Edit Profile (opens in new tab) Takagi, Tsuyoshi Compute Distance To: Compute Author ID: takagi.tsuyoshi Published as: Takagi, Tsuyoshi; Takagi, Tsuiyoshi Documents Indexed: 145 Publications since 1997, including 2 Books 15 Contributions as Editor Co-Authors: 171 Co-Authors with 150 Joint Publications 3,359 Co-Co-Authors all top 5 Co-Authors 8 single-authored 11 Shirase, Masaaki 10 Sakurai, Kouichi 9 Li, Fagen 9 Wang, Yuntao 8 Ikematsu, Yasuhiko 8 Okeya, Katsuyuki 7 Sato, Hisayoshi 6 Ding, Jintai 6 Duong, Dung Hoang 6 Hakuta, Keisuke 6 Izu, Tetsuya 6 Wang, Yacheng 6 Yasuda, Takanori 6 Zhang, Mingwu 5 Morozov, Kirill Evgen’evich 5 Onuki, Hiroshi 5 Shinohara, Naoyuki 4 Akishita, Toru 4 Han, Dong-Guk 4 Hashimoto, Yasufumi 4 Hayasaka, Kenichiro 4 Hayashi, Takuya 4 Kurosawa, Kaoru 4 Okamoto, Eiji 4 Okumura, Shinya 4 Schmidt-Samoa, Katja 4 Takashima, Katsuyuki 4 Takayasu, Atsushi 4 Vuillaume, Camille 4 Wakayama, Masato 3 Aoki, Kazumaro 3 Beuchat, Jean-Luc 3 Furue, Hiroki 3 Huang, Yun-Ju 3 Kim, Howon 3 Kiyomoto, Shinsaku 3 Kiyomura, Yutaro 3 Kudo, Momonari 3 Moriya, Tomoki 3 Petzoldt, Albrecht 3 Peyrin, Thomas 3 Xu, Rui 3 Yang, Bo 2 Aono, Yoshinori 2 Biehl, Ingrid 2 Brisebarre, Nicolas 2 Buchmann, Johannes A. 2 Cheon, Jung Hee 2 Fukumoto, Yasuhide 2 Fukushima, Kazuhide 2 Hühnlein, Detlef 2 Katagi, Masanobu 2 Kimoto, Kazufumi 2 Kitamura, Izuru 2 Kobayashi, Tetsutaro 2 Kunihiro, Noboru 2 Lim, Jongin 2 Mambo, Masahiro 2 Miura, Hiroyuki 2 Nakamura, Shuhei 2 Nuida, Koji 2 Okamoto, Takeshi 2 Paulus, Sachar Manfred 2 Petit, Christophe 2 Qin, Zhiguang 2 Shimoyama, Takeshi 2 Tanaka, Keisuke 2 Tao, Chengdong 2 Yasuda, Masaya 2 Zhang, Hui 1 Aikawa, Yusuke 1 Akiyama, Koichiro 1 Alsayigh, Saed 1 Anderssen, Robert Scott 1 Arkin, Ronald C. 1 Catalano, Dario 1 Cavaillé, J.-Y. 1 Chenal, J.-M. 1 Cheng, Chen-Mou 1 Cheng, Jin 1 Chung, Kyoil 1 Cramer, Ronald John Fitzgerald 1 Dahan, Xavier 1 Dahmen, Erik 1 Darmgård, Ivan 1 Detrey, Jérémie 1 Di Crescenzo, Giovanni 1 Diguet, G. 1 Doi, Hiroshi 1 Fujita, Kaoru 1 Fujita, Masahiro 1 Galindo, David 1 Gao, Xinwei 1 Goto, Yasuhiro 1 Hanaoka, Goichiro 1 Hartmann, Michael J. 1 Hasegawa, Rika 1 Hibino, Yasushi 1 Huang, Liusheng 1 Inomata, Atsuo ...and 78 more Co-Authors all top 5 Serials 11 Lecture Notes in Computer Science 6 JSIAM Letters 4 Mathematics for Industry 3 IEEE Transactions on Computers 3 Mathematical and Computer Modelling 2 Computers and Electrical Engineering 2 Information Sciences 2 Journal of Number Theory 2 Japan Journal of Industrial and Applied Mathematics 2 Designs, Codes and Cryptography 2 Journal of Math-for-Industry 1 Discrete Applied Mathematics 1 IEEE Transactions on Information Theory 1 Physics Letters. A 1 Theoretical and Mathematical Physics 1 Mathematica Slovaca 1 Theoretical Computer Science 1 Journal of Cryptology 1 Robotics and Autonomous Systems 1 Journal of Applied Mathematics and Computing 1 Journal of Mathematical Cryptology 1 Advances in Mathematics of Communications 1 COE Lecture Note 1 ACM Communications in Computer Algebra 1 Science China. Information Sciences 1 Asian Journal of Control 1 Pacific Journal of Mathematics for Industry 1 Advanced Courses in Mathematics – CRM Barcelona all top 5 Fields 147 Information and communication theory, circuits (94-XX) 39 Number theory (11-XX) 35 Computer science (68-XX) 29 Algebraic geometry (14-XX) 23 Quantum theory (81-XX) 16 General and overarching topics; collections (00-XX) 3 Numerical analysis (65-XX) 2 Group theory and generalizations (20-XX) 2 Statistical mechanics, structure of matter (82-XX) 1 Order, lattices, ordered algebraic structures (06-XX) 1 Calculus of variations and optimal control; optimization (49-XX) 1 Statistics (62-XX) 1 Biology and other natural sciences (92-XX) 1 Systems theory; control (93-XX) Publications by Year all cited Publications top 5 cited Publications Citations contained in zbMATH Open 95 Publications have been cited 294 times in 238 Documents Cited by ▼ Year ▼ Fast RSA-type cryptosystem modulo \(p^k q\). Zbl 0931.94041Takagi, Tsuiyoshi 23 1998 Improved progressive BKZ algorithms and their precise cost estimation by sharp simulator. Zbl 1385.94007Aono, Yoshinori; Wang, Yuntao; Hayashi, Takuya; Takagi, Tsuyoshi 18 2016 A fast parallel elliptic curve multiplication resistant against side channel attacks. Zbl 1055.94516Izu, Tetsuya; Takagi, Tsuyoshi 11 2002 Cryptographic hardware and embedded systems – CHES 2011. 