Tsuyoshi Takagi

According to our database1, Tsuyoshi Takagi authored at least 281 papers between 1996 and 2019.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

Homepage:

On csauthors.net:

Bibliography

2019
Chosen Message Attack on Multivariate Signature ELSA at Asiacrypt 2017.
JIP, 2019

A Faster Constant-time Algorithm of CSIDH keeping Two Torsion Points.
IACR Cryptology ePrint Archive, 2019

How to Construct CSIDH on Edwards Curves.
IACR Cryptology ePrint Archive, 2019

LLL and stochastic sandpile models.
IACR Cryptology ePrint Archive, 2019

(Short Paper) A Faster Constant-Time Algorithm of CSIDH Keeping Two Points.
Proceedings of the Advances in Information and Computer Security, 2019

Security Analysis and Efficient Implementation of Code-based Signature Schemes.
Proceedings of the 5th International Conference on Information Systems Security and Privacy, 2019

Tight Reductions for Diffie-Hellman Variants in the Algebraic Group Model.
Proceedings of the Topics in Cryptology - CT-RSA 2019, 2019

One Sample Ring-LWE with Rounding and Its Application to Key Exchange.
Proceedings of the Applied Cryptography and Network Security, 2019

2018
Portable Implementation of Postquantum Encryption Schemes and Key Exchange Protocols on JavaScript-Enabled Platforms.
Security and Communication Networks, 2018

Hardness Evaluation for Search LWE Problem Using Progressive BKZ Simulator.
IEICE Transactions, 2018

Recent Developments in Post-Quantum Cryptography.
IEICE Transactions, 2018

An Efficient Key Generation of ZHFE Public Key Cryptosystem.
IEICE Transactions, 2018

Memory-Constrained Implementation of Lattice-based Encryption Scheme on the Standard Java Card Platform.
IACR Cryptology ePrint Archive, 2018

Tight Reductions for Diffie-Hellman Variants in the Algebraic Group Model.
IACR Cryptology ePrint Archive, 2018

Chosen Message Attack on Multivariate Signature ELSA at Asiacrypt 2017.
IACR Cryptology ePrint Archive, 2018

Why 1.02? The root Hermite factor of LLL and stochastic sandpile models.
CoRR, 2018

HFERP - A New Multivariate Encryption Scheme.
Proceedings of the Post-Quantum Cryptography - 9th International Conference, 2018

Estimated Cost for Solving Generalized Learning with Errors Problem via Embedding Techniques.
Proceedings of the Advances in Information and Computer Security, 2018

Chosen Message Attack on Multivariate Signature ELSA at Asiacrypt 2017.
Proceedings of the Advances in Information and Computer Security, 2018

An Improvement on the Linear Algebraic Attack for the Indeterminate Equation Encryption Scheme.
Proceedings of the International Symposium on Information Theory and Its Applications, 2018

On the Complexity of the LWR-Solving BKW Algorithm.
Proceedings of the Information Security and Cryptology - ICISC 2018, 2018

Improving the BKZ Reduction Algorithm by Quick Reordering Technique.
Proceedings of the Information Security and Privacy - 23rd Australasian Conference, 2018

Efficient Decryption Algorithms for Extension Field Cancellation Type Encryption Schemes.
Proceedings of the Information Security and Privacy - 23rd Australasian Conference, 2018

2017
Secret Sharing with Cheaters Using Multi-Receiver Authentication.
IEICE Transactions, 2017

Full Cryptanalysis of Hash Functions Based on Cubic Ramanujan Graphs.
IEICE Transactions, 2017

CyclicSRP - A Multivariate Encryption Scheme with a Partially Cyclic Public Key.
IEICE Transactions, 2017

Choosing Parameters for the Subfield Lattice Attack against overstretched NTRU.
IACR Cryptology ePrint Archive, 2017

A Public-key Encryption Scheme Based on Non-linear Indeterminate Equations (Giophantus).
IACR Cryptology ePrint Archive, 2017

Efficient outsourcing of secure k-nearest neighbour query over encrypted database.
Computers & Security, 2017

Securing the Internet of Things in a Quantum World.
IEEE Communications Magazine, 2017

A Public-Key Encryption Scheme Based on Non-linear Indeterminate Equations.
Proceedings of the Selected Areas in Cryptography - SAC 2017, 2017

The Beauty and the Beasts - The Hard Cases in LLL Reduction.
Proceedings of the Advances in Information and Computer Security, 2017

Choosing Parameters for the Subfield Lattice Attack Against Overstretched NTRU.
Proceedings of the Information Security - 20th International Conference, 2017

An Experimental Study of Kannan's Embedding Technique for the Search LWE Problem.
Proceedings of the Information and Communications Security - 19th International Conference, 2017

