×
Compute Distance To:
Author ID: takagi.tsuyoshi Recent zbMATH articles by "Takagi, Tsuyoshi"
Published as: Takagi, Tsuyoshi; Takagi, Tsuiyoshi
all top 5

Co-Authors

8 single-authored
11 Shirase, Masaaki
10 Sakurai, Kouichi
9 Li, Fagen
9 Wang, Yuntao
8 Ikematsu, Yasuhiko
8 Okeya, Katsuyuki
7 Sato, Hisayoshi
6 Ding, Jintai
6 Duong, Dung Hoang
6 Hakuta, Keisuke
6 Izu, Tetsuya
6 Wang, Yacheng
6 Yasuda, Takanori
6 Zhang, Mingwu
5 Morozov, Kirill Evgen’evich
5 Onuki, Hiroshi
5 Shinohara, Naoyuki
4 Akishita, Toru
4 Han, Dong-Guk
4 Hashimoto, Yasufumi
4 Hayasaka, Kenichiro
4 Hayashi, Takuya
4 Kurosawa, Kaoru
4 Okamoto, Eiji
4 Okumura, Shinya
4 Schmidt-Samoa, Katja
4 Takashima, Katsuyuki
4 Takayasu, Atsushi
4 Vuillaume, Camille
4 Wakayama, Masato
3 Aoki, Kazumaro
3 Beuchat, Jean-Luc
3 Furue, Hiroki
3 Huang, Yun-Ju
3 Kim, Howon
3 Kiyomoto, Shinsaku
3 Kiyomura, Yutaro
3 Kudo, Momonari
3 Moriya, Tomoki
3 Petzoldt, Albrecht
3 Peyrin, Thomas
3 Xu, Rui
3 Yang, Bo
2 Aono, Yoshinori
2 Biehl, Ingrid
2 Brisebarre, Nicolas
2 Buchmann, Johannes A.
2 Cheon, Jung Hee
2 Fukumoto, Yasuhide
2 Fukushima, Kazuhide
2 Hühnlein, Detlef
2 Katagi, Masanobu
2 Kimoto, Kazufumi
2 Kitamura, Izuru
2 Kobayashi, Tetsutaro
2 Kunihiro, Noboru
2 Lim, Jongin
2 Mambo, Masahiro
2 Miura, Hiroyuki
2 Nakamura, Shuhei
2 Nuida, Koji
2 Okamoto, Takeshi
2 Paulus, Sachar Manfred
2 Petit, Christophe
2 Qin, Zhiguang
2 Shimoyama, Takeshi
2 Tanaka, Keisuke
2 Tao, Chengdong
2 Yasuda, Masaya
2 Zhang, Hui
1 Aikawa, Yusuke
1 Akiyama, Koichiro
1 Alsayigh, Saed
1 Anderssen, Robert Scott
1 Arkin, Ronald C.
1 Catalano, Dario
1 Cavaillé, J.-Y.
1 Chenal, J.-M.
1 Cheng, Chen-Mou
1 Cheng, Jin
1 Chung, Kyoil
1 Cramer, Ronald John Fitzgerald
1 Dahan, Xavier
1 Dahmen, Erik
1 Darmgård, Ivan
1 Detrey, Jérémie
1 Di Crescenzo, Giovanni
1 Diguet, G.
1 Doi, Hiroshi
1 Fujita, Kaoru
1 Fujita, Masahiro
1 Galindo, David
1 Gao, Xinwei
1 Goto, Yasuhiro
1 Hanaoka, Goichiro
1 Hartmann, Michael J.
1 Hasegawa, Rika
1 Hibino, Yasushi
1 Huang, Liusheng
1 Inomata, Atsuo
...and 78 more Co-Authors

Publications by Year

Citations contained in zbMATH Open

95 Publications have been cited 294 times in 238 Documents Cited by Year
Fast RSA-type cryptosystem modulo \(p^k q\). Zbl 0931.94041
Takagi, Tsuiyoshi
23
1998
Improved progressive BKZ algorithms and their precise cost estimation by sharp simulator. Zbl 1385.94007
Aono, Yoshinori; Wang, Yuntao; Hayashi, Takuya; Takagi, Tsuyoshi
18
2016
A fast parallel elliptic curve multiplication resistant against side channel attacks. Zbl 1055.94516
Izu, Tetsuya; Takagi, Tsuyoshi
11
2002
Cryptographic hardware and embedded systems – CHES 2011. 13th international workshop, Nara, Japan, September 28–October 1, 2011. Proceedings. Zbl 1223.68010
10
2011
Zero-value point attacks on elliptic curve cryptosystem. Zbl 1255.94052
Akishita, Toru; Takagi, Tsuyoshi
10
2003
The width-\(w\) NAF method provides small memory and fast elliptic scalar multiplications secure against side channel attacks. Zbl 1039.94519
Okeya, Katsuyuki; Takagi, Tsuyoshi
8
2003
A complete divisor class halving algorithm for hyperelliptic curve cryptosystems of genus two. Zbl 1127.94347
Kitamura, Izuru; Katagi, Masanobu; Takagi, Tsuyoshi
8
2005
Signed binary representations revisited. Zbl 1104.94034
Okeya, Katsuyuki; Schmidt-Samoa, Katja; Spahn, Christian; Takagi, Tsuyoshi
8
2004
Exceptional procedure attack on elliptic curve cryptosystems. Zbl 1033.94529
Izu, Tetsuya; Takagi, Tsuyoshi
8
2002
Breaking pairing-based cryptosystems using \(\eta_T\) pairing over \(GF(3^{97})\). Zbl 1292.94073
Hayashi, Takuya; Shimoyama, Takeshi; Shinohara, Naoyuki; Takagi, Tsuyoshi
7
2012
Improved elliptic curve multiplication methods resistant against side channel attacks. Zbl 1033.11502
Izu, Tetsuya; Möller, Bodo; Takagi, Tsuyoshi
7
2002
Digital signatures out of second-preimage resistant hash functions. Zbl 1177.94185
Dahmen, Erik; Okeya, Katsuyuki; Takagi, Tsuyoshi; Vuillaume, Camille
7
2008
HFERP – a new multivariate encryption scheme. Zbl 1406.94065
Ikematsu, Yasuhiko; Perlner, Ray; Smith-Tone, Daniel; Takagi, Tsuyoshi; Vates, Jeremy
6
2018
Improvement of Faugère et al.’s method to solve ECDLP. Zbl 1357.94069
Huang, Yun-Ju; Petit, Christophe; Shinohara, Naoyuki; Takagi, Tsuyoshi
6
2013
Extended algorithm for solving underdefined multivariate quadratic equations. Zbl 1306.94076
Miura, Hiroyuki; Hashimoto, Yasufumi; Takagi, Tsuyoshi
6
2013
