Takagi-Takayasu Laboratory Mathematical Informatics 1st Laboratory

2006 - 2010

2010

  • Keisuke Hakuta, Hisayoshi Sato, and Tsuyoshi Takagi, "Efficient Arithmetic on Subfield Elliptic Curves over Small Finite Fields of Odd Characteristic", Journal of Mathematical Cryptology, Vol.4, No.3, 199–238, 2010.
  • Tadashi Iyama, Shinsaku Kiyomoto, Kazuhide Fukushima, Toshiaki Tanaka and Tsuyoshi Takagi, "Efficient Implementation of Pairing-based Cryptography on BREW Mobile Phones", The 5th International Workshop on Security, IWSEC 2010, LNCS 6434, pp. 326–336, 2010.
  • Fagen Li, Masaaki Shirase, and Tsuyoshi Takagi, "Cryptanalysis of Efficient Proxy Signature Schemes for Mobile Communication", Science China Information Sciences, Vol.53, No.10, pp.2016-2021, 2010.
  • Keisuke Hakuta, Hisayoshi Sato, Tsuyoshi Takagi, "Explicit Lower Bound for the Length of Minimal Weight tau-adic Expansions on Koblitz Curves," Journal of Math-for-Industry, vol.2, pp.75-83, 2010.
  • Mingwu Zhang, Bo Yang, Tsuyoshi Takagi, Yanping Shen, Wenzheng Zhang, "Fuzzy Biometric Signcryption Scheme with Bilinear Pairings in the Standard Model", Pacific Asia Workshop on Intelligence and Security Informatics, PAISI 2010, LNCS 6122, pp.77-87, 2010.
  • Mingwu Zhang, Pengcheng Li, Bo Yang, Hao Wang, Tsuyoshi Takagi, "Towards Confidentiality of ID-Based Signcryption Schemes under without Random Oracle Model", Pacific Asia Workshop on Intelligence and Security Informatics, PAISI 2010, LNCS 6122, pp.98-104, 2010.
  • Takuya Hayashi, Naoyuki Shinohara, Lihua Wang, Shin'ichiro Matsuo, Masaaki Shirase, Tsuyoshi Takagi, "Solving a 676-bit Discrete Logarithm Problem in GF(3^{6n})", 13th International Conference on Practice and Theory in Public Key Cryptography, PKC 2010, LNCS 6056, pp.351-367, 2010.
  • Jean-Luc Beuchat, Hiroshi Doi, Kaoru Fujita, Atsuo Inomata, Piseth Ith, Akira Kanaoka, Masayoshi Katouno, Masahiro Mambo, Eiji Okamoto, Takeshi Okamoto, Takaaki Shiga, Masaaki Shirase, Ryuji Soga, Tsuyoshi Takagi, Ananda Vithanage, Hiroyasu Yamamoto, "FPGA and ASIC implementations of the EtaT pairing in characteristic three", Computers & Electrical Engineering, Vol.36, No.1, pp.73-87, 2010.

2009

  • Yuta Sasaki, Satsuki Nishina, Masaaki Shirase, and Tsuyoshi Takagi, "An Efficient Residue Group Multiplication for The Eta_T Pairing Over GF(3^m)", The Workshop on Selected Areas in Cryptography 2009, SAC 2009, LNCS 5867, pp.364-375, 2009.
  • Kaoru Kurosawa and Tsuyoshi Takagi, "One-Wayness Equivalent to General Factoring", IEEE Transactions on Information Theory, Vol.55, No.9, pp.4249-4262, 2009.
  • Takuya Hayashi, Masaaki Shirase and Tsuyoshi Takagi, "An Experiment on Implementation of the Function Field Sieve over GF(3^n)", IPSJ Journal, Vol.50, No.9, pp.1956-1967, 2009. (In Japanese)
  • Yukinori Miyazaki, Masaaki Shirase and Tsuyoshi Takagi, "Elliptic Curve/Pairing-based Cryptographies on MICAz With Some Security Levels", 10th International Workshop on Information Security Applications, WISA 2009, Short Presentation Track, pp.183-195, 2009.
  • Toshiya Nakajima, Tetsuya Izu and Tsuyoshi Takagi, "An Efficient Algorithm for Pairing Cryptography with Supersingular Elliptic Curves over Prime Fields", IPSJ Journal, Vol.50, No.7, pp.1745-1756, 2009. (In Japanese)
  • Eun-Kyung Ryu, Tsuyoshi Takagi, "A Hybrid Approach for Privacy-Preserving RFID Tags", Computer Standards & Interfaces, Vol.31, No.4, pp.812-815, Elsevier, 2009.
  • Masaaki Shirase, Yukinori Miyazaki, Tsuyoshi Takagi, Dong-Guk Han, and Dooho Choi, "Efficient Implementation of Pairing Based Cryptography on a Sensor Node", IEICE Transaction, Vol.E92-D, No.5, pp.909-917, 2009.
  • Masaaki Shirase, Tsuyoshi Takagi, Dooho Choi, Dong-Guk Han, and Huwon Kim, "Efficient Computation of Eta_T Pairing Over GF(2^4n) With Vandermonde Matrix", ETRI Journal, Electronics and Telecommunications Research Institute, Vol.31, No.2, pp.129-139, 2009.
  • Fagen Li, Masaaki Shirase, and Tsuyoshi Takagi, "Identity-Based Hybrid Signcryption. The Fourth International Conference on Availability", The Fourth International Conference on Reliability and Security, ARES 2009, pp.534-539, 2009.
  • Fagen Li, Masaaki Shirase, and Tsuyoshi Takagi, "Certificateless Hybrid Signcryption," The 5th Information Security Practice and Experience Conference, ISPEC 2009, LNCS 5451, pp.112-123, 2009.

