  author       = {Dong{-}Guk Han and
                  Tsuyoshi Takagi and
                  Howon Kim and
                  Kyoil Chung},
  editor       = {Marina L. Gavrilova and
                  Osvaldo Gervasi and
                  Vipin Kumar and
                  Chih Jeng Kenneth Tan and
                  David Taniar and
                  Antonio Lagan{\`{a}} and
                  Youngsong Mun and
                  Hyunseung Choo},
  title        = {New Security Problem in {RFID} Systems "Tag Killing"},
  booktitle    = {Computational Science and Its Applications - {ICCSA} 2006, International
                  Conference, Glasgow, UK, May 8-11, 2006, Proceedings, Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {3982},
  pages        = {375--384},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11751595\_41},
  doi          = {10.1007/11751595\_41},
  timestamp    = {Wed, 01 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iccsa/HanTKC06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ispec/HanTL06,
  author       = {Dong{-}Guk Han and
                  Tsuyoshi Takagi and
                  Jongin Lim},
  editor       = {Kefei Chen and
                  Robert H. Deng and
                  Xuejia Lai and
                  Jianying Zhou},
  title        = {Further Security Analysis of {XTR}},
  booktitle    = {Information Security Practice and Experience, Second International
                  Conference, {ISPEC} 2006, Hangzhou, China, April 11-14, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3903},
  pages        = {33--44},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11689522\_4},
  doi          = {10.1007/11689522\_4},
  timestamp    = {Thu, 17 Nov 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ispec/HanTL06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KimTHKL06,
  author       = {Tae Hyun Kim and
                  Tsuyoshi Takagi and
                  Dong{-}Guk Han and
                  Ho Won Kim and
                  Jongin Lim},
  title        = {Side Channel Attacks and Countermeasures on Pairing Based Cryptosystems
                  over Binary Fields},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {243},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/243},
  timestamp    = {Wed, 01 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/KimTHKL06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KawaharaTO06,
  author       = {Yuto Kawahara and
                  Tsuyoshi Takagi and
                  Eiji Okamoto},
  title        = {Efficient Implementation of Tate Pairing on a Mobile Phone using Java},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {299},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/299},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KawaharaTO06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/BeuchatSTO06,
  author       = {Jean{-}Luc Beuchat and
                  Masaaki Shirase and
                  Tsuyoshi Takagi and
                  Eiji Okamoto},
  title        = {An Algorithm for the {\(\eta\)}\({}_{\mbox{T}}\) Pairing Calculation
                  in Characteristic Three and its Hardware Implementation},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {327},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/327},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/BeuchatSTO06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ShiraseTO06,
  author       = {Masaaki Shirase and
                  Tsuyoshi Takagi and
                  Eiji Okamoto},
  title        = {Some Efficient Algorithms for the Final Exponentiation of {\(\eta\)}\({}_{\mbox{T}}\)
                  Pairing},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {431},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/431},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ShiraseTO06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/OkeyaTV05,
  author       = {Katsuyuki Okeya and
                  Tsuyoshi Takagi and
                  Camille Vuillaume},
  title        = {On the Importance of Protecting in {SFLASH} against Side Channel Attacks},
  journal      = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.},
  volume       = {88-A},
  number       = {1},
  pages        = {123--131},
  year         = {2005},
  url          = {http://search.ieice.org/bin/summary.php?id=e88-a\_1\_123\&\#38;category=D\&\#38;year=2005\&\#38;lang=E\&\#38;abst=},
  timestamp    = {Sat, 11 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieicet/OkeyaTV05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/AkishitaT05,
  author       = {Toru Akishita and
                  Tsuyoshi Takagi},
  title        = {Zero-Value Register Attack on Elliptic Curve Cryptosystem},
  journal      = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.},
  volume       = {88-A},
  number       = {1},
  pages        = {132--139},
  year         = {2005},
  url          = {http://search.ieice.org/bin/summary.php?id=e88-a\_1\_132\&\#38;category=D\&\#38;year=2005\&\#38;lang=E\&\#38;abst=},
  timestamp    = {Sat, 11 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieicet/AkishitaT05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/AkishitaT05a,
  author       = {Toru Akishita and
                  Tsuyoshi Takagi},
  title        = {On the Optimal Parameter Choice for Elliptic Curve Cryptosystems Using
                  Isogeny},
  journal      = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.},
  volume       = {88-A},
  number       = {1},
  pages        = {140--146},
  year         = {2005},
  url          = {http://search.ieice.org/bin/summary.php?id=e88-a\_1\_140\&\#38;category=D\&\#38;year=2005\&\#38;lang=E\&\#38;abst=},
  timestamp    = {Sat, 11 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieicet/AkishitaT05a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/IzuT05,
  author       = {Tetsuya Izu and
                  Tsuyoshi Takagi},
  title        = {Fast Elliptic Curve Multiplications Resistant against Side Channel
                  Attacks},
  journal      = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.},
  volume       = {88-A},
  number       = {1},
  pages        = {161--171},
  year         = {2005},
  url          = {http://search.ieice.org/bin/summary.php?id=e88-a\_1\_161\&\#38;category=D\&\#38;year=2005\&\#38;lang=E\&\#38;abst=},
  timestamp    = {Sat, 11 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieicet/IzuT05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/KitamuraKT05,
  author       = {Izuru Kitamura and
                  Masanobu Katagi and
                  Tsuyoshi Takagi},
  editor       = {Colin Boyd and
                  Juan Manuel Gonz{\'{a}}lez Nieto},
  title        = {A Complete Divisor Class Halving Algorithm for Hyperelliptic Curve
