


default search action
Tsuyoshi Takagi
Person information
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
showing all ?? records
2020 – today
- 2024
- [c170]Quan Yuan, Chao Sun, Tsuyoshi Takagi:
Revisiting the Security of Fiat-Shamir Signature Schemes Under Superposition Attacks. ACISP (2) 2024: 164-184 - [c169]Keyang Liu, Tsuyoshi Takagi:
A Transparent Zero-Knowledge Dual Membership Set Commitment based on Perfect Hash Function. CANDAR 2024: 67-76 - [c168]Keyang Liu
, Xingxin Li
, Tsuyoshi Takagi:
Review the Cuckoo Hash-Based Unbalanced Private Set Union: Leakage, Fix, and Optimization. ESORICS (2) 2024: 331-352 - [c167]Shota Inoue, Yusuke Aikawa, Tsuyoshi Takagi:
A Faster Variant of CGL Hash Function via Efficient Backtracking Checks. ISC (2) 2024: 81-100 - [c166]Naoki Yoshiguchi, Yusuke Aikawa, Tsuyoshi Takagi:
Sieving Method for SDP with the Zero Window: An Improvement in Low Memory Environments. IWSEC 2024: 158-176 - [i63]Hiroki Okada, Tsuyoshi Takagi:
Simulation-Secure Threshold PKE from Standard (Ring-)LWE. IACR Cryptol. ePrint Arch. 2024: 239 (2024) - [i62]Kaisei Kajita, Go Ohtake, Tsuyoshi Takagi:
Generalized Adaptor Signature Scheme: From Two-Party to N-Party Settings. IACR Cryptol. ePrint Arch. 2024: 241 (2024) - [i61]Quan Yuan, Chao Sun, Tsuyoshi Takagi:
Revisiting the Security of Fiat-Shamir Signature Schemes under Superposition Attacks. IACR Cryptol. ePrint Arch. 2024: 590 (2024) - 2023
- [j121]Kohei Nakagawa
, Hiroshi Onuki
, Atsushi Takayasu
, Tsuyoshi Takagi:
L1-norm ball for CSIDH: Optimal strategy for choosing the secret key space. Discret. Appl. Math. 328: 70-88 (2023) - [j120]Tomoki Moriya
, Hiroshi Onuki
, Tsuyoshi Takagi:
How to construct CSIDH on Edwards curves. Finite Fields Their Appl. 92: 102310 (2023) - [j119]Kaisei Kajita
, Go Ohtake, Kazuto Ogawa, Koji Nuida
, Tsuyoshi Takagi:
Short Lattice Signature Scheme with Tighter Reduction under Ring-SIS Assumption. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 106(3): 228-240 (2023) - [j118]Yasuhiko Ikematsu
, Shuhei Nakamura, Tsuyoshi Takagi:
Recent progress in the security evaluation of multivariate public-key cryptography. IET Inf. Secur. 17(2): 210-226 (2023) - [j117]Saki Otsuki, Hiroshi Onuki
, Tsuyoshi Takagi:
Improvement of the square-root Vélu's formulas for isogeny-based cryptography. JSIAM Lett. 15: 61-64 (2023) - [j116]Momonari Kudo, Tasuku Nakagawa, Tsuyoshi Takagi:
Efficient Search for Superspecial Hyperelliptic Curves of Genus Four with Automorphism Group Containing bfC6. Math. Comput. Sci. 17(3): 21 (2023) - [j115]Momonari Kudo, Tasuku Nakagawa, Tsuyoshi Takagi:
Correction to: Efficient Search for Superspecial Hyperelliptic Curves of Genus Four with Automorphism Group Containing bfC6. Math. Comput. Sci. 17(3): 23 (2023) - [c165]Naoto Kimura, Atsushi Takayasu
, Tsuyoshi Takagi:
Memory-Efficient Quantum Information Set Decoding Algorithm. ACISP 2023: 452-468 - [c164]Hiroki Okada
, Kazuhide Fukushima, Shinsaku Kiyomoto, Tsuyoshi Takagi:
Spherical Gaussian Leftover Hash Lemma via the Rényi Divergence. ACNS (1) 2023: 695-724 - [c163]Keyang Liu
