Ye Yuan, Chen-Mou Cheng, Shinsaku Kiyomoto, Yutaka Miyake, Tsuyoshi Takagi,
"Portable Implementation of Lattice-based Cryptography using JavaScript",
The Third International Symposium on Computing and Networking,
CANDAR'15, pp.58-67, 2015.
Takanori Yasuda, Tsuyoshi Takagi, Kouichi Sakurai,
"Constructing Pairing-Friendly Elliptic Curves Using Global Number Fields",
The Third International Symposium on Computing and Networking,
CANDAR'15, pp.477-483, 2015.
Rong Hu, Kirill Morozov, Tsuyoshi Takagi,
"Zero-Knowledge Protocols for Code-Based Public-Key Encryption",
IEICE Transaction,
Vol.98-A, No.10, pp.2139-2151, 2015.
Mingwu Zhang, Chunzhi Wang, Tsuyoshi Takagi, Yi Mu,
"Functional Encryption Resilient to Hard-to-Invert Leakage",
The Computer Journal, Vol.58, No.4, pp.735-749, 2015.
Youwen Zhu, Tsuyoshi Takagi,
"Efficient scalar product protocol and its privacy-preserving application",
International Journal of Electronic Security and Digital Forensics,
Vol.7, No.1, pp.1-19, 2015.
Xiangsong Zhang, Zhenhua Liu, Yupu Hu, Tsuyoshi Takagi,
"Revocable Identity-based Signcryption Scheme Without Random Oracles",
International Journal of Network Security, Vol.17, No.2, pp.110-122, 2015.
Youwen Zhu, Zhiqiu Huang, Liusheng Huang, Tsuyoshi Takagi,
"On the Security of A Privacy-Preserving Product Calculation Scheme",
IEEE Transactions on Dependable and Secure Computing,
Vol.12, No.3, pp.373-374, 2015.
Yun-Ju Huang , Christophe Petit, Naoyuki Shinohara, Tsuyoshi Takagi,
"Improvement of FPPR method to solve ECDLP",
Pacific Journal of Mathematics for Industry, Vol.7, No.1, pp.1-9, 2015.
2014
Kenichiro Hayasaka, Kazumaro Aoki, Tetsutaro Kobayashi, Tsuyoshi Takagi,
"An experiment of number field sieve for discrete logarithm problem over
GF(p^n)",
JSIAM Letters, Vol.6, pp.53-56, 2014.
Chen-Mou Cheng, Yasufumi Hashimoto, Hiroyuki Miura, Tsuyoshi Takagi,
"A Polynomial-Time Algorithm for Solving a Class of Underdetermined
Multivariate Quadratic Equations over Fields of Odd Characteristics",
6th International Workshop on Post-Quantum Cryptography,
PQCrypto 2014, LNCS 8772, pp.40-58, 2014.
Rui Xu, Kirill Morozov, Tsuyoshi Takagi,
"Cheater Identifiable Secret Sharing Schemes via Multi-Receiver
Authentication",
9th International Workshop on Security,
IWSEC 2014, LNCS 8639, pp.72-87, 2014.
Yutaro Kiyomura, Tsuyoshi Takagi,
"Efficient Algorithm for Tate Pairing of Composite Order",
IEICE Transaction,
Vol.97-A, No.10, pp.2055-2063, 2014.
Hui Zhang, Tsuyoshi Takagi,
"Improved Attacks on Multi-Prime RSA with Small Prime Difference",
IEICE Transaction,
Vol.E97-A, No.7, pp.1533-1541, 2014.
Takumi Tomita, Tsuyoshi Takagi,
"Efficient System Parameters for Identity-Based Encryption using
Supersingular Elliptic Curves",
JSIAM Letters, Vol.6, pp.13-16, 2014.
Tsukasa Ishiguro, Shinsaku Kiyomoto,Yutaka Miyake, Tsuyoshi Takagi,
"Parallel Gauss Sieve Algorithm: Solving the SVP
Challenge over a 128-Dimensional Ideal Lattice",
The 17th IACR International Conference on
Practice and Theory of Public-Key Cryptography,
PKC 2014, LNCS 8383, pp.411–428, 2014.
Takuya Sumi, Tsukasa Ishiguro, Shinsaku Kiyomoto, Yutaka Miyake,
Tsuyoshi Takagi,
"Efficient Implementation of Multivariate Public Key Cryptosystem
Rainbow on Android Mobile Phone",
IEICE Transaction,
Vol.J97-A, No.2, pp.86-95, 2014. (In Japanese)
Takuya Sumi, Tsukasa Ishiguro, Shinsaku Kiyomoto, Yutaka Miyake,
Toru Kobayashi, Tsuyoshi Takagi,
"Parallel Implementation of Public Key Cryptosystems using Web Workers",
The 11th Annual IEEE Consumer Communications and Networking Conference,
CCNC 2014, pp.1153–1154, 2014.
