Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: Tsuyoshi Takagi
@article{DBLP:journals/iacr/OkadaT24, author = {Hiroki Okada and Tsuyoshi Takagi}, title = {Simulation-Secure Threshold {PKE} from Standard (Ring-)LWE}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {239}, year = {2024}, url = {https://eprint.iacr.org/2024/239}, timestamp = {Mon, 18 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/OkadaT24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KajitaOT24, author = {Kaisei Kajita and Go Ohtake and Tsuyoshi Takagi}, title = {Generalized Adaptor Signature Scheme: From Two-Party to N-Party Settings}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {241}, year = {2024}, url = {https://eprint.iacr.org/2024/241}, timestamp = {Mon, 18 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/KajitaOT24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dam/NakagawaOTT23, author = {Kohei Nakagawa and Hiroshi Onuki and Atsushi Takayasu and Tsuyoshi Takagi}, title = {L1-norm ball for {CSIDH:} Optimal strategy for choosing the secret key space}, journal = {Discret. Appl. Math.}, volume = {328}, pages = {70--88}, year = {2023}, url = {https://doi.org/10.1016/j.dam.2022.12.002}, doi = {10.1016/J.DAM.2022.12.002}, timestamp = {Tue, 28 Mar 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dam/NakagawaOTT23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ffa/MoriyaOT23, author = {Tomoki Moriya and Hiroshi Onuki and Tsuyoshi Takagi}, title = {How to construct {CSIDH} on Edwards curves}, journal = {Finite Fields Their Appl.}, volume = {92}, pages = {102310}, year = {2023}, url = {https://doi.org/10.1016/j.ffa.2023.102310}, doi = {10.1016/J.FFA.2023.102310}, timestamp = {Sun, 10 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ffa/MoriyaOT23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieiceta/KajitaOONT23, author = {Kaisei Kajita and Go Ohtake and Kazuto Ogawa and Koji Nuida and Tsuyoshi Takagi}, title = {Short Lattice Signature Scheme with Tighter Reduction under Ring-SIS Assumption}, journal = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.}, volume = {106}, number = {3}, pages = {228--240}, year = {2023}, url = {https://doi.org/10.1587/transfun.2022cip0017}, doi = {10.1587/TRANSFUN.2022CIP0017}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieiceta/KajitaOONT23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iet-ifs/IkematsuNT23, author = {Yasuhiko Ikematsu and Shuhei Nakamura and Tsuyoshi Takagi}, title = {Recent progress in the security evaluation of multivariate public-key cryptography}, journal = {{IET} Inf. Secur.}, volume = {17}, number = {2}, pages = {210--226}, year = {2023}, url = {https://doi.org/10.1049/ise2.12092}, doi = {10.1049/ISE2.12092}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iet-ifs/IkematsuNT23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jsiaml/OtsukiOT23, author = {Saki Otsuki and Hiroshi Onuki and Tsuyoshi Takagi}, title = {Improvement of the square-root V{\'{e}}lu's formulas for isogeny-based cryptography}, journal = {{JSIAM} Lett.}, volume = {15}, pages = {61--64}, year = {2023}, url = {https://doi.org/10.14495/jsiaml.15.61}, doi = {10.14495/JSIAML.15.61}, timestamp = {Tue, 02 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jsiaml/OtsukiOT23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/mics/KudoNT23, author = {Momonari Kudo and Tasuku Nakagawa and Tsuyoshi Takagi}, title = {Efficient Search for Superspecial Hyperelliptic Curves of Genus Four with Automorphism Group Containing bfC\({}_{\mbox{6}}\)}, journal = {Math. Comput. Sci.}, volume = {17}, number = {3}, pages = {21}, year = {2023}, url = {https://doi.org/10.1007/s11786-023-00571-w}, doi = {10.1007/S11786-023-00571-W}, timestamp = {Wed, 01 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/mics/KudoNT23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/mics/KudoNT23a, author = {Momonari Kudo and Tasuku Nakagawa and Tsuyoshi Takagi}, title = {Correction to: Efficient Search for Superspecial Hyperelliptic Curves of Genus Four with Automorphism Group Containing bfC\({}_{\mbox{6}}\)}, journal = {Math. Comput. Sci.}, volume = {17}, number = {3}, pages = {23}, year = {2023}, url = {https://doi.org/10.1007/s11786-023-00573-8}, doi = {10.1007/S11786-023-00573-8}, timestamp = {Fri, 08 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/mics/KudoNT23a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/KimuraTT23, author = {Naoto Kimura and Atsushi Takayasu and Tsuyoshi Takagi}, editor = {Leonie Simpson and Mir Ali Rezazadeh Baee}, title = {Memory-Efficient Quantum Information Set Decoding Algorithm}, booktitle = {Information Security and Privacy - 28th Australasian Conference, {ACISP} 2023, Brisbane, QLD, Australia, July 5-7, 2023, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {13915}, pages = {452--468}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-35486-1\_20}, doi = {10.1007/978-3-031-35486-1\_20}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/KimuraTT23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acns/OkadaFKT23, author = {Hiroki Okada and Kazuhide Fukushima and Shinsaku Kiyomoto and Tsuyoshi Takagi}, editor = {Mehdi Tibouchi and Xiaofeng Wang}, title = {Spherical Gaussian Leftover Hash Lemma via the R{\'{e}}nyi Divergence}, booktitle = {Applied Cryptography and Network Security - 21st International Conference, {ACNS} 2023, Kyoto, Japan, June 19-22, 2023, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {13905}, pages = {695--724}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-33488-7\_26}, doi = {10.1007/978-3-031-33488-7\_26}, timestamp = {Wed, 26 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acns/OkadaFKT23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isw/LiuLT23, author = {Keyang Liu and Xingxin Li and Tsuyoshi Takagi}, editor = {Elias Athanasopoulos and Bart Mennink}, title = {Robust Property-Preserving Hash Meets Homomorphism}, booktitle = {Information Security - 26th International Conference, {ISC} 2023, Groningen, The Netherlands, November 15-17, 2023, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {14411}, pages = {537--556}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-49187-0\_27}, doi = {10.1007/978-3-031-49187-0\_27}, timestamp = {Sun, 10 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/isw/LiuLT23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/ZhuKKT23, author = {Haiming Zhu and Shoichi Kamada and Momonari Kudo and Tsuyoshi Takagi}, editor = {Junji Shikata and Hiroki Kuzuno}, title = {Improved Hybrid Attack via Error-Splitting Method for Finding Quinary Short Lattice Vectors}, booktitle = {Advances in Information and Computer Security - 18th International Workshop on Security, {IWSEC} 2023, Yokohama, Japan, August 29-31, 2023, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {14128}, pages = {117--136}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-41326-1\_7}, doi = {10.1007/978-3-031-41326-1\_7}, timestamp = {Fri, 25 Aug 2023 19:50:15 +0200}, biburl = {https://dblp.org/rec/conf/iwsec/ZhuKKT23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pqcrypto/FurueT23, author = {Hiroki Furue and Tsuyoshi Takagi}, editor = {Thomas Johansson and Daniel Smith{-}Tone}, title = {Fast Enumeration Algorithm for Multivariate Polynomials over General Finite Fields}, booktitle = {Post-Quantum Cryptography - 14th International Workshop, PQCrypto 2023, College Park, MD, USA, August 16-18, 2023, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {14154}, pages = {357--378}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-40003-2\_13}, doi = {10.1007/978-3-031-40003-2\_13}, timestamp = {Mon, 14 Aug 2023 16:42:49 +0200}, biburl = {https://dblp.org/rec/conf/pqcrypto/FurueT23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/OkadaFKT23, author = {Hiroki Okada and Kazuhide Fukushima and Shinsaku Kiyomoto and Tsuyoshi Takagi}, title = {Spherical Gaussian Leftover Hash Lemma via the R{\'{e}}nyi Divergence}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {479}, year = {2023}, url = {https://eprint.iacr.org/2023/479}, timestamp = {Wed, 26 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/OkadaFKT23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/FurueT23, author = {Hiroki Furue and Tsuyoshi Takagi}, title = {Fast Enumeration Algorithm for Multivariate Polynomials over General Finite Fields}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {619}, year = {2023}, url = {https://eprint.iacr.org/2023/619}, timestamp = {Mon, 05 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/FurueT23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/MoriyaOAT23, author = {Tomoki Moriya and Hiroshi Onuki and Yusuke Aikawa and Tsuyoshi Takagi}, title = {Lower bound of costs of formulas to compute image curves of 3-isogenies in the framework of generalized Montgomery coordinates}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1511}, year = {2023}, url = {https://eprint.iacr.org/2023/1511}, timestamp = {Thu, 09 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/MoriyaOAT23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/SakataT23, author = {Kosuke Sakata and Tsuyoshi Takagi}, title = {An Efficient Algorithm for Solving the {MQ} Problem using Hilbert Series}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1650}, year = {2023}, url = {https://eprint.iacr.org/2023/1650}, timestamp = {Thu, 09 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/SakataT23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieiceta/OkadaTFKT22, author = {Hiroki Okada and Atsushi Takayasu and Kazuhide Fukushima and Shinsaku Kiyomoto and Tsuyoshi Takagi}, title = {Erratum: {A} Compact Digital Signature Scheme Based on the Module-LWR Problem {[IEICE} Transactions on Fundamentals of Electronics, Communications and Computer Sciences Vol. {E104.A} (2021), No. 9 pp.1219-1234]}, journal = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.}, volume = {105-A}, number = {2}, pages = {130}, year = {2022}, url = {https://doi.org/10.1587/transfun.2022eae0001}, doi = {10.1587/TRANSFUN.2022EAE0001}, timestamp = {Wed, 26 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieiceta/OkadaTFKT22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieiceta/YuWXT22, author = {Xiaoling Yu and Yuntao Wang and Chungen Xu and Tsuyoshi Takagi}, title = {Revisiting the Orthogonal Lattice Algorithm in Solving General Approximate Common Divisor Problem}, journal = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.}, volume = {105-A}, number = {3}, pages = {195--202}, year = {2022}, url = {https://doi.org/10.1587/transfun.2021cip0021}, doi = {10.1587/TRANSFUN.2021CIP0021}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieiceta/YuWXT22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jsiaml/TakahashiOT22, author = {Shu Takahashi and Hiroshi Onuki and Tsuyoshi Takagi}, title = {Explicit construction of the square-root V{\'{e}}lu's formula on Edwards curves}, journal = {{JSIAM} Lett.}, volume = {14}, pages = {108--110}, year = {2022}, url = {https://doi.org/10.14495/jsiaml.14.108}, doi = {10.14495/JSIAML.14.108}, timestamp = {Wed, 24 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jsiaml/TakahashiOT22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/arith/AokiMOT22, author = {Daichi Aoki and Kazuhiko Minematsu and Toshihiko Okamura and Tsuyoshi Takagi}, title = {Efficient Word Size Modular Multiplication over Signed Integers}, booktitle = {29th {IEEE} Symposium on Computer Arithmetic, {ARITH} 2022, Lyon, France, September 12-14, 2022}, pages = {94--101}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/ARITH54963.2022.00026}, doi = {10.1109/ARITH54963.2022.00026}, timestamp = {Thu, 29 Dec 2022 15:06:50 +0100}, biburl = {https://dblp.org/rec/conf/arith/AokiMOT22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/KatoKT22, author = {Taku Kato and Yutaro Kiyomura and Tsuyoshi Takagi}, editor = {Chen{-}Mou Cheng and Mitsuaki Akiyama}, title = {Improving Fault Attacks on Rainbow with Fixing Random Vinegar Values}, booktitle = {Advances in Information and Computer Security - 17th International Workshop on Security, {IWSEC} 2022, Tokyo, Japan, August 31 - September 2, 2022, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {13504}, pages = {147--165}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-15255-9\_8}, doi = {10.1007/978-3-031-15255-9\_8}, timestamp = {Thu, 18 Aug 2022 14:32:38 +0200}, biburl = {https://dblp.org/rec/conf/iwsec/KatoKT22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pqcrypto/FurueKNT22, author = {Hiroki Furue and Yutaro Kiyomura and Tatsuya Nagasawa and Tsuyoshi Takagi}, editor = {Jung Hee Cheon and Thomas Johansson}, title = {A New Fault Attack on {UOV} Multivariate Signature Scheme}, booktitle = {Post-Quantum Cryptography - 13th International Workshop, PQCrypto 2022, Virtual Event, September 28-30, 2022, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {13512}, pages = {124--143}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-17234-2\_7}, doi = {10.1007/978-3-031-17234-2\_7}, timestamp = {Sun, 12 Nov 2023 02:15:49 +0100}, biburl = {https://dblp.org/rec/conf/pqcrypto/FurueKNT22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/MoriyaOAT22, author = {Tomoki Moriya and Hiroshi Onuki and Yusuke Aikawa and Tsuyoshi Takagi}, title = {The Generalized Montgomery Coordinate: {A} New Computational Tool for Isogeny-based Cryptography}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {150}, year = {2022}, url = {https://eprint.iacr.org/2022/150}, timestamp = {Tue, 22 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/MoriyaOAT22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KajitaOONT22, author = {Kaisei Kajita and Go Ohtake and Kazuto Ogawa and Koji Nuida and Tsuyoshi Takagi}, title = {Short Lattice Signature Scheme with Tighter Reduction under Ring-SIS Assumption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {479}, year = {2022}, url = {https://eprint.iacr.org/2022/479}, timestamp = {Mon, 16 May 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KajitaOONT22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieiceta/OkadaTFKT21, author = {Hiroki Okada and Atsushi Takayasu and Kazuhide Fukushima and Shinsaku Kiyomoto and Tsuyoshi Takagi}, title = {A Compact Digital Signature Scheme Based on the Module-LWR Problem}, journal = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.}, volume = {104-A}, number = {9}, pages = {1219--1234}, year = {2021}, url = {https://doi.org/10.1587/transfun.2020dmp0012}, doi = {10.1587/TRANSFUN.2020DMP0012}, timestamp = {Wed, 26 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieiceta/OkadaTFKT21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iet-ifs/0005FXKT21, author = {Ye Yuan and Kazuhide Fukushima and Junting Xiao and Shinsaku Kiyomoto and Tsuyoshi Takagi}, title = {Memory-constrained implementation of lattice-based encryption scheme on standard Java Card platform}, journal = {{IET} Inf. Secur.}, volume = {15}, number = {4}, pages = {267--281}, year = {2021}, url = {https://doi.org/10.1049/ise2.12012}, doi = {10.1049/ISE2.12012}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iet-ifs/0005FXKT21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijisec/WangT21, author = {Yuntao Wang and Tsuyoshi Takagi}, title = {Studying lattice reduction algorithms improved by quick reordering technique}, journal = {Int. J. Inf. Sec.}, volume = {20}, number = {2}, pages = {257--268}, year = {2021}, url = {https://doi.org/10.1007/s10207-020-00501-y}, doi = {10.1007/S10207-020-00501-Y}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijisec/WangT21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcs/NakamuraIWDT21, author = {Shuhei Nakamura and Yasuhiko Ikematsu and Yacheng Wang and Jintai Ding and Tsuyoshi Takagi}, title = {New complexity estimation on the Rainbow-Band-Separation attack}, journal = {Theor. Comput. Sci.}, volume = {896}, pages = {1--18}, year = {2021}, url = {https://doi.org/10.1016/j.tcs.2021.09.043}, doi = {10.1016/J.TCS.2021.09.043}, timestamp = {Fri, 12 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tcs/NakamuraIWDT21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/FurueIKT21, author = {Hiroki Furue and Yasuhiko Ikematsu and Yutaro Kiyomura and Tsuyoshi Takagi}, editor = {Mehdi Tibouchi and Huaxiong Wang}, title = {A New Variant of Unbalanced Oil and Vinegar Using Quotient Ring: {QR-UOV}}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2021 - 27th International Conference on the Theory and Application of Cryptology and Information Security, Singapore, December 6-10, 2021, Proceedings, Part {IV}}, series = {Lecture Notes in Computer Science}, volume = {13093}, pages = {187--217}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-92068-5\_7}, doi = {10.1007/978-3-030-92068-5\_7}, timestamp = {Fri, 03 Dec 2021 17:36:41 +0100}, biburl = {https://dblp.org/rec/conf/asiacrypt/FurueIKT21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/UemuraFKKT21, author = {Shusaku Uemura and Kazuhide Fukushima and Shinsaku Kiyomoto and Momonari Kudo and Tsuyoshi Takagi}, editor = {Toru Nakanishi and Ryo Nojima}, title = {Shortest Vectors in Lattices of Bai-Galbraith's Embedding Attack on the {LWR} Problem}, booktitle = {Advances in Information and Computer Security - 16th International Workshop on Security, {IWSEC} 2021, Virtual Event, September 8-10, 2021, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {12835}, pages = {23--41}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-85987-9\_2}, doi = {10.1007/978-3-030-85987-9\_2}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iwsec/UemuraFKKT21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/YinWT21, author = {Changze Yin and Yacheng Wang and Tsuyoshi Takagi}, editor = {Toru Nakanishi and Ryo Nojima}, title = {(Short Paper) Simple Matrix Signature Scheme}, booktitle = {Advances in Information and Computer Security - 16th International Workshop on Security, {IWSEC} 2021, Virtual Event, September 8-10, 2021, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {12835}, pages = {227--237}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-85987-9\_13}, doi = {10.1007/978-3-030-85987-9\_13}, timestamp = {Fri, 03 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iwsec/YinWT21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pqcrypto/FurueNT21, author = {Hiroki Furue and Shuhei Nakamura and Tsuyoshi Takagi}, editor = {Jung Hee Cheon and Jean{-}Pierre Tillich}, title = {Improving Thomae-Wolf Algorithm for Solving Underdetermined Multivariate Quadratic Polynomial Problem}, booktitle = {Post-Quantum Cryptography - 12th International Workshop, PQCrypto 2021, Daejeon, South Korea, July 20-22, 2021, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {12841}, pages = {65--78}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-81293-5\_4}, doi = {10.1007/978-3-030-81293-5\_4}, timestamp = {Wed, 21 Jul 2021 15:51:05 +0200}, biburl = {https://dblp.org/rec/conf/pqcrypto/FurueNT21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/OkadaTFKT21, author = {Hiroki Okada and Atsushi Takayasu and Kazuhide Fukushima and Shinsaku Kiyomoto and Tsuyoshi Takagi}, title = {A Compact Digital Signature Scheme Based on the Module-LWR problem}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1699}, year = {2021}, url = {https://eprint.iacr.org/2021/1699}, timestamp = {Wed, 26 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/OkadaTFKT21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/OkadaTFKT20, author = {Hiroki Okada and Atsushi Takayasu and Kazuhide Fukushima and Shinsaku Kiyomoto and Tsuyoshi Takagi}, title = {On the Complexity of the LWR-Solving {BKW} Algorithm}, journal = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.}, volume = {103-A}, number = {1}, pages = {173--182}, year = {2020}, url = {http://search.ieice.org/bin/summary.php?id=e103-a\_1\_173}, doi = {10.1587/TRANSFUN.2019CIP0022}, timestamp = {Wed, 26 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieicet/OkadaTFKT20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieiceta/OnukiAYT20, author = {Hiroshi Onuki and Yusuke Aikawa and Tsutomu Yamazaki and Tsuyoshi Takagi}, title = {A Constant-Time Algorithm of {CSIDH} Keeping Two Points}, journal = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.}, volume = {103-A}, number = {10}, pages = {1174--1182}, year = {2020}, url = {https://doi.org/10.1587/transfun.2019DMP0008}, doi = {10.1587/TRANSFUN.2019DMP0008}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieiceta/OnukiAYT20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnc/FurueDT20, author = {Hiroki Furue and Dung Hoang Duong and Tsuyoshi Takagi}, title = {An Efficient MQ-based Signature with Tight Security Proof}, journal = {Int. J. Netw. Comput.}, volume = {10}, number = {2}, pages = {308--324}, year = {2020}, url = {http://www.ijnc.org/index.php/ijnc/article/view/238}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijnc/FurueDT20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/Okada0T20, author = {Satoshi Okada and Yuntao Wang and Tsuyoshi Takagi}, editor = {Joseph K. Liu and Hui Cui}, title = {Improving Key Mismatch Attack on NewHope with Fewer Queries}, booktitle = {Information Security and Privacy - 25th Australasian Conference, {ACISP} 2020, Perth, WA, Australia, November 30 - December 2, 2020, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {12248}, pages = {505--524}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-55304-3\_26}, doi = {10.1007/978-3-030-55304-3\_26}, timestamp = {Wed, 17 Aug 2022 14:32:12 +0200}, biburl = {https://dblp.org/rec/conf/acisp/Okada0T20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/MoriyaOT20, author = {Tomoki Moriya and Hiroshi Onuki and Tsuyoshi Takagi}, editor = {Shiho Moriai and Huaxiong Wang}, title = {SiGamal: {A} Supersingular Isogeny-Based {PKE} and Its Application to a {PRF}}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2020 - 26th International Conference on the Theory and Application of Cryptology and Information Security, Daejeon, South Korea, December 7-11, 2020, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {12492}, pages = {551--580}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-64834-3\_19}, doi = {10.1007/978-3-030-64834-3\_19}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/asiacrypt/MoriyaOT20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/WangIAT20, author = {Yuntao Wang and Yasuhiko Ikematsu and Koichiro Akiyama and Tsuyoshi Takagi}, editor = {Keita Emura and Naoto Yanai}, title = {Cryptanalysis of GiophantusTM Schemes against Hybrid Attack}, booktitle = {Proceedings of the 7th on {ASIA} Public-Key Cryptography Workshop, APKC@AsiaCCS 2020, Taipei, Taiwan, October 6, 2020}, pages = {28--35}, publisher = {{ACM}}, year = {2020}, url = {https://doi.org/10.1145/3384940.3388958}, doi = {10.1145/3384940.3388958}, timestamp = {Tue, 29 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/WangIAT20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ctrsa/MoriyaOT20, author = {Tomoki Moriya and Hiroshi Onuki and Tsuyoshi Takagi}, editor = {Stanislaw Jarecki}, title = {How to Construct {CSIDH} on Edwards Curves}, booktitle = {Topics in Cryptology - {CT-RSA} 2020 - The Cryptographers' Track at the {RSA} Conference 2020, San Francisco, CA, USA, February 24-28, 2020, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {12006}, pages = {512--537}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-40186-3\_22}, doi = {10.1007/978-3-030-40186-3\_22}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ctrsa/MoriyaOT20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icics/OkadaTFKT20, author = {Hiroki Okada and Atsushi Takayasu and Kazuhide Fukushima and Shinsaku Kiyomoto and Tsuyoshi Takagi}, editor = {Weizhi Meng and Dieter Gollmann and Christian Damsgaard Jensen and Jianying Zhou}, title = {A Compact Digital Signature Scheme Based on the Module-LWR Problem}, booktitle = {Information and Communications Security - 22nd International Conference, {ICICS} 2020, Copenhagen, Denmark, August 24-26, 2020, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {12282}, pages = {73--90}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-61078-4\_5}, doi = {10.1007/978-3-030-61078-4\_5}, timestamp = {Wed, 26 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icics/OkadaTFKT20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icisc/KawashimaTAT20, author = {Tomoki Kawashima and Katsuyuki Takashima and Yusuke Aikawa and Tsuyoshi Takagi}, editor = {Deukjo Hong}, title = {An Efficient Authenticated Key Exchange from Random Self-reducibility on {CSIDH}}, booktitle = {Information Security and Cryptology - {ICISC} 2020 - 23rd International Conference, Seoul, South Korea, December 2-4, 2020, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {12593}, pages = {58--84}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-68890-5\_4}, doi = {10.1007/978-3-030-68890-5\_4}, timestamp = {Thu, 11 Feb 2021 16:04:17 +0100}, biburl = {https://dblp.org/rec/conf/icisc/KawashimaTAT20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isita/OnukiAT20, author = {Hiroshi Onuki and Yusuke Aikawa and Tsuyoshi Takagi}, title = {The Existence of Cycles in the Supersingular Isogeny Graphs Used in {SIKE}}, booktitle = {International Symposium on Information Theory and Its Applications, {ISITA} 2020, Kapolei, HI, USA, October 24-27, 2020}, pages = {358--362}, publisher = {{IEEE}}, year = {2020}, url = {https://ieeexplore.ieee.org/document/9366119}, timestamp = {Mon, 22 Mar 2021 15:48:59 +0100}, biburl = {https://dblp.org/rec/conf/isita/OnukiAT20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/OnukiT20, author = {Hiroshi Onuki and Tsuyoshi Takagi}, editor = {Kazumaro Aoki and Akira Kanaoka}, title = {On Collisions Related to an Ideal Class of Order 3 in {CSIDH}}, booktitle = {Advances in Information and