Takuya Kusaka

Orcid: 0000-0002-4240-0454

According to our database1, Takuya Kusaka authored at least 75 papers between 2010 and 2023.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Improvement of Miller Loop for a Pairing on FK12 Curve and Evaluation with other STNFS Curves.
Int. J. Netw. Comput., 2023

A Consideration of Parameters for a Nonlinear Filter Generator and its Linear Complexity Profile.
Proceedings of the International Conference on Consumer Electronics - Taiwan, 2023

Evaluation of machine learning based optimized feature selection approaches and classification methods for Intrusion Detection System.
Proceedings of the International Conference on Consumer Electronics - Taiwan, 2023

A Consideration of Averaging the Calculation Cost of CVMA for A Secure Session based Data Transmission.
Proceedings of the International Conference on Consumer Electronics - Taiwan, 2023

An Attack for a 116bit ECDLP for a Barreto-Naehrig Curve.
Proceedings of the International Conference on Consumer Electronics - Taiwan, 2023

A modified M-sequence with dynamic mapping and its autocorrelation.
Proceedings of the International Conference on Consumer Electronics - Taiwan, 2023

A Proposal for Efficient Multiplication and Inverse Calculation in Streamlined NTRU Prime.
Proceedings of the International Conference on Consumer Electronics - Taiwan, 2023

2022
Efficient Final Exponentiation for Cyclotomic Families of Pairing-Friendly Elliptic Curves with Any Prime Embedding Degrees.
Int. J. Netw. Comput., 2022

Transition Probability Test for an RO-Based Generator and the Relevance between the Randomness and the Number of ROs.
Entropy, 2022

A Method to Eliminate Fruitless Cycles for Pollard's Rho Method by Splitting a Seed-point Table for a Random Walk.
Proceedings of the Tenth International Symposium on Computing and Networking, 2022

Improvement of Miller Loop for a Pairing on FK12 Curve and its Implementation.
Proceedings of the Tenth International Symposium on Computing and Networking, 2022

Improvement of Optimal-Ate Pairing on Cocks-Pinch Curve with Embedding Degree 6 in Affine Coordinates.
Proceedings of the 2022 Tenth International Symposium on Computing and Networking, CANDAR 2022, 2022

2021
Restrictions of Integer Parameters for Generating Attractive BLS Subfamilies of Pairing-Friendly Elliptic Curves with Specific Embedding Degrees.
Int. J. Netw. Comput., 2021

Sophisticated analysis of a method to eliminate fruitless cycles for Pollard's rho method with skew Frobenius mapping over a Barreto-Naehrig curve.
Int. J. Netw. Comput., 2021

Improvement of Final Exponentiation for Pairings on BLS Curves with Embedding Degree 15.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2021

The Weight Distributions of the (256, <i>k</i>) Extended Binary Primitive BCH Codes with <i>k</i>≤71 and <i>k</i>≥187.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2021

Consideration for Affects of an XOR in a Random Number Generator Using Ring Oscillators.
Entropy, 2021

Consideration of Generating Suitable Parameters for Constructing type (h, m) Gauss Period Normal Basis.
Proceedings of the IEEE International Conference on Consumer Electronics-Taiwan, 2021

A Proposal for Testing Physical Random Numbers Using Stochastic Process.
Proceedings of the IEEE International Conference on Consumer Electronics-Taiwan, 2021

A Property Management System Using Image Recognition by YOLO.
Proceedings of the IEEE International Conference on Consumer Electronics-Taiwan, 2021

An Optimal Curve Parameters for BLS12 Elliptic Curve Pairing and Its Efficiency Evaluation.
Proceedings of the IEEE International Conference on Consumer Electronics-Taiwan, 2021

A Construction Method of Final Exponentiation for a Specific Cyclotomic Family of Pairing-Friendly Elliptic Curves with Prime Embedding Degrees.
Proceedings of the Ninth International Symposium on Computing and Networking, 2021

Efficient Final Exponentiation for Pairings on Several Curves Resistant to Special TNFS.
Proceedings of the Ninth International Symposium on Computing and Networking, 2021

Consideration of the side-channel attack to SPECK implemented on Arduino Uno.
Proceedings of the Ninth International Symposium on Computing and Networking, 2021