2013
Kenichiro Hayasaka, Kazumaro Aoki,
Tetsutaro Kobayashi, Tsuyoshi Takagi,
"An Experiment of Number Field Sieve
for Discrete Logarithm Problem over GF(p^12)",
Number Theory and Cryptography 2013,
Buchmann Festschrift, LNCS 8260, pp.108–120, 2013.
Yun-Ju Huang, Christophe Petit, Naoyuki Shinohara,
Tsuyoshi Takagi,
"Improvement of Faugere et al.'s Method to Solve ECDLP",
The 8th International Workshop on Security,
IWSEC 2013, LNCS 8231, pp.115–132, 2013.
Yutaro Kiyomura, Tsuyoshi Takagi,
"Efficient Algorithm for Tate Pairing of Composite Order",
The 8th International Workshop on Security,
IWSEC 2013, LNCS 8231, pp.201–216, 2013.
Rui Xu, Kirill Morozov, Tsuyoshi Takagi,
"On Cheater Identifiable Secret Sharing Schemes Secure
against Rushing Adversary",
The 8th International Workshop on Security,
IWSEC 2013, LNCS 8231, pp.258-271, 2013.
Hui Zhang, Tsuyoshi Takagi,
"Attacks on Multi-Prime RSA with Small Prime Difference",
18th Australasian Conference on Information Security and Privacy
ACISP 2013, LNCS 7959, pp.41–56, 2013.
Hiroyuki Miura, Yasufumi Hashimoto, Tsuyoshi Takagi,
"Extended Algorithm for Solving Underdefined Multivariate Quadratic Equations",
Fifth International Conference on Post-Quantum Cryptography,
PQCrypto 2013,
LNCS 7932, pp.118–135, 2013.
Takanori Yasuda, Tsuyoshi Takagi, Kouichi Sakurai,
"Multivariate Signature Scheme Using Quadratic Forms",
Fifth International Conference on Post-Quantum Cryptography,
PQCrypto 2013,
LNCS 7932, pp.243–258, 2013.
Takanori Yasuda, Jintai Ding, Tsuyoshi Takagi, Kouichi Sakurai,
"A Variant of Rainbow with Shorter Secret Key and Faster Signature Generation", 2013 ACM Asia Public-Key Cryptography Workshop,
AsiaPKC 2013, pp.57-62, 2013.
Rong Hu, Kirill Morozov, Tsuyoshi Takagi,
"Proof of Plaintext Knowledge for Code-Based Public-Key
Encryption Revisited",
8th ACM Symposium on Information, Computer and Communications Security,
ASIACCS 2013,
pp.535-540, 2013.
Yasufumi Hashimoto, Tsuyoshi Takagi, Kouichi Sakurai,
"General Fault Attacks on Multivariate Public Key Cryptosystems",
IEICE Transaction,
Vol.E96-A, No.1, pp.196-205, 2013.
2012
Hui Zhang and Tsuyoshi Takagi,
"An Exhaustive Search method to Find All Small Solutions of
a Multivariate Modular Linear Equation",
JSIAM Letters,
Vol.4, pp.37-40, 2012.
Takuya Hayashi, Takeshi Shimoyama, Naoyuki Shinohara, Tsuyoshi Takagi,
"Breaking Pairing-Based Cryptosystems using EtaT Pairing over GF(3^97)",
The 18th Annual International Conference on the Theory and Application of Cryptology and Information Security,
Asiacrypt 2012,
LNCS 7658, pp.43-60, 2012.
Takanori Yasuda, Tsuyoshi Takagi, Kouichi Sakurai,
"Application of Scalar Multiplication of Edwards Curves to Pairing-based Cryptography",
The 7th International Workshop on Security,
IWSEC 2012,
LNCS 7631, pp.19-36, 2012.
Youwen Zhu, Tsuyoshi Takagi, Liusheng Huang,
"Efficient Secure Primitive for Privacy Preserving Distributed Computations",
The 7th International Workshop on Security,
IWSEC 2012,
LNCS 7631, pp.233-243, 2012.
Kirill Morozov, Tsuyoshi Takagi,
"Zero-Knowledge Protocols for the McEliece Encryption",
The 17th Australasian Conference on Information Security and Privacy,
ACISP 2012,
LNCS 7372, pp.180-193, 2012.
Takanori Yasuda, Kouichi Sakurai, Tsuyoshi Takagi,
"Secret Key Reduction of Rainbow using Non-commutative Rings",
The Cryptographer's Track at the RSA Conference,
CT-RSA 2012,
LNCS 7178, pp.68-83, 2012.