Computer Security - 15th International Workshop on Security, {IWSEC} 2020, Fukui, Japan, September 2-4, 2020, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {12231}, pages = {131--148}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-58208-1\_8}, doi = {10.1007/978-3-030-58208-1\_8}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iwsec/OnukiT20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pqcrypto/FurueKIWT20, author = {Hiroki Furue and Koha Kinjo and Yasuhiko Ikematsu and Yacheng Wang and Tsuyoshi Takagi}, editor = {Jintai Ding and Jean{-}Pierre Tillich}, title = {A Structural Attack on Block-Anti-Circulant {UOV} at {SAC} 2019}, booktitle = {Post-Quantum Cryptography - 11th International Conference, PQCrypto 2020, Paris, France, April 15-17, 2020, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {12100}, pages = {323--339}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-44223-1\_18}, doi = {10.1007/978-3-030-44223-1\_18}, timestamp = {Wed, 15 Apr 2020 17:34:50 +0200}, biburl = {https://dblp.org/rec/conf/pqcrypto/FurueKIWT20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pqcrypto/YasudaWT20, author = {Takanori Yasuda and Yacheng Wang and Tsuyoshi Takagi}, editor = {Jintai Ding and Jean{-}Pierre Tillich}, title = {Multivariate Encryption Schemes Based on Polynomial Equations over Real Numbers}, booktitle = {Post-Quantum Cryptography - 11th International Conference, PQCrypto 2020, Paris, France, April 15-17, 2020, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {12100}, pages = {402--421}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-44223-1\_22}, doi = {10.1007/978-3-030-44223-1\_22}, timestamp = {Wed, 15 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pqcrypto/YasudaWT20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/provsec/KajitaONT20, author = {Kaisei Kajita and Kazuto Ogawa and Koji Nuida and Tsuyoshi Takagi}, editor = {Khoa Nguyen and Wenling Wu and Kwok{-}Yan Lam and Huaxiong Wang}, title = {Short Lattice Signatures in the Standard Model with Efficient Tag Generation}, booktitle = {Provable and Practical Security - 14th International Conference, ProvSec 2020, Singapore, November 29 - December 1, 2020, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {12505}, pages = {85--102}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-62576-4\_5}, doi = {10.1007/978-3-030-62576-4\_5}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/provsec/KajitaONT20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/WangINT20, author = {Yacheng Wang and Yasuhiko Ikematsu and Shuhei Nakamura and Tsuyoshi Takagi}, editor = {Ilsun You}, title = {Revisiting the Minrank Problem on Multivariate Cryptography}, booktitle = {Information Security Applications - 21st International Conference, {WISA} 2020, Jeju Island, South Korea, August 26-28, 2020, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {12583}, pages = {291--307}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-65299-9\_22}, doi = {10.1007/978-3-030-65299-9\_22}, timestamp = {Sat, 12 Dec 2020 14:20:23 +0100}, biburl = {https://dblp.org/rec/conf/wisa/WangINT20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/NakagawaOTT20, author = {Kohei Nakagawa and Hiroshi Onuki and Atsushi Takayasu and Tsuyoshi Takagi}, title = {L\({}_{\mbox{1}}\)-Norm Ball for {CSIDH:} Optimal Strategy for Choosing the Secret Key Space}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {181}, year = {2020}, url = {https://eprint.iacr.org/2020/181}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/NakagawaOTT20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/OnukiAT20, author = {Hiroshi Onuki and Yusuke Aikawa and Tsuyoshi Takagi}, title = {The Existence of Cycles in the Supersingular Isogeny Graphs Used in {SIKE}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {439}, year = {2020}, url = {https://eprint.iacr.org/2020/439}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/OnukiAT20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/OkadaWT20, author = {Satoshi Okada and Yuntao Wang and Tsuyoshi Takagi}, title = {Improving Key Mismatch Attack on NewHope with Fewer Queries}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {585}, year = {2020}, url = {https://eprint.iacr.org/2020/585}, timestamp = {Wed, 27 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/OkadaWT20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/MoriyaOT20, author = {Tomoki Moriya and Hiroshi Onuki and Tsuyoshi Takagi}, title = {SiGamal: {A} supersingular isogeny-based {PKE} and its application to a {PRF}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {613}, year = {2020}, url = {https://eprint.iacr.org/2020/613}, timestamp = {Tue, 30 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/MoriyaOT20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/NakamuraIWDT20, author = {Shuhei Nakamura and Yasuhiko Ikematsu and Yacheng Wang and Jintai Ding and Tsuyoshi Takagi}, title = {New Complexity Estimation on the Rainbow-Band-Separation Attack}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {703}, year = {2020}, url = {https://eprint.iacr.org/2020/703}, timestamp = {Tue, 30 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/NakamuraIWDT20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KawashimaTAT20, author = {Tomoki Kawashima and Katsuyuki Takashima and Yusuke Aikawa and Tsuyoshi Takagi}, title = {An Efficient Authenticated Key Exchange from Random Self-Reducibility on {CSIDH}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1178}, year = {2020}, url = {https://eprint.iacr.org/2020/1178}, timestamp = {Fri, 30 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/KawashimaTAT20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/FurueIKT20, author = {Hiroki Furue and Yasuhiko Ikematsu and Yutaro Kiyomura and Tsuyoshi Takagi}, title = {A New Variant of Unbalanced Oil and Vinegar Using Quotient Ring: {QR-UOV}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1243}, year = {2020}, url = {https://eprint.iacr.org/2020/1243}, timestamp = {Fri, 30 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/FurueIKT20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/WangIDT19, author = {Yacheng Wang and Yasuhiko Ikematsu and Dung Hoang Duong and Tsuyoshi Takagi}, title = {The Secure Parameters and Efficient Decryption Algorithm for Multivariate Public Key Cryptosystem {EFC}}, journal = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.}, volume = {102-A}, number = {9}, pages = {1028--1036}, year = {2019}, url = {https://doi.org/10.1587/transfun.E102.A.1028}, doi = {10.1587/TRANSFUN.E102.A.1028}, timestamp = {Thu, 21 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieicet/WangIDT19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/MatsudaTT19, author = {Kotaro Matsuda and Atsushi Takayasu and Tsuyoshi Takagi}, title = {Explicit Relation between Low-Dimensional LLL-Reduced Bases and Shortest Vectors}, journal = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.}, volume = {102-A}, number = {9}, pages = {1091--1100}, year = {2019}, url = {https://doi.org/10.1587/transfun.E102.A.1091}, doi = {10.1587/TRANSFUN.E102.A.1091}, timestamp = {Thu, 21 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieicet/MatsudaTT19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jip/HashimotoIT19, author = {Yasufumi Hashimoto and Yasuhiko Ikematsu and Tsuyoshi Takagi}, title = {Chosen Message Attack on Multivariate Signature {ELSA} at Asiacrypt 2017}, journal = {J. Inf. Process.}, volume = {27}, pages = {517--524}, year = {2019}, url = {https://doi.org/10.2197/ipsjjip.27.517}, doi = {10.2197/IPSJJIP.27.517}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jip/HashimotoIT19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tsg/ChengQLJT19, author = {Chi Cheng and Yue Qin and Rongxing Lu and Tao Jiang and Tsuyoshi Takagi}, title = {Batten Down the Hatches: Securing Neighborhood Area Networks of Smart Grid in the Quantum Era}, journal = {{IEEE} Trans. Smart Grid}, volume = {10}, number = {6}, pages = {6386--6395}, year = {2019}, url = {https://doi.org/10.1109/TSG.2019.2903836}, doi = {10.1109/TSG.2019.2903836}, timestamp = {Thu, 07 Nov 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tsg/ChengQLJT19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acns/DingGTW19, author = {Jintai Ding and Xinwei Gao and Tsuyoshi Takagi and Yuntao Wang}, editor = {Robert H. Deng and Val{\'{e}}rie Gauthier{-}Uma{\~{n}}a and Mart{\'{\i}}n Ochoa and Moti Yung}, title = {One Sample Ring-LWE with Rounding and Its Application to Key Exchange}, booktitle = {Applied Cryptography and Network Security - 17th International Conference, {ACNS} 2019, Bogota, Colombia, June 5-7, 2019, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11464}, pages = {323--343}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-21568-2\_16}, doi = {10.1007/978-3-030-21568-2\_16}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acns/DingGTW19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisc/MoriyaTT19, author = {Tomoki Moriya and Katsuyuki Takashima and Tsuyoshi Takagi}, editor = {Zhe Liu and Moti Yung}, title = {Group Key Exchange from {CSIDH} and Its Application to Trusted Setup in Supersingular Isogeny Cryptosystems}, booktitle = {Information Security and Cryptology - 15th International Conference, Inscrypt 2019, Nanjing, China, December 6-8, 2019, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {12020}, pages = {86--98}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-42921-8\_5}, doi = {10.1007/978-3-030-42921-8\_5}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cisc/MoriyaTT19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ctrsa/MizuideTT19, author = {Taiga Mizuide and Atsushi Takayasu and Tsuyoshi Takagi}, editor = {Mitsuru Matsui}, title = {Tight Reductions for Diffie-Hellman Variants in the Algebraic Group Model}, booktitle = {Topics in Cryptology - {CT-RSA} 2019 - The Cryptographers' Track at the {RSA} Conference 2019, San Francisco, CA, USA, March 4-8, 2019, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11405}, pages = {169--188}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-12612-4\_9}, doi = {10.1007/978-3-030-12612-4\_9}, timestamp = {Fri, 27 Dec 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ctrsa/MizuideTT19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ic-nc/FurueDT19, author = {Hiroki Furue and Dung Hoang Duong and Tsuyoshi Takagi}, title = {An Efficient MQ-Based Signature in the {QROM}}, booktitle = {2019 Seventh International Symposium on Computing and Networking, {CANDAR} 2019, Nagasaki, Japan, November 25-28, 2019}, pages = {10--17}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/CANDAR.2019.00010}, doi = {10.1109/CANDAR.2019.00010}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ic-nc/FurueDT19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icissp/0001MFKT19, author = {Partha Sarathi Roy and Kirill Morozov and Kazuhide Fukushima and Shinsaku Kiyomoto and Tsuyoshi Takagi}, editor = {Paolo Mori and Steven Furnell and Olivier Camp}, title = {Security Analysis and Efficient Implementation of Code-based Signature Schemes}, booktitle = {Proceedings of the 5th International Conference on Information Systems Security and Privacy, {ICISSP} 2019, Prague, Czech Republic, February 23-25, 2019}, pages = {213--220}, publisher = {SciTePress}, year = {2019}, url = {https://doi.org/10.5220/0007259102130220}, doi = {10.5220/0007259102130220}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icissp/0001MFKT19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/OnukiAYT19, author = {Hiroshi Onuki and Yusuke Aikawa and Tsutomu Yamazaki and Tsuyoshi Takagi}, editor = {Nuttapong Attrapadung and Takeshi Yagi}, title = {(Short Paper) {A} Faster Constant-Time Algorithm of {CSIDH} Keeping Two Points}, booktitle = {Advances in Information and Computer Security - 14th International Workshop on Security, {IWSEC} 2019, Tokyo, Japan, August 28-30, 2019, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11689}, pages = {23--33}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-26834-3\_2}, doi = {10.1007/978-3-030-26834-3\_2}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iwsec/OnukiAYT19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/OnukiAYT19, author = {Hiroshi Onuki and Yusuke Aikawa and Tsutomu Yamazaki and Tsuyoshi Takagi}, title = {A Faster Constant-time Algorithm of {CSIDH} keeping Two Torsion Points}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {353}, year = {2019}, url = {https://eprint.iacr.org/2019/353}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/OnukiAYT19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/MoriyaOT19, author = {Tomoki Moriya and Hiroshi Onuki and Tsuyoshi Takagi}, title = {How to Construct {CSIDH} on Edwards Curves}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {843}, year = {2019}, url = {https://eprint.iacr.org/2019/843}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/MoriyaOT19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DingKTW19, author = {Jintai Ding and Seungki Kim and Tsuyoshi Takagi and Yuntao Wang}, title = {{LLL} and stochastic sandpile models}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1009}, year = {2019}, url = {https://eprint.iacr.org/2019/1009}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DingKTW19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/OnukiT19, author = {Hiroshi Onuki and Tsuyoshi Takagi}, title = {On collisions related to an ideal class of order 3 in {CSIDH}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1209}, year = {2019}, url = {https://eprint.iacr.org/2019/1209}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/OnukiT19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/Takagi18, author = {Tsuyoshi Takagi}, title = {Recent Developments in Post-Quantum Cryptography}, journal = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.}, volume = {101-A}, number = {1}, pages = {3--11}, year = {2018}, url = {https://doi.org/10.1587/transfun.E101.A.3}, doi = {10.1587/TRANSFUN.E101.A.3}, timestamp = {Sat, 11 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieicet/Takagi18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/IkematsuDPT18, author = {Yasuhiko Ikematsu and Dung Hoang Duong and Albrecht Petzoldt and Tsuyoshi Takagi}, title = {An Efficient Key Generation of {ZHFE} Public Key Cryptosystem}, journal = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.}, volume = {101-A}, number = {1}, pages = {29--38}, year = {2018}, url = {https://doi.org/10.1587/transfun.E101.A.29}, doi = {10.1587/TRANSFUN.E101.A.29}, timestamp = {Mon, 26 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieicet/IkematsuDPT18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/WangAT18, author = {Yuntao Wang and Yoshinori Aono and Tsuyoshi Takagi}, title = {Hardness Evaluation for Search {LWE} Problem Using Progressive {BKZ} Simulator}, journal = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.}, volume = {101-A}, number = {12}, pages = {2162--2170}, year = {2018}, url = {https://doi.org/10.1587/transfun.E101.A.2162}, doi = {10.1587/TRANSFUN.E101.A.2162}, timestamp = {Tue, 29 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieicet/WangAT18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/YuanXFKT18, author = {Ye Yuan and Junting Xiao and Kazuhide Fukushima and Shinsaku Kiyomoto and Tsuyoshi Takagi}, title = {Portable Implementation of Postquantum Encryption Schemes and Key Exchange Protocols on JavaScript-Enabled Platforms}, journal = {Secur. Commun. Networks}, volume = {2018}, pages = {9846168:1--9846168:14}, year = {2018}, url = {https://doi.org/10.1155/2018/9846168}, doi = {10.1155/2018/9846168}, timestamp = {Mon, 26 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/scn/YuanXFKT18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/WangIDT18, author = {Yacheng Wang and Yasuhiko Ikematsu and Dung Hoang Duong and Tsuyoshi Takagi}, editor = {Willy Susilo and Guomin Yang}, title = {Efficient Decryption Algorithms for Extension Field Cancellation Type Encryption Schemes}, booktitle = {Information Security and Privacy - 23rd Australasian Conference, {ACISP} 2018, Wollongong, NSW, Australia, July 11-13, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10946}, pages = {487--501}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-93638-3\_28}, doi = {10.1007/978-3-319-93638-3\_28}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/WangIDT18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/WangT18, author = {Yuntao Wang and Tsuyoshi Takagi}, editor = {Willy Susilo and Guomin Yang}, title = {Improving the {BKZ} Reduction Algorithm by Quick Reordering Technique}, booktitle = {Information Security and Privacy - 23rd Australasian Conference, {ACISP} 2018, Wollongong, NSW, Australia, July 11-13, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10946}, pages = {787--795}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-93638-3\_47}, doi = {10.1007/978-3-319-93638-3\_47}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/WangT18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icisc/OkadaTFKT18, author = {Hiroki Okada and Atsushi Takayasu and Kazuhide Fukushima and Shinsaku Kiyomoto and Tsuyoshi Takagi}, editor = {Kwangsu Lee}, title = {On the Complexity of the LWR-Solving {BKW} Algorithm}, booktitle = {Information Security and Cryptology - {ICISC} 2018 - 21st International Conference, Seoul, South Korea, November 28-30, 2018, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {11396}, pages = {196--214}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-12146-4\_13}, doi = {10.1007/978-3-030-12146-4\_13}, timestamp = {Wed, 26 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icisc/OkadaTFKT18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isita/IkematsuAT18, author = {Yasuhiko Ikematsu and Koichiro Akiyama and Tsuyoshi Takagi}, title = {An Improvement on the Linear Algebraic Attack for the Indeterminate Equation Encryption Scheme}, booktitle = {International Symposium on Information Theory and Its Applications, {ISITA} 2018, Singapore, October 28-31, 2018}, pages = {389--393}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.23919/ISITA.2018.8664254}, doi = {10.23919/ISITA.2018.8664254}, timestamp = {Wed, 11 Aug 2021 11:51:25 +0200}, biburl = {https://dblp.org/rec/conf/isita/IkematsuAT18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/HashimotoIT18, author = {Yasufumi Hashimoto and Yasuhiko Ikematsu and Tsuyoshi Takagi}, editor = {Atsuo Inomata and Kan Yasuda}, title = {Chosen Message Attack on Multivariate Signature {ELSA} at Asiacrypt 2017}, booktitle = {Advances in Information and Computer Security - 13th International Workshop on Security, {IWSEC} 2018, Sendai, Japan, September 3-5, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11049}, pages = {3--18}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-97916-8\_1}, doi = {10.1007/978-3-319-97916-8\_1}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iwsec/HashimotoIT18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/WangWTT18, author = {Weiyao Wang and Yuntao Wang and Atsushi Takayasu and Tsuyoshi Takagi}, editor = {Atsuo Inomata and Kan Yasuda}, title = {Estimated Cost for Solving Generalized Learning with Errors Problem via Embedding Techniques}, booktitle = {Advances in Information and Computer Security - 13th International Workshop on Security, {IWSEC} 2018, Sendai, Japan, September 3-5, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11049}, pages = {87--103}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-97916-8\_6}, doi = {10.1007/978-3-319-97916-8\_6}, timestamp = {Tue, 17 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iwsec/WangWTT18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pqcrypto/IkematsuPSTV18, author = {Yasuhiko Ikematsu and Ray A. Perlner and Daniel Smith{-}Tone and Tsuyoshi Takagi and Jeremy Vates}, editor = {Tanja Lange and Rainer Steinwandt}, title = {{HFERP} - {A} New Multivariate Encryption Scheme}, booktitle = {Post-Quantum Cryptography - 9th International Conference, PQCrypto 2018, Fort Lauderdale, FL, USA, April 9-11, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10786}, pages = {396--416}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-79063-3\_19}, doi = {10.1007/978-3-319-79063-3\_19}, timestamp = {Tue, 14 May 2019 10:00:42 +0200}, biburl = {https://dblp.org/rec/conf/pqcrypto/IkematsuPSTV18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/fcs2/2018, editor = {Fagen Li and Tsuyoshi Takagi and Chunxiang Xu and Xiaosong Zhang}, title = {Frontiers in Cyber Security - First International Conference, {FCS} 2018, Chengdu, China, November 5-7, 2018, Proceedings}, series = {Communications in Computer and Information Science}, volume = {879}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-981-13-3095-7}, doi = {10.1007/978-981-13-3095-7}, isbn = {978-981-13-3094-0}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/fcs2/2018.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1804-03285, author = {Jintai Ding and Seungki Kim and Tsuyoshi Takagi and Yuntao Wang}, title = {Why 1.02? The root Hermite factor of {LLL} and stochastic sandpile models}, journal = {CoRR}, volume = {abs/1804.03285}, year = {2018}, url = {http://arxiv.org/abs/1804.03285}, eprinttype = {arXiv}, eprint = {1804.03285}, timestamp = {Fri, 06 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1804-03285.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/HashimotoIT18, author = {Yasufumi Hashimoto and Yasuhiko Ikematsu and Tsuyoshi Takagi}, title = {Chosen Message Attack on Multivariate Signature {ELSA} at Asiacrypt 2017}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {310}, year = {2018}, url = {https://eprint.iacr.org/2018/310}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/HashimotoIT18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/MizuideTT18, author = {Taiga Mizuide and Atsushi Takayasu and Tsuyoshi Takagi}, title = {Tight Reductions for Diffie-Hellman Variants in the Algebraic Group Model}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1220}, year = {2018}, url = {https://eprint.iacr.org/2018/1220}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/MizuideTT18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/YuanFXKT18, author = {Ye Yuan and Kazuhide Fukushima and Junting Xiao and Shinsaku Kiyomoto and Tsuyoshi Takagi}, title = {Memory-Constrained Implementation of Lattice-based Encryption Scheme on the Standard Java Card Platform}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1238}, year = {2018}, url = {https://eprint.iacr.org/2018/1238}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/YuanFXKT18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cm/ChengLPT17, author = {Chi Cheng and Rongxing Lu and Albrecht Petzoldt and Tsuyoshi Takagi}, title = {Securing the Internet of Things in a Quantum World}, journal = {{IEEE} Commun. Mag.}, volume = {55}, number = {2}, pages = {116--120}, year = {2017}, url = {https://doi.org/10.1109/MCOM.2017.1600522CM}, doi = {10.1109/MCOM.2017.1600522CM}, timestamp = {Tue, 25 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cm/ChengLPT17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/XuMYZT17, author = {Rui Xu and Kirill Morozov and Yanjiang Yang and Jianying Zhou and Tsuyoshi Takagi}, title = {Efficient outsourcing of secure k-nearest neighbour query over encrypted database}, journal = {Comput. Secur.}, volume = {69}, pages = {65--83}, year = {2017}, url = {https://doi.org/10.1016/j.cose.2016.11.012}, doi = {10.1016/J.COSE.2016.11.012}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/XuMYZT17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/XuMT17, author = {Rui Xu and Kirill Morozov and Tsuyoshi Takagi}, title = {Secret Sharing with Cheaters Using Multi-Receiver Authentication}, journal = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.}, volume = {100-A}, number = {1}, pages = {115--125}, year = {2017}, url = {https://doi.org/10.1587/transfun.E100.A.115}, doi = {10.1587/TRANSFUN.E100.A.115}, timestamp = {Sat, 11 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieicet/XuMT17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/JoPT17, author = {Hyungrok Jo and Christophe Petit and Tsuyoshi Takagi}, title = {Full Cryptanalysis of Hash Functions Based on Cubic Ramanujan Graphs}, journal = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.}, volume = {100-A}, number = {9}, pages = {1891--1899}, year = {2017}, url = {https://doi.org/10.1587/transfun.E100.A.1891}, doi = {10.1587/TRANSFUN.E100.A.1891}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieicet/JoPT17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/DuongPT17, author = {Dung Hoang Duong and Albrecht Petzoldt and Tsuyoshi Takagi}, title = {CyclicSRP - {A} Multivariate Encryption Scheme with a Partially Cyclic Public Key}, journal = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.}, volume = {100-A}, number = {12}, pages = {2691--2698}, year = {2017}, url = {https://doi.org/10.1587/transfun.E100.A.2691}, doi = {10.1587/TRANSFUN.E100.A.2691}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieicet/DuongPT17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jsiaml/TachibanaTT17, author = {Hikari Tachibana and Katsuyuki Takashima and Tsuyoshi Takagi}, title = {Constructing an efficient hash function from {\textdollar}3{\textdollar}-isogenies}, journal = {{JSIAM} Lett.