13th international workshop, Nara, Japan, September 28–October 1, 2011. Proceedings. Zbl 1223.68010 10 2011 Zero-value point attacks on elliptic curve cryptosystem. Zbl 1255.94052Akishita, Toru; Takagi, Tsuyoshi 10 2003 The width-\(w\) NAF method provides small memory and fast elliptic scalar multiplications secure against side channel attacks. Zbl 1039.94519Okeya, Katsuyuki; Takagi, Tsuyoshi 8 2003 A complete divisor class halving algorithm for hyperelliptic curve cryptosystems of genus two. Zbl 1127.94347Kitamura, Izuru; Katagi, Masanobu; Takagi, Tsuyoshi 8 2005 Signed binary representations revisited. Zbl 1104.94034Okeya, Katsuyuki; Schmidt-Samoa, Katja; Spahn, Christian; Takagi, Tsuyoshi 8 2004 Exceptional procedure attack on elliptic curve cryptosystems. Zbl 1033.94529Izu, Tetsuya; Takagi, Tsuyoshi 8 2002 Breaking pairing-based cryptosystems using \(\eta_T\) pairing over \(GF(3^{97})\). Zbl 1292.94073Hayashi, Takuya; Shimoyama, Takeshi; Shinohara, Naoyuki; Takagi, Tsuyoshi 7 2012 Improved elliptic curve multiplication methods resistant against side channel attacks. Zbl 1033.11502Izu, Tetsuya; Möller, Bodo; Takagi, Tsuyoshi 7 2002 Digital signatures out of second-preimage resistant hash functions. Zbl 1177.94185Dahmen, Erik; Okeya, Katsuyuki; Takagi, Tsuyoshi; Vuillaume, Camille 7 2008 HFERP – a new multivariate encryption scheme. Zbl 1406.94065Ikematsu, Yasuhiko; Perlner, Ray; Smith-Tone, Daniel; Takagi, Tsuyoshi; Vates, Jeremy 6 2018 Improvement of Faugère et al.’s method to solve ECDLP. Zbl 1357.94069Huang, Yun-Ju; Petit, Christophe; Shinohara, Naoyuki; Takagi, Tsuyoshi 6 2013 Extended algorithm for solving underdefined multivariate quadratic equations. Zbl 1306.94076Miura, Hiroyuki; Hashimoto, Yasufumi; Takagi, Tsuyoshi 6 2013 On the optimal parameter choice for elliptic curve cryptosystems using isogeny. Zbl 1198.94074Akishita, Toru; Takagi, Tsuyoshi 5 2004 A polynomial-time algorithm for solving a class of underdetermined multivariate quadratic equations over fields of odd characteristics. Zbl 1306.94039Cheng, Chen-Mou; Hashimoto, Yasufumi; Miura, Hiroyuki; Takagi, Tsuyoshi 5 2014 How to construct CSIDH on Edwards curves. Zbl 1457.94165Moriya, Tomoki; Onuki, Hiroshi; Takagi, Tsuyoshi 4 2020 Group-oriented setting’s multisigncryption scheme with threshold designcryption. Zbl 1276.94025Zhang, Mingwu; Yang, Bo; Takagi, Tsuyoshi 4 2011 A new public-key cryptosystem over a quadratic order with quadratic decryption time. Zbl 1059.94019Paulus, Sachar; Takagi, Tsuyoshi 4 2000 Paillier’s cryptosystem modulo \(p^{2}q\) and its applications to trapdoor commitment schemes. Zbl 1126.94340Schmidt-Samoa, Katja; Takagi, Tsuyoshi 4 2005 Efficient undeniable signature schemes based on ideal arithmetic in quadratic orders. Zbl 1060.94031Biehl, Ingrid; Paulus, Sacher; Takagi, Tsuyoshi 4 2004 Power analysis to ECC using differential power between multiplication and squaring. Zbl 1333.94028Akishita, Toru; Takagi, Tsuyoshi 4 2006 Cheater identifiable secret sharing schemes via multi-receiver authentication. Zbl 1394.94947Xu, Rui; Morozov, Kirill; Takagi, Tsuyoshi 4 2014 SiGamal: a supersingular isogeny-based PKE and its application to a PRF. Zbl 07666675Moriya, Tomoki; Onuki, Hiroshi; Takagi, Tsuyoshi 4 2020 An efficient authenticated key exchange from random self-reducibility on CSIDH. Zbl 07497440Kawashima, Tomoki; Takashima, Katsuyuki; Aikawa, Yusuke; Takagi, Tsuyoshi 4 2021 Chosen message attack on multivariate signature ELSA at Asiacrypt 2017. Zbl 1398.94122Hashimoto, Yasufumi; Ikematsu, Yasuhiko; Takagi, Tsuyoshi 4 2018 Parallel Gauss sieve algorithm: solving the SVP challenge over a 128-dimensional ideal lattice. Zbl 1335.94054Ishiguro, Tsukasa; Kiyomoto, Shinsaku; Miyake, Yutaka; Takagi, Tsuyoshi 4 2014 New approach for selectively convertible undeniable signature schemes. Zbl 1172.94619Kurosawa, Kaoru; Takagi, Tsuyoshi 4 2006 Efficient representations on Koblitz curves with resistance to side channel attacks. Zbl 1127.94353Okeya, Katsuyuki; Takagi, Tsuyoshi; Vuillaume, Camille 3 2005 Efficient computations of the Tate pairing for the large MOV degrees. Zbl 1029.11017Izu, Tetsuya; Takagi, Tsuyoshi 3 2003 Improving key mismatch attack on NewHope with fewer queries. Zbl 1464.94044Okada, Satoshi; Wang, Yuntao; Takagi, Tsuyoshi 3 2020 Algorithms and arithmetic operators for computing the \(\eta_T\) pairing in characteristic three. Zbl 1367.11087Beuchat, Jean-Luc; Brisebarre, Nicolas; Detrey, Jérémie; Okamoto, Eiji; Shirase, Masaaki; Takagi, Tsuyoshi 3 2008 Attacks on multi-prime RSA with small prime difference. Zbl 1316.94098Zhang, Hui; Takagi, Tsuyoshi 3 2013 Solving a 676-bit discrete logarithm problem in \(\text{GF}(3^{6n})\). Zbl 1281.94028Hayashi, Takuya; Shinohara, Naoyuki; Wang, Lihua; Matsuo, Shin’ichiro; Shirase, Masaaki; Takagi, Tsuyoshi 3 2010 Some improved algorithms for