Memory-constrained implementation of lattice-based encryption scheme on standard Java Card.
Proceedings of the 2017 IEEE International Symposium on Hardware Oriented Security and Trust, 2017

Revisiting the Efficient Key Generation of ZHFE.
Proceedings of the Codes, Cryptology and Information Security, 2017

An Experimental Study of the BDD Approach for the Search LWE Problem.
Proceedings of the Applied Cryptography and Network Security, 2017

Secure and Efficient Pairing at 256-Bit Security Level.
Proceedings of the Applied Cryptography and Network Security, 2017

Introduction to CREST Crypto-Math Project.
Proceedings of the Mathematical Modelling for Next-Generation Cryptography: CREST Crypto-Math Project, 2017

2016
Efficient Deniably Authenticated Encryption and Its Application to E-Mail.
IEEE Trans. Information Forensics and Security, 2016

Security Analysis and Improvements on Two Homomorphic Authentication Schemes for Network Coding.
IEEE Trans. Information Forensics and Security, 2016

Revocable and strongly unforgeable identity-based signature scheme in the standard model.
Security and Communication Networks, 2016

Special issue on provable security.
Security and Communication Networks, 2016

Secure and controllable k-NN query over encrypted cloud data with key confidentiality.
J. Parallel Distrib. Comput., 2016

Portable Implementation of Lattice-based Cryptography using JavaScript.
IJNC, 2016

Revisiting the Efficient Key Generation of ZHFE.
IACR Cryptology ePrint Archive, 2016

Revisiting the Cubic UOV Signature Scheme.
IACR Cryptology ePrint Archive, 2016

Reducing the Key Size of the SRP Encryption Scheme - Extended version.
IACR Cryptology ePrint Archive, 2016

Improved Progressive BKZ Algorithms and their Precise Cost Estimation by Sharp Simulator.
IACR Cryptology ePrint Archive, 2016

On tameness of Matsumoto-Imai central maps in three variables over the finite field 𝔽2.
Adv. in Math. of Comm., 2016

Cryptanalysis of a Public Key Cryptosystem Based on Diophantine Equations via Weighted LLL Reduction.
Proceedings of the Advances in Information and Computer Security, 2016

Revisiting the Cubic UOV Signature Scheme.
Proceedings of the Information Security and Cryptology - ICISC 2016 - 19th International Conference, Seoul, South Korea, November 30, 2016

An Estimate of the Complexity of the Section Finding Problem on Algebraic Surfaces.
Proceedings of the Fourth International Symposium on Computing and Networking, 2016

Improved Progressive BKZ Algorithms and Their Precise Cost Estimation by Sharp Simulator.
Proceedings of the Advances in Cryptology - EUROCRYPT 2016, 2016

Privacy-Preserving k-Nearest Neighbour Query on Outsourced Database.
Proceedings of the Information Security and Privacy - 21st Australasian Conference, 2016

Reducing the Key Size of the SRP Encryption Scheme.
Proceedings of the Information Security and Privacy - 21st Australasian Conference, 2016

2015
On the Security of A Privacy-Preserving Product Calculation Scheme.
IEEE Trans. Dependable Sec. Comput., 2015

Revocable Identity-based Signcryption Scheme Without Random Oracles.
I. J. Network Security, 2015

Efficient scalar product protocol and its privacy-preserving application.
IJESDF, 2015

Note on Some Recent Cheater Identifiable Secret Sharing Schemes.
IEICE Transactions, 2015

Zero-Knowledge Protocols for Code-Based Public-Key Encryption.
IEICE Transactions, 2015

MQ Challenge: Hardness Evaluation of Solving Multivariate Quadratic Problems.
IACR Cryptology ePrint Archive, 2015

Security Analysis of Cryptosystems Using Short Generators over Ideal Lattices.
IACR Cryptology ePrint Archive, 2015

On Generalized First Fall Degree Assumptions.
IACR Cryptology ePrint Archive, 2015

A construction of 3-dimensional lattice sieve for number field sieve over F_{p^n}.
IACR Cryptology ePrint Archive, 2015

Cryptanalysis of a public key cryptosystem based on Diophantine equations via weighted LLL reduction.
IACR Cryptology ePrint Archive, 2015

Functional Encryption Resilient to Hard-to-Invert Leakage.
Comput. J., 2015

A multivariate quadratic challenge toward post-quantum generation cryptography.
ACM Comm. Computer Algebra, 2015

Portable Implementation of Lattice-Based Cryptography Using JavaScript.
Proceedings of the Third International Symposium on Computing and Networking, 2015

Constructing Pairing-Friendly Elliptic Curves Using Global Number Fields.
Proceedings of the Third International Symposium on Computing and Networking, 2015

2014
Unbounded anonymous hierarchical IBE with continual-key-leakage tolerance.
Security and Communication Networks, 2014

