英語 日本語
発表論文

発表論文 2012 - 2016

2016年

査読有

  • Shinya Okumura, Koichiro Akiyama, Tsuyoshi Takagi, "An Estimate of the Complexity of the Section Finding Problem on Algebraic Surfaces", The Fourth International Symposium on Computing and Networking, CANDAR 2016, pp.28-36, 2016.
  • Jintai Ding, Momonari Kudo, Shinya Okumura, Tsuyoshi Takagi, Chengdong Tao, "Cryptanalysis of a public key cryptosystem based on Diophantine equations via weighted LLL reduction", 11th International Workshop on Security, IWSEC 2016, LNCS 9836, pp.305-315, 2016.
  • Shaoquan Jiang, Tsuyoshi Takagi, Guilin Wang, "Special Issue on Provable Security", Security and Communication Networks, Vol.9, No.12, pp.1635-1637, 2016.
  • Ye Yuan, Chen-Mou Cheng, Shinsaku Kiyomoto, Yutaka Miyake, Tsuyoshi Takagi, "Portable Implementation of Lattice-based Cryptography using JavaScript", International Journal of Networking and Computing, Vol.6, No.2, pp.309–327, 2016.
  • Duong Hoang Dung, Albrecht Petzoldt, Tsuyoshi Takagi, "Reducing the Key Size of the SRP Encryption Scheme", 21st Australasian Conference on Information Security and Privacy, ACISP 2016, LNCS 9723, pp.427-434, 2016.
  • Rui Xu, Kirill Morozov, Yanjiang Yang, Jianying Zhou, Tsuyoshi Takagi, "Privacy-preserving k-Nearest Neighbour Query on Outsourced Database", 21st Australasian Conference on Information Security and Privacy, ACISP 2016, LNCS 9722, pp.181-197, 2016.
  • Yoshinori Aono, Yuntao Wang, Takuya Hayashi, Tsuyoshi Takagi, "Improved Progressive BKZ Algorithms and their Precise Cost Estimation by Sharp Simulator", The 35th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Eurocrypt 2016, LNCS 9665, pp.789-819, 2016.
  • Keisuke Hakuta, Hisayoshi Sato, Tsuyoshi Takagi, "On tameness of Matsumoto-Imai central maps in three variables over the finite field F2", Advances in Mathematics of Communications, Vol.10, No.2, pp.221– 228, 2016.
  • Youwen Zhu, Zhiqiu Huang, Tsuyoshi Takagi, "Secure and controllable k-NN query over encrypted cloud data with key confidentiality", Journal of Parallel and Distributed Computing, Vol.89, pp.1-12, 2016.
  • Chi Cheng, Jemin Lee, Tao Jiang, Tsuyoshi Takagi, "Security Analysis and Improvements on Two Homomorphic Authentication Schemes for Network Coding", IEEE Transactions on Information Forensics and Security, Vol.11, No.5, pp.993-1002,2016.