hyperelliptic curve cryptosystems using degenerate divisors. Zbl 1133.94323Katagi, Masanobu; Akishita, Toru; Kitamura, Izuru; Takagi, Tsuyoshi 2 2005 Efficient arithmetic on subfield elliptic curves over small finite fields of odd characteristic. Zbl 1205.94084Hakuta, Keisuke; Sato, Hisayoshi; Takagi, Tsuyoshi 2 2010 Explicit lower bound for the length of minimal weigh \(\tau\)-adic expansions on Koblitz curves. Zbl 1203.94102Hakuta, Keisuke; Sato, Hisayoshi; Takagi, Tsuyoshi 2 2010 Zero-knowledge protocols for the McEliece encryption. Zbl 1305.94067Morozov, Kirill; Takagi, Tsuyoshi 2 2012 Side channel attacks and countermeasures on pairing based cryptosystems over binary fields. Zbl 1307.94065Kim, Tae Hyun; Takagi, Tsuyoshi; Han, Dong-Guk; Kim, Ho Won; Lim, Jongin 2 2006 Reducing logarithms in totally non-maximal imaginary quadratic orders to logarithms in finite fields. Zbl 0976.94020Hühnlein, Detlef; Takagi, Tsuyoshi 2 1999 Fast RSA-type cryptosystems using \(n\)-adic expansion. Zbl 0890.94025Takagi, Tsuyoshi 2 1997 A reject timing attack on an IND-CCA2 public-key cryptosystem. Zbl 1031.94526Sakurai, Kouichi; Takagi, Tsuyoshi 2 2003 A cryptosystem based on non-maximal imaginary quadratic orders with fast decryption. Zbl 0919.94023Hühnlein, Detlef; Jacobson, Michael J. jun.; Sachar, Paulus; Takagi, Tsuyoshi 2 1998 Post-quantum cryptography. 7th international workshop, PQCrypto 2016, Fukuoka, Japan, February 24–26, 2016. Proceedings. Zbl 1331.94007 2 2016 Reducing the key size of the SRP encryption scheme. Zbl 1346.94100Duong, Dung Hoang; Petzoldt, Albrecht; Takagi, Tsuyoshi 2 2016 Certificateless hybrid signcryption. Zbl 1305.94057Li, Fagen; Shirase, Masaaki; Takagi, Tsuyoshi 2 2013 Batch verification suitable for efficiently verifying a limited number of signatures. Zbl 1342.94108Hakuta, Keisuke; Katoh, Yosuke; Sato, Hisayoshi; Takagi, Tsuyoshi 2 2013 Advances in cryptology – ASIACRYPT 2017. 23rd international conference on the theory and applications of cryptology and information security, Hong Kong, China, December 3–7, 2017. Proceedings. Part III. Zbl 1380.94008 2 2017 On cheater identifiable secret sharing schemes secure against rushing adversary. Zbl 1344.94085Xu, Rui; Morozov, Kirill; Takagi, Tsuyoshi 2 2013 One sample ring-LWE with rounding and its application to key exchange. Zbl 1452.94065Ding, Jintai; Gao, Xinwei; Takagi, Tsuyoshi; Wang, Yuntao 1 2019 An experimental study of Kannan’s embedding technique for the search LWE problem. Zbl 1452.94089Wang, Yuntao; Aono, Yoshinori; Takagi, Tsuyoshi 1 2018 Contemporary cryptology. Zbl 1087.94002Catalano, Dario; Cramer, Ronald; Darmgård, Ivan; Di Crescenzo, Giovanni; Pointcheval, David; Takagi, Tsuyoshi 1 2005 Compressed XTR. Zbl 1214.94054Shirase, Masaaki; Han, Dong-Guk; Hibino, Yasushi; Kim, Ho Won; Takagi, Tsuyoshi 1 2007 Further security analysis of XTR. Zbl 1339.94046Han, Dong-Guk; Takagi, Tsuyoshi; Lim, Jongin 1 2006 Efficient multi-PKG ID-based signcryption for ad hoc networks. Zbl 1237.68023Li, Fagen; Shirase, Masaaki; Takagi, Tsuyoshi 1 2009 Product formula of the cubic Gauss sum modulo the product of the primes. Zbl 0876.11049Takagi, Tsuyoshi 1 1997 Analysis of fractional window recoding methods and their application to elliptic curve cryptosystems. Zbl 1294.94077Schmidt-Samoa, Katja; Semay, Olivier; Takagi, Tsuyoshi 1 2006 Application of scalar multiplication of Edwards curves to pairing-based cryptography. Zbl 1292.94158Yasuda, Takanori; Takagi, Tsuyoshi; Sakurai, Kouichi 1 2012 A coprocessor for the final exponentiation of the \(\eta_T\) pairing in characteristic three. Zbl 1183.68025Beuchat, Jean-Luc; Brisebarre, Nicolas; Shirase, Masaaki; Takagi, Tsuyoshi; Okamoto, Eiji 1 2007 An experiment of number field sieve over \(\mathrm{GF}(p)\) of low Hamming weight characteristic. Zbl 1271.11120Hayasaka, Kenichiro; Takagi, Tsuyoshi 1 2011 GeoENC: geometric area based keys and policies in functional encryption systems. Zbl 1295.94163Zhang, Mingwu; Takagi, Tsuyoshi 1 2011 Some RSA-based encryption schemes with tight security reduction. Zbl 1205.94087Kurosawa, Kaoru; Takagi, Tsuyoshi 1 2003 Generalized powering functions and their application to digital signatures. Zbl 1205.11130Sato, Hisayoshi; Takagi, Tsuyoshi; Tezuka, Satoru; Takaragi, Kazuo 1 2003 On the security of online/offline signatures and multisignatures from ACISP’06. Zbl 1362.94038Li, Fagen; Shirase, Masaaki; Takagi, Tsuyoshi 1 2008 NICE – New Ideal Coset Encryption. Zbl 0953.94022Hartmann, Michael; Paulus, Sachar; Takagi, Tsuyoshi 1 1999 Anonymous spatial encryption under affine space delegation functionality with full security. Zbl 