Tsuyoshi Takagi
According to our database1,
Tsuyoshi Takagi
authored at least 305 papers
between 1996 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on fun.ac.jp
On csauthors.net:
Bibliography
2024
Revisiting the Security of Fiat-Shamir Signature Schemes under Superposition Attacks.
IACR Cryptol. ePrint Arch., 2024
IACR Cryptol. ePrint Arch., 2024
IACR Cryptol. ePrint Arch., 2024
Sieving Method for SDP with the Zero Window: An Improvement in Low Memory Environments.
Proceedings of the Advances in Information and Computer Security, 2024
Proceedings of the Information Security - 27th International Conference, 2024
Review the Cuckoo Hash-Based Unbalanced Private Set Union: Leakage, Fix, and Optimization.
Proceedings of the Computer Security - ESORICS 2024, 2024
A Transparent Zero-Knowledge Dual Membership Set Commitment based on Perfect Hash Function.
Proceedings of the Twelfth International Symposium on Computing and Networking, 2024
2023
Correction to: Efficient Search for Superspecial Hyperelliptic Curves of Genus Four with Automorphism Group Containing bfC<sub>6</sub>.
Math. Comput. Sci., December, 2023
Efficient Search for Superspecial Hyperelliptic Curves of Genus Four with Automorphism Group Containing bfC<sub>6</sub>.
Math. Comput. Sci., December, 2023
IET Inf. Secur., March, 2023
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., March, 2023
Discret. Appl. Math., March, 2023
JSIAM Lett., 2023
IACR Cryptol. ePrint Arch., 2023
IACR Cryptol. ePrint Arch., 2023
Lower bound of costs of formulas to compute image curves of 3-isogenies in the framework of generalized Montgomery coordinates.
IACR Cryptol. ePrint Arch., 2023
IACR Cryptol. ePrint Arch., 2023
Improved Hybrid Attack via Error-Splitting Method for Finding Quinary Short Lattice Vectors.
Proceedings of the Advances in Information and Computer Security, 2023
Proceedings of the Information Security - 26th International Conference, 2023
Proceedings of the Information Security and Privacy - 28th Australasian Conference, 2023
2022
JSIAM Lett., 2022
Revisiting the Orthogonal Lattice Algorithm in Solving General Approximate Common Divisor Problem.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2022
Erratum: A Compact Digital Signature Scheme Based on the Module-LWR Problem [IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences Vol. E104.A (2021), No. 9 pp.1219-1234].
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2022
The Generalized Montgomery Coordinate: A New Computational Tool for Isogeny-based Cryptography.
IACR Cryptol. ePrint Arch., 2022
Proceedings of the Post-Quantum Cryptography - 13th International Workshop, 2022
Proceedings of the Advances in Information and Computer Security, 2022
Proceedings of the 29th IEEE Symposium on Computer Arithmetic, 2022
2021
Theor. Comput. Sci., 2021
Int. J. Inf. Sec., 2021
Memory-constrained implementation of lattice-based encryption scheme on standard Java Card platform.
IET Inf. Secur., 2021
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2021
Improving Thomae-Wolf Algorithm for Solving Underdetermined Multivariate Quadratic Polynomial Problem.
Proceedings of the Post-Quantum Cryptography - 12th International Workshop, 2021
Proceedings of the Advances in Information and Computer Security, 2021
Proceedings of the Advances in Information and Computer Security, 2021
2020
Int. J. Netw. Comput., 2020
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2020
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2020
IACR Cryptol. ePrint Arch., 2020
IACR Cryptol. ePrint Arch., 2020
L<sub>1</sub>-Norm Ball for CSIDH: Optimal Strategy for Choosing the Secret Key Space.
IACR Cryptol. ePrint Arch., 2020
IACR Cryptol. ePrint Arch., 2020
IACR Cryptol. ePrint Arch., 2020
IACR Cryptol. ePrint Arch., 2020
Proceedings of the Information Security Applications - 21st International Conference, 2020
Proceedings of the Provable and Practical Security - 14th International Conference, ProvSec 2020, Singapore, November 29, 2020
Proceedings of the Post-Quantum Cryptography - 11th International Conference, 2020
Proceedings of the Post-Quantum Cryptography - 11th International Conference, 2020
Proceedings of the 7th on ASIA Public-Key Cryptography Workshop, 2020
2019
Batten Down the Hatches: Securing Neighborhood Area Networks of Smart Grid in the Quantum Era.
IEEE Trans. Smart Grid, 2019
J. Inf. Process., 2019
The Secure Parameters and Efficient Decryption Algorithm