査読無

  • Ye Yuan, Kazuhide Fukushima, Shinsaku Kiyomoto, Tsuyoshi Takagi, "Memory-Constrained Implementation of Lattice-based Encryption Scheme on Standard Java Card", コンピュータセキュリティシンポジウム CSS2016, 3C2-3, pp.981-988, 2016.
  • Rui Xu, Kazuhide Fukushima, Shinsaku Kiyomoto, Tsuyoshi Takagi, "An experimental study of the BDD approach for the search LWE problem", コンピュータセキュリティシンポジウム CSS2016, 3C4-4, pp.1268-1275, 2016.
  • 秋山浩一郎, 後藤泰宏, 奥村伸也, 高木剛, 縫田光司, 花岡悟一郎, "ある種の不定方程式の求解問題に基づく準同型暗号", 信学技法, IEICE Technicl Report, ISEC 2016-43, pp.27-34, 2016.
  • 奥村伸也, 秋山浩一郎, 高木剛, "有限体上の代数曲面に関する求セクション問題から生じる連立方程式の準正則性について", 信学技法, IEICE Technicl Report, ISEC 2016-34, pp.185-191, 2016.
  • 奥村伸也, 安田雅哉, 高木剛, "円分体に対するイデアル格子上の短い生成元の復元可能性について", 信学技法, IEICE Technicl Report, ISEC 2016-6, pp.25-32, 2016.
  • 立花ひかり, 高島克幸, 高木剛, "3-同種写像を用いた効率的なハッシュ関数の構成", 2016年暗号と情報セキュリティシンポジウム, SCIS2016, 1D2-1, 2016.
  • Chi Cheng, Jemin Lee, Tsuyoshi Takagi, "On the Security of Some Homomorphic Authentication Schemes for Network Coding", 2016年暗号と情報セキュリティシンポジウム, SCIS2016, 1E1-1, 2016.
  • Jintai Ding, Momonari Kudo, Shinya Okumura, Tsuyoshi Takagi, Chengdong Tao, "On the Security of a Public Key Cryptosystem based on Diophantine Equations of Degree Increasing Type", 2016年暗号と情報セキュリティシンポジウム, SCIS2016, 1D2-3, 2016.
  • 奥村伸也, 杉山真吾, 安田雅哉, 高木剛, "On the Security of Cryptosystems Using Short Generators over Ideal Lattices for Cyclotomic Fields", 2016年暗号と情報セキュリティシンポジウム, SCIS2016, 2D1-4, 2016.
  • 井上明子, 林卓也, 高木剛, "拡大体上の離散対数問題に対する数体篩法について", 2016年暗号と情報セキュリティシンポジウム, SCIS2016, 2D3-4, 2016.
  • Rui Xu, Kazuhide Fukushima, Shinsaku Kiyomoto, Tsuyoshi Takagi, "Preliminary Report of a LWE Distinguisher Implementation", 2016年暗号と情報セキュリティシンポジウム, SCIS2016, 2D4-2, 2016.
  • Hyungrok Jo, Tsuyoshi Takagi, "On the security of hash functions based on the cubic Ramanujan graphs", 2016年暗号と情報セキュリティシンポジウム, SCIS2016, 3D1-4, 2016.
  • Yun-Ju Huang, Takanori Yasuda, Xavier Dahan, Tsuyoshi Takagi, Kouichi Sakurai, "Recent Updates of MQ-Challenge Project", 2016年暗号と情報セキュリティシンポジウム, SCIS2016, 3E1-4, 2016.

2015年

査読有

  • Ye Yuan, Chen-Mou Cheng, Shinsaku Kiyomoto, Yutaka Miyake, Tsuyoshi Takagi, "Portable Implementation of Lattice-based Cryptography using JavaScript", The Third International Symposium on Computing and Networking, CANDAR'15, pp.58-67, 2015.
  • Takanori Yasuda, Tsuyoshi Takagi, Kouichi Sakurai, "Constructing Pairing-Friendly Elliptic Curves Using Global Number Fields", The Third International Symposium on Computing and Networking, CANDAR'15, pp.477-483, 2015.
  • Rui Xu, Kirill Morozov, Tsuyoshi Takagi, "Note on Some Recent Cheater Identifiable Secret Sharing Schemes", IEICE Transaction, Vol.98-A, No.8, pp.1814-1819, 2015.
  • Rong Hu, Kirill Morozov, Tsuyoshi Takagi, "Zero-Knowledge Protocols for Code-Based Public-Key Encryption", IEICE Transaction, Vol.98-A, No.10, pp.2139-2151, 2015.
  • Mingwu Zhang, Chunzhi Wang, Tsuyoshi Takagi, Yi Mu, "Functional Encryption Resilient to Hard-to-Invert Leakage", The Computer Journal, Vol.58, No.4, pp.735-749, 2015.
  • Youwen Zhu, Tsuyoshi Takagi, "Efficient scalar product protocol and its privacy-preserving application", International Journal of Electronic Security and Digital Forensics, Vol.7, No.1, pp.1-19, 2015.
  • Xiangsong Zhang, Zhenhua Liu, Yupu Hu, Tsuyoshi Takagi, "Revocable Identity-based Signcryption Scheme Without Random Oracles", International Journal of Network Security, Vol.17, No.2, pp.110-122, 2015.
  • Youwen Zhu, Zhiqiu Huang, Liusheng Huang, Tsuyoshi Takagi, "On the Security of A Privacy-Preserving Product Calculation Scheme", IEEE Transactions on Dependable and Secure Computing, Vol.12, No.3, pp.373-374, 2015.
  • Yun-Ju Huang , Christophe Petit, Naoyuki Shinohara, Tsuyoshi Takagi, "Improvement of FPPR method to solve ECDLP", Pacific Journal of Mathematics for Industry, Vol.7, No.1, pp.1-9, 2015.

査読無

  • Yuan Ye, Chen-Mou Cheng, Shinsaku Kiyomoto, Yutaka Miyake, Tsuyoshi Takagi, "Efficient Implementation of Lattice-based Cryptosystems using JavaScript", 2015年暗号と情報セキュリティシンポジウム, SCIS2015, 1B1-1, p.24, 2015.
  • 矢城信吾, 高木 剛, "Matsumoto-Imai中間写像のTame分解に関する考察", 2015年暗号と情報セキュリティシンポジウム, SCIS2015, 2D1-1, p.37, 2015.
  • 米村智子, 高木 剛, "ペアリング計算高速化へ向けたパラメータ設定", 2015年暗号と情報セキュリティシンポジウム, SCIS2015, 2B4-3, p.52, 2015.
  • Takanori Yasuda, Xavier Dahan, Yun-Ju Huang, Tsuyoshi Takagi, Kouichi Sakurai, "MQ Challenge: Hardness Evaluation of Solving Multivariate Quadratic Problems", 2015年暗号と情報セキュリティシンポジウム, SCIS2015, 3E2-1, p.67, 2015.
  • Chi CHENG, Tsuyoshi Takagi, "Homomorphic authentication for network coding", 2015年暗号と情報セキュリティシンポジウム, SCIS2015, 3E3-3, p.73, 2015.
  • Yuntao Wang, Yoshinori Aono, Takuya Hayashi, Tsuyoshi Takagi, "A New Progressive BKZ Algorithm", 2015年暗号と情報セキュリティシンポジウム, SCIS2015, 3E3-5, p.73, 2015.
  • Rui Xu, Kirill Morozov, Tsuyoshi Takagi, "New results on cheater identifiable secret sharing", 2015年暗号と情報セキュリティシンポジウム, SCIS2015, 3F3-1, p.73, 2015.

2014年

査読有

  • Yutaro Kiyomura, Noriyasu Iwamoto, Shun'ichi Yokoyama, Kenichiro Hayasaka, Yuntao Wang, Takanori Yasuda, Katsuyuki Takashima, Tsuyoshi Takagi, "Heuristic counting of Kachisa-Schaefer-Scott curves", JSIAM Letters, Vol.6, pp.73-76, 2014.
  • Kenichiro Hayasaka, Kazumaro Aoki, Tetsutaro Kobayashi, Tsuyoshi Takagi, "An experiment of number field sieve for discrete logarithm problem over GF(p^n)", JSIAM Letters, Vol.6, pp.53-56, 2014.
  • Chen-Mou Cheng, Yasufumi Hashimoto, Hiroyuki Miura, Tsuyoshi Takagi, "A Polynomial-Time Algorithm for Solving a Class of Underdetermined Multivariate Quadratic Equations over Fields of Odd Characteristics", 6th International Workshop on Post-Quantum Cryptography, PQCrypto 2014, LNCS 8772, pp.40-58, 2014.
  • Rui Xu, Kirill Morozov, Tsuyoshi Takagi, "Cheater Identifiable Secret Sharing Schemes via Multi-Receiver Authentication", 9th International Workshop on Security, IWSEC 2014, LNCS 8639, pp.72-87, 2014.
  • 鷲見拓哉, 石黒司, 清本晋作, 三宅優, 小林透, 高木剛, "Web Workersを用いた多変数公開鍵暗号Rainbowの並列実装", 情報処理学会論文誌, Vol.55, No.9, pp.2061-2071, 2014.
  • Yutaro Kiyomura, Tsuyoshi Takagi, "Efficient Algorithm for Tate Pairing of Composite Order", IEICE Transaction, Vol.97-A, No.10, pp.2055-2063, 2014.
  • Hui Zhang, Tsuyoshi Takagi, "Improved Attacks on Multi-Prime RSA with Small Prime Difference", IEICE Transaction, Vol.E97-A, No.7, pp.1533-1541, 2014.
  • Takumi Tomita, Tsuyoshi Takagi, "Efficient System Parameters for Identity-Based Encryption using Supersingular Elliptic Curves", JSIAM Letters, Vol.6, pp.13-16, 2014.
  • Hiroyuki Miura, Yasufumi Hashimoto, Tsuyoshi Takagi, "Extended Algorithm for Solving Underdefined Multivariate Quadratic Equations", IEICE Transaction, Vol.E97-A, No.6, pp.1418-1425, 2014.
  • Youwen Zhu, Tsuyoshi Takagi, Rong Hu, "Security Analysis of Collusion-Resistant Nearest Neighbor Query Scheme on Encrypted Cloud Data", IEICE Transaction, Vol.E97-D, No.2, pp.326-330, 2014.
  • Naoyuki Shinohara, Takeshi Shimoyama, Takuya Hayashi, Tsuyoshi Takagi, "Key Length Estimation of Pairing-Based Cryptosystems Using ηT Pairing over GF(3^n)", IEICE Transaction, Vol.E97-A, No.1, pp.236-244, 2014.
  • Takanori Yasuda, Tsuyoshi Takagi, Kouichi Sakurai, "Security of Multivariate Signature Scheme Using Non-commutative Rings", IEICE Transaction, Vol.E97-A, No.1, pp.245-252, 2014.
  • Youwen Zhu, Tsuyoshi Takagi, "Efficient Privacy-Preserving Reputation Evaluation in Decentralized Environments", IEICE Transaction, Vol.E97-A, No.1, pp.409-412, 2014.
  • Tsukasa Ishiguro, Shinsaku Kiyomoto,Yutaka Miyake, Tsuyoshi Takagi, "Parallel Gauss Sieve Algorithm: Solving the SVP Challenge over a 128-Dimensional Ideal Lattice", The 17th IACR International Conference on Practice and Theory of Public-Key Cryptography, PKC 2014, LNCS 8383, pp.411–428, 2014.
  • 鷲見拓哉, 石黒司, 清本晋作, 三宅優, 高木剛, "Android携帯電話における多変数公開鍵暗号Rainbowの高速実装", 電子情報通信学会論文誌, Vol.J97-A, No.2, pp.86-95, 2014.
  • Takuya Sumi, Tsukasa Ishiguro, Shinsaku Kiyomoto, Yutaka Miyake, Toru Kobayashi, Tsuyoshi Takagi, "Parallel Implementation of Public Key Cryptosystems using Web Workers", The 11th Annual IEEE Consumer Communications and Networking Conference, CCNC 2014, pp.1153–1154, 2014.

査読無

  • 早坂健一郎, 青木和麻呂, 小林鉄太郎, 高木剛, "3次元格子篩において用いられる格子点計算法の評価" コンピュータセキュリティシンポジウム CSS2014, 1E3-3, pp.135-142, 2014.
  • Rui Xu, Kirill Morozov, Tsuyoshi Takagi, "Cryptanalysis of some recent cheater identifiable secret sharing schemes", 2014年暗号と情報セキュリティシンポジウム, SCIS2014, 1A1-3, p.2, 2014.
  • Yuntao Wang, Hui Zhang, Tsuyoshi Takagi, "Improving BKZ Lattice Reduction Algorithm with Reordering Technique", 2014年暗号と情報セキュリティシンポジウム, SCIS2014, 1C1-4, p.4, 2014.
  • 林卓也, 青木和麻呂, 下山武司, 篠原直行, 高木剛, "線形代数ステップにおけるLanczos法の実装実験", 2014年暗号と情報セキュリティシンポジウム, SCIS2014, 1C2-1, p.12, 2014.
  • 三浦浩幸, 橋本康史, 高木剛, "奇標数の有限体上の多変数連立2次方程式の求解アルゴリズムの改良について", 2014年暗号と情報セキュリティシンポジウム, SCIS2014, 1C2-2, p.12, 2014.
  • Zhenhua Liu, Tsuyoshi Takagi, Youwen Zhu, "Fully Secure Updatable Key Identity-based Signature Scheme from Lattices", 2014年暗号と情報セキュリティシンポジウム, SCIS2014, 2D1-1, p.34, 2014.
  • 安田貴徳, 高木剛, 櫻井幸一, "固定された係数を持つペアリングフレンドリ曲線", 2014年暗号と情報セキュリティシンポジウム, SCIS2014, 2E1-1, p.36, 2014.
  • 清村優太郎, 高木剛, "上位ビットを固定した合成数位数の効率的なペアリング", 2014年暗号と情報セキュリティシンポジウム, SCIS2014, 2E1-3, p.36, 2014.
  • Rong Hu, Kirill Morozov, Tsuyoshi Takagi, "Confirmer Signatures from McEliece Assumptions", 2014年暗号と情報セキュリティシンポジウム, SCIS2014, 2B3-3, p.51, 2014.
  • 菅野雄太, 草川恵太, 高木剛, "多変数公開鍵暗号Simple Matrix方式の復号化における問題点", 2014年暗号と情報セキュリティシンポジウム, SCIS2014, 3E1-4, p.75, 2014.
  • Rui Xu, Kirill Morozov, Tsuyoshi Takagi, "Cheater Identifiable Secret Sharing against Rushing Adversary", 2014年暗号と情報セキュリティシンポジウム, SCIS2014, 3F1-4, p.77, 2014.
  • 上薗大地, 清村優太郎, 高木剛, "Window法に用いる2進数3進数混合形式w-HBTFの非零濃度", 2014年暗号と情報セキュリティシンポジウム, SCIS2014, 3F4-3, p.106, 2014.
  • Yun-Ju Huang, Christophe Petit, Naoyuki Shinohara, Tsuyoshi Takagi, "Improvement of Faug`ere et al.'s method to solve ECDLP", 2014年暗号と情報セキュリティシンポジウム, SCIS2014, 3F5-4, p.118, 2014.
  • 安田貴徳, 齋藤恆和, 小林鉄太郎, 高木剛, "拡大体上の楕円曲線暗号へのGHS攻撃に対する安全性", 2014年暗号と情報セキュリティシンポジウム, SCIS2014, 4F2-3, p.138, 2014.

2013年

査読有

  • Kenichiro Hayasaka, Kazumaro Aoki, Tetsutaro Kobayashi, Tsuyoshi Takagi, "An Experiment of Number Field Sieve for Discrete Logarithm Problem over GF(p^12)", Number Theory and Cryptography 2013, Buchmann Festschrift, LNCS 8260, pp.108–120, 2013.
  • Yun-Ju Huang, Christophe Petit, Naoyuki Shinohara, Tsuyoshi Takagi, "Improvement of Faugere et al.'s Method to Solve ECDLP", The 8th International Workshop on Security, IWSEC 2013, LNCS 8231, pp.115–132, 2013.
  • Yutaro Kiyomura, Tsuyoshi Takagi, "Efficient Algorithm for Tate Pairing of Composite Order", The 8th International Workshop on Security, IWSEC 2013, LNCS 8231, pp.201–216, 2013.
  • Rui Xu, Kirill Morozov, Tsuyoshi Takagi, "On Cheater Identifiable Secret Sharing Schemes Secure against Rushing Adversary", The 8th International Workshop on Security, IWSEC 2013, LNCS 8231, pp.258-271, 2013.
  • Hui Zhang, Tsuyoshi Takagi, "Attacks on Multi-Prime RSA with Small Prime Difference", 18th Australasian Conference on Information Security and Privacy ACISP 2013, LNCS 7959, pp.41–56, 2013.
  • Hiroyuki Miura, Yasufumi Hashimoto, Tsuyoshi Takagi, "Extended Algorithm for Solving Underdefined Multivariate Quadratic Equations", Fifth International Conference on Post-Quantum Cryptography, PQCrypto 2013, LNCS 7932, pp.118–135, 2013.
  • Takanori Yasuda, Tsuyoshi Takagi, Kouichi Sakurai, "Multivariate Signature Scheme Using Quadratic Forms", Fifth International Conference on Post-Quantum Cryptography, PQCrypto 2013, LNCS 7932, pp.243–258, 2013.
  • Takanori Yasuda, Jintai Ding, Tsuyoshi Takagi, Kouichi Sakurai, "A Variant of Rainbow with Shorter Secret Key and Faster Signature Generation", 2013 ACM Asia Public-Key Cryptography Workshop, AsiaPKC 2013, pp.57-62, 2013.
  • Rong Hu, Kirill Morozov, Tsuyoshi Takagi, "Proof of Plaintext Knowledge for Code-Based Public-Key Encryption Revisited", 8th ACM Symposium on Information, Computer and Communications Security, ASIACCS 2013, pp.535-540, 2013.
  • Yasufumi Hashimoto, Tsuyoshi Takagi, Kouichi Sakurai, "General Fault Attacks on Multivariate Public Key Cryptosystems", IEICE Transaction, Vol.E96-A, No.1, pp.196-205, 2013.

査読無

  • 矢城信吾, 高木剛, "Matsumoto-Imai 中間写像のtame 分解性について", コンピュータセキュリティシンポジウム CSS2013, 1C1-1, 2013.
  • 石黒司, 清本晋作, 三宅優, 高木剛, "並列Gauss Sieveアルゴリズムを用いた128次元イデアル格子の最短ベクトル問題の求解", コンピュータセキュリティシンポジウム CSS2013, 1C1-2, 2013.
  • 早坂健一郎, 青木和麻呂, 小林鉄太郎, 高木剛, "拡大体GF(pˆn)上の数体篩法における3次元Lattice Sieveの構成", コンピュータセキュリティシンポジウム CSS2013, 1C1-3, 2013.
  • 鷲見拓哉, 石黒司, 清本晋作, 三宅優, 小林透, 高木剛, "Web Workersを用いた多変数公開鍵暗号Rainbowの並列実装", コンピュータセキュリティシンポジウム CSS2013, 2D1-3, 2013.
  • Tsukasa Ishiguro, Shinsaku Kiyomoto, Yutaka Miyake, Tsuyoshi Takagi "Parallel Gauss Sieve Algorithm: Solving the SVP in the Ideal Lattice of 128 dimensions", Cryptology ePrint Archive: Report 2013/388, 2013.
  • Rong Hu, Kirill Morozov, Tsuyoshi Takagi, "On Proof of Plaintext Knowledge for Code-Based Public Key Encryption", 2013年暗号と情報セキュリティシンポジウム, SCIS2013, 2B3-5, 2013.
  • 鷲見拓哉, 石黒司, 清本晋作, 三宅優, 高木剛, "Android携帯電話における多変数公開鍵暗号Rainbowの高速実装", 2013年暗号と情報セキュリティシンポジウム, SCIS2013, 2E1-4, 2013.
  • 清村優太郎, 高木剛, "合成数位数のTateペアリングの効率的な計算方法", 2013年暗号と情報セキュリティシンポジウム, SCIS2013, 2E4-2, 2013.
  • Huang Yun Ju, Naoyuki Shinohara, Tsuyoshi Takagi, "Improvement of Faugere et al.'s Method to Solve ECDLP", 2013年暗号と情報セキュリティシンポジウム, SCIS2013, 3A2-3, 2013.
  • Youwen ZHU, Rui Xu, Tsuyoshi Takagi, "Secure k-NN Computation on Encrypted Cloud Data Without Sharing Key with Query Users", 2013年暗号と情報セキュリティシンポジウム, SCIS2013, 3A3-2, 2013.
  • 安田貴徳, 高木剛, 櫻井幸一, "ヤコビ4次曲線を用いた効率的なペアリングフレンドリ曲線", 2013年暗号と情報セキュリティシンポジウム, SCIS2013, 3E1-1, 2013.
  • 三浦浩幸, 橋本康史, 高木剛, "有限体上の多変数連立2次方程式の求解問題における適用範囲の拡張について", 2013年暗号と情報セキュリティシンポジウム, SCIS2013, 4A1-1, 2013.
  • 早坂健一郎, 青木和麻呂, 小林鉄太郎, 高木剛, "GF(p^12)上の離散対数問題に対する数体篩法の計算機実験", 2013年暗号と情報セキュリティシンポジウム, SCIS2013, 4A1-3, 2013.
  • Hui Zhang, Tsuyoshi Takagi, "Attacks on Multi-Prime RSA with Small Prime Difference", 2013年暗号と情報セキュリティシンポジウム, SCIS2013, 1A1-2, 2013.

2012年

査読有

  • Hui Zhang and Tsuyoshi Takagi, "An Exhaustive Search method to Find All Small Solutions of a Multivariate Modular Linear Equation", JSIAM Letters, Vol.4, pp.37-40, 2012.
  • Takuya Hayashi, Takeshi Shimoyama, Naoyuki Shinohara, Tsuyoshi Takagi, "Breaking Pairing-Based Cryptosystems using EtaT Pairing over GF(3^97)", Asiacrypt 2012, LNCS 7658, pp.43-60, 2012.
  • Takanori Yasuda, Tsuyoshi Takagi, Kouichi Sakurai, "Application of Scalar Multiplication of Edwards Curves to Pairing-based Cryptography", IWSEC 2012, LNCS 7631, pp.19-36, 2012.
  • Youwen Zhu, Tsuyoshi Takagi, Liusheng Huang, "Efficient Secure Primitive for Privacy Preserving Distributed Computations", IWSEC 2012, LNCS 7631, pp.233-243, 2012.
  • Kirill Morozov, Tsuyoshi Takagi, "Zero-Knowledge Protocols for the McEliece Encryption", ACISP 2012, LNCS 7372, pp.180-193, 2012.
  • 井山政志, 清本晋作, 福島和英, 田中俊昭, 高木剛, "携帯電話におけるペアリング暗号の実装", 電子情報通信学会論文誌, Vol.J95-A, No.7, pp.579-587, 2012.
  • Naoyuki Shinohara, Takeshi Shimoyama, Takuya Hayashi, Tsuyoshi Takagi, "Key Length Estimation of Pairing-Based Cryptosystems using EtaT Pairing", ISPEC 2012, LNCS 7232, pp.228-244, 2012.
  • Takanori Yasuda, Kouichi Sakurai, Tsuyoshi Takagi, "Secret Key Reduction of Rainbow using Non-commutative Rings", CT-RSA 2012, LNCS 7178, pp.68-83, 2012.
  • Fagen Li, Yongjian Liao, Zhiguang Qin, Tsuyoshi Takagi, "Further Improvement of an Identity-Based Signcryption Scheme in the Standard Model", Computers & Electrical Engineering, Vol.38, No.2, pp.413-421, 2012.
  • Mingwu Zhang, Fagen Li, Tsuyoshi Takagi, "Analysis and Improvement of a Secret Broadcast with Binding Encryption in Broadcasting Networks", IEICE Transaction, Vol.E95-D, No.2, 2012.
  • Takuya Hayashi, Naoyuki Shinohara, Lihua Wang, Shin'ichiro Matsuo, Masaaki Shirase, Tsuyoshi Takagi, "Solving a 676-bit Discrete Logarithm Problem in GF(3^{6n})", IEICE Transaction, Vol.E95-A, No.1, pp.204-212, 2012.
  • Mingwu Zhang, Tsuyoshi Takagi, Bo Yang, Fagen Li, "Cryptanalysis of Strong Designated Verifier Signature Scheme with Non-Delegatability and Non-Transferability", IEICE Transaction, Vol.E95-A, No.1, pp.259-262, 2012.
  • Fagen Li, Muhammad Khurram Khan, Khaled Alghathbar, Tsuyoshi Takagi, "Identity-Based Online/Offline Signcryption for Low Power Devices", Journal of Network and Computer Applications, Vol.35, No.1, pp.340-347, 2012.

査読無

  • 石黒司, 清本晋作, 三宅優, 高木剛, "格子の最短ベクトル問題に対する並列化Gauss Sieveアルゴリズム", 電子情報通信学会, 信学技報, 2012.
  • 安田貴徳, 高木剛, 櫻井幸一, "非可換環を用いた多変数多項式署名方式に対するランク攻撃に関する考察", コンピュータセキュリティシンポジウム2012, CSS2012, 2C3-1, pp.477-484, 2012.
  • 林卓也, 下山武司, 篠原直行, 高木剛, "GF(3^n)上のηTペアリングを用いたペアリング暗号の安全性評価", 電子情報通信学会, 信学技報, IEICE-ISEC2012-43, 2012.
  • 安田貴徳, 高木剛, 櫻井幸一, "Edwards曲線が有効なペアリング暗号の埋め込み次数", 2012年暗号と情報セキュリティシンポジウム, SCIS2012, 1B1-1, 2012.
  • 井山政志, 福島和英, 清本晋作, 三宅優, 高木剛, "Android 携帯電話におけるペアリングの高速実装", 2012年暗号と情報セキュリティシンポジウム, SCIS2012, 1B1-5, 2012.
  • 伯田恵輔, 佐藤尚宜, 高木剛, "φ-GNAFのHamming weightの非最小性に関する理論的考察", 2012年暗号と情報セキュリティシンポジウム, SCIS2012, 1B2-4, 2012.
  • Naoyuki Shinohara, Takeshi Shimoyama, Takuya Hayashi, Tuyoshi Takagi, "Estimation of Time Complexity of Solving DLP over GF(3^{6n})", 2012年暗号と情報セキュリティシンポジウム, SCIS2012, 1B3-1, 2012.
  • 加藤陽介, 高木剛, "標数3 の超特異楕円曲線におけるGPUを用いたρ法の実装", 2012年暗号と情報セキュリティシンポジウム, SCIS2012, 1B3-2, 2012.
  • Mingwu Zhang, Kirill Morozov, Fagen Li, Tuyoshi Takagi, "On the Definitions, Security and Transformations of Functional Encryption Systems", 2012年暗号と情報セキュリティシンポジウム, SCIS2012, 2A2-1E, 2012.
  • Hui Zhang, Tuyoshi Takagi, "An Exhaustive Search Algorithm for Finding All Small Solutions of a Multivariate Modular Linear Equation", 2012年暗号と情報セキュリティシンポジウム, SCIS2012, 2A3-1E, 2012.
  • Takanori Yasuda, Jintai Ding, Tsuyoshi Takagi, Kouichi Sakurai, "Some Efficient Variants of UOV and Rainbow", 2012年暗号と情報セキュリティシンポジウム, SCIS2012, 2A3-3, 2012.
  • 坂本恭一, 林卓也, 高木剛, "数体篩法におけるJoux-Lercier の多項式選択法について", 2012年暗号と情報セキュリティシンポジウム, SCIS2012, 2B1-2, 2012.
  • Kirill Morozov, Tsuyoshi Takagi, "Proof of Plaintext Knowledge for the McEliece Encryption", 2012年暗号と情報セキュリティシンポジウム, SCIS2012, 3B3-1E, 2012.


PAGE TOP