Fagen Li, Yongjian Liao, Zhiguang Qin, Tsuyoshi Takagi,
"Further Improvement of an Identity-Based Signcryption Scheme in the Standard Model",
Computers & Electrical Engineering, Vol.38, No.2, pp.413-421, 2012.
Mingwu Zhang, Fagen Li, Tsuyoshi Takagi,
"Analysis and Improvement of a Secret Broadcast with Binding Encryption in Broadcasting Networks",
IEICE Transaction, Vol.E95-D, No.2, 2012.
Takuya Hayashi, Naoyuki Shinohara, Lihua Wang, Shin'ichiro Matsuo, Masaaki Shirase, Tsuyoshi Takagi, "Solving a 676-bit Discrete Logarithm Problem in GF(3^{6n})",
IEICE Transaction, Vol.E95-A, No.1, pp.204-212, 2012.
Mingwu Zhang, Tsuyoshi Takagi, Bo Yang, Fagen Li,
"Cryptanalysis of Strong Designated Verifier Signature Scheme with Non-Delegatability and Non-Transferability",
IEICE Transaction, Vol.E95-A, No.1, pp.259-262, 2012.
Fagen Li, Muhammad Khurram Khan, Khaled Alghathbar, Tsuyoshi Takagi,
"Identity-Based Online/Offline Signcryption for Low Power Devices",
Journal of Network and Computer Applications,
Vol.35, No.1, pp.340-347, 2012.
2011
Yasufumi Hashimoto, Tsuyoshi Takagi, Koichi Sakurai,
"General Fault Attacks on Multivariate Public Key Cryptosystems",
The Fourth International Conference on Post-Quantum Cryptography,
PQCrypto 2011, LNCS 7071, pp.1-18, 2011.
Fagen Li, Fahad Bin Muhaya, Mingwu Zhang, Tsuyoshi Takagi,
"Efficient Identity-Based Signcryption in the Standard Model",
The Fifth International Conference on Provable Security,
ProvSec 2011, LNCS 6980, pp.120-137, 2011.
Mingwu Zhang, Takashi Nishide, Bo Yang, Tsuyoshi Takagi,
"Anonymous Encryption with Partial-Order Subset Delegation Functionality",
The Fifth International Conference on Provable Security,
ProvSec 2011, LNCS 6980, pp.154-169, 2011.
Mingwu Zhang, Bo Yang, Tsuyoshi Takagi,
"Group-oriented Setting's Multisigncryption Scheme With Threshold Designcryption",
Information Sciences, No.181, pp.4041-4050, Elsevier, 2011.
Yosuke Katoh, Yun-Ju Huang, Chen-Mou Cheng, Tsuyoshi Takagi,
"Efficient Implementation of the EtaT Pairing on GPU",
9th International Conference on Applied Cryptography and Network Security,
ACNS 2011, Industrial Track, pp.119-133, 2011.
Mingwu Zhang, Tsuyoshi Takagi,
"GeoEnc: Geometric Area based Keys and Policies in Functional
Encryption Systems",
16th Australasian Conference on Information Security and Privacy,
ACISP 2011, LNCS 6812, pp.241-258, 2011.
Mingwu Zhang, Tsuyoshi Takagi and Bo Yang,
"Dual-Veriers DVS with Message Recovery for Tolerant Routing
in Wireless Sensor Networks",
Pacific Asia Workshop on Intelligence and Security Informatics,
PAISI 2011, LNCS 6749, pp.71-84, 2011.
Kenichiro Hayasaka, Tsuyoshi Takagi, "An Experiment of Number Field Sieve over GF(p) of Low Hamming Weight Characteristic", International Workshop on Coding and Cryptology, IWCC 2011, LNCS 6639, pp. 191-200, 2011.
Yuto Kawahara, Tetsutaro Kobayashi, Gen Takahashi, Tsuyoshi Takagi, "Faster MapToPoint on Supersingular Elliptic Curves in Characteristic 3", IEICE Transaction, Vol.E94-A, No.1, pp.150-155, 2011.
Mingwu Zhang, Bo Yang, Wenzheng Zhang, Tsuyoshi Takagi, "Multibiometric Based Secure Encryption and Authentication Scheme with Fuzzy Extractor", International Journal of Network Security, Vol.12, No.1, pp.50-57, 2011.
Mingwu Zhang, Bo Yang, Yusheng Zhong, Pengcheng Li, Tsuyoshi Takagi, "Cryptanalysis and Fixed of Short Signature Scheme without Random Oracle from Bilinear Parings ", International Journal of Network Security, Vol.12, No.3, pp.130-136, 2011.