The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Tsuyoshi Takagi: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Ingrid Biehl, Tsuyoshi Takagi
    A New Distributed Primality Test for Shared RSA Keys Using Quadratic Fields. [Citation Graph (0, 0)][DBLP]
    ACISP, 2002, pp:1-16 [Conf]
  2. Izuru Kitamura, Masanobu Katagi, Tsuyoshi Takagi
    A Complete Divisor Class Halving Algorithm for Hyperelliptic Curve Cryptosystems of Genus Two. [Citation Graph (0, 0)][DBLP]
    ACISP, 2005, pp:146-157 [Conf]
  3. Katsuyuki Okeya, Tsuyoshi Takagi, Camille Vuillaume
    On the Exact Flexibility of the Flexible Countermeasure Against Side Channel Attacks. [Citation Graph (0, 0)][DBLP]
    ACISP, 2004, pp:466-477 [Conf]
  4. Katsuyuki Okeya, Tsuyoshi Takagi, Camille Vuillaume
    Efficient Representations on Koblitz Curves with Resistance to Side Channel Attacks. [Citation Graph (0, 0)][DBLP]
    ACISP, 2005, pp:218-229 [Conf]
  5. Kouichi Sakurai, Tsuyoshi Takagi
    On the Security of a Modified Paillier Public-Key Primitive. [Citation Graph (0, 0)][DBLP]
    ACISP, 2002, pp:436-448 [Conf]
  6. Katsuyuki Okeya, Tsuyoshi Takagi
    Security Analysis of CRT-Based Cryptosystems. [Citation Graph (0, 0)][DBLP]
    ACNS, 2004, pp:383-397 [Conf]
  7. Masahiro Fujita, Gabriel Costa, Rika Hasegawa, Tsuyoshi Takagi, Jun Yokono, Hideki Shimomura
    Architecture and preliminary experimental results for emotionally grounded symbol acquisition. [Citation Graph (0, 0)][DBLP]
    Agents, 2001, pp:35-36 [Conf]
  8. Chunhua Su, Feng Bao, Jianying Zhou, Tsuyoshi Takagi, Kouichi Sakurai
    Privacy-Preserving Two-Party K-Means Clustering via Secure Approximation. [Citation Graph (0, 0)][DBLP]
    AINA Workshops (1), 2007, pp:385-391 [Conf]
  9. Eun-Kyung Ryu, Tsuyoshi Takagi
    Efficient Conjunctive Keyword-Searchable Encryption. [Citation Graph (0, 0)][DBLP]
    AINA Workshops (1), 2007, pp:409-414 [Conf]
  10. Kaoru Kurosawa, Katja Schmidt-Samoa, Tsuyoshi Takagi
    A Complete and Explicit Security Reduction Algorithm for RSA-Based Cryptosystems. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 2003, pp:474-491 [Conf]
  11. Kaoru Kurosawa, Tsuyoshi Takagi
    Some RSA-Based Encryption Schemes with Tight Security Reduction. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 2003, pp:19-36 [Conf]
  12. Kaoru Kurosawa, Tsuyoshi Takagi
    New Approach for Selectively Convertible Undeniable Signature Schemes. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 2006, pp:428-443 [Conf]
  13. Detlef Hühnlein, Tsuyoshi Takagi
    Reducing Logarithms in Totally Non-maximal Imaginary Quadratic Orders to Logarithms in Finite Fields. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 1999, pp:219-231 [Conf]
  14. Hisayoshi Sato, Tsuyoshi Takagi, Satoru Tezuka, Kazuo Takaragi
    Generalized Powering Functions and Their Application to Digital Signatures. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 2003, pp:434-451 [Conf]
  15. Tae-Hyun Kim, Tsuyoshi Takagi, Dong-Guk Han, Ho Won Kim, Jongin Lim
    Side Channel Attacks and Countermeasures on Pairing Based Cryptosystems over Binary Fields. [Citation Graph (0, 0)][DBLP]
    CANS, 2006, pp:168-181 [Conf]
  16. Toru Akishita, Tsuyoshi Takagi
    Power Analysis to ECC Using Differential Power Between Multiplication and Squaring. [Citation Graph (0, 0)][DBLP]
    CARDIS, 2006, pp:151-164 [Conf]
  17. Michael Hartmann, Sachar Paulus, Tsuyoshi Takagi
    NICE - New Ideal Coset Encryption. [Citation Graph (0, 0)][DBLP]
    CHES, 1999, pp:328-339 [Conf]
  18. Katsuyuki Okeya, Tsuyoshi Takagi
    A More Flexible Countermeasure against Side Channel Attacks Using Window Method. [Citation Graph (0, 0)][DBLP]