}, volume = {9}, pages = {29--32}, year = {2017}, url = {https://doi.org/10.14495/jsiaml.9.29}, doi = {10.14495/JSIAML.9.29}, timestamp = {Wed, 17 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jsiaml/TachibanaTT17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acns/KiyomuraIKYTK17, author = {Yutaro Kiyomura and Akiko Inoue and Yuto Kawahara and Masaya Yasuda and Tsuyoshi Takagi and Tetsutaro Kobayashi}, editor = {Dieter Gollmann and Atsuko Miyaji and Hiroaki Kikuchi}, title = {Secure and Efficient Pairing at 256-Bit Security Level}, booktitle = {Applied Cryptography and Network Security - 15th International Conference, {ACNS} 2017, Kanazawa, Japan, July 10-12, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10355}, pages = {59--79}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-61204-1\_4}, doi = {10.1007/978-3-319-61204-1\_4}, timestamp = {Tue, 14 May 2019 10:00:54 +0200}, biburl = {https://dblp.org/rec/conf/acns/KiyomuraIKYTK17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acns/XuYFTSKH17, author = {Rui Xu and Sze Ling Yeo and Kazuhide Fukushima and Tsuyoshi Takagi and Hwajung Seo and Shinsaku Kiyomoto and Matt Henricksen}, editor = {Dieter Gollmann and Atsuko Miyaji and Hiroaki Kikuchi}, title = {An Experimental Study of the {BDD} Approach for the Search {LWE} Problem}, booktitle = {Applied Cryptography and Network Security - 15th International Conference, {ACNS} 2017, Kanazawa, Japan, July 10-12, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10355}, pages = {253--272}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-61204-1\_13}, doi = {10.1007/978-3-319-61204-1\_13}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acns/XuYFTSKH17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/c2si/IkematsuDPT17, author = {Yasuhiko Ikematsu and Dung Hoang Duong and Albrecht Petzoldt and Tsuyoshi Takagi}, editor = {Said El Hajji and Abderrahmane Nitaj and El Mamoun Souidi}, title = {Revisiting the Efficient Key Generation of {ZHFE}}, booktitle = {Codes, Cryptology and Information Security - Second International Conference, {C2SI} 2017, Rabat, Morocco, April 10-12, 2017, Proceedings - In Honor of Claude Carlet}, series = {Lecture Notes in Computer Science}, volume = {10194}, pages = {195--212}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-55589-8\_13}, doi = {10.1007/978-3-319-55589-8\_13}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/c2si/IkematsuDPT17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/host/YuanFKT17, author = {Ye Yuan and Kazuhide Fukushima and Shinsaku Kiyomoto and Tsuyoshi Takagi}, title = {Memory-constrained implementation of lattice-based encryption scheme on standard Java Card}, booktitle = {2017 {IEEE} International Symposium on Hardware Oriented Security and Trust, {HOST} 2017, McLean, VA, USA, May 1-5, 2017}, pages = {47--50}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/HST.2017.7951796}, doi = {10.1109/HST.2017.7951796}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/host/YuanFKT17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icics/WangAT17, author = {Yuntao Wang and Yoshinori Aono and Tsuyoshi Takagi}, editor = {Sihan Qing and Chris Mitchell and Liqun Chen and Dongmei Liu}, title = {An Experimental Study of Kannan's Embedding Technique for the Search {LWE} Problem}, booktitle = {Information and Communications Security - 19th International Conference, {ICICS} 2017, Beijing, China, December 6-8, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10631}, pages = {541--553}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-89500-0\_47}, doi = {10.1007/978-3-319-89500-0\_47}, timestamp = {Fri, 06 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icics/WangAT17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isw/DuongYT17, author = {Dung Hoang Duong and Masaya Yasuda and Tsuyoshi Takagi}, editor = {Phong Q. Nguyen and Jianying Zhou}, title = {Choosing Parameters for the Subfield Lattice Attack Against Overstretched {NTRU}}, booktitle = {Information Security - 20th International Conference, {ISC} 2017, Ho Chi Minh City, Vietnam, November 22-24, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10599}, pages = {79--91}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-69659-1\_5}, doi = {10.1007/978-3-319-69659-1\_5}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isw/DuongYT17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/AlsayighDTW17, author = {Saed Alsayigh and Jintai Ding and Tsuyoshi Takagi and Yuntao Wang}, editor = {Satoshi Obana and Koji Chida}, title = {The Beauty and the Beasts - The Hard Cases in {LLL} Reduction}, booktitle = {Advances in Information and Computer Security - 12th International Workshop on Security, {IWSEC} 2017, Hiroshima, Japan, August 30 - September 1, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10418}, pages = {19--35}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-64200-0\_2}, doi = {10.1007/978-3-319-64200-0\_2}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iwsec/AlsayighDTW17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacrypt/AkiyamaGOTNH17, author = {Koichiro Akiyama and Yasuhiro Goto and Shinya Okumura and Tsuyoshi Takagi and Koji Nuida and Goichiro Hanaoka}, editor = {Carlisle Adams and Jan Camenisch}, title = {A Public-Key Encryption Scheme Based on Non-linear Indeterminate Equations}, booktitle = {Selected Areas in Cryptography - {SAC} 2017 - 24th International Conference, Ottawa, ON, Canada, August 16-18, 2017, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {10719}, pages = {215--234}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-72565-9\_11}, doi = {10.1007/978-3-319-72565-9\_11}, timestamp = {Tue, 14 May 2019 10:00:38 +0200}, biburl = {https://dblp.org/rec/conf/sacrypt/AkiyamaGOTNH17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:books/sp/17/Takagi17, author = {Tsuyoshi Takagi}, editor = {Tsuyoshi Takagi and Masato Wakayama and Keisuke Tanaka and Noboru Kunihiro and Kazufumi Kimoto and Dung Hoang Duong}, title = {Introduction to {CREST} Crypto-Math Project}, booktitle = {Mathematical Modelling for Next-Generation Cryptography: {CREST} Crypto-Math Project}, series = {Mathematics for Industry}, pages = {1--14}, publisher = {Springer Singapore}, year = {2017}, url = {https://doi.org/10.1007/978-981-10-5065-7\_1}, doi = {10.1007/978-981-10-5065-7\_1}, timestamp = {Tue, 18 Jun 2019 19:22:00 +0200}, biburl = {https://dblp.org/rec/books/sp/17/Takagi17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@book{DBLP:books/sp/17/TWTK2017, editor = {Tsuyoshi Takagi and Masato Wakayama and Keisuke Tanaka and Noboru Kunihiro and Kazufumi Kimoto and Dung Hoang Duong}, title = {Mathematical Modelling for Next-Generation Cryptography: {CREST} Crypto-Math Project}, series = {Mathematics for Industry}, publisher = {Springer Singapore}, year = {2017}, url = {https://doi.org/10.1007/978-981-10-5065-7}, doi = {10.1007/978-981-10-5065-7}, isbn = {978-981-10-5064-0}, timestamp = {Tue, 18 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/books/sp/17/TWTK2017.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/asiacrypt/2017-1, editor = {Tsuyoshi Takagi and Thomas Peyrin}, title = {Advances in Cryptology - {ASIACRYPT} 2017 - 23rd International Conference on the Theory and Applications of Cryptology and Information Security, Hong Kong, China, December 3-7, 2017, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {10624}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-70694-8}, doi = {10.1007/978-3-319-70694-8}, isbn = {978-3-319-70693-1}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/asiacrypt/2017-1.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/asiacrypt/2017-2, editor = {Tsuyoshi Takagi and Thomas Peyrin}, title = {Advances in Cryptology - {ASIACRYPT} 2017 - 23rd International Conference on the Theory and Applications of Cryptology and Information Security, Hong Kong, China, December 3-7, 2017, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {10625}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-70697-9}, doi = {10.1007/978-3-319-70697-9}, isbn = {978-3-319-70696-2}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/asiacrypt/2017-2.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/asiacrypt/2017-3, editor = {Tsuyoshi Takagi and Thomas Peyrin}, title = {Advances in Cryptology - {ASIACRYPT} 2017 - 23rd International Conference on the Theory and Applications of Cryptology and Information Security, Hong Kong, China, December 3-7, 2017, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {10626}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-70700-6}, doi = {10.1007/978-3-319-70700-6}, isbn = {978-3-319-70699-3}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/asiacrypt/2017-3.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/pqcrypto/2017, editor = {Tanja Lange and Tsuyoshi Takagi}, title = {Post-Quantum Cryptography - 8th International Workshop, PQCrypto 2017, Utrecht, The Netherlands, June 26-28, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10346}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-59879-6}, doi = {10.1007/978-3-319-59879-6}, isbn = {978-3-319-59878-9}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pqcrypto/2017.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DuongYT17, author = {Dung Hoang Duong and Masaya Yasuda and Tsuyoshi Takagi}, title = {Choosing Parameters for the Subfield Lattice Attack against overstretched {NTRU}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {959}, year = {2017}, url = {http://eprint.iacr.org/2017/959}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DuongYT17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AkiyamaGOTNHSI17, author = {Koichiro Akiyama and Yasuhiro Goto and Shinya Okumura and Tsuyoshi Takagi and Koji Nuida and Goichiro Hanaoka and Hideo Shimizu and Yasuhiko Ikematsu}, title = {A Public-key Encryption Scheme Based on Non-linear Indeterminate Equations (Giophantus)}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1241}, year = {2017}, url = {http://eprint.iacr.org/2017/1241}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AkiyamaGOTNHSI17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/amco/HakutaST16, author = {Keisuke Hakuta and Hisayoshi Sato and Tsuyoshi Takagi}, title = {On tameness of Matsumoto-Imai central maps in three variables over the finite field {\unicode{54589}}\({}_{\mbox{2}}\)}, journal = {Adv. Math. Commun.}, volume = {10}, number = {2}, pages = {221--228}, year = {2016}, url = {https://doi.org/10.3934/amc.2016002}, doi = {10.3934/AMC.2016002}, timestamp = {Fri, 10 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/amco/HakutaST16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnc/YuanCKMT16, author = {Ye Yuan and Chen{-}Mou Cheng and Shinsaku Kiyomoto and Yutaka Miyake and Tsuyoshi Takagi}, title = {Portable Implementation of Lattice-based Cryptography using JavaScript}, journal = {Int. J. Netw. Comput.}, volume = {6}, number = {2}, pages = {309--327}, year = {2016}, url = {http://www.ijnc.org/index.php/ijnc/article/view/130}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijnc/YuanCKMT16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jpdc/ZhuHT16, author = {Youwen Zhu and Zhiqiu Huang and Tsuyoshi Takagi}, title = {Secure and controllable k-NN query over encrypted cloud data with key confidentiality}, journal = {J. Parallel Distributed Comput.}, volume = {89}, pages = {1--12}, year = {2016}, url = {https://doi.org/10.1016/j.jpdc.2015.11.004}, doi = {10.1016/J.JPDC.2015.11.004}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jpdc/ZhuHT16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/JiangTW16, author = {Shaoquan Jiang and Tsuyoshi Takagi and Guilin Wang}, title = {Special issue on provable security}, journal = {Secur. Commun. Networks}, volume = {9}, number = {12}, pages = {1635--1637}, year = {2016}, url = {https://doi.org/10.1002/sec.1496}, doi = {10.1002/SEC.1496}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/JiangTW16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/LiuZHT16, author = {Zhenhua Liu and Xiangsong Zhang and Yupu Hu and Tsuyoshi Takagi}, title = {Revocable and strongly unforgeable identity-based signature scheme in the standard model}, journal = {Secur. Commun. Networks}, volume = {9}, number = {14}, pages = {2422--2433}, year = {2016}, url = {https://doi.org/10.1002/sec.1513}, doi = {10.1002/SEC.1513}, timestamp = {Wed, 22 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/LiuZHT16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/ChengLJT16, author = {Chi Cheng and Jemin Lee and Tao Jiang and Tsuyoshi Takagi}, title = {Security Analysis and Improvements on Two Homomorphic Authentication Schemes for Network Coding}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {11}, number = {5}, pages = {993--1002}, year = {2016}, url = {https://doi.org/10.1109/TIFS.2016.2515517}, doi = {10.1109/TIFS.2016.2515517}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/ChengLJT16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/LiZT16, author = {Fagen Li and Di Zhong and Tsuyoshi Takagi}, title = {Efficient Deniably Authenticated Encryption and Its Application to E-Mail}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {11}, number = {11}, pages = {2477--2486}, year = {2016}, url = {https://doi.org/10.1109/TIFS.2016.2585086}, doi = {10.1109/TIFS.2016.2585086}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/LiZT16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/XuMYZT16, author = {Rui Xu and Kirill Morozov and Yanjiang Yang and Jianying Zhou and Tsuyoshi Takagi}, editor = {Joseph K. Liu and Ron Steinfeld}, title = {Privacy-Preserving k-Nearest Neighbour Query on Outsourced Database}, booktitle = {Information Security and Privacy - 21st Australasian Conference, {ACISP} 2016, Melbourne, VIC, Australia, July 4-6, 2016, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {9722}, pages = {181--197}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-40253-6\_11}, doi = {10.1007/978-3-319-40253-6\_11}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/XuMYZT16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/DuongPT16, author = {Dung Hoang Duong and Albrecht Petzoldt and Tsuyoshi Takagi}, editor = {Joseph K. Liu and Ron Steinfeld}, title = {Reducing the Key Size of the {SRP} Encryption Scheme}, booktitle = {Information Security and Privacy - 21st Australasian Conference, {ACISP} 2016, Melbourne, VIC, Australia, July 4-6, 2016, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {9723}, pages = {427--434}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-40367-0\_27}, doi = {10.1007/978-3-319-40367-0\_27}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/DuongPT16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ei-iss/TakagiSSOF16, author = {Tsuyoshi Takagi and Hwajung Seo and Toshikatsu Sakai and Hiroshi Ohtake and Mamoru Furuta}, editor = {Arnaud Darmont and Antoine Dupret and Ralf Widenhorn}, title = {Image Sensor with Organic Photoconductive Films by Stacking Red/Green and Blue Components}, booktitle = {Image Sensors and Imaging Systems 2016, {IMSE} 2016, San Francisco, CA, USA, February 14-18, 2016}, pages = {1--4}, publisher = {Society for Imaging Science and Technology}, year = {2016}, url = {https://doi.org/10.2352/ISSN.2470-1173.2016.12.IMSE-264}, doi = {10.2352/ISSN.2470-1173.2016.12.IMSE-264}, timestamp = {Wed, 02 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ei-iss/TakagiSSOF16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/AonoW0T16, author = {Yoshinori Aono and Yuntao Wang and Takuya Hayashi and Tsuyoshi Takagi}, editor = {Marc Fischlin and Jean{-}S{\'{e}}bastien Coron}, title = {Improved Progressive {BKZ} Algorithms and Their Precise Cost Estimation by Sharp Simulator}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2016 - 35th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Vienna, Austria, May 8-12, 2016, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {9665}, pages = {789--819}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-49890-3\_30}, doi = {10.1007/978-3-662-49890-3\_30}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/AonoW0T16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ic-nc/OkumuraAT16, author = {Shinya Okumura and Koichiro Akiyama and Tsuyoshi Takagi}, title = {An Estimate of the Complexity of the Section Finding Problem on Algebraic Surfaces}, booktitle = {Fourth International Symposium on Computing and Networking, {CANDAR} 2016, Hiroshima, Japan, November 22-25, 2016}, pages = {28--36}, publisher = {{IEEE} Computer Society}, year = {2016}, url = {https://doi.org/10.1109/CANDAR.2016.0021}, doi = {10.1109/CANDAR.2016.0021}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ic-nc/OkumuraAT16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icisc/DuongPWT16, author = {Dung Hoang Duong and Albrecht Petzoldt and Yacheng Wang and Tsuyoshi Takagi}, editor = {Seokhie Hong and Jong Hwan Park}, title = {Revisiting the Cubic {UOV} Signature Scheme}, booktitle = {Information Security and Cryptology - {ICISC} 2016 - 19th International Conference, Seoul, South Korea, November 30 - December 2, 2016, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {10157}, pages = {223--238}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-53177-9\_12}, doi = {10.1007/978-3-319-53177-9\_12}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icisc/DuongPWT16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/DingKOTT16, author = {Jintai Ding and Momonari Kudo and Shinya Okumura and Tsuyoshi Takagi and Chengdong Tao}, editor = {Kazuto Ogawa and Katsunari Yoshioka}, title = {Cryptanalysis of a Public Key Cryptosystem Based on Diophantine Equations via Weighted {LLL} Reduction}, booktitle = {Advances in Information and Computer Security - 11th International Workshop on Security, {IWSEC} 2016, Tokyo, Japan, September 12-14, 2016, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9836}, pages = {305--315}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-44524-3\_18}, doi = {10.1007/978-3-319-44524-3\_18}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iwsec/DingKOTT16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/asiacrypt/2016-1, editor = {Jung Hee Cheon and Tsuyoshi Takagi}, title = {Advances in Cryptology - {ASIACRYPT} 2016 - 22nd International Conference on the Theory and Application of Cryptology and Information Security, Hanoi, Vietnam, December 4-8, 2016, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {10031}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-53887-6}, doi = {10.1007/978-3-662-53887-6}, isbn = {978-3-662-53886-9}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/asiacrypt/2016-1.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/asiacrypt/2016-2, editor = {Jung Hee Cheon and Tsuyoshi Takagi}, title = {Advances in Cryptology - {ASIACRYPT} 2016 - 22nd International Conference on the Theory and Application of Cryptology and Information Security, Hanoi, Vietnam, December 4-8, 2016, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {10032}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-53890-6}, doi = {10.1007/978-3-662-53890-6}, isbn = {978-3-662-53889-0}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/asiacrypt/2016-2.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/pqcrypto/2016, editor = {Tsuyoshi Takagi}, title = {Post-Quantum Cryptography - 7th International Workshop, PQCrypto 2016, Fukuoka, Japan, February 24-26, 2016, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9606}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-29360-8}, doi = {10.1007/978-3-319-29360-8}, isbn = {978-3-319-29359-2}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pqcrypto/2016.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AonoWHT16, author = {Yoshinori Aono and Yuntao Wang and Takuya Hayashi and Tsuyoshi Takagi}, title = {Improved Progressive {BKZ} Algorithms and their Precise Cost Estimation by Sharp Simulator}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {146}, year = {2016}, url = {http://eprint.iacr.org/2016/146}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AonoWHT16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DuongPT16, author = {Dung Hoang Duong and Albrecht Petzoldt and Tsuyoshi Takagi}, title = {Reducing the Key Size of the {SRP} Encryption Scheme - Extended version}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {383}, year = {2016}, url = {http://eprint.iacr.org/2016/383}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DuongPT16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/IkematsuDPT16, author = {Yasuhiko Ikematsu and Dung Hoang Duong and Albrecht Petzoldt and Tsuyoshi Takagi}, title = {Revisiting the Efficient Key Generation of {ZHFE}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1065}, year = {2016}, url = {http://eprint.iacr.org/2016/1065}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/IkematsuDPT16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DuongPWT16, author = {Dung Hoang Duong and Albrecht Petzoldt and Yacheng Wang and Tsuyoshi Takagi}, title = {Revisiting the Cubic {UOV} Signature Scheme}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1079}, year = {2016}, url = {http://eprint.iacr.org/2016/1079}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DuongPWT16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cca/YasudaDHTS15, author = {Takanori Yasuda and Xavier Dahan and Yun{-}Ju Huang and Tsuyoshi Takagi and Kouichi Sakurai}, title = {A multivariate quadratic challenge toward post-quantum generation cryptography}, journal = {{ACM} Commun. Comput. Algebra}, volume = {49}, number = {3}, pages = {105--107}, year = {2015}, url = {https://doi.org/10.1145/2850449.2850462}, doi = {10.1145/2850449.2850462}, timestamp = {Wed, 04 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cca/YasudaDHTS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cj/ZhangWTM15, author = {Mingwu Zhang and Chunzhi Wang and Tsuyoshi Takagi and Yi Mu}, title = {Functional Encryption Resilient to Hard-to-Invert Leakage}, journal = {Comput. J.}, volume = {58}, number = {4}, pages = {735--749}, year = {2015}, url = {https://doi.org/10.1093/comjnl/bxt105}, doi = {10.1093/COMJNL/BXT105}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cj/ZhangWTM15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/XuMT15, author = {Rui Xu and Kirill Morozov and Tsuyoshi Takagi}, title = {Note on Some Recent Cheater Identifiable Secret Sharing Schemes}, journal = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.}, volume = {98-A}, number = {8}, pages = {1814--1819}, year = {2015}, url = {https://doi.org/10.1587/transfun.E98.A.1814}, doi = {10.1587/TRANSFUN.E98.A.1814}, timestamp = {Sat, 11 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieicet/XuMT15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/HuMT15, author = {Rong Hu and Kirill Morozov and Tsuyoshi Takagi}, title = {Zero-Knowledge Protocols for Code-Based Public-Key Encryption}, journal = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.}, volume = {98-A}, number = {10}, pages = {2139--2151}, year = {2015}, url = {https://doi.org/10.1587/transfun.E98.A.2139}, doi = {10.1587/TRANSFUN.E98.A.2139}, timestamp = {Sat, 11 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieicet/HuMT15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijesdf/ZhuT15, author = {Youwen Zhu and Tsuyoshi Takagi}, title = {Efficient scalar product protocol and its privacy-preserving application}, journal = {Int. J. Electron. Secur. Digit. Forensics}, volume = {7}, number = {1}, pages = {1--19}, year = {2015}, url = {https://doi.org/10.1504/IJESDF.2015.067985}, doi = {10.1504/IJESDF.2015.067985}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijesdf/ZhuT15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnsec/ZhangLHT15, author = {Xiangsong Zhang and Zhenhua Liu and Yupu Hu and Tsuyoshi Takagi}, title = {Revocable Identity-based Signcryption Scheme Without Random Oracles}, journal = {Int. J. Netw. Secur.}, volume = {17}, number = {2}, pages = {110--122}, year = {2015}, url = {http://ijns.jalaxy.com.tw/contents/ijns-v17-n2/ijns-2015-v17-n2-p110-122.pdf}, timestamp = {Wed, 22 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijnsec/ZhangLHT15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/ZhuHHT15, author = {Youwen Zhu and Zhiqiu Huang and Liusheng Huang and Tsuyoshi Takagi}, title = {On the Security of {A} Privacy-Preserving Product Calculation Scheme}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {12}, number = {3}, pages = {373--374}, year = {2015}, url = {https://doi.org/10.1109/TDSC.2014.2345404}, doi = {10.1109/TDSC.2014.2345404}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/ZhuHHT15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ic-nc/YuanCKMT15, author = {Ye Yuan and Chen{-}Mou Cheng and Shinsaku Kiyomoto and Yutaka Miyake and Tsuyoshi Takagi}, title = {Portable Implementation of Lattice-Based Cryptography Using JavaScript}, booktitle = {Third International Symposium on Computing and Networking, {CANDAR} 2015, Sapporo, Hokkaido, Japan, December 8-11, 2015}, pages = {58--67}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/CANDAR.2015.36}, doi = {10.1109/CANDAR.2015.36}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ic-nc/YuanCKMT15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ic-nc/YasudaTS15, author = {Takanori Yasuda and Tsuyoshi Takagi and Kouichi Sakurai}, title = {Constructing Pairing-Friendly Elliptic Curves Using Global Number Fields}, booktitle = {Third International Symposium on Computing and Networking, {CANDAR} 2015, Sapporo, Hokkaido, Japan, December 8-11, 2015}, pages = {477--483}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/CANDAR.2015.28}, doi = {10.1109/CANDAR.2015.28}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ic-nc/YasudaTS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/YasudaDHTS15, author = {Takanori Yasuda and Xavier Dahan and Yun{-}Ju Huang and Tsuyoshi Takagi and Kouichi Sakurai}, title = {{MQ} Challenge: Hardness Evaluation of Solving Multivariate Quadratic Problems}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {275}, year = {2015}, url = {http://eprint.iacr.org/2015/275}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/YasudaDHTS15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/HuangPST15, author = {Yun{-}Ju Huang and Christophe Petit and Naoyuki Shinohara and Tsuyoshi Takagi}, title = {On Generalized First Fall Degree Assumptions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {358}, year = {2015}, url = {http://eprint.iacr.org/2015/358}, timestamp = {Fri, 17 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/HuangPST15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/OkumuraSYT15, author = {Shinya Okumura and Shingo Sugiyama and Masaya Yasuda and Tsuyoshi Takagi}, title = {Security Analysis of Cryptosystems Using Short Generators over Ideal Lattices}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1004}, year = {2015}, url = {http://eprint.iacr.org/2015/1004}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/OkumuraSYT15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/HayasakaAKT15, author = {Kenichiro Hayasaka and Kazumaro Aoki and Tetsutaro Kobayashi and Tsuyoshi Takagi}, title = {A construction of 3-dimensional lattice sieve for number field sieve over F{\_}\{p{\^{}}n\}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1179}, year = {2015}, url = {http://eprint.iacr.org/2015/1179}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/HayasakaAKT15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/DingKOTT15, author = {Jintai Ding and Momonari Kudo and Shinya Okumura and Tsuyoshi Takagi and Chengdong Tao}, title = {Cryptanalysis of a public key cryptosystem based on Diophantine equations via weighted {LLL} reduction}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1229}, year = {2015}, url = {http://eprint.iacr.org/2015/1229}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/DingKOTT15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/ShinoharaSHT14, author = {Naoyuki Shinohara and Takeshi Shimoyama and Takuya Hayashi and Tsuyoshi Takagi}, title = {Key Length Estimation of Pairing-Based Cryptosystems Using \emph{{\(\eta\)}\({}_{\mbox{T}}\)} Pairing over \emph{GF}(3\emph{\({}^{\mbox{n}}\)})}, journal = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.