1354.94054Zhang, Mingwu; Yang, Bo; Takagi, Tsuyoshi 1 2014 Reducing the key size of rainbow using non-commutative rings. Zbl 1292.94157Yasuda, Takanori; Sakurai, Kouichi; Takagi, Tsuyoshi 1 2012 Key length estimation of pairing-based cryptosystems using \(\eta_T\) pairing. Zbl 1291.94156Shinohara, Naoyuki; Shimoyama, Takeshi; Hayashi, Takuya; Takagi, Tsuyoshi 1 2012 Radix-\(r\) non-adjacent form. Zbl 1109.94352Takagi, Tsuyoshi; Yen, Sung-Ming; Wu, Bo-Ching 1 2004 An IND-CCA2 public-key cryptosystem with fast decryption. Zbl 0999.94527Buchmann, Johannes; Sakurai, Kouichi; Takagi, Tsuyoshi 1 2002 Fast elliptic curve multiplications with SIMD operations. Zbl 1023.94526Izu, Tetsuya; Takagi, Tsuyoshi 1 2002 New semantically secure public-key cryptosystems from the RSA-primitive. Zbl 1055.94530Sakurai, Kouichi; Takagi, Tsuyoshi 1 2002 Number field cryptography. Zbl 1073.94012Buchmann, Johannes; Takagi, Tsuyoshi; Vollmer, Ulrich 1 2004 Security analysis of CRT-based cryptosystems. Zbl 1103.68534Okeya, Katsuyuki; Takagi, Tsuyoshi 1 2004 An experiment of number field sieve for discrete logarithm problem over \(\mathrm{GF}(p^n)\). Zbl 1460.94048Hayasaka, Kenichiro; Aoki, Kazumaro; Kobayashi, Tetsutaro; Takagi, Tsuyoshi 1 2014 Advances in cryptology – ASIACRYPT 2016. 22nd international conference on the theory and application of cryptology and information security, Hanoi, Vietnam, December 4–8, 2016. Proceedings. Part I. Zbl 1349.94005 1 2016 Advances in cryptology – ASIACRYPT 2016. 22nd international conference on the theory and application of cryptology and information security, Hanoi, Vietnam, December 4-8, 2016. Proceedings. Part II. Zbl 1349.94006 1 2016 Revisiting the cubic UOV signature scheme. Zbl 1381.94069Duong, Dung H.; Petzoldt, Albrecht; Wang, Yacheng; Takagi, Tsuyoshi 1 2017 Multivariate encryption schemes based on polynomial equations over real numbers. Zbl 1501.94060Yasuda, Takanori; Wang, Yacheng; Takagi, Tsuyoshi 1 2020 Group key exchange from CSIDH and its application to trusted setup in supersingular isogeny cryptosystems. Zbl 1500.94044Moriya, Tomoki; Takashima, Katsuyuki; Takagi, Tsuyoshi 1 2020 Improving the BKZ reduction algorithm by quick reordering technique. Zbl 1444.94106Wang, Yuntao; Takagi, Tsuyoshi 1 2018 Some properties of \(\tau\)-adic expansions on hyperelliptic Koblitz curves. Zbl 1408.11005Hakuta, Keisuke; Sato, Hisayoshi; Takagi, Tsuyoshi 1 2018 On collisions related to an ideal class of order 3 in CSIDH. Zbl 1485.94113Onuki, Hiroshi; Takagi, Tsuyoshi 1 2020 One-wayness equivalent to general factoring. Zbl 1367.94321Kurosawa, Kaoru; Takagi, Tsuyoshi 1 2009 A more flexible countermeasure against side channel attacks using window method. Zbl 1274.94100Okeya, Katsuyuki; Takagi, Tsuyoshi 1 2003 A public-key encryption scheme based on non-linear indeterminate equations. Zbl 1384.94021Akiyama, Koichiro; Goto, Yasuhiro; Okumura, Shinya; Takagi, Tsuyoshi; Nuida, Koji; Hanaoka, Goichiro 1 2018 Security analysis of cryptosystems using short generators over ideal lattices. Zbl 1404.94103Okumura, Shinya; Sugiyama, Shingo; Yasuda, Masaya; Takagi, Tsuyoshi 1 2018 Advances in cryptology – ASIACRYPT 2017. 23rd international conference on the theory and applications of cryptology and information security, Hong Kong, China, December 3–7, 2017. Proceedings. Part II. Zbl 1380.94007 1 2017 Advances in cryptology – ASIACRYPT 2017. 23rd international conference on the theory and applications of cryptology and information security, Hong Kong, China, December 3–7, 2017. Proceedings. Part I. Zbl 1380.94009 1 2017 Secure identity-based signcryption in the standard model. Zbl 1286.94076Li, Fagen; Takagi, Tsuyoshi 1 2013 Identity-based partially blind signature in the standard model for electronic cash. Zbl 1297.94119Li, Fagen; Zhang, Mingwu; Takagi, Tsuyoshi 1 2013 Multivariate signature scheme using quadratic forms. Zbl 1306.94098Yasuda, Takanori; Takagi, Tsuyoshi; Sakurai, Kouichi 1 2013 Post-quantum cryptography. 