English Japanese
publications

Publications 2002 - 2006

2006

  • Kaoru Kurosawa, Tsuyoshi Takagi, "Efficient Selectively Convertible Undeniable Signature Without Random Oracle", Asiacrypt 2006, LNCS 4284, pp.428-443, 2006, © Springer-Verlag. (abstract)
  • Tae Hyun Kim, Tsuyoshi Takagi, Dong-Guk Han, Ho Won Kim, Jongin Lim, "Side Channel Attacks and Countermeasures on Pairing Based Cryptosystems over Binary Fields", 5th International Conference on Cryptology and Network Security, CANS 2006, LNCS 4301, pp.168-181, 2006, © Springer-Verlag. (abstract)
  • Tetsuya Izu, Tsuyoshi Takagi, "Power Analysis Countermeasure based on Ramp Scheme", 9th Japan-Korea Joint Workshop on Algorithms and Computation, WAAC 2006, pp.135-142, 2006.
  • Dong-Guk Han, Tsuyoshi Takagi, Ho Won Kim, Kyo Il Chung, "New Security Problem in RFID Systems "Tag Killing"", Applied Cryptography and Information Security, ACIS 2006, LNCS 3982, pp.375-384, 2006, © Springer-Verlag. (abstract)
  • Katsuyuki Okeya, Tsuyoshi Takagi, "Security Analysis of CRT-Based Cryptosystems", International Journal of Information Security, IJIS, Vol.5, No.3, pp.177-185, 2006, © Springer-Verlag.
  • Camille Vuillaume, Katsuyuki Okeya, Tsuyoshi Takagi, "Defeating Simple Power Analysis on Koblitz Curves", IEICE Transactions, Vol.E89-A No.5 pp.1362-1369, IEICE, 2006. (abstract)
  • Toru Akishita, Tsuyoshi Takagi, "Power Analysis to ECC Using Differential Power between Multiplication and Squaring", Seventh Smart Card Research and Advanced Application, CARDIS 2006, LNCS 3928, pp.151-164, 2006, © Springer-Verlag. (abstract)
  • Dong-Guk Han, Tsuyoshi Takagi, Jongin Lim, "Further Security Analysis of XTR", The 2nd Information Security Practice and Experience Conference, ISPEC 2006, LNCS 3903, pp.33-44, 2006, © Springer-Verlag. (abstract)
  • Hisayoshi Sato, Tsuyoshi Takagi, Satoru Tezuka, Kazuo Takaragi, "Generalized Powering Functions and Their Application to Digital Signatures", IEICE Transactions, Vol.E89-A, No.1, pp.81-89, IEICE, 2006. (abstract)
  • Tsuyoshi Takagi, David Reis, Jr., Sung-Ming Yen, Bo-Ching Wu, "Radix-r Non-Adjacent Form and Its Application to Pairing-Based Cryptosystem", IEICE Transactions, Vol.E89-A, No.1, pp.115-123, IEICE, 2006. (abstract)
  • Masanobu Katagi, Toru Akishita, Izuru Kitamura, Tsuyoshi Takagi, "Efficient Hyperelliptic Curve Cryptosystems using Theta Divisors", IEICE Transactions, Vol.E89-A, No.1, pp.151-160, IEICE, 2006. (abstract)
  • Katsuyuki Okeya, Tsuyoshi Takagi, Camille Vuillaume, "Security Analysis of the SPA-Resistant Fractional Width Method", IEICE Transactions, Vol.E89-A, No.1, pp.161-168, IEICE, 2006. (abstract)
  • Katja Schmidt-Samoa, Olivier Semay, Tsuyoshi Takagi, "Analysis of Fractional Window Recoding Methods and Their Application to Elliptic Curve Cryptosystems", IEEE Transactions on Computers, Vol.55, No.1, pp.48-57, January, 2006, © IEEE Computer Society.

