Takagi Lab│Kyushu University  Institute of Mathematics for Industry

English

Japanese

Kyushu University
Institute of Mathematics for Industry
744, Motooka, Nishi-ku, Fukuoka
819-0395, Japan

Tel: +81-92-802-4456
Fax: +81-92-802-4405

Publications (Reviewed Papers)

2005

  • Lihua Wang, Takeshi Okamoto, Tsuyoshi Takagi, and Eiji Okamoto, "Insider Impersonation-MIM Attack to Tripartite Key Agreement Scheme and An Efficient Protocol for Multiple Keys", 2005 International Conference on Computational Intelligence and Security, CIS 2005, Part II, LNAI 3802, pp.198-203, 2005, © Springer-Verlag. (abstract)
  • Dong-Guk Han, Tsuyoshi Takagi, Tae Hyun Kim, Ho Won Kim, Kyo Il Chung, "Collision Attack on XTR and a Countermeasure with Fixed Pattern", The First International Workshop on Security in Ubiquitous Computing Systems, SecUbiq-05, LNCS 3823, pp. 864-873, 2005, © Springer-Verlag. (abstract, pdf)
  • Erik Dahmen, Katsuyuki Okeya, Tsuyoshi Takagi, "An Advanced Method for Joint Scalar Multiplications on Memory Constraint Devices", 2nd European Workshop on Security and Privacy in Ad hoc and Sensor Networks, ESAS 2005, LNCS 3813, pp.189-204, 2005, © Springer-Verlag. (abstract)
  • Katja Schmidt-Samoa, Tsuyoshi Takagi, "Paillier's Cryptosystem Modulo p2q and its Applications to Trapdoor Commitment Scheme", International Conference on Cryptology in Malaysia, Mycrypt 2005, LNCS 3715, pp.296-313, 2005, © Springer-Verlag. (abstract)
  • Katsuyuki Okeya, Tsuyoshi Takagi, Camille Vuillaume, "Short-Memory Scalar Multiplication on Koblitz Curves", Workshop on Cryptographic Hardware and Embedded Systems, CHES 2005, LNCS 3659, pp.91-105, 2005, © Springer-Verlag. (abstract)
  • Izuru Kitamura, Masanobu Katagi, Tsuyoshi Takagi, "A Complete Divisor Class Halving Algorithm for Hyperelliptic Curve Cryptosystems of Genus Two", 10th Australasian Conference on Information Security and Privacy, ACISP 2005, LNCS 3574, pp.146-157, 2005, © Springer-Verlag. (abstract)
  • Katsuyuki Okeya, Tsuyoshi Takagi, Camille Vuillaume, "Efficient Representations on Koblitz Curves with Resistance to Side Channel Attacks", 10th Australasian Conference on Information Security and Privacy, ACISP 2005, LNCS 3574, pp.218-229, 2005, © Springer-Verlag. (abstract)
  • Raylin Tso, Takeshi Okamoto, Tsuyoshi Takagi, Eiji Okamoto, "k-Resilient ID-Based Key Distribution Schemes from Pairing", International Workshop on Coding and Cryptography, WCC 2005, Bergen, Norway, pp.402-412, 2005.
  • Masanobu Katagi, Toru Akishita, Izuru Kitamura, Tsuyoshi Takagi, "Some Improved Algorithms for Hyperelliptic Curve Cryptosystems using Degenerate Divisors", 7th Annual International Conference on Information Security and Cryptology, ICISC 2004, LNCS 3506, pp.296-312, 2005, © Springer-Verlag. (abstract)
  • Masanobu Katagi, Izuru Kitamura, Toru Akishita, Tsuyoshi Takagi, "Novel Efficient Implementations of Hyperelliptic Curve Cryptosystems using Degenerate Divisors", Workshop on Information Security Applications, WISA 2004, LNCS 3325, pp.345-359, 2005, © Springer-Verlag. (abstract, pdf)
  • Katsuyuki Okeya, Tsuyoshi Takagi, Camille Vuillaume, "On the Importance of Δ in SFLASH against Side Channel Attacks", IEICE Transactions, Vol.E88-A, No.1, pp.123-131, IEICE, 2005, (abstract)
  • Toru Akishita, Tsuyoshi Takagi, "Zero-Value Register Attacks on Elliptic Curve Cryptosystem", IEICE Transactions, Vol.E88-A, No.1, pp.132-139, IEICE, 2005, (abstract)
  • Toru Akishita, Tsuyoshi Takagi, "On the Optimal Parameter Choice for Elliptic Curve Cryptosystems", IEICE Transactions, Vol.E88-A, No.1, pp.140-146, IEICE, 2005, (abstract)
  • Tetsuya Izu, Tsuyoshi Takagi, "Fast Elliptic Curve Multiplications Resistant against Side Channel Attacks", IEICE Transactions, Vol.E88-A, No.1, pp.161-171, IEICE, 2005, (abstract)
PAGETOP