Follow
Tsuyoshi Takagi
Tsuyoshi Takagi
Verified email at mist.i.u-tokyo.ac.jp - Homepage
Title
Cited by
Cited by
Year
An efficient and secure RFID security method with ownership transfer
K Osaka, T Takagi, K Yamazaki, O Takahashi
2006 International Conference on Computational Intelligence and Security 2 …, 2006
2822006
Fast RSA-type cryptosystem modulo p k q
T Takagi
Advances in Cryptology—CRYPTO'98: 18th Annual International Cryptology …, 1998
2761998
A fast parallel elliptic curve multiplication resistant against side channel attacks
T Izu, T Takagi
International Workshop on Public Key Cryptography, 280-296, 2002
2662002
Securing the Internet of Things in a quantum world
C Cheng, R Lu, A Petzoldt, T Takagi
IEEE Communications Magazine 55 (2), 116-120, 2017
2442017
Zero-value point attacks on elliptic curve cryptosystem
T Akishita, T Takagi
Information Security: 6th International Conference, ISC 2003, Bristol, UK …, 2003
2002003
Signed binary representations revisited
K Okeya, K Schmidt-Samoa, C Spahn, T Takagi
Advances in Cryptology–CRYPTO 2004: 24th Annual International Cryptology …, 2004
1882004
The Width-w NAF Method Provides Small Memory and Fast Elliptic Scalar Multiplications Secure against Side Channel Attacks
K Okeya, T Takagi
Topics in Cryptology—CT-RSA 2003: The Cryptographers’ Track at the RSA …, 2003
1602003
Improved progressive BKZ algorithms and their precise cost estimation by sharp simulator
Y Aono, Y Wang, T Hayashi, T Takagi
Advances in Cryptology–EUROCRYPT 2016: 35th Annual International Conference …, 2016
1562016
Multiparty computation, an introduction
D Catalano, R Cramer, G Di Crescenzo, I Darmgård, D Pointcheval, ...
Contemporary cryptology, 41-87, 2005
1462005
Cryptographic Hardware and Embedded Systems--CHES 2011: 13th International Workshop, Nara, Japan, September 28--October 1, 2011, Proceedings
B Preneel, T Takagi
Springer, 2011
123*2011
Improved elliptic curve multiplication methods resistant against side channel attacks
T Izu, B Möller, T Takagi
Progress in Cryptology—INDOCRYPT 2002: Third International Conference on …, 2002
1112002
Efficient signcryption for heterogeneous systems
F Li, H Zhang, T Takagi
IEEE Systems Journal 7 (3), 420-429, 2013
1002013
Certificateless hybrid signcryption
F Li, M Shirase, T Takagi
Information Security Practice and Experience: 5th International Conference …, 2009
982009
Secure and controllable k-NN query over encrypted cloud data with key confidentiality
Y Zhu, Z Huang, T Takagi
Journal of Parallel and Distributed Computing 89, 1-12, 2016
952016
Exceptional procedure attack on elliptic curve cryptosystems
T Izu, T Takagi
Public Key Cryptography—PKC 2003: 6th International Workshop on Practice …, 2002
932002
Digital signatures out of second-preimage resistant hash functions
E Dahmen, K Okeya, T Takagi, C Vuillaume
Post-Quantum Cryptography: Second International Workshop, PQCrypto 2008 …, 2008
872008
An algorithm for the nt pairing calculation in characteristic three and its hardware implementation
JL Beuchat, M Shirase, T Takagi, E Okamoto
18th IEEE Symposium on Computer Arithmetic (ARITH'07), 97-104, 2007
792007
Algorithms and arithmetic operators for computing the ηT pairing in characteristic three
JL Beuchat, N Brisebarre, J Detrey, E Okamoto, M Shirase, T Takagi
IEEE Transactions on Computers 57 (11), 1454-1468, 2008
752008
Efficient conjunctive keyword-searchable encryption
EK Ryu, T Takagi
21st International Conference on Advanced Information Networking and …, 2007
742007
A cryptosystem based on non-maximal imaginary quadratic orders with fast decryption
D Hühnlein, MJ Jacobson, S Paulus, T Takagi
Advances in Cryptology—EUROCRYPT'98: International Conference on the Theory …, 1998
611998
The system can't perform the operation now. Try again later.
Articles 1–20