2008

  • Fagen Li, Masaaki Shirase, Tsuyoshi Takagi, "Efficient Signcryption Key Encapsulation Without Random Oracles," The 4th International Conferences on Information Security and Cryptology, Inscrypt 2008, LNCS 5487, pp.47-59, 2009.
  • Fagen Li, Masaaki Shirase, Tsuyoshi Takagi, "Efficient Multi-PKG ID-Based Signcryption for Ad Hoc Networks," The 4th International Conferences on Information Security and Cryptology, Inscrypt 2008, LNCS 5487, pp.289-304, 2009.
  • Hitoshi Uematsu, Kan Toyoshima, Takeru Inoue, Kazuhiro Takahashi, Satsuki Nishina, Tsuyoshi Takagi, and Shin-ichi Minato, "Contents Multicast Method Enabling Determination of Leakage Origin and Exclusion," Proc. of IEICE 14th Asia-Pacific Conference on Communications, APCC2008, 16-AM1-E, 2008.
  • Tsukasa Ishiguro, Masaaki Shirase, Tsuyoshi Takagi, "Efficient Implementation of EtaT Pairing on ATmega128L", IPSJ Journal, Vol.49, No.11, pp.3743-3753, 2008. (In Japanese)
  • Erik Dahmen, Katsuyuki Okeya, Tsuyoshi Takagi, Camille Vuillaume, "Digital Signatures Out of Second-Preimage Resistant Hash Functions," Second International Workshop on Post-Quantum Cryptography, PQCrypto 2008, LNCS 5299, pp.109-123, 2008.
  • Jean-Luc Beuchat, Nicolas Brisebarre, Jeremie Detrey, Eiji Okamoto, Masaaki Shirase, and Tsuyoshi Takagi "Algorithms and Arithmetic Operators for Computing the EtaT Pairing in Characteristic Three", IEEE Transactions on Computers, Vol.57, No.11, pp.1454-1468, 2008.
  • Masasaki Shirase, Dong-Guk Han, Yasushi Hibino, Howon Kim, Tsuyoshi Takagi, "A More Compact Representation of XTR Cryptosystem", IEICE Transaction, Vol.E91-A, No.10, pp.2843-2850, 2008.
  • Toshiya Nakajima, Tetsuya Izu, Tsuyoshi Takagi, "Reduction Optimal Trinomials for Efficient Software Implementation of the EtaT Pairing", IEICE Transaction, Vol.E91-A, No.9, pp.2379-2386, 2008.
  • Motoi Yoshitomi, Tsuyoshi Takagi, Shinsaku Kiyomoto, Toshiaki Tanaka, "Efficient Implementation of the Pairing on Mobilephones using BREW", IEICE Transaction, Vol.E91-D, No.5, pp.1330-1337, 2008.
  • Yuto Kawahara, Kazumaro Aoki, and Tsuyoshi Takagi, "Faster Implementation of EtaT Pairing Over GF(3^m) using Minimum Number of Logical Instructions for GF(3)-Addition," Pairing-Based Cryptography, Pairing 2008, LNCS 5209, pp. 282-296, 2008.
  • Fagen Li, Masaaki Shirase, Tsuyoshi Takagi, "Key management using certificateless public key cryptography in ad hoc networks", IFIP International Conference on Network and Parallel Computing, NPC 2008, LNCS 5245, pp.116-126, 2008.
  • Kyosuke Osaka, Shuang Chang, Tsuyoshi Takagi, Kenichi Yamazaki, Osamu Takahashi, "A Secure RFID Protocol based on Insubvertible Encryption using Guardian Proxy", The Third International Conference on Availability, Reliability and Security, ARES 2008, pp.733-740, 2008.
  • Chunhua Su, Feng Bao, Jianying Zhou, Tsuyoshi Takagi, Kouichi Sakurai, “A New Scheme for Distributed Density Estimation based Privacy-Preserving Clustering,” The Third International Conference on Availability, Reliability and Security, ARES 2008, pp.112-119, 2008.
  • Masaaki Shirase, Tsuyoshi Takagi, Eiji Okamoto, "An Efficient Countermeasure against Side Channel Attacks for Pairing Computation", 4th Information Security Practice and Experience Conference, ISPEC 2008, LNCS 4991, pp.290-303, 2008.
  • Keisuke Hakuta, Hisayoshi Sato, Tsuyoshi Takagi, "Efficient Arithmetic on Subfield Elliptic Curves over Small Finite Fields of Odd Characteristic", 4th Information Security Practice and Experience Conference, ISPEC 2008, LNCS 4991, pp.304-318, 2008.
  • Yuto Kawahara, Tsuyoshi Takagi, Eiji Okamoto, "Efficient Implementation of the Tate Pairing on Mobile Phones using Java", IPSJ Journal, Vol.49, No.1, pp.427-435, 2008. (In Japanese)
  • Camille Vuillaume, Katsuyuki Okeya, Tsuyoshi Takagi, "Short Memory Scalar Multiplication", IEEE Transactions on Computers, Vol.57, No.4, pp.481-489, 2008.
  • Tae Hyun Kim, Tsuyoshi Takagi, Dong Guk Han, Ho Won Kim, Jong in Lim, "Power Analysis Attacks and Countermeasures on EtaT Pairing over Binary Fields", ETRI Journal, Electronics and Telecommunications Research Institute, vol.30, no.1, pp.68-80, 2008.
  • Masaaki Shirase, Tsuyoshi Takagi, Eiji Okamoto, "Some Efficient Algorithms for the Final Exponentiation of EtaT Pairing", IEICE Transactions, Vol.E91-A, No.1, pp.221-228, 2008.