On the optimal parameter choice for elliptic curve cryptosystems using isogeny. Zbl 1198.94074
Akishita, Toru; Takagi, Tsuyoshi
5
2004
A polynomial-time algorithm for solving a class of underdetermined multivariate quadratic equations over fields of odd characteristics. Zbl 1306.94039
Cheng, Chen-Mou; Hashimoto, Yasufumi; Miura, Hiroyuki; Takagi, Tsuyoshi
5
2014
How to construct CSIDH on Edwards curves. Zbl 1457.94165
Moriya, Tomoki; Onuki, Hiroshi; Takagi, Tsuyoshi
4
2020
Group-oriented setting’s multisigncryption scheme with threshold designcryption. Zbl 1276.94025
Zhang, Mingwu; Yang, Bo; Takagi, Tsuyoshi
4
2011
A new public-key cryptosystem over a quadratic order with quadratic decryption time. Zbl 1059.94019
Paulus, Sachar; Takagi, Tsuyoshi
4
2000
Paillier’s cryptosystem modulo \(p^{2}q\) and its applications to trapdoor commitment schemes. Zbl 1126.94340
Schmidt-Samoa, Katja; Takagi, Tsuyoshi
4
2005
Efficient undeniable signature schemes based on ideal arithmetic in quadratic orders. Zbl 1060.94031
Biehl, Ingrid; Paulus, Sacher; Takagi, Tsuyoshi
4
2004
Power analysis to ECC using differential power between multiplication and squaring. Zbl 1333.94028
Akishita, Toru; Takagi, Tsuyoshi
4
2006
Cheater identifiable secret sharing schemes via multi-receiver authentication. Zbl 1394.94947
Xu, Rui; Morozov, Kirill; Takagi, Tsuyoshi
4
2014
SiGamal: a supersingular isogeny-based PKE and its application to a PRF. Zbl 07666675
Moriya, Tomoki; Onuki, Hiroshi; Takagi, Tsuyoshi
4
2020
An efficient authenticated key exchange from random self-reducibility on CSIDH. Zbl 07497440
Kawashima, Tomoki; Takashima, Katsuyuki; Aikawa, Yusuke; Takagi, Tsuyoshi
4
2021
Chosen message attack on multivariate signature ELSA at Asiacrypt 2017. Zbl 1398.94122
Hashimoto, Yasufumi; Ikematsu, Yasuhiko; Takagi, Tsuyoshi
4
2018
Parallel Gauss sieve algorithm: solving the SVP challenge over a 128-dimensional ideal lattice. Zbl 1335.94054
Ishiguro, Tsukasa; Kiyomoto, Shinsaku; Miyake, Yutaka; Takagi, Tsuyoshi
4
2014
New approach for selectively convertible undeniable signature schemes. Zbl 1172.94619
Kurosawa, Kaoru; Takagi, Tsuyoshi
4
2006
Efficient representations on Koblitz curves with resistance to side channel attacks. Zbl 1127.94353
Okeya, Katsuyuki; Takagi, Tsuyoshi; Vuillaume, Camille
3
2005
Efficient computations of the Tate pairing for the large MOV degrees. Zbl 1029.11017
Izu, Tetsuya; Takagi, Tsuyoshi
3
2003
Improving key mismatch attack on NewHope with fewer queries. Zbl 1464.94044
Okada, Satoshi; Wang, Yuntao; Takagi, Tsuyoshi
3
2020
Algorithms and arithmetic operators for computing the \(\eta_T\) pairing in characteristic three. Zbl 1367.11087
Beuchat, Jean-Luc; Brisebarre, Nicolas; Detrey, Jérémie; Okamoto, Eiji; Shirase, Masaaki; Takagi, Tsuyoshi
3
2008
Attacks on multi-prime RSA with small prime difference. Zbl 1316.94098
Zhang, Hui; Takagi, Tsuyoshi
3
2013
Solving a 676-bit discrete logarithm problem in \(\text{GF}(3^{6n})\). Zbl 1281.94028
Hayashi, Takuya; Shinohara, Naoyuki; Wang, Lihua; Matsuo, Shin’ichiro; Shirase, Masaaki; Takagi, Tsuyoshi
3
2010
Some improved algorithms for hyperelliptic curve cryptosystems using degenerate divisors. Zbl 1133.94323
Katagi, Masanobu; Akishita, Toru; Kitamura, Izuru; Takagi, Tsuyoshi
2
2005
Efficient arithmetic on subfield elliptic curves over small finite fields of odd characteristic. Zbl 1205.94084
Hakuta, Keisuke; Sato, Hisayoshi; Takagi, Tsuyoshi
2
2010
Explicit lower bound for the length of minimal weigh \(\tau\)-adic expansions on Koblitz curves. Zbl 1203.94102
Hakuta, Keisuke; Sato, Hisayoshi; Takagi, Tsuyoshi
2
2010
Zero-knowledge protocols for the McEliece encryption. Zbl 1305.94067
Morozov, Kirill; Takagi, Tsuyoshi
2
2012
Side channel attacks and countermeasures on pairing based cryptosystems over binary fields. Zbl 1307.94065
Kim, Tae Hyun; Takagi, Tsuyoshi; Han, Dong-Guk; Kim, Ho Won; Lim, Jongin
2
2006
Reducing logarithms in totally non-maximal imaginary quadratic orders to logarithms in finite fields. Zbl 0976.94020
Hühnlein, Detlef; Takagi, Tsuyoshi
2
1999
Fast RSA-type cryptosystems using \(n\)-adic expansion. Zbl 0890.94025
Takagi, Tsuyoshi
2
1997
A reject timing attack on an IND-CCA2 public-key cryptosystem. Zbl 1031.94526
Sakurai, Kouichi; Takagi, Tsuyoshi
2
2003
A cryptosystem based on non-maximal imaginary quadratic orders with fast decryption. Zbl 0919.94023
Hühnlein, Detlef; Jacobson, Michael J. jun.; Sachar, Paulus; Takagi, Tsuyoshi