, Xingxin Li
, Tsuyoshi Takagi:
Robust Property-Preserving Hash Meets Homomorphism. ISC 2023: 537-556 - [c162]Haiming Zhu, Shoichi Kamada, Momonari Kudo, Tsuyoshi Takagi:
Improved Hybrid Attack via Error-Splitting Method for Finding Quinary Short Lattice Vectors. IWSEC 2023: 117-136 - [c161]Hiroki Furue, Tsuyoshi Takagi:
Fast Enumeration Algorithm for Multivariate Polynomials over General Finite Fields. PQCrypto 2023: 357-378 - [i60]Hiroki Okada, Kazuhide Fukushima, Shinsaku Kiyomoto, Tsuyoshi Takagi:
Spherical Gaussian Leftover Hash Lemma via the Rényi Divergence. IACR Cryptol. ePrint Arch. 2023: 479 (2023) - [i59]Hiroki Furue, Tsuyoshi Takagi:
Fast Enumeration Algorithm for Multivariate Polynomials over General Finite Fields. IACR Cryptol. ePrint Arch. 2023: 619 (2023) - [i58]Tomoki Moriya, Hiroshi Onuki, Yusuke Aikawa, Tsuyoshi Takagi:
Lower bound of costs of formulas to compute image curves of 3-isogenies in the framework of generalized Montgomery coordinates. IACR Cryptol. ePrint Arch. 2023: 1511 (2023) - [i57]Kosuke Sakata, Tsuyoshi Takagi:
An Efficient Algorithm for Solving the MQ Problem using Hilbert Series. IACR Cryptol. ePrint Arch. 2023: 1650 (2023) - 2022
- [j114]Hiroki Okada, Atsushi Takayasu, Kazuhide Fukushima
, Shinsaku Kiyomoto, Tsuyoshi Takagi:
Erratum: A Compact Digital Signature Scheme Based on the Module-LWR Problem [IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences Vol. E104.A (2021), No. 9 pp.1219-1234]. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 105-A(2): 130 (2022) - [j113]Xiaoling Yu
, Yuntao Wang
, Chungen Xu, Tsuyoshi Takagi:
Revisiting the Orthogonal Lattice Algorithm in Solving General Approximate Common Divisor Problem. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 105-A(3): 195-202 (2022) - [j112]Shu Takahashi, Hiroshi Onuki
, Tsuyoshi Takagi:
Explicit construction of the square-root Vélu's formula on Edwards curves. JSIAM Lett. 14: 108-110 (2022) - [c160]Daichi Aoki, Kazuhiko Minematsu, Toshihiko Okamura, Tsuyoshi Takagi:
Efficient Word Size Modular Multiplication over Signed Integers. ARITH 2022: 94-101 - [c159]Taku Kato, Yutaro Kiyomura, Tsuyoshi Takagi:
Improving Fault Attacks on Rainbow with Fixing Random Vinegar Values. IWSEC 2022: 147-165 - [c158]Hiroki Furue, Yutaro Kiyomura, Tatsuya Nagasawa, Tsuyoshi Takagi:
A New Fault Attack on UOV Multivariate Signature Scheme. PQCrypto 2022: 124-143 - [i56]Tomoki Moriya, Hiroshi Onuki, Yusuke Aikawa, Tsuyoshi Takagi:
The Generalized Montgomery Coordinate: A New Computational Tool for Isogeny-based Cryptography. IACR Cryptol. ePrint Arch. 2022: 150 (2022) - [i55]Kaisei Kajita, Go Ohtake, Kazuto Ogawa, Koji Nuida, Tsuyoshi Takagi:
Short Lattice Signature Scheme with Tighter Reduction under Ring-SIS Assumption. IACR Cryptol. ePrint Arch. 2022: 479 (2022) - 2021
- [j111]Hiroki Okada, Atsushi Takayasu, Kazuhide Fukushima
, Shinsaku Kiyomoto, Tsuyoshi Takagi:
A Compact Digital Signature Scheme Based on the Module-LWR Problem. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 104-A(9): 1219-1234 (2021) - [j110]Ye Yuan
