English Japanese
publications

Publications 2007 - 2011

2011

  • Yasufumi Hashimoto, Tsuyoshi Takagi, Koichi Sakurai, "General Fault Attacks on Multivariate Public Key Cryptosystems", PQCrypto 2011, LNCS 7071, pp.1-18, 2011.
  • Fagen Li, Fahad Bin Muhaya, Mingwu Zhang, Tsuyoshi Takagi, "Efficient Identity-Based Signcryption in the Standard Model", The Fifth International Conference on Provable Security, ProvSec 2011, LNCS 6980, pp.120-137, 2011.
  • Mingwu Zhang, Takashi Nishide, Bo Yang, Tsuyoshi Takagi, "Anonymous Encryption with Partial-Order Subset Delegation Functionality", The Fifth International Conference on Provable Security, ProvSec 2011, LNCS 6980, pp.154-169, 2011.
  • Fagen Li, Jiang Deng, Tsuyoshi Takagi, "An Improved Authenticated Encryption Scheme", IEICE Transaction, Vol.E94-D, No.11, pp.2171-2172, 2011.
  • Mingwu Zhang, Bo Yang, Tsuyoshi Takagi, "Group-oriented Setting's Multisigncryption Scheme With Threshold Designcryption", Information Sciences, No.181, pp.4041-4050, Elsevier, 2011.
  • Yosuke Katoh, Yun-Ju Huang, Chen-Mou Cheng, Tsuyoshi Takagi, "Efficient Implementation of the EtaT Pairing on GPU", 9th International Conference on Applied Cryptography and Network Security, ACNS 2011, Industrial Track, pp.119-133, 2011.
  • Mingwu Zhang, Tsuyoshi Takagi, "GeoEnc: Geometric Area based Keys and Policies in Functional Encryption Systems", 16th Australasian Conference on Information Security and Privacy, ACISP 2011, LNCS 6812, pp.241-258, 2011.
  • Mingwu Zhang, Tsuyoshi Takagi and Bo Yang, "Dual-Veriers DVS with Message Recovery for Tolerant Routing in Wireless Sensor Networks", Pacific Asia Workshop on Intelligence and Security Informatics, PAISI 2011, LNCS 6749, pp.71-84, 2011.
  • Kenichiro Hayasaka, Tsuyoshi Takagi, "An Experiment of Number Field Sieve over GF(p) of Low Hamming Weight Characteristic", International Workshop on Coding and Cryptology, IWCC 2011, LNCS 6639, pp. 191-200, 2011.
  • Yuto Kawahara, Tetsutaro Kobayashi, Gen Takahashi, Tsuyoshi Takagi, "Faster MapToPoint on Supersingular Elliptic Curves in Characteristic 3", IEICE Transaction, Vol.E94-A, No.1, pp.150-155, 2011.
  • Mingwu Zhang, Bo Yang, Wenzheng Zhang, Tsuyoshi Takagi, "Multibiometric Based Secure Encryption and Authentication Scheme with Fuzzy Extractor", International Journal of Network Security, Vol.12, No.1, pp.50-57, 2011.
  • Mingwu Zhang, Bo Yang, Yusheng Zhong, Pengcheng Li, Tsuyoshi Takagi, "Cryptanalysis and Fixed of Short Signature Scheme without Random Oracle from Bilinear Parings ", International Journal of Network Security, Vol.12, No.3, pp.130-136, 2011.

