Cryptographers' World
 

Tsuyoshi Takagi


Author's Web Page Link

26 papers in database with 579 citations Star

H-number: 14

Journal Papers

[Sort papers chronologically] [Sort papers by citations count]

 
1. Ingrid Biehl,  Sachar Paulus,  Tsuyoshi Takagi,  Efficient Undeniable Signature Schemes Based on Ideal Arithmetic in Quadratic Orders, Designs, Codes and Cryptography, Volume 31(2), pp. 99 - 123, Springer, 2004.

[Electronic Edition][Cited 16 times ]

2. Marc Joye,  Jean-Jacques Quisquater,  Tsuyoshi Takagi,  How to Choose Secret Parameters for RSA-Type Cryptosystems over Elliptic Curves, Designs, Codes and Cryptography, Volume 23(3), pp. 297 - 316, Springer, 2001.

[Electronic Edition][Cited 1 times ]

3. Sachar Paulus,  Tsuyoshi Takagi,  A New Public-Key Cryptosystem over a Quadratic Order with Quadratic Decryption Time, Journal of Cryptology, Volume 13(2), pp. 263 - 272, Springer, 2000.

[Cited 28 times ]

Conference Papers

[Sort papers chronologically] [Sort papers by citations count]

1. Masaaki Shirase,  Dong-Guk Han,  Yasushi Hibino,  Ho Won Kim,  Tsuyoshi Takagi,  Compressed XTR, pp. 420 - 431, ACNS 2007.

[Electronic Edition][Cited 1 times ]

2. Kaoru Kurosawa,  Tsuyoshi Takagi,  New Approach for Selectively Convertible Undeniable Signature Schemes, pp. 428 - 443, ASIACRYPT 2006.

[Electronic Edition][Cited 15 times ]

3. Katja Schmidt-Samoa,  Tsuyoshi Takagi,  Paillier's cryptosystem modulo p^2q and its applications to trapdoor commitment schemes, pp. 296 - 313, MYCRYPT 2005.

[Electronic Edition][Cited 9 times ]

4. Katsuyuki Okeya,  Tsuyoshi Takagi,  Camille Vuillaume,  Short Memory Scalar Multiplication on Koblitz Curves, pp. 91 - 105, CHES 2005.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 10 times ]

5. David Galindo,  Sebastià Martín Molleví,  Tsuyoshi Takagi,  Jorge Luis Villar,  A Provably Secure Elliptic Curve Scheme with Fast Encryption, pp. 245 - 259, INDOCRYPT 2004.

[Electronic Edition][Cited 25 times ]

6. Hisayoshi Sato,  Daniel Schepers,  Tsuyoshi Takagi,  Exact Analysis of Montgomery Multiplication, pp. 290 - 304, INDOCRYPT 2004.

[Electronic Edition][Cited 4 times ]

7. Katsuyuki Okeya,  Katja Schmidt-Samoa,  Christian Spahn,  Tsuyoshi Takagi,  Signed Binary Representations Revisited, pp. 123 - 139, CRYPTO 2004.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 69 times Red Star]

8. Katsuyuki Okeya,  Tsuyoshi Takagi,  Security Analysis of CRT-Based Cryptosystems, pp. 383 - 397, ACNS 2004.

[Electronic Edition][Cited 6 times ]

9. Toru Akishita,  Tsuyoshi Takagi,  On the Optimal Parameter Choice for Elliptic Curve Cryptosystems Using Isogeny, pp. 346 - 359, PKC 2004.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 5 times ]

10. Hisayoshi Sato,  Tsuyoshi Takagi,  Satoru Tezuka,  Kazuo Takaragi,  Generalized Powering Functions and Their Application to Digital Signatures, pp. 434 - 451, ASIACRYPT 2003.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 1 times ]

11. Kaoru Kurosawa,  Tsuyoshi Takagi,  Some RSA-Based Encryption Schemes with Tight Security Reduction, pp. 19 - 36, ASIACRYPT 2003.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 11 times ]

12. Kaoru Kurosawa,  Katja Schmidt-Samoa,  Tsuyoshi Takagi,  A Complete and Explicit Security Reduction Algorithm for RSA-Based Cryptosystems, pp. 474 - 491, ASIACRYPT 2003.

[Electronic Edition][IACR Online ArchiveIACR Online Archive][Cited 4 times ]

13. Katsuyuki Okeya,  Tsuyoshi Takagi,  A More Flexible Countermeasure against Side Channel Attacks Using Window Method, pp. 397 - 410, CHES 2003.

[Electronic Edition][Cited 26 times ]

14. Katsuyuki Okeya,  Tsuyoshi Takagi,  The Width-w NAF Method Provides Small Memory and Fast Elliptic Scalar Multiplications Secure against Side Channel Attacks, pp. 328 - 342, CT-RSA 2003.

[Electronic Edition][Cited 58 times Red Star]

15. Tetsuya Izu,  Tsuyoshi Takagi,  Exceptional Procedure Attack on Elliptic Curve Cryptosystems, pp. 224 - 239, PKC 2003.

[Electronic Edition][Cited 21 times ]

16. Tetsuya Izu,  Bodo Möller,  Tsuyoshi Takagi,  Improved Elliptic Curve Multiplication Methods Resistant against Side Channel Attacks, pp. 296 - 313, INDOCRYPT 2002.

[Electronic Edition][Cited 38 times ]

17. Tetsuya Izu,  Tsuyoshi Takagi,  A Fast Parallel Elliptic Curve Multiplication Resistant against Side Channel Attacks, pp. 280 - 296, PKC 2002.

[Electronic Edition][Cited 110 times Red StarRed Star]

18. Kouichi Sakurai,  Tsuyoshi Takagi,  New Semantically Secure Public-Key Cryptosystems from the RSA-Primitive, pp. 1 - 16, PKC 2002.

[Electronic Edition][Cited 18 times ]

19. Detlef Hühnlein,  Tsuyoshi Takagi,  Reducing Logarithms in Totally Non-maximal Imaginary Quadratic Orders to Logarithms in Finite Fields, pp. 219 - 231, ASIACRYPT 1999.

[Electronic Edition][Cited 14 times ]

20. Michael Hartmann,  Sachar Paulus,  Tsuyoshi Takagi,  NICE - New Ideal Coset Encryption, pp. 328 - 339, CHES 1999.

[Electronic Edition][Cited 14 times ]

21. Tsuyoshi Takagi,  Fast RSA-Type Cryptosystem Modulo p, pp. 318 - 326, CRYPTO 1998.

[Electronic Edition][Cited 19 times ]

22. Detlef Hühnlein,  Michael J. Jacobson Jr.,  Sachar Paulus,  Tsuyoshi Takagi,  A Cryptosystem Based on Non-maximal Imaginary Quadratic Orders with Fast Decryption, pp. 294 - 307, EUROCRYPT 1998.

[Electronic Edition][Cited 35 times ]

23. Tsuyoshi Takagi,  Fast RSA-Type Cryptosystems Using N-Adic Expansion, pp. 372 - 384, CRYPTO 1997.

[Electronic Edition][Cited 21 times ]



Database status:
3755 authors,
5428 conference papers from 177 conference proceedings,
559 journal papers from 8 journals
Highly Cited...