Collaborative agglomerative document clustering with limited information disclosure.
Security and Communication Networks, 2014

Efficient variant of Rainbow using sparse secret keys.
JoWUA, 2014

Anonymous spatial encryption under affine space delegation functionality with full security.
Inf. Sci., 2014

Fully secure constructions of spatial encryption with vector privacy.
Int. J. Communication Systems, 2014

Anonymous encryption with partial-order subset delegation and its application in privacy email systems.
IET Information Security, 2014

Security Analysis of Collusion-Resistant Nearest Neighbor Query Scheme on Encrypted Cloud Data.
IEICE Transactions, 2014

Efficient Privacy-Preserving Reputation Evaluation in Decentralized Environments.
IEICE Transactions, 2014

Improved Attacks on Multi-Prime RSA with Small Prime Difference.
IEICE Transactions, 2014

Security of Multivariate Signature Scheme Using Non-commutative Rings.
IEICE Transactions, 2014

Key Length Estimation of Pairing-Based Cryptosystems Using ηT Pairing over GF(3n).
IEICE Transactions, 2014

Extended Algorithm for Solving Underdefined Multivariate Quadratic Equations.
IEICE Transactions, 2014

Efficient Algorithm for Tate Pairing of Composite Order.
IEICE Transactions, 2014

Some properties of $τ$-adic expansions on hyperelliptic Koblitz curves.
CoRR, 2014

A Polynomial-Time Algorithm for Solving a Class of Underdetermined Multivariate Quadratic Equations over Fields of Odd Characteristics.
Proceedings of the Post-Quantum Cryptography - 6th International Workshop, 2014

Parallel Gauss Sieve Algorithm: Solving the SVP Challenge over a 128-Dimensional Ideal Lattice.
Proceedings of the Public-Key Cryptography - PKC 2014, 2014

Cheater Identifiable Secret Sharing Schemes via Multi-Receiver Authentication.
Proceedings of the Advances in Information and Computer Security, 2014

Efficient Variant of Rainbow without Triangular Matrix Representation.
Proceedings of the Information and Communication Technology, 2014

2013
Cryptanalysis and Improvement of Robust Deniable Authentication Protocol.
Wireless Personal Communications, 2013

Efficient Constructions of Anonymous Multireceiver Encryption Protocol and Their Deployment in Group E-mail Systems With Privacy Preservation.
IEEE Systems Journal, 2013

Efficient Signcryption for Heterogeneous Systems.
IEEE Systems Journal, 2013

Efficient and adaptively secure broadcast encryption systems.
Security and Communication Networks, 2013

Identity-based partially blind signature in the standard model for electronic cash.
Mathematical and Computer Modelling, 2013

Secure identity-based signcryption in the standard model.
Mathematical and Computer Modelling, 2013

Certificateless hybrid signcryption.
Mathematical and Computer Modelling, 2013

Public Key Replacement and Universal Forgery of a SCLS Scheme.
I. J. Network Security, 2013

Secure k-NN query on encrypted cloud database without key-sharing.
IJESDF, 2013

General Fault Attacks on Multivariate Public Key Cryptosystems.
IEICE Transactions, 2013

Parallel Gauss Sieve Algorithm: Solving the SVP in the Ideal Lattice of 128 dimensions.
IACR Cryptology ePrint Archive, 2013

Lattice-based signcryption.
Concurrency and Computation: Practice and Experience, 2013

Bounded Leakage-Resilient Functional Encryption with Hidden Vector Predicate.
Comput. J., 2013

Multivariate Signature Scheme Using Quadratic Forms.
Proceedings of the Post-Quantum Cryptography - 5th International Workshop, 2013

Extended Algorithm for Solving Underdefined Multivariate Quadratic Equations.
Proceedings of the Post-Quantum Cryptography - 5th International Workshop, 2013

On Cheater Identifiable Secret Sharing Schemes Secure against Rushing Adversary.
Proceedings of the Advances in Information and Computer Security, 2013

Efficient Algorithm for Tate Pairing of Composite Order.
Proceedings of the Advances in Information and Computer Security, 2013

Improvement of Faugère et al.'s Method to Solve ECDLP.
Proceedings of the Advances in Information and Computer Security, 2013

Post-quantum Strongly Unforgeable Identity-Based Signature Scheme from Lattices without Random Oracles.
Proceedings of the 2013 5th International Conference on Intelligent Networking and Collaborative Systems, 2013

Secure k-NN computation on encrypted cloud data without sharing key with query users.
Proceedings of the 2013 International Workshop on Security in Cloud Computing, 2013

A variant of rainbow with shorter secret key and faster signature generation.
Proceedings of the first ACM workshop on Asia public-key cryptography, 2013

Proof of plaintext knowledge for code-based public-key encryption revisited.
Proceedings of the 8th ACM Symposium on Information, Computer and Communications Security, 2013

