An efficient and secure RFID security method with ownership transfer K Osaka, T Takagi, K Yamazaki, O Takahashi 2006 International Conference on Computational Intelligence and Security 2 …, 2006 | 278 | 2006 |
A fast parallel elliptic curve multiplication resistant against side channel attacks T Izu, T Takagi Public Key Cryptography: 5th International Workshop on Practice and Theory …, 2002 | 263 | 2002 |
Fast RSA-type cryptosystem modulo p k q T Takagi Advances in Cryptology—CRYPTO'98: 18th Annual International Cryptology …, 1998 | 250 | 1998 |
Zero-value point attacks on elliptic curve cryptosystem T Akishita, T Takagi ISC 2851, 218-233, 2003 | 193 | 2003 |
Signed binary representations revisited K Okeya, K Schmidt-Samoa, C Spahn, T Takagi CRYPTO 2004, 23-139, 2004 | 184 | 2004 |
Securing the Internet of Things in a quantum world C Cheng, R Lu, A Petzoldt, T Takagi IEEE Communications Magazine 55 (2), 116-120, 2017 | 179 | 2017 |
The Width-w NAF Method Provides Small Memory and Fast Elliptic Scalar Multiplications Secure against Side Channel Attacks K Okeya, T Takagi Topics in Cryptology—CT-RSA 2003: The Cryptographers’ Track at the RSA …, 2003 | 148 | 2003 |
Multiparty computation, an introduction D Catalano, R Cramer, G Di Crescenzo, I Darmgård, D Pointcheval, ... Contemporary cryptology, 41-87, 2005 | 142 | 2005 |
Improved progressive BKZ algorithms and their precise cost estimation by sharp simulator Y Aono, Y Wang, T Hayashi, T Takagi Advances in Cryptology–EUROCRYPT 2016: 35th Annual International Conference …, 2016 | 128 | 2016 |
Cryptographic Hardware and Embedded Systems-CHES 2011-13th International Workshop, Nara, Japan, September 28-October 1, 2011 B Preneel, T Takagi Proceedings 6917, 142-159, 0 | 117* | |
Improved elliptic curve multiplication methods resistant against side channel attacks T Izu, B Möller, T Takagi Progress in Cryptology—INDOCRYPT 2002: Third International Conference on …, 2002 | 110 | 2002 |
Certificateless hybrid signcryption F Li, M Shirase, T Takagi Information Security Practice and Experience: 5th International Conference …, 2009 | 93 | 2009 |
Exceptional procedure attack on elliptic curve cryptosystems T Izu, T Takagi Public Key Cryptography—PKC 2003: 6th International Workshop on Practice …, 2002 | 87 | 2002 |
Secure and controllable k-NN query over encrypted cloud data with key confidentiality Y Zhu, Z Huang, T Takagi Journal of Parallel and Distributed Computing 89, 1-12, 2016 | 84 | 2016 |
Digital signatures out of second-preimage resistant hash functions E Dahmen, K Okeya, T Takagi, C Vuillaume Post-Quantum Cryptography: Second International Workshop, PQCrypto 2008 …, 2008 | 80 | 2008 |
An algorithm for the nt pairing calculation in characteristic three and its hardware implementation JL Beuchat, M Shirase, T Takagi, E Okamoto 18th IEEE Symposium on Computer Arithmetic (ARITH'07), 97-104, 2007 | 80 | 2007 |
Efficient signcryption for heterogeneous systems F Li, H Zhang, T Takagi IEEE Systems Journal 7 (3), 420-429, 2013 | 79 | 2013 |
Algorithms and arithmetic operators for computing the ηT pairing in characteristic three JL Beuchat, N Brisebarre, J Detrey, E Okamoto, M Shirase, T Takagi IEEE Transactions on Computers 57 (11), 1454-1468, 2008 | 71 | 2008 |
Efficient conjunctive keyword-searchable encryption EK Ryu, T Takagi 21st International Conference on Advanced Information Networking and …, 2007 | 70 | 2007 |
A cryptosystem based on non-maximal imaginary quadratic orders with fast decryption D Hühnlein, MJ Jacobson, S Paulus, T Takagi Advances in Cryptology—EUROCRYPT'98: International Conference on the Theory …, 1998 | 56 | 1998 |