    CHES, 2003, pp:397-410 [Conf]
  19. Katsuyuki Okeya, Tsuyoshi Takagi, Camille Vuillaume
    Short Memory Scalar Multiplication on Koblitz Curves. [Citation Graph (0, 0)][DBLP]
    CHES, 2005, pp:91-105 [Conf]
  20. Lihua Wang, Takeshi Okamoto, Tsuyoshi Takagi, Eiji Okamoto
    Insider Impersonation-MIM Attack to Tripartite Key Agreement Scheme and an Efficient Protocol for Multiple Keys. [Citation Graph (0, 0)][DBLP]
    CIS (2), 2005, pp:198-203 [Conf]
  21. Katsuyuki Okeya, Katja Schmidt-Samoa, Christian Spahn, Tsuyoshi Takagi
    Signed Binary Representations Revisited. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 2004, pp:123-139 [Conf]
  22. Tsuyoshi Takagi
    Fast RSA-Type Cryptosystems Using N-Adic Expansion. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1997, pp:372-384 [Conf]
  23. Tsuyoshi Takagi
    Fast RSA-Type Cryptosystem Modulo pkq. [Citation Graph (0, 0)][DBLP]
    CRYPTO, 1998, pp:318-326 [Conf]
  24. Katsuyuki Okeya, Tsuyoshi Takagi
    The Width-w NAF Method Provides Small Memory and Fast Elliptic Scalar Multiplications Secure against Side Channel Attacks. [Citation Graph (0, 0)][DBLP]
    CT-RSA, 2003, pp:328-342 [Conf]
  25. Erik Dahmen, Katsuyuki Okeya, Tsuyoshi Takagi
    An Advanced Method for Joint Scalar Multiplications on Memory Constraint Devices. [Citation Graph (0, 0)][DBLP]
    ESAS, 2005, pp:189-204 [Conf]
  26. Dong-Guk Han, Tsuyoshi Takagi, Tae-Hyun Kim, Howon Kim, Kyoil Chung
    Collision Attack on XTR and a Countermeasure with a Fixed Pattern. [Citation Graph (0, 0)][DBLP]
    EUC Workshops, 2005, pp:864-873 [Conf]
  27. Detlef Hühnlein, Michael J. Jacobson Jr., Sachar Paulus, Tsuyoshi Takagi
    A Cryptosystem Based on Non-maximal Imaginary Quadratic Orders with Fast Decryption. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1998, pp:294-307 [Conf]
  28. Dong-Guk Han, Tsuyoshi Takagi, Howon Kim, Kyoil Chung
    New Security Problem in RFID Systems "Tag Killing". [Citation Graph (0, 0)][DBLP]
    ICCSA (3), 2006, pp:375-384 [Conf]
  29. Tetsuya Izu, Tsuyoshi Takagi
    Fast Elliptic Curve Multiplications with SIMD Operations. [Citation Graph (0, 0)][DBLP]
    ICICS, 2002, pp:217-230 [Conf]
  30. Tetsuya Izu, Tsuyoshi Takagi
    Efficient Computations of the Tate Pairingfor the Large MOV Degrees. [Citation Graph (0, 0)][DBLP]
    ICISC, 2002, pp:283-297 [Conf]
  31. Johannes Buchmann, Kouichi Sakurai, Tsuyoshi Takagi
    An IND-CCA2 Public-Key Cryptosystem with Fast Decryption. [Citation Graph (0, 0)][DBLP]
    ICISC, 2001, pp:51-71 [Conf]
  32. Masanobu Katagi, Toru Akishita, Izuru Kitamura, Tsuyoshi Takagi
    Some Improved Algorithms for Hyperelliptic Curve Cryptosystems Using Degenerate Divisors. [Citation Graph (0, 0)][DBLP]
    ICISC, 2004, pp:296-312 [Conf]
  33. Detlef Hühnlein, Andreas Meyer, Tsuyoshi Takagi
    Rabin and RSA analogues based on non-maximal imaginary quadratic orders. [Citation Graph (0, 0)][DBLP]
    ICISC, 1998, pp:221-240 [Conf]
  34. Sachar Paulus, Tsuyoshi Takagi
    A generalization of the Diffie-Hellman problem and related cryptosystems allowing fast decryption. [Citation Graph (0, 0)][DBLP]
    ICISC, 1998, pp:211-220 [Conf]
  35. Kouichi Sakurai, Tsuyoshi Takagi
    A Reject Timing Attackon an IND-CCA2 Public-Key Cryptosystem. [Citation Graph (0, 0)][DBLP]
    ICISC, 2002, pp:359-373 [Conf]
  36. Ronald C. Arkin, Masahiro Fujita, Tsuyoshi Takagi, Rika Hasegawa
    Ethological Modeling and Architecture for an Entertainment Robot. [Citation Graph (0, 0)][DBLP]
    ICRA, 2001, pp:453-458 [Conf]
  37. Tetsuya Izu, Bodo Möller, Tsuyoshi Takagi
    Improved Elliptic Curve Multiplication Methods Resistant against Side Channel Attacks. [Citation Graph (0, 0)][DBLP]