                  Cryptosystems of Genus Two},
  booktitle    = {Information Security and Privacy, 10th Australasian Conference, {ACISP}
                  2005, Brisbane, Australia, July 4-6, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3574},
  pages        = {146--157},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11506157\_13},
  doi          = {10.1007/11506157\_13},
  timestamp    = {Tue, 14 May 2019 10:00:46 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/KitamuraKT05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/OkeyaTV05,
  author       = {Katsuyuki Okeya and
                  Tsuyoshi Takagi and
                  Camille Vuillaume},
  editor       = {Colin Boyd and
                  Juan Manuel Gonz{\'{a}}lez Nieto},
  title        = {Efficient Representations on Koblitz Curves with Resistance to Side
                  Channel Attacks},
  booktitle    = {Information Security and Privacy, 10th Australasian Conference, {ACISP}
                  2005, Brisbane, Australia, July 4-6, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3574},
  pages        = {218--229},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11506157\_19},
  doi          = {10.1007/11506157\_19},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/OkeyaTV05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccn/TsoOTO05,
  author       = {Raylin Tso and
                  Takeshi Okamoto and
                  Tsuyoshi Takagi and
                  Eiji Okamoto},
  editor       = {M. Y. Sanadidi},
  title        = {An id-based non-interactive tripartite key agreement protocol with
                  K-resilience},
  booktitle    = {Proceedings of the Third {IASTED} International Conference on Communications
                  and Computer Networks, October 24-26, 2005, Marina del Rey, CA, {USA}},
  pages        = {38--42},
  publisher    = {{IASTED/ACTA} Press},
  year         = {2005},
  timestamp    = {Thu, 25 Jan 2007 13:10:45 +0100},
  biburl       = {https://dblp.org/rec/conf/ccn/TsoOTO05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/OkeyaTV05,
  author       = {Katsuyuki Okeya and
                  Tsuyoshi Takagi and
                  Camille Vuillaume},
  editor       = {Josyula R. Rao and
                  Berk Sunar},
  title        = {Short Memory Scalar Multiplication on Koblitz Curves},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2005, 7th International
                  Workshop, Edinburgh, UK, August 29 - September 1, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3659},
  pages        = {91--105},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11545262\_7},
  doi          = {10.1007/11545262\_7},
  timestamp    = {Tue, 14 May 2019 10:00:47 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/OkeyaTV05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cis/WangOTO05,
  author       = {Lihua Wang and
                  Takeshi Okamoto and
                  Tsuyoshi Takagi and
                  Eiji Okamoto},
  editor       = {Yue Hao and
                  Jiming Liu and
                  Yu{-}Ping Wang and
                  Yiu{-}ming Cheung and
                  Hujun Yin and
                  Licheng Jiao and
                  Jianfeng Ma and
                  Yong{-}Chang Jiao},
  title        = {Insider Impersonation-MIM Attack to Tripartite Key Agreement Scheme
                  and an Efficient Protocol for Multiple Keys},
  booktitle    = {Computational Intelligence and Security, International Conference,
                  {CIS} 2005, Xi'an, China, December 15-19, 2005, Proceedings, Part
                  {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {3802},
  pages        = {198--203},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11596981\_30},
  doi          = {10.1007/11596981\_30},
  timestamp    = {Tue, 23 Feb 2021 17:25:41 +0100},
  biburl       = {https://dblp.org/rec/conf/cis/WangOTO05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esas/DahmenOT05,
  author       = {Erik Dahmen and
                  Katsuyuki Okeya and
                  Tsuyoshi Takagi},
  editor       = {Refik Molva and
                  Gene Tsudik and
                  Dirk Westhoff},
  title        = {An Advanced Method for Joint Scalar Multiplications on Memory Constraint
                  Devices},
  booktitle    = {Security and Privacy in Ad-hoc and Sensor Networks, Second European
                  Workshop, {ESAS} 2005, Visegrad, Hungary, July 13-14, 2005, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3813},
  pages        = {189--204},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11601494\_16},
  doi          = {10.1007/11601494\_16},
  timestamp    = {Tue, 14 May 2019 10:00:55 +0200},
  biburl       = {https://dblp.org/rec/conf/esas/DahmenOT05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/euc/HanTKKC05,
  author       = {Dong{-}Guk Han and
                  Tsuyoshi Takagi and
                  Tae Hyun Kim and
                  Howon Kim and
                  Kyoil Chung},
  editor       = {Tomoya Enokido and
                  Lu Yan and
                  Bin Xiao and
                  Daeyoung Kim and
                  Yuan{-}Shun Dai and
                  Laurence Tianruo Yang},
  title        = {Collision Attack on {XTR} and a Countermeasure with a Fixed Pattern},
  booktitle    = {Embedded and Ubiquitous Computing - {EUC} 2005 Workshops, {EUC} 2005
                  Workshops: UISW, NCUS, SecUbiq, USN, and TAUES, Nagasaki, Japan, December
                  6-9, 2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3823},
  pages        = {864--873},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11596042\_89},
  doi          = {10.1007/11596042\_89},
  timestamp    = {Wed, 01 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/euc/HanTKKC05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mycrypt/Schmidt-SamoaT05,
  author       = {Katja Schmidt{-}Samoa and
                  Tsuyoshi Takagi},
  editor       = {Ed Dawson and
                  Serge Vaudenay},
  title        = {Paillier's Cryptosystem Modulo p\({}^{\mbox{2}}\)q and Its Applications
                  to Trapdoor Commitment Schemes},
  booktitle    = {Progress in Cryptology - Mycrypt 2005, First International Conference
                  on Cryptology in Malaysia, Kuala Lumpur, Malaysia, September 28-30,
                  2005, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3715},
  pages        = {296--313},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11554868\_21},
  doi          = {10.1007/11554868\_21},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/mycrypt/Schmidt-SamoaT05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HanT0KC05,