2005

  • Lihua Wang, Takeshi Okamoto, Tsuyoshi Takagi, and Eiji Okamoto, "Insider Impersonation-MIM Attack to Tripartite Key Agreement Scheme and An Efficient Protocol for Multiple Keys", 2005 International Conference on Computational Intelligence and Security, CIS 2005, Part II, LNAI 3802, pp.198-203, 2005, © Springer-Verlag. (abstract)
  • Dong-Guk Han, Tsuyoshi Takagi, Tae Hyun Kim, Ho Won Kim, Kyo Il Chung, "Collision Attack on XTR and a Countermeasure with Fixed Pattern", The First International Workshop on Security in Ubiquitous Computing Systems, SecUbiq-05, LNCS 3823, pp. 864-873, 2005, © Springer-Verlag. (abstract, pdf)
  • Erik Dahmen, Katsuyuki Okeya, Tsuyoshi Takagi, "An Advanced Method for Joint Scalar Multiplications on Memory Constraint Devices", 2nd European Workshop on Security and Privacy in Ad hoc and Sensor Networks, ESAS 2005, LNCS 3813, pp.189-204, 2005, © Springer-Verlag. (abstract)
  • Katja Schmidt-Samoa, Tsuyoshi Takagi, "Paillier's Cryptosystem Modulo p2q and its Applications to Trapdoor Commitment Scheme", International Conference on Cryptology in Malaysia, Mycrypt 2005, LNCS 3715, pp.296-313, 2005, © Springer-Verlag. (abstract)
  • Katsuyuki Okeya, Tsuyoshi Takagi, Camille Vuillaume, "Short-Memory Scalar Multiplication on Koblitz Curves", Workshop on Cryptographic Hardware and Embedded Systems, CHES 2005, LNCS 3659, pp.91-105, 2005, © Springer-Verlag. (abstract)
  • Izuru Kitamura, Masanobu Katagi, Tsuyoshi Takagi, "A Complete Divisor Class Halving Algorithm for Hyperelliptic Curve Cryptosystems of Genus Two", 10th Australasian Conference on Information Security and Privacy, ACISP 2005, LNCS 3574, pp.146-157, 2005, © Springer-Verlag. (abstract)
  • Katsuyuki Okeya, Tsuyoshi Takagi, Camille Vuillaume, "Efficient Representations on Koblitz Curves with Resistance to Side Channel Attacks", 10th Australasian Conference on Information Security and Privacy, ACISP 2005, LNCS 3574, pp.218-229, 2005, © Springer-Verlag. (abstract)
  • Raylin Tso, Takeshi Okamoto, Tsuyoshi Takagi, Eiji Okamoto, "k-Resilient ID-Based Key Distribution Schemes from Pairing", International Workshop on Coding and Cryptography, WCC 2005, Bergen, Norway, pp.402-412, 2005.
  • Masanobu Katagi, Toru Akishita, Izuru Kitamura, Tsuyoshi Takagi, "Some Improved Algorithms for Hyperelliptic Curve Cryptosystems using Degenerate Divisors", 7th Annual International Conference on Information Security and Cryptology, ICISC 2004, LNCS 3506, pp.296-312, 2005, © Springer-Verlag. (abstract)
  • Masanobu Katagi, Izuru Kitamura, Toru Akishita, Tsuyoshi Takagi, "Novel Efficient Implementations of Hyperelliptic Curve Cryptosystems using Degenerate Divisors", Workshop on Information Security Applications, WISA 2004, LNCS 3325, pp.345-359, 2005, © Springer-Verlag. (abstract, pdf)
  • Katsuyuki Okeya, Tsuyoshi Takagi, Camille Vuillaume, "On the Importance of Δ in SFLASH against Side Channel Attacks", IEICE Transactions, Vol.E88-A, No.1, pp.123-131, IEICE, 2005, (abstract)
  • Toru Akishita, Tsuyoshi Takagi, "Zero-Value Register Attacks on Elliptic Curve Cryptosystem", IEICE Transactions, Vol.E88-A, No.1, pp.132-139, IEICE, 2005, (abstract)
  • Toru Akishita, Tsuyoshi Takagi, "On the Optimal Parameter Choice for Elliptic Curve Cryptosystems", IEICE Transactions, Vol.E88-A, No.1, pp.140-146, IEICE, 2005, (abstract)
  • Tetsuya Izu, Tsuyoshi Takagi, "Fast Elliptic Curve Multiplications Resistant against Side Channel Attacks", IEICE Transactions, Vol.E88-A, No.1, pp.161-171, IEICE, 2005, (abstract)