2
1998
Post-quantum cryptography. 7th international workshop, PQCrypto 2016, Fukuoka, Japan, February 24–26, 2016. Proceedings. Zbl 1331.94007
2
2016
Reducing the key size of the SRP encryption scheme. Zbl 1346.94100
Duong, Dung Hoang; Petzoldt, Albrecht; Takagi, Tsuyoshi
2
2016
Certificateless hybrid signcryption. Zbl 1305.94057
Li, Fagen; Shirase, Masaaki; Takagi, Tsuyoshi
2
2013
Batch verification suitable for efficiently verifying a limited number of signatures. Zbl 1342.94108
Hakuta, Keisuke; Katoh, Yosuke; Sato, Hisayoshi; Takagi, Tsuyoshi
2
2013
Advances in cryptology – ASIACRYPT 2017. 23rd international conference on the theory and applications of cryptology and information security, Hong Kong, China, December 3–7, 2017. Proceedings. Part III. Zbl 1380.94008
2
2017
On cheater identifiable secret sharing schemes secure against rushing adversary. Zbl 1344.94085
Xu, Rui; Morozov, Kirill; Takagi, Tsuyoshi
2
2013
One sample ring-LWE with rounding and its application to key exchange. Zbl 1452.94065
Ding, Jintai; Gao, Xinwei; Takagi, Tsuyoshi; Wang, Yuntao
1
2019
An experimental study of Kannan’s embedding technique for the search LWE problem. Zbl 1452.94089
Wang, Yuntao; Aono, Yoshinori; Takagi, Tsuyoshi
1
2018
Contemporary cryptology. Zbl 1087.94002
Catalano, Dario; Cramer, Ronald; Darmgård, Ivan; Di Crescenzo, Giovanni; Pointcheval, David; Takagi, Tsuyoshi
1
2005
Compressed XTR. Zbl 1214.94054
Shirase, Masaaki; Han, Dong-Guk; Hibino, Yasushi; Kim, Ho Won; Takagi, Tsuyoshi
1
2007
Further security analysis of XTR. Zbl 1339.94046
Han, Dong-Guk; Takagi, Tsuyoshi; Lim, Jongin
1
2006
Efficient multi-PKG ID-based signcryption for ad hoc networks. Zbl 1237.68023
Li, Fagen; Shirase, Masaaki; Takagi, Tsuyoshi
1
2009
Product formula of the cubic Gauss sum modulo the product of the primes. Zbl 0876.11049
Takagi, Tsuyoshi
1
1997
Analysis of fractional window recoding methods and their application to elliptic curve cryptosystems. Zbl 1294.94077
Schmidt-Samoa, Katja; Semay, Olivier; Takagi, Tsuyoshi
1
2006
Application of scalar multiplication of Edwards curves to pairing-based cryptography. Zbl 1292.94158
Yasuda, Takanori; Takagi, Tsuyoshi; Sakurai, Kouichi
1
2012
A coprocessor for the final exponentiation of the \(\eta_T\) pairing in characteristic three. Zbl 1183.68025
Beuchat, Jean-Luc; Brisebarre, Nicolas; Shirase, Masaaki; Takagi, Tsuyoshi; Okamoto, Eiji
1
2007
An experiment of number field sieve over \(\mathrm{GF}(p)\) of low Hamming weight characteristic. Zbl 1271.11120
Hayasaka, Kenichiro; Takagi, Tsuyoshi
1
2011
GeoENC: geometric area based keys and policies in functional encryption systems. Zbl 1295.94163
Zhang, Mingwu; Takagi, Tsuyoshi
1
2011
Some RSA-based encryption schemes with tight security reduction. Zbl 1205.94087
Kurosawa, Kaoru; Takagi, Tsuyoshi
1
2003
Generalized powering functions and their application to digital signatures. Zbl 1205.11130
Sato, Hisayoshi; Takagi, Tsuyoshi; Tezuka, Satoru; Takaragi, Kazuo
1
2003
On the security of online/offline signatures and multisignatures from ACISP’06. Zbl 1362.94038
Li, Fagen; Shirase, Masaaki; Takagi, Tsuyoshi
1
2008
NICE – New Ideal Coset Encryption. Zbl 0953.94022
Hartmann, Michael; Paulus, Sachar; Takagi, Tsuyoshi
1
1999
Anonymous spatial encryption under affine space delegation functionality with full security. Zbl 1354.94054
Zhang, Mingwu; Yang, Bo; Takagi, Tsuyoshi
1
2014
Reducing the key size of rainbow using non-commutative rings. Zbl 1292.94157
Yasuda, Takanori; Sakurai, Kouichi; Takagi, Tsuyoshi
1
2012
Key length estimation of pairing-based cryptosystems using \(\eta_T\) pairing. Zbl 1291.94156
Shinohara, Naoyuki; Shimoyama, Takeshi; Hayashi, Takuya; Takagi, Tsuyoshi
1
2012
Radix-\(r\) non-adjacent form. Zbl 1109.94352
Takagi, Tsuyoshi; Yen, Sung-Ming; Wu, Bo-Ching
1
2004
An IND-CCA2 public-key cryptosystem with fast decryption. Zbl 0999.94527
Buchmann, Johannes; Sakurai, Kouichi; Takagi, Tsuyoshi
1
2002
Fast elliptic curve multiplications with SIMD operations. Zbl 1023.94526
Izu, Tetsuya; Takagi, Tsuyoshi
1
2002
New semantically secure public-key cryptosystems from the RSA-primitive. Zbl 1055.94530
Sakurai, Kouichi; Takagi, Tsuyoshi
1
2002
Number field cryptography. Zbl 1073.94012
Buchmann, Johannes; Takagi, Tsuyoshi; Vollmer, Ulrich
1
2004
Security analysis of CRT-based cryptosystems. Zbl 1103.68534
Okeya, Katsuyuki; Takagi, Tsuyoshi