  author       = {Dong{-}Guk Han and
                  Tsuyoshi Takagi and
                  Tae Hyun Kim and
                  Ho Won Kim and
                  Kyoil Chung},
  title        = {Collision Attack on {XTR} and a Countermeasure with a Fixed Pattern},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {316},
  year         = {2005},
  url          = {http://eprint.iacr.org/2005/316},
  timestamp    = {Wed, 01 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/HanT0KC05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KurosawaT05,
  author       = {Kaoru Kurosawa and
                  Tsuyoshi Takagi},
  title        = {One-Wayness Equivalent to General Factoring},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {382},
  year         = {2005},
  url          = {http://eprint.iacr.org/2005/382},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KurosawaT05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HanIT05,
  author       = {Dong{-}Guk Han and
                  Tetsuya Izu and
                  Tsuyoshi Takagi},
  title        = {Some Explicit Formulae of {NAF} and its Left-to-Right Analogue},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {384},
  year         = {2005},
  url          = {http://eprint.iacr.org/2005/384},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/HanIT05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HanT05,
  author       = {Dong{-}Guk Han and
                  Tsuyoshi Takagi},
  title        = {Some Analysis of Radix-r Representations},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {402},
  year         = {2005},
  url          = {http://eprint.iacr.org/2005/402},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/HanT05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HakutaST05,
  author       = {Keisuke Hakuta and
                  Hisayoshi Sato and
                  Tsuyoshi Takagi},
  title        = {Efficient Arithmetic on Subfield Elliptic Curves over Small Odd Characteristics},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {454},
  year         = {2005},
  url          = {http://eprint.iacr.org/2005/454},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/HakutaST05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/BiehlPT04,
  author       = {Ingrid Biehl and
                  Sachar Paulus and
                  Tsuyoshi Takagi},
  title        = {Efficient Undeniable Signature Schemes Based on Ideal Arithmetic in
                  Quadratic Orders},
  journal      = {Des. Codes Cryptogr.},
  volume       = {31},
  number       = {2},
  pages        = {99--123},
  year         = {2004},
  url          = {https://doi.org/10.1023/B:DESI.0000012439.20075.16},
  doi          = {10.1023/B:DESI.0000012439.20075.16},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/BiehlPT04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/OkeyaT04,
  author       = {Katsuyuki Okeya and
                  Tsuyoshi Takagi},
  title        = {SCA-Resistant and Fast Elliptic Scalar Multiplication Based on wNAF},
  journal      = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.},
  volume       = {87-A},
  number       = {1},
  pages        = {75--84},
  year         = {2004},
  url          = {http://search.ieice.org/bin/summary.php?id=e87-a\_1\_75\&\#38;category=D\&\#38;year=2004\&\#38;lang=E\&\#38;abst=},
  timestamp    = {Sat, 11 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieicet/OkeyaT04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/IzuT04,
  author       = {Tetsuya Izu and
                  Tsuyoshi Takagi},
  title        = {Fast Elliptic Curve Multiplications with {SIMD} Operations},
  journal      = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.},
  volume       = {87-A},
  number       = {1},
  pages        = {85--93},
  year         = {2004},
  url          = {http://search.ieice.org/bin/summary.php?id=e87-a\_1\_85\&\#38;category=D\&\#38;year=2004\&\#38;lang=E\&\#38;abst=},
  timestamp    = {Sat, 11 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieicet/IzuT04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/Takagi04,
  author       = {Tsuyoshi Takagi},
  title        = {A Fast RSA-Type Public-Key Primitive Modulo p\({}^{\mbox{k}}\)q Using
                  Hensel Lifting},
  journal      = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.},
  volume       = {87-A},
  number       = {1},
  pages        = {94--101},
  year         = {2004},
  url          = {http://search.ieice.org/bin/summary.php?id=e87-a\_1\_94\&\#38;category=D\&\#38;year=2004\&\#38;lang=E\&\#38;abst=},
  timestamp    = {Sat, 11 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieicet/Takagi04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/OkeyaTV04,
  author       = {Katsuyuki Okeya and
                  Tsuyoshi Takagi and
                  Camille Vuillaume},
  editor       = {Huaxiong Wang and
                  Josef Pieprzyk and
                  Vijay Varadharajan},
  title        = {On the Exact Flexibility of the Flexible Countermeasure Against Side
                  Channel Attacks},
  booktitle    = {Information Security and Privacy: 9th Australasian Conference, {ACISP}
                  2004, Sydney, Australia, July 13-15, 2004. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3108},
  pages        = {466--477},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-27800-9\_40},
  doi          = {10.1007/978-3-540-27800-9\_40},
  timestamp    = {Tue, 14 May 2019 10:00:46 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/OkeyaTV04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/OkeyaT04,
  author       = {Katsuyuki Okeya and
                  Tsuyoshi Takagi},
  editor       = {Markus Jakobsson and
                  Moti Yung and
                  Jianying Zhou},
  title        = {Security Analysis of CRT-Based Cryptosystems},
  booktitle    = {Applied Cryptography and Network Security, Second International Conference,
                  {ACNS} 2004, Yellow Mountain, China, June 8-11, 2004, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3089},
  pages        = {383--397},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-24852-1\_28},
  doi          = {10.1007/978-3-540-24852-1\_28},
  timestamp    = {Tue, 14 May 2019 10:00:54 +0200},
  biburl       = {https://dblp.org/rec/conf/acns/OkeyaT04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/OkeyaSST04,
  author       = {Katsuyuki Okeya and
                  Katja Schmidt{-}Samoa and
                  Christian Spahn and
                  Tsuyoshi Takagi},
  editor       = {Matthew K. Franklin},
  title        = {Signed Binary Representations Revisited},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2004, 24th Annual International
