東京大学 大学院情報理工学系研究科 数理情報学専攻 高木・高安研究室 暗号数理情報学研究室(数理情報第1研究室)

発表論文 2001 - 2005

2005年

査読有

  • Lihua Wang, Takeshi Okamoto, Tsuyoshi Takagi, and Eiji Okamoto, "Insider Impersonation-MIM Attack to Tripartite Key Agreement Scheme and An Efficient Protocol for Multiple Keys", 2005 International Conference on Computational Intelligence and Security, CIS 2005, Part II, LNAI 3802, pp.198-203, 2005.
  • Dong-Guk Han, Tsuyoshi Takagi, Tae Hyun Kim, Ho Won Kim, Kyo Il Chung, "Collision Attack on XTR and a Countermeasure with Fixed Pattern", The First International Workshop on Security in Ubiquitous Computing Systems, SecUbiq-05, LNCS 3823, pp. 864-873, 2005.
  • Erik Dahmen, Katsuyuki Okeya, Tsuyoshi Takagi, "An Advanced Method for Joint Scalar Multiplications on Memory Constraint Devices", 2nd European Workshop on Security and Privacy in Ad hoc and Sensor Networks, ESAS 2005, LNCS 3813, pp.189-204, 2005.
  • Katja Schmidt-Samoa, Tsuyoshi Takagi, "Paillier's Cryptosystem Modulo p2q and its Applications to Trapdoor Commitment Scheme", International Conference on Cryptology in Malaysia, Mycrypt 2005, LNCS 3715, pp.296-313, 2005.
  • Katsuyuki Okeya, Tsuyoshi Takagi, Camille Vuillaume, "Short-Memory Scalar Multiplication on Koblitz Curves", Workshop on Cryptographic Hardware and Embedded Systems, CHES 2005, LNCS 3659, pp.91-105, 2005.
  • Izuru Kitamura, Masanobu Katagi, Tsuyoshi Takagi, "A Complete Divisor Class Halving Algorithm for Hyperelliptic Curve Cryptosystems of Genus Two", 10th Australasian Conference on Information Security and Privacy, ACISP 2005, LNCS 3574, pp.146-157, 2005.
  • Katsuyuki Okeya, Tsuyoshi Takagi, Camille Vuillaume, "Efficient Representations on Koblitz Curves with Resistance to Side Channel Attacks", 10th Australasian Conference on Information Security and Privacy, ACISP 2005, LNCS 3574, pp.218-229, 2005.
  • Raylin Tso, Takeshi Okamoto, Tsuyoshi Takagi, Eiji Okamoto, "k-Resilient ID-Based Key Distribution Schemes from Pairing", International Workshop on Coding and Cryptography, WCC 2005, Bergen, Norway, pp.402-412, 2005.
  • Masanobu Katagi, Toru Akishita, Izuru Kitamura, Tsuyoshi Takagi, "Some Improved Algorithms for Hyperelliptic Curve Cryptosystems using Degenerate Divisors", 7th Annual International Conference on Information Security and Cryptology, ICISC 2004, LNCS 3506, pp.296-312, 2005.
  • Masanobu Katagi, Izuru Kitamura, Toru Akishita, Tsuyoshi Takagi, "Novel Efficient Implementations of Hyperelliptic Curve Cryptosystems using Degenerate Divisors", Workshop on Information Security Applications, WISA 2004, LNCS 3325, pp.345-359, 2005.
  • Katsuyuki Okeya, Tsuyoshi Takagi, Camille Vuillaume, "On the Importance of Δ in SFLASH against Side Channel Attacks", IEICE Transactions, Vol.E88-A, No.1, pp.123-131, IEICE, 2005.
  • Toru Akishita, Tsuyoshi Takagi, "Zero-Value Register Attacks on Elliptic Curve Cryptosystem", IEICE Transactions, Vol.E88-A, No.1, pp.132-139, IEICE, 2005.
  • Toru Akishita, Tsuyoshi Takagi, "On the Optimal Parameter Choice for Elliptic Curve Cryptosystems", IEICE Transactions, Vol.E88-A, No.1, pp.140-146, IEICE, 2005.
  • Tetsuya Izu, Tsuyoshi Takagi, "Fast Elliptic Curve Multiplications Resistant against Side Channel Attacks", IEICE Transactions, Vol.E88-A, No.1, pp.161-171, IEICE, 2005.