}, volume = {97-A}, number = {1}, pages = {236--244}, year = {2014}, url = {https://doi.org/10.1587/transfun.E97.A.236}, doi = {10.1587/TRANSFUN.E97.A.236}, timestamp = {Sat, 11 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieicet/ShinoharaSHT14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/YasudaTS14, author = {Takanori Yasuda and Tsuyoshi Takagi and Kouichi Sakurai}, title = {Security of Multivariate Signature Scheme Using Non-commutative Rings}, journal = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.}, volume = {97-A}, number = {1}, pages = {245--252}, year = {2014}, url = {https://doi.org/10.1587/transfun.E97.A.245}, doi = {10.1587/TRANSFUN.E97.A.245}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieicet/YasudaTS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/ZhuT14, author = {Youwen Zhu and Tsuyoshi Takagi}, title = {Efficient Privacy-Preserving Reputation Evaluation in Decentralized Environments}, journal = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.}, volume = {97-A}, number = {1}, pages = {409--412}, year = {2014}, url = {https://doi.org/10.1587/transfun.E97.A.409}, doi = {10.1587/TRANSFUN.E97.A.409}, timestamp = {Sat, 11 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieicet/ZhuT14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/ZhuTH14, author = {Youwen Zhu and Tsuyoshi Takagi and Rong Hu}, title = {Security Analysis of Collusion-Resistant Nearest Neighbor Query Scheme on Encrypted Cloud Data}, journal = {{IEICE} Trans. Inf. Syst.}, volume = {97-D}, number = {2}, pages = {326--330}, year = {2014}, url = {https://doi.org/10.1587/transinf.E97.D.326}, doi = {10.1587/TRANSINF.E97.D.326}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieicet/ZhuTH14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/MiuraHT14, author = {Hiroyuki Miura and Yasufumi Hashimoto and Tsuyoshi Takagi}, title = {Extended Algorithm for Solving Underdefined Multivariate Quadratic Equations}, journal = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.}, volume = {97-A}, number = {6}, pages = {1418--1425}, year = {2014}, url = {https://doi.org/10.1587/transfun.E97.A.1418}, doi = {10.1587/TRANSFUN.E97.A.1418}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieicet/MiuraHT14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/ZhangT14, author = {Hui Zhang and Tsuyoshi Takagi}, title = {Improved Attacks on Multi-Prime {RSA} with Small Prime Difference}, journal = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.}, volume = {97-A}, number = {7}, pages = {1533--1541}, year = {2014}, url = {https://doi.org/10.1587/transfun.E97.A.1533}, doi = {10.1587/TRANSFUN.E97.A.1533}, timestamp = {Sat, 11 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieicet/ZhangT14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/KiyomuraT14, author = {Yutaro Kiyomura and Tsuyoshi Takagi}, title = {Efficient Algorithm for Tate Pairing of Composite Order}, journal = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.}, volume = {97-A}, number = {10}, pages = {2055--2063}, year = {2014}, url = {https://doi.org/10.1587/transfun.E97.A.2055}, doi = {10.1587/TRANSFUN.E97.A.2055}, timestamp = {Sat, 11 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieicet/KiyomuraT14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iet-ifs/ZhangNYT14, author = {Mingwu Zhang and Takashi Nishide and Bo Yang and Tsuyoshi Takagi}, title = {Anonymous encryption with partial-order subset delegation and its application in privacy email systems}, journal = {{IET} Inf. Secur.}, volume = {8}, number = {4}, pages = {240--249}, year = {2014}, url = {https://doi.org/10.1049/iet-ifs.2013.0045}, doi = {10.1049/IET-IFS.2013.0045}, timestamp = {Thu, 27 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iet-ifs/ZhangNYT14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcomsys/ZhangWYT14, author = {Mingwu Zhang and Chunzhi Wang and Bo Yang and Tsuyoshi Takagi}, title = {Fully secure constructions of spatial encryption with vector privacy}, journal = {Int. J. Commun. Syst.}, volume = {27}, number = {12}, pages = {4307--4327}, year = {2014}, url = {https://doi.org/10.1002/dac.2613}, doi = {10.1002/DAC.2613}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcomsys/ZhangWYT14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isci/ZhangYT14, author = {Mingwu Zhang and Bo Yang and Tsuyoshi Takagi}, title = {Anonymous spatial encryption under affine space delegation functionality with full security}, journal = {Inf. Sci.}, volume = {277}, pages = {715--730}, year = {2014}, url = {https://doi.org/10.1016/j.ins.2014.03.012}, doi = {10.1016/J.INS.2014.03.012}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isci/ZhangYT14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jowua/YasudaTS14, author = {Takanori Yasuda and Tsuyoshi Takagi and Kouichi Sakurai}, title = {Efficient variant of Rainbow using sparse secret keys}, journal = {J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl.}, volume = {5}, number = {3}, pages = {3--13}, year = {2014}, url = {https://doi.org/10.22667/JOWUA.2014.09.31.003}, doi = {10.22667/JOWUA.2014.09.31.003}, timestamp = {Sun, 17 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jowua/YasudaTS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jsiaml/TomitaT14, author = {Takumi Tomita and Tsuyoshi Takagi}, title = {Efficient system parameters for Identity-Based Encryption using supersingular elliptic curves}, journal = {{JSIAM} Lett.}, volume = {6}, pages = {13--16}, year = {2014}, url = {https://doi.org/10.14495/jsiaml.6.13}, doi = {10.14495/JSIAML.6.13}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jsiaml/TomitaT14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jsiaml/HayasakaAKT14, author = {Kenichiro Hayasaka and Kazumaro Aoki and Tetsutaro Kobayashi and Tsuyoshi Takagi}, title = {An experiment of number field sieve for discrete logarithm problem over {\textdollar}{\textbackslash}text\{GF\}(p{\^{}}n){\textdollar}}, journal = {{JSIAM} Lett.}, volume = {6}, pages = {53--56}, year = {2014}, url = {https://doi.org/10.14495/jsiaml.6.53}, doi = {10.14495/JSIAML.6.53}, timestamp = {Wed, 17 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jsiaml/HayasakaAKT14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jsiaml/KiyomuraIYHWYTT14, author = {Yutaro Kiyomura and Noriyasu Iwamoto and Shun'ichi Yokoyama and Kenichiro Hayasaka and Yuntao Wang and Takanori Yasuda and Katsuyuki Takashima and Tsuyoshi Takagi}, title = {Heuristic counting of Kachisa-Schaefer-Scott curves}, journal = {{JSIAM} Lett.}, volume = {6}, pages = {73--76}, year = {2014}, url = {https://doi.org/10.14495/jsiaml.6.73}, doi = {10.14495/JSIAML.6.73}, timestamp = {Wed, 17 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jsiaml/KiyomuraIYHWYTT14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/SuZBTS14, author = {Chunhua Su and Jianying Zhou and Feng Bao and Tsuyoshi Takagi and Kouichi Sakurai}, title = {Collaborative agglomerative document clustering with limited information disclosure}, journal = {Secur. Commun. Networks}, volume = {7}, number = {6}, pages = {964--978}, year = {2014}, url = {https://doi.org/10.1002/sec.811}, doi = {10.1002/SEC.811}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/SuZBTS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/Zhang0WT14, author = {Mingwu Zhang and Bo Yang and Chunzhi Wang and Tsuyoshi Takagi}, title = {Unbounded anonymous hierarchical {IBE} with continual-key-leakage tolerance}, journal = {Secur. Commun. Networks}, volume = {7}, number = {11}, pages = {1974--1987}, year = {2014}, url = {https://doi.org/10.1002/sec.912}, doi = {10.1002/SEC.912}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/Zhang0WT14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ict-eurasia/YasudaTS14, author = {Takanori Yasuda and Tsuyoshi Takagi and Kouichi Sakurai}, editor = {Linawati and Made Sudiana Mahendra and Erich J. Neuhold and A Min Tjoa and Ilsun You}, title = {Efficient Variant of Rainbow without Triangular Matrix Representation}, booktitle = {Information and Communication Technology - Second {IFIP} {TC5/8} International Conference, ICT-EurAsia 2014, Bali, Indonesia, April 14-17, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8407}, pages = {532--541}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-642-55032-4\_55}, doi = {10.1007/978-3-642-55032-4\_55}, timestamp = {Tue, 14 May 2019 10:00:38 +0200}, biburl = {https://dblp.org/rec/conf/ict-eurasia/YasudaTS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/XuMT14, author = {Rui Xu and Kirill Morozov and Tsuyoshi Takagi}, editor = {Maki Yoshida and Koichi Mouri}, title = {Cheater Identifiable Secret Sharing Schemes via Multi-Receiver Authentication}, booktitle = {Advances in Information and Computer Security - 9th International Workshop on Security, {IWSEC} 2014, Hirosaki, Japan, August 27-29, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8639}, pages = {72--87}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-09843-2\_6}, doi = {10.1007/978-3-319-09843-2\_6}, timestamp = {Tue, 14 May 2019 10:00:52 +0200}, biburl = {https://dblp.org/rec/conf/iwsec/XuMT14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/IshiguroKMT14, author = {Tsukasa Ishiguro and Shinsaku Kiyomoto and Yutaka Miyake and Tsuyoshi Takagi}, editor = {Hugo Krawczyk}, title = {Parallel Gauss Sieve Algorithm: Solving the {SVP} Challenge over a 128-Dimensional Ideal Lattice}, booktitle = {Public-Key Cryptography - {PKC} 2014 - 17th International Conference on Practice and Theory in Public-Key Cryptography, Buenos Aires, Argentina, March 26-28, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8383}, pages = {411--428}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-642-54631-0\_24}, doi = {10.1007/978-3-642-54631-0\_24}, timestamp = {Fri, 01 May 2020 18:32:25 +0200}, biburl = {https://dblp.org/rec/conf/pkc/IshiguroKMT14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pqcrypto/ChengHMT14, author = {Chen{-}Mou Cheng and Yasufumi Hashimoto and Hiroyuki Miura and Tsuyoshi Takagi}, editor = {Michele Mosca}, title = {A Polynomial-Time Algorithm for Solving a Class of Underdetermined Multivariate Quadratic Equations over Fields of Odd Characteristics}, booktitle = {Post-Quantum Cryptography - 6th International Workshop, PQCrypto 2014, Waterloo, ON, Canada, October 1-3, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8772}, pages = {40--58}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-11659-4\_3}, doi = {10.1007/978-3-319-11659-4\_3}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pqcrypto/ChengHMT14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/HakutaST14, author = {Keisuke Hakuta and Hisayoshi Sato and Tsuyoshi Takagi}, title = {Some properties of {\textdollar}{\(\tau\)}{\textdollar}-adic expansions on hyperelliptic Koblitz curves}, journal = {CoRR}, volume = {abs/1402.1865}, year = {2014}, url = {http://arxiv.org/abs/1402.1865}, eprinttype = {arXiv}, eprint = {1402.1865}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/HakutaST14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cj/ZhangYT13, author = {Mingwu Zhang and Bo Yang and Tsuyoshi Takagi}, title = {Bounded Leakage-Resilient Functional Encryption with Hidden Vector Predicate}, journal = {Comput. J.}, volume = {56}, number = {4}, pages = {464--477}, year = {2013}, url = {https://doi.org/10.1093/comjnl/bxs133}, doi = {10.1093/COMJNL/BXS133}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cj/ZhangYT13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/concurrency/LiMKT13, author = {Fagen Li and Fahad Bin Muhaya and Muhammad Khurram Khan and Tsuyoshi Takagi}, title = {Lattice-based signcryption}, journal = {Concurr. Comput. Pract. Exp.}, volume = {25}, number = {14}, pages = {2112--2122}, year = {2013}, url = {https://doi.org/10.1002/cpe.2826}, doi = {10.1002/CPE.2826}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/concurrency/LiMKT13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/HashimotoTS13, author = {Yasufumi Hashimoto and Tsuyoshi Takagi and Kouichi Sakurai}, title = {General Fault Attacks on Multivariate Public Key Cryptosystems}, journal = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.}, volume = {96-A}, number = {1}, pages = {196--205}, year = {2013}, url = {https://doi.org/10.1587/transfun.E96.A.196}, doi = {10.1587/TRANSFUN.E96.A.196}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieicet/HashimotoTS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijesdf/ZhuXT13, author = {Youwen Zhu and Rui Xu and Tsuyoshi Takagi}, title = {Secure k-NN query on encrypted cloud database without key-sharing}, journal = {Int. J. Electron. Secur. Digit. Forensics}, volume = {5}, number = {3/4}, pages = {201--217}, year = {2013}, url = {https://doi.org/10.1504/IJESDF.2013.058654}, doi = {10.1504/IJESDF.2013.058654}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijesdf/ZhuXT13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnsec/ZhangYWT13, author = {Mingwu Zhang and Jintao Yao and Chunzhi Wang and Tsuyoshi Takagi}, title = {Public Key Replacement and Universal Forgery of a {SCLS} Scheme}, journal = {Int. J. Netw. Secur.}, volume = {15}, number = {2}, pages = {133--138}, year = {2013}, url = {http://ijns.jalaxy.com.tw/contents/ijns-v15-n2/ijns-2013-v15-n2-p133-138.pdf}, timestamp = {Mon, 04 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijnsec/ZhangYWT13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/mcm/LiST13, author = {Fagen Li and Masaaki Shirase and Tsuyoshi Takagi}, title = {Certificateless hybrid signcryption}, journal = {Math. Comput. Model.}, volume = {57}, number = {3-4}, pages = {324--343}, year = {2013}, url = {https://doi.org/10.1016/j.mcm.2012.06.011}, doi = {10.1016/J.MCM.2012.06.011}, timestamp = {Wed, 17 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/mcm/LiST13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/mcm/LiT13, author = {Fagen Li and Tsuyoshi Takagi}, title = {Secure identity-based signcryption in the standard model}, journal = {Math. Comput. Model.}, volume = {57}, number = {11-12}, pages = {2685--2694}, year = {2013}, url = {https://doi.org/10.1016/j.mcm.2011.06.043}, doi = {10.1016/J.MCM.2011.06.043}, timestamp = {Wed, 17 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/mcm/LiT13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/mcm/LiZT13, author = {Fagen Li and Mingwu Zhang and Tsuyoshi Takagi}, title = {Identity-based partially blind signature in the standard model for electronic cash}, journal = {Math. Comput. Model.}, volume = {58}, number = {1-2}, pages = {196--203}, year = {2013}, url = {https://doi.org/10.1016/j.mcm.2012.07.009}, doi = {10.1016/J.MCM.2012.07.009}, timestamp = {Wed, 17 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/mcm/LiZT13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/ZhangYCT13, author = {Mingwu Zhang and Bo Yang and Zhenhua Chen and Tsuyoshi Takagi}, title = {Efficient and adaptively secure broadcast encryption systems}, journal = {Secur. Commun. Networks}, volume = {6}, number = {8}, pages = {1044--1052}, year = {2013}, url = {https://doi.org/10.1002/sec.678}, doi = {10.1002/SEC.678}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/ZhangYCT13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sj/ZhangT13, author = {Mingwu Zhang and Tsuyoshi Takagi}, title = {Efficient Constructions of Anonymous Multireceiver Encryption Protocol and Their Deployment in Group E-mail Systems With Privacy Preservation}, journal = {{IEEE} Syst. J.}, volume = {7}, number = {3}, pages = {410--419}, year = {2013}, url = {https://doi.org/10.1109/JSYST.2012.2221893}, doi = {10.1109/JSYST.2012.2221893}, timestamp = {Fri, 11 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sj/ZhangT13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sj/LiZT13, author = {Fagen Li and Hui Zhang and Tsuyoshi Takagi}, title = {Efficient Signcryption for Heterogeneous Systems}, journal = {{IEEE} Syst. J.}, volume = {7}, number = {3}, pages = {420--429}, year = {2013}, url = {https://doi.org/10.1109/JSYST.2012.2221897}, doi = {10.1109/JSYST.2012.2221897}, timestamp = {Fri, 11 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sj/LiZT13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/wpc/LiT13, author = {Fagen Li and Tsuyoshi Takagi}, title = {Cryptanalysis and Improvement of Robust Deniable Authentication Protocol}, journal = {Wirel. Pers. Commun.}, volume = {69}, number = {4}, pages = {1391--1398}, year = {2013}, url = {https://doi.org/10.1007/s11277-012-0640-4}, doi = {10.1007/S11277-012-0640-4}, timestamp = {Thu, 20 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/wpc/LiT13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/ZhangT13, author = {Hui Zhang and Tsuyoshi Takagi}, editor = {Colin Boyd and Leonie Simpson}, title = {Attacks on Multi-Prime {RSA} with Small Prime Difference}, booktitle = {Information Security and Privacy - 18th Australasian Conference, {ACISP} 2013, Brisbane, Australia, July 1-3, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7959}, pages = {41--56}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-39059-3\_4}, doi = {10.1007/978-3-642-39059-3\_4}, timestamp = {Tue, 14 May 2019 10:00:46 +0200}, biburl = {https://dblp.org/rec/conf/acisp/ZhangT13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiajcis/HuMT13, author = {Rong Hu and Kirill Morozov and Tsuyoshi Takagi}, title = {On Zero-Knowledge Identification Based on Q-ary Syndrome Decoding}, booktitle = {Eighth Asia Joint Conference on Information Security, AsiaJCIS 2013, Seoul, Korea, July 25-26, 2013}, pages = {12--18}, publisher = {{IEEE} Computer Society}, year = {2013}, url = {https://doi.org/10.1109/ASIAJCIS.2013.10}, doi = {10.1109/ASIAJCIS.2013.10}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/asiajcis/HuMT13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/birthday/HayasakaAKT13, author = {Kenichiro Hayasaka and Kazumaro Aoki and Tetsutaro Kobayashi and Tsuyoshi Takagi}, editor = {Marc Fischlin and Stefan Katzenbeisser}, title = {An Experiment of Number Field Sieve for Discrete Logarithm Problem over GF(p 12)}, booktitle = {Number Theory and Cryptography - Papers in Honor of Johannes Buchmann on the Occasion of His 60th Birthday}, series = {Lecture Notes in Computer Science}, volume = {8260}, pages = {108--120}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-42001-6\_8}, doi = {10.1007/978-3-642-42001-6\_8}, timestamp = {Tue, 14 May 2019 10:00:52 +0200}, biburl = {https://dblp.org/rec/conf/birthday/HayasakaAKT13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/ZhuXT13, author = {Youwen Zhu and Rui Xu and Tsuyoshi Takagi}, editor = {Xingming Sun and Elaine Shi and Kui Ren}, title = {Secure k-NN computation on encrypted cloud data without sharing key with query users}, booktitle = {Proceedings of the 2013 International Workshop on Security in Cloud Computing, SCC@ASIACCS '13, Hangzhou, China, May 8, 2013}, pages = {55--60}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2484402.2484415}, doi = {10.1145/2484402.2484415}, timestamp = {Tue, 10 Nov 2020 16:06:16 +0100}, biburl = {https://dblp.org/rec/conf/ccs/ZhuXT13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/YasudaDTS13, author = {Takanori Yasuda and Jintai Ding and Tsuyoshi Takagi and Kouichi Sakurai}, editor = {Kefei Chen and Qi Xie and Weidong Qiu and Shouhuai Xu and Yunlei Zhao}, title = {A variant of rainbow with shorter secret key and faster signature generation}, booktitle = {Proceedings of the first {ACM} workshop on Asia public-key cryptography, AsiaPKC'13, Hangzhou, China, May 8, 2013}, pages = {57--62}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2484389.2484401}, doi = {10.1145/2484389.2484401}, timestamp = {Tue, 10 Nov 2020 16:06:16 +0100}, biburl = {https://dblp.org/rec/conf/ccs/YasudaDTS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/HuMT13, author = {Rong Hu and Kirill Morozov and Tsuyoshi Takagi}, editor = {Kefei Chen and Qi Xie and Weidong Qiu and Ninghui Li and Wen{-}Guey Tzeng}, title = {Proof of plaintext knowledge for code-based public-key encryption revisited}, booktitle = {8th {ACM} Symposium on Information, Computer and Communications Security, {ASIA} {CCS} '13, Hangzhou, China - May 08 - 10, 2013}, pages = {535--540}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2484313.2484385}, doi = {10.1145/2484313.2484385}, timestamp = {Tue, 10 Nov 2020 16:06:16 +0100}, biburl = {https://dblp.org/rec/conf/ccs/HuMT13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/incos/LiuZT13, author = {Zhenhua Liu and Xiangsong Zhang and Tsuyoshi Takagi}, title = {Post-quantum Strongly Unforgeable Identity-Based Signature Scheme from Lattices without Random Oracles}, booktitle = {2013 5th International Conference on Intelligent Networking and Collaborative Systems, Xi'an city, Shaanxi province, China, September 9-11, 2013}, pages = {578--585}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/INCoS.2013.107}, doi = {10.1109/INCOS.2013.107}, timestamp = {Wed, 22 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/incos/LiuZT13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/HuangPST13, author = {Yun{-}Ju Huang and Christophe Petit and Naoyuki Shinohara and Tsuyoshi Takagi}, editor = {Kazuo Sakiyama and Masayuki Terada}, title = {Improvement of Faug{\`{e}}re et al.'s Method to Solve {ECDLP}}, booktitle = {Advances in Information and Computer Security - 8th International Workshop on Security, {IWSEC} 2013, Okinawa, Japan, November 18-20, 2013, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8231}, pages = {115--132}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-41383-4\_8}, doi = {10.1007/978-3-642-41383-4\_8}, timestamp = {Fri, 17 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iwsec/HuangPST13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/KiyomuraT13, author = {Yutaro Kiyomura and Tsuyoshi Takagi}, editor = {Kazuo Sakiyama and Masayuki Terada}, title = {Efficient Algorithm for Tate Pairing of Composite Order}, booktitle = {Advances in Information and Computer Security - 8th International Workshop on Security, {IWSEC} 2013, Okinawa, Japan, November 18-20, 2013, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8231}, pages = {201--216}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-41383-4\_13}, doi = {10.1007/978-3-642-41383-4\_13}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iwsec/KiyomuraT13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/XuMT13, author = {Rui Xu and Kirill Morozov and Tsuyoshi Takagi}, editor = {Kazuo Sakiyama and Masayuki Terada}, title = {On Cheater Identifiable Secret Sharing Schemes Secure against Rushing Adversary}, booktitle = {Advances in Information and Computer Security - 8th International Workshop on Security, {IWSEC} 2013, Okinawa, Japan, November 18-20, 2013, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8231}, pages = {258--271}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-41383-4\_17}, doi = {10.1007/978-3-642-41383-4\_17}, timestamp = {Mon, 06 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iwsec/XuMT13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pqcrypto/MiuraHT13, author = {Hiroyuki Miura and Yasufumi Hashimoto and Tsuyoshi Takagi}, editor = {Philippe Gaborit}, title = {Extended Algorithm for Solving Underdefined Multivariate Quadratic Equations}, booktitle = {Post-Quantum Cryptography - 5th International Workshop, PQCrypto 2013, Limoges, France, June 4-7, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7932}, pages = {118--135}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-38616-9\_8}, doi = {10.1007/978-3-642-38616-9\_8}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pqcrypto/MiuraHT13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pqcrypto/YasudaTS13, author = {Takanori Yasuda and Tsuyoshi Takagi and Kouichi Sakurai}, editor = {Philippe Gaborit}, title = {Multivariate Signature Scheme Using Quadratic Forms}, booktitle = {Post-Quantum Cryptography - 5th International Workshop, PQCrypto 2013, Limoges, France, June 4-7, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7932}, pages = {243--258}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-38616-9\_17}, doi = {10.1007/978-3-642-38616-9\_17}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pqcrypto/YasudaTS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/IshiguroKMT13, author = {Tsukasa Ishiguro and Shinsaku Kiyomoto and Yutaka Miyake and Tsuyoshi Takagi}, title = {Parallel Gauss Sieve Algorithm: Solving the {SVP} in the Ideal Lattice of 128 dimensions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {388}, year = {2013}, url = {http://eprint.iacr.org/2013/388}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/IshiguroKMT13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cee/LiLQT12, author = {Fagen Li and Yongjian Liao and Zhiguang Qin and Tsuyoshi Takagi}, title = {Further improvement of an identity-based signcryption scheme in the standard model}, journal = {Comput. Electr. Eng.