    INDOCRYPT, 2002, pp:296-313 [Conf]
  38. David Galindo, Sebastià Martín Molleví, Tsuyoshi Takagi, Jorge Luis Villar
    A Provably Secure Elliptic Curve Scheme with Fast Encryption. [Citation Graph (0, 0)][DBLP]
    INDOCRYPT, 2004, pp:245-259 [Conf]
  39. Hisayoshi Sato, Daniel Schepers, Tsuyoshi Takagi
    Exact Analysis of Montgomery Multiplication. [Citation Graph (0, 0)][DBLP]
    INDOCRYPT, 2004, pp:290-304 [Conf]
  40. Tsuyoshi Takagi, Shozo Naito
    The Multi-variable Modular Polynomial and Its Applications to Cryptography. [Citation Graph (0, 0)][DBLP]
    ISAAC, 1996, pp:386-396 [Conf]
  41. Dong-Guk Han, Tsuyoshi Takagi, Jongin Lim
    Further Security Analysis of XTR. [Citation Graph (0, 0)][DBLP]
    ISPEC, 2006, pp:33-44 [Conf]
  42. Chunhua Su, Jianying Zhou, Feng Bao, Tsuyoshi Takagi, Kouichi Sakurai
    Two-Party Privacy-Preserving Agglomerative Document Clustering. [Citation Graph (0, 0)][DBLP]
    ISPEC, 2007, pp:193-208 [Conf]
  43. Masaaki Shirase, Tsuyoshi Takagi, Eiji Okamoto
    Some Efficient Algorithms for the Final Exponentiation of eta T Pairing. [Citation Graph (0, 0)][DBLP]
    ISPEC, 2007, pp:254-268 [Conf]
  44. Toru Akishita, Tsuyoshi Takagi
    Zero-Value Point Attacks on Elliptic Curve Cryptosystem. [Citation Graph (0, 0)][DBLP]
    ISC, 2003, pp:218-233 [Conf]
  45. Tsuyoshi Takagi, Sung-Ming Yen, Bo-Ching Wu
    Radix-r Non-Adjacent Form. [Citation Graph (0, 0)][DBLP]
    ISC, 2004, pp:99-110 [Conf]
  46. Katsuyuki Okeya, Tsuyoshi Takagi, Camille Vuillaume
    On the Importance of Protecting Delta in SFLASH against Side Channel Attacks. [Citation Graph (0, 0)][DBLP]
    ITCC (2), 2004, pp:560-568 [Conf]
  47. Katja Schmidt-Samoa, Tsuyoshi Takagi
    Paillier's Cryptosystem Modulo p2q and Its Applications to Trapdoor Commitment Schemes. [Citation Graph (0, 0)][DBLP]
    Mycrypt, 2005, pp:296-313 [Conf]
  48. Toru Akishita, Tsuyoshi Takagi
    On the Optimal Parameter Choice for Elliptic Curve Cryptosystems Using Isogeny. [Citation Graph (0, 0)][DBLP]
    Public Key Cryptography, 2004, pp:346-359 [Conf]
  49. Tetsuya Izu, Tsuyoshi Takagi
    A Fast Parallel Elliptic Curve Multiplication Resistant against Side Channel Attacks. [Citation Graph (0, 0)][DBLP]
    Public Key Cryptography, 2002, pp:280-296 [Conf]
  50. Tetsuya Izu, Tsuyoshi Takagi
    Exceptional Procedure Attack on Elliptic Curve Cryptosystems. [Citation Graph (0, 0)][DBLP]
    Public Key Cryptography, 2003, pp:224-239 [Conf]
  51. Kouichi Sakurai, Tsuyoshi Takagi
    New Semantically Secure Public-Key Cryptosystems from the RSA-Primitive. [Citation Graph (0, 0)][DBLP]
    Public Key Cryptography, 2002, pp:1-16 [Conf]
  52. Masanobu Katagi, Izuru Kitamura, Toru Akishita, Tsuyoshi Takagi
    Novel Efficient Implementations of Hyperelliptic Curve Cryptosystems Using Degenerate Divisors. [Citation Graph (0, 0)][DBLP]
    WISA, 2004, pp:345-359 [Conf]
  53. Raylin Tso, Takeshi Okamoto, Tsuyoshi Takagi, Eiji Okamoto
    An id-based non-interactive tripartite key agreement protocol with K-resilience. [Citation Graph (0, 0)][DBLP]
    Communications and Computer Networks, 2005, pp:38-42 [Conf]
  54. Ingrid Biehl, Sachar Paulus, Tsuyoshi Takagi
    Efficient Undeniable Signature Schemes Based on Ideal Arithmetic in Quadratic Orders. [Citation Graph (0, 0)][DBLP]
    Des. Codes Cryptography, 2004, v:31, n:2, pp:99-123 [Journal]
  55. Marc Joye, Jean-Jacques Quisquater, Tsuyoshi Takagi
    How to Choose Secret Parameters for RSA-Type Cryptosystems over Elliptic Curves. [Citation Graph (0, 0)][DBLP]
    Des. Codes Cryptography, 2001, v:23, n:3, pp:297-316 [Journal]
  56. Toru Akishita, Tsuyoshi Takagi
    Zero-Value Register Attack on Elliptic Curve Cryptosystem. [Citation Graph (0, 0)][DBLP]