An Experiment of Number Field Sieve for Discrete Logarithm Problem over GF(p 12).
Proceedings of the Number Theory and Cryptography, 2013

On Zero-Knowledge Identification Based on Q-ary Syndrome Decoding.
Proceedings of the Eighth Asia Joint Conference on Information Security, 2013

Attacks on Multi-Prime RSA with Small Prime Difference.
Proceedings of the Information Security and Privacy - 18th Australasian Conference, 2013

2012
Practical Identity-Based Signature for Wireless Sensor Networks.
IEEE Wireless Commun. Letters, 2012

Reconciling and improving of multi-receiver signcryption protocols with threshold decryption.
Security and Communication Networks, 2012

Identity-based online/offline signcryption for low power devices.
J. Network and Computer Applications, 2012

Privacy-Preserving OLAP for Accurate Answer.
Journal of Circuits, Systems, and Computers, 2012

Cryptanalysis of Strong Designated Verifier Signature Scheme with Non-delegatability and Non-transferability.
IEICE Transactions, 2012

Analysis and Improvement of a Secret Broadcast with Binding Encryption in Broadcasting Networks.
IEICE Transactions, 2012

Solving a 676-Bit Discrete Logarithm Problem in GF(36n).
IEICE Transactions, 2012

Key Length Estimation of Pairing-based Cryptosystems using ηT Pairing.
IACR Cryptology ePrint Archive, 2012

Breaking pairing-based cryptosystems using ηT pairing over GF(397).
IACR Cryptology ePrint Archive, 2012

Efficient signcryption in the standard model.
Concurrency and Computation: Practice and Experience, 2012

Further improvement of an identity-based signcryption scheme in the standard model.
Computers & Electrical Engineering, 2012

Efficient Secure Primitive for Privacy Preserving Distributed Computations.
Proceedings of the Advances in Information and Computer Security, 2012

Application of Scalar Multiplication of Edwards Curves to Pairing-Based Cryptography.
Proceedings of the Advances in Information and Computer Security, 2012

Key Length Estimation of Pairing-Based Cryptosystems Using η T Pairing.
Proceedings of the Information Security Practice and Experience, 2012

Batch Verification Suitable for Efficiently Verifying a Limited Number of Signatures.
Proceedings of the Information Security and Cryptology - ICISC 2012, 2012

Reducing the Key Size of Rainbow Using Non-commutative Rings.
Proceedings of the Topics in Cryptology - CT-RSA 2012 - The Cryptographers' Track at the RSA Conference 2012, San Francisco, CA, USA, February 27, 2012

Breaking Pairing-Based Cryptosystems Using η T Pairing over GF(397).
Proceedings of the Advances in Cryptology - ASIACRYPT 2012, 2012

Zero-Knowledge Protocols for the McEliece Encryption.
Proceedings of the Information Security and Privacy - 17th Australasian Conference, 2012

2011
Group-oriented setting's multisigncryption scheme with threshold designcryption.
Inf. Sci., 2011

Multibiometric Based Secure Encryption, Authentication Scheme with Fuzzy Extractor.
I. J. Network Security, 2011

Cryptanalysis and Fixed of Short Signature Scheme without Random Oracle from Bilinear Parings.
I. J. Network Security, 2011

An Improved Authenticated Encryption Scheme.
IEICE Transactions, 2011

Faster MapToPoint on Supersingular Elliptic Curves in Characteristic 3.
IEICE Transactions, 2011

Efficient Implementation of the etaT Pairing on GPU.
IACR Cryptology ePrint Archive, 2011

Anonymous Encryption with Partial-Order Subset Delegation Functionality.
Proceedings of the Provable Security - 5th International Conference, 2011

Efficient Identity-Based Signcryption in the Standard Model.
Proceedings of the Provable Security - 5th International Conference, 2011

General Fault Attacks on Multivariate Public Key Cryptosystems.
Proceedings of the Post-Quantum Cryptography - 4th International Workshop, 2011

Dual-Verifiers DVS with Message Recovery for Tolerant Routing in Wireless Sensor Networks.
Proceedings of the Intelligence and Security Informatics - Pacific Asia Workshop, 2011

An Experiment of Number Field Sieve over GF(p) of Low Hamming Weight Characteristic.
Proceedings of the Coding and Cryptology - Third International Workshop, 2011

GeoEnc: Geometric Area Based Keys and Policies in Functional Encryption Systems.
Proceedings of the Information Security and Privacy - 16th Australasian Conference, 2011

2010
Efficient arithmetic on subfield elliptic curves over small finite fields of odd characteristic.
J. Mathematical Cryptology, 2010

Solving a 676-bit Discrete Logarithm Problem in GF(36n).
IACR Cryptology ePrint Archive, 2010

