The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Masahiko Takenaka: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Masahiko Takenaka, Takeshi Shimoyama, Takeshi Koshiba
    Theoretical Analysis of chi2 Attack on RC6. [Citation Graph (0, 0)][DBLP]
    ACISP, 2003, pp:142-153 [Conf]
  2. Kouichi Itoh, Tetsuya Izu, Masahiko Takenaka
    Improving the Randomized Initial Point Countermeasure Against DPA. [Citation Graph (0, 0)][DBLP]
    ACNS, 2006, pp:459-469 [Conf]
  3. Kouichi Itoh, Tetsuya Izu, Masahiko Takenaka
    Efficient Countermeasures against Power Analysis for Elliptic Curve Cryptosystems. [Citation Graph (0, 0)][DBLP]
    CARDIS, 2004, pp:99-114 [Conf]
  4. Kouichi Itoh, Tetsuya Izu, Masahiko Takenaka
    Address-Bit Differential Power Analysis of Cryptographic Schemes OK-ECDH and OK-ECDSA. [Citation Graph (0, 0)][DBLP]
    CHES, 2002, pp:129-143 [Conf]
  5. Kouichi Itoh, Tetsuya Izu, Masahiko Takenaka
    A Practical Countermeasure against Address-Bit Differential Power Analysis. [Citation Graph (0, 0)][DBLP]
    CHES, 2003, pp:382-396 [Conf]
  6. Kouichi Itoh, Masahiko Takenaka, Naoya Torii, Syouji Temma, Yasushi Kurihara
    Fast Implementation of Public-Key Cryptography ona DSP TMS320C6201. [Citation Graph (0, 0)][DBLP]
    CHES, 1999, pp:61-72 [Conf]
  7. Kouichi Itoh, Jun Yajima, Masahiko Takenaka, Naoya Torii
    DPA Countermeasures by Improving the Window Method. [Citation Graph (0, 0)][DBLP]
    CHES, 2002, pp:303-317 [Conf]
  8. Souichi Okada, Naoya Torii, Kouichi Itoh, Masahiko Takenaka
    Implementation of Elliptic Curve Cryptographic Coprocessor over GF(2m) on an FPGA. [Citation Graph (0, 0)][DBLP]
    CHES, 2000, pp:25-40 [Conf]
  9. Takeshi Shimoyama, Masahiko Takenaka, Takeshi Koshiba
    Multiple Linear Cryptanalysis of a Reduced Round RC6. [Citation Graph (0, 0)][DBLP]
    FSE, 2002, pp:76-88 [Conf]
  10. Takeshi Shimoyama, Hitoshi Yanami, Kazuhiro Yokoyama, Masahiko Takenaka, Kouichi Itoh, Jun Yajima, Naoya Torii, Hidema Tanaka
    The Block Cipher SC2000. [Citation Graph (0, 0)][DBLP]
    FSE, 2001, pp:312-327 [Conf]
  11. Kazuyoshi Furukawa, Masahiko Takenaka, Kouichi Itoh
    A Fast RSA Implementation on Itanium 2 Processor. [Citation Graph (0, 0)][DBLP]
    ICICS, 2006, pp:507-518 [Conf]
  12. Tetsuya Izu, Nobuyuki Kanaya, Masahiko Takenaka, Takashi Yoshioka
    PIATS: A Partially Sanitizable Signature Scheme. [Citation Graph (0, 0)][DBLP]
    ICICS, 2005, pp:72-83 [Conf]
  13. Kouichi Itoh, Masahiko Takenaka, Naoya Torii
    DPA Countermeasure Based on the "Masking Method". [Citation Graph (0, 0)][DBLP]
    ICISC, 2001, pp:440-456 [Conf]
  14. Tetsuya Izu, Noboru Kunihiro, Kazuo Ohta, Masahiko Takenaka, Takashi Yoshioka
    A Sanitizable Signature Scheme with Aggregation. [Citation Graph (0, 0)][DBLP]
    ISPEC, 2007, pp:51-64 [Conf]
  15. Shingo Fujimoto, Masahiko Takenaka
    Adoption of the IPsec-VPN for the Ubiquitous Network. [Citation Graph (0, 0)][DBLP]
    SAINT, 2006, pp:78-81 [Conf]
  16. Masahiko Takenaka, Takeshi Shimoyama, Takeshi Koshiba
    Theoretical Analysis of chi2 Attack on RC6. [Citation Graph (0, 0)][DBLP]
    IEICE Transactions, 2004, v:87, n:1, pp:28-36 [Journal]

  17. Analysis on Bleichenbacher's Forgery Attack. [Citation Graph (, )][DBLP]


  18. Yet Another Sanitizable Signature from Bilinear Maps. [Citation Graph (, )][DBLP]


  19. Experimental Results on Cheon's Algorithm. [Citation Graph (, )][DBLP]


  20. Multiple Designated Verifiers Signatures Reconsidered. [Citation Graph (, )][DBLP]


  21. How to Forge a Time-Stamp Which Adobe's Acrobat Accepts. [Citation Graph (, )][DBLP]


  22. Sanitizable and Deletable Signature. [Citation Graph (, )][DBLP]


Search in 0.002secs, Finished in 0.003secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002