Tsuyoshi Takagi
Tsuyoshi Takagi
Verified email at - Homepage
Cited by
Cited by
An efficient and secure RFID security method with ownership transfer
K Osaka, T Takagi, K Yamazaki, O Takahashi
2006 International Conference on Computational Intelligence and Security 2 …, 2006
A fast parallel elliptic curve multiplication resistant against side channel attacks
T Izu, T Takagi
Public Key Cryptography: 5th International Workshop on Practice and Theory …, 2002
Fast RSA-type cryptosystem modulo p k q
T Takagi
Advances in Cryptology—CRYPTO'98: 18th Annual International Cryptology …, 1998
Zero-value point attacks on elliptic curve cryptosystem
T Akishita, T Takagi
ISC 2851, 218-233, 2003
Signed binary representations revisited
K Okeya, K Schmidt-Samoa, C Spahn, T Takagi
CRYPTO 2004, 23-139, 2004
Securing the Internet of Things in a quantum world
C Cheng, R Lu, A Petzoldt, T Takagi
IEEE Communications Magazine 55 (2), 116-120, 2017
The Width-w NAF Method Provides Small Memory and Fast Elliptic Scalar Multiplications Secure against Side Channel Attacks
K Okeya, T Takagi
Topics in Cryptology—CT-RSA 2003: The Cryptographers’ Track at the RSA …, 2003
Multiparty computation, an introduction
D Catalano, R Cramer, G Di Crescenzo, I Darmgård, D Pointcheval, ...
Contemporary cryptology, 41-87, 2005
Improved progressive BKZ algorithms and their precise cost estimation by sharp simulator
Y Aono, Y Wang, T Hayashi, T Takagi
Advances in Cryptology–EUROCRYPT 2016: 35th Annual International Conference …, 2016
Cryptographic Hardware and Embedded Systems-CHES 2011-13th International Workshop, Nara, Japan, September 28-October 1, 2011
B Preneel, T Takagi
Proceedings 6917, 142-159, 0
Improved elliptic curve multiplication methods resistant against side channel attacks
T Izu, B Möller, T Takagi
Progress in Cryptology—INDOCRYPT 2002: Third International Conference on …, 2002
Certificateless hybrid signcryption
F Li, M Shirase, T Takagi
Information Security Practice and Experience: 5th International Conference …, 2009
Exceptional procedure attack on elliptic curve cryptosystems
T Izu, T Takagi
Public Key Cryptography—PKC 2003: 6th International Workshop on Practice …, 2002
Secure and controllable k-NN query over encrypted cloud data with key confidentiality
Y Zhu, Z Huang, T Takagi
Journal of Parallel and Distributed Computing 89, 1-12, 2016
Digital signatures out of second-preimage resistant hash functions
E Dahmen, K Okeya, T Takagi, C Vuillaume
Post-Quantum Cryptography: Second International Workshop, PQCrypto 2008 …, 2008
An algorithm for the nt pairing calculation in characteristic three and its hardware implementation
JL Beuchat, M Shirase, T Takagi, E Okamoto
18th IEEE Symposium on Computer Arithmetic (ARITH'07), 97-104, 2007
Efficient signcryption for heterogeneous systems
F Li, H Zhang, T Takagi
IEEE Systems Journal 7 (3), 420-429, 2013
Algorithms and arithmetic operators for computing the ηT pairing in characteristic three
JL Beuchat, N Brisebarre, J Detrey, E Okamoto, M Shirase, T Takagi
IEEE Transactions on Computers 57 (11), 1454-1468, 2008
Efficient conjunctive keyword-searchable encryption
EK Ryu, T Takagi
21st International Conference on Advanced Information Networking and …, 2007
A cryptosystem based on non-maximal imaginary quadratic orders with fast decryption
D Hühnlein, MJ Jacobson, S Paulus, T Takagi
Advances in Cryptology—EUROCRYPT'98: International Conference on the Theory …, 1998
The system can't perform the operation now. Try again later.
Articles 1–20