2010

  • Keisuke Hakuta, Hisayoshi Sato, and Tsuyoshi Takagi, "Efficient Arithmetic on Subfield Elliptic Curves over Small Finite Fields of Odd Characteristic", Journal of Mathematical Cryptology, Vol.4, No.3, 199–238, 2010.
  • Tadashi Iyama, Shinsaku Kiyomoto, Kazuhide Fukushima, Toshiaki Tanaka and Tsuyoshi Takagi, "Efficient Implementation of Pairing-based Cryptography on BREW Mobile Phones", The 5th International Workshop on Security, IWSEC 2010, LNCS 6434, pp. 326–336, 2010.
  • Fagen Li, Masaaki Shirase, and Tsuyoshi Takagi, "Cryptanalysis of Efficient Proxy Signature Schemes for Mobile Communication", Science China Information Sciences, Vol.53, No.10, Springer-Verlag, pp.2016-2021, 2010.
  • Keisuke Hakuta, Hisayoshi Sato, Tsuyoshi Takagi, "Explicit Lower Bound for the Length of Minimal Weight tau-adic Expansions on Koblitz Curves," Journal of Math-for-Industry, vol.2, pp.75-83, 2010.
  • Mingwu Zhang, Bo Yang, Tsuyoshi Takagi, Yanping Shen, Wenzheng Zhang, "Fuzzy Biometric Signcryption Scheme with Bilinear Pairings in the Standard Model", Pacific Asia Workshop on Intelligence and Security Informatics, PAISI 2010, LNCS 6122, pp.77-87, 2010.
  • Mingwu Zhang, Pengcheng Li, Bo Yang, Hao Wang, Tsuyoshi Takagi, "Towards Confidentiality of ID-Based Signcryption Schemes under without Random Oracle Model", Pacific Asia Workshop on Intelligence and Security Informatics, PAISI 2010, LNCS 6122, pp.98-104, 2010.
  • Takuya Hayashi, Naoyuki Shinohara, Lihua Wang, Shin'ichiro Matsuo, Masaaki Shirase, Tsuyoshi Takagi, "Solving a 676-bit Discrete Logarithm Problem in GF(3^{6n})", 13th International Conference on Practice and Theory in Public Key Cryptography, PKC 2010, LNCS 6056, pp.351-367, 2010.
  • Jean-Luc Beuchat, Hiroshi Doi, Kaoru Fujita, Atsuo Inomata, Piseth Ith, Akira Kanaoka, Masayoshi Katouno, Masahiro Mambo, Eiji Okamoto, Takeshi Okamoto, Takaaki Shiga, Masaaki Shirase, Ryuji Soga, Tsuyoshi Takagi, Ananda Vithanage, Hiroyasu Yamamoto, "FPGA and ASIC implementations of the EtaT pairing in characteristic three", Computers & Electrical Engineering, Vol.36, No.1, pp.73-87, 2010.

2009

  • Yuta Sasaki, Satsuki Nishina, Masaaki Shirase, and Tsuyoshi Takagi, "An Efficient Residue Group Multiplication for The Eta_T Pairing Over GF(3^m)", The Workshop on Selected Areas in Cryptography 2009, SAC 2009, LNCS 5867, pp.364-375, 2009.
  • Kaoru Kurosawa and Tsuyoshi Takagi, "One-Wayness Equivalent to General Factoring", IEEE Transactions on Information Theory, Vol.55, No.9, pp.4249-4262, 2009.
  • Takuya Hayashi, Masaaki Shirase and Tsuyoshi Takagi, "An Experiment on Implementation of the Function Field Sieve over GF(3^n)", IPSJ Journal, Vol.50, No.9, pp.1956-1967, 2009. (In Japanese)
  • Yukinori Miyazaki, Masaaki Shirase and Tsuyoshi Takagi, "Elliptic Curve/Pairing-based Cryptographies on MICAz With Some Security Levels", WISA 2009, Short Presentation Track, pp.183-195, 2009.
  • Toshiya Nakajima, Tetsuya Izu and Tsuyoshi Takagi, "An Efficient Algorithm for Pairing Cryptography with Supersingular Elliptic Curves over Prime Fields", IPSJ Journal, Vol.50, No.7, pp.1745-1756, 2009. (In Japanese)
  • Eun-Kyung Ryu, Tsuyoshi Takagi, "A Hybrid Approach for Privacy-Preserving RFID Tags", Computer Standards & Interfaces, Vol.31, No.4, pp.812-815, Elsevier, 2009.
  • Masaaki Shirase, Yukinori Miyazaki, Tsuyoshi Takagi, Dong-Guk Han, and Dooho Choi, "Efficient Implementation of Pairing Based Cryptography on a Sensor Node", IEICE Transaction, Vol.E92-D, No.5, pp.909-917, 2009.
  • Masaaki Shirase, Tsuyoshi Takagi, Dooho Choi, Dong-Guk Han, and Huwon Kim, "Efficient Computation of Eta_T Pairing Over GF(2^4n) With Vandermonde Matrix", ETRI Journal, Electronics and Telecommunications Research Institute, Vol.31, No.2, pp.129-139, 2009.
  • Fagen Li, Masaaki Shirase, and Tsuyoshi Takagi, "Identity-Based Hybrid Signcryption. The Fourth International Conference on Availability", The Fourth International Conference on Reliability and Security, ARES 2009, IEEE Computer Society, pp.534-539, 2009.
  • Fagen Li, Masaaki Shirase, and Tsuyoshi Takagi, "Certificateless Hybrid Signcryption," The 5th Information Security Practice and Experience Conference, ISPEC 2009, LNCS 5451, Springer-Verlag, pp.112-123, 2009.