1
2004
An experiment of number field sieve for discrete logarithm problem over \(\mathrm{GF}(p^n)\). Zbl 1460.94048
Hayasaka, Kenichiro; Aoki, Kazumaro; Kobayashi, Tetsutaro; Takagi, Tsuyoshi
1
2014
Advances in cryptology – ASIACRYPT 2016. 22nd international conference on the theory and application of cryptology and information security, Hanoi, Vietnam, December 4–8, 2016. Proceedings. Part I. Zbl 1349.94005
1
2016
Advances in cryptology – ASIACRYPT 2016. 22nd international conference on the theory and application of cryptology and information security, Hanoi, Vietnam, December 4-8, 2016. Proceedings. Part II. Zbl 1349.94006
1
2016
Revisiting the cubic UOV signature scheme. Zbl 1381.94069
Duong, Dung H.; Petzoldt, Albrecht; Wang, Yacheng; Takagi, Tsuyoshi
1
2017
Multivariate encryption schemes based on polynomial equations over real numbers. Zbl 1501.94060
Yasuda, Takanori; Wang, Yacheng; Takagi, Tsuyoshi
1
2020
Group key exchange from CSIDH and its application to trusted setup in supersingular isogeny cryptosystems. Zbl 1500.94044
Moriya, Tomoki; Takashima, Katsuyuki; Takagi, Tsuyoshi
1
2020
Improving the BKZ reduction algorithm by quick reordering technique. Zbl 1444.94106
Wang, Yuntao; Takagi, Tsuyoshi
1
2018
Some properties of \(\tau\)-adic expansions on hyperelliptic Koblitz curves. Zbl 1408.11005
Hakuta, Keisuke; Sato, Hisayoshi; Takagi, Tsuyoshi
1
2018
On collisions related to an ideal class of order 3 in CSIDH. Zbl 1485.94113
Onuki, Hiroshi; Takagi, Tsuyoshi
1
2020
One-wayness equivalent to general factoring. Zbl 1367.94321
Kurosawa, Kaoru; Takagi, Tsuyoshi
1
2009
A more flexible countermeasure against side channel attacks using window method. Zbl 1274.94100
Okeya, Katsuyuki; Takagi, Tsuyoshi
1
2003
A public-key encryption scheme based on non-linear indeterminate equations. Zbl 1384.94021
Akiyama, Koichiro; Goto, Yasuhiro; Okumura, Shinya; Takagi, Tsuyoshi; Nuida, Koji; Hanaoka, Goichiro
1
2018
Security analysis of cryptosystems using short generators over ideal lattices. Zbl 1404.94103
Okumura, Shinya; Sugiyama, Shingo; Yasuda, Masaya; Takagi, Tsuyoshi
1
2018
Advances in cryptology – ASIACRYPT 2017. 23rd international conference on the theory and applications of cryptology and information security, Hong Kong, China, December 3–7, 2017. Proceedings. Part II. Zbl 1380.94007
1
2017
Advances in cryptology – ASIACRYPT 2017. 23rd international conference on the theory and applications of cryptology and information security, Hong Kong, China, December 3–7, 2017. Proceedings. Part I. Zbl 1380.94009
1
2017
Secure identity-based signcryption in the standard model. Zbl 1286.94076
Li, Fagen; Takagi, Tsuyoshi
1
2013
Identity-based partially blind signature in the standard model for electronic cash. Zbl 1297.94119
Li, Fagen; Zhang, Mingwu; Takagi, Tsuyoshi
1
2013
Multivariate signature scheme using quadratic forms. Zbl 1306.94098
Yasuda, Takanori; Takagi, Tsuyoshi; Sakurai, Kouichi
1
2013
Post-quantum cryptography. 8th international workshop, PQCrypto 2017, Utrecht, The Netherlands, June 26–28, 2017. Proceedings. Zbl 1386.94004
1
2017
An experiment of number field sieve for discrete logarithm problem over \(\mathrm{GF}(p^{12})\). Zbl 1320.94067
Hayasaka, Kenichiro; Aoki, Kazumaro; Kobayashi, Tetsutaro; Takagi, Tsuyoshi
1
2013
An efficient authenticated key exchange from random self-reducibility on CSIDH. Zbl 07497440
Kawashima, Tomoki; Takashima, Katsuyuki; Aikawa, Yusuke; Takagi, Tsuyoshi
4
2021
How to construct CSIDH on Edwards curves. Zbl 1457.94165
Moriya, Tomoki; Onuki, Hiroshi; Takagi, Tsuyoshi
4
2020
SiGamal: a supersingular isogeny-based PKE and its application to a PRF. Zbl 07666675
Moriya, Tomoki; Onuki, Hiroshi; Takagi, Tsuyoshi
4
2020
Improving key mismatch attack on NewHope with fewer queries. Zbl 1464.94044
Okada, Satoshi; Wang, Yuntao; Takagi, Tsuyoshi
3
2020
Multivariate encryption schemes based on polynomial equations over real numbers. Zbl 1501.94060
Yasuda, Takanori; Wang, Yacheng; Takagi, Tsuyoshi
1
2020
Group key exchange from CSIDH and its application to trusted setup in supersingular isogeny cryptosystems. Zbl 1500.94044
Moriya, Tomoki; Takashima, Katsuyuki; Takagi, Tsuyoshi
1
2020
On collisions related to an ideal class of order 3 in CSIDH. Zbl 1485.94113
Onuki, Hiroshi; Takagi, Tsuyoshi
1
2020
One sample ring-LWE with rounding and its application to key exchange. Zbl 1452.94065
Ding, Jintai; Gao, Xinwei; Takagi, Tsuyoshi; Wang, Yuntao