}, volume = {38}, number = {2}, pages = {413--421}, year = {2012}, url = {https://doi.org/10.1016/j.compeleceng.2011.11.001}, doi = {10.1016/J.COMPELECENG.2011.11.001}, timestamp = {Wed, 19 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cee/LiLQT12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/concurrency/LiZT12, author = {Fagen Li and Mingwu Zhang and Tsuyoshi Takagi}, title = {Efficient signcryption in the standard model}, journal = {Concurr. Comput. Pract. Exp.}, volume = {24}, number = {17}, pages = {1977--1989}, year = {2012}, url = {https://doi.org/10.1002/cpe.1823}, doi = {10.1002/CPE.1823}, timestamp = {Mon, 02 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/concurrency/LiZT12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/HayashiSWMST12, author = {Takuya Hayashi and Naoyuki Shinohara and Lihua Wang and Shin'ichiro Matsuo and Masaaki Shirase and Tsuyoshi Takagi}, title = {Solving a 676-Bit Discrete Logarithm Problem in GF(3\({}^{\mbox{6\emph{n}}}\))}, journal = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.}, volume = {95-A}, number = {1}, pages = {204--212}, year = {2012}, url = {https://doi.org/10.1587/transfun.E95.A.204}, doi = {10.1587/TRANSFUN.E95.A.204}, timestamp = {Sat, 11 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieicet/HayashiSWMST12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/ZhangTYL12, author = {Mingwu Zhang and Tsuyoshi Takagi and Bo Yang and Fagen Li}, title = {Cryptanalysis of Strong Designated Verifier Signature Scheme with Non-delegatability and Non-transferability}, journal = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.}, volume = {95-A}, number = {1}, pages = {259--262}, year = {2012}, url = {https://doi.org/10.1587/transfun.E95.A.259}, doi = {10.1587/TRANSFUN.E95.A.259}, timestamp = {Sat, 11 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieicet/ZhangTYL12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/ZhangLT12, author = {Mingwu Zhang and Fagen Li and Tsuyoshi Takagi}, title = {Analysis and Improvement of a Secret Broadcast with Binding Encryption in Broadcasting Networks}, journal = {{IEICE} Trans. Inf. Syst.}, volume = {95-D}, number = {2}, pages = {686--689}, year = {2012}, url = {https://doi.org/10.1587/transinf.E95.D.686}, doi = {10.1587/TRANSINF.E95.D.686}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieicet/ZhangLT12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcsc/ZhuHTZ12, author = {Youwen Zhu and Liusheng Huang and Tsuyoshi Takagi and Mingwu Zhang}, title = {Privacy-Preserving {OLAP} for Accurate Answer}, journal = {J. Circuits Syst. Comput.}, volume = {21}, number = {1}, year = {2012}, url = {https://doi.org/10.1142/S0218126612500090}, doi = {10.1142/S0218126612500090}, timestamp = {Tue, 25 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcsc/ZhuHTZ12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/LiKAT12, author = {Fagen Li and Muhammad Khurram Khan and Khaled Alghathbar and Tsuyoshi Takagi}, title = {Identity-based online/offline signcryption for low power devices}, journal = {J. Netw. Comput. Appl.}, volume = {35}, number = {1}, pages = {340--347}, year = {2012}, url = {https://doi.org/10.1016/j.jnca.2011.08.001}, doi = {10.1016/J.JNCA.2011.08.001}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnca/LiKAT12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jsiaml/ZhangT12, author = {Hui Zhang and Tsuyoshi Takagi}, title = {An exhaustive search method to find all small solutions of a multivariate modular linear equation}, journal = {{JSIAM} Lett.}, volume = {4}, pages = {37--40}, year = {2012}, url = {https://doi.org/10.14495/jsiaml.4.37}, doi = {10.14495/JSIAML.4.37}, timestamp = {Wed, 17 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jsiaml/ZhangT12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/ZhangYT12, author = {Mingwu Zhang and Bo Yang and Tsuyoshi Takagi}, title = {Reconciling and improving of multi-receiver signcryption protocols with threshold decryption}, journal = {Secur. Commun. Networks}, volume = {5}, number = {12}, pages = {1430--1440}, year = {2012}, url = {https://doi.org/10.1002/sec.509}, doi = {10.1002/SEC.509}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/ZhangYT12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/wcl/LiZT12, author = {Fagen Li and Di Zhong and Tsuyoshi Takagi}, title = {Practical Identity-Based Signature for Wireless Sensor Networks}, journal = {{IEEE} Wirel. Commun. Lett.}, volume = {1}, number = {6}, pages = {637--640}, year = {2012}, url = {https://doi.org/10.1109/WCL.2012.091312.120488}, doi = {10.1109/WCL.2012.091312.120488}, timestamp = {Wed, 01 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/wcl/LiZT12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/MorozovT12, author = {Kirill Morozov and Tsuyoshi Takagi}, editor = {Willy Susilo and Yi Mu and Jennifer Seberry}, title = {Zero-Knowledge Protocols for the McEliece Encryption}, booktitle = {Information Security and Privacy - 17th Australasian Conference, {ACISP} 2012, Wollongong, NSW, Australia, July 9-11, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7372}, pages = {180--193}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-31448-3\_14}, doi = {10.1007/978-3-642-31448-3\_14}, timestamp = {Tue, 14 May 2019 10:00:46 +0200}, biburl = {https://dblp.org/rec/conf/acisp/MorozovT12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/HayashiSST12, author = {Takuya Hayashi and Takeshi Shimoyama and Naoyuki Shinohara and Tsuyoshi Takagi}, editor = {Xiaoyun Wang and Kazue Sako}, title = {Breaking Pairing-Based Cryptosystems Using {\(\eta\)} {T} Pairing over {GF(397)}}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2012 - 18th International Conference on the Theory and Application of Cryptology and Information Security, Beijing, China, December 2-6, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7658}, pages = {43--60}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-34961-4\_5}, doi = {10.1007/978-3-642-34961-4\_5}, timestamp = {Mon, 25 Nov 2019 15:32:14 +0100}, biburl = {https://dblp.org/rec/conf/asiacrypt/HayashiSST12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ctrsa/YasudaST12, author = {Takanori Yasuda and Kouichi Sakurai and Tsuyoshi Takagi}, editor = {Orr Dunkelman}, title = {Reducing the Key Size of Rainbow Using Non-commutative Rings}, booktitle = {Topics in Cryptology - {CT-RSA} 2012 - The Cryptographers' Track at the {RSA} Conference 2012, San Francisco, CA, USA, February 27 - March 2, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7178}, pages = {68--83}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-27954-6\_5}, doi = {10.1007/978-3-642-27954-6\_5}, timestamp = {Tue, 14 May 2019 10:00:52 +0200}, biburl = {https://dblp.org/rec/conf/ctrsa/YasudaST12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icisc/HakutaKST12, author = {Keisuke Hakuta and Yosuke Katoh and Hisayoshi Sato and Tsuyoshi Takagi}, editor = {Taekyoung Kwon and Mun{-}Kyu Lee and Daesung Kwon}, title = {Batch Verification Suitable for Efficiently Verifying a Limited Number of Signatures}, booktitle = {Information Security and Cryptology - {ICISC} 2012 - 15th International Conference, Seoul, Korea, November 28-30, 2012, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7839}, pages = {425--440}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-37682-5\_30}, doi = {10.1007/978-3-642-37682-5\_30}, timestamp = {Thu, 12 Nov 2020 16:27:41 +0100}, biburl = {https://dblp.org/rec/conf/icisc/HakutaKST12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ispec/ShinoharaSHT12, author = {Naoyuki Shinohara and Takeshi Shimoyama and Takuya Hayashi and Tsuyoshi Takagi}, editor = {Mark Dermot Ryan and Ben Smyth and Guilin Wang}, title = {Key Length Estimation of Pairing-Based Cryptosystems Using {\(\eta\)} {T} Pairing}, booktitle = {Information Security Practice and Experience - 8th International Conference, {ISPEC} 2012, Hangzhou, China, April 9-12, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7232}, pages = {228--244}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-29101-2\_16}, doi = {10.1007/978-3-642-29101-2\_16}, timestamp = {Wed, 07 Dec 2022 23:12:45 +0100}, biburl = {https://dblp.org/rec/conf/ispec/ShinoharaSHT12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/YasudaTS12, author = {Takanori Yasuda and Tsuyoshi Takagi and Kouichi Sakurai}, editor = {Goichiro Hanaoka and Toshihiro Yamauchi}, title = {Application of Scalar Multiplication of Edwards Curves to Pairing-Based Cryptography}, booktitle = {Advances in Information and Computer Security - 7th International Workshop on Security, {IWSEC} 2012, Fukuoka, Japan, November 7-9, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7631}, pages = {19--36}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-34117-5\_2}, doi = {10.1007/978-3-642-34117-5\_2}, timestamp = {Tue, 14 May 2019 10:00:52 +0200}, biburl = {https://dblp.org/rec/conf/iwsec/YasudaTS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/ZhuTH12, author = {Youwen Zhu and Tsuyoshi Takagi and Liusheng Huang}, editor = {Goichiro Hanaoka and Toshihiro Yamauchi}, title = {Efficient Secure Primitive for Privacy Preserving Distributed Computations}, booktitle = {Advances in Information and Computer Security - 7th International Workshop on Security, {IWSEC} 2012, Fukuoka, Japan, November 7-9, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7631}, pages = {233--243}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-34117-5\_15}, doi = {10.1007/978-3-642-34117-5\_15}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iwsec/ZhuTH12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/provsec/2012, editor = {Tsuyoshi Takagi and Guilin Wang and Zhiguang Qin and Shaoquan Jiang and Yong Yu}, title = {Provable Security - 6th International Conference, ProvSec 2012, Chengdu, China, September 26-28, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7496}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-33272-2}, doi = {10.1007/978-3-642-33272-2}, isbn = {978-3-642-33271-5}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/provsec/2012.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ShinoharaSHT12, author = {Naoyuki Shinohara and Takeshi Shimoyama and Takuya Hayashi and Tsuyoshi Takagi}, title = {Key Length Estimation of Pairing-based Cryptosystems using {\(\eta\)}\({}_{\mbox{T}}\) Pairing}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {42}, year = {2012}, url = {http://eprint.iacr.org/2012/042}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ShinoharaSHT12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/HayashiSST12, author = {Takuya Hayashi and Takeshi Shimoyama and Naoyuki Shinohara and Tsuyoshi Takagi}, title = {Breaking pairing-based cryptosystems using {\(\eta\)}\({}_{\mbox{T}}\) pairing over GF(3\({}^{\mbox{97}}\))}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {345}, year = {2012}, url = {http://eprint.iacr.org/2012/345}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/HayashiSST12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/KawaharaKTT11, author = {Yuto Kawahara and Tetsutaro Kobayashi and Gen Takahashi and Tsuyoshi Takagi}, title = {Faster MapToPoint on Supersingular Elliptic Curves in Characteristic 3}, journal = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.}, volume = {94-A}, number = {1}, pages = {150--155}, year = {2011}, url = {https://doi.org/10.1587/transfun.E94.A.150}, doi = {10.1587/TRANSFUN.E94.A.150}, timestamp = {Sat, 11 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieicet/KawaharaKTT11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/LiDT11, author = {Fagen Li and Jiang Deng and Tsuyoshi Takagi}, title = {An Improved Authenticated Encryption Scheme}, journal = {{IEICE} Trans. Inf. Syst.}, volume = {94-D}, number = {11}, pages = {2171--2172}, year = {2011}, url = {https://doi.org/10.1587/transinf.E94.D.2171}, doi = {10.1587/TRANSINF.E94.D.2171}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieicet/LiDT11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnsec/ZhangYZT11, author = {Mingwu Zhang and Bo Yang and Wenzheng Zhang and Tsuyoshi Takagi}, title = {Multibiometric Based Secure Encryption, Authentication Scheme with Fuzzy Extractor}, journal = {Int. J. Netw. Secur.}, volume = {12}, number = {1}, pages = {50--57}, year = {2011}, url = {http://ijns.jalaxy.com.tw/contents/ijns-v12-n1/ijns-2011-v12-n1-p50-57.pdf}, timestamp = {Mon, 04 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijnsec/ZhangYZT11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnsec/ZhangYZLT11, author = {Mingwu Zhang and Bo Yang and Yusheng Zhong and Pengcheng Li and Tsuyoshi Takagi}, title = {Cryptanalysis and Fixed of Short Signature Scheme without Random Oracle from Bilinear Parings}, journal = {Int. J. Netw. Secur.}, volume = {12}, number = {3}, pages = {130--136}, year = {2011}, url = {http://ijns.jalaxy.com.tw/contents/ijns-v12-n3/ijns-2011-v12-n3-p130-136.pdf}, timestamp = {Mon, 04 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijnsec/ZhangYZLT11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isci/ZhangYT11, author = {Mingwu Zhang and Bo Yang and Tsuyoshi Takagi}, title = {Group-oriented setting's multisigncryption scheme with threshold designcryption}, journal = {Inf. Sci.}, volume = {181}, number = {18}, pages = {4041--4050}, year = {2011}, url = {https://doi.org/10.1016/j.ins.2011.05.005}, doi = {10.1016/J.INS.2011.05.005}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isci/ZhangYT11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/ZhangT11, author = {Mingwu Zhang and Tsuyoshi Takagi}, editor = {Udaya Parampalli and Philip Hawkes}, title = {GeoEnc: Geometric Area Based Keys and Policies in Functional Encryption Systems}, booktitle = {Information Security and Privacy - 16th Australasian Conference, {ACISP} 2011, Melbourne, Australia, July 11-13, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6812}, pages = {241--258}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-22497-3\_16}, doi = {10.1007/978-3-642-22497-3\_16}, timestamp = {Tue, 14 May 2019 10:00:46 +0200}, biburl = {https://dblp.org/rec/conf/acisp/ZhangT11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/codcry/HayasakaT11, author = {Kenichiro Hayasaka and Tsuyoshi Takagi}, editor = {Yeow Meng Chee and Zhenbo Guo and San Ling and Fengjing Shao and Yuansheng Tang and Huaxiong Wang and Chaoping Xing}, title = {An Experiment of Number Field Sieve over GF(\emph{p}) of Low Hamming Weight Characteristic}, booktitle = {Coding and Cryptology - Third International Workshop, {IWCC} 2011, Qingdao, China, May 30-June 3, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6639}, pages = {191--200}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-20901-7\_11}, doi = {10.1007/978-3-642-20901-7\_11}, timestamp = {Tue, 14 May 2019 10:00:39 +0200}, biburl = {https://dblp.org/rec/conf/codcry/HayasakaT11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/paisi/ZhangTY11, author = {Mingwu Zhang and Tsuyoshi Takagi and Bo Yang}, editor = {Michael Chau and G. Alan Wang and Xiaolong Zheng and Hsinchun Chen and Daniel Zeng and Wenji Mao}, title = {Dual-Verifiers {DVS} with Message Recovery for Tolerant Routing in Wireless Sensor Networks}, booktitle = {Intelligence and Security Informatics - Pacific Asia Workshop, {PAISI} 2011, Beijing, China, July 9, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6749}, pages = {71--84}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-22039-5\_8}, doi = {10.1007/978-3-642-22039-5\_8}, timestamp = {Mon, 15 May 2023 16:24:40 +0200}, biburl = {https://dblp.org/rec/conf/paisi/ZhangTY11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pqcrypto/HashimotoTS11, author = {Yasufumi Hashimoto and Tsuyoshi Takagi and Kouichi Sakurai}, editor = {Bo{-}Yin Yang}, title = {General Fault Attacks on Multivariate Public Key Cryptosystems}, booktitle = {Post-Quantum Cryptography - 4th International Workshop, PQCrypto 2011, Taipei, Taiwan, November 29 - December 2, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7071}, pages = {1--18}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-25405-5\_1}, doi = {10.1007/978-3-642-25405-5\_1}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pqcrypto/HashimotoTS11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/provsec/LiMZT11, author = {Fagen Li and Fahad Bin Muhaya and Mingwu Zhang and Tsuyoshi Takagi}, editor = {Xavier Boyen and Xiaofeng Chen}, title = {Efficient Identity-Based Signcryption in the Standard Model}, booktitle = {Provable Security - 5th International Conference, ProvSec 2011, Xi'an, China, October 16-18, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6980}, pages = {120--137}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-24316-5\_10}, doi = {10.1007/978-3-642-24316-5\_10}, timestamp = {Tue, 14 May 2019 10:00:45 +0200}, biburl = {https://dblp.org/rec/conf/provsec/LiMZT11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/provsec/ZhangNYT11, author = {Mingwu Zhang and Takashi Nishide and Bo Yang and Tsuyoshi Takagi}, editor = {Xavier Boyen and Xiaofeng Chen}, title = {Anonymous Encryption with Partial-Order Subset Delegation Functionality}, booktitle = {Provable Security - 5th International Conference, ProvSec 2011, Xi'an, China, October 16-18, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6980}, pages = {154--169}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-24316-5\_12}, doi = {10.1007/978-3-642-24316-5\_12}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/provsec/ZhangNYT11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/ches/2011, editor = {Bart Preneel and Tsuyoshi Takagi}, title = {Cryptographic Hardware and Embedded Systems - {CHES} 2011 - 13th International Workshop, Nara, Japan, September 28 - October 1, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6917}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-23951-9}, doi = {10.1007/978-3-642-23951-9}, isbn = {978-3-642-23950-2}, timestamp = {Sat, 19 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ches/2011.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KatohHCT11, author = {Yosuke Katoh and Yun{-}Ju Huang and Chen{-}Mou Cheng and Tsuyoshi Takagi}, title = {Efficient Implementation of the eta\({}_{\mbox{T}}\) Pairing on {GPU}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {540}, year = {2011}, url = {http://eprint.iacr.org/2011/540}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KatohHCT11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cee/BeuchatDFIIKKMOOSSSTVY10, author = {Jean{-}Luc Beuchat and Hiroshi Doi and Kaoru Fujita and Atsuo Inomata and Piseth Ith and Akira Kanaoka and Masayoshi Katouno and Masahiro Mambo and Eiji Okamoto and Takeshi Okamoto and Takaaki Shiga and Masaaki Shirase and Ryuji Soga and Tsuyoshi Takagi and Ananda Vithanage and Hiroyasu Yamamoto}, title = {{FPGA} and {ASIC} implementations of the eta\({}_{\mbox{T}}\) pairing in characteristic three}, journal = {Comput. Electr. Eng.}, volume = {36}, number = {1}, pages = {73--87}, year = {2010}, url = {https://doi.org/10.1016/j.compeleceng.2009.05.001}, doi = {10.1016/J.COMPELECENG.2009.05.001}, timestamp = {Mon, 26 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cee/BeuchatDFIIKKMOOSSSTVY10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/chinaf/LiST10, author = {Fagen Li and Masaaki Shirase and Tsuyoshi Takagi}, title = {Cryptanalysis of efficient proxy signature schemes for mobile communication}, journal = {Sci. China Inf. Sci.}, volume = {53}, number = {10}, pages = {2016--2021}, year = {2010}, url = {https://doi.org/10.1007/s11432-010-4012-y}, doi = {10.1007/S11432-010-4012-Y}, timestamp = {Mon, 02 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/chinaf/LiST10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jmc/HakutaST10, author = {Keisuke Hakuta and Hisayoshi Sato and Tsuyoshi Takagi}, title = {Efficient arithmetic on subfield elliptic curves over small finite fields of odd characteristic}, journal = {J. Math. Cryptol.}, volume = {4}, number = {3}, pages = {199--238}, year = {2010}, url = {https://doi.org/10.1515/jmc.2010.009}, doi = {10.1515/JMC.2010.009}, timestamp = {Wed, 17 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jmc/HakutaST10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/IyamaKFTT10, author = {Tadashi Iyama and Shinsaku Kiyomoto and Kazuhide Fukushima and Toshiaki Tanaka and Tsuyoshi Takagi}, editor = {Isao Echizen and Noboru Kunihiro and Ry{\^{o}}ichi Sasaki}, title = {Efficient Implementation of Pairing on {BREW} Mobile Phones}, booktitle = {Advances in Information and Computer Security - 5th International Workshop on Security, {IWSEC} 2010, Kobe, Japan, November 22-24, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6434}, pages = {326--336}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-16825-3\_22}, doi = {10.1007/978-3-642-16825-3\_22}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iwsec/IyamaKFTT10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/paisi/ZhangYTSZ10, author = {Mingwu Zhang and Bo Yang and Tsuyoshi Takagi and Yanping Shen and Wenzheng Zhang}, editor = {Hsinchun Chen and Michael Chau and Shu{-}Hsing Li and Shalini R. Urs and Srinath Srinivasa and G. Alan Wang}, title = {Fuzzy Biometric Signcryption Scheme with Bilinear Pairings in the Standard Model}, booktitle = {Intelligence and Security Informatics, Pacific Asia Workshop, {PAISI} 2010, Hyderabad, India, June 21, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6122}, pages = {77--87}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-13601-6\_10}, doi = {10.1007/978-3-642-13601-6\_10}, timestamp = {Tue, 14 May 2019 10:00:49 +0200}, biburl = {https://dblp.org/rec/conf/paisi/ZhangYTSZ10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/paisi/ZhangLYWT10, author = {Mingwu Zhang and Pengcheng Li and Bo Yang and Hao Wang and Tsuyoshi Takagi}, editor = {Hsinchun Chen and Michael Chau and Shu{-}Hsing Li and Shalini R. Urs and Srinath Srinivasa and G. Alan Wang}, title = {Towards Confidentiality of ID-Based Signcryption Schemes under without Random Oracle Model}, booktitle = {Intelligence and Security Informatics, Pacific Asia Workshop, {PAISI} 2010, Hyderabad, India, June 21, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6122}, pages = {98--104}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-13601-6\_12}, doi = {10.1007/978-3-642-13601-6\_12}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/paisi/ZhangLYWT10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/HayashiSWMST10, author = {Takuya Hayashi and Naoyuki Shinohara and Lihua Wang and Shin'ichiro Matsuo and Masaaki Shirase and Tsuyoshi Takagi}, editor = {Phong Q. Nguyen and David Pointcheval}, title = {Solving a 676-Bit Discrete Logarithm Problem in GF(3\({}^{\mbox{6\emph{n}}}\))}, booktitle = {Public Key Cryptography - {PKC} 2010, 13th International Conference on Practice and Theory in Public Key Cryptography, Paris, France, May 26-28, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6056}, pages = {351--367}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-13013-7\_21}, doi = {10.1007/978-3-642-13013-7\_21}, timestamp = {Fri, 01 May 2020 18:32:25 +0200}, biburl = {https://dblp.org/rec/conf/pkc/HayashiSWMST10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/HayashiSWMST10, author = {Takuya Hayashi and Naoyuki Shinohara and Lihua Wang and Shin'ichiro Matsuo and Masaaki Shirase and Tsuyoshi Takagi}, title = {Solving a 676-bit Discrete Logarithm Problem in GF(3\({}^{\mbox{6n}}\))}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {90}, year = {2010}, url = {http://eprint.iacr.org/2010/090}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/HayashiSWMST10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/csi/RyuT09, author = {Eun{-}Kyung Ryu and Tsuyoshi Takagi}, title = {A hybrid approach for privacy-preserving {RFID} tags}, journal = {Comput. Stand. Interfaces}, volume = {31}, number = {4}, pages = {812--815}, year = {2009}, url = {https://doi.org/10.1016/j.csi.2008.09.001}, doi = {10.1016/J.CSI.2008.09.001}, timestamp = {Thu, 20 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/csi/RyuT09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/SuBZTS09, author = {Chunhua Su and Feng Bao and Jianying Zhou and Tsuyoshi Takagi and Kouichi Sakurai}, title = {Security and Correctness Analysis on Privacy-Preserving \emph{k}-Means Clustering Schemes}, journal = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.