2008

  • Fagen Li, Masaaki Shirase, Tsuyoshi Takagi, "Efficient Signcryption Key Encapsulation Without Random Oracles," The 4th International Conferences on Information Security and Cryptology, Inscrypt 2008, LNCS 5487, pp.47-59, © Springer-Verlag, 2009.
  • Fagen Li, Masaaki Shirase, Tsuyoshi Takagi, "Efficient Multi-PKG ID-Based Signcryption for Ad Hoc Networks," The 4th International Conferences on Information Security and Cryptology, Inscrypt 2008, LNCS 5487, pp.289-304, © Springer-Verlag, 2009.
  • Hitoshi Uematsu, Kan Toyoshima, Takeru Inoue, Kazuhiro Takahashi, Satsuki Nishina, Tsuyoshi Takagi, and Shin-ichi Minato, "Contents Multicast Method Enabling Determination of Leakage Origin and Exclusion," Proc. of IEICE 14th Asia-Pacific Conference on Communications, APCC2008, 16-AM1-E, 2008.
  • Tsukasa Ishiguro, Masaaki Shirase, Tsuyoshi Takagi, "Efficient Implementation of EtaT Pairing on ATmega128L", IPSJ Journal, Vol.49, No.11, pp.3743-3753, 2008. (In Japanese)
  • Erik Dahmen, Katsuyuki Okeya, Tsuyoshi Takagi, Camille Vuillaume, "Digital Signatures Out of Second-Preimage Resistant Hash Functions," Second International Workshop on Post-Quantum Cryptography, PQCrypto 2008, LNCS 5299, pp.109-123, © Springer-Verlag, 2008.
  • Jean-Luc Beuchat, Nicolas Brisebarre, Jeremie Detrey, Eiji Okamoto, Masaaki Shirase, and Tsuyoshi Takagi "Algorithms and Arithmetic Operators for Computing the EtaT Pairing in Characteristic Three", IEEE Transactions on Computers, Vol.57, No.11, pp.1454-1468, © IEEE Computer Society, 2008.
  • Masasaki Shirase, Dong-Guk Han, Yasushi Hibino, Howon Kim, Tsuyoshi Takagi, "A More Compact Representation of XTR Cryptosystem", IEICE Transaction, Vol.E91-A, No.10, pp.2843-2850, 2008. (abstract)
  • Toshiya Nakajima, Tetsuya Izu, Tsuyoshi Takagi, "Reduction Optimal Trinomials for Efficient Software Implementation of the EtaT Pairing", IEICE Transaction, Vol.E91-A, No.9, pp.2379-2386, 2008. (abstract)
  • Motoi Yoshitomi, Tsuyoshi Takagi, Shinsaku Kiyomoto, Toshiaki Tanaka, "Efficient Implementation of the Pairing on Mobilephones using BREW", IEICE Transaction, Vol.E91-D, No.5, pp.1330-1337, 2008. (abstract)
  • Yuto Kawahara, Kazumaro Aoki, and Tsuyoshi Takagi, "Faster Implementation of EtaT Pairing Over GF(3^m) using Minimum Number of Logical Instructions for GF(3)-Addition," Pairing-Based Cryptography, Pairing 2008, LNCS 5209, pp. 282-296, © Springer-Verlag, 2008.
  • Fagen Li, Masaaki Shirase, Tsuyoshi Takagi, "Key management using certificateless public key cryptography in ad hoc networks", IFIP International Conference on Network and Parallel Computing, NPC 2008, LNCS 5245, pp.116-126, © Springer-Verlag, 2008.
  • Kyosuke Osaka, Shuang Chang, Tsuyoshi Takagi, Kenichi Yamazaki, Osamu Takahashi, "A Secure RFID Protocol based on Insubvertible Encryption using Guardian Proxy", The Third International Conference on Availability, Reliability and Security, ARES 2008, pp.733-740, 2008.
  • Chunhua Su, Feng Bao, Jianying Zhou, Tsuyoshi Takagi, Kouichi Sakurai, “A New Scheme for Distributed Density Estimation based Privacy-Preserving Clustering,” ARES 2008, pp.112-119, 2008.
  • Masaaki Shirase, Tsuyoshi Takagi, Eiji Okamoto, "An Efficient Countermeasure against Side Channel Attacks for Pairing Computation", 4th Information Security Practice and Experience Conference, ISPEC 2008, LNCS 4991, pp.290-303, © Springer-Verlag, 2008.
  • Keisuke Hakuta, Hisayoshi Sato, Tsuyoshi Takagi, "Efficient Arithmetic on Subfield Elliptic Curves over Small Finite Fields of Odd Characteristic", 4th Information Security Practice and Experience Conference, ISPEC 2008, LNCS 4991, pp.304-318, © Springer-Verlag, 2008.
  • Yuto Kawahara, Tsuyoshi Takagi, Eiji Okamoto, "Efficient Implementation of the Tate Pairing on Mobile Phones using Java", IPSJ Journal, Vol.49, No.1, pp.427-435, 2008. (In Japanese)
  • Camille Vuillaume, Katsuyuki Okeya, Tsuyoshi Takagi, "Short Memory Scalar Multiplication", IEEE Transactions on Computers, © IEEE Computer Society, Vol.57, No.4, pp.481-489, 2008.
  • Tae Hyun Kim, Tsuyoshi Takagi, Dong Guk Han, Ho Won Kim, Jong in Lim, "Power Analysis Attacks and Countermeasures on EtaT Pairing over Binary Fields", ETRI Journal, Electronics and Telecommunications Research Institute, vol.30, no.1, pp.68-80, 2008.
  • Masaaki Shirase, Tsuyoshi Takagi, Eiji Okamoto, "Some Efficient Algorithms for the Final Exponentiation of EtaT Pairing", IEICE Transactions, Vol.E91-A, No.1, pp.221-228, 2008. (abstract)