, Kazuhide Fukushima
, Junting Xiao, Shinsaku Kiyomoto, Tsuyoshi Takagi:
Memory-constrained implementation of lattice-based encryption scheme on standard Java Card platform. IET Inf. Secur. 15(4): 267-281 (2021) - [j109]Yuntao Wang
, Tsuyoshi Takagi:
Studying lattice reduction algorithms improved by quick reordering technique. Int. J. Inf. Sec. 20(2): 257-268 (2021) - [j108]Shuhei Nakamura, Yasuhiko Ikematsu, Yacheng Wang, Jintai Ding, Tsuyoshi Takagi:
New complexity estimation on the Rainbow-Band-Separation attack. Theor. Comput. Sci. 896: 1-18 (2021) - [c157]Hiroki Furue, Yasuhiko Ikematsu, Yutaro Kiyomura, Tsuyoshi Takagi:
A New Variant of Unbalanced Oil and Vinegar Using Quotient Ring: QR-UOV. ASIACRYPT (4) 2021: 187-217 - [c156]Shusaku Uemura, Kazuhide Fukushima
, Shinsaku Kiyomoto, Momonari Kudo, Tsuyoshi Takagi:
Shortest Vectors in Lattices of Bai-Galbraith's Embedding Attack on the LWR Problem. IWSEC 2021: 23-41 - [c155]Changze Yin, Yacheng Wang, Tsuyoshi Takagi:
(Short Paper) Simple Matrix Signature Scheme. IWSEC 2021: 227-237 - [c154]Hiroki Furue, Shuhei Nakamura, Tsuyoshi Takagi:
Improving Thomae-Wolf Algorithm for Solving Underdetermined Multivariate Quadratic Polynomial Problem. PQCrypto 2021: 65-78 - [i54]Hiroki Okada, Atsushi Takayasu, Kazuhide Fukushima, Shinsaku Kiyomoto, Tsuyoshi Takagi:
A Compact Digital Signature Scheme Based on the Module-LWR problem. IACR Cryptol. ePrint Arch. 2021: 1699 (2021) - 2020
- [j107]Hiroki Okada
, Atsushi Takayasu, Kazuhide Fukushima
, Shinsaku Kiyomoto, Tsuyoshi Takagi:
On the Complexity of the LWR-Solving BKW Algorithm. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 103-A(1): 173-182 (2020) - [j106]Hiroshi Onuki
, Yusuke Aikawa, Tsutomu Yamazaki, Tsuyoshi Takagi:
A Constant-Time Algorithm of CSIDH Keeping Two Points. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 103-A(10): 1174-1182 (2020) - [j105]Hiroki Furue, Dung Hoang Duong, Tsuyoshi Takagi:
An Efficient MQ-based Signature with Tight Security Proof. Int. J. Netw. Comput. 10(2): 308-324 (2020) - [c153]Satoshi Okada, Yuntao Wang
, Tsuyoshi Takagi:
Improving Key Mismatch Attack on NewHope with Fewer Queries. ACISP 2020: 505-524 - [c152]Tomoki Moriya
, Hiroshi Onuki
, Tsuyoshi Takagi:
SiGamal: A Supersingular Isogeny-Based PKE and Its Application to a PRF. ASIACRYPT (2) 2020: 551-580 - [c151]Yuntao Wang
, Yasuhiko Ikematsu, Koichiro Akiyama, Tsuyoshi Takagi:
Cryptanalysis of GiophantusTM Schemes against Hybrid Attack. APKC@AsiaCCS 2020: 28-35 - [c150]Tomoki Moriya
, Hiroshi Onuki
, Tsuyoshi Takagi:
How to Construct CSIDH on Edwards Curves. CT-RSA 2020: 512-537 - [c149]Hiroki Okada
, Atsushi Takayasu, Kazuhide Fukushima
, Shinsaku Kiyomoto, Tsuyoshi Takagi:
A Compact Digital Signature Scheme Based on the Module-LWR Problem. ICICS 2020: 73-90 - [c148]Tomoki Kawashima, Katsuyuki Takashima, Yusuke Aikawa, Tsuyoshi Takagi:
An Efficient Authenticated Key Exchange from Random Self-reducibility on CSIDH. ICISC 2020: 58-84 - [c147]Hiroshi Onuki, Yusuke Aikawa, Tsuyoshi Takagi:
