Takagi Lab│Kyushu University  Institute of Mathematics for Industry

English

Japanese

Kyushu University
Institute of Mathematics for Industry
744, Motooka, Nishi-ku, Fukuoka
819-0395, Japan

Tel: +81-92-802-4456
Fax: +81-92-802-4405

Publications (Reviewed Papers)

2003

  • Karou Kurosawa, Katja Schmidt-Samoa, Tsuyoshi Takagi, "A Complete and Explicit Security Reduction Algorithm for RSA-based Cryptosystems", Asiacrypt 2003, LNCS 2894, pp.474-491, 2003, © Springer-Verlag. (abstract, pdf)
  • Karou Kurosawa, Tsuyoshi Takagi, "Some RSA-based Encryption Schemes with Tight Security Reduction", Asiacrypt 2003, LNCS 2894, pp.19-36, 2003, © Springer-Verlag. (abstract, pdf)
  • Hisayoshi Sato, Tsuyoshi Takagi, Satoru Tezuka, Kazuo Takaragi, Generalized Powering Functions and their Application to Digital Signatures Asiacrypt 2003, LNCS 2894, pp.434-451, 2003, © Springer-Verlag. (abstract, pdf)
  • Toru Akishita, Tsuyoshi Takagi, "Zero-Value Point Attacks on Elliptic Curve Cryptosystems", 6th Information Security Conference, ISC 2003, LNCS 2851, pp.218-233, 2003, © Springer-Verlag. (abstract, pdf)
  • Katsuyuki Okeya, Tsuyoshi Takagi, "A More Flexible Countermeasure against Side Channel Attacks using Window Method", Workshop on Cryptographic Hardware and Embedded Systems, CHES 2003, LNCS 2779, pp.397-410, 2003, © Springer-Verlag. (abstract, pdf)
  • Katsuyuki Okeya, Tsuyoshi Takagi, "The Width-w NAF Method Provides Small Memory and Fast Elliptic Scalar Multiplications Secure against Side Channel Attacks", Cryptographers' Track RSA Conference 2003, CT-RSA 2003, LNCS 2612, pp.328-342, 2003, © Springer-Verlag. (ps)
  • Tetsuya Izu, Tsuyoshi Takagi, "Efficient Computations of the Tate Pairing for the Large MOV degrees", 5th International Conference on Information Security and Cryptology, ICISC 2002, LNCS 2587, pp.283-297, 2003, © Springer-Verlag. (pdf)
  • Kouichi Sakurai, Tsuyoshi Takagi, "A Reject Timing Attack on an IND-CCA2 Public-Key Cryptosystem", 5th International Conference on Information Security and Cryptology, ICISC 2002, LNCS 2587, pp.359-379, 2003, © Springer-Verlag. (pdf)
  • Tetsuya Izu, Tsuyoshi Takagi, "Exceptional Procedure Attack on Elliptic Curve Cryptosystems", 6th International Workshop on Practice and Theory in Public Key Cryptography, PKC 2003, LNCS 2567, pp.224-239, 2003, © Springer-Verlag. (pdf)
PAGETOP