2007

  • Masaaki Shirase, Yuto Kawahara, Tsuyoshi Takagi, Eiji Okamoto, "Universal EtaT Pairing Algorithm over Arbitrary Extension Degree", The 8th International Workshop on Information Security Applications, WISA 2007, LNCS 4867, pp.1-15, © Springer-Verlag, 2007.
  • Motoi Yoshitomi, Tsuyoshi Takagi, Shinsaku Kiyomoto, Toshiaki Tanaka, "Efficient Implementation of the Pairing on Mobilephones using BREW", The 8th International Workshop on Information Security Applications, WISA 2007, LNCS 4867, pp.203-214, © Springer-Verlag, 2007.
  • Toshiya Nakajima, Tetsuya Izu, Tsuyoshi Takagi, "Reduction Optimal Trinomials for Efficient Software Implementation of the EtaT Pairing", 2nd International Workshop on Security, IWSEC 2007, LNCS 4752, pp.44-57, © Springer-Verlag, 2007.
  • Jean-Luc Beuchat, Masaaki Shirase, Tsuyoshi Takagi, Eiji Okamoto, "An Algorithm for the EtaT Pairing Calculation in Characteristic Three and its Hardware Implementation", 18th IEEE International Symposium on Computer Arithmetic, ARITH-18, pp.97-104, 2007, © IEEE Computer Society. (abstract)
  • Jean-Luc Beuchat, Nicolas Brisebarre, Masaaki Shirase, Tsuyoshi Takagi, Eiji Okamoto, "A Coprocessor for the Final Exponentiation of the EtaT Pairing in Characteristic Three", International Workshop on the Arithmetic of Finite Fields, WAIFI 2007, LNCS 4547, pp.25-39, 2007, © Springer-Verlag. (abstract)
  • Masaaki Shirase, Dong-Guk Han, Yasushi Hibino, Ho Won Kim, Tsuyoshi Takagi, "Compressed XTR", 5 th International Conference on Applied Cryptography and Network Security, ACNS 2007, LNCS 4521, pp.420-431, © Springer-Verlag.
  • Eun-Kyung Ryu, Tsuyoshi Takagi, "Efficient Conjunctive Keyword-Searchable Encryption", 3rd IEEE International Symposium on Security in Networks and Distributed Systems, SSNDS 2007, pp.409-414, 2007, © IEEE Computer Society.
  • Chunhua Su, Feng Bao, Jianying Zhou, Tsuyoshi Takagi, Kouichi Sakurai, "Privacy-Preserving Two-Party K-Means Clustering Via Secure Approximation", The 2007 IEEE International Symposium on Data Mining and Information Retrieval, DMIR 2007, pp.385-391, 2007 © IEEE Computer Society.
  • Masaaki Shirase, Tsuyoshi Takagi, Eiji Okamoto, "Some Efficient Algorithms for the Final Exponentiation of EtaT Pairing", 3rd Information Security Practice and Experience Conference, ISPEC 2007, LNCS 4464, pp.254-268, 2007, © Springer-Verlag. (abstract)
  • Chunhua Su, Jianying Zhou, Feng Bao, Tsuyoshi Takagi, Kouichi Sakurai, "Two Party Privacy-Preserving Agglomerative Document Clustering", 3rd Information Security Practice and Experience Conference, ISPEC 2007, LNCS 4464, pp.193-208, 2007, © Springer-Verlag.
  • Yuto Kawahara, Tsuyoshi Takagi, Eiji Okamoto, "Efficient Implementation of Tate Pairing on a Mobile Phone using Java", International Conference on Computational Intelligence and Security, CIS 2006, LNAI 4456, pp.396-405, 2007, © Springer-Verlag.
  • Kyosuke Osaka, Tsuyoshi Takagi, Kenichi Yamazaki, Osamu Takahashi, "An Efficient and Secure RFID Security Method with Ownership Transfer", International Conference on Computational Intelligence and Security, CIS 2006, LNAI 4456, pp.778-787, 2007, © Springer-Verlag.
  • Erik Dahmen, Katsuyuki Okeya, Tsuyoshi Takagi, "A New Upper Bound for the Minimal Density of Joint Representations in Elliptic Curve Cryptosystems", IEICE Transactions, Volume E90-A No.5, pp.952-959, 2007. (abstract)


PAGE TOP