The Existence of Cycles in the Supersingular Isogeny Graphs Used in SIKE. ISITA 2020: 358-362 - [c146]Hiroshi Onuki
, Tsuyoshi Takagi:
On Collisions Related to an Ideal Class of Order 3 in CSIDH. IWSEC 2020: 131-148 - [c145]Hiroki Furue, Koha Kinjo, Yasuhiko Ikematsu, Yacheng Wang, Tsuyoshi Takagi:
A Structural Attack on Block-Anti-Circulant UOV at SAC 2019. PQCrypto 2020: 323-339 - [c144]Takanori Yasuda, Yacheng Wang, Tsuyoshi Takagi:
Multivariate Encryption Schemes Based on Polynomial Equations over Real Numbers. PQCrypto 2020: 402-421 - [c143]Kaisei Kajita
, Kazuto Ogawa, Koji Nuida
, Tsuyoshi Takagi:
Short Lattice Signatures in the Standard Model with Efficient Tag Generation. ProvSec 2020: 85-102 - [c142]Yacheng Wang, Yasuhiko Ikematsu, Shuhei Nakamura, Tsuyoshi Takagi:
Revisiting the Minrank Problem on Multivariate Cryptography. WISA 2020: 291-307 - [i53]Kohei Nakagawa, Hiroshi Onuki, Atsushi Takayasu, Tsuyoshi Takagi:
L1-Norm Ball for CSIDH: Optimal Strategy for Choosing the Secret Key Space. IACR Cryptol. ePrint Arch. 2020: 181 (2020) - [i52]Hiroshi Onuki, Yusuke Aikawa, Tsuyoshi Takagi:
The Existence of Cycles in the Supersingular Isogeny Graphs Used in SIKE. IACR Cryptol. ePrint Arch. 2020: 439 (2020) - [i51]Satoshi Okada, Yuntao Wang, Tsuyoshi Takagi:
Improving Key Mismatch Attack on NewHope with Fewer Queries. IACR Cryptol. ePrint Arch. 2020: 585 (2020) - [i50]Tomoki Moriya, Hiroshi Onuki, Tsuyoshi Takagi:
SiGamal: A supersingular isogeny-based PKE and its application to a PRF. IACR Cryptol. ePrint Arch. 2020: 613 (2020) - [i49]Shuhei Nakamura, Yasuhiko Ikematsu, Yacheng Wang, Jintai Ding, Tsuyoshi Takagi:
New Complexity Estimation on the Rainbow-Band-Separation Attack. IACR Cryptol. ePrint Arch. 2020: 703 (2020) - [i48]Tomoki Kawashima, Katsuyuki Takashima, Yusuke Aikawa, Tsuyoshi Takagi:
An Efficient Authenticated Key Exchange from Random Self-Reducibility on CSIDH. IACR Cryptol. ePrint Arch. 2020: 1178 (2020) - [i47]Hiroki Furue, Yasuhiko Ikematsu, Yutaro Kiyomura, Tsuyoshi Takagi:
A New Variant of Unbalanced Oil and Vinegar Using Quotient Ring: QR-UOV. IACR Cryptol. ePrint Arch. 2020: 1243 (2020)
2010 – 2019
- 2019
- [j104]Yacheng Wang, Yasuhiko Ikematsu, Dung Hoang Duong
, Tsuyoshi Takagi:
The Secure Parameters and Efficient Decryption Algorithm for Multivariate Public Key Cryptosystem EFC. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 102-A(9): 1028-1036 (2019) - [j103]Kotaro Matsuda, Atsushi Takayasu
, Tsuyoshi Takagi:
Explicit Relation between Low-Dimensional LLL-Reduced Bases and Shortest Vectors. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 102-A(9): 1091-1100 (2019) - [j102]Yasufumi Hashimoto
, Yasuhiko Ikematsu, Tsuyoshi Takagi:
Chosen Message Attack on Multivariate Signature ELSA at Asiacrypt 2017. J. Inf. Process. 27: 517-524 (2019) - [j101]Chi Cheng
, Yue Qin
, Rongxing Lu
, Tao Jiang
, Tsuyoshi Takagi:
Batten Down the Hatches: Securing Neighborhood Area Networks of Smart Grid in the Quantum Era. IEEE Trans. Smart Grid 10(6): 6386-6395 (2019) - [c141]Jintai Ding, Xinwei Gao, Tsuyoshi Takagi, Yuntao Wang