1
2019
HFERP – a new multivariate encryption scheme. Zbl 1406.94065
Ikematsu, Yasuhiko; Perlner, Ray; Smith-Tone, Daniel; Takagi, Tsuyoshi; Vates, Jeremy
6
2018
Chosen message attack on multivariate signature ELSA at Asiacrypt 2017. Zbl 1398.94122
Hashimoto, Yasufumi; Ikematsu, Yasuhiko; Takagi, Tsuyoshi
4
2018
An experimental study of Kannan’s embedding technique for the search LWE problem. Zbl 1452.94089
Wang, Yuntao; Aono, Yoshinori; Takagi, Tsuyoshi
1
2018
Improving the BKZ reduction algorithm by quick reordering technique. Zbl 1444.94106
Wang, Yuntao; Takagi, Tsuyoshi
1
2018
Some properties of \(\tau\)-adic expansions on hyperelliptic Koblitz curves. Zbl 1408.11005
Hakuta, Keisuke; Sato, Hisayoshi; Takagi, Tsuyoshi
1
2018
A public-key encryption scheme based on non-linear indeterminate equations. Zbl 1384.94021
Akiyama, Koichiro; Goto, Yasuhiro; Okumura, Shinya; Takagi, Tsuyoshi; Nuida, Koji; Hanaoka, Goichiro
1
2018
Security analysis of cryptosystems using short generators over ideal lattices. Zbl 1404.94103
Okumura, Shinya; Sugiyama, Shingo; Yasuda, Masaya; Takagi, Tsuyoshi
1
2018
Advances in cryptology – ASIACRYPT 2017. 23rd international conference on the theory and applications of cryptology and information security, Hong Kong, China, December 3–7, 2017. Proceedings. Part III. Zbl 1380.94008
2
2017
Revisiting the cubic UOV signature scheme. Zbl 1381.94069
Duong, Dung H.; Petzoldt, Albrecht; Wang, Yacheng; Takagi, Tsuyoshi
1
2017
Advances in cryptology – ASIACRYPT 2017. 23rd international conference on the theory and applications of cryptology and information security, Hong Kong, China, December 3–7, 2017. Proceedings. Part II. Zbl 1380.94007
1
2017
Advances in cryptology – ASIACRYPT 2017. 23rd international conference on the theory and applications of cryptology and information security, Hong Kong, China, December 3–7, 2017. Proceedings. Part I. Zbl 1380.94009
1
2017
Post-quantum cryptography. 8th international workshop, PQCrypto 2017, Utrecht, The Netherlands, June 26–28, 2017. Proceedings. Zbl 1386.94004
1
2017
Improved progressive BKZ algorithms and their precise cost estimation by sharp simulator. Zbl 1385.94007
Aono, Yoshinori; Wang, Yuntao; Hayashi, Takuya; Takagi, Tsuyoshi
18
2016
Post-quantum cryptography. 7th international workshop, PQCrypto 2016, Fukuoka, Japan, February 24–26, 2016. Proceedings. Zbl 1331.94007
2
2016
Reducing the key size of the SRP encryption scheme. Zbl 1346.94100
Duong, Dung Hoang; Petzoldt, Albrecht; Takagi, Tsuyoshi
2
2016
Advances in cryptology – ASIACRYPT 2016. 22nd international conference on the theory and application of cryptology and information security, Hanoi, Vietnam, December 4–8, 2016. Proceedings. Part I. Zbl 1349.94005
1
2016
Advances in cryptology – ASIACRYPT 2016. 22nd international conference on the theory and application of cryptology and information security, Hanoi, Vietnam, December 4-8, 2016. Proceedings. Part II. Zbl 1349.94006
1
2016
A polynomial-time algorithm for solving a class of underdetermined multivariate quadratic equations over fields of odd characteristics. Zbl 1306.94039
Cheng, Chen-Mou; Hashimoto, Yasufumi; Miura, Hiroyuki; Takagi, Tsuyoshi
5
2014
Cheater identifiable secret sharing schemes via multi-receiver authentication. Zbl 1394.94947
Xu, Rui; Morozov, Kirill; Takagi, Tsuyoshi
4
2014
Parallel Gauss sieve algorithm: solving the SVP challenge over a 128-dimensional ideal lattice. Zbl 1335.94054
Ishiguro, Tsukasa; Kiyomoto, Shinsaku; Miyake, Yutaka; Takagi, Tsuyoshi
4
2014
Anonymous spatial encryption under affine space delegation functionality with full security. Zbl 1354.94054
Zhang, Mingwu; Yang, Bo; Takagi, Tsuyoshi
1
2014
An experiment of number field sieve for discrete logarithm problem over \(\mathrm{GF}(p^n)\). Zbl 1460.94048
Hayasaka, Kenichiro; Aoki, Kazumaro; Kobayashi, Tetsutaro; Takagi, Tsuyoshi
1
2014
Improvement of Faugère et al.’s method to solve ECDLP. Zbl 1357.94069
Huang, Yun-Ju; Petit, Christophe; Shinohara, Naoyuki; Takagi, Tsuyoshi
6
2013
Extended algorithm for solving underdefined multivariate quadratic equations. Zbl 1306.94076
Miura, Hiroyuki; Hashimoto, Yasufumi; Takagi, Tsuyoshi
6
2013
Attacks on multi-prime RSA with small prime difference. Zbl 1316.94098
Zhang, Hui; Takagi, Tsuyoshi
3
2013
Certificateless hybrid signcryption. Zbl 1305.94057
Li, Fagen; Shirase, Masaaki; Takagi, Tsuyoshi
2
2013