}, volume = {92-A}, number = {4}, pages = {1246--1250}, year = {2009}, url = {https://doi.org/10.1587/transfun.E92.A.1246}, doi = {10.1587/TRANSFUN.E92.A.1246}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieicet/SuBZTS09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/ShiraseMTHC09, author = {Masaaki Shirase and Yukinori Miyazaki and Tsuyoshi Takagi and Dong{-}Guk Han and Dooho Choi}, title = {Efficient Implementation of Pairing-Based Cryptography on a Sensor Node}, journal = {{IEICE} Trans. Inf. Syst.}, volume = {92-D}, number = {5}, pages = {909--917}, year = {2009}, url = {https://doi.org/10.1587/transinf.E92.D.909}, doi = {10.1587/TRANSINF.E92.D.909}, timestamp = {Sat, 11 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieicet/ShiraseMTHC09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/SuBZTS09a, author = {Chunhua Su and Feng Bao and Jianying Zhou and Tsuyoshi Takagi and Kouichi Sakurai}, title = {Distributed Noise Generation for Density Estimation Based Clustering without Trusted Third Party}, journal = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.}, volume = {92-A}, number = {8}, pages = {1868--1871}, year = {2009}, url = {https://doi.org/10.1587/transfun.E92.A.1868}, doi = {10.1587/TRANSFUN.E92.A.1868}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieicet/SuBZTS09a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tit/KurosawaT09, author = {Kaoru Kurosawa and Tsuyoshi Takagi}, title = {One-wayness equivalent to general factoring}, journal = {{IEEE} Trans. Inf. Theory}, volume = {55}, number = {9}, pages = {4249--4262}, year = {2009}, url = {https://doi.org/10.1109/TIT.2009.2025532}, doi = {10.1109/TIT.2009.2025532}, timestamp = {Tue, 10 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tit/KurosawaT09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEares/LiST09, author = {Fagen Li and Masaaki Shirase and Tsuyoshi Takagi}, title = {Identity-Based Hybrid Signcryption}, booktitle = {Proceedings of the The Forth International Conference on Availability, Reliability and Security, {ARES} 2009, March 16-19, 2009, Fukuoka, Japan}, pages = {534--539}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/ARES.2009.44}, doi = {10.1109/ARES.2009.44}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/IEEEares/LiST09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ispec/LiST09, author = {Fagen Li and Masaaki Shirase and Tsuyoshi Takagi}, editor = {Feng Bao and Hui Li and Guilin Wang}, title = {Certificateless Hybrid Signcryption}, booktitle = {Information Security Practice and Experience, 5th International Conference, {ISPEC} 2009, Xi'an, China, April 13-15, 2009, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5451}, pages = {112--123}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-00843-6\_11}, doi = {10.1007/978-3-642-00843-6\_11}, timestamp = {Tue, 14 May 2019 10:00:40 +0200}, biburl = {https://dblp.org/rec/conf/ispec/LiST09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacrypt/SasakiNST09, author = {Yuta Sasaki and Satsuki Nishina and Masaaki Shirase and Tsuyoshi Takagi}, editor = {Michael J. Jacobson Jr. and Vincent Rijmen and Reihaneh Safavi{-}Naini}, title = {An Efficient Residue Group Multiplication for the eta\({}_{\mbox{\emph{T}}}\) Pairing over F\({}_{\mbox{3\({}^{\mbox{m}}\)}}\)}, booktitle = {Selected Areas in Cryptography, 16th Annual International Workshop, {SAC} 2009, Calgary, Alberta, Canada, August 13-14, 2009, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {5867}, pages = {364--375}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-05445-7\_23}, doi = {10.1007/978-3-642-05445-7\_23}, timestamp = {Tue, 14 May 2019 10:00:38 +0200}, biburl = {https://dblp.org/rec/conf/sacrypt/SasakiNST09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/iwsec/2009, editor = {Tsuyoshi Takagi and Masahiro Mambo}, title = {Advances in Information and Computer Security, 4th International Workshop on Security, {IWSEC} 2009, Toyama, Japan, October 28-30, 2009, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5824}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-04846-3}, doi = {10.1007/978-3-642-04846-3}, isbn = {978-3-642-04845-6}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iwsec/2009.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LiST09, author = {Fagen Li and Masaaki Shirase and Tsuyoshi Takagi}, title = {Certificateless Hybrid Signcryption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {162}, year = {2009}, url = {http://eprint.iacr.org/2009/162}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LiST09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LiST09a, author = {Fagen Li and Masaaki Shirase and Tsuyoshi Takagi}, title = {Identity-Based Hybrid Signcryption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {455}, year = {2009}, url = {http://eprint.iacr.org/2009/455}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LiST09a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/ShiraseTO08, author = {Masaaki Shirase and Tsuyoshi Takagi and Eiji Okamoto}, title = {Some Efficient Algorithms for the Final Exponentiation of eta\({}^{\mbox{T}}\) Pairing}, journal = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.}, volume = {91-A}, number = {1}, pages = {221--228}, year = {2008}, url = {https://doi.org/10.1093/ietfec/e91-a.1.221}, doi = {10.1093/IETFEC/E91-A.1.221}, timestamp = {Sat, 11 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieicet/ShiraseTO08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/YoshitomiTKT08, author = {Motoi Yoshitomi and Tsuyoshi Takagi and Shinsaku Kiyomoto and Toshiaki Tanaka}, title = {Efficient Implementation of the Pairing on Mobilephones Using {BREW}}, journal = {{IEICE} Trans. Inf. Syst.}, volume = {91-D}, number = {5}, pages = {1330--1337}, year = {2008}, url = {https://doi.org/10.1093/ietisy/e91-d.5.1330}, doi = {10.1093/IETISY/E91-D.5.1330}, timestamp = {Sat, 11 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieicet/YoshitomiTKT08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/NakajimaIT08, author = {Toshiya Nakajima and Tetsuya Izu and Tsuyoshi Takagi}, title = {Reduction Optimal Trinomials for Efficient Software Implementation of the eta\({}_{\mbox{T}}\) Pairing}, journal = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.}, volume = {91-A}, number = {9}, pages = {2379--2386}, year = {2008}, url = {https://doi.org/10.1093/ietfec/e91-a.9.2379}, doi = {10.1093/IETFEC/E91-A.9.2379}, timestamp = {Sat, 11 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieicet/NakajimaIT08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/ShiraseHHKT08, author = {Masaaki Shirase and Dong{-}Guk Han and Yasushi Hibino and Howon Kim and Tsuyoshi Takagi}, title = {A More Compact Representation of {XTR} Cryptosystem}, journal = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.}, volume = {91-A}, number = {10}, pages = {2843--2850}, year = {2008}, url = {https://doi.org/10.1093/ietfec/e91-a.10.2843}, doi = {10.1093/IETFEC/E91-A.10.2843}, timestamp = {Wed, 01 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieicet/ShiraseHHKT08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tc/VuillaumeOT08, author = {Camille Vuillaume and Katsuyuki Okeya and Tsuyoshi Takagi}, title = {Short-Memory Scalar Multiplication for Koblitz Curves}, journal = {{IEEE} Trans. Computers}, volume = {57}, number = {4}, pages = {481--489}, year = {2008}, url = {https://doi.org/10.1109/TC.2007.70824}, doi = {10.1109/TC.2007.70824}, timestamp = {Sat, 20 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tc/VuillaumeOT08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tc/BeuchatBDOST08, author = {Jean{-}Luc Beuchat and Nicolas Brisebarre and J{\'{e}}r{\'{e}}mie Detrey and Eiji Okamoto and Masaaki Shirase and Tsuyoshi Takagi}, title = {Algorithms and Arithmetic Operators for Computing the etaT Pairing in Characteristic Three}, journal = {{IEEE} Trans. Computers}, volume = {57}, number = {11}, pages = {1454--1468}, year = {2008}, url = {https://doi.org/10.1109/TC.2008.103}, doi = {10.1109/TC.2008.103}, timestamp = {Mon, 26 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tc/BeuchatBDOST08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEares/SuBZTS08, author = {Chunhua Su and Feng Bao and Jianying Zhou and Tsuyoshi Takagi and Kouichi Sakurai}, title = {A New Scheme for Distributed Density Estimation based Privacy-Preserving Clustering}, booktitle = {Proceedings of the The Third International Conference on Availability, Reliability and Security, {ARES} 2008, March 4-7, 2008, Technical University of Catalonia, Barcelona , Spain}, pages = {112--119}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/ARES.2008.129}, doi = {10.1109/ARES.2008.129}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/IEEEares/SuBZTS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEares/OsakaCTYT08, author = {Kyosuke Osaka and Shuang Chang and Tsuyoshi Takagi and Kenichi Yamazaki and Osamu Takahashi}, title = {A Secure {RFID} Protocol based on Insubvertible Encryption Using Guardian Proxy}, booktitle = {Proceedings of the The Third International Conference on Availability, Reliability and Security, {ARES} 2008, March 4-7, 2008, Technical University of Catalonia, Barcelona , Spain}, pages = {733--740}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/ARES.2008.91}, doi = {10.1109/ARES.2008.91}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/IEEEares/OsakaCTYT08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cans/LiST08, author = {Fagen Li and Masaaki Shirase and Tsuyoshi Takagi}, editor = {Matthew K. Franklin and Lucas Chi Kwong Hui and Duncan S. Wong}, title = {On the Security of Online/Offline Signatures and Multisignatures from ACISP'06}, booktitle = {Cryptology and Network Security, 7th International Conference, {CANS} 2008, Hong-Kong, China, December 2-4, 2008. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5339}, pages = {108--119}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-89641-8\_8}, doi = {10.1007/978-3-540-89641-8\_8}, timestamp = {Tue, 14 May 2019 10:00:50 +0200}, biburl = {https://dblp.org/rec/conf/cans/LiST08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisc/LiST08, author = {Fagen Li and Masaaki Shirase and Tsuyoshi Takagi}, editor = {Moti Yung and Peng Liu and Dongdai Lin}, title = {Efficient Signcryption Key Encapsulation without Random Oracles}, booktitle = {Information Security and Cryptology, 4th International Conference, Inscrypt 2008, Beijing, China, December 14-17, 2008, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {5487}, pages = {47--59}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-642-01440-6\_6}, doi = {10.1007/978-3-642-01440-6\_6}, timestamp = {Tue, 14 May 2019 10:00:52 +0200}, biburl = {https://dblp.org/rec/conf/cisc/LiST08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisc/LiST08a, author = {Fagen Li and Masaaki Shirase and Tsuyoshi Takagi}, editor = {Moti Yung and Peng Liu and Dongdai Lin}, title = {Efficient Multi-PKG ID-Based Signcryption for Ad Hoc Networks}, booktitle = {Information Security and Cryptology, 4th International Conference, Inscrypt 2008, Beijing, China, December 14-17, 2008, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {5487}, pages = {289--304}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-642-01440-6\_23}, doi = {10.1007/978-3-642-01440-6\_23}, timestamp = {Mon, 22 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cisc/LiST08a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ispec/ShiraseTO08, author = {Masaaki Shirase and Tsuyoshi Takagi and Eiji Okamoto}, editor = {Liqun Chen and Yi Mu and Willy Susilo}, title = {An Efficient Countermeasure against Side Channel Attacks for Pairing Computation}, booktitle = {Information Security Practice and Experience, 4th International Conference, {ISPEC} 2008, Sydney, Australia, April 21-23, 2008, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4991}, pages = {290--303}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-79104-1\_21}, doi = {10.1007/978-3-540-79104-1\_21}, timestamp = {Tue, 14 May 2019 10:00:40 +0200}, biburl = {https://dblp.org/rec/conf/ispec/ShiraseTO08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ispec/HakutaST08, author = {Keisuke Hakuta and Hisayoshi Sato and Tsuyoshi Takagi}, editor = {Liqun Chen and Yi Mu and Willy Susilo}, title = {Efficient Arithmetic on Subfield Elliptic Curves over Small Finite Fields of Odd Characteristic}, booktitle = {Information Security Practice and Experience, 4th International Conference, {ISPEC} 2008, Sydney, Australia, April 21-23, 2008, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4991}, pages = {304--318}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-79104-1\_22}, doi = {10.1007/978-3-540-79104-1\_22}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ispec/HakutaST08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/kes/OtakaTT08, author = {Akira Otaka and Tsuyoshi Takagi and Osamu Takahashi}, editor = {Ignac Lovrek and Robert J. Howlett and Lakhmi C. Jain}, title = {Network Forensics on Mobile Ad-Hoc Networks}, booktitle = {Knowledge-Based Intelligent Information and Engineering Systems, 12th International Conference, {KES} 2008, Zagreb, Croatia, September 3-5, 2008, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {5179}, pages = {175--182}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-85567-5\_23}, doi = {10.1007/978-3-540-85567-5\_23}, timestamp = {Tue, 14 May 2019 10:00:51 +0200}, biburl = {https://dblp.org/rec/conf/kes/OtakaTT08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/npc/LiST08, author = {Fagen Li and Masaaki Shirase and Tsuyoshi Takagi}, editor = {Jian Cao and Minglu Li and Min{-}You Wu and Jinjun Chen}, title = {Key Management Using Certificateless Public Key Cryptography in Ad Hoc Networks}, booktitle = {Network and Parallel Computing, {IFIP} International Conference, {NPC} 2008, Shanghai, China, October 18-20, 2008. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5245}, pages = {116--126}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-88140-7\_11}, doi = {10.1007/978-3-540-88140-7\_11}, timestamp = {Sun, 28 Feb 2021 15:43:32 +0100}, biburl = {https://dblp.org/rec/conf/npc/LiST08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pairing/KawaharaAT08, author = {Yuto Kawahara and Kazumaro Aoki and Tsuyoshi Takagi}, editor = {Steven D. Galbraith and Kenneth G. Paterson}, title = {Faster Implementation of eta-T Pairing over GF(3\({}^{\mbox{m}}\)) Using Minimum Number of Logical Instructions for GF(3)-Addition}, booktitle = {Pairing-Based Cryptography - Pairing 2008, Second International Conference, Egham, UK, September 1-3, 2008. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5209}, pages = {282--296}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-85538-5\_19}, doi = {10.1007/978-3-540-85538-5\_19}, timestamp = {Tue, 14 May 2019 10:00:42 +0200}, biburl = {https://dblp.org/rec/conf/pairing/KawaharaAT08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pqcrypto/DahmenOTV08, author = {Erik Dahmen and Katsuyuki Okeya and Tsuyoshi Takagi and Camille Vuillaume}, editor = {Johannes Buchmann and Jintai Ding}, title = {Digital Signatures Out of Second-Preimage Resistant Hash Functions}, booktitle = {Post-Quantum Cryptography, Second International Workshop, PQCrypto 2008, Cincinnati, OH, USA, October 17-19, 2008, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5299}, pages = {109--123}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-88403-3\_8}, doi = {10.1007/978-3-540-88403-3\_8}, timestamp = {Mon, 16 Nov 2020 15:55:50 +0100}, biburl = {https://dblp.org/rec/conf/pqcrypto/DahmenOTV08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BeuchatDFIIKKMOOSSSTVY08, author = {Jean{-}Luc Beuchat and Hiroshi Doi and Kaoru Fujita and Atsuo Inomata and Piseth Ith and Akira Kanaoka and Masayoshi Katouno and Masahiro Mambo and Eiji Okamoto and Takeshi Okamoto and Takaaki Shiga and Masaaki Shirase and Ryuji Soga and Tsuyoshi Takagi and Ananda Vithanage and Hiroyasu Yamamoto}, title = {{FPGA} and {ASIC} Implementations of the eta\({}_{\mbox{T}}\) Pairing in Characteristic Three}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {280}, year = {2008}, url = {http://eprint.iacr.org/2008/280}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BeuchatDFIIKKMOOSSSTVY08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/LiST08, author = {Fagen Li and Masaaki Shirase and Tsuyoshi Takagi}, title = {Analysis and Improvement of Authenticatable Ring Signcryption Scheme}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {373}, year = {2008}, url = {http://eprint.iacr.org/2008/373}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/LiST08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/DahmenOT07, author = {Erik Dahmen and Katsuyuki Okeya and Tsuyoshi Takagi}, title = {A New Upper Bound for the Minimal Density of Joint Representations in Elliptic Curve Cryptosystems}, journal = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.}, volume = {90-A}, number = {5}, pages = {952--959}, year = {2007}, url = {https://doi.org/10.1093/ietfec/e90-a.5.952}, doi = {10.1093/IETFEC/E90-A.5.952}, timestamp = {Sat, 11 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieicet/DahmenOT07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acns/ShiraseHHKT07, author = {Masaaki Shirase and Dong{-}Guk Han and Yasushi Hibino and Ho Won Kim and Tsuyoshi Takagi}, editor = {Jonathan Katz and Moti Yung}, title = {Compressed {XTR}}, booktitle = {Applied Cryptography and Network Security, 5th International Conference, {ACNS} 2007, Zhuhai, China, June 5-8, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4521}, pages = {420--431}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-72738-5\_27}, doi = {10.1007/978-3-540-72738-5\_27}, timestamp = {Wed, 01 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/acns/ShiraseHHKT07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/aina/SuBZTS07, author = {Chunhua Su and Feng Bao and Jianying Zhou and Tsuyoshi Takagi and Kouichi Sakurai}, title = {Privacy-Preserving Two-Party K-Means Clustering via Secure Approximation}, booktitle = {21st International Conference on Advanced Information Networking and Applications {(AINA} 2007), Workshops Proceedings, Volume 1, May 21-23, 2007, Niagara Falls, Canada}, pages = {385--391}, publisher = {{IEEE} Computer Society}, year = {2007}, url = {https://doi.org/10.1109/AINAW.2007.295}, doi = {10.1109/AINAW.2007.295}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/aina/SuBZTS07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/aina/RyuT07, author = {Eun{-}Kyung Ryu and Tsuyoshi Takagi}, title = {Efficient Conjunctive Keyword-Searchable Encryption}, booktitle = {21st International Conference on Advanced Information Networking and Applications {(AINA} 2007), Workshops Proceedings, Volume 1, May 21-23, 2007, Niagara Falls, Canada}, pages = {409--414}, publisher = {{IEEE} Computer Society}, year = {2007}, url = {https://doi.org/10.1109/AINAW.2007.166}, doi = {10.1109/AINAW.2007.166}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/aina/RyuT07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/arith/BeuchatSTO07, author = {Jean{-}Luc Beuchat and Masaaki Shirase and Tsuyoshi Takagi and Eiji Okamoto}, title = {An Algorithm for the nt Pairing Calculation in Characteristic Three and its Hardware Implementation}, booktitle = {18th {IEEE} Symposium on Computer Arithmetic {(ARITH-18} 2007), 25-27 June 2007, Montpellier, France}, pages = {97--104}, publisher = {{IEEE} Computer Society}, year = {2007}, url = {https://doi.org/10.1109/ARITH.2007.10}, doi = {10.1109/ARITH.2007.10}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/arith/BeuchatSTO07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ispec/SuZBTS07, author = {Chunhua Su and Jianying Zhou and Feng Bao and Tsuyoshi Takagi and Kouichi Sakurai}, editor = {Ed Dawson and Duncan S. Wong}, title = {Two-Party Privacy-Preserving Agglomerative Document Clustering}, booktitle = {Information Security Practice and Experience, Third International Conference, {ISPEC} 2007, Hong Kong, China, May 7-9, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4464}, pages = {193--208}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-72163-5\_16}, doi = {10.1007/978-3-540-72163-5\_16}, timestamp = {Tue, 14 May 2019 10:00:40 +0200}, biburl = {https://dblp.org/rec/conf/ispec/SuZBTS07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ispec/ShiraseTO07, author = {Masaaki Shirase and Tsuyoshi Takagi and Eiji Okamoto}, editor = {Ed Dawson and Duncan S. Wong}, title = {Some Efficient Algorithms for the Final Exponentiation of \emph{eta} \({}_{\mbox{ \emph{T} }}\) Pairing}, booktitle = {Information Security Practice and Experience, Third International Conference, {ISPEC} 2007, Hong Kong, China, May 7-9, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4464}, pages = {254--268}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-72163-5\_20}, doi = {10.1007/978-3-540-72163-5\_20}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ispec/ShiraseTO07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/NakajimaIT07, author = {Toshiya Nakajima and Tetsuya Izu and Tsuyoshi Takagi}, editor = {Atsuko Miyaji and Hiroaki Kikuchi and Kai Rannenberg}, title = {Reduction Optimal Trinomials for Efficient Software Implementation of the eta\({}_{\mbox{T}}\) Pairing}, booktitle = {Advances in Information and Computer Security, Second International Workshop on Security, {IWSEC} 2007, Nara, Japan, October 29-31, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4752}, pages = {44--57}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-75651-4\_4}, doi = {10.1007/978-3-540-75651-4\_4}, timestamp = {Tue, 14 May 2019 10:00:52 +0200}, biburl = {https://dblp.org/rec/conf/iwsec/NakajimaIT07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/waifi/BeuchatBSTO07, author = {Jean{-}Luc Beuchat and Nicolas Brisebarre and Masaaki Shirase and Tsuyoshi Takagi and Eiji Okamoto}, editor = {Claude Carlet and Berk Sunar}, title = {A Coprocessor for the Final Exponentiation of the \emph{eta} \({}_{\mbox{ \emph{T} }}\) Pairing in Characteristic Three}, booktitle = {Arithmetic of Finite Fields, First International Workshop, {WAIFI} 2007, Madrid, Spain, June 21-22, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4547}, pages = {25--39}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-73074-3\_4}, doi = {10.1007/978-3-540-73074-3\_4}, timestamp = {Sun, 25 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/waifi/BeuchatBSTO07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/ShiraseKTO07, author = {Masaaki Shirase and Yuto Kawahara and Tsuyoshi Takagi and Eiji Okamoto}, editor = {Sehun Kim and Moti Yung and Hyung{-}Woo Lee}, title = {Universal \emph{eta}\({}_{\mbox{T}}\) Pairing Algorithm over Arbitrary Extension Degree}, booktitle = {Information Security Applications, 8th International Workshop, {WISA} 2007, Jeju Island, Korea, August 27-29, 2007, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {4867}, pages = {1--15}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-77535-5\_1}, doi = {10.1007/978-3-540-77535-5\_1}, timestamp = {Tue, 14 May 2019 10:00:35 +0200}, biburl = {https://dblp.org/rec/conf/wisa/ShiraseKTO07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/YoshitomiTKT07, author = {Motoi Yoshitomi and Tsuyoshi Takagi and Shinsaku Kiyomoto and Toshiaki Tanaka}, editor = {Sehun Kim and Moti Yung and Hyung{-}Woo Lee}, title = {Efficient Implementation of the Pairing on Mobilephones Using {BREW}}, booktitle = {Information Security Applications, 8th International Workshop, {WISA} 2007, Jeju Island, Korea, August 27-29, 2007, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {4867}, pages = {203--214}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-77535-5\_15}, doi = {10.1007/978-3-540-77535-5\_15}, timestamp = {Sun, 21 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisa/YoshitomiTKT07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/pairing/2007, editor = {Tsuyoshi Takagi and Tatsuaki Okamoto and Eiji Okamoto and Takeshi Okamoto}, title = {Pairing-Based Cryptography - Pairing 2007, First International Conference, Tokyo, Japan, July 2-4, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4575}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-73489-5}, doi = {10.1007/978-3-540-73489-5}, isbn = {978-3-540-73488-8}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pairing/2007.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BeuchatBSTO07, author = {Jean{-}Luc Beuchat and Nicolas Brisebarre and Masaaki Shirase and Tsuyoshi Takagi and Eiji Okamoto}, title = {A Coprocessor for the Final Exponentiation of the eta\({}_{\mbox{T}}\) Pairing in Characteristic Three}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {45}, year = {2007}, url = {http://eprint.iacr.org/2007/045}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BeuchatBSTO07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BeuchatSTO07, author = {Jean{-}Luc Beuchat and Masaaki Shirase and Tsuyoshi Takagi and Eiji Okamoto}, title = {A Refined Algorithm for the eta\({}_{\mbox{T}}\) Pairing Calculation in Characteristic Three}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {311}, year = {2007}, url = {http://eprint.iacr.org/2007/311}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BeuchatSTO07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/YoshitomiTKT07, author = {Motoi Yoshitomi and Tsuyoshi Takagi and Shinsaku Kiyomoto and Toshiaki Tanaka}, title = {Efficient Implementation of the Pairing on Mobilephones using {BREW}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {340}, year = {2007}, url = {http://eprint.iacr.org/2007/340}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/YoshitomiTKT07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BeuchatBDOST07, author = {Jean{-}Luc Beuchat and Nicolas Brisebarre and J{\'{e}}r{\'{e}}mie Detrey and Eiji Okamoto and Masaaki Shirase and Tsuyoshi Takagi}, title = {Algorithms and Arithmetic Operators for Computing the eta\({}_{\mbox{T}}\) Pairing in Characteristic Three}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {417}, year = {2007}, url = {http://eprint.iacr.org/2007/417}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BeuchatBDOST07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/SatoTTT06, author = {Hisayoshi Sato and Tsuyoshi Takagi and Satoru Tezuka and Kazuo Takaragi}, title = {Generalized Powering Functions and Their Application to Digital Signatures}, journal = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.