:
One Sample Ring-LWE with Rounding and Its Application to Key Exchange. ACNS 2019: 323-343 - [c140]Tomoki Moriya
, Katsuyuki Takashima, Tsuyoshi Takagi:
Group Key Exchange from CSIDH and Its Application to Trusted Setup in Supersingular Isogeny Cryptosystems. Inscrypt 2019: 86-98 - [c139]Taiga Mizuide, Atsushi Takayasu
, Tsuyoshi Takagi:
Tight Reductions for Diffie-Hellman Variants in the Algebraic Group Model. CT-RSA 2019: 169-188 - [c138]Hiroki Furue, Dung Hoang Duong
, Tsuyoshi Takagi:
An Efficient MQ-Based Signature in the QROM. CANDAR 2019: 10-17 - [c137]Partha Sarathi Roy
, Kirill Morozov, Kazuhide Fukushima
, Shinsaku Kiyomoto, Tsuyoshi Takagi:
Security Analysis and Efficient Implementation of Code-based Signature Schemes. ICISSP 2019: 213-220 - [c136]Hiroshi Onuki
, Yusuke Aikawa, Tsutomu Yamazaki, Tsuyoshi Takagi:
(Short Paper) A Faster Constant-Time Algorithm of CSIDH Keeping Two Points. IWSEC 2019: 23-33 - [i46]Hiroshi Onuki, Yusuke Aikawa, Tsutomu Yamazaki, Tsuyoshi Takagi:
A Faster Constant-time Algorithm of CSIDH keeping Two Torsion Points. IACR Cryptol. ePrint Arch. 2019: 353 (2019) - [i45]Tomoki Moriya, Hiroshi Onuki, Tsuyoshi Takagi:
How to Construct CSIDH on Edwards Curves. IACR Cryptol. ePrint Arch. 2019: 843 (2019) - [i44]Jintai Ding, Seungki Kim, Tsuyoshi Takagi, Yuntao Wang:
LLL and stochastic sandpile models. IACR Cryptol. ePrint Arch. 2019: 1009 (2019) - [i43]Hiroshi Onuki, Tsuyoshi Takagi:
On collisions related to an ideal class of order 3 in CSIDH. IACR Cryptol. ePrint Arch. 2019: 1209 (2019) - 2018
- [j100]Tsuyoshi Takagi:
Recent Developments in Post-Quantum Cryptography. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 101-A(1): 3-11 (2018) - [j99]Yasuhiko Ikematsu, Dung Hoang Duong
, Albrecht Petzoldt, Tsuyoshi Takagi:
An Efficient Key Generation of ZHFE Public Key Cryptosystem. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 101-A(1): 29-38 (2018) - [j98]Yuntao Wang
, Yoshinori Aono, Tsuyoshi Takagi:
Hardness Evaluation for Search LWE Problem Using Progressive BKZ Simulator. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 101-A(12): 2162-2170 (2018) - [j97]Ye Yuan
, Junting Xiao, Kazuhide Fukushima
, Shinsaku Kiyomoto, Tsuyoshi Takagi:
Portable Implementation of Postquantum Encryption Schemes and Key Exchange Protocols on JavaScript-Enabled Platforms. Secur. Commun. Networks 2018: 9846168:1-9846168:14 (2018) - [c135]Yacheng Wang, Yasuhiko Ikematsu, Dung Hoang Duong
, Tsuyoshi Takagi:
Efficient Decryption Algorithms for Extension Field Cancellation Type Encryption Schemes. ACISP 2018: 487-501 - [c134]Yuntao Wang
, Tsuyoshi Takagi:
Improving the BKZ Reduction Algorithm by Quick Reordering Technique. ACISP 2018: 787-795 - [c133]Hiroki Okada
, Atsushi Takayasu
, Kazuhide Fukushima
, Shinsaku Kiyomoto, Tsuyoshi Takagi:
On the Complexity of the LWR-Solving BKW Algorithm. ICISC 2018: 196-214 - [c132]Yasuhiko Ikematsu, Koichiro Akiyama, Tsuyoshi Takagi:
An Improvement on the Linear Algebraic Attack for the Indeterminate Equation Encryption Scheme. ISITA 2018: 389-393 - [c131]Yasufumi Hashimoto