    IEICE Transactions, 2005, v:88, n:1, pp:132-139 [Journal]
  57. Toru Akishita, Tsuyoshi Takagi
    On the Optimal Parameter Choice for Elliptic Curve Cryptosystems Using Isogeny. [Citation Graph (0, 0)][DBLP]
    IEICE Transactions, 2005, v:88, n:1, pp:140-146 [Journal]
  58. Tetsuya Izu, Tsuyoshi Takagi
    Fast Elliptic Curve Multiplications with SIMD Operations. [Citation Graph (0, 0)][DBLP]
    IEICE Transactions, 2004, v:87, n:1, pp:85-93 [Journal]
  59. Tetsuya Izu, Tsuyoshi Takagi
    Fast Elliptic Curve Multiplications Resistant against Side Channel Attacks. [Citation Graph (0, 0)][DBLP]
    IEICE Transactions, 2005, v:88, n:1, pp:161-171 [Journal]
  60. Katsuyuki Okeya, Tsuyoshi Takagi
    SCA-Resistant and Fast Elliptic Scalar Multiplication Based on wNAF. [Citation Graph (0, 0)][DBLP]
    IEICE Transactions, 2004, v:87, n:1, pp:75-84 [Journal]
  61. Katsuyuki Okeya, Tsuyoshi Takagi, Camille Vuillaume
    On the Importance of Protecting in SFLASH against Side Channel Attacks. [Citation Graph (0, 0)][DBLP]
    IEICE Transactions, 2005, v:88, n:1, pp:123-131 [Journal]
  62. Tsuyoshi Takagi
    A Fast RSA-Type Public-Key Primitive Modulo pkq Using Hensel Lifting. [Citation Graph (0, 0)][DBLP]
    IEICE Transactions, 2004, v:87, n:1, pp:94-101 [Journal]
  63. Katsuyuki Okeya, Tsuyoshi Takagi
    Security analysis of CRT-based cryptosystems. [Citation Graph (0, 0)][DBLP]
    Int. J. Inf. Sec., 2006, v:5, n:3, pp:177-185 [Journal]
  64. Sachar Paulus, Tsuyoshi Takagi
    A New Public-Key Cryptosystem over a Quadratic Order with Quadratic Decryption Time. [Citation Graph (0, 0)][DBLP]
    J. Cryptology, 2000, v:13, n:2, pp:263-272 [Journal]
  65. Ronald C. Arkin, Masahiro Fujita, Tsuyoshi Takagi, Rika Hasegawa
    An ethological and emotional basis for human-robot interaction. [Citation Graph (0, 0)][DBLP]
    Robotics and Autonomous Systems, 2003, v:42, n:3-4, pp:191-201 [Journal]
  66. Katja Schmidt-Samoa, Olivier Semay, Tsuyoshi Takagi
    Analysis of Fractional Window Recoding Methods and Their Application to Elliptic Curve Cryptosystems. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Computers, 2006, v:55, n:1, pp:48-57 [Journal]
  67. Masaaki Shirase, Dong-Guk Han, Yasushi Hibino, Ho Won Kim, Tsuyoshi Takagi
    Compressed XTR. [Citation Graph (0, 0)][DBLP]
    ACNS, 2007, pp:420-431 [Conf]
  68. Jean-Luc Beuchat, Masaaki Shirase, Tsuyoshi Takagi, Eiji Okamoto
    An Algorithm for the nt Pairing Calculation in Characteristic Three and its Hardware Implementation. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Computer Arithmetic, 2007, pp:97-104 [Conf]
  69. Yuto Kawahara, Tsuyoshi Takagi, Eiji Okamoto
    Efficient Implementation of Tate Pairing on a Mobile Phone Using Java. [Citation Graph (0, 0)][DBLP]
    CIS, 2006, pp:396-405 [Conf]
  70. Kyosuke Osaka, Tsuyoshi Takagi, Kenichi Yamazaki, Osamu Takahashi
    An Efficient and Secure RFID Security Method with Ownership Transfer. [Citation Graph (0, 0)][DBLP]
    CIS, 2006, pp:778-787 [Conf]
  71. Yukiko Hoshino, Tsuyoshi Takagi, Ugo Di Profio, Masahiro Fujita
    Behavior Description and Control using Behavior Module for Personal Robot. [Citation Graph (0, 0)][DBLP]
    ICRA, 2004, pp:4165-4171 [Conf]
  72. Toshiya Nakajima, Tetsuya Izu, Tsuyoshi Takagi
    Reduction Optimal Trinomials for Efficient Software Implementation of the etaT Pairing. [Citation Graph (0, 0)][DBLP]
    IWSEC, 2007, pp:44-57 [Conf]
  73. Jean-Luc Beuchat, Nicolas Brisebarre, Masaaki Shirase, Tsuyoshi Takagi, Eiji Okamoto
    A Coprocessor for the Final Exponentiation of the eta T Pairing in Characteristic Three. [Citation Graph (0, 0)][DBLP]
    WAIFI, 2007, pp:25-39 [Conf]