                  CryptologyConference, Santa Barbara, California, USA, August 15-19,
                  2004, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3152},
  pages        = {123--139},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-28628-8\_8},
  doi          = {10.1007/978-3-540-28628-8\_8},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/OkeyaSST04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/humanoids/SawadaTHF04,
  author       = {Tsutomu Sawada and
                  Tsuyoshi Takagi and
                  Yukiko Hoshino and
                  Masahiro Fujita},
  title        = {Learning behavior selection through interaction based on emotionally
                  grounded symbol concept},
  booktitle    = {4th {IEEE/RAS} International Conference on Humanoid Robots, Humanoids
                  2004, Santa Monica, CA, USA, November 10-12, 2004},
  pages        = {450--469},
  publisher    = {{IEEE}},
  year         = {2004},
  url          = {https://doi.org/10.1109/ICHR.2004.1442137},
  doi          = {10.1109/ICHR.2004.1442137},
  timestamp    = {Wed, 16 Oct 2019 14:14:50 +0200},
  biburl       = {https://dblp.org/rec/conf/humanoids/SawadaTHF04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icisc/KatagiAKT04,
  author       = {Masanobu Katagi and
                  Toru Akishita and
                  Izuru Kitamura and
                  Tsuyoshi Takagi},
  editor       = {Choonsik Park and
                  Seongtaek Chee},
  title        = {Some Improved Algorithms for Hyperelliptic Curve Cryptosystems Using
                  Degenerate Divisors},
  booktitle    = {Information Security and Cryptology - {ICISC} 2004, 7th International
                  Conference, Seoul, Korea, December 2-3, 2004, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3506},
  pages        = {296--312},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/11496618\_22},
  doi          = {10.1007/11496618\_22},
  timestamp    = {Tue, 14 May 2019 10:00:36 +0200},
  biburl       = {https://dblp.org/rec/conf/icisc/KatagiAKT04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icra/HoshinoTPF04,
  author       = {Yukiko Hoshino and
                  Tsuyoshi Takagi and
                  Ugo Di Profio and
                  Masahiro Fujita},
  title        = {Behavior Description and Control using Behavior Module for Personal
                  Robot},
  booktitle    = {Proceedings of the 2004 {IEEE} International Conference on Robotics
                  and Automation, {ICRA} 2004, April 26 - May 1, 2004, New Orleans,
                  LA, {USA}},
  pages        = {4165--4171},
  publisher    = {{IEEE}},
  year         = {2004},
  url          = {https://doi.org/10.1109/ROBOT.2004.1308925},
  doi          = {10.1109/ROBOT.2004.1308925},
  timestamp    = {Mon, 22 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icra/HoshinoTPF04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/indocrypt/GalindoMTV04,
  author       = {David Galindo and
                  Sebasti{\`{a}} Mart{\'{\i}}n Mollev{\'{\i}} and
                  Tsuyoshi Takagi and
                  Jorge Luis Villar},
  editor       = {Anne Canteaut and
                  Kapalee Viswanathan},
  title        = {A Provably Secure Elliptic Curve Scheme with Fast Encryption},
  booktitle    = {Progress in Cryptology - {INDOCRYPT} 2004, 5th International Conference
                  on Cryptology in India, Chennai, India, December 20-22, 2004, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3348},
  pages        = {245--259},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-30556-9\_20},
  doi          = {10.1007/978-3-540-30556-9\_20},
  timestamp    = {Tue, 14 May 2019 10:00:51 +0200},
  biburl       = {https://dblp.org/rec/conf/indocrypt/GalindoMTV04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/indocrypt/SatoST04,
  author       = {Hisayoshi Sato and
                  Daniel Schepers and
                  Tsuyoshi Takagi},
  editor       = {Anne Canteaut and
                  Kapalee Viswanathan},
  title        = {Exact Analysis of Montgomery Multiplication},
  booktitle    = {Progress in Cryptology - {INDOCRYPT} 2004, 5th International Conference
                  on Cryptology in India, Chennai, India, December 20-22, 2004, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3348},
  pages        = {290--304},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-30556-9\_23},
  doi          = {10.1007/978-3-540-30556-9\_23},
  timestamp    = {Fri, 19 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/indocrypt/SatoST04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iros/SawadaTF04,
  author       = {Tsutomu Sawada and
                  Tsuyoshi Takagi and
                  Masahiro Fujita},
  title        = {Behavior selection and motion modulation in emotionally grounded architecture
                  for {QRIO} {SDR-4XII}},
  booktitle    = {2004 {IEEE/RSJ} International Conference on Intelligent Robots and
                  Systems, Sendai, Japan, September 28 - October 2, 2004},
  pages        = {2514--2519},
  publisher    = {{IEEE}},
  year         = {2004},
  url          = {https://doi.org/10.1109/IROS.2004.1389786},
  doi          = {10.1109/IROS.2004.1389786},
  timestamp    = {Wed, 16 Oct 2019 14:14:51 +0200},
  biburl       = {https://dblp.org/rec/conf/iros/SawadaTF04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isw/TakagiYW04,
  author       = {Tsuyoshi Takagi and
                  Sung{-}Ming Yen and
                  Bo{-}Ching Wu},
  editor       = {Kan Zhang and
                  Yuliang Zheng},
  title        = {Radix-r Non-Adjacent Form},
  booktitle    = {Information Security, 7th International Conference, {ISC} 2004, Palo
                  Alto, CA, USA, September 27-29, 2004, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {3225},
  pages        = {99--110},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-30144-8\_9},
  doi          = {10.1007/978-3-540-30144-8\_9},
  timestamp    = {Tue, 30 Nov 2021 15:21:24 +0100},
  biburl       = {https://dblp.org/rec/conf/isw/TakagiYW04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/itcc/OkeyaTV04,
  author       = {Katsuyuki Okeya and
                  Tsuyoshi Takagi and
                  Camille Vuillaume},
  title        = {On the Importance of Protecting Delta in {SFLASH} against Side Channel
                  Attacks},
  booktitle    = {International Conference on Information Technology: Coding and Computing
                  (ITCC'04), Volume 2, April 5-7, 2004, Las Vegas, Nevada, {USA}},
  pages        = {560--568},
  publisher    = {{IEEE} Computer Society},
  year         = {2004},
  url          = {https://doi.org/10.1109/ITCC.2004.1286713},