2004

  • David Galido, Sebastià Martín, Tsuyoshi Takagi, Jorge Villar, "A Provably Secure Elliptic Curve Scheme with Fast Encryption", 5th International Conference on Cryptology in India, Indocrypt 2004, LNCS 3348, pp.245-259, 2004, © Springer-Verlag. (pdf)
  • Hisayoshi Sato, Daniel Schepers, Tsuyoshi Takagi, "Exact Analysis of Montgomery Multiplication", 5th International Conference on Cryptology in India, Indocrypt 2004, LNCS 3348, pp.290-304, 2004, © Springer-Verlag. ( pdf)
  • Tsuyoshi Takagi, Sung-Ming Yen, Bo-Ching Wu, "Radix-r Non-Adjacent Form", 7th Information Security Conference, ISC 2004, LNCS 3225, pp.99-110, 2004, © Springer-Verlag. (abstract,pdf)
  • Katsuyuki Okeya, Katja Schmidt-Samoa, Christian Spahn, Tsuyoshi Takagi, "Signed Binary Representations Revisited", CRYPTO 2004, LNCS 3152, pp.123-139, 2004, © IACR. (abstract,pdf)
  • Johannes Buchmann, Tsuyoshi Takagi, Urlich Vollmer, "Number Field Cryptography", High Primes and Misdemeanours: Lectures in Honour of the 60th Birthday of Hugh Cowie Williams, pp.111-121, 2004, © American Mathematical Society. (pdf)
  • Katsuyuki Okeya, Tsuyoshi Takagi, Camille Vuillaume, "On the Exact Flexibility of the Flexible Countermeasure against Side Channel Attacks", The 9th australasian conference on information security and privacy, ACISP 2004, LNCS 3108, pp.466-477, 2004, © Springer-Verlag. (abstract, pdf)
  • Katsuyuki Okeya, Tsuyoshi Takagi, "Security Analysis of CRT-based Cryptosystems", Applied Cryptography and Network Security 2004, ACNS 2004, LNCS 3089, pp.383-397, 2004, © Springer-Verlag. (abstract, pdf)
  • Katsuyuki Okeya, Tsuyoshi Takagi, Camille Vuillaume, "On the Importance of Protecting ∆ in SFLASH against Side Channel Attacks", ITCC 2004 International Conference on Information Technology: Coding and Computing, Special Session, Embedded Cryptographic Hardware, IEEE Computer Society, vol.II, pp.560-568, 2004, (abstract, pdf)
  • Toru Akishita, Tsuyoshi Takagi, "On the Optimal Parameter Choice for Elliptic Curve Cryptosystems Using Isogeny", 7th International Workshop on Practice and Theory in Public Key Cryptography, PKC 2004, LNCS 2947, pp.346-359, 2004, © Springer-Verlag. (abstract, pdf)
  • Ingrid Biehl, Sachar Paulus, Tsuyoshi Takagi, "Efficient Undeniable Signature Schemes based on Ideal Arithmetic in Quadratic Orders", Designs, Codes and Cryptography, 31 (2), pp.99-123, 2004, © Kluwer Academic Publishers. (abstract, pdf)
  • Katsuyuki Okeya, Tsuyoshi Takagi, "The Width-w NAF Method Provides Small Memory and Fast Elliptic Scalar Multiplications Secure against Side Channel Attacks", IEICE Transactions, Vol.E87-A, No.1, pp.75-84, 2004, (abstract)
  • Tetsuya Izu, Tsuyoshi Takagi, "Fast Elliptic Curve Multiplications with SIMD Operations", IEICE Transactions, Vol.E87-A, No.1, pp.85-93, 2004, (abstract)
  • Tsuyoshi Takagi, "A Fast RSA-Type Public-Key Primitive Modulo pkq", IEICE Transactions, Vol.E87-A, No.1, pp.94-100, 2004. (abstract)