Cryptanalysis of efficient proxy signature schemes for mobile communication.
SCIENCE CHINA Information Sciences, 2010

FPGA and ASIC implementations of the etaT pairing in characteristic three.
Computers & Electrical Engineering, 2010

Solving a 676-Bit Discrete Logarithm Problem in GF(36n).
Proceedings of the Public Key Cryptography, 2010

Fuzzy Biometric Signcryption Scheme with Bilinear Pairings in the Standard Model.
Proceedings of the Intelligence and Security Informatics, Pacific Asia Workshop, 2010

Towards Confidentiality of ID-Based Signcryption Schemes under without Random Oracle Model.
Proceedings of the Intelligence and Security Informatics, Pacific Asia Workshop, 2010

Efficient Implementation of Pairing on BREW Mobile Phones.
Proceedings of the Advances in Information and Computer Security, 2010

2009
One-wayness equivalent to general factoring.
IEEE Trans. Information Theory, 2009

Distributed Noise Generation for Density Estimation Based Clustering without Trusted Third Party.
IEICE Transactions, 2009

Security and Correctness Analysis on Privacy-Preserving k-Means Clustering Schemes.
IEICE Transactions, 2009

Efficient Implementation of Pairing-Based Cryptography on a Sensor Node.
IEICE Transactions, 2009

Identity-Based Hybrid Signcryption.
IACR Cryptology ePrint Archive, 2009

Certificateless Hybrid Signcryption.
IACR Cryptology ePrint Archive, 2009

A hybrid approach for privacy-preserving RFID tags.
Computer Standards & Interfaces, 2009

An Efficient Residue Group Multiplication for the etaT Pairing over F3m.
Proceedings of the Selected Areas in Cryptography, 16th Annual International Workshop, 2009

Certificateless Hybrid Signcryption.
Proceedings of the Information Security Practice and Experience, 2009

Identity-Based Hybrid Signcryption.
Proceedings of the The Forth International Conference on Availability, 2009

2008
Short-Memory Scalar Multiplication for Koblitz Curves.
IEEE Trans. Computers, 2008

Algorithms and Arithmetic Operators for Computing the etaT Pairing in Characteristic Three.
IEEE Trans. Computers, 2008

Efficient Implementation of the Pairing on Mobilephones Using BREW.
IEICE Transactions, 2008

Some Efficient Algorithms for the Final Exponentiation of etaT Pairing.
IEICE Transactions, 2008

A More Compact Representation of XTR Cryptosystem.
IEICE Transactions, 2008

Reduction Optimal Trinomials for Efficient Software Implementation of the etaT Pairing.
IEICE Transactions, 2008

Analysis and Improvement of Authenticatable Ring Signcryption Scheme.
IACR Cryptology ePrint Archive, 2008

FPGA and ASIC Implementations of the etaT Pairing in Characteristic Three.
IACR Cryptology ePrint Archive, 2008

Digital Signatures Out of Second-Preimage Resistant Hash Functions.
Proceedings of the Post-Quantum Cryptography, Second International Workshop, 2008

Faster Implementation of eta-T Pairing over GF(3m) Using Minimum Number of Logical Instructions for GF(3)-Addition.
Proceedings of the Pairing-Based Cryptography, 2008

Key Management Using Certificateless Public Key Cryptography in Ad Hoc Networks.
Proceedings of the Network and Parallel Computing, IFIP International Conference, 2008

Network Forensics on Mobile Ad-Hoc Networks.
Proceedings of the Knowledge-Based Intelligent Information and Engineering Systems, 2008

An Efficient Countermeasure against Side Channel Attacks for Pairing Computation.
Proceedings of the Information Security Practice and Experience, 2008

Efficient Arithmetic on Subfield Elliptic Curves over Small Finite Fields of Odd Characteristic.
Proceedings of the Information Security Practice and Experience, 2008

Efficient Multi-PKG ID-Based Signcryption for Ad Hoc Networks.
Proceedings of the Information Security and Cryptology, 4th International Conference, 2008

Efficient Signcryption Key Encapsulation without Random Oracles.
Proceedings of the Information Security and Cryptology, 4th International Conference, 2008

On the Security of Online/Offline Signatures and Multisignatures from ACISP'06.
Proceedings of the Cryptology and Network Security, 7th International Conference, 2008

A New Scheme for Distributed Density Estimation based Privacy-Preserving Clustering.
Proceedings of the The Third International Conference on Availability, 2008

A Secure RFID Protocol based on Insubvertible Encryption Using Guardian Proxy.
Proceedings of the The Third International Conference on Availability, 2008

2007
A New Upper Bound for the Minimal Density of Joint Representations in Elliptic Curve Cryptosystems.
IEICE Transactions, 2007

Efficient Implementation of the Pairing on Mobilephones using BREW.
IACR Cryptology ePrint Archive, 2007