  doi          = {10.1109/ITCC.2004.1286713},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/itcc/OkeyaTV04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/AkishitaT04,
  author       = {Toru Akishita and
                  Tsuyoshi Takagi},
  editor       = {Feng Bao and
                  Robert H. Deng and
                  Jianying Zhou},
  title        = {On the Optimal Parameter Choice for Elliptic Curve Cryptosystems Using
                  Isogeny},
  booktitle    = {Public Key Cryptography - {PKC} 2004, 7th International Workshop on
                  Theory and Practice in Public Key Cryptography, Singapore, March 1-4,
                  2004},
  series       = {Lecture Notes in Computer Science},
  volume       = {2947},
  pages        = {346--359},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-24632-9\_25},
  doi          = {10.1007/978-3-540-24632-9\_25},
  timestamp    = {Fri, 01 May 2020 18:32:25 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/AkishitaT04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/KatagiKAT04,
  author       = {Masanobu Katagi and
                  Izuru Kitamura and
                  Toru Akishita and
                  Tsuyoshi Takagi},
  editor       = {Chae Hoon Lim and
                  Moti Yung},
  title        = {Novel Efficient Implementations of Hyperelliptic Curve Cryptosystems
                  Using Degenerate Divisors},
  booktitle    = {Information Security Applications, 5th International Workshop, {WISA}
                  2004, Jeju Island, Korea, August 23-25, 2004, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3325},
  pages        = {345--359},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-31815-6\_28},
  doi          = {10.1007/978-3-540-31815-6\_28},
  timestamp    = {Tue, 14 May 2019 10:00:35 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/KatagiKAT04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/OkeyaSST04,
  author       = {Katsuyuki Okeya and
                  Katja Schmidt{-}Samoa and
                  Christian Spahn and
                  Tsuyoshi Takagi},
  title        = {Signed Binary Representations Revisited},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {195},
  year         = {2004},
  url          = {http://eprint.iacr.org/2004/195},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/OkeyaSST04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KitamuraKT04,
  author       = {Izuru Kitamura and
                  Masanobu Katagi and
                  Tsuyoshi Takagi},
  title        = {A Complete Divisor Class Halving Algorithm for Hyperelliptic Curve
                  Cryptosystems of Genus Two},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {255},
  year         = {2004},
  url          = {http://eprint.iacr.org/2004/255},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KitamuraKT04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ras/ArkinFTH03,
  author       = {Ronald C. Arkin and
                  Masahiro Fujita and
                  Tsuyoshi Takagi and
                  Rika Hasegawa},
  title        = {An ethological and emotional basis for human-robot interaction},
  journal      = {Robotics Auton. Syst.},
  volume       = {42},
  number       = {3-4},
  pages        = {191--201},
  year         = {2003},
  url          = {https://doi.org/10.1016/S0921-8890(02)00375-5},
  doi          = {10.1016/S0921-8890(02)00375-5},
  timestamp    = {Mon, 24 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ras/ArkinFTH03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/KurosawaT03,
  author       = {Kaoru Kurosawa and
                  Tsuyoshi Takagi},
  editor       = {Chi{-}Sung Laih},
  title        = {Some RSA-Based Encryption Schemes with Tight Security Reduction},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2003, 9th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Taipei, Taiwan, November 30 - December 4, 2003, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2894},
  pages        = {19--36},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/978-3-540-40061-5\_2},
  doi          = {10.1007/978-3-540-40061-5\_2},
  timestamp    = {Tue, 14 May 2019 10:00:40 +0200},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/KurosawaT03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/SatoTTT03,
  author       = {Hisayoshi Sato and
                  Tsuyoshi Takagi and
                  Satoru Tezuka and
                  Kazuo Takaragi},
  editor       = {Chi{-}Sung Laih},
  title        = {Generalized Powering Functions and Their Application to Digital Signatures},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2003, 9th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Taipei, Taiwan, November 30 - December 4, 2003, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2894},
  pages        = {434--451},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/978-3-540-40061-5\_28},
  doi          = {10.1007/978-3-540-40061-5\_28},
  timestamp    = {Fri, 19 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/SatoTTT03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/KurosawaST03,
  author       = {Kaoru Kurosawa and
                  Katja Schmidt{-}Samoa and
                  Tsuyoshi Takagi},
  editor       = {Chi{-}Sung Laih},
  title        = {A Complete and Explicit Security Reduction Algorithm for RSA-Based
                  Cryptosystems},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2003, 9th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Taipei, Taiwan, November 30 - December 4, 2003, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2894},
  pages        = {474--491},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/978-3-540-40061-5\_30},
  doi          = {10.1007/978-3-540-40061-5\_30},
  timestamp    = {Fri, 19 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/KurosawaST03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/OkeyaT03,
  author       = {Katsuyuki Okeya and
                  Tsuyoshi Takagi},
  editor       = {Colin D. Walter and
                  {\c{C}}etin Kaya Ko{\c{c}} and
                  Christof Paar},
  title        = {A More Flexible Countermeasure against Side Channel Attacks Using
                  Window Method},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2003, 5th International
                  Workshop, Cologne, Germany, September 8-10, 2003, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2779},
  pages        = {397--410},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/978-3-540-45238-6\_31},
  doi          = {10.1007/978-3-540-45238-6\_31},
  timestamp    = {Tue, 14 May 2019 10:00:47 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/OkeyaT03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ctrsa/OkeyaT03,
  author       = {Katsuyuki Okeya and
