The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Tetsuya Izu: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Kouichi Itoh, Tetsuya Izu, Masahiko Takenaka
    Improving the Randomized Initial Point Countermeasure Against DPA. [Citation Graph (0, 0)][DBLP]
    ACNS, 2006, pp:459-469 [Conf]
  2. Tetsuya Izu, Jun Kogure, Masayuki Noro, Kazuhiro Yokoyama
    Efficient Implementation of Schoof's Algorithm. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 1998, pp:66-79 [Conf]
  3. Kouichi Itoh, Tetsuya Izu, Masahiko Takenaka
    Efficient Countermeasures against Power Analysis for Elliptic Curve Cryptosystems. [Citation Graph (0, 0)][DBLP]
    CARDIS, 2004, pp:99-114 [Conf]
  4. Kouichi Itoh, Tetsuya Izu, Masahiko Takenaka
    Address-Bit Differential Power Analysis of Cryptographic Schemes OK-ECDH and OK-ECDSA. [Citation Graph (0, 0)][DBLP]
    CHES, 2002, pp:129-143 [Conf]
  5. Kouichi Itoh, Tetsuya Izu, Masahiko Takenaka
    A Practical Countermeasure against Address-Bit Differential Power Analysis. [Citation Graph (0, 0)][DBLP]
    CHES, 2003, pp:382-396 [Conf]
  6. Dong-Guk Han, Tetsuya Izu, Jongin Lim, Kouichi Sakurai
    Modified Power-Analysis Attacks on XTR and an Efficient Countermeasure. [Citation Graph (0, 0)][DBLP]
    ICICS, 2004, pp:305-317 [Conf]
  7. Tetsuya Izu, Nobuyuki Kanaya, Masahiko Takenaka, Takashi Yoshioka
    PIATS: A Partially Sanitizable Signature Scheme. [Citation Graph (0, 0)][DBLP]
    ICICS, 2005, pp:72-83 [Conf]
  8. Tetsuya Izu, Tsuyoshi Takagi
    Fast Elliptic Curve Multiplications with SIMD Operations. [Citation Graph (0, 0)][DBLP]
    ICICS, 2002, pp:217-230 [Conf]
  9. Tetsuya Izu, Tsuyoshi Takagi
    Efficient Computations of the Tate Pairingfor the Large MOV Degrees. [Citation Graph (0, 0)][DBLP]
    ICISC, 2002, pp:283-297 [Conf]
  10. Tetsuya Izu, Bodo Möller, Tsuyoshi Takagi
    Improved Elliptic Curve Multiplication Methods Resistant against Side Channel Attacks. [Citation Graph (0, 0)][DBLP]
    INDOCRYPT, 2002, pp:296-313 [Conf]
  11. Tetsuya Izu, Noboru Kunihiro, Kazuo Ohta, Masahiko Takenaka, Takashi Yoshioka
    A Sanitizable Signature Scheme with Aggregation. [Citation Graph (0, 0)][DBLP]
    ISPEC, 2007, pp:51-64 [Conf]
  12. Tetsuya Izu, Jun Kogure, Masayuki Noro, Kazuhiro Yokoyama
    Parameters for Secure Elliptic Curve Cryptosystem - Improvements on Schoof's Algorithm. [Citation Graph (0, 0)][DBLP]
    Public Key Cryptography, 1998, pp:253-257 [Conf]
  13. Tetsuya Izu, Jun Kogure, Kazuhiro Yokoyama
    Efficient Implementation of Schoof's Algorithm in Case of Characteristic 2. [Citation Graph (0, 0)][DBLP]
    Public Key Cryptography, 2000, pp:210-222 [Conf]
  14. Tetsuya Izu, Tsuyoshi Takagi
    A Fast Parallel Elliptic Curve Multiplication Resistant against Side Channel Attacks. [Citation Graph (0, 0)][DBLP]
    Public Key Cryptography, 2002, pp:280-296 [Conf]
  15. Tetsuya Izu, Tsuyoshi Takagi
    Exceptional Procedure Attack on Elliptic Curve Cryptosystems. [Citation Graph (0, 0)][DBLP]
    Public Key Cryptography, 2003, pp:224-239 [Conf]
  16. Tetsuya Izu, Noboru Kunihiro, Kazuo Ohta, Takeshi Shimoyama
    Analysis on the Clockwise Transposition Routing for Dedicated Factoring Devices. [Citation Graph (0, 0)][DBLP]
    WISA, 2005, pp:232-242 [Conf]
  17. Tetsuya Izu
    A Note on the Lattice Factoring Method. [Citation Graph (0, 0)][DBLP]
    IEICE Transactions, 2004, v:87, n:1, pp:221-223 [Journal]
  18. Tetsuya Izu, Tsuyoshi Takagi
    Fast Elliptic Curve Multiplications with SIMD Operations. [Citation Graph (0, 0)][DBLP]
    IEICE Transactions, 2004, v:87, n:1, pp:85-93 [Journal]
  19. Tetsuya Izu, Tsuyoshi Takagi
    Fast Elliptic Curve Multiplications Resistant against Side Channel Attacks. [Citation Graph (0, 0)][DBLP]
    IEICE Transactions, 2005, v:88, n:1, pp:161-171 [Journal]
  20. Tetsuya Izu, Jun Kogure, Takeshi Shimoyama
    CAIRN 2: An FPGA Implementation of the Sieving Step in the Number Field Sieve Method. [Citation Graph (0, 0)][DBLP]
    CHES, 2007, pp:364-377 [Conf]
  21. Toshiya Nakajima, Tetsuya Izu, Tsuyoshi Takagi
    Reduction Optimal Trinomials for Efficient Software Implementation of the etaT Pairing. [Citation Graph (0, 0)][DBLP]
    IWSEC, 2007, pp:44-57 [Conf]
  22. Tetsuya Izu, Jun Kogure, Takeshi Koshiba, Takeshi Shimoyama
    Low-density attack revisited. [Citation Graph (0, 0)][DBLP]
    Des. Codes Cryptography, 2007, v:43, n:1, pp:47-59 [Journal]

  23. Analysis on Bleichenbacher's Forgery Attack. [Citation Graph (, )][DBLP]


  24. Yet Another Sanitizable Signature from Bilinear Maps. [Citation Graph (, )][DBLP]


  25. Experimental Results on Cheon's Algorithm. [Citation Graph (, )][DBLP]


  26. Multiple Designated Verifiers Signatures Reconsidered. [Citation Graph (, )][DBLP]


  27. How to Forge a Time-Stamp Which Adobe's Acrobat Accepts. [Citation Graph (, )][DBLP]


  28. Sanitizable and Deletable Signature. [Citation Graph (, )][DBLP]


Search in 0.017secs, Finished in 0.019secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002