A Refined Algorithm for the etaT Pairing Calculation in Characteristic Three.
IACR Cryptology ePrint Archive, 2007

A Coprocessor for the Final Exponentiation of the etaT Pairing in Characteristic Three.
IACR Cryptology ePrint Archive, 2007

Algorithms and Arithmetic Operators for Computing the etaT Pairing in Characteristic Three.
IACR Cryptology ePrint Archive, 2007

Efficient Implementation of the Pairing on Mobilephones Using BREW.
Proceedings of the Information Security Applications, 8th International Workshop, 2007

Universal etaT Pairing Algorithm over Arbitrary Extension Degree.
Proceedings of the Information Security Applications, 8th International Workshop, 2007

A Coprocessor for the Final Exponentiation of the eta T Pairing in Characteristic Three.
Proceedings of the Arithmetic of Finite Fields, First International Workshop, 2007

Reduction Optimal Trinomials for Efficient Software Implementation of the etaT Pairing.
Proceedings of the Advances in Information and Computer Security, 2007

Two-Party Privacy-Preserving Agglomerative Document Clustering.
Proceedings of the Information Security Practice and Experience, 2007

Some Efficient Algorithms for the Final Exponentiation of eta T Pairing.
Proceedings of the Information Security Practice and Experience, 2007

An Algorithm for the nt Pairing Calculation in Characteristic Three and its Hardware Implementation.
Proceedings of the 18th IEEE Symposium on Computer Arithmetic (ARITH-18 2007), 2007

Privacy-Preserving Two-Party K-Means Clustering via Secure Approximation.
Proceedings of the 21st International Conference on Advanced Information Networking and Applications (AINA 2007), 2007

Efficient Conjunctive Keyword-Searchable Encryption.
Proceedings of the 21st International Conference on Advanced Information Networking and Applications (AINA 2007), 2007

Compressed XTR.
Proceedings of the Applied Cryptography and Network Security, 5th International Conference, 2007

2006
Analysis of Fractional Window Recoding Methods and Their Application to Elliptic Curve Cryptosystems.
IEEE Trans. Computers, 2006

Security analysis of CRT-based cryptosystems.
Int. J. Inf. Sec., 2006

Defeating Simple Power Analysis on Koblitz Curves.
IEICE Transactions, 2006

Radix-r Non-Adjacent Form and Its Application to Pairing-Based Cryptosystem.
IEICE Transactions, 2006

Generalized Powering Functions and Their Application to Digital Signatures.
IEICE Transactions, 2006

Security Analysis of the SPA-Resistant Fractional Width Method.
IEICE Transactions, 2006

Efficient Hyperelliptic Curve Cryptosystems Using Theta Divisors.
IEICE Transactions, 2006

Some Efficient Algorithms for the Final Exponentiation of ηT Pairing.
IACR Cryptology ePrint Archive, 2006

Side Channel Attacks and Countermeasures on Pairing Based Cryptosystems over Binary Fields.
IACR Cryptology ePrint Archive, 2006

Efficient Implementation of Tate Pairing on a Mobile Phone using Java.
IACR Cryptology ePrint Archive, 2006

An Algorithm for the ηT Pairing Calculation in Characteristic Three and its Hardware Implementation.
IACR Cryptology ePrint Archive, 2006

Further Security Analysis of XTR.
Proceedings of the Information Security Practice and Experience, 2006

New Security Problem in RFID Systems "Tag Killing".
Proceedings of the Computational Science and Its Applications, 2006

An Efficient and Secure RFID Security Method with Ownership Transfer.
Proceedings of the Computational Intelligence and Security, International Conference, 2006

Efficient Implementation of Tate Pairing on a Mobile Phone Using Java.
Proceedings of the Computational Intelligence and Security, International Conference, 2006

Power Analysis to ECC Using Differential Power Between Multiplication and Squaring.
Proceedings of the Smart Card Research and Advanced Applications, 2006

Side Channel Attacks and Countermeasures on Pairing Based Cryptosystems over Binary Fields.
Proceedings of the Cryptology and Network Security, 5th International Conference, 2006

New Approach for Selectively Convertible Undeniable Signature Schemes.
Proceedings of the Advances in Cryptology, 2006

2005
On the Importance of Protecting in SFLASH against Side Channel Attacks.
IEICE Transactions, 2005

Fast Elliptic Curve Multiplications Resistant against Side Channel Attacks.
IEICE Transactions, 2005

On the Optimal Parameter Choice for Elliptic Curve Cryptosystems Using Isogeny.
IEICE Transactions, 2005

Zero-Value Register Attack on Elliptic Curve Cryptosystem.
IEICE Transactions, 2005

One-Wayness Equivalent to General Factoring.
IACR Cryptology ePrint Archive, 2005