2003

  • Karou Kurosawa, Katja Schmidt-Samoa, Tsuyoshi Takagi, "A Complete and Explicit Security Reduction Algorithm for RSA-based Cryptosystems", Asiacrypt 2003, LNCS 2894, pp.474-491, 2003, © Springer-Verlag. (abstract, pdf)
  • Karou Kurosawa, Tsuyoshi Takagi, "Some RSA-based Encryption Schemes with Tight Security Reduction", Asiacrypt 2003, LNCS 2894, pp.19-36, 2003, © Springer-Verlag. (abstract, pdf)
  • Hisayoshi Sato, Tsuyoshi Takagi, Satoru Tezuka, Kazuo Takaragi, Generalized Powering Functions and their Application to Digital Signatures Asiacrypt 2003, LNCS 2894, pp.434-451, 2003, © Springer-Verlag. (abstract, pdf)
  • Toru Akishita, Tsuyoshi Takagi, "Zero-Value Point Attacks on Elliptic Curve Cryptosystems", 6th Information Security Conference, ISC 2003, LNCS 2851, pp.218-233, 2003, © Springer-Verlag. (abstract, pdf)
  • Katsuyuki Okeya, Tsuyoshi Takagi, "A More Flexible Countermeasure against Side Channel Attacks using Window Method", Workshop on Cryptographic Hardware and Embedded Systems, CHES 2003, LNCS 2779, pp.397-410, 2003, © Springer-Verlag. (abstract, pdf)
  • Katsuyuki Okeya, Tsuyoshi Takagi, "The Width-w NAF Method Provides Small Memory and Fast Elliptic Scalar Multiplications Secure against Side Channel Attacks", Cryptographers' Track RSA Conference 2003, CT-RSA 2003, LNCS 2612, pp.328-342, 2003, © Springer-Verlag. (ps)
  • Tetsuya Izu, Tsuyoshi Takagi, "Efficient Computations of the Tate Pairing for the Large MOV degrees", 5th International Conference on Information Security and Cryptology, ICISC 2002, LNCS 2587, pp.283-297, 2003, © Springer-Verlag. (pdf)
  • Kouichi Sakurai, Tsuyoshi Takagi, "A Reject Timing Attack on an IND-CCA2 Public-Key Cryptosystem", 5th International Conference on Information Security and Cryptology, ICISC 2002, LNCS 2587, pp.359-379, 2003, © Springer-Verlag. (pdf)
  • Tetsuya Izu, Tsuyoshi Takagi, "Exceptional Procedure Attack on Elliptic Curve Cryptosystems", 6th International Workshop on Practice and Theory in Public Key Cryptography, PKC 2003, LNCS 2567, pp.224-239, 2003, © Springer-Verlag. (pdf)

2002

  • Tetsuya Izu, Bodo Möller, Tsuyoshi Takagi, "Improved Elliptic Curve Multiplication Methods Resistant against Side Channel Attacks", Third International Cryptology Conference in India, Indocrypt 2002, LNCS 2551, pp.296-313, 2002, © Springer-Verlag. (pdf)
  • Tetsuya Izu, Tsuyoshi Takagi, "Fast Elliptic Curve Multiplications with SIMD Operations", Fourth International Conference on Information and Communications Security, ICICS 2002, LNCS 2513, pp.217-230, 2002, © Springer-Verlag. (pdf)
  • Ingrid Biehl, Tsuyoshi Takagi, "A New Distributed Primality Test for Shared RSA Keys using Quadratic Fields", Seventh Australasian Conference on Information Security and Privacy, ACISP 2002, LNCS 2384, pp.1-16, 2002, © Springer-Verlag. (ps)
  • Kouichi Sakurai, Tsuyoshi Takagi, "On the Security of a Modified Paillier Public-Key Primitive", Seventh Australasian Conference on Information Security and Privacy, ACISP 2002, LNCS 2384, pp.436-448, 2002, © Springer-Verlag. (ps)
  • Tetsuya Izu, Tsuyoshi Takagi, "A Fast Parallel Elliptic Multiplication Resistant against Side Channel Attacks", 5th International Workshop on Practice and Theory in Public Key Cryptography, PKC 2002, LNCS 2274, pp.280-296, 2002, © Springer-Verlag. (ps)
  • Kouichi Sakurai, Tsuyoshi Takagi, "New Semantically Secure Public-Key Cryptosystems from the RSA-Primitive", 5th International Workshop on Practice and Theory in Public Key Cryptography, PKC 2002, LNCS 2274, pp.1-16, 2002, © Springer-Verlag. (ps)
  • Johannes Buchmann, Kouichi Sakurai, Tsuyoshi Takagi, "An IND-CCA2 Public-Key Cryptosystem with Fast Decryption", 4th International Conference on Information Security and Cryptology, ICISC'01, LNCS 2288, pp.51-71, 2002, © Springer-Verlag. (ps)


PAGE TOP