8th international workshop, PQCrypto 2017, Utrecht, The Netherlands, June 26–28, 2017. Proceedings. Zbl 1386.94004 1 2017 An experiment of number field sieve for discrete logarithm problem over \(\mathrm{GF}(p^{12})\). Zbl 1320.94067Hayasaka, Kenichiro; Aoki, Kazumaro; Kobayashi, Tetsutaro; Takagi, Tsuyoshi 1 2013 An efficient authenticated key exchange from random self-reducibility on CSIDH. Zbl 07497440Kawashima, Tomoki; Takashima, Katsuyuki; Aikawa, Yusuke; Takagi, Tsuyoshi 4 2021 How to construct CSIDH on Edwards curves. Zbl 1457.94165Moriya, Tomoki; Onuki, Hiroshi; Takagi, Tsuyoshi 4 2020 SiGamal: a supersingular isogeny-based PKE and its application to a PRF. Zbl 07666675Moriya, Tomoki; Onuki, Hiroshi; Takagi, Tsuyoshi 4 2020 Improving key mismatch attack on NewHope with fewer queries. Zbl 1464.94044Okada, Satoshi; Wang, Yuntao; Takagi, Tsuyoshi 3 2020 Multivariate encryption schemes based on polynomial equations over real numbers. Zbl 1501.94060Yasuda, Takanori; Wang, Yacheng; Takagi, Tsuyoshi 1 2020 Group key exchange from CSIDH and its application to trusted setup in supersingular isogeny cryptosystems. Zbl 1500.94044Moriya, Tomoki; Takashima, Katsuyuki; Takagi, Tsuyoshi 1 2020 On collisions related to an ideal class of order 3 in CSIDH. Zbl 1485.94113Onuki, Hiroshi; Takagi, Tsuyoshi 1 2020 One sample ring-LWE with rounding and its application to key exchange. Zbl 1452.94065Ding, Jintai; Gao, Xinwei; Takagi, Tsuyoshi; Wang, Yuntao 1 2019 HFERP – a new multivariate encryption scheme. Zbl 1406.94065Ikematsu, Yasuhiko; Perlner, Ray; Smith-Tone, Daniel; Takagi, Tsuyoshi; Vates, Jeremy 6 2018 Chosen message attack on multivariate signature ELSA at Asiacrypt 2017. Zbl 1398.94122Hashimoto, Yasufumi; Ikematsu, Yasuhiko; Takagi, Tsuyoshi 4 2018 An experimental study of Kannan’s embedding technique for the search LWE problem. Zbl 1452.94089Wang, Yuntao; Aono, Yoshinori; Takagi, Tsuyoshi 1 2018 Improving the BKZ reduction algorithm by quick reordering technique. Zbl 1444.94106Wang, Yuntao; Takagi, Tsuyoshi 1 2018 Some properties of \(\tau\)-adic expansions on hyperelliptic Koblitz curves. Zbl 1408.11005Hakuta, Keisuke; Sato, Hisayoshi; Takagi, Tsuyoshi 1 2018 A public-key encryption scheme based on non-linear indeterminate equations. Zbl 1384.94021Akiyama, Koichiro; Goto, Yasuhiro; Okumura, Shinya; Takagi, Tsuyoshi; Nuida, Koji; Hanaoka, Goichiro 1 2018 Security analysis of cryptosystems using short generators over ideal lattices. Zbl 1404.94103Okumura, Shinya; Sugiyama, Shingo; Yasuda, Masaya; Takagi, Tsuyoshi 1 2018 Advances in cryptology – ASIACRYPT 2017. 23rd international conference on the theory and applications of cryptology and information security, Hong Kong, China, December 3–7, 2017. Proceedings. Part III. Zbl 1380.94008 2 2017 Revisiting the cubic UOV signature scheme. Zbl 1381.94069Duong, Dung H.; Petzoldt, Albrecht; Wang, Yacheng; Takagi, Tsuyoshi 1 2017 Advances in cryptology – ASIACRYPT 2017. 23rd international conference on the theory and applications of cryptology and information security, Hong Kong, China, December 3–7, 2017. Proceedings. Part II. Zbl 1380.94007 1 2017 Advances in cryptology – ASIACRYPT 2017. 23rd international conference on the theory and applications of cryptology and information security, Hong Kong, China, December 3–7, 2017. Proceedings. Part I. Zbl 1380.94009 1 2017 Post-quantum cryptography. 8th international workshop, PQCrypto 2017, Utrecht, The Netherlands, June 26–28, 2017. Proceedings. Zbl 1386.94004 1 2017 Improved progressive BKZ algorithms and their precise cost estimation by sharp simulator. Zbl 1385.94007Aono, Yoshinori; Wang, Yuntao; Hayashi, Takuya; Takagi, Tsuyoshi 18 2016 Post-quantum cryptography. 7th international workshop, PQCrypto 2016, Fukuoka, Japan, February 24–26, 2016. Proceedings. Zbl 1331.94007 2 2016 Reducing the key size of the SRP encryption scheme. Zbl 1346.94100Duong, Dung Hoang; Petzoldt, Albrecht; Takagi, Tsuyoshi 2 2016 Advances in cryptology – ASIACRYPT 2016. 22nd international conference on the theory and application of cryptology and information security, Hanoi, Vietnam, December 4–8, 2016. Proceedings. Part I. Zbl 1349.94005 1 2016 Advances in cryptology – ASIACRYPT 2016. 22nd international conference on the theory and application of cryptology and information security, Hanoi, Vietnam, December 4-8, 2016. Proceedings. Part II. Zbl 1349.94006 1 2016 A polynomial-time algorithm for solving a class of underdetermined multivariate quadratic equations over fields of odd characteristics. Zbl 1306.94039Cheng, Chen-Mou; Hashimoto, Yasufumi; Miura, Hiroyuki; Takagi, Tsuyoshi 5 2014 Cheater identifiable secret sharing schemes via multi-receiver authentication. Zbl 1394.94947Xu, Rui; Morozov, Kirill; Takagi, Tsuyoshi 4 2014 Parallel Gauss sieve algorithm: solving the SVP challenge over a 128-dimensional ideal lattice. Zbl 1335.94054Ishiguro, Tsukasa; Kiyomoto, Shinsaku; Miyake, Yutaka; Takagi, Tsuyoshi 4 2014 Anonymous spatial encryption under affine space delegation functionality with full security. Zbl 1354.94054Zhang, Mingwu; Yang, Bo; Takagi, Tsuyoshi 1 2014 An experiment of number field sieve for discrete logarithm problem over \(\mathrm{GF}(p^n)\). Zbl 1460.94048Hayasaka, Kenichiro; Aoki, Kazumaro; Kobayashi, Tetsutaro; Takagi, Tsuyoshi 