Collision Attack on XTR and a Countermeasure with a Fixed Pattern.
IACR Cryptology ePrint Archive, 2005

Some Analysis of Radix-r Representations.
IACR Cryptology ePrint Archive, 2005

Some Explicit Formulae of NAF and its Left-to-Right Analogue.
IACR Cryptology ePrint Archive, 2005

Efficient Arithmetic on Subfield Elliptic Curves over Small Odd Characteristics.
IACR Cryptology ePrint Archive, 2005

Paillier's Cryptosystem Modulo p2q and Its Applications to Trapdoor Commitment Schemes.
Proceedings of the Progress in Cryptology, 2005

Collision Attack on XTR and a Countermeasure with a Fixed Pattern.
Proceedings of the Embedded and Ubiquitous Computing - EUC 2005 Workshops, 2005

An Advanced Method for Joint Scalar Multiplications on Memory Constraint Devices.
Proceedings of the Security and Privacy in Ad-hoc and Sensor Networks, 2005

Insider Impersonation-MIM Attack to Tripartite Key Agreement Scheme and an Efficient Protocol for Multiple Keys.
Proceedings of the Computational Intelligence and Security, International Conference, 2005

Short Memory Scalar Multiplication on Koblitz Curves.
Proceedings of the Cryptographic Hardware and Embedded Systems - CHES 2005, 7th International Workshop, Edinburgh, UK, August 29, 2005

An id-based non-interactive tripartite key agreement protocol with K-resilience.
Proceedings of the Third IASTED International Conference on Communications and Computer Networks, 2005

Efficient Representations on Koblitz Curves with Resistance to Side Channel Attacks.
Proceedings of the Information Security and Privacy, 10th Australasian Conference, 2005

A Complete Divisor Class Halving Algorithm for Hyperelliptic Curve Cryptosystems of Genus Two.
Proceedings of the Information Security and Privacy, 10th Australasian Conference, 2005

2004
A Fast RSA-Type Public-Key Primitive Modulo pkq Using Hensel Lifting.
IEICE Transactions, 2004

SCA-Resistant and Fast Elliptic Scalar Multiplication Based on wNAF.
IEICE Transactions, 2004

Fast Elliptic Curve Multiplications with SIMD Operations.
IEICE Transactions, 2004

Signed Binary Representations Revisited.
IACR Cryptology ePrint Archive, 2004

A Complete Divisor Class Halving Algorithm for Hyperelliptic Curve Cryptosystems of Genus Two.
IACR Cryptology ePrint Archive, 2004

Efficient Undeniable Signature Schemes Based on Ideal Arithmetic in Quadratic Orders.
Des. Codes Cryptogr., 2004

Novel Efficient Implementations of Hyperelliptic Curve Cryptosystems Using Degenerate Divisors.
Proceedings of the Information Security Applications, 5th International Workshop, 2004

On the Optimal Parameter Choice for Elliptic Curve Cryptosystems Using Isogeny.
Proceedings of the Public Key Cryptography, 2004

On the Importance of Protecting Delta in SFLASH against Side Channel Attacks.
Proceedings of the International Conference on Information Technology: Coding and Computing (ITCC'04), 2004

Radix-r Non-Adjacent Form.
Proceedings of the Information Security, 7th International Conference, 2004

Behavior selection and motion modulation in emotionally grounded architecture for QRIO SDR-4XII.
Proceedings of the 2004 IEEE/RSJ International Conference on Intelligent Robots and Systems, Sendai, Japan, September 28, 2004

Exact Analysis of Montgomery Multiplication.
Proceedings of the Progress in Cryptology, 2004

A Provably Secure Elliptic Curve Scheme with Fast Encryption.
Proceedings of the Progress in Cryptology, 2004

Behavior Description and Control using Behavior Module for Personal Robot.
Proceedings of the 2004 IEEE International Conference on Robotics and Automation, 2004

Some Improved Algorithms for Hyperelliptic Curve Cryptosystems Using Degenerate Divisors.
Proceedings of the Information Security and Cryptology, 2004

Learning behavior selection through interaction based on emotionally grounded symbol concept.
Proceedings of the 4th IEEE/RAS International Conference on Humanoid Robots, 2004

Signed Binary Representations Revisited.
Proceedings of the Advances in Cryptology, 2004

Security Analysis of CRT-Based Cryptosystems.
Proceedings of the Applied Cryptography and Network Security, 2004

On the Exact Flexibility of the Flexible Countermeasure Against Side Channel Attacks.
Proceedings of the Information Security and Privacy: 9th Australasian Conference, 2004

2003
An ethological and emotional basis for human-robot interaction.
Robotics and Autonomous Systems, 2003

Some RSA-based Encryption Schemes with Tight Security Reduction.
IACR Cryptology ePrint Archive, 2003

