Takagi Lab│Kyushu University  Institute of Mathematics for Industry

English

Japanese

Kyushu University
Institute of Mathematics for Industry
744, Motooka, Nishi-ku, Fukuoka
819-0395, Japan

Tel: +81-92-802-4456
Fax: +81-92-802-4405

Publications (Reviewed Papers)

2016

  • Shinya Okumura, Koichiro Akiyama, Tsuyoshi Takagi, "An Estimate of the Complexity of the Section Finding Problem on Algebraic Surfaces", The Fourth International Symposium on Computing and Networking, CANDAR 2016, pp.28-36, 2016.
  • Jintai Ding, Momonari Kudo, Shinya Okumura, Tsuyoshi Takagi, Chengdong Tao, "Cryptanalysis of a public key cryptosystem based on Diophantine equations via weighted LLL reduction", 11th International Workshop on Security, IWSEC 2016, LNCS 9836, pp.305-315, 2016.
  • Shaoquan Jiang, Tsuyoshi Takagi, Guilin Wang, "Special Issue on Provable Security", Security and Communication Networks, Vol.9, No.12, pp.1635-1637, 2016.
  • Ye Yuan, Chen-Mou Cheng, Shinsaku Kiyomoto, Yutaka Miyake, Tsuyoshi Takagi, "Portable Implementation of Lattice-based Cryptography using JavaScript", International Journal of Networking and Computing, Vol.6, No.2, pp.309–327, 2016.
  • Duong Hoang Dung, Albrecht Petzoldt, Tsuyoshi Takagi, "Reducing the Key Size of the SRP Encryption Scheme", 21st Australasian Conference on Information Security and Privacy, ACISP 2016, LNCS 9723, pp.427-434, 2016.
  • Rui Xu, Kirill Morozov, Yanjiang Yang, Jianying Zhou, Tsuyoshi Takagi, "Privacy-preserving k-Nearest Neighbour Query on Outsourced Database", 21st Australasian Conference on Information Security and Privacy, ACISP 2016, LNCS 9722, pp.181-197, 2016.
  • Yoshinori Aono, Yuntao Wang, Takuya Hayashi, Tsuyoshi Takagi, "Improved Progressive BKZ Algorithms and their Precise Cost Estimation by Sharp Simulator", The 35th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Eurocrypt 2016, LNCS 9665, pp.789-819, 2016.
  • Keisuke Hakuta, Hisayoshi Sato, Tsuyoshi Takagi, "On tameness of Matsumoto-Imai central maps in three variables over the finite field F2", Advances in Mathematics of Communications, Vol.10, No.2, pp.221–228, 2016.
  • Youwen Zhu, Zhiqiu Huang, Tsuyoshi Takagi, "Secure and controllable k-NN query over encrypted cloud data with key confidentiality", Journal of Parallel and Distributed Computing, Vol.89, pp.1-12, 2016.
  • Chi Cheng, Jemin Lee, Tao Jiang, Tsuyoshi Takagi, "Security Analysis and Improvements on Two Homomorphic Authentication Schemes for Network Coding", IEEE Transactions on Information Forensics and Security, Vol.11, No.5, pp.993-1002,2016.
PAGETOP