2007

  • Masaaki Shirase, Yuto Kawahara, Tsuyoshi Takagi, Eiji Okamoto, "Universal EtaT Pairing Algorithm over Arbitrary Extension Degree", The 8th International Workshop on Information Security Applications, WISA 2007, LNCS 4867, pp.1-15, 2007.
  • Motoi Yoshitomi, Tsuyoshi Takagi, Shinsaku Kiyomoto, Toshiaki Tanaka, "Efficient Implementation of the Pairing on Mobilephones using BREW", The 8th International Workshop on Information Security Applications, WISA 2007, LNCS 4867, pp.203-214, 2007.
  • Toshiya Nakajima, Tetsuya Izu, Tsuyoshi Takagi, "Reduction Optimal Trinomials for Efficient Software Implementation of the EtaT Pairing", 2nd International Workshop on Security, IWSEC 2007, LNCS 4752, pp.44-57, 2007.
  • Jean-Luc Beuchat, Masaaki Shirase, Tsuyoshi Takagi, Eiji Okamoto, "An Algorithm for the EtaT Pairing Calculation in Characteristic Three and its Hardware Implementation", 18th IEEE International Symposium on Computer Arithmetic, ARITH-18, pp.97-104, 2007,
  • Jean-Luc Beuchat, Nicolas Brisebarre, Masaaki Shirase, Tsuyoshi Takagi, Eiji Okamoto, "A Coprocessor for the Final Exponentiation of the EtaT Pairing in Characteristic Three", International Workshop on the Arithmetic of Finite Fields, WAIFI 2007, LNCS 4547, pp.25-39, 2007,
  • Masaaki Shirase, Dong-Guk Han, Yasushi Hibino, Ho Won Kim, Tsuyoshi Takagi, "Compressed XTR", 5 th International Conference on Applied Cryptography and Network Security, ACNS 2007, LNCS 4521, pp.420-431, 2007.
  • Eun-Kyung Ryu, Tsuyoshi Takagi, "Efficient Conjunctive Keyword-Searchable Encryption", 3rd IEEE International Symposium on Security in Networks and Distributed Systems, SSNDS 2007, pp.409-414, 2007.
  • Chunhua Su, Feng Bao, Jianying Zhou, Tsuyoshi Takagi, Kouichi Sakurai, "Privacy-Preserving Two-Party K-Means Clustering Via Secure Approximation", The 2007 IEEE International Symposium on Data Mining and Information Retrieval, DMIR 2007, pp.385-391, 2007.
  • Masaaki Shirase, Tsuyoshi Takagi, Eiji Okamoto, "Some Efficient Algorithms for the Final Exponentiation of EtaT Pairing", 3rd Information Security Practice and Experience Conference, ISPEC 2007, LNCS 4464, pp.254-268, 2007.
  • Chunhua Su, Jianying Zhou, Feng Bao, Tsuyoshi Takagi, Kouichi Sakurai, "Two Party Privacy-Preserving Agglomerative Document Clustering", 3rd Information Security Practice and Experience Conference, ISPEC 2007, LNCS 4464, pp.193-208, 2007.
  • Yuto Kawahara, Tsuyoshi Takagi, Eiji Okamoto, "Efficient Implementation of Tate Pairing on a Mobile Phone using Java", International Conference on Computational Intelligence and Security, CIS 2006, LNAI 4456, pp.396-405, 2007.
  • Kyosuke Osaka, Tsuyoshi Takagi, Kenichi Yamazaki, Osamu Takahashi, "An Efficient and Secure RFID Security Method with Ownership Transfer", International Conference on Computational Intelligence and Security, CIS 2006, LNAI 4456, pp.778-787, 2007.
  • Erik Dahmen, Katsuyuki Okeya, Tsuyoshi Takagi, "A New Upper Bound for the Minimal Density of Joint Representations in Elliptic Curve Cryptosystems", IEICE Transactions, Volume E90-A No.5, pp.952-959, 2007.

