An efficient and secure RFID security method with ownership transfer K Osaka, T Takagi, K Yamazaki, O Takahashi 2006 International Conference on Computational Intelligence and Security 2 …, 2006 | 282 | 2006 |
Fast RSA-type cryptosystem modulo p k q T Takagi Advances in Cryptology—CRYPTO'98: 18th Annual International Cryptology …, 1998 | 276 | 1998 |
A fast parallel elliptic curve multiplication resistant against side channel attacks T Izu, T Takagi International Workshop on Public Key Cryptography, 280-296, 2002 | 266 | 2002 |
Securing the Internet of Things in a quantum world C Cheng, R Lu, A Petzoldt, T Takagi IEEE Communications Magazine 55 (2), 116-120, 2017 | 244 | 2017 |
Zero-value point attacks on elliptic curve cryptosystem T Akishita, T Takagi Information Security: 6th International Conference, ISC 2003, Bristol, UK …, 2003 | 200 | 2003 |
Signed binary representations revisited K Okeya, K Schmidt-Samoa, C Spahn, T Takagi Advances in Cryptology–CRYPTO 2004: 24th Annual International Cryptology …, 2004 | 188 | 2004 |
The Width-w NAF Method Provides Small Memory and Fast Elliptic Scalar Multiplications Secure against Side Channel Attacks K Okeya, T Takagi Topics in Cryptology—CT-RSA 2003: The Cryptographers’ Track at the RSA …, 2003 | 160 | 2003 |
Improved progressive BKZ algorithms and their precise cost estimation by sharp simulator Y Aono, Y Wang, T Hayashi, T Takagi Advances in Cryptology–EUROCRYPT 2016: 35th Annual International Conference …, 2016 | 156 | 2016 |
Multiparty computation, an introduction D Catalano, R Cramer, G Di Crescenzo, I Darmgård, D Pointcheval, ... Contemporary cryptology, 41-87, 2005 | 146 | 2005 |
Cryptographic Hardware and Embedded Systems--CHES 2011: 13th International Workshop, Nara, Japan, September 28--October 1, 2011, Proceedings B Preneel, T Takagi Springer, 2011 | 123* | 2011 |
Improved elliptic curve multiplication methods resistant against side channel attacks T Izu, B Möller, T Takagi Progress in Cryptology—INDOCRYPT 2002: Third International Conference on …, 2002 | 111 | 2002 |
Efficient signcryption for heterogeneous systems F Li, H Zhang, T Takagi IEEE Systems Journal 7 (3), 420-429, 2013 | 100 | 2013 |
Certificateless hybrid signcryption F Li, M Shirase, T Takagi Information Security Practice and Experience: 5th International Conference …, 2009 | 98 | 2009 |
Secure and controllable k-NN query over encrypted cloud data with key confidentiality Y Zhu, Z Huang, T Takagi Journal of Parallel and Distributed Computing 89, 1-12, 2016 | 95 | 2016 |
Exceptional procedure attack on elliptic curve cryptosystems T Izu, T Takagi Public Key Cryptography—PKC 2003: 6th International Workshop on Practice …, 2002 | 93 | 2002 |
Digital signatures out of second-preimage resistant hash functions E Dahmen, K Okeya, T Takagi, C Vuillaume Post-Quantum Cryptography: Second International Workshop, PQCrypto 2008 …, 2008 | 87 | 2008 |
An algorithm for the nt pairing calculation in characteristic three and its hardware implementation JL Beuchat, M Shirase, T Takagi, E Okamoto 18th IEEE Symposium on Computer Arithmetic (ARITH'07), 97-104, 2007 | 79 | 2007 |
Algorithms and arithmetic operators for computing the ηT pairing in characteristic three JL Beuchat, N Brisebarre, J Detrey, E Okamoto, M Shirase, T Takagi IEEE Transactions on Computers 57 (11), 1454-1468, 2008 | 75 | 2008 |
Efficient conjunctive keyword-searchable encryption EK Ryu, T Takagi 21st International Conference on Advanced Information Networking and …, 2007 | 74 | 2007 |
A cryptosystem based on non-maximal imaginary quadratic orders with fast decryption D Hühnlein, MJ Jacobson, S Paulus, T Takagi Advances in Cryptology—EUROCRYPT'98: International Conference on the Theory …, 1998 | 61 | 1998 |