1 2014 Improvement of Faugère et al.’s method to solve ECDLP. Zbl 1357.94069Huang, Yun-Ju; Petit, Christophe; Shinohara, Naoyuki; Takagi, Tsuyoshi 6 2013 Extended algorithm for solving underdefined multivariate quadratic equations. Zbl 1306.94076Miura, Hiroyuki; Hashimoto, Yasufumi; Takagi, Tsuyoshi 6 2013 Attacks on multi-prime RSA with small prime difference. Zbl 1316.94098Zhang, Hui; Takagi, Tsuyoshi 3 2013 Certificateless hybrid signcryption. Zbl 1305.94057Li, Fagen; Shirase, Masaaki; Takagi, Tsuyoshi 2 2013 Batch verification suitable for efficiently verifying a limited number of signatures. Zbl 1342.94108Hakuta, Keisuke; Katoh, Yosuke; Sato, Hisayoshi; Takagi, Tsuyoshi 2 2013 On cheater identifiable secret sharing schemes secure against rushing adversary. Zbl 1344.94085Xu, Rui; Morozov, Kirill; Takagi, Tsuyoshi 2 2013 Secure identity-based signcryption in the standard model. Zbl 1286.94076Li, Fagen; Takagi, Tsuyoshi 1 2013 Identity-based partially blind signature in the standard model for electronic cash. Zbl 1297.94119Li, Fagen; Zhang, Mingwu; Takagi, Tsuyoshi 1 2013 Multivariate signature scheme using quadratic forms. Zbl 1306.94098Yasuda, Takanori; Takagi, Tsuyoshi; Sakurai, Kouichi 1 2013 An experiment of number field sieve for discrete logarithm problem over \(\mathrm{GF}(p^{12})\). Zbl 1320.94067Hayasaka, Kenichiro; Aoki, Kazumaro; Kobayashi, Tetsutaro; Takagi, Tsuyoshi 1 2013 Breaking pairing-based cryptosystems using \(\eta_T\) pairing over \(GF(3^{97})\). Zbl 1292.94073Hayashi, Takuya; Shimoyama, Takeshi; Shinohara, Naoyuki; Takagi, Tsuyoshi 7 2012 Zero-knowledge protocols for the McEliece encryption. Zbl 1305.94067Morozov, Kirill; Takagi, Tsuyoshi 2 2012 Application of scalar multiplication of Edwards curves to pairing-based cryptography. Zbl 1292.94158Yasuda, Takanori; Takagi, Tsuyoshi; Sakurai, Kouichi 1 2012 Reducing the key size of rainbow using non-commutative rings. Zbl 1292.94157Yasuda, Takanori; Sakurai, Kouichi; Takagi, Tsuyoshi 1 2012 Key length estimation of pairing-based cryptosystems using \(\eta_T\) pairing. Zbl 1291.94156Shinohara, Naoyuki; Shimoyama, Takeshi; Hayashi, Takuya; Takagi, Tsuyoshi 1 2012 Cryptographic hardware and embedded systems – CHES 2011. 13th international workshop, Nara, Japan, September 28–October 1, 2011. Proceedings. Zbl 1223.68010 10 2011 Group-oriented setting’s multisigncryption scheme with threshold designcryption. Zbl 1276.94025Zhang, Mingwu; Yang, Bo; Takagi, Tsuyoshi 4 2011 An experiment of number field sieve over \(\mathrm{GF}(p)\) of low Hamming weight characteristic. Zbl 1271.11120Hayasaka, Kenichiro; Takagi, Tsuyoshi 1 2011 GeoENC: geometric area based keys and policies in functional encryption systems. Zbl 1295.94163Zhang, Mingwu; Takagi, Tsuyoshi 1 2011 Solving a 676-bit discrete logarithm problem in \(\text{GF}(3^{6n})\). Zbl 1281.94028Hayashi, Takuya; Shinohara, Naoyuki; Wang, Lihua; Matsuo, Shin’ichiro; Shirase, Masaaki; Takagi, Tsuyoshi 3 2010 Efficient arithmetic on subfield elliptic curves over small finite fields of odd characteristic. Zbl 1205.94084Hakuta, Keisuke; Sato, Hisayoshi; Takagi, Tsuyoshi 2 2010 Explicit lower bound for the length of minimal weigh \(\tau\)-adic expansions on Koblitz curves. Zbl 1203.94102Hakuta, Keisuke; Sato, Hisayoshi; Takagi, Tsuyoshi 2 2010 Efficient multi-PKG ID-based signcryption for ad hoc networks. Zbl 1237.68023Li, Fagen; Shirase, Masaaki; Takagi, Tsuyoshi 1 2009 One-wayness equivalent to general factoring. Zbl 1367.94321Kurosawa, Kaoru; Takagi, Tsuyoshi 1 2009 Digital signatures out of second-preimage resistant hash functions. Zbl 1177.94185Dahmen, Erik; Okeya, Katsuyuki; Takagi, Tsuyoshi; Vuillaume, Camille 7 2008 Algorithms and arithmetic operators for computing the \(\eta_T\) pairing in characteristic three. Zbl 1367.11087Beuchat, Jean-Luc; Brisebarre, Nicolas; Detrey, Jérémie; Okamoto, Eiji; Shirase, Masaaki; Takagi, Tsuyoshi 3 2008 On the security of online/offline signatures and multisignatures from ACISP’06. Zbl 1362.94038Li, Fagen; Shirase, Masaaki; Takagi, Tsuyoshi 1 2008 Compressed XTR. Zbl 1214.94054Shirase, Masaaki; Han, Dong-Guk; Hibino, Yasushi; Kim, Ho Won; Takagi, Tsuyoshi 1 2007 A coprocessor for the final exponentiation of the \(\eta_T\) pairing in characteristic three. Zbl 1183.68025Beuchat, Jean-Luc; Brisebarre, Nicolas; Shirase, Masaaki; Takagi, Tsuyoshi; Okamoto, Eiji 1 2007 Power analysis to ECC using differential power between multiplication and squaring. Zbl 1333.94028Akishita, Toru; Takagi, Tsuyoshi 4 2006 New approach for selectively convertible undeniable signature schemes. Zbl 1172.94619Kurosawa, Kaoru; Takagi, Tsuyoshi 