Batch verification suitable for efficiently verifying a limited number of signatures. Zbl 1342.94108
Hakuta, Keisuke; Katoh, Yosuke; Sato, Hisayoshi; Takagi, Tsuyoshi
2
2013
On cheater identifiable secret sharing schemes secure against rushing adversary. Zbl 1344.94085
Xu, Rui; Morozov, Kirill; Takagi, Tsuyoshi
2
2013
Secure identity-based signcryption in the standard model. Zbl 1286.94076
Li, Fagen; Takagi, Tsuyoshi
1
2013
Identity-based partially blind signature in the standard model for electronic cash. Zbl 1297.94119
Li, Fagen; Zhang, Mingwu; Takagi, Tsuyoshi
1
2013
Multivariate signature scheme using quadratic forms. Zbl 1306.94098
Yasuda, Takanori; Takagi, Tsuyoshi; Sakurai, Kouichi
1
2013
An experiment of number field sieve for discrete logarithm problem over \(\mathrm{GF}(p^{12})\). Zbl 1320.94067
Hayasaka, Kenichiro; Aoki, Kazumaro; Kobayashi, Tetsutaro; Takagi, Tsuyoshi
1
2013
Breaking pairing-based cryptosystems using \(\eta_T\) pairing over \(GF(3^{97})\). Zbl 1292.94073
Hayashi, Takuya; Shimoyama, Takeshi; Shinohara, Naoyuki; Takagi, Tsuyoshi
7
2012
Zero-knowledge protocols for the McEliece encryption. Zbl 1305.94067
Morozov, Kirill; Takagi, Tsuyoshi
2
2012
Application of scalar multiplication of Edwards curves to pairing-based cryptography. Zbl 1292.94158
Yasuda, Takanori; Takagi, Tsuyoshi; Sakurai, Kouichi
1
2012
Reducing the key size of rainbow using non-commutative rings. Zbl 1292.94157
Yasuda, Takanori; Sakurai, Kouichi; Takagi, Tsuyoshi
1
2012
Key length estimation of pairing-based cryptosystems using \(\eta_T\) pairing. Zbl 1291.94156
Shinohara, Naoyuki; Shimoyama, Takeshi; Hayashi, Takuya; Takagi, Tsuyoshi
1
2012
Cryptographic hardware and embedded systems – CHES 2011. 13th international workshop, Nara, Japan, September 28–October 1, 2011. Proceedings. Zbl 1223.68010
10
2011
Group-oriented setting’s multisigncryption scheme with threshold designcryption. Zbl 1276.94025
Zhang, Mingwu; Yang, Bo; Takagi, Tsuyoshi
4
2011
An experiment of number field sieve over \(\mathrm{GF}(p)\) of low Hamming weight characteristic. Zbl 1271.11120
Hayasaka, Kenichiro; Takagi, Tsuyoshi
1
2011
GeoENC: geometric area based keys and policies in functional encryption systems. Zbl 1295.94163
Zhang, Mingwu; Takagi, Tsuyoshi
1
2011
Solving a 676-bit discrete logarithm problem in \(\text{GF}(3^{6n})\). Zbl 1281.94028
Hayashi, Takuya; Shinohara, Naoyuki; Wang, Lihua; Matsuo, Shin’ichiro; Shirase, Masaaki; Takagi, Tsuyoshi
3
2010
Efficient arithmetic on subfield elliptic curves over small finite fields of odd characteristic. Zbl 1205.94084
Hakuta, Keisuke; Sato, Hisayoshi; Takagi, Tsuyoshi
2
2010
Explicit lower bound for the length of minimal weigh \(\tau\)-adic expansions on Koblitz curves. Zbl 1203.94102
Hakuta, Keisuke; Sato, Hisayoshi; Takagi, Tsuyoshi
2
2010
Efficient multi-PKG ID-based signcryption for ad hoc networks. Zbl 1237.68023
Li, Fagen; Shirase, Masaaki; Takagi, Tsuyoshi
1
2009
One-wayness equivalent to general factoring. Zbl 1367.94321
Kurosawa, Kaoru; Takagi, Tsuyoshi
1
2009
Digital signatures out of second-preimage resistant hash functions. Zbl 1177.94185
Dahmen, Erik; Okeya, Katsuyuki; Takagi, Tsuyoshi; Vuillaume, Camille
7
2008
Algorithms and arithmetic operators for computing the \(\eta_T\) pairing in characteristic three. Zbl 1367.11087
Beuchat, Jean-Luc; Brisebarre, Nicolas; Detrey, Jérémie; Okamoto, Eiji; Shirase, Masaaki; Takagi, Tsuyoshi
3
2008
On the security of online/offline signatures and multisignatures from ACISP’06. Zbl 1362.94038
Li, Fagen; Shirase, Masaaki; Takagi, Tsuyoshi
1
2008
Compressed XTR. Zbl 1214.94054
Shirase, Masaaki; Han, Dong-Guk; Hibino, Yasushi; Kim, Ho Won; Takagi, Tsuyoshi
1
2007
A coprocessor for the final exponentiation of the \(\eta_T\) pairing in characteristic three. Zbl 1183.68025
Beuchat, Jean-Luc; Brisebarre, Nicolas; Shirase, Masaaki; Takagi, Tsuyoshi; Okamoto, Eiji
1
2007
Power analysis to ECC using differential power between multiplication and squaring. Zbl 1333.94028
Akishita, Toru; Takagi, Tsuyoshi
4
2006
New approach for selectively convertible undeniable signature schemes. Zbl 1172.94619
Kurosawa, Kaoru; Takagi, Tsuyoshi
4
2006
Side channel attacks and countermeasures on pairing based cryptosystems over binary fields. Zbl 1307.94065
Kim, Tae Hyun; Takagi, Tsuyoshi; Han, Dong-Guk; Kim, Ho Won; Lim, Jongin
2
2006
Further security analysis of XTR. Zbl 1339.94046
Han, Dong-Guk; Takagi, Tsuyoshi; Lim, Jongin