査読無

  • Keisuke Hakuta, Hisayoshi Sato, Tsuyoshi Takagi, "Efficient Arithmetic on Subfield Elliptic Curves over Small Odd Characteristics", Cryptology ePrint Archive: Report 2005/454,2005.
  • Dong-Guk Han, Tsuyoshi Takagi, "Some Analysis of Radix-r Representations", Report 2005/402,2005.
  • Dong-Guk Han, Tetsuya Izu, Tsuyoshi Takagi, "Some Explicit Formulae of NAF and its Left-to-Right Analogue", Report 2005/384,2005.
  • Kaoru Kurosawa, Tsuyoshi Takagi, "One-Wayness Equivalent to General Factoring", Report 2005/382,2005.
  • 伯田恵輔, 佐藤尚宜, 高木剛, "楕円曲線暗号におけるスカラー倍算高速化に関する考察", 情報処理学会 コンピュータセキュリティシンポジウム, CSS 2005, 6C-3, pp.469-474,2005.
  • Dong-Guk Han, Tsuyoshi Takagi, Tae Hyun Kim, Ho Won Kim, Kyo Il Chung, "Collision Attack on XTR and a Countermeasure with a Fixed Pattern", Report 2005/316,2005.
  • Katsuyuki Okeya, Tsuyoshi Takagi, Camille Vuillaume, "Defeating Simple Power Analysis on Koblitz Curves", 電子情報通信学会技術研究報告, 情報セキュリティ研究会, ISEC 2005-18, 2005.
  • Erik Dahmen, Katsuyuki Okeya, Katja Schmidt-Samoa, Tsuyoshi Takagi, "Fast On-The-Fly Exponent Recording", 2005年暗号と情報セキュリティシンポジウム, SCIS 2005, 1E2-3, pp.121-126, 2005.
  • Camille Vuillaume, Katsuyuki Okeya, Tsuyoshi Takagi, "Security Analysis of OT Scheme", 2005年暗号と情報セキュリティシンポジウム, SCIS 2005, 2D1-2, pp.457-462, 2005.
  • Masanobu Katagi, Toru Akishita, Izuru Kitamura, Tsuyoshi Takagi, "Some Improved Algorithms for Hyperelliptic Curve Cryptosystems using Degenerate Divisors", 2005年暗号と情報セキュリティシンポジウム, SCIS 2005, 3E1-1, pp.1093-1098, 2005.
  • 北村出, 堅木雅宣, 高木剛 "A Complete Point Halving Algorithm for Hyperelliptic Curve Cryptosystems", 2005年暗号と情報セキュリティシンポジウム, SCIS 2005, 3E1-3, pp.1105-1110, 2005.
  • Lihua Wang, Takeshi Okamoto, Tsuyoshi Takagi, Eiji Okamoto, "Multi-Keys Tripartite Keu Agreement from Pairing", 2005年暗号と情報セキュリティシンポジウム, SCIS 2005, 4F1-5, pp.1849-1954, 2005.
  • 秋下徹, 高木剛 "剰余平方算処理の電力差分を利用した楕円曲線暗号に対するDPA攻撃", 2005年暗号と情報セキュリティシンポジウム, SCIS 2005, 4E2-4, pp.1981-1986, 2005.