}, volume = {89-A}, number = {1}, pages = {81--89}, year = {2006}, url = {https://doi.org/10.1093/ietfec/e89-a.1.81}, doi = {10.1093/IETFEC/E89-A.1.81}, timestamp = {Sat, 11 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieicet/SatoTTT06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/TakagiRYW06, author = {Tsuyoshi Takagi and David Reis Jr. and Sung{-}Ming Yen and Bo{-}Ching Wu}, title = {Radix-\emph{r} Non-Adjacent Form and Its Application to Pairing-Based Cryptosystem}, journal = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.}, volume = {89-A}, number = {1}, pages = {115--123}, year = {2006}, url = {https://doi.org/10.1093/ietfec/e89-a.1.115}, doi = {10.1093/IETFEC/E89-A.1.115}, timestamp = {Sat, 11 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieicet/TakagiRYW06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/KatagiAKT06, author = {Masanobu Katagi and Toru Akishita and Izuru Kitamura and Tsuyoshi Takagi}, title = {Efficient Hyperelliptic Curve Cryptosystems Using Theta Divisors}, journal = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.}, volume = {89-A}, number = {1}, pages = {151--160}, year = {2006}, url = {https://doi.org/10.1093/ietfec/e89-a.1.151}, doi = {10.1093/IETFEC/E89-A.1.151}, timestamp = {Sat, 11 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieicet/KatagiAKT06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/OkeyaTV06, author = {Katsuyuki Okeya and Tsuyoshi Takagi and Camille Vuillaume}, title = {Security Analysis of the SPA-Resistant Fractional Width Method}, journal = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.}, volume = {89-A}, number = {1}, pages = {161--168}, year = {2006}, url = {https://doi.org/10.1093/ietfec/e89-a.1.161}, doi = {10.1093/IETFEC/E89-A.1.161}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieicet/OkeyaTV06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/VuillaumeOT06, author = {Camille Vuillaume and Katsuyuki Okeya and Tsuyoshi Takagi}, title = {Defeating Simple Power Analysis on Koblitz Curves}, journal = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.}, volume = {89-A}, number = {5}, pages = {1362--1369}, year = {2006}, url = {https://doi.org/10.1093/ietfec/e89-a.5.1362}, doi = {10.1093/IETFEC/E89-A.5.1362}, timestamp = {Sat, 11 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieicet/VuillaumeOT06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijisec/OkeyaT06, author = {Katsuyuki Okeya and Tsuyoshi Takagi}, title = {Security analysis of CRT-based cryptosystems}, journal = {Int. J. Inf. Sec.}, volume = {5}, number = {3}, pages = {177--185}, year = {2006}, url = {https://doi.org/10.1007/s10207-005-0080-1}, doi = {10.1007/S10207-005-0080-1}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijisec/OkeyaT06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tc/Schmidt-SamoaST06, author = {Katja Schmidt{-}Samoa and Olivier Semay and Tsuyoshi Takagi}, title = {Analysis of Fractional Window Recoding Methods and Their Application to Elliptic Curve Cryptosystems}, journal = {{IEEE} Trans. Computers}, volume = {55}, number = {1}, pages = {48--57}, year = {2006}, url = {https://doi.org/10.1109/TC.2006.3}, doi = {10.1109/TC.2006.3}, timestamp = {Sat, 20 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tc/Schmidt-SamoaST06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/KurosawaT06, author = {Kaoru Kurosawa and Tsuyoshi Takagi}, editor = {Xuejia Lai and Kefei Chen}, title = {New Approach for Selectively Convertible Undeniable Signature Schemes}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2006, 12th International Conference on the Theory and Application of Cryptology and Information Security, Shanghai, China, December 3-7, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4284}, pages = {428--443}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11935230\_28}, doi = {10.1007/11935230\_28}, timestamp = {Tue, 14 May 2019 10:00:40 +0200}, biburl = {https://dblp.org/rec/conf/asiacrypt/KurosawaT06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cans/KimTHKL06, author = {Tae Hyun Kim and Tsuyoshi Takagi and Dong{-}Guk Han and Ho Won Kim and Jongin Lim}, editor = {David Pointcheval and Yi Mu and Kefei Chen}, title = {Side Channel Attacks and Countermeasures on Pairing Based Cryptosystems over Binary Fields}, booktitle = {Cryptology and Network Security, 5th International Conference, {CANS} 2006, Suzhou, China, December 8-10, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4301}, pages = {168--181}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11935070\_11}, doi = {10.1007/11935070\_11}, timestamp = {Wed, 01 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cans/KimTHKL06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cardis/AkishitaT06, author = {Toru Akishita and Tsuyoshi Takagi}, editor = {Josep Domingo{-}Ferrer and Joachim Posegga and Daniel Schreckling}, title = {Power Analysis to {ECC} Using Differential Power Between Multiplication and Squaring}, booktitle = {Smart Card Research and Advanced Applications, 7th {IFIP} {WG} 8.8/11.2 International Conference, {CARDIS} 2006, Tarragona, Spain, April 19-21, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3928}, pages = {151--164}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11733447\_11}, doi = {10.1007/11733447\_11}, timestamp = {Tue, 14 May 2019 10:00:52 +0200}, biburl = {https://dblp.org/rec/conf/cardis/AkishitaT06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/KawaharaTO06, author = {Yuto Kawahara and Tsuyoshi Takagi and Eiji Okamoto}, editor = {Yuping Wang and Yiu{-}ming Cheung and Hai{-}Lin Liu}, title = {Efficient Implementation of Tate Pairing on a Mobile Phone Using Java}, booktitle = {Computational Intelligence and Security, International Conference, {CIS} 2006, Guangzhou, China, November 3-6, 2006, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {4456}, pages = {396--405}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/978-3-540-74377-4\_42}, doi = {10.1007/978-3-540-74377-4\_42}, timestamp = {Tue, 19 Nov 2019 12:34:54 +0100}, biburl = {https://dblp.org/rec/conf/cis/KawaharaTO06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/OsakaTYT06, author = {Kyosuke Osaka and Tsuyoshi Takagi and Kenichi Yamazaki and Osamu Takahashi}, editor = {Yuping Wang and Yiu{-}ming Cheung and Hai{-}Lin Liu}, title = {An Efficient and Secure {RFID} Security Method with Ownership Transfer}, booktitle = {Computational Intelligence and Security, International Conference, {CIS} 2006, Guangzhou, China, November 3-6, 2006, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {4456}, pages = {778--787}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/978-3-540-74377-4\_81}, doi = {10.1007/978-3-540-74377-4\_81}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cis/OsakaTYT06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccsa/HanTKC06, author = {Dong{-}Guk Han and Tsuyoshi Takagi and Howon Kim and Kyoil Chung}, editor = {Marina L. Gavrilova and Osvaldo Gervasi and Vipin Kumar and Chih Jeng Kenneth Tan and David Taniar and Antonio Lagan{\`{a}} and Youngsong Mun and Hyunseung Choo}, title = {New Security Problem in {RFID} Systems "Tag Killing"}, booktitle = {Computational Science and Its Applications - {ICCSA} 2006, International Conference, Glasgow, UK, May 8-11, 2006, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {3982}, pages = {375--384}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11751595\_41}, doi = {10.1007/11751595\_41}, timestamp = {Wed, 01 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iccsa/HanTKC06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ispec/HanTL06, author = {Dong{-}Guk Han and Tsuyoshi Takagi and Jongin Lim}, editor = {Kefei Chen and Robert H. Deng and Xuejia Lai and Jianying Zhou}, title = {Further Security Analysis of {XTR}}, booktitle = {Information Security Practice and Experience, Second International Conference, {ISPEC} 2006, Hangzhou, China, April 11-14, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3903}, pages = {33--44}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11689522\_4}, doi = {10.1007/11689522\_4}, timestamp = {Thu, 17 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ispec/HanTL06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KimTHKL06, author = {Tae Hyun Kim and Tsuyoshi Takagi and Dong{-}Guk Han and Ho Won Kim and Jongin Lim}, title = {Side Channel Attacks and Countermeasures on Pairing Based Cryptosystems over Binary Fields}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {243}, year = {2006}, url = {http://eprint.iacr.org/2006/243}, timestamp = {Wed, 01 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/KimTHKL06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KawaharaTO06, author = {Yuto Kawahara and Tsuyoshi Takagi and Eiji Okamoto}, title = {Efficient Implementation of Tate Pairing on a Mobile Phone using Java}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {299}, year = {2006}, url = {http://eprint.iacr.org/2006/299}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KawaharaTO06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/BeuchatSTO06, author = {Jean{-}Luc Beuchat and Masaaki Shirase and Tsuyoshi Takagi and Eiji Okamoto}, title = {An Algorithm for the {\(\eta\)}\({}_{\mbox{T}}\) Pairing Calculation in Characteristic Three and its Hardware Implementation}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {327}, year = {2006}, url = {http://eprint.iacr.org/2006/327}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/BeuchatSTO06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ShiraseTO06, author = {Masaaki Shirase and Tsuyoshi Takagi and Eiji Okamoto}, title = {Some Efficient Algorithms for the Final Exponentiation of {\(\eta\)}\({}_{\mbox{T}}\) Pairing}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {431}, year = {2006}, url = {http://eprint.iacr.org/2006/431}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ShiraseTO06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/OkeyaTV05, author = {Katsuyuki Okeya and Tsuyoshi Takagi and Camille Vuillaume}, title = {On the Importance of Protecting in {SFLASH} against Side Channel Attacks}, journal = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.}, volume = {88-A}, number = {1}, pages = {123--131}, year = {2005}, url = {http://search.ieice.org/bin/summary.php?id=e88-a\_1\_123\&\#38;category=D\&\#38;year=2005\&\#38;lang=E\&\#38;abst=}, timestamp = {Sat, 11 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieicet/OkeyaTV05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/AkishitaT05, author = {Toru Akishita and Tsuyoshi Takagi}, title = {Zero-Value Register Attack on Elliptic Curve Cryptosystem}, journal = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.}, volume = {88-A}, number = {1}, pages = {132--139}, year = {2005}, url = {http://search.ieice.org/bin/summary.php?id=e88-a\_1\_132\&\#38;category=D\&\#38;year=2005\&\#38;lang=E\&\#38;abst=}, timestamp = {Sat, 11 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieicet/AkishitaT05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/AkishitaT05a, author = {Toru Akishita and Tsuyoshi Takagi}, title = {On the Optimal Parameter Choice for Elliptic Curve Cryptosystems Using Isogeny}, journal = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.}, volume = {88-A}, number = {1}, pages = {140--146}, year = {2005}, url = {http://search.ieice.org/bin/summary.php?id=e88-a\_1\_140\&\#38;category=D\&\#38;year=2005\&\#38;lang=E\&\#38;abst=}, timestamp = {Sat, 11 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieicet/AkishitaT05a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/IzuT05, author = {Tetsuya Izu and Tsuyoshi Takagi}, title = {Fast Elliptic Curve Multiplications Resistant against Side Channel Attacks}, journal = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.}, volume = {88-A}, number = {1}, pages = {161--171}, year = {2005}, url = {http://search.ieice.org/bin/summary.php?id=e88-a\_1\_161\&\#38;category=D\&\#38;year=2005\&\#38;lang=E\&\#38;abst=}, timestamp = {Sat, 11 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieicet/IzuT05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/KitamuraKT05, author = {Izuru Kitamura and Masanobu Katagi and Tsuyoshi Takagi}, editor = {Colin Boyd and Juan Manuel Gonz{\'{a}}lez Nieto}, title = {A Complete Divisor Class Halving Algorithm for Hyperelliptic Curve Cryptosystems of Genus Two}, booktitle = {Information Security and Privacy, 10th Australasian Conference, {ACISP} 2005, Brisbane, Australia, July 4-6, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3574}, pages = {146--157}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11506157\_13}, doi = {10.1007/11506157\_13}, timestamp = {Tue, 14 May 2019 10:00:46 +0200}, biburl = {https://dblp.org/rec/conf/acisp/KitamuraKT05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/OkeyaTV05, author = {Katsuyuki Okeya and Tsuyoshi Takagi and Camille Vuillaume}, editor = {Colin Boyd and Juan Manuel Gonz{\'{a}}lez Nieto}, title = {Efficient Representations on Koblitz Curves with Resistance to Side Channel Attacks}, booktitle = {Information Security and Privacy, 10th Australasian Conference, {ACISP} 2005, Brisbane, Australia, July 4-6, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3574}, pages = {218--229}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11506157\_19}, doi = {10.1007/11506157\_19}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/OkeyaTV05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccn/TsoOTO05, author = {Raylin Tso and Takeshi Okamoto and Tsuyoshi Takagi and Eiji Okamoto}, editor = {M. Y. Sanadidi}, title = {An id-based non-interactive tripartite key agreement protocol with K-resilience}, booktitle = {Proceedings of the Third {IASTED} International Conference on Communications and Computer Networks, October 24-26, 2005, Marina del Rey, CA, {USA}}, pages = {38--42}, publisher = {{IASTED/ACTA} Press}, year = {2005}, timestamp = {Thu, 25 Jan 2007 13:10:45 +0100}, biburl = {https://dblp.org/rec/conf/ccn/TsoOTO05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/OkeyaTV05, author = {Katsuyuki Okeya and Tsuyoshi Takagi and Camille Vuillaume}, editor = {Josyula R. Rao and Berk Sunar}, title = {Short Memory Scalar Multiplication on Koblitz Curves}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2005, 7th International Workshop, Edinburgh, UK, August 29 - September 1, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3659}, pages = {91--105}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11545262\_7}, doi = {10.1007/11545262\_7}, timestamp = {Tue, 14 May 2019 10:00:47 +0200}, biburl = {https://dblp.org/rec/conf/ches/OkeyaTV05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/WangOTO05, author = {Lihua Wang and Takeshi Okamoto and Tsuyoshi Takagi and Eiji Okamoto}, editor = {Yue Hao and Jiming Liu and Yu{-}Ping Wang and Yiu{-}ming Cheung and Hujun Yin and Licheng Jiao and Jianfeng Ma and Yong{-}Chang Jiao}, title = {Insider Impersonation-MIM Attack to Tripartite Key Agreement Scheme and an Efficient Protocol for Multiple Keys}, booktitle = {Computational Intelligence and Security, International Conference, {CIS} 2005, Xi'an, China, December 15-19, 2005, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {3802}, pages = {198--203}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11596981\_30}, doi = {10.1007/11596981\_30}, timestamp = {Tue, 23 Feb 2021 17:25:41 +0100}, biburl = {https://dblp.org/rec/conf/cis/WangOTO05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esas/DahmenOT05, author = {Erik Dahmen and Katsuyuki Okeya and Tsuyoshi Takagi}, editor = {Refik Molva and Gene Tsudik and Dirk Westhoff}, title = {An Advanced Method for Joint Scalar Multiplications on Memory Constraint Devices}, booktitle = {Security and Privacy in Ad-hoc and Sensor Networks, Second European Workshop, {ESAS} 2005, Visegrad, Hungary, July 13-14, 2005, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {3813}, pages = {189--204}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11601494\_16}, doi = {10.1007/11601494\_16}, timestamp = {Tue, 14 May 2019 10:00:55 +0200}, biburl = {https://dblp.org/rec/conf/esas/DahmenOT05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/euc/HanTKKC05, author = {Dong{-}Guk Han and Tsuyoshi Takagi and Tae Hyun Kim and Howon Kim and Kyoil Chung}, editor = {Tomoya Enokido and Lu Yan and Bin Xiao and Daeyoung Kim and Yuan{-}Shun Dai and Laurence Tianruo Yang}, title = {Collision Attack on {XTR} and a Countermeasure with a Fixed Pattern}, booktitle = {Embedded and Ubiquitous Computing - {EUC} 2005 Workshops, {EUC} 2005 Workshops: UISW, NCUS, SecUbiq, USN, and TAUES, Nagasaki, Japan, December 6-9, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3823}, pages = {864--873}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11596042\_89}, doi = {10.1007/11596042\_89}, timestamp = {Wed, 01 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/euc/HanTKKC05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mycrypt/Schmidt-SamoaT05, author = {Katja Schmidt{-}Samoa and Tsuyoshi Takagi}, editor = {Ed Dawson and Serge Vaudenay}, title = {Paillier's Cryptosystem Modulo p\({}^{\mbox{2}}\)q and Its Applications to Trapdoor Commitment Schemes}, booktitle = {Progress in Cryptology - Mycrypt 2005, First International Conference on Cryptology in Malaysia, Kuala Lumpur, Malaysia, September 28-30, 2005, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3715}, pages = {296--313}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11554868\_21}, doi = {10.1007/11554868\_21}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/mycrypt/Schmidt-SamoaT05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/HanT0KC05, author = {Dong{-}Guk Han and Tsuyoshi Takagi and Tae Hyun Kim and Ho Won Kim and Kyoil Chung}, title = {Collision Attack on {XTR} and a Countermeasure with a Fixed Pattern}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {316}, year = {2005}, url = {http://eprint.iacr.org/2005/316}, timestamp = {Wed, 01 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/HanT0KC05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KurosawaT05, author = {Kaoru Kurosawa and Tsuyoshi Takagi}, title = {One-Wayness Equivalent to General Factoring}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {382}, year = {2005}, url = {http://eprint.iacr.org/2005/382}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KurosawaT05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/HanIT05, author = {Dong{-}Guk Han and Tetsuya Izu and Tsuyoshi Takagi}, title = {Some Explicit Formulae of {NAF} and its Left-to-Right Analogue}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {384}, year = {2005}, url = {http://eprint.iacr.org/2005/384}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/HanIT05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/HanT05, author = {Dong{-}Guk Han and Tsuyoshi Takagi}, title = {Some Analysis of Radix-r Representations}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {402}, year = {2005}, url = {http://eprint.iacr.org/2005/402}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/HanT05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/HakutaST05, author = {Keisuke Hakuta and Hisayoshi Sato and Tsuyoshi Takagi}, title = {Efficient Arithmetic on Subfield Elliptic Curves over Small Odd Characteristics}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {454}, year = {2005}, url = {http://eprint.iacr.org/2005/454}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/HakutaST05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/BiehlPT04, author = {Ingrid Biehl and Sachar Paulus and Tsuyoshi Takagi}, title = {Efficient Undeniable Signature Schemes Based on Ideal Arithmetic in Quadratic Orders}, journal = {Des. Codes Cryptogr.}, volume = {31}, number = {2}, pages = {99--123}, year = {2004}, url = {https://doi.org/10.1023/B:DESI.0000012439.20075.16}, doi = {10.1023/B:DESI.0000012439.20075.16}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/BiehlPT04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/OkeyaT04, author = {Katsuyuki Okeya and Tsuyoshi Takagi}, title = {SCA-Resistant and Fast Elliptic Scalar Multiplication Based on wNAF}, journal = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.}, volume = {87-A}, number = {1}, pages = {75--84}, year = {2004}, url = {http://search.ieice.org/bin/summary.php?id=e87-a\_1\_75\&\#38;category=D\&\#38;year=2004\&\#38;lang=E\&\#38;abst=}, timestamp = {Sat, 11 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieicet/OkeyaT04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/IzuT04, author = {Tetsuya Izu and Tsuyoshi Takagi}, title = {Fast Elliptic Curve Multiplications with {SIMD} Operations}, journal = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.}, volume = {87-A}, number = {1}, pages = {85--93}, year = {2004}, url = {http://search.ieice.org/bin/summary.php?id=e87-a\_1\_85\&\#38;category=D\&\#38;year=2004\&\#38;lang=E\&\#38;abst=}, timestamp = {Sat, 11 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieicet/IzuT04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/Takagi04, author = {Tsuyoshi Takagi}, title = {A Fast RSA-Type Public-Key Primitive Modulo p\({}^{\mbox{k}}\)q Using Hensel Lifting}, journal = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.}, volume = {87-A}, number = {1}, pages = {94--101}, year = {2004}, url = {http://search.ieice.org/bin/summary.php?id=e87-a\_1\_94\&\#38;category=D\&\#38;year=2004\&\#38;lang=E\&\#38;abst=}, timestamp = {Sat, 11 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieicet/Takagi04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/OkeyaTV04, author = {Katsuyuki Okeya and Tsuyoshi Takagi and Camille Vuillaume}, editor = {Huaxiong Wang and Josef Pieprzyk and Vijay Varadharajan}, title = {On the Exact Flexibility of the Flexible Countermeasure Against Side Channel Attacks}, booktitle = {Information Security and Privacy: 9th Australasian Conference, {ACISP} 2004, Sydney, Australia, July 13-15, 2004. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3108}, pages = {466--477}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-27800-9\_40}, doi = {10.1007/978-3-540-27800-9\_40}, timestamp = {Tue, 14 May 2019 10:00:46 +0200}, biburl = {https://dblp.org/rec/conf/acisp/OkeyaTV04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acns/OkeyaT04, author = {Katsuyuki Okeya and Tsuyoshi Takagi}, editor = {Markus Jakobsson and Moti Yung and Jianying Zhou}, title = {Security Analysis of CRT-Based Cryptosystems}, booktitle = {Applied Cryptography and Network Security, Second International Conference, {ACNS} 2004, Yellow Mountain, China, June 8-11, 2004, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3089}, pages = {383--397}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-24852-1\_28}, doi = {10.1007/978-3-540-24852-1\_28}, timestamp = {Tue, 14 May 2019 10:00:54 +0200}, biburl = {https://dblp.org/rec/conf/acns/OkeyaT04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/OkeyaSST04, author = {Katsuyuki Okeya and Katja Schmidt{-}Samoa and Christian Spahn and Tsuyoshi Takagi}, editor = {Matthew K. Franklin}, title = {Signed Binary Representations Revisited}, booktitle = {Advances in Cryptology - {CRYPTO} 2004, 24th Annual International CryptologyConference, Santa Barbara, California, USA, August 15-19, 2004, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3152}, pages = {123--139}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-28628-8\_8}, doi = {10.1007/978-3-540-28628-8\_8}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/crypto/OkeyaSST04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/humanoids/SawadaTHF04, author = {Tsutomu Sawada and Tsuyoshi Takagi and Yukiko Hoshino and Masahiro Fujita}, title = {Learning behavior selection through interaction based on emotionally grounded symbol concept}, booktitle = {4th {IEEE/RAS} International Conference on Humanoid Robots, Humanoids 2004, Santa Monica, CA, USA, November 10-12, 2004}, pages = {450--469}, publisher = {{IEEE}}, year = {2004}, url = {https://doi.org/10.1109/ICHR.2004.1442137}, doi = {10.1109/ICHR.2004.1442137}, timestamp = {Wed, 16 Oct 2019 14:14:50 +0200}, biburl = {https://dblp.org/rec/conf/humanoids/SawadaTHF04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icisc/KatagiAKT04, author = {Masanobu Katagi and Toru Akishita and Izuru Kitamura and Tsuyoshi Takagi}, editor = {Choonsik Park and Seongtaek Chee}, title = {Some Improved Algorithms for Hyperelliptic Curve Cryptosystems Using Degenerate Divisors}, booktitle = {Information Security and Cryptology - {ICISC} 2004, 7th International Conference, Seoul, Korea, December 2-3, 2004, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {3506}, pages = {296--312}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/11496618\_22}, doi = {10.1007/11496618\_22}, timestamp = {Tue, 14 May 2019 10:00:36 +0200}, biburl = {https://dblp.org/rec/conf/icisc/KatagiAKT04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icra/HoshinoTPF04, author = {Yukiko Hoshino and Tsuyoshi Takagi and Ugo Di Profio and Masahiro Fujita}, title = {Behavior Description and Control using Behavior Module for Personal Robot}, booktitle = {Proceedings of the 2004 {IEEE} International Conference on Robotics and Automation, {ICRA} 2004, April 26 - May 1, 2004, New Orleans, LA, {USA}}, pages = {4165--4171}, publisher = {{IEEE}}, year = {2004}, url = {https://doi.org/10.1109/ROBOT.2004.1308925}, doi = {10.1109/ROBOT.2004.1308925}, timestamp = {Mon, 22 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icra/HoshinoTPF04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/indocrypt/GalindoMTV04, author = {David Galindo and Sebasti{\`{a}} Mart{\'{\i}}n Mollev{\'{\i}} and Tsuyoshi Takagi and Jorge Luis Villar}, editor = {Anne Canteaut and Kapalee Viswanathan}, title = {A Provably Secure Elliptic Curve Scheme with Fast Encryption}, booktitle = {Progress in Cryptology - {INDOCRYPT} 2004, 5th International Conference on Cryptology in India, Chennai, India, December 20-22, 2004, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3348}, pages = {245--259}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-30556-9\_20}, doi = {10.1007/978-3-540-30556-9\_20}, timestamp = {Tue, 14 May 2019 10:00:51 +0200}, biburl = {https://dblp.org/rec/conf/indocrypt/GalindoMTV04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/indocrypt/SatoST04, author = {Hisayoshi Sato and Daniel Schepers and Tsuyoshi Takagi}, editor = {Anne Canteaut and Kapalee Viswanathan}, title = {Exact Analysis of Montgomery Multiplication}, booktitle = {Progress in Cryptology - {INDOCRYPT} 2004, 5th International Conference on Cryptology in India, Chennai, India, December 20-22, 2004, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3348}, pages = {290--304}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-30556-9\_23}, doi = {10.1007/978-3-540-30556-9\_23}, timestamp = {Fri, 19 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/indocrypt/SatoST04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iros/SawadaTF04, author = {Tsutomu Sawada and Tsuyoshi Takagi and Masahiro Fujita}, title = {Behavior selection and motion modulation in emotionally grounded architecture for {QRIO} {SDR-4XII}}, booktitle = {2004 {IEEE/RSJ} International Conference on Intelligent Robots and Systems, Sendai, Japan, September 28 - October 2, 2004}, pages = {2514--2519}, publisher = {{IEEE}}, year = {2004}, url = {https://doi.org/10.1109/IROS.2004.1389786}, doi = {10.1109/IROS.2004.1389786}, timestamp = {Wed, 16 Oct 2019 14:14:51 +0200}, biburl = {https://dblp.org/rec/conf/iros/SawadaTF04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isw/TakagiYW04, author = {Tsuyoshi Takagi and Sung{-}Ming Yen and Bo{-}Ching Wu}, editor = {Kan Zhang and Yuliang Zheng}, title = {Radix-r Non-Adjacent Form}, booktitle = {Information Security, 7th International Conference, {ISC} 2004, Palo Alto, CA, USA, September 27-29, 2004, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {3225}, pages = {99--110}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-30144-8\_9}, doi = {10.1007/978-3-540-30144-8\_9}, timestamp = {Tue, 30 Nov 2021 15:21:24 +0100}, biburl = {https://dblp.org/rec/conf/isw/TakagiYW04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/itcc/OkeyaTV04, author = {Katsuyuki Okeya and Tsuyoshi Takagi and Camille Vuillaume}, title = {On the Importance of Protecting Delta in {SFLASH} against Side Channel Attacks}, booktitle = {International Conference on Information Technology: Coding and Computing (ITCC'04), Volume 2, April 5-7, 2004, Las Vegas, Nevada, {USA}}, pages = {560--568}, publisher = {{IEEE} Computer Society}, year = {2004}, url = {https://doi.org/10.1109/ITCC.2004.1286713}, doi = {10.1109/ITCC.2004.1286713}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/itcc/OkeyaTV04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/AkishitaT04, author = {Toru Akishita and Tsuyoshi Takagi}, editor = {Feng Bao and Robert H. Deng and Jianying Zhou}, title = {On the Optimal Parameter Choice for Elliptic Curve Cryptosystems Using Isogeny}, booktitle = {Public Key Cryptography - {PKC} 2004, 7th International Workshop on Theory and Practice in Public Key Cryptography, Singapore, March 1-4, 2004}, series = {Lecture Notes in Computer Science}, volume = {2947}, pages = {346--359}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-24632-9\_25}, doi = {10.1007/978-3-540-24632-9\_25}, timestamp = {Fri, 01 May 2020 18:32:25 +0200}, biburl = {https://dblp.org/rec/conf/pkc/AkishitaT04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/KatagiKAT04, author = {Masanobu Katagi and Izuru Kitamura and Toru Akishita and Tsuyoshi Takagi}, editor = {Chae Hoon Lim and Moti Yung}, title = {Novel Efficient Implementations of Hyperelliptic Curve Cryptosystems Using Degenerate Divisors}, booktitle = {Information Security Applications, 5th International Workshop, {WISA} 2004, Jeju Island, Korea, August 23-25, 2004, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {3325}, pages = {345--359}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-31815-6\_28}, doi = {10.1007/978-3-540-31815-6\_28}, timestamp = {Tue, 14 May 2019 10:00:35 +0200}, biburl = {https://dblp.org/rec/conf/wisa/KatagiKAT04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/OkeyaSST04, author = {Katsuyuki Okeya and Katja Schmidt{-}Samoa and Christian Spahn and Tsuyoshi Takagi}, title = {Signed Binary Representations Revisited}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {195}, year = {2004}, url = {http://eprint.iacr.org/2004/195}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/OkeyaSST04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KitamuraKT04, author = {Izuru Kitamura and Masanobu Katagi and Tsuyoshi Takagi}, title = {A Complete Divisor Class Halving Algorithm for Hyperelliptic Curve Cryptosystems of Genus Two}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {255}, year = {2004}, url = {http://eprint.iacr.org/2004/255}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KitamuraKT04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ras/ArkinFTH03, author = {Ronald C. Arkin and Masahiro Fujita and Tsuyoshi Takagi and Rika Hasegawa}, title = {An ethological and emotional basis for human-robot interaction}, journal = {Robotics Auton. Syst.}, volume = {42}, number = {3-4}, pages = {191--201}, year = {2003}, url = {https://doi.org/10.1016/S0921-8890(02)00375-5}, doi = {10.1016/S0921-8890(02)00375-5}, timestamp = {Mon, 24 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ras/ArkinFTH03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/KurosawaT03, author = {Kaoru Kurosawa and Tsuyoshi Takagi}, editor = {Chi{-}Sung Laih}, title = {Some RSA-Based Encryption Schemes with Tight Security Reduction}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2003, 9th International Conference on the Theory and Application of Cryptology and Information Security, Taipei, Taiwan, November 30 - December 4, 2003, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2894}, pages = {19--36}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/978-3-540-40061-5\_2}, doi = {10.1007/978-3-540-40061-5\_2}, timestamp = {Tue, 14 May 2019 10:00:40 +0200}, biburl = {https://dblp.org/rec/conf/asiacrypt/KurosawaT03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/SatoTTT03, author = {Hisayoshi Sato and Tsuyoshi Takagi and Satoru Tezuka and Kazuo Takaragi}, editor = {Chi{-}Sung Laih}, title = {Generalized Powering Functions and Their Application to Digital Signatures}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2003, 9th International Conference on the Theory and Application of Cryptology and Information Security, Taipei, Taiwan, November 30 - December 4, 2003, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2894}, pages = {434--451}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/978-3-540-40061-5\_28}, doi = {10.1007/978-3-540-40061-5\_28}, timestamp = {Fri, 19 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/asiacrypt/SatoTTT03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/KurosawaST03, author = {Kaoru Kurosawa and Katja Schmidt{-}Samoa and Tsuyoshi Takagi}, editor = {Chi{-}Sung Laih}, title = {A Complete and Explicit Security Reduction Algorithm for RSA-Based Cryptosystems}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2003, 9th International Conference on the Theory and Application of Cryptology and Information Security, Taipei, Taiwan, November 30 - December 4, 2003, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2894}, pages = {474--491}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/978-3-540-40061-5\_30}, doi = {10.1007/978-3-540-40061-5\_30}, timestamp = {Fri, 19 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/asiacrypt/KurosawaST03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/OkeyaT03, author = {Katsuyuki Okeya and Tsuyoshi Takagi}, editor = {Colin D. Walter and {\c{C}}etin Kaya Ko{\c{c}} and Christof Paar}, title = {A More Flexible Countermeasure against Side Channel Attacks Using Window Method}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2003, 5th International Workshop, Cologne, Germany, September 8-10, 2003, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2779}, pages = {397--410}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/978-3-540-45238-6\_31}, doi = {10.1007/978-3-540-45238-6\_31}, timestamp = {Tue, 14 May 2019 10:00:47 +0200}, biburl = {https://dblp.org/rec/conf/ches/OkeyaT03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ctrsa/OkeyaT03, author = {Katsuyuki Okeya and Tsuyoshi Takagi}, editor = {Marc Joye}, title = {The Width-w {NAF} Method Provides Small Memory and Fast Elliptic Scalar Multiplications Secure against Side Channel Attacks}, booktitle = {Topics in Cryptology - {CT-RSA} 2003, The Cryptographers' Track at the {RSA} Conference 2003, San Francisco, CA, USA, April 13-17, 2003, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2612}, pages = {328--342}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/3-540-36563-X\_23}, doi = {10.1007/3-540-36563-X\_23}, timestamp = {Tue, 14 May 2019 10:00:52 +0200}, biburl = {https://dblp.org/rec/conf/ctrsa/OkeyaT03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isw/AkishitaT03, author = {Toru Akishita and Tsuyoshi Takagi}, editor = {Colin Boyd and Wenbo Mao}, title = {Zero-Value Point Attacks on Elliptic Curve Cryptosystem}, booktitle = {Information Security, 6th International Conference, {ISC} 2003, Bristol, UK, October 1-3, 2003, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2851}, pages = {218--233}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/10958513\_17}, doi = {10.1007/10958513\_17}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/isw/AkishitaT03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/IzuT03, author = {Tetsuya Izu and Tsuyoshi Takagi}, editor = {Yvo Desmedt}, title = {Exceptional Procedure Attack on Elliptic Curve Cryptosystems}, booktitle = {Public Key Cryptography - {PKC} 2003, 6th International Workshop on Theory and Practice in Public Key Cryptography, Miami, FL, USA, January 6-8, 2003, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2567}, pages = {224--239}, publisher = {Springer}, year = {2003}, url = {https://doi.org/10.1007/3-540-36288-6\_17}, doi = {10.1007/3-540-36288-6\_17}, timestamp = {Fri, 01 May 2020 18:32:25 +0200}, biburl = {https://dblp.org/rec/conf/pkc/IzuT03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KurosawaT03, author = {Kaoru Kurosawa and Tsuyoshi Takagi}, title = {Some RSA-based Encryption Schemes with Tight Security Reduction}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {157}, year = {2003}, url = {http://eprint.iacr.org/2003/157}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KurosawaT03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KatagiKAT03, author = {Masanobu Katagi and Izuru Kitamura and Toru Akishita and Tsuyoshi Takagi}, title = {Novel Efficient Implementations of Hyperelliptic Curve Cryptosystems using Degenerate Divisors}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {203}, year = {2003}, url = {http://eprint.iacr.org/2003/203}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KatagiKAT03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/BiehlT02, author = {Ingrid Biehl and Tsuyoshi Takagi}, editor = {Lynn Margaret Batten and Jennifer Seberry}, title = {A New Distributed Primality Test for Shared {RSA} Keys Using Quadratic Fields}, booktitle = {Information Security and Privacy, 7th Australian Conference, {ACISP} 2002, Melbourne, Australia, July 3-5, 2002, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2384}, pages = {1--16}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-45450-0\_1}, doi = {10.1007/3-540-45450-0\_1}, timestamp = {Tue, 14 May 2019 10:00:46 +0200}, biburl = {https://dblp.org/rec/conf/acisp/BiehlT02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/SakuraiT02, author = {Kouichi Sakurai and Tsuyoshi Takagi}, editor = {Lynn Margaret Batten and Jennifer Seberry}, title = {On the Security of a Modified Paillier Public-Key Primitive}, booktitle = {Information Security and Privacy, 7th Australian Conference, {ACISP} 2002, Melbourne, Australia, July 3-5, 2002, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2384}, pages = {436--448}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-45450-0\_33}, doi = {10.1007/3-540-45450-0\_33}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/SakuraiT02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icics/IzuT02, author = {Tetsuya Izu and Tsuyoshi Takagi}, editor = {Robert H. Deng and Sihan Qing and Feng Bao and Jianying Zhou}, title = {Fast Elliptic Curve Multiplications with {SIMD} Operations}, booktitle = {Information and Communications Security, 4th International Conference, {ICICS} 2002, Singapore, December 9-12, 2002, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2513}, pages = {217--230}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-36159-6\_19}, doi = {10.1007/3-540-36159-6\_19}, timestamp = {Tue, 14 May 2019 10:00:37 +0200}, biburl = {https://dblp.org/rec/conf/icics/IzuT02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icisc/IzuT02, author = {Tetsuya Izu and Tsuyoshi Takagi}, editor = {Pil Joong Lee and Chae Hoon Lim}, title = {Efficient Computations of the Tate Pairingfor the Large {MOV} Degrees}, booktitle = {Information Security and Cryptology - {ICISC} 2002, 5th International Conference Seoul, Korea, November 28-29, 2002, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2587}, pages = {283--297}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-36552-4\_20}, doi = {10.1007/3-540-36552-4\_20}, timestamp = {Tue, 14 May 2019 10:00:36 +0200}, biburl = {https://dblp.org/rec/conf/icisc/IzuT02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icisc/SakuraiT02, author = {Kouichi Sakurai and Tsuyoshi Takagi}, editor = {Pil Joong Lee and Chae Hoon Lim}, title = {A Reject Timing Attackon an {IND-CCA2} Public-Key Cryptosystem}, booktitle = {Information Security and Cryptology - {ICISC} 2002, 5th International Conference Seoul, Korea, November 28-29, 2002, Revised Papers}, series = {Lecture Notes in Computer Science}, volume = {2587}, pages = {359--373}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-36552-4\_25}, doi = {10.1007/3-540-36552-4\_25}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icisc/SakuraiT02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/indocrypt/IzuMT02, author = {Tetsuya Izu and Bodo M{\"{o}}ller and Tsuyoshi Takagi}, editor = {Alfred Menezes and Palash Sarkar}, title = {Improved Elliptic Curve Multiplication Methods Resistant against Side Channel Attacks}, booktitle = {Progress in Cryptology - {INDOCRYPT} 2002, Third International Conference on Cryptology in India, Hyderabad, India, December 16-18, 2002}, series = {Lecture Notes in Computer Science}, volume = {2551}, pages = {296--313}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-36231-2\_24}, doi = {10.1007/3-540-36231-2\_24}, timestamp = {Tue, 14 May 2019 10:00:51 +0200}, biburl = {https://dblp.org/rec/conf/indocrypt/IzuMT02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/SakuraiT02, author = {Kouichi Sakurai and Tsuyoshi Takagi}, editor = {David Naccache and Pascal Paillier}, title = {New Semantically Secure Public-Key Cryptosystems from the RSA-Primitive}, booktitle = {Public Key Cryptography, 5th International Workshop on Practice and Theory in Public Key Cryptosystems, {PKC} 2002, Paris, France, February 12-14, 2002, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2274}, pages = {1--16}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-45664-3\_1}, doi = {10.1007/3-540-45664-3\_1}, timestamp = {Fri, 01 May 2020 18:32:25 +0200}, biburl = {https://dblp.org/rec/conf/pkc/SakuraiT02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/IzuT02, author = {Tetsuya Izu and Tsuyoshi Takagi}, editor = {David Naccache and Pascal Paillier}, title = {A Fast Parallel Elliptic Curve Multiplication Resistant against Side Channel Attacks}, booktitle = {Public Key Cryptography, 5th International Workshop on Practice and Theory in Public Key Cryptosystems, {PKC} 2002, Paris, France, February 12-14, 2002, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2274}, pages = {280--296}, publisher = {Springer}, year = {2002}, url = {https://doi.org/10.1007/3-540-45664-3\_20}, doi = {10.1007/3-540-45664-3\_20}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/IzuT02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@phdthesis{DBLP:phd/dnb/Takagi01, author = {Tsuyoshi Takagi}, title = {New public-key cryptosystems with fast decryption}, school = {Darmstadt University of Technology, Germany}, year = {2001}, url = {http://elib.tu-darmstadt.de/diss/000104/TakagiDiss.pdf}, urn = {urn:nbn:de:tuda-tuprints-1043}, timestamp = {Sat, 17 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/phd/dnb/Takagi01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/JoyeQT01, author = {Marc Joye and Jean{-}Jacques Quisquater and Tsuyoshi Takagi}, title = {How to Choose Secret Parameters for RSA-Type Cryptosystems over Elliptic Curves}, journal = {Des. Codes Cryptogr.}, volume = {23}, number = {3}, pages = {297--316}, year = {2001}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/JoyeQT01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/agents/FujitaCHTYS01, author = {Masahiro Fujita and Gabriel Costa and Rika Hasegawa and Tsuyoshi Takagi and Jun Yokono and Hideki Shimomura}, editor = {Elisabeth Andr{\'{e}} and Sandip Sen and Claude Frasson and J{\"{o}}rg P. M{\"{u}}ller}, title = {Architecture and preliminary experimental results for emotionally grounded symbol acquisition}, booktitle = {Proceedings of the Fifth International Conference on Autonomous Agents, {AGENTS} 2001, Montreal, Canada, May 28 - June 1, 2001}, pages = {35--36}, publisher = {{ACM}}, year = {2001}, url = {https://doi.org/10.1145/375735.375851}, doi = {10.1145/375735.375851}, timestamp = {Sat, 30 Sep 2023 09:33:47 +0200}, biburl = {https://dblp.org/rec/conf/agents/FujitaCHTYS01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icisc/BuchmannST01, author = {Johannes Buchmann and Kouichi Sakurai and Tsuyoshi Takagi}, editor = {Kwangjo Kim}, title = {An {IND-CCA2} Public-Key Cryptosystem with Fast Decryption}, booktitle = {Information Security and Cryptology - {ICISC} 2001, 4th International Conference Seoul, Korea, December 6-7, 2001, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2288}, pages = {51--71}, publisher = {Springer}, year = {2001}, url = {https://doi.org/10.1007/3-540-45861-1\_6}, doi = {10.1007/3-540-45861-1\_6}, timestamp = {Mon, 16 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icisc/BuchmannST01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icra/ArkinFTH01, author = {Ronald C. Arkin and Masahiro Fujita and Tsuyoshi Takagi and Rika Hasegawa}, title = {Ethological Modeling and Architecture for an Entertainment Robot}, booktitle = {Proceedings of the 2001 {IEEE} International Conference on Robotics and Automation, {ICRA} 2001, May 21-26, 2001, Seoul, Korea}, pages = {453--458}, publisher = {{IEEE}}, year = {2001}, url = {https://doi.org/10.1109/ROBOT.2001.932592}, doi = {10.1109/ROBOT.2001.932592}, timestamp = {Mon, 22 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icra/ArkinFTH01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/joc/PaulusT00, author = {Sachar Paulus and Tsuyoshi Takagi}, title = {A New Public-Key Cryptosystem over a Quadratic Order with Quadratic Decryption Time}, journal = {J. Cryptol.}, volume = {13}, number = {2}, pages = {263--272}, year = {2000}, url = {https://doi.org/10.1007/s001459910010}, doi = {10.1007/S001459910010}, timestamp = {Fri, 18 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/joc/PaulusT00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/HuhnleinT99, author = {Detlef H{\"{u}}hnlein and Tsuyoshi Takagi}, editor = {Kwok{-}Yan Lam and Eiji Okamoto and Chaoping Xing}, title = {Reducing Logarithms in Totally Non-maximal Imaginary Quadratic Orders to Logarithms in Finite Fields}, booktitle = {Advances in Cryptology - {ASIACRYPT} '99, International Conference on the Theory and Applications of Cryptology and Information Security, Singapore, November 14-18, 1999, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1716}, pages = {219--231}, publisher = {Springer}, year = {1999}, url = {https://doi.org/10.1007/978-3-540-48000-6\_18}, doi = {10.1007/978-3-540-48000-6\_18}, timestamp = {Tue, 14 May 2019 10:00:40 +0200}, biburl = {https://dblp.org/rec/conf/asiacrypt/HuhnleinT99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/HartmannPT99, author = {Michael Hartmann and Sachar Paulus and Tsuyoshi Takagi}, editor = {{\c{C}}etin Kaya Ko{\c{c}} and Christof Paar}, title = {{NICE} - New Ideal Coset Encryption}, booktitle = {Cryptographic Hardware and Embedded Systems, First International Workshop, CHES'99, Worcester, MA, USA, August 12-13, 1999, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1717}, pages = {328--339}, publisher = {Springer}, year = {1999}, url = {https://doi.org/10.1007/3-540-48059-5\_28}, doi = {10.1007/3-540-48059-5\_28}, timestamp = {Tue, 14 May 2019 10:00:47 +0200}, biburl = {https://dblp.org/rec/conf/ches/HartmannPT99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/Takagi98, author = {Tsuyoshi Takagi}, editor = {Hugo Krawczyk}, title = {Fast RSA-Type Cryptosystem Modulo p\({}^{\mbox{k}}\)q}, booktitle = {Advances in Cryptology - {CRYPTO} '98, 18th Annual International Cryptology Conference, Santa Barbara, California, USA, August 23-27, 1998, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1462}, pages = {318--326}, publisher = {Springer}, year = {1998}, url = {https://doi.org/10.1007/BFb0055738}, doi = {10.1007/BFB0055738}, timestamp = {Tue, 01 Jun 2021 15:21:29 +0200}, biburl = {https://dblp.org/rec/conf/crypto/Takagi98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/HuhnleinJPT98, author = {Detlef H{\"{u}}hnlein and Michael J. Jacobson Jr. and Sachar Paulus and Tsuyoshi Takagi}, editor = {Kaisa Nyberg}, title = {A Cryptosystem Based on Non-maximal Imaginary Quadratic Orders with Fast Decryption}, booktitle = {Advances in Cryptology - {EUROCRYPT} '98, International Conference on the Theory and Application of Cryptographic Techniques, Espoo, Finland, May 31 - June 4, 1998, Proceeding}, series = {Lecture Notes in Computer Science}, volume = {1403}, pages = {294--307}, publisher = {Springer}, year = {1998}, url = {https://doi.org/10.1007/BFb0054134}, doi = {10.1007/BFB0054134}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/HuhnleinJPT98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icisc/PaulusT98, author = {Sachar Paulus and Tsuyoshi Takagi}, title = {A generalization of the Diffie-Hellman problem and related cryptosystems allowing fast decryption}, booktitle = {The 1st International Conference on Information Security and Cryptology, {ICSCI} '98, December 18-19, 1998, Seoul, Korea, Proceedings}, pages = {211--220}, publisher = {Korea Institute of Information Security and Cryptology {(KIISC)}}, year = {1998}, timestamp = {Fri, 11 Jan 2002 12:38:44 +0100}, biburl = {https://dblp.org/rec/conf/icisc/PaulusT98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icisc/HuehnleinMT98, author = {Detlef H{\"{u}}hnlein and Andreas Meyer and Tsuyoshi Takagi}, title = {Rabin and {RSA} analogues based on non-maximal imaginary quadratic orders}, booktitle = {The 1st International Conference on Information Security and Cryptology, {ICSCI} '98, December 18-19, 1998, Seoul, Korea, Proceedings}, pages = {221--240}, publisher = {Korea Institute of Information Security and Cryptology {(KIISC)}}, year = {1998}, timestamp = {Thu, 12 Sep 2013 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icisc/HuehnleinMT98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/Takagi97, author = {Tsuyoshi Takagi}, editor = {Burton S. Kaliski Jr.}, title = {Fast RSA-Type Cryptosystems Using N-Adic Expansion}, booktitle = {Advances in Cryptology - {CRYPTO} '97, 17th Annual International Cryptology Conference, Santa Barbara, California, USA, August 17-21, 1997, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1294}, pages = {372--384}, publisher = {Springer}, year = {1997}, url = {https://doi.org/10.1007/BFb0052249}, doi = {10.1007/BFB0052249}, timestamp = {Tue, 14 May 2019 10:00:48 +0200}, biburl = {https://dblp.org/rec/conf/crypto/Takagi97.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isaac/TakagiN96, author = {Tsuyoshi Takagi and Shozo Naito}, editor = {Tetsuo Asano and Yoshihide Igarashi and Hiroshi Nagamochi and Satoru Miyano and Subhash Suri}, title = {The Multi-variable Modular Polynomial and Its Applications to Cryptography}, booktitle = {Algorithms and Computation, 7th International Symposium, {ISAAC} '96, Osaka, Japan, December 16-18, 1996, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1178}, pages = {386--396}, publisher = {Springer}, year = {1996}, url = {https://doi.org/10.1007/BFb0009515}, doi = {10.1007/BFB0009515}, timestamp = {Tue, 14 May 2019 10:00:50 +0200}, biburl = {https://dblp.org/rec/conf/isaac/TakagiN96.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.