, Yasuhiko Ikematsu, Tsuyoshi Takagi:
Chosen Message Attack on Multivariate Signature ELSA at Asiacrypt 2017. IWSEC 2018: 3-18 - [c130]Weiyao Wang, Yuntao Wang
, Atsushi Takayasu, Tsuyoshi Takagi:
Estimated Cost for Solving Generalized Learning with Errors Problem via Embedding Techniques. IWSEC 2018: 87-103 - [c129]Yasuhiko Ikematsu, Ray A. Perlner, Daniel Smith-Tone, Tsuyoshi Takagi, Jeremy Vates:
HFERP - A New Multivariate Encryption Scheme. PQCrypto 2018: 396-416 - [e13]Fagen Li, Tsuyoshi Takagi, Chunxiang Xu, Xiaosong Zhang:
Frontiers in Cyber Security - First International Conference, FCS 2018, Chengdu, China, November 5-7, 2018, Proceedings. Communications in Computer and Information Science 879, Springer 2018, ISBN 978-981-13-3094-0 [contents] - [i42]Jintai Ding, Seungki Kim, Tsuyoshi Takagi, Yuntao Wang:
Why 1.02? The root Hermite factor of LLL and stochastic sandpile models. CoRR abs/1804.03285 (2018) - [i41]Yasufumi Hashimoto, Yasuhiko Ikematsu, Tsuyoshi Takagi:
Chosen Message Attack on Multivariate Signature ELSA at Asiacrypt 2017. IACR Cryptol. ePrint Arch. 2018: 310 (2018) - [i40]Taiga Mizuide, Atsushi Takayasu, Tsuyoshi Takagi:
Tight Reductions for Diffie-Hellman Variants in the Algebraic Group Model. IACR Cryptol. ePrint Arch. 2018: 1220 (2018) - [i39]Ye Yuan, Kazuhide Fukushima, Junting Xiao, Shinsaku Kiyomoto, Tsuyoshi Takagi:
Memory-Constrained Implementation of Lattice-based Encryption Scheme on the Standard Java Card Platform. IACR Cryptol. ePrint Arch. 2018: 1238 (2018) - 2017
- [j96]Chi Cheng, Rongxing Lu, Albrecht Petzoldt, Tsuyoshi Takagi:
Securing the Internet of Things in a Quantum World. IEEE Commun. Mag. 55(2): 116-120 (2017) - [j95]Rui Xu, Kirill Morozov, Yanjiang Yang, Jianying Zhou
, Tsuyoshi Takagi:
Efficient outsourcing of secure k-nearest neighbour query over encrypted database. Comput. Secur. 69: 65-83 (2017) - [j94]Rui Xu, Kirill Morozov, Tsuyoshi Takagi:
Secret Sharing with Cheaters Using Multi-Receiver Authentication. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 100-A(1): 115-125 (2017) - [j93]Hyungrok Jo, Christophe Petit
, Tsuyoshi Takagi:
Full Cryptanalysis of Hash Functions Based on Cubic Ramanujan Graphs. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 100-A(9): 1891-1899 (2017) - [j92]Dung Hoang Duong
, Albrecht Petzoldt, Tsuyoshi Takagi:
CyclicSRP - A Multivariate Encryption Scheme with a Partially Cyclic Public Key. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 100-A(12): 2691-2698 (2017) - [j91]Hikari Tachibana, Katsuyuki Takashima, Tsuyoshi Takagi:
Constructing an efficient hash function from $3$-isogenies. JSIAM Lett. 9: 29-32 (2017) - [c128]Yutaro Kiyomura, Akiko Inoue, Yuto Kawahara, Masaya Yasuda, Tsuyoshi Takagi, Tetsutaro Kobayashi:
Secure and Efficient Pairing at 256-Bit Security Level. ACNS 2017: 59-79 - [c127]Rui Xu, Sze Ling Yeo, Kazuhide Fukushima
, Tsuyoshi Takagi, Hwajung Seo, Shinsaku Kiyomoto, Matt Henricksen:
An Experimental Study of the BDD Approach for the Search LWE Problem. ACNS 2017: 253-272 - [c126]Yasuhiko Ikematsu, Dung Hoang Duong
