Tetsuya Izu
According to our database1,
Tetsuya Izu
authored at least 62 papers
between 1998 and 2023.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2023
IACR Cryptol. ePrint Arch., 2023
Proceedings of the Information Security and Cryptology - ICISC 2023, 2023
2021
J. Inf. Process., 2021
2019
Developing the Analysis Tool of Cyber-Attacks by Using CTI and Attributes of Organization.
Proceedings of the Web, Artificial Intelligence and Network Applications, 2019
2018
Proceedings of the Innovative Mobile and Internet Services in Ubiquitous Computing, 2018
2017
Proceedings of the Advances in Network-Based Information Systems, 2017
2016
2015
Proceedings of the 18th International Conference on Network-Based Information Systems, 2015
2014
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2014
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2014
Proceedings of the Eighth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2014
Privacy-Preserving Technology for Secure Utilization of Sensor Data (Extended Abstract).
Proceedings of the Eighth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2014
Proceedings of the 28th IEEE International Conference on Advanced Information Networking and Applications, 2014
2013
Proceedings of the 16th International Conference on Network-Based Information Systems, 2013
Proceedings of the Seventh International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2013
2012
Proceedings of the Security and Cryptography for Networks - 8th International Conference, 2012
Solving a Discrete Logarithm Problem with Auxiliary Input on a 160-Bit Elliptic Curve.
Proceedings of the Public Key Cryptography - PKC 2012, 2012
Proceedings of the Sixth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2012
2011
J. Inf. Process., 2011
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2011
IEICE Trans. Inf. Syst., 2011
Proceedings of the Information Security Theory and Practice. Security and Privacy of Mobile Devices in Wireless Communication, 2011
Proceedings of the Information Security Applications - 12th International Workshop, 2011
Time Estimation of Cheon's Algorithm over Elliptic Curves on Finite Fields with Characteristic 3.
Proceedings of the Fifth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2011
Proceedings of the Financial Cryptography and Data Security, 2011
Proceedings of the 25th IEEE International Conference on Advanced Information Networking and Applications, 2011
Proceedings of the 25th IEEE International Conference on Advanced Information Networking and Applications Workshops, 2011
2010
Proceedings of the 13th International Conference on Network-Based Information Systems, 2010
Proceedings of the 13th International Conference on Network-Based Information Systems, 2010
A Prototype System for Ensuring Integrity of Extracted Video Data (Extended Abstract).
Proceedings of the Advances in Information and Computer Security, 2010
Proceedings of the ARES 2010, 2010
2009
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2009
Proceedings of the The Forth International Conference on Availability, 2009
2008
Reduction Optimal Trinomials for Efficient Software Implementation of the eta<sub>T</sub> Pairing.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2008
Proceedings of the Information Security Applications, 9th International Workshop, 2008
2007
Proceedings of the Information Security Practice and Experience, 2007
Proceedings of the Cryptography and Coding, 2007
CAIRN 2: An FPGA Implementation of the Sieving Step in the Number Field Sieve Method.
Proceedings of the Cryptographic Hardware and Embedded Systems, 2007
Proceedings of the The Second International Conference on Availability, 2007
2006
Proceedings of the Applied Cryptography and Network Security, 4th International Conference, 2006
2005
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2005
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2005
IACR Cryptol. ePrint Arch., 2005
Proceedings of the Information Security Applications, 6th International Workshop, 2005
Proceedings of the Information and Communications Security, 7th International Conference, 2005
2004
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2004
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2004
Proceedings of the Information and Communications Security, 6th International Conference, 2004
Proceedings of the Smart Card Research and Advanced Applications VI, 2004
2003
Proceedings of the Public Key Cryptography, 2003
Proceedings of the Cryptographic Hardware and Embedded Systems, 2003
2002
A Fast Parallel Elliptic Curve Multiplication Resistant against Side Channel Attacks.
Proceedings of the Public Key Cryptography, 2002
Improved Elliptic Curve Multiplication Methods Resistant against Side Channel Attacks.
Proceedings of the Progress in Cryptology, 2002
Proceedings of the Information Security and Cryptology, 2002
Address-Bit Differential Power Analysis of Cryptographic Schemes OK-ECDH and OK-ECDSA.
Proceedings of the Cryptographic Hardware and Embedded Systems, 2002
2000
Proceedings of the Public Key Cryptography, 2000
1998
Parameters for Secure Elliptic Curve Cryptosystem - Improvements on Schoof's Algorithm.
Proceedings of the Public Key Cryptography, 1998
Proceedings of the Advances in Cryptology, 1998