1
2006
Analysis of fractional window recoding methods and their application to elliptic curve cryptosystems. Zbl 1294.94077
Schmidt-Samoa, Katja; Semay, Olivier; Takagi, Tsuyoshi
1
2006
A complete divisor class halving algorithm for hyperelliptic curve cryptosystems of genus two. Zbl 1127.94347
Kitamura, Izuru; Katagi, Masanobu; Takagi, Tsuyoshi
8
2005
Paillier’s cryptosystem modulo \(p^{2}q\) and its applications to trapdoor commitment schemes. Zbl 1126.94340
Schmidt-Samoa, Katja; Takagi, Tsuyoshi
4
2005
Efficient representations on Koblitz curves with resistance to side channel attacks. Zbl 1127.94353
Okeya, Katsuyuki; Takagi, Tsuyoshi; Vuillaume, Camille
3
2005
Some improved algorithms for hyperelliptic curve cryptosystems using degenerate divisors. Zbl 1133.94323
Katagi, Masanobu; Akishita, Toru; Kitamura, Izuru; Takagi, Tsuyoshi
2
2005
Contemporary cryptology. Zbl 1087.94002
Catalano, Dario; Cramer, Ronald; Darmgård, Ivan; Di Crescenzo, Giovanni; Pointcheval, David; Takagi, Tsuyoshi
1
2005
Signed binary representations revisited. Zbl 1104.94034
Okeya, Katsuyuki; Schmidt-Samoa, Katja; Spahn, Christian; Takagi, Tsuyoshi
8
2004
On the optimal parameter choice for elliptic curve cryptosystems using isogeny. Zbl 1198.94074
Akishita, Toru; Takagi, Tsuyoshi
5
2004
Efficient undeniable signature schemes based on ideal arithmetic in quadratic orders. Zbl 1060.94031
Biehl, Ingrid; Paulus, Sacher; Takagi, Tsuyoshi
4
2004
Radix-\(r\) non-adjacent form. Zbl 1109.94352
Takagi, Tsuyoshi; Yen, Sung-Ming; Wu, Bo-Ching
1
2004
Number field cryptography. Zbl 1073.94012
Buchmann, Johannes; Takagi, Tsuyoshi; Vollmer, Ulrich
1
2004
Security analysis of CRT-based cryptosystems. Zbl 1103.68534
Okeya, Katsuyuki; Takagi, Tsuyoshi
1
2004
Zero-value point attacks on elliptic curve cryptosystem. Zbl 1255.94052
Akishita, Toru; Takagi, Tsuyoshi
10
2003
The width-\(w\) NAF method provides small memory and fast elliptic scalar multiplications secure against side channel attacks. Zbl 1039.94519
Okeya, Katsuyuki; Takagi, Tsuyoshi
8
2003
Efficient computations of the Tate pairing for the large MOV degrees. Zbl 1029.11017
Izu, Tetsuya; Takagi, Tsuyoshi
3
2003
A reject timing attack on an IND-CCA2 public-key cryptosystem. Zbl 1031.94526
Sakurai, Kouichi; Takagi, Tsuyoshi
2
2003
Some RSA-based encryption schemes with tight security reduction. Zbl 1205.94087
Kurosawa, Kaoru; Takagi, Tsuyoshi
1
2003
Generalized powering functions and their application to digital signatures. Zbl 1205.11130
Sato, Hisayoshi; Takagi, Tsuyoshi; Tezuka, Satoru; Takaragi, Kazuo
1
2003
A more flexible countermeasure against side channel attacks using window method. Zbl 1274.94100
Okeya, Katsuyuki; Takagi, Tsuyoshi
1
2003
A fast parallel elliptic curve multiplication resistant against side channel attacks. Zbl 1055.94516
Izu, Tetsuya; Takagi, Tsuyoshi
11
2002
Exceptional procedure attack on elliptic curve cryptosystems. Zbl 1033.94529
Izu, Tetsuya; Takagi, Tsuyoshi
8
2002
Improved elliptic curve multiplication methods resistant against side channel attacks. Zbl 1033.11502
Izu, Tetsuya; Möller, Bodo; Takagi, Tsuyoshi
7
2002
An IND-CCA2 public-key cryptosystem with fast decryption. Zbl 0999.94527
Buchmann, Johannes; Sakurai, Kouichi; Takagi, Tsuyoshi
1
2002
Fast elliptic curve multiplications with SIMD operations. Zbl 1023.94526
Izu, Tetsuya; Takagi, Tsuyoshi
1
2002
New semantically secure public-key cryptosystems from the RSA-primitive. Zbl 1055.94530
Sakurai, Kouichi; Takagi, Tsuyoshi
1
2002
A new public-key cryptosystem over a quadratic order with quadratic decryption time. Zbl 1059.94019
Paulus, Sachar; Takagi, Tsuyoshi
4
2000
Reducing logarithms in totally non-maximal imaginary quadratic orders to logarithms in finite fields. Zbl 0976.94020
Hühnlein, Detlef; Takagi, Tsuyoshi
2
1999
NICE – New Ideal Coset Encryption. Zbl 0953.94022
Hartmann, Michael; Paulus, Sachar; Takagi, Tsuyoshi
1
1999
Fast RSA-type cryptosystem modulo \(p^k q\). Zbl 0931.94041
Takagi, Tsuiyoshi
23
1998
A cryptosystem based on non-maximal imaginary quadratic orders with fast decryption. Zbl 0919.94023
Hühnlein, Detlef; Jacobson, Michael J. jun.; Sachar, Paulus; Takagi, Tsuyoshi
2
1998
Fast RSA-type cryptosystems using \(n\)-adic expansion. Zbl 0890.94025
Takagi, Tsuyoshi
2
1997
Product formula of the cubic Gauss sum modulo the product of the primes. Zbl 0876.11049
Takagi, Tsuyoshi
1
1997
all top 5

Cited by 507 Authors