2004年

査読有

  • David Galido, Sebasti? Mart?n, Tsuyoshi Takagi, Jorge Villar, "A Provably Secure Elliptic Curve Scheme with Fast Encryption", 5th International Conference on Cryptology in India, Indocrypt 2004, LNCS 3348, pp.245-259, 2004.
  • Hisayoshi Sato, Daniel Schepers, Tsuyoshi Takagi, "Exact Analysis of Montgomery Multiplication", 5th International Conference on Cryptology in India, Indocrypt 2004, LNCS 3348, pp.290-304, 2004.
  • Tsuyoshi Takagi, Sung-Ming Yen, Bo-Ching Wu, "Radix-r Non-Adjacent Form", 7th Information Security Conference, ISC 2004, LNCS 3225, pp.99-110, 2004.
  • Katsuyuki Okeya, Katja Schmidt-Samoa, Christian Spahn, Tsuyoshi Takagi, "Signed Binary Representations Revisited", The 24th Annual International Cryptology Conference, CRYPTO 2004, LNCS 3152, pp.123-139, 2004. IACR.
  • Johannes Buchmann, Tsuyoshi Takagi, Urlich Vollmer, "Number Field Cryptography", High Primes and Misdemeanours: Lectures in Honour of the 60th Birthday of Hugh Cowie Williams, pp.111-121, 2004.
  • Katsuyuki Okeya, Tsuyoshi Takagi, Camille Vuillaume, "On the Exact Flexibility of the Flexible Countermeasure against Side Channel Attacks", The 9th australasian conference on information security and privacy, ACISP 2004, LNCS 3108, pp.466-477, 2004.
  • Katsuyuki Okeya, Tsuyoshi Takagi, "Security Analysis of CRT-based Cryptosystems", Applied Cryptography and Network Security 2004, ACNS 2004, LNCS 3089, pp.383-397, 2004.
  • Katsuyuki Okeya, Tsuyoshi Takagi, Camille Vuillaume, "On the Importance of Protecting ? in SFLASH against Side Channel Attacks", ITCC 2004 International Conference on Information Technology: Coding and Computing, Special Session, Embedded Cryptographic Hardware, IEEE Computer Society, vol.II, pp.560-568, 2004.
  • Toru Akishita, Tsuyoshi Takagi, "On the Optimal Parameter Choice for Elliptic Curve Cryptosystems Using Isogeny", 7th International Workshop on Practice and Theory in Public Key Cryptography, PKC 2004, LNCS 2947, pp.346-359, 2004.
  • Ingrid Biehl, Sachar Paulus, Tsuyoshi Takagi, "Efficient Undeniable Signature Schemes based on Ideal Arithmetic in Quadratic Orders", Designs, Codes and Cryptography, 31 (2), pp.99-123, 2004.
  • Katsuyuki Okeya, Tsuyoshi Takagi, "The Width-w NAF Method Provides Small Memory and Fast Elliptic Scalar Multiplications Secure against Side Channel Attacks", IEICE Transactions, Vol.E87-A, No.1, pp.75-84, 2004.
  • Tetsuya Izu, Tsuyoshi Takagi, "Fast Elliptic Curve Multiplications with SIMD Operations", IEICE Transactions, Vol.E87-A, No.1, pp.85-93, 2004.
  • Tsuyoshi Takagi, "A Fast RSA-Type Public-Key Primitive Modulo pkq", IEICE Transactions, Vol.E87-A, No.1, pp.94-100, 2004.

査読無

  • Izuru Kitamura, Masanobu Katagi, Tsuyoshi Takagi, "A Complete Divisor Class Halving Algorithm for Hyperelliptic Curve Cryptosystems of Genus Two", Report 2004/255,2004.
  • Katsuyuki Okeya, Katja Schmidt-Samoa, Christian Spahn, Tsuyoshi Takagi, "Signed Binary Representations Revisited", Report 2004/195,2004.
  • Takeshi Okamoto, Tsuyoshi Takagi, Eiji Okamoto, "Pairing-based Problems and Their Applications", 2004年暗号と情報セキュリティシンポジウム, SCIS 2004, 2D4-1, 2004.
  • Toru Akishita, Tsuyoshi Takagi, "On the Optimal Parameter Choice for Elliptic Curve Cryptosystems Using Isogeny", 2004年暗号と情報セキュリティシンポジウム, SCIS 2004, 3A1-1, 2004.
  • Katsuyuki Okeya, Tsuyoshi Takagi, Camille Vuillaume, "SCA-resistant Elliptic Scalar Multiplication with Arbitrary-Size Pre-computation Table", 2004年暗号と情報セキュリティシンポジウム, SCIS 2004, 3A1-2, 2004.
  • Masanobu Katagi, Izuru Kitamura, Toru Akishita, Tsuyoshi Takagi, "A Timing Attack on Hyperelliptic Curve Cryptosystems", 2004年暗号と情報セキュリティシンポジウム, SCIS 2004, 3A1-5, 2004.