                  Tsuyoshi Takagi},
  editor       = {Marc Joye},
  title        = {The Width-w {NAF} Method Provides Small Memory and Fast Elliptic Scalar
                  Multiplications Secure against Side Channel Attacks},
  booktitle    = {Topics in Cryptology - {CT-RSA} 2003, The Cryptographers' Track at
                  the {RSA} Conference 2003, San Francisco, CA, USA, April 13-17, 2003,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2612},
  pages        = {328--342},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/3-540-36563-X\_23},
  doi          = {10.1007/3-540-36563-X\_23},
  timestamp    = {Tue, 14 May 2019 10:00:52 +0200},
  biburl       = {https://dblp.org/rec/conf/ctrsa/OkeyaT03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isw/AkishitaT03,
  author       = {Toru Akishita and
                  Tsuyoshi Takagi},
  editor       = {Colin Boyd and
                  Wenbo Mao},
  title        = {Zero-Value Point Attacks on Elliptic Curve Cryptosystem},
  booktitle    = {Information Security, 6th International Conference, {ISC} 2003, Bristol,
                  UK, October 1-3, 2003, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2851},
  pages        = {218--233},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/10958513\_17},
  doi          = {10.1007/10958513\_17},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/isw/AkishitaT03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/IzuT03,
  author       = {Tetsuya Izu and
                  Tsuyoshi Takagi},
  editor       = {Yvo Desmedt},
  title        = {Exceptional Procedure Attack on Elliptic Curve Cryptosystems},
  booktitle    = {Public Key Cryptography - {PKC} 2003, 6th International Workshop on
                  Theory and Practice in Public Key Cryptography, Miami, FL, USA, January
                  6-8, 2003, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2567},
  pages        = {224--239},
  publisher    = {Springer},
  year         = {2003},
  url          = {https://doi.org/10.1007/3-540-36288-6\_17},
  doi          = {10.1007/3-540-36288-6\_17},
  timestamp    = {Fri, 01 May 2020 18:32:25 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/IzuT03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KurosawaT03,
  author       = {Kaoru Kurosawa and
                  Tsuyoshi Takagi},
  title        = {Some RSA-based Encryption Schemes with Tight Security Reduction},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {157},
  year         = {2003},
  url          = {http://eprint.iacr.org/2003/157},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KurosawaT03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KatagiKAT03,
  author       = {Masanobu Katagi and
                  Izuru Kitamura and
                  Toru Akishita and
                  Tsuyoshi Takagi},
  title        = {Novel Efficient Implementations of Hyperelliptic Curve Cryptosystems
                  using Degenerate Divisors},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {203},
  year         = {2003},
  url          = {http://eprint.iacr.org/2003/203},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KatagiKAT03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/BiehlT02,
  author       = {Ingrid Biehl and
                  Tsuyoshi Takagi},
  editor       = {Lynn Margaret Batten and
                  Jennifer Seberry},
  title        = {A New Distributed Primality Test for Shared {RSA} Keys Using Quadratic
                  Fields},
  booktitle    = {Information Security and Privacy, 7th Australian Conference, {ACISP}
                  2002, Melbourne, Australia, July 3-5, 2002, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2384},
  pages        = {1--16},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-45450-0\_1},
  doi          = {10.1007/3-540-45450-0\_1},
  timestamp    = {Tue, 14 May 2019 10:00:46 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/BiehlT02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/SakuraiT02,
  author       = {Kouichi Sakurai and
                  Tsuyoshi Takagi},
  editor       = {Lynn Margaret Batten and
                  Jennifer Seberry},
  title        = {On the Security of a Modified Paillier Public-Key Primitive},
  booktitle    = {Information Security and Privacy, 7th Australian Conference, {ACISP}
                  2002, Melbourne, Australia, July 3-5, 2002, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2384},
  pages        = {436--448},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-45450-0\_33},
  doi          = {10.1007/3-540-45450-0\_33},
  timestamp    = {Thu, 25 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/SakuraiT02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icics/IzuT02,
  author       = {Tetsuya Izu and
                  Tsuyoshi Takagi},
  editor       = {Robert H. Deng and
                  Sihan Qing and
                  Feng Bao and
                  Jianying Zhou},
  title        = {Fast Elliptic Curve Multiplications with {SIMD} Operations},
  booktitle    = {Information and Communications Security, 4th International Conference,
                  {ICICS} 2002, Singapore, December 9-12, 2002, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2513},
  pages        = {217--230},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-36159-6\_19},
  doi          = {10.1007/3-540-36159-6\_19},
  timestamp    = {Tue, 14 May 2019 10:00:37 +0200},
  biburl       = {https://dblp.org/rec/conf/icics/IzuT02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icisc/IzuT02,
  author       = {Tetsuya Izu and
                  Tsuyoshi Takagi},
  editor       = {Pil Joong Lee and
                  Chae Hoon Lim},
  title        = {Efficient Computations of the Tate Pairingfor the Large {MOV} Degrees},
  booktitle    = {Information Security and Cryptology - {ICISC} 2002, 5th International
                  Conference Seoul, Korea, November 28-29, 2002, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2587},
  pages        = {283--297},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-36552-4\_20},
  doi          = {10.1007/3-540-36552-4\_20},
  timestamp    = {Tue, 14 May 2019 10:00:36 +0200},
  biburl       = {https://dblp.org/rec/conf/icisc/IzuT02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icisc/SakuraiT02,
  author       = {Kouichi Sakurai and
                  Tsuyoshi Takagi},
  editor       = {Pil Joong Lee and
                  Chae Hoon Lim},
  title        = {A Reject Timing Attackon an {IND-CCA2} Public-Key Cryptosystem},
  booktitle    = {Information Security and Cryptology - {ICISC} 2002, 5th International
                  Conference Seoul, Korea, November 28-29, 2002, Revised Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {2587},