4 2006 Side channel attacks and countermeasures on pairing based cryptosystems over binary fields. Zbl 1307.94065Kim, Tae Hyun; Takagi, Tsuyoshi; Han, Dong-Guk; Kim, Ho Won; Lim, Jongin 2 2006 Further security analysis of XTR. Zbl 1339.94046Han, Dong-Guk; Takagi, Tsuyoshi; Lim, Jongin 1 2006 Analysis of fractional window recoding methods and their application to elliptic curve cryptosystems. Zbl 1294.94077Schmidt-Samoa, Katja; Semay, Olivier; Takagi, Tsuyoshi 1 2006 A complete divisor class halving algorithm for hyperelliptic curve cryptosystems of genus two. Zbl 1127.94347Kitamura, Izuru; Katagi, Masanobu; Takagi, Tsuyoshi 8 2005 Paillier’s cryptosystem modulo \(p^{2}q\) and its applications to trapdoor commitment schemes. Zbl 1126.94340Schmidt-Samoa, Katja; Takagi, Tsuyoshi 4 2005 Efficient representations on Koblitz curves with resistance to side channel attacks. Zbl 1127.94353Okeya, Katsuyuki; Takagi, Tsuyoshi; Vuillaume, Camille 3 2005 Some improved algorithms for hyperelliptic curve cryptosystems using degenerate divisors. Zbl 1133.94323Katagi, Masanobu; Akishita, Toru; Kitamura, Izuru; Takagi, Tsuyoshi 2 2005 Contemporary cryptology. Zbl 1087.94002Catalano, Dario; Cramer, Ronald; Darmgård, Ivan; Di Crescenzo, Giovanni; Pointcheval, David; Takagi, Tsuyoshi 1 2005 Signed binary representations revisited. Zbl 1104.94034Okeya, Katsuyuki; Schmidt-Samoa, Katja; Spahn, Christian; Takagi, Tsuyoshi 8 2004 On the optimal parameter choice for elliptic curve cryptosystems using isogeny. Zbl 1198.94074Akishita, Toru; Takagi, Tsuyoshi 5 2004 Efficient undeniable signature schemes based on ideal arithmetic in quadratic orders. Zbl 1060.94031Biehl, Ingrid; Paulus, Sacher; Takagi, Tsuyoshi 4 2004 Radix-\(r\) non-adjacent form. Zbl 1109.94352Takagi, Tsuyoshi; Yen, Sung-Ming; Wu, Bo-Ching 1 2004 Number field cryptography. Zbl 1073.94012Buchmann, Johannes; Takagi, Tsuyoshi; Vollmer, Ulrich 1 2004 Security analysis of CRT-based cryptosystems. Zbl 1103.68534Okeya, Katsuyuki; Takagi, Tsuyoshi 1 2004 Zero-value point attacks on elliptic curve cryptosystem. Zbl 1255.94052Akishita, Toru; Takagi, Tsuyoshi 10 2003 The width-\(w\) NAF method provides small memory and fast elliptic scalar multiplications secure against side channel attacks. Zbl 1039.94519Okeya, Katsuyuki; Takagi, Tsuyoshi 8 2003 Efficient computations of the Tate pairing for the large MOV degrees. Zbl 1029.11017Izu, Tetsuya; Takagi, Tsuyoshi 3 2003 A reject timing attack on an IND-CCA2 public-key cryptosystem. Zbl 1031.94526Sakurai, Kouichi; Takagi, Tsuyoshi 2 2003 Some RSA-based encryption schemes with tight security reduction. Zbl 1205.94087Kurosawa, Kaoru; Takagi, Tsuyoshi 1 2003 Generalized powering functions and their application to digital signatures. Zbl 1205.11130Sato, Hisayoshi; Takagi, Tsuyoshi; Tezuka, Satoru; Takaragi, Kazuo 1 2003 A more flexible countermeasure against side channel attacks using window method. Zbl 1274.94100Okeya, Katsuyuki; Takagi, Tsuyoshi 1 2003 A fast parallel elliptic curve multiplication resistant against side channel attacks. Zbl 1055.94516Izu, Tetsuya; Takagi, Tsuyoshi 11 2002 Exceptional procedure attack on elliptic curve cryptosystems. Zbl 1033.94529Izu, Tetsuya; Takagi, Tsuyoshi 8 2002 Improved elliptic curve multiplication methods resistant against side channel attacks. Zbl 1033.11502Izu, Tetsuya; Möller, Bodo; Takagi, Tsuyoshi 7 2002 An IND-CCA2 public-key cryptosystem with fast decryption. Zbl 0999.94527Buchmann, Johannes; Sakurai, Kouichi; Takagi, Tsuyoshi 1 2002 Fast elliptic curve multiplications with SIMD operations. Zbl 1023.94526Izu, Tetsuya; Takagi, Tsuyoshi 1 2002 New semantically secure public-key cryptosystems from the RSA-primitive. Zbl 1055.94530Sakurai, Kouichi; Takagi, Tsuyoshi 1 2002 A new public-key cryptosystem over a quadratic order with quadratic decryption time. Zbl 1059.94019Paulus, Sachar; Takagi, Tsuyoshi 4 2000 Reducing logarithms in totally non-maximal imaginary quadratic orders to logarithms in finite fields. Zbl 0976.94020Hühnlein, Detlef; Takagi, Tsuyoshi 2 1999 NICE – New Ideal Coset Encryption. Zbl 0953.94022Hartmann, Michael; Paulus, Sachar; Takagi, Tsuyoshi 1 1999 Fast RSA-type cryptosystem modulo \(p^k q\). Zbl 0931.94041Takagi, Tsuiyoshi 23 1998 A cryptosystem based on non-maximal imaginary quadratic orders with fast decryption. Zbl 0919.94023Hühnlein, Detlef; Jacobson, Michael J. jun.; Sachar, Paulus; Takagi, Tsuyoshi 2 1998 Fast RSA-type cryptosystems using \(n\)-adic expansion. Zbl 0890.94025Takagi, Tsuyoshi 2 1997 Product formula of the cubic Gauss sum modulo the product of the primes. Zbl 0876.11049Takagi, Tsuyoshi 1 1997 all