, Albrecht Petzoldt, Tsuyoshi Takagi:
Revisiting the Efficient Key Generation of ZHFE. C2SI 2017: 195-212 - [c125]Ye Yuan
, Kazuhide Fukushima
, Shinsaku Kiyomoto, Tsuyoshi Takagi:
Memory-constrained implementation of lattice-based encryption scheme on standard Java Card. HOST 2017: 47-50 - [c124]Yuntao Wang
, Yoshinori Aono, Tsuyoshi Takagi:
An Experimental Study of Kannan's Embedding Technique for the Search LWE Problem. ICICS 2017: 541-553 - [c123]Dung Hoang Duong
, Masaya Yasuda, Tsuyoshi Takagi:
Choosing Parameters for the Subfield Lattice Attack Against Overstretched NTRU. ISC 2017: 79-91 - [c122]Saed Alsayigh
, Jintai Ding, Tsuyoshi Takagi, Yuntao Wang
:
The Beauty and the Beasts - The Hard Cases in LLL Reduction. IWSEC 2017: 19-35 - [c121]Koichiro Akiyama, Yasuhiro Goto, Shinya Okumura, Tsuyoshi Takagi, Koji Nuida
, Goichiro Hanaoka:
A Public-Key Encryption Scheme Based on Non-linear Indeterminate Equations. SAC 2017: 215-234 - [p1]Tsuyoshi Takagi:
Introduction to CREST Crypto-Math Project. CREST Crypto-Math Project 2017: 1-14 - [e12]Tsuyoshi Takagi, Masato Wakayama, Keisuke Tanaka, Noboru Kunihiro, Kazufumi Kimoto, Dung Hoang Duong:
Mathematical Modelling for Next-Generation Cryptography: CREST Crypto-Math Project. Mathematics for Industry, Springer Singapore 2017, ISBN 978-981-10-5064-0 [contents] - [e11]Tsuyoshi Takagi, Thomas Peyrin:
Advances in Cryptology - ASIACRYPT 2017 - 23rd International Conference on the Theory and Applications of Cryptology and Information Security, Hong Kong, China, December 3-7, 2017, Proceedings, Part I. Lecture Notes in Computer Science 10624, Springer 2017, ISBN 978-3-319-70693-1 [contents] - [e10]Tsuyoshi Takagi, Thomas Peyrin:
Advances in Cryptology - ASIACRYPT 2017 - 23rd International Conference on the Theory and Applications of Cryptology and Information Security, Hong Kong, China, December 3-7, 2017, Proceedings, Part II. Lecture Notes in Computer Science 10625, Springer 2017, ISBN 978-3-319-70696-2 [contents] - [e9]Tsuyoshi Takagi, Thomas Peyrin:
Advances in Cryptology - ASIACRYPT 2017 - 23rd International Conference on the Theory and Applications of Cryptology and Information Security, Hong Kong, China, December 3-7, 2017, Proceedings, Part III. Lecture Notes in Computer Science 10626, Springer 2017, ISBN 978-3-319-70699-3 [contents] - [e8]Tanja Lange, Tsuyoshi Takagi:
Post-Quantum Cryptography - 8th International Workshop, PQCrypto 2017, Utrecht, The Netherlands, June 26-28, 2017, Proceedings. Lecture Notes in Computer Science 10346, Springer 2017, ISBN 978-3-319-59878-9 [contents] - [i38]Dung Hoang Duong, Masaya Yasuda, Tsuyoshi Takagi:
Choosing Parameters for the Subfield Lattice Attack against overstretched NTRU. IACR Cryptol. ePrint Arch. 2017: 959 (2017) - [i37]Koichiro Akiyama, Yasuhiro Goto, Shinya Okumura, Tsuyoshi Takagi, Koji Nuida, Goichiro Hanaoka, Hideo Shimizu, Yasuhiko Ikematsu:
A Public-key Encryption Scheme Based on Non-linear Indeterminate Equations (Giophantus). IACR Cryptol. ePrint Arch. 2017: 1241 (2017) - 2016
- [j90]