  pages        = {359--373},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-36552-4\_25},
  doi          = {10.1007/3-540-36552-4\_25},
  timestamp    = {Fri, 26 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icisc/SakuraiT02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/indocrypt/IzuMT02,
  author       = {Tetsuya Izu and
                  Bodo M{\"{o}}ller and
                  Tsuyoshi Takagi},
  editor       = {Alfred Menezes and
                  Palash Sarkar},
  title        = {Improved Elliptic Curve Multiplication Methods Resistant against Side
                  Channel Attacks},
  booktitle    = {Progress in Cryptology - {INDOCRYPT} 2002, Third International Conference
                  on Cryptology in India, Hyderabad, India, December 16-18, 2002},
  series       = {Lecture Notes in Computer Science},
  volume       = {2551},
  pages        = {296--313},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-36231-2\_24},
  doi          = {10.1007/3-540-36231-2\_24},
  timestamp    = {Tue, 14 May 2019 10:00:51 +0200},
  biburl       = {https://dblp.org/rec/conf/indocrypt/IzuMT02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/SakuraiT02,
  author       = {Kouichi Sakurai and
                  Tsuyoshi Takagi},
  editor       = {David Naccache and
                  Pascal Paillier},
  title        = {New Semantically Secure Public-Key Cryptosystems from the RSA-Primitive},
  booktitle    = {Public Key Cryptography, 5th International Workshop on Practice and
                  Theory in Public Key Cryptosystems, {PKC} 2002, Paris, France, February
                  12-14, 2002, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2274},
  pages        = {1--16},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-45664-3\_1},
  doi          = {10.1007/3-540-45664-3\_1},
  timestamp    = {Fri, 01 May 2020 18:32:25 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/SakuraiT02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/IzuT02,
  author       = {Tetsuya Izu and
                  Tsuyoshi Takagi},
  editor       = {David Naccache and
                  Pascal Paillier},
  title        = {A Fast Parallel Elliptic Curve Multiplication Resistant against Side
                  Channel Attacks},
  booktitle    = {Public Key Cryptography, 5th International Workshop on Practice and
                  Theory in Public Key Cryptosystems, {PKC} 2002, Paris, France, February
                  12-14, 2002, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2274},
  pages        = {280--296},
  publisher    = {Springer},
  year         = {2002},
  url          = {https://doi.org/10.1007/3-540-45664-3\_20},
  doi          = {10.1007/3-540-45664-3\_20},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/IzuT02.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@phdthesis{DBLP:phd/dnb/Takagi01,
  author       = {Tsuyoshi Takagi},
  title        = {New public-key cryptosystems with fast decryption},
  school       = {Darmstadt University of Technology, Germany},
  year         = {2001},
  url          = {http://elib.tu-darmstadt.de/diss/000104/TakagiDiss.pdf},
  urn          = {urn:nbn:de:tuda-tuprints-1043},
  timestamp    = {Sat, 17 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/phd/dnb/Takagi01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/JoyeQT01,
  author       = {Marc Joye and
                  Jean{-}Jacques Quisquater and
                  Tsuyoshi Takagi},
  title        = {How to Choose Secret Parameters for RSA-Type Cryptosystems over Elliptic
                  Curves},
  journal      = {Des. Codes Cryptogr.},
  volume       = {23},
  number       = {3},
  pages        = {297--316},
  year         = {2001},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/JoyeQT01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/agents/FujitaCHTYS01,
  author       = {Masahiro Fujita and
                  Gabriel Costa and
                  Rika Hasegawa and
                  Tsuyoshi Takagi and
                  Jun Yokono and
                  Hideki Shimomura},
  editor       = {Elisabeth Andr{\'{e}} and
                  Sandip Sen and
                  Claude Frasson and
                  J{\"{o}}rg P. M{\"{u}}ller},
  title        = {Architecture and preliminary experimental results for emotionally
                  grounded symbol acquisition},
  booktitle    = {Proceedings of the Fifth International Conference on Autonomous Agents,
                  {AGENTS} 2001, Montreal, Canada, May 28 - June 1, 2001},
  pages        = {35--36},
  publisher    = {{ACM}},
  year         = {2001},
  url          = {https://doi.org/10.1145/375735.375851},
  doi          = {10.1145/375735.375851},
  timestamp    = {Sat, 30 Sep 2023 09:33:47 +0200},
  biburl       = {https://dblp.org/rec/conf/agents/FujitaCHTYS01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icisc/BuchmannST01,
  author       = {Johannes Buchmann and
                  Kouichi Sakurai and
                  Tsuyoshi Takagi},
  editor       = {Kwangjo Kim},
  title        = {An {IND-CCA2} Public-Key Cryptosystem with Fast Decryption},
  booktitle    = {Information Security and Cryptology - {ICISC} 2001, 4th International
                  Conference Seoul, Korea, December 6-7, 2001, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2288},
  pages        = {51--71},
  publisher    = {Springer},
  year         = {2001},
  url          = {https://doi.org/10.1007/3-540-45861-1\_6},
  doi          = {10.1007/3-540-45861-1\_6},
  timestamp    = {Mon, 16 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icisc/BuchmannST01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icra/ArkinFTH01,
  author       = {Ronald C. Arkin and
                  Masahiro Fujita and
                  Tsuyoshi Takagi and
                  Rika Hasegawa},
  title        = {Ethological Modeling and Architecture for an Entertainment Robot},
  booktitle    = {Proceedings of the 2001 {IEEE} International Conference on Robotics
                  and Automation, {ICRA} 2001, May 21-26, 2001, Seoul, Korea},
  pages        = {453--458},
  publisher    = {{IEEE}},
  year         = {2001},
  url          = {https://doi.org/10.1109/ROBOT.2001.932592},
  doi          = {10.1109/ROBOT.2001.932592},
  timestamp    = {Mon, 22 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icra/ArkinFTH01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/joc/PaulusT00,
  author       = {Sachar Paulus and
                  Tsuyoshi Takagi},
  title        = {A New Public-Key Cryptosystem over a Quadratic Order with Quadratic
                  Decryption Time},
  journal      = {J. Cryptol.},
  volume       = {13},
  number       = {2},
  pages        = {263--272},
  year         = {2000},