2006

  • Kaoru Kurosawa, Tsuyoshi Takagi, "Efficient Selectively Convertible Undeniable Signature Without Random Oracle", 12th International Conference on the Theory and Application of Cryptology and Information Security, Asiacrypt 2006, LNCS 4284, pp.428-443, 2006.
  • Tae Hyun Kim, Tsuyoshi Takagi, Dong-Guk Han, Ho Won Kim, Jongin Lim, "Side Channel Attacks and Countermeasures on Pairing Based Cryptosystems over Binary Fields", 5th International Conference on Cryptology and Network Security, CANS 2006, LNCS 4301, pp.168-181, 2006.
  • Tetsuya Izu, Tsuyoshi Takagi, "Power Analysis Countermeasure based on Ramp Scheme", 9th Japan-Korea Joint Workshop on Algorithms and Computation, WAAC 2006, pp.135-142, 2006.
  • Dong-Guk Han, Tsuyoshi Takagi, Ho Won Kim, Kyo Il Chung, "New Security Problem in RFID Systems "Tag Killing"", Applied Cryptography and Information Security, ACIS 2006, LNCS 3982, pp.375-384, 2006.
  • Katsuyuki Okeya, Tsuyoshi Takagi, "Security Analysis of CRT-Based Cryptosystems", International Journal of Information Security, IJIS, Vol.5, No.3, pp.177-185, 2006.
  • Camille Vuillaume, Katsuyuki Okeya, Tsuyoshi Takagi, "Defeating Simple Power Analysis on Koblitz Curves", IEICE Transactions, Vol.E89-A No.5 pp.1362-1369, IEICE, 2006.
  • Toru Akishita, Tsuyoshi Takagi, "Power Analysis to ECC Using Differential Power between Multiplication and Squaring", Seventh Smart Card Research and Advanced Application, CARDIS 2006, LNCS 3928, pp.151-164, 2006.
  • Dong-Guk Han, Tsuyoshi Takagi, Jongin Lim, "Further Security Analysis of XTR", The 2nd Information Security Practice and Experience Conference, ISPEC 2006, LNCS 3903, pp.33-44, 2006.
  • Hisayoshi Sato, Tsuyoshi Takagi, Satoru Tezuka, Kazuo Takaragi, "Generalized Powering Functions and Their Application to Digital Signatures", IEICE Transactions, Vol.E89-A, No.1, pp.81-89, IEICE, 2006.
  • Tsuyoshi Takagi, David Reis, Jr., Sung-Ming Yen, Bo-Ching Wu, "Radix-r Non-Adjacent Form and Its Application to Pairing-Based Cryptosystem", IEICE Transactions, Vol.E89-A, No.1, pp.115-123, IEICE, 2006.
  • Masanobu Katagi, Toru Akishita, Izuru Kitamura, Tsuyoshi Takagi, "Efficient Hyperelliptic Curve Cryptosystems using Theta Divisors", IEICE Transactions, Vol.E89-A, No.1, pp.151-160, IEICE, 2006.
  • Katsuyuki Okeya, Tsuyoshi Takagi, Camille Vuillaume, "Security Analysis of the SPA-Resistant Fractional Width Method", IEICE Transactions, Vol.E89-A, No.1, pp.161-168, IEICE, 2006.
  • Katja Schmidt-Samoa, Olivier Semay, Tsuyoshi Takagi, "Analysis of Fractional Window Recoding Methods and Their Application to Elliptic Curve Cryptosystems", IEEE Transactions on Computers, Vol.55, No.1, pp.48-57, January, 2006.