Novel Efficient Implementations of Hyperelliptic Curve Cryptosystems using Degenerate Divisors.
IACR Cryptology ePrint Archive, 2003

Exceptional Procedure Attack on Elliptic Curve Cryptosystems.
Proceedings of the Public Key Cryptography, 2003

Zero-Value Point Attacks on Elliptic Curve Cryptosystem.
Proceedings of the Information Security, 6th International Conference, 2003

The Width-w NAF Method Provides Small Memory and Fast Elliptic Scalar Multiplications Secure against Side Channel Attacks.
Proceedings of the Topics in Cryptology, 2003

A More Flexible Countermeasure against Side Channel Attacks Using Window Method.
Proceedings of the Cryptographic Hardware and Embedded Systems, 2003

Generalized Powering Functions and Their Application to Digital Signatures.
Proceedings of the Advances in Cryptology - ASIACRYPT 2003, 9th International Conference on the Theory and Application of Cryptology and Information Security, Taipei, Taiwan, November 30, 2003

Some RSA-Based Encryption Schemes with Tight Security Reduction.
Proceedings of the Advances in Cryptology - ASIACRYPT 2003, 9th International Conference on the Theory and Application of Cryptology and Information Security, Taipei, Taiwan, November 30, 2003

A Complete and Explicit Security Reduction Algorithm for RSA-Based Cryptosystems.
Proceedings of the Advances in Cryptology - ASIACRYPT 2003, 9th International Conference on the Theory and Application of Cryptology and Information Security, Taipei, Taiwan, November 30, 2003

2002
New Semantically Secure Public-Key Cryptosystems from the RSA-Primitive.
Proceedings of the Public Key Cryptography, 2002

A Fast Parallel Elliptic Curve Multiplication Resistant against Side Channel Attacks.
Proceedings of the Public Key Cryptography, 2002

Improved Elliptic Curve Multiplication Methods Resistant against Side Channel Attacks.
Proceedings of the Progress in Cryptology, 2002

A Reject Timing Attackon an IND-CCA2 Public-Key Cryptosystem.
Proceedings of the Information Security and Cryptology, 2002

Efficient Computations of the Tate Pairingfor the Large MOV Degrees.
Proceedings of the Information Security and Cryptology, 2002

Fast Elliptic Curve Multiplications with SIMD Operations.
Proceedings of the Information and Communications Security, 4th International Conference, 2002

On the Security of a Modified Paillier Public-Key Primitive.
Proceedings of the Information Security and Privacy, 7th Australian Conference, 2002

A New Distributed Primality Test for Shared RSA Keys Using Quadratic Fields.
Proceedings of the Information Security and Privacy, 7th Australian Conference, 2002

2001
New public-key cryptosystems with fast decryption.
PhD thesis, 2001

How to Choose Secret Parameters for RSA-Type Cryptosystems over Elliptic Curves.
Des. Codes Cryptogr., 2001

Ethological Modeling and Architecture for an Entertainment Robot.
Proceedings of the 2001 IEEE International Conference on Robotics and Automation, 2001

An IND-CCA2 Public-Key Cryptosystem with Fast Decryption.
Proceedings of the Information Security and Cryptology, 2001

Architecture and preliminary experimental results for emotionally grounded symbol acquisition.
Proceedings of the Fifth International Conference on Autonomous Agents, 2001

2000
A New Public-Key Cryptosystem over a Quadratic Order with Quadratic Decryption Time.
J. Cryptology, 2000

1999
NICE - New Ideal Coset Encryption.
Proceedings of the Cryptographic Hardware and Embedded Systems, 1999

Reducing Logarithms in Totally Non-maximal Imaginary Quadratic Orders to Logarithms in Finite Fields.
Proceedings of the Advances in Cryptology, 1999

1998
A generalization of the Diffie-Hellman problem and related cryptosystems allowing fast decryption.
Proceedings of the 1st International Conference on Information Security and Cryptology, 1998

Rabin and RSA analogues based on non-maximal imaginary quadratic orders.
Proceedings of the 1st International Conference on Information Security and Cryptology, 1998

A Cryptosystem Based on Non-maximal Imaginary Quadratic Orders with Fast Decryption.
Proceedings of the Advances in Cryptology - EUROCRYPT '98, International Conference on the Theory and Application of Cryptographic Techniques, Espoo, Finland, May 31, 1998

Fast RSA-Type Cryptosystem Modulo pkq.
Proceedings of the Advances in Cryptology, 1998

1997
Fast RSA-Type Cryptosystems Using N-Adic Expansion.
Proceedings of the Advances in Cryptology, 1997

1996
The Multi-variable Modular Polynomial and Its Applications to Cryptography.
Proceedings of the Algorithms and Computation, 7th International Symposium, 1996


  Loading...