Consideration of the side-channel attack to SIMON implemented on Arduino Uno.
Proceedings of the Ninth International Symposium on Computing and Networking, 2021

2020
Evaluating Side-Channel Resistance Using Low Order Rational Points Against Curve25519 and an Associated Quadratic Twist.
Int. J. Netw. Comput., 2020

A Performance Analysis and Evaluation of SIDH Applied Several Implementation-Friendly Quadratic Extension Fields.
Int. J. Netw. Comput., 2020

A Construction Method of an Isomorphic Map between Quadratic Extension Fields Applicable for SIDH.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2020

Path Authentication Protocol: Based on a Lightweight MAC and a Nonlinear Filter Generator.
Proceedings of the Silicon Valley Cybersecurity Conference - First Conference, 2020

Equivalent Keys of a Nonlinear Filter Generator Using a Power Residue Symbol.
Proceedings of the Advances in Information and Computer Security, 2020

A Parallel Blum-Micali Generator Based on the Gauss Periods.
Proceedings of the International Symposium on Information Theory and Its Applications, 2020

An Approach for Attacking Speck on Microcontroller with Correlation Power Analysis.
Proceedings of the Eighth International Symposium on Computing and Networking Workshops, 2020

Specific Congruence Classes of Integer Parameters for Generating BLS Curves for Fast Pairings.
Proceedings of the Eighth International Symposium on Computing and Networking Workshops, 2020

Analysis of a method to eliminate fruitless cycles for Pollard's rho method with skew Frobenius mapping over a Barreto-Naehrig curve.
Proceedings of the Eighth International Symposium on Computing and Networking, 2020

Improvement of Bit Distribution of Binary Sequence Generated by Alternative Trace Map Function.
Proceedings of the Eighth International Symposium on Computing and Networking Workshops, 2020

2019
Advanced Searchable Encryption: An Adaptively Secure Keyword Search for Matrix-type Storages.
Int. J. Netw. Comput., 2019

Algebraic Group Structure of the Random Number Generator: Theoretical Analysis of NTU Sequence(s).
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2019

A Consideration on Generating Uniform Binary Sequence with High Linear Complexity.
Proceedings of the IEEE International Conference on Consumer Electronics - Taiwan, 2019

Boundary for the Linear Complexity of Well Balanced NTU.
Proceedings of the IEEE International Conference on Consumer Electronics - Taiwan, 2019

NIST Statistical Test for Random Sequence Generated by Möbius Function.
Proceedings of the IEEE International Conference on Consumer Electronics - Taiwan, 2019

Evaluating a Side-Channel Resistance against Order 4 Rational Points in Arduino Cryptography Library.
Proceedings of the 2019 Seventh International Symposium on Computing and Networking, 2019

A Side-Channel Attack Using Order 8 Rational Points against Curve25519 on an 8-Bit Microcontroller.
Proceedings of the 2019 Seventh International Symposium on Computing and Networking, 2019

Mutual Relationship between the Neural Network Model and Linear Complexity for Pseudorandom Binary Number Sequence.
Proceedings of the Seventh International Symposium on Computing and Networking Workshops, 2019

A Performance Analysis and Evaluation of SIDH with Implementation-Friendly Classes of Quadratic Extension Fields.
Proceedings of the 2019 Seventh International Symposium on Computing and Networking, 2019

A Preliminary Study on Methods to Eliminate Short Fruitless Cycles for Pollard's Rho Method for ECDLP over BN Curves.
Proceedings of the Seventh International Symposium on Computing and Networking Workshops, 2019

Decomposing the Inverse of a Masked Vector in an Isomorphic Galois Field for Perfectly Masked S-Box.
Proceedings of the 2019 Seventh International Symposium on Computing and Networking, 2019

An Analysis of Computational Complexity of Low Level Quantizers for Block Turbo Decoding for Product Codes of Binary Linear Code.
Proceedings of the Seventh International Symposium on Computing and Networking Workshops, 2019

Binary Sequence Generated by Alternative Trace Map Function and Its Properties.
Proceedings of the Seventh International Symposium on Computing and Networking Workshops, 2019

2018
Efficient Pairing-Based Cryptography on Raspberry Pi.
J. Commun., 2018

An Implementation of ECC with Twisted Montgomery Curve over 32nd Degree Tower Field on Arduino Uno.
Int. J. Netw. Comput., 2018

An Extended Generalized Minimum Distance Decoding for Binary Linear Codes on a 4-Level Quantization over an AWGN Channel.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2018

Analysis of a Sufficient Condition on the Optimality of a Decoded Codeword of Soft-Decision Decodings for Binary Linear Codes on a 4-Level Quantization over an AWGN Channel.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2018

Distribution of Digit Patterns in Multi-Value Sequence over the Odd Characteristic Field.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2018

Efficient Ate-Based Pairing over the Attractive Classes of BN Curves.
Proceedings of the Information Security Applications - 19th International Conference, 2018

A Construction of a Keyword Search to Allow Partial Matching with a Block Cipher.
Proceedings of the Information Security Applications - 19th International Conference, 2018

Side-Channel Attack using Order 4 Element against Curve25519 on ATmega328P.
Proceedings of the International Symposium on Information Theory and Its Applications, 2018

A Study on the Parameter of the Distinguished Point Method in Pollard's Rho Method for ECDLP.
Proceedings of the International Symposium on Information Theory and Its Applications, 2018

A Study on the Parameter Size of the Montgomery Trick for ECDLP.
Proceedings of the International Symposium on Information Theory and Its Applications, 2018

Bit Distribution of Binary Sequence Generated by Trace Function and Legendre Symbol Over Sub Extension Field.
Proceedings of the 6th International Conference on Information Technology: IoT and Smart City, 2018

Consideration of Efficient Pairing Applying Two Construction Methods of Extension Fields.
Proceedings of the Sixth International Symposium on Computing and Networking, 2018

Advanced Searchable Encryption: Keyword Search for Matrix-Type Storage.
Proceedings of the Sixth International Symposium on Computing and Networking, 2018

A Comparative Implementation of GLV Technique on KSS-16 Curve.
Proceedings of the Sixth International Symposium on Computing and Networking, 2018

Design of a Message Authentication Protocol for CAN FD Based on Chaskey Lightweight MAC.
Proceedings of the Sixth International Symposium on Computing and Networking, 2018

2017
A Study on the Error Performance of Soft-Decision Decodings for Binary Linear Codes on a 4-Level Quantization over an AWGN Channel.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2017

Solving 114-Bit ECDLP for a Barreto-Naehrig Curve.
Proceedings of the Information Security and Cryptology - ICISC 2017 - 20th International Conference, Seoul, South Korea, November 29, 2017

Study on Reduction on Average Computational Complexity of GMD Decoding Using Property of Bounded Distance Decoding.
Proceedings of the Fifth International Symposium on Computing and Networking, 2017

An Efficient Implementation of Trace Calculation over Finite Field for a Pseudorandom Sequence.
Proceedings of the Fifth International Symposium on Computing and Networking, 2017

An ECC Implementation with a Twisted Montgomery Curve over Fq32 on an 8-Bit Microcontroller.
Proceedings of the Fifth International Symposium on Computing and Networking, 2017

2016
A study on soft-out of soft-in/soft-out decoding algorithms for binary linear codes.
Proceedings of the 2016 International Symposium on Information Theory and Its Applications, 2016

2014
Introduction of a recursive method for specific weight binary vector generation in decreasing order of its reliability measure.
Proceedings of the International Symposium on Information Theory and its Applications, 2014

Experimental evaluation of the efficiency of associative rational points for random walks on ECDLP.
Proceedings of the 14th International Symposium on Communications and Information Technologies, 2014

2012
A Recursive Method for Vector Generation in Non-increasing Order of Its Likelihood for All Binary Vectors and Its Application for Linear Block Code Decodings.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2012

A soft-decision sphere decoding based on the recursive vector generator.
Proceedings of the International Symposium on Information Theory and its Applications, 2012

2010
Adaptive recursive MLD using ordered statistics for low rate codes.
Proceedings of the International Symposium on Information Theory and its Applications, 2010

A New method to reduce the probability of detection errors for a digital watermark using complementary decoding algorithms and minimum weight codewords of linear code.
Proceedings of the International Symposium on Information Theory and its Applications, 2010


  Loading...