2003年

査読有

  • Karou Kurosawa, Katja Schmidt-Samoa, Tsuyoshi Takagi, "A Complete and Explicit Security Reduction Algorithm for RSA-based Cryptosystems", 9th International Conference on the Theory and Application of Cryptology and Information Security, Asiacrypt 2003, LNCS 2894, pp.474-491, 2003.
  • Karou Kurosawa, Tsuyoshi Takagi, "Some RSA-based Encryption Schemes with Tight Security Reduction", 9th International Conference on the Theory and Application of Cryptology and Information Security, Asiacrypt 2003, LNCS 2894, pp.19-36, 2003.
  • Hisayoshi Sato, Tsuyoshi Takagi, Satoru Tezuka, Kazuo Takaragi, "Generalized Powering Functions and their Application to Digital Signatures", 9th International Conference on the Theory and Application of Cryptology and Information Security, Asiacrypt 2003, LNCS 2894, pp.434-451, 2003.
  • Toru Akishita, Tsuyoshi Takagi, "Zero-Value Point Attacks on Elliptic Curve Cryptosystems", 6th Information Security Conference, ISC 2003, LNCS 2851, pp.218-233, 2003.
  • Katsuyuki Okeya, Tsuyoshi Takagi, "A More Flexible Countermeasure against Side Channel Attacks using Window Method", Workshop on Cryptographic Hardware and Embedded Systems, CHES 2003, LNCS 2779, pp.397-410, 2003.
  • Katsuyuki Okeya, Tsuyoshi Takagi, "The Width-w NAF Method Provides Small Memory and Fast Elliptic Scalar Multiplications Secure against Side Channel Attacks", Cryptographers' Track RSA Conference 2003, CT-RSA 2003, LNCS 2612, pp.328-342, 2003.
  • Tetsuya Izu, Tsuyoshi Takagi, "Efficient Computations of the Tate Pairing for the Large MOV degrees", 5th International Conference on Information Security and Cryptology, ICISC 2002, LNCS 2587, pp.283-297, 2003.
  • Kouichi Sakurai, Tsuyoshi Takagi, "A Reject Timing Attack on an IND-CCA2 Public-Key Cryptosystem", 5th International Conference on Information Security and Cryptology, ICISC 2002, LNCS 2587, pp.359-379, 2003.
  • Tetsuya Izu, Tsuyoshi Takagi, "Exceptional Procedure Attack on Elliptic Curve Cryptosystems", 6th International Workshop on Practice and Theory in Public Key Cryptography, PKC 2003, LNCS 2567, pp.224-239, 2003.

査読無

  • Masanobu Katagi, Izuru Kitamura, Toru Akishita, Tsuyoshi Takagi, "Novel Efficient Implementations of Hyperelliptic Curve Cryptosystems using Degenerate Divisors", Report 2003/203,2003.
  • Kaoru Kurosawa, Tsuyoshi Takagi, "Some RSA-based Encryption Schemes with Tight Security Reduction", Report 2003/157,2003.

2002年

査読有

  • Tetsuya Izu, Bodo M?ller, Tsuyoshi Takagi, "Improved Elliptic Curve Multiplication Methods Resistant against Side Channel Attacks", Third International Cryptology Conference in India, Indocrypt 2002, LNCS 2551, pp.296-313, 2002.
  • Tetsuya Izu, Tsuyoshi Takagi, "Fast Elliptic Curve Multiplications with SIMD Operations", Fourth International Conference on Information and Communications Security, ICICS 2002, LNCS 2513, pp.217-230, 2002.
  • Ingrid Biehl, Tsuyoshi Takagi, "A New Distributed Primality Test for Shared RSA Keys using Quadratic Fields", Seventh Australasian Conference on Information Security and Privacy, ACISP 2002, LNCS 2384, pp.1-16, 2002.
  • Kouichi Sakurai, Tsuyoshi Takagi, "On the Security of a Modified Paillier Public-Key Primitive", Seventh Australasian Conference on Information Security and Privacy, ACISP 2002, LNCS 2384, pp.436-448, 2002.
  • Tetsuya Izu, Tsuyoshi Takagi, "A Fast Parallel Elliptic Multiplication Resistant against Side Channel Attacks", 5th International Workshop on Practice and Theory in Public Key Cryptography, PKC 2002, LNCS 2274, pp.280-296, 2002.
  • Kouichi Sakurai, Tsuyoshi Takagi, "New Semantically Secure Public-Key Cryptosystems from the RSA-Primitive", 5th International Workshop on Practice and Theory in Public Key Cryptography, PKC 2002, LNCS 2274, pp.1-16, 2002.
  • Johannes Buchmann, Kouichi Sakurai, Tsuyoshi Takagi, "An IND-CCA2 Public-Key Cryptosystem with Fast Decryption", 4th International Conference on Information Security and Cryptology, ICISC'01, LNCS 2288, pp.51-71, 2002.

2001年

査読有

  • Marc Joye, Jean-Jacques Quisquater, Tsuyoshi Takagi, "How to Choose Secret Parameters for RSA and its Extensions to Elliptic Curves", Designs, Codes and Cryptography, 23 (3): pp.297-316, 2001.