  url          = {https://doi.org/10.1007/s001459910010},
  doi          = {10.1007/S001459910010},
  timestamp    = {Fri, 18 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/joc/PaulusT00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/HuhnleinT99,
  author       = {Detlef H{\"{u}}hnlein and
                  Tsuyoshi Takagi},
  editor       = {Kwok{-}Yan Lam and
                  Eiji Okamoto and
                  Chaoping Xing},
  title        = {Reducing Logarithms in Totally Non-maximal Imaginary Quadratic Orders
                  to Logarithms in Finite Fields},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} '99, International Conference
                  on the Theory and Applications of Cryptology and Information Security,
                  Singapore, November 14-18, 1999, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1716},
  pages        = {219--231},
  publisher    = {Springer},
  year         = {1999},
  url          = {https://doi.org/10.1007/978-3-540-48000-6\_18},
  doi          = {10.1007/978-3-540-48000-6\_18},
  timestamp    = {Tue, 14 May 2019 10:00:40 +0200},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/HuhnleinT99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/HartmannPT99,
  author       = {Michael Hartmann and
                  Sachar Paulus and
                  Tsuyoshi Takagi},
  editor       = {{\c{C}}etin Kaya Ko{\c{c}} and
                  Christof Paar},
  title        = {{NICE} - New Ideal Coset Encryption},
  booktitle    = {Cryptographic Hardware and Embedded Systems, First International Workshop,
                  CHES'99, Worcester, MA, USA, August 12-13, 1999, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1717},
  pages        = {328--339},
  publisher    = {Springer},
  year         = {1999},
  url          = {https://doi.org/10.1007/3-540-48059-5\_28},
  doi          = {10.1007/3-540-48059-5\_28},
  timestamp    = {Tue, 14 May 2019 10:00:47 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/HartmannPT99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/Takagi98,
  author       = {Tsuyoshi Takagi},
  editor       = {Hugo Krawczyk},
  title        = {Fast RSA-Type Cryptosystem Modulo p\({}^{\mbox{k}}\)q},
  booktitle    = {Advances in Cryptology - {CRYPTO} '98, 18th Annual International Cryptology
                  Conference, Santa Barbara, California, USA, August 23-27, 1998, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1462},
  pages        = {318--326},
  publisher    = {Springer},
  year         = {1998},
  url          = {https://doi.org/10.1007/BFb0055738},
  doi          = {10.1007/BFB0055738},
  timestamp    = {Tue, 01 Jun 2021 15:21:29 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/Takagi98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/HuhnleinJPT98,
  author       = {Detlef H{\"{u}}hnlein and
                  Michael J. Jacobson Jr. and
                  Sachar Paulus and
                  Tsuyoshi Takagi},
  editor       = {Kaisa Nyberg},
  title        = {A Cryptosystem Based on Non-maximal Imaginary Quadratic Orders with
                  Fast Decryption},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} '98, International Conference
                  on the Theory and Application of Cryptographic Techniques, Espoo,
                  Finland, May 31 - June 4, 1998, Proceeding},
  series       = {Lecture Notes in Computer Science},
  volume       = {1403},
  pages        = {294--307},
  publisher    = {Springer},
  year         = {1998},
  url          = {https://doi.org/10.1007/BFb0054134},
  doi          = {10.1007/BFB0054134},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/HuhnleinJPT98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icisc/PaulusT98,
  author       = {Sachar Paulus and
                  Tsuyoshi Takagi},
  title        = {A generalization of the Diffie-Hellman problem and related cryptosystems
                  allowing fast decryption},
  booktitle    = {The 1st International Conference on Information Security and Cryptology,
                  {ICSCI} '98, December 18-19, 1998, Seoul, Korea, Proceedings},
  pages        = {211--220},
  publisher    = {Korea Institute of Information Security and Cryptology {(KIISC)}},
  year         = {1998},
  timestamp    = {Fri, 11 Jan 2002 12:38:44 +0100},
  biburl       = {https://dblp.org/rec/conf/icisc/PaulusT98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icisc/HuehnleinMT98,
  author       = {Detlef H{\"{u}}hnlein and
                  Andreas Meyer and
                  Tsuyoshi Takagi},
  title        = {Rabin and {RSA} analogues based on non-maximal imaginary quadratic
                  orders},
  booktitle    = {The 1st International Conference on Information Security and Cryptology,
                  {ICSCI} '98, December 18-19, 1998, Seoul, Korea, Proceedings},
  pages        = {221--240},
  publisher    = {Korea Institute of Information Security and Cryptology {(KIISC)}},
  year         = {1998},
  timestamp    = {Thu, 12 Sep 2013 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icisc/HuehnleinMT98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/Takagi97,
  author       = {Tsuyoshi Takagi},
  editor       = {Burton S. Kaliski Jr.},
  title        = {Fast RSA-Type Cryptosystems Using N-Adic Expansion},
  booktitle    = {Advances in Cryptology - {CRYPTO} '97, 17th Annual International Cryptology
                  Conference, Santa Barbara, California, USA, August 17-21, 1997, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1294},
  pages        = {372--384},
  publisher    = {Springer},
  year         = {1997},
  url          = {https://doi.org/10.1007/BFb0052249},
  doi          = {10.1007/BFB0052249},
  timestamp    = {Tue, 14 May 2019 10:00:48 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/Takagi97.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isaac/TakagiN96,
  author       = {Tsuyoshi Takagi and
                  Shozo Naito},
  editor       = {Tetsuo Asano and
                  Yoshihide Igarashi and
                  Hiroshi Nagamochi and
                  Satoru Miyano and
                  Subhash Suri},
  title        = {The Multi-variable Modular Polynomial and Its Applications to Cryptography},
  booktitle    = {Algorithms and Computation, 7th International Symposium, {ISAAC} '96,
                  Osaka, Japan, December 16-18, 1996, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1178},
  pages        = {386--396},
  publisher    = {Springer},
  year         = {1996},
  url          = {https://doi.org/10.1007/BFb0009515},
  doi          = {10.1007/BFB0009515},
  timestamp    = {Tue, 14 May 2019 10:00:50 +0200},
  biburl       = {https://dblp.org/rec/conf/isaac/TakagiN96.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics