英語 日本語
発表論文

発表論文 2002 - 2006

2006年

査読有

  • Kaoru Kurosawa, Tsuyoshi Takagi, "Efficient Selectively Convertible Undeniable Signature Without Random Oracle", Asiacrypt 2006, LNCS 4284, pp.428-443, 2006, ? Springer-Verlag. (abstract)
  • Tae Hyun Kim, Tsuyoshi Takagi, Dong-Guk Han, Ho Won Kim, Jongin Lim, "Side Channel Attacks and Countermeasures on Pairing Based Cryptosystems over Binary Fields", 5th International Conference on Cryptology and Network Security, CANS 2006, LNCS 4301, pp.168-181, 2006, ? Springer-Verlag. (abstract)
  • Tetsuya Izu, Tsuyoshi Takagi, "Power Analysis Countermeasure based on Ramp Scheme", 9th Japan-Korea Joint Workshop on Algorithms and Computation, WAAC 2006, pp.135-142, 2006.
  • Dong-Guk Han, Tsuyoshi Takagi, Ho Won Kim, Kyo Il Chung, "New Security Problem in RFID Systems "Tag Killing"", Applied Cryptography and Information Security, ACIS 2006, LNCS 3982, pp.375-384, 2006, ? Springer-Verlag. (abstract)
  • Katsuyuki Okeya, Tsuyoshi Takagi, "Security Analysis of CRT-Based Cryptosystems", International Journal of Information Security, IJIS, Vol.5, No.3, pp.177-185, ? Springer-Verlag.
  • Camille Vuillaume, Katsuyuki Okeya, Tsuyoshi Takagi, "Defeating Simple Power Analysis on Koblitz Curves", IEICE Transactions, Vol.E89-A No.5 pp.1362-1369, IEICE, 2006. (abstract)
  • Toru Akishita, Tsuyoshi Takagi, "Power Analysis to ECC Using Differential Power between Multiplication and Squaring", Seventh Smart Card Research and Advanced Application, CARDIS 2006, LNCS 3928, pp.151-164, 2006, ? Springer-Verlag. (abstract)
  • Dong-Guk Han, Tsuyoshi Takagi, Jongin Lim, "Further Security Analysis of XTR", The 2nd Information Security Practice and Experience Conference, ISPEC 2006, LNCS 3903, pp.33-44, 2006, ? Springer-Verlag. (abstract)
  • Hisayoshi Sato, Tsuyoshi Takagi, Satoru Tezuka, Kazuo Takaragi, "Generalized Powering Functions and Their Application to Digital Signatures", IEICE Transactions, Vol.E89-A, No.1, pp.81-89, IEICE, 2006. (abstract)
  • Tsuyoshi Takagi, David Reis, Jr., Sung-Ming Yen, Bo-Ching Wu, "Radix-r Non-Adjacent Form and Its Application to Pairing-Based Cryptosystem", IEICE Transactions, Vol.E89-A, No.1, pp.115-123, IEICE, 2006. (abstract)
  • Masanobu Katagi, Toru Akishita, Izuru Kitamura, Tsuyoshi Takagi, "Efficient Hyperelliptic Curve Cryptosystems using Theta Divisors", IEICE Transactions, Vol.E89-A, No.1, pp.151-160, IEICE, 2006. (abstract)
  • Katsuyuki Okeya, Tsuyoshi Takagi, Camille Vuillaume, "Security Analysis of the SPA-Resistant Fractional Width Method", IEICE Transactions, Vol.E89-A, No.1, pp.161-168, IEICE, 2006. (abstract)
  • Katja Schmidt-Samoa, Olivier Semay, Tsuyoshi Takagi, "Analysis of Fractional Window Recoding Methods and Their Application to Elliptic Curve Cryptosystems", IEEE Transactions on Computers, Vol.55, No.1, pp.48-57, January, 2006, ? IEEE Computer Society.

査読無

  • 吉富基, 高木剛, 清本晋作, 田中俊昭, "BREW携帯電話でのペアリング暗号の高速実装",情報処理学会, 第35回コンピュータセキュリティ研究会 ,CSEC-35,pp.19-24, 2006.
  • 山田尚志,高木剛, "NAFの双対形式における漸近的なゼロラン長の見積もり",第29回情報理論とその応用シンポジウム, SITA2006,pp.399-402, 2006.
  • Masaaki Shirase, Tsuyoshi Takagi, Eiji Okamoto, "Some Efficient Algorithms for the Final Exponentiation of EtaT Pairing", Cryptology ePrint Archive: Report 2006/431,2006.
  • 白勢政明,高木剛,岡本栄司, "ηTペアリングの最終べきについて",電子情報通信学会, 情報セキュリティ研究会,信学技報, ISEC2006-98,pp.19-26, 2006.
  • 川原祐人,高木剛,岡本栄司, "Javaを利用した携帯電話上でのTateペアリングの高速実装",情報処理学会 コンピュータセキュリティシンポジウム, CSS 2006, pp.591-596,2006.  (CSS2006学生論文賞受賞)
  • 逢坂恭介,高木剛,山崎憲一,高橋修, "所有権移転を可能にした効率で安全なRFIDセキュリティ方式の提案",情報処理学会 コンピュータセキュリティシンポジウム, CSS 2006, pp.49-54,2006.
  • Jean-Luc Beuchat, Masaaki Shirase, Tsuyoshi Takagi, Eiji Okamoto, "An Algorithm for the EtaT Pairing Calculation in Characteristic Three and its Hardware Implementation", Cryptology ePrint Archive: Report 2006/327,2006.
  • Yuto Kawahara, Tsuyoshi Takagi, Eiji Okamoto, "Efficient Implementation of Tate Pairing on a Mobile Phone using Java", Cryptology ePrint Archive: Report 2006/299,2006.
  • 白勢政明,高木剛,岡本栄司, "Tateペアリングの効率的な計算方法",電子情報通信学会技術研究報告, 情報セキュリティ研究会,信学技報, ISEC2006-12,pp.19-26, 2006.
  • Tae Hyun Kim, Tsuyoshi Takagi, Dong-Guk Han, Ho Won Kim, Jongin Lim, "Side Channel Attacks and Countermeasures on Pairing Based Cryptosystems over Binary Fields", Cryptology ePrint Archive: Report 2006/243,2006.
  • Dong-Guk Han, Tsuyoshi Takagi, Tae Hyun Kim, Ho Won Kim, Kyo Il Chung, "Side Channel Attack on Improved XTR Single Exponentiation and a New Countermeasure", 2006年 暗号と情報セキュリティシンポジウム, SCIS 2006, 2C1-1, pp.56,2006.
  • Dong-Guk Han, Tsuyoshi Takagi, "RFID Systems - Security Problems in Existing Protocols", 2006年 暗号と情報セキュリティシンポジウム, SCIS 2006, 2F2-4, pp.99,2006.
  • Vuillaume Camille, Okeya Katsuyuki, Takagi Tsuyoshi, "Fast Scalar Multiplication with Small Memory on Koblitz Curves", 2006年 暗号と情報セキュリティシンポジウム, SCIS 2006, 3C4-2, pp.255,2006.
  • Dong-Guk Han, Tsuyoshi Takagi, Some Radix-r Representations - Efficiency and Security 2006年 暗号と情報セキュリティシンポジウム, SCIS 2006, 3C4-3, pp.256,2006.
  • Dong-Guk Han, Tetsuya Izu, Tsuyoshi Takagi, Some Explicit Formulae of Signed Binary Representations 2006年 暗号と情報セキュリティシンポジウム, SCIS 2006, 3C4-4, pp.257,2006.
  • 岩見真希, 高木剛, 岡本健, 岡本栄司, "楕円曲線上のペアリング計算におけるバッチ検証", 2006年 暗号と情報セキュリティシンポジウム, SCIS 2006, 4C2-5, pp.315,2006.

2005年

査読有

  • Lihua Wang, Takeshi Okamoto, Tsuyoshi Takagi, and Eiji Okamoto, "Insider Impersonation-MIM Attack to Tripartite Key Agreement Scheme and An Efficient Protocol for Multiple Keys", 2005 International Conference on Computational Intelligence and Security, CIS 2005, Part II, LNAI 3802, pp.198-203, 2005, ? Springer-Verlag. (abstract)
  • Dong-Guk Han, Tsuyoshi Takagi, Tae Hyun Kim, Ho Won Kim, Kyo Il Chung, "Collision Attack on XTR and a Countermeasure with Fixed Pattern", The First International Workshop on Security in Ubiquitous Computing Systems, SecUbiq-05, LNCS 3823, pp. 864-873, 2005, ? Springer-Verlag. (abstract, pdf)
  • Erik Dahmen, Katsuyuki Okeya, Tsuyoshi Takagi, "An Advanced Method for Joint Scalar Multiplications on Memory Constraint Devices", 2nd European Workshop on Security and Privacy in Ad hoc and Sensor Networks, ESAS 2005, LNCS 3813, pp.189-204, 2005, ? Springer-Verlag. (abstract)
  • Katja Schmidt-Samoa, Tsuyoshi Takagi, "Paillier's Cryptosystem Modulo p2q and its Applications to Trapdoor Commitment Scheme", International Conference on Cryptology in Malaysia, Mycrypt 2005, LNCS 3715, pp.296-313, 2005, ? Springer-Verlag. (abstract)
  • Katsuyuki Okeya, Tsuyoshi Takagi, Camille Vuillaume, "Short-Memory Scalar Multiplication on Koblitz Curves", Workshop on Cryptographic Hardware and Embedded Systems, CHES 2005, LNCS 3659, pp.91-105, 2005, ? Springer-Verlag. (abstract)
  • Izuru Kitamura, Masanobu Katagi, Tsuyoshi Takagi, "A Complete Divisor Class Halving Algorithm for Hyperelliptic Curve Cryptosystems of Genus Two", 10th Australasian Conference on Information Security and Privacy, ACISP 2005, LNCS 3574, pp.146-157, 2005, ? Springer-Verlag. (abstract)
  • Katsuyuki Okeya, Tsuyoshi Takagi, Camille Vuillaume, "Efficient Representations on Koblitz Curves with Resistance to Side Channel Attacks", 10th Australasian Conference on Information Security and Privacy, ACISP 2005, LNCS 3574, pp.218-229, 2005, ? Springer-Verlag. (abstract)
  • Raylin Tso, Takeshi Okamoto, Tsuyoshi Takagi, Eiji Okamoto, "k-Resilient ID-Based Key Distribution Schemes from Pairing", International Workshop on Coding and Cryptography, WCC 2005, Bergen, Norway, pp.402-412, 2005.
  • Masanobu Katagi, Toru Akishita, Izuru Kitamura, Tsuyoshi Takagi, "Some Improved Algorithms for Hyperelliptic Curve Cryptosystems using Degenerate Divisors", 7th Annual International Conference on Information Security and Cryptology, ICISC 2004, LNCS 3506, pp.296-312, 2005, ? Springer-Verlag. (abstract)
  • Masanobu Katagi, Izuru Kitamura, Toru Akishita, Tsuyoshi Takagi, "Novel Efficient Implementations of Hyperelliptic Curve Cryptosystems using Degenerate Divisors", Workshop on Information Security Applications, WISA 2004, LNCS 3325, pp.345-359, 2005, ? Springer-Verlag. (abstract, pdf)
  • Katsuyuki Okeya, Tsuyoshi Takagi, Camille Vuillaume, "On the Importance of Δ in SFLASH against Side Channel Attacks", IEICE Transactions, Vol.E88-A, No.1, pp.123-131, IEICE, 2005, (abstract)
  • Toru Akishita, Tsuyoshi Takagi, "Zero-Value Register Attacks on Elliptic Curve Cryptosystem", IEICE Transactions, Vol.E88-A, No.1, pp.132-139, IEICE, 2005, (abstract)
  • Toru Akishita, Tsuyoshi Takagi, "On the Optimal Parameter Choice for Elliptic Curve Cryptosystems", IEICE Transactions, Vol.E88-A, No.1, pp.140-146, IEICE, 2005, (abstract)
  • Tetsuya Izu, Tsuyoshi Takagi, "Fast Elliptic Curve Multiplications Resistant against Side Channel Attacks", IEICE Transactions, Vol.E88-A, No.1, pp.161-171, IEICE, 2005, (abstract)

査読無

  • Keisuke Hakuta, Hisayoshi Sato, Tsuyoshi Takagi, "Efficient Arithmetic on Subfield Elliptic Curves over Small Odd Characteristics", Cryptology ePrint Archive: Report 2005/454,2005.
  • Dong-Guk Han, Tsuyoshi Takagi, "Some Analysis of Radix-r Representations", Report 2005/402,2005.
  • Dong-Guk Han, Tetsuya Izu, Tsuyoshi Takagi, "Some Explicit Formulae of NAF and its Left-to-Right Analogue", Report 2005/384,2005.
  • Kaoru Kurosawa, Tsuyoshi Takagi, "One-Wayness Equivalent to General Factoring", Report 2005/382,2005.
  • 伯田恵輔, 佐藤尚宜, 高木剛, "楕円曲線暗号におけるスカラー倍算高速化に関する考察", 情報処理学会 コンピュータセキュリティシンポジウム, CSS 2005, 6C-3, pp.469-474,2005.
  • Dong-Guk Han, Tsuyoshi Takagi, Tae Hyun Kim, Ho Won Kim, Kyo Il Chung, "Collision Attack on XTR and a Countermeasure with a Fixed Pattern", Report 2005/316,2005.
  • Katsuyuki Okeya, Tsuyoshi Takagi, Camille Vuillaume, "Defeating Simple Power Analysis on Koblitz Curves", 電子情報通信学会技術研究報告, 情報セキュリティ研究会, ISEC 2005-18, 2005.
  • Erik Dahmen, Katsuyuki Okeya, Katja Schmidt-Samoa, Tsuyoshi Takagi, "Fast On-The-Fly Exponent Recording", 2005年暗号と情報セキュリティシンポジウム, SCIS 2005, 1E2-3, pp.121-126, 2005.
  • Camille Vuillaume, Katsuyuki Okeya, Tsuyoshi Takagi, "Security Analysis of OT Scheme", 2005年暗号と情報セキュリティシンポジウム, SCIS 2005, 2D1-2, pp.457-462, 2005.
  • Masanobu Katagi, Toru Akishita, Izuru Kitamura, Tsuyoshi Takagi, "Some Improved Algorithms for Hyperelliptic Curve Cryptosystems using Degenerate Divisors", 2005年暗号と情報セキュリティシンポジウム, SCIS 2005, 3E1-1, pp.1093-1098, 2005.
  • 北村出, 堅木雅宣, 高木剛 "A Complete Point Halving Algorithm for Hyperelliptic Curve Cryptosystems", 2005年暗号と情報セキュリティシンポジウム, SCIS 2005, 3E1-3, pp.1105-1110, 2005.
  • Lihua Wang, Takeshi Okamoto, Tsuyoshi Takagi, Eiji Okamoto, "Multi-Keys Tripartite Keu Agreement from Pairing", 2005年暗号と情報セキュリティシンポジウム, SCIS 2005, 4F1-5, pp.1849-1954, 2005.
  • 秋下徹, 高木剛 "剰余平方算処理の電力差分を利用した楕円曲線暗号に対するDPA攻撃", 2005年暗号と情報セキュリティシンポジウム, SCIS 2005, 4E2-4, pp.1981-1986, 2005.

2004年

査読有

  • David Galido, Sebasti? Mart?n, Tsuyoshi Takagi, Jorge Villar, "A Provably Secure Elliptic Curve Scheme with Fast Encryption", 5th International Conference on Cryptology in India, Indocrypt 2004, LNCS 3348, pp.245-259, 2004, ? Springer-Verlag. (pdf)
  • Hisayoshi Sato, Daniel Schepers, Tsuyoshi Takagi, "Exact Analysis of Montgomery Multiplication", 5th International Conference on Cryptology in India, Indocrypt 2004, LNCS 3348, pp.290-304, 2004, ? Springer-Verlag. ( pdf)
  • Tsuyoshi Takagi, Sung-Ming Yen, Bo-Ching Wu, "Radix-r Non-Adjacent Form", 7th Information Security Conference, ISC 2004, LNCS 3225, pp.99-110, 2004, ? Springer-Verlag. (abstract,pdf)
  • Katsuyuki Okeya, Katja Schmidt-Samoa, Christian Spahn, Tsuyoshi Takagi, "Signed Binary Representations Revisited", CRYPTO 2004, LNCS 3152, pp.123-139, 2004, ? IACR. (abstract,pdf)
  • Johannes Buchmann, Tsuyoshi Takagi, Urlich Vollmer, "Number Field Cryptography", High Primes and Misdemeanours: Lectures in Honour of the 60th Birthday of Hugh Cowie Williams, pp.111-121, 2004, ? American Mathematical Society. (pdf)
  • Katsuyuki Okeya, Tsuyoshi Takagi, Camille Vuillaume, "On the Exact Flexibility of the Flexible Countermeasure against Side Channel Attacks", The 9th australasian conference on information security and privacy, ACISP 2004, LNCS 3108, pp.466-477, 2004, ? Springer-Verlag. (abstract, pdf)
  • Katsuyuki Okeya, Tsuyoshi Takagi, "Security Analysis of CRT-based Cryptosystems", Applied Cryptography and Network Security 2004, ACNS 2004, LNCS 3089, pp.383-397, 2004, ? Springer-Verlag. (abstract, pdf)
  • Katsuyuki Okeya, Tsuyoshi Takagi, Camille Vuillaume, "On the Importance of Protecting ? in SFLASH against Side Channel Attacks", ITCC 2004 International Conference on Information Technology: Coding and Computing, Special Session, Embedded Cryptographic Hardware, IEEE Computer Society, vol.II, pp.560-568, 2004, (abstract, pdf)
  • Toru Akishita, Tsuyoshi Takagi, "On the Optimal Parameter Choice for Elliptic Curve Cryptosystems Using Isogeny", 7th International Workshop on Practice and Theory in Public Key Cryptography, PKC 2004, LNCS 2947, pp.346-359, 2004, ? Springer-Verlag. (abstract, pdf)
  • Ingrid Biehl, Sachar Paulus, Tsuyoshi Takagi, "Efficient Undeniable Signature Schemes based on Ideal Arithmetic in Quadratic Orders", Designs, Codes and Cryptography, 31 (2), pp.99-123, 2004, ? Kluwer Academic Publishers. (abstract, pdf)
  • Katsuyuki Okeya, Tsuyoshi Takagi, "The Width-w NAF Method Provides Small Memory and Fast Elliptic Scalar Multiplications Secure against Side Channel Attacks", IEICE Transactions, Vol.E87-A, No.1, pp.75-84, 2004, (abstract)
  • Tetsuya Izu, Tsuyoshi Takagi, "Fast Elliptic Curve Multiplications with SIMD Operations", IEICE Transactions, Vol.E87-A, No.1, pp.85-93, 2004, (abstract)
  • Tsuyoshi Takagi, "A Fast RSA-Type Public-Key Primitive Modulo pkq", IEICE Transactions, Vol.E87-A, No.1, pp.94-100, 2004. (abstract)

査読無

  • Izuru Kitamura, Masanobu Katagi, Tsuyoshi Takagi, "A Complete Divisor Class Halving Algorithm for Hyperelliptic Curve Cryptosystems of Genus Two", Report 2004/255,2004.
  • Katsuyuki Okeya, Katja Schmidt-Samoa, Christian Spahn, Tsuyoshi Takagi, "Signed Binary Representations Revisited", Report 2004/195,2004.
  • Takeshi Okamoto, Tsuyoshi Takagi, Eiji Okamoto, "Pairing-based Problems and Their Applications", 2004年暗号と情報セキュリティシンポジウム, SCIS 2004, 2D4-1, 2004.
  • Toru Akishita, Tsuyoshi Takagi, "On the Optimal Parameter Choice for Elliptic Curve Cryptosystems Using Isogeny", 2004年暗号と情報セキュリティシンポジウム, SCIS 2004, 3A1-1, 2004.
  • Katsuyuki Okeya, Tsuyoshi Takagi, Camille Vuillaume, "SCA-resistant Elliptic Scalar Multiplication with Arbitrary-Size Pre-computation Table", 2004年暗号と情報セキュリティシンポジウム, SCIS 2004, 3A1-2, 2004.
  • Masanobu Katagi, Izuru Kitamura, Toru Akishita, Tsuyoshi Takagi, "A Timing Attack on Hyperelliptic Curve Cryptosystems", 2004年暗号と情報セキュリティシンポジウム, SCIS 2004, 3A1-5, 2004.

2003年

査読有

  • Karou Kurosawa, Katja Schmidt-Samoa, Tsuyoshi Takagi, "A Complete and Explicit Security Reduction Algorithm for RSA-based Cryptosystems", Asiacrypt 2003, LNCS 2894, pp.474-491, 2003, ? Springer-Verlag. (abstract, pdf)
  • Karou Kurosawa, Tsuyoshi Takagi, "Some RSA-based Encryption Schemes with Tight Security Reduction", Asiacrypt 2003, LNCS 2894, pp.19-36, 2003, ? Springer-Verlag. (abstract, pdf)
  • Hisayoshi Sato, Tsuyoshi Takagi, Satoru Tezuka, Kazuo Takaragi, Generalized Powering Functions and their Application to Digital Signatures Asiacrypt 2003, LNCS 2894, pp.434-451, 2003, ? Springer-Verlag. (abstract, pdf)
  • Toru Akishita, Tsuyoshi Takagi, "Zero-Value Point Attacks on Elliptic Curve Cryptosystems", 6th Information Security Conference, ISC 2003, LNCS 2851, pp.218-233, 2003, ? Springer-Verlag. (abstract, pdf)
  • Katsuyuki Okeya, Tsuyoshi Takagi, "A More Flexible Countermeasure against Side Channel Attacks using Window Method", Workshop on Cryptographic Hardware and Embedded Systems, CHES 2003, LNCS 2779, pp.397-410, 2003, ? Springer-Verlag. (abstract, pdf)
  • Katsuyuki Okeya, Tsuyoshi Takagi, "The Width-w NAF Method Provides Small Memory and Fast Elliptic Scalar Multiplications Secure against Side Channel Attacks", Cryptographers' Track RSA Conference 2003, CT-RSA 2003, LNCS 2612, pp.328-342, 2003, ? Springer-Verlag. (ps)
  • Tetsuya Izu, Tsuyoshi Takagi, "Efficient Computations of the Tate Pairing for the Large MOV degrees", 5th International Conference on Information Security and Cryptology, ICISC 2002, LNCS 2587, pp.283-297, 2003, ? Springer-Verlag. (pdf)
  • Kouichi Sakurai, Tsuyoshi Takagi, "A Reject Timing Attack on an IND-CCA2 Public-Key Cryptosystem", 5th International Conference on Information Security and Cryptology, ICISC 2002, LNCS 2587, pp.359-379, 2003, ? Springer-Verlag. (pdf)
  • Tetsuya Izu, Tsuyoshi Takagi, "Exceptional Procedure Attack on Elliptic Curve Cryptosystems", 6th International Workshop on Practice and Theory in Public Key Cryptography, PKC 2003, LNCS 2567, pp.224-239, 2003, ? Springer-Verlag. (pdf)

査読無

  • Masanobu Katagi, Izuru Kitamura, Toru Akishita, Tsuyoshi Takagi, "Novel Efficient Implementations of Hyperelliptic Curve Cryptosystems using Degenerate Divisors", Report 2003/203,2003.
  • Kaoru Kurosawa, Tsuyoshi Takagi, "Some RSA-based Encryption Schemes with Tight Security Reduction", Report 2003/157,2003.

2002年

査読有

  • Tetsuya Izu, Bodo M?ller, Tsuyoshi Takagi, "Improved Elliptic Curve Multiplication Methods Resistant against Side Channel Attacks", Third International Cryptology Conference in India, Indocrypt 2002, LNCS 2551, pp.296-313, 2002, ? Springer-Verlag. (pdf)
  • Tetsuya Izu, Tsuyoshi Takagi, "Fast Elliptic Curve Multiplications with SIMD Operations", Fourth International Conference on Information and Communications Security, ICICS 2002, LNCS 2513, pp.217-230, 2002, ? Springer-Verlag. (pdf)
  • Ingrid Biehl, Tsuyoshi Takagi, "A New Distributed Primality Test for Shared RSA Keys using Quadratic Fields", Seventh Australasian Conference on Information Security and Privacy, ACISP 2002, LNCS 2384, pp.1-16, 2002, ? Springer-Verlag. (ps)
  • Kouichi Sakurai, Tsuyoshi Takagi, "On the Security of a Modified Paillier Public-Key Primitive", Seventh Australasian Conference on Information Security and Privacy, ACISP 2002, LNCS 2384, pp.436-448, 2002, ? Springer-Verlag. (ps)
  • Tetsuya Izu, Tsuyoshi Takagi, "A Fast Parallel Elliptic Multiplication Resistant against Side Channel Attacks", 5th International Workshop on Practice and Theory in Public Key Cryptography, PKC 2002, LNCS 2274, pp.280-296, 2002, ? Springer-Verlag. (ps)
  • Kouichi Sakurai, Tsuyoshi Takagi, "New Semantically Secure Public-Key Cryptosystems from the RSA-Primitive", 5th International Workshop on Practice and Theory in Public Key Cryptography, PKC 2002, LNCS 2274, pp.1-16, 2002, ? Springer-Verlag. (ps)
  • Johannes Buchmann, Kouichi Sakurai, Tsuyoshi Takagi, "An IND-CCA2 Public-Key Cryptosystem with Fast Decryption", 4th International Conference on Information Security and Cryptology, ICISC'01, LNCS 2288, pp.51-71, 2002, ? Springer-Verlag. (ps)


PAGE TOP