10 Takagi, Tsuyoshi
6 Galbraith, Steven D.
6 Joye, Marc
6 Yasuda, Masaya
5 Miret, Josep M.
5 Tunstall, Michael J.
4 Nakamura, Satoshi
4 Nitaj, Abderrahmane
4 Pujolàs, Jordi
4 Sarkar, Santanu
4 Susilo, Willy
4 Thériault, Nicolas
4 Wang, Huaxiong
3 Barbulescu, Razvan
3 Buchmann, Johannes A.
3 Dahmen, Erik
3 Fouotsa, Emmanuel
3 Hakuta, Keisuke
3 Hashimoto, Yasufumi
3 Hong, Seokhie
3 Hu, Lei
3 Hu, Zhi
3 Hutchinson, Aaron
3 Kunihiro, Noboru
3 Laarhoven, Thijs
3 Le Trieu Phong
3 Ling, San
3 Lu, Yao
3 Peng, Liqiang
3 Petit, Christophe
3 Smith-Tone, Daniel
3 Takayasu, Atsushi
2 Adhikari, Avishek
2 Akchiche, Omar
2 Aono, Yoshinori
2 Azarderakhsh, Reza
2 Balasubramaniam, Pagavathigounder
2 Bonnetain, Xavier
2 Castagnos, Guilhem
2 Chang, Nam Su
2 Chi-Domínguez, Jesús-Javier
2 Costello, Craig
2 Diao, Oumar
2 Ferradi, Houda
2 Fujisaki, Eiichiro
2 Gaudry, Pierrick
2 Goswami, Pinkimani
2 Granger, Robert A.
2 Guillevic, Aurore
2 Guilley, Sylvain
2 Han, Dong-Guk
2 Hashimoto, Keitaro
2 Heuberger, Clemens
2 Hülsing, Andreas
2 Ikematsu, Yasuhiko
2 Karati, Sabyasachi
2 Karthikeyan, E.
2 Katsumata, Shuichi
2 Khadir, Omar
2 Khleborodov, Denis
2 Kim, Taehyun
2 Koziel, Brian
2 Kurosawa, Kaoru
2 Kwiatkowski, Kris
2 Laguillaumie, Fabien
2 LeGrow, Jason Travis
2 Li, Chao
2 Lin, Xibin
2 Mishra, Pradeep Kumar
2 Morain, François
2 Muir, James A.
2 Mumtaz, Majid
2 Naccache, David
2 Nakamura, Shuhei
2 Nguyen, Khoa
2 Nuida, Koji
2 Ogata, Wakaha
2 Onuki, Hiroshi
2 Page, Dan
2 Petzoldt, Albrecht
2 Ping, Luo
2 Prest, Thomas
2 Qin, Bo
2 Qu, Longjiang
2 Rio, Anna
2 Sadornil, Daniel
2 Safavi-Naini, Reihaneh
2 Sakurai, Kouichi
2 Singh, Madan Mohan
2 Standaert, Francois-Xavier
2 Tena Ayuso, Juan Gabriel
2 Thomé, Emmanuel
2 Tomàs, R.
2 Tonien, Joseph
2 Valls, Magda
2 Verbel, Javier A.
2 Wang, Licheng
2 Wang, Yacheng
2 Wang, Yuntao
2 Wu, Qianhong
...and 407 more Authors
all top 5

Cited in 51 Serials

12 Designs, Codes and Cryptography
10 Information Sciences
9 Journal of Cryptology
7 Advances in Mathematics of Communications
6 Finite Fields and their Applications
5 Discrete Applied Mathematics
5 Theoretical Computer Science
5 Journal of Mathematical Cryptology
4 Applied Mathematics and Computation
4 Quantum Information Processing
4 Cryptography and Communications
3 Information Processing Letters
3 Mathematics of Computation
3 Applicable Algebra in Engineering, Communication and Computing
3 Mathematical Problems in Engineering
3 Matematicheskie Voprosy Kriptografii
2 International Journal of Theoretical Physics
2 Mathematica Slovaca
2 Soft Computing
2 Wuhan University Journal of Natural Sciences (WUJNS)
2 Journal of Discrete Mathematical Sciences & Cryptography
2 Journal of Applied Mathematics and Computing
2 Science in China. Series F
2 Groups, Complexity, Cryptology
2 Afrika Matematika
2 JSIAM Letters
2 Pacific Journal of Mathematics for Industry
1 Computers & Mathematics with Applications
1 Journal of Number Theory
1 Nagoya Mathematical Journal
1 Proceedings of the Japan Academy. Series A
1 Publications de l’Institut Mathématique. Nouvelle Série
1 Chinese Annals of Mathematics. Series B
1 Acta Applicandae Mathematicae
1 Journal of Complexity
1 Applied Mathematics Letters
1 SIAM Journal on Discrete Mathematics
1 International Journal of Foundations of Computer Science
1 Communications of the ACM
1 International Journal of Computer Mathematics
1 Linear Algebra and its Applications
1 Applied Mathematics. Series B (English Edition)
1 Advances in Computational Mathematics
1 Arab Journal of Mathematical Sciences
1 Mathematical Biosciences and Engineering
1 Mathematics in Computer Science
1 Asian-European Journal of Mathematics
1 Discrete Mathematics, Algorithms and Applications
1 Acta Universitatis Sapientiae. Informatica
1 Frontiers of Computer Science
1 International Journal of Mathematics for Industry

Citations by Year