cited Publications top 5 cited Publications all top 5 Cited by 507 Authors 10 Takagi, Tsuyoshi 6 Galbraith, Steven D. 6 Joye, Marc 6 Yasuda, Masaya 5 Miret, Josep M. 5 Tunstall, Michael J. 4 Nakamura, Satoshi 4 Nitaj, Abderrahmane 4 Pujolàs, Jordi 4 Sarkar, Santanu 4 Susilo, Willy 4 Thériault, Nicolas 4 Wang, Huaxiong 3 Barbulescu, Razvan 3 Buchmann, Johannes A. 3 Dahmen, Erik 3 Fouotsa, Emmanuel 3 Hakuta, Keisuke 3 Hashimoto, Yasufumi 3 Hong, Seokhie 3 Hu, Lei 3 Hu, Zhi 3 Hutchinson, Aaron 3 Kunihiro, Noboru 3 Laarhoven, Thijs 3 Le Trieu Phong 3 Ling, San 3 Lu, Yao 3 Peng, Liqiang 3 Petit, Christophe 3 Smith-Tone, Daniel 3 Takayasu, Atsushi 2 Adhikari, Avishek 2 Akchiche, Omar 2 Aono, Yoshinori 2 Azarderakhsh, Reza 2 Balasubramaniam, Pagavathigounder 2 Bonnetain, Xavier 2 Castagnos, Guilhem 2 Chang, Nam Su 2 Chi-Domínguez, Jesús-Javier 2 Costello, Craig 2 Diao, Oumar 2 Ferradi, Houda 2 Fujisaki, Eiichiro 2 Gaudry, Pierrick 2 Goswami, Pinkimani 2 Granger, Robert A. 2 Guillevic, Aurore 2 Guilley, Sylvain 2 Han, Dong-Guk 2 Hashimoto, Keitaro 2 Heuberger, Clemens 2 Hülsing, Andreas 2 Ikematsu, Yasuhiko 2 Karati, Sabyasachi 2 Karthikeyan, E. 2 Katsumata, Shuichi 2 Khadir, Omar 2 Khleborodov, Denis 2 Kim, Taehyun 2 Koziel, Brian 2 Kurosawa, Kaoru 2 Kwiatkowski, Kris 2 Laguillaumie, Fabien 2 LeGrow, Jason Travis 2 Li, Chao 2 Lin, Xibin 2 Mishra, Pradeep Kumar 2 Morain, François 2 Muir, James A. 2 Mumtaz, Majid 2 Naccache, David 2 Nakamura, Shuhei 2 Nguyen, Khoa 2 Nuida, Koji 2 Ogata, Wakaha 2 Onuki, Hiroshi 2 Page, Dan 2 Petzoldt, Albrecht 2 Ping, Luo 2 Prest, Thomas 2 Qin, Bo 2 Qu, Longjiang 2 Rio, Anna 2 Sadornil, Daniel 2 Safavi-Naini, Reihaneh 2 Sakurai, Kouichi 2 Singh, Madan Mohan 2 Standaert, Francois-Xavier 2 Tena Ayuso, Juan Gabriel 2 Thomé, Emmanuel 2 Tomàs, R. 2 Tonien, Joseph 2 Valls, Magda 2 Verbel, Javier A. 2 Wang, Licheng 2 Wang, Yacheng 2 Wang, Yuntao 2 Wu, Qianhong ...and 407 more Authors all top 5 Cited in 51 Serials 12 Designs, Codes and Cryptography 10 Information Sciences 9 Journal of Cryptology 7 Advances in Mathematics of Communications 6 Finite Fields and their Applications 5 Discrete Applied Mathematics 5 Theoretical Computer Science 5 Journal of Mathematical Cryptology 4 Applied Mathematics and Computation 4 Quantum Information Processing 4 Cryptography and Communications 3 Information Processing Letters 3 Mathematics of Computation 3 Applicable Algebra in Engineering, Communication and Computing 3 Mathematical Problems in Engineering 3 Matematicheskie Voprosy Kriptografii 2 International Journal of Theoretical Physics 2 Mathematica Slovaca 2 Soft Computing 2 Wuhan University Journal of Natural Sciences (WUJNS) 2 Journal of Discrete Mathematical Sciences & Cryptography 2 Journal of Applied Mathematics and Computing 2 Science in China. Series F 2 Groups, Complexity, Cryptology 2 Afrika Matematika 2 JSIAM Letters 2 Pacific Journal of Mathematics for Industry 1 Computers & Mathematics with Applications 1 Journal of Number Theory 1 Nagoya Mathematical Journal 1 Proceedings of the Japan Academy. Series A 1 Publications de l’Institut Mathématique. Nouvelle Série 1 Chinese Annals of Mathematics. Series B 1 Acta Applicandae Mathematicae 1 Journal of Complexity 1 Applied Mathematics Letters 1 SIAM Journal on Discrete Mathematics 1 International Journal of Foundations of Computer Science 1 Communications of the ACM 1 International Journal of Computer Mathematics 1 Linear Algebra and its Applications 1 Applied Mathematics. Series B (English Edition) 1 Advances in Computational Mathematics 1 Arab Journal of Mathematical Sciences 1 Mathematical Biosciences and Engineering 1 Mathematics in Computer Science 1 Asian-European Journal of Mathematics 1 Discrete Mathematics, Algorithms and Applications 1 Acta Universitatis Sapientiae. Informatica 1 Frontiers of Computer Science 1 International Journal of Mathematics for Industry all top 5 Cited in 18 Fields 213 Information and communication theory, circuits (94-XX) 78 Number theory (11-XX) 64 Algebraic geometry (14-XX) 44 Computer science (68-XX) 35 Quantum theory (81-XX) 4 Commutative algebra (13-XX) 3 Field theory and polynomials (12-XX) 3 Statistics (62-XX) 3 Numerical analysis (65-XX) 1 General and overarching topics; collections (00-XX) 1 Combinatorics (05-XX) 1 Order, lattices, ordered algebraic structures (06-XX) 1 Real functions (26-XX) 1 Ordinary differential equations (34-XX) 1 Harmonic analysis on Euclidean spaces (42-XX) 1 Geometry (51-XX) 1 Probability theory and stochastic processes (60-XX) 1 Game theory, economics, finance, and other social and behavioral sciences (91-XX) Citations by Year