The SCEAS System
| |||||||

## Search the dblp DataBase
Tetsuya Izu:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
## Publications of Author- Kouichi Itoh, Tetsuya Izu, Masahiko Takenaka
**Improving the Randomized Initial Point Countermeasure Against DPA.**[Citation Graph (0, 0)][DBLP] ACNS, 2006, pp:459-469 [Conf] - Tetsuya Izu, Jun Kogure, Masayuki Noro, Kazuhiro Yokoyama
**Efficient Implementation of Schoof's Algorithm.**[Citation Graph (0, 0)][DBLP] ASIACRYPT, 1998, pp:66-79 [Conf] - Kouichi Itoh, Tetsuya Izu, Masahiko Takenaka
**Efficient Countermeasures against Power Analysis for Elliptic Curve Cryptosystems.**[Citation Graph (0, 0)][DBLP] CARDIS, 2004, pp:99-114 [Conf] - Kouichi Itoh, Tetsuya Izu, Masahiko Takenaka
**Address-Bit Differential Power Analysis of Cryptographic Schemes OK-ECDH and OK-ECDSA.**[Citation Graph (0, 0)][DBLP] CHES, 2002, pp:129-143 [Conf] - Kouichi Itoh, Tetsuya Izu, Masahiko Takenaka
**A Practical Countermeasure against Address-Bit Differential Power Analysis.**[Citation Graph (0, 0)][DBLP] CHES, 2003, pp:382-396 [Conf] - Dong-Guk Han, Tetsuya Izu, Jongin Lim, Kouichi Sakurai
**Modified Power-Analysis Attacks on XTR and an Efficient Countermeasure.**[Citation Graph (0, 0)][DBLP] ICICS, 2004, pp:305-317 [Conf] - Tetsuya Izu, Nobuyuki Kanaya, Masahiko Takenaka, Takashi Yoshioka
**PIATS: A Partially Sanitizable Signature Scheme.**[Citation Graph (0, 0)][DBLP] ICICS, 2005, pp:72-83 [Conf] - Tetsuya Izu, Tsuyoshi Takagi
**Fast Elliptic Curve Multiplications with SIMD Operations.**[Citation Graph (0, 0)][DBLP] ICICS, 2002, pp:217-230 [Conf] - Tetsuya Izu, Tsuyoshi Takagi
**Efficient Computations of the Tate Pairingfor the Large MOV Degrees.**[Citation Graph (0, 0)][DBLP] ICISC, 2002, pp:283-297 [Conf] - Tetsuya Izu, Bodo Möller, Tsuyoshi Takagi
**Improved Elliptic Curve Multiplication Methods Resistant against Side Channel Attacks.**[Citation Graph (0, 0)][DBLP] INDOCRYPT, 2002, pp:296-313 [Conf] - Tetsuya Izu, Noboru Kunihiro, Kazuo Ohta, Masahiko Takenaka, Takashi Yoshioka
**A Sanitizable Signature Scheme with Aggregation.**[Citation Graph (0, 0)][DBLP] ISPEC, 2007, pp:51-64 [Conf] - Tetsuya Izu, Jun Kogure, Masayuki Noro, Kazuhiro Yokoyama
**Parameters for Secure Elliptic Curve Cryptosystem - Improvements on Schoof's Algorithm.**[Citation Graph (0, 0)][DBLP] Public Key Cryptography, 1998, pp:253-257 [Conf] - Tetsuya Izu, Jun Kogure, Kazuhiro Yokoyama
**Efficient Implementation of Schoof's Algorithm in Case of Characteristic 2.**[Citation Graph (0, 0)][DBLP] Public Key Cryptography, 2000, pp:210-222 [Conf] - Tetsuya Izu, Tsuyoshi Takagi
**A Fast Parallel Elliptic Curve Multiplication Resistant against Side Channel Attacks.**[Citation Graph (0, 0)][DBLP] Public Key Cryptography, 2002, pp:280-296 [Conf] - Tetsuya Izu, Tsuyoshi Takagi
**Exceptional Procedure Attack on Elliptic Curve Cryptosystems.**[Citation Graph (0, 0)][DBLP] Public Key Cryptography, 2003, pp:224-239 [Conf] - Tetsuya Izu, Noboru Kunihiro, Kazuo Ohta, Takeshi Shimoyama
**Analysis on the Clockwise Transposition Routing for Dedicated Factoring Devices.**[Citation Graph (0, 0)][DBLP] WISA, 2005, pp:232-242 [Conf] - Tetsuya Izu
**A Note on the Lattice Factoring Method.**[Citation Graph (0, 0)][DBLP] IEICE Transactions, 2004, v:87, n:1, pp:221-223 [Journal] - Tetsuya Izu, Tsuyoshi Takagi
**Fast Elliptic Curve Multiplications with SIMD Operations.**[Citation Graph (0, 0)][DBLP] IEICE Transactions, 2004, v:87, n:1, pp:85-93 [Journal] - Tetsuya Izu, Tsuyoshi Takagi
**Fast Elliptic Curve Multiplications Resistant against Side Channel Attacks.**[Citation Graph (0, 0)][DBLP] IEICE Transactions, 2005, v:88, n:1, pp:161-171 [Journal] - Tetsuya Izu, Jun Kogure, Takeshi Shimoyama
**CAIRN 2: An FPGA Implementation of the Sieving Step in the Number Field Sieve Method.**[Citation Graph (0, 0)][DBLP] CHES, 2007, pp:364-377 [Conf] - Toshiya Nakajima, Tetsuya Izu, Tsuyoshi Takagi
**Reduction Optimal Trinomials for Efficient Software Implementation of the eta**[Citation Graph (0, 0)][DBLP]_{T}Pairing. IWSEC, 2007, pp:44-57 [Conf] - Tetsuya Izu, Jun Kogure, Takeshi Koshiba, Takeshi Shimoyama
**Low-density attack revisited.**[Citation Graph (0, 0)][DBLP] Des. Codes Cryptography, 2007, v:43, n:1, pp:47-59 [Journal] **Analysis on Bleichenbacher's Forgery Attack.**[Citation Graph (, )][DBLP]**Yet Another Sanitizable Signature from Bilinear Maps.**[Citation Graph (, )][DBLP]**Experimental Results on Cheon's Algorithm.**[Citation Graph (, )][DBLP]**Multiple Designated Verifiers Signatures Reconsidered.**[Citation Graph (, )][DBLP]**How to Forge a Time-Stamp Which Adobe's Acrobat Accepts.**[Citation Graph (, )][DBLP]**Sanitizable and Deletable Signature.**[Citation Graph (, )][DBLP]
Search in 0.002secs, Finished in 0.003secs | |||||||

| |||||||

| |||||||

System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002 for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002 |