  74. A Secure RFID Protocol based on Insubvertible Encryption Using Guardian Proxy. [Citation Graph (, )][DBLP]


  75. A New Scheme for Distributed Density Estimation based Privacy-Preserving Clustering. [Citation Graph (, )][DBLP]


  76. Identity-Based Hybrid Signcryption. [Citation Graph (, )][DBLP]


  77. On the Security of Online/Offline Signatures and Multisignatures from ACISP'06. [Citation Graph (, )][DBLP]


  78. Efficient Multi-PKG ID-Based Signcryption for Ad Hoc Networks. [Citation Graph (, )][DBLP]


  79. Efficient Signcryption Key Encapsulation without Random Oracles. [Citation Graph (, )][DBLP]


  80. Efficient Arithmetic on Subfield Elliptic Curves over Small Finite Fields of Odd Characteristic. [Citation Graph (, )][DBLP]


  81. An Efficient Countermeasure against Side Channel Attacks for Pairing Computation. [Citation Graph (, )][DBLP]


  82. Certificateless Hybrid Signcryption. [Citation Graph (, )][DBLP]


  83. Network Forensics on Mobile Ad-Hoc Networks. [Citation Graph (, )][DBLP]


  84. Key Management Using Certificateless Public Key Cryptography in Ad Hoc Networks. [Citation Graph (, )][DBLP]


  85. Solving a 676-Bit Discrete Logarithm Problem in GF(36n). [Citation Graph (, )][DBLP]


  86. An Efficient Residue Group Multiplication for the etaT Pairing over F3m. [Citation Graph (, )][DBLP]


  87. Universal etaT Pairing Algorithm over Arbitrary Extension Degree. [Citation Graph (, )][DBLP]


  88. Efficient Implementation of the Pairing on Mobilephones Using BREW. [Citation Graph (, )][DBLP]


  89. Towards Confidentiality of ID-Based Signcryption Schemes under without Random Oracle Model. [Citation Graph (, )][DBLP]


  90. Fuzzy Biometric Signcryption Scheme with Bilinear Pairings in the Standard Model. [Citation Graph (, )][DBLP]


  91. Faster Implementation of eta-T Pairing over GF(3m) Using Minimum Number of Logical Instructions for GF(3)-Addition. [Citation Graph (, )][DBLP]


  92. Digital Signatures Out of Second-Preimage Resistant Hash Functions. [Citation Graph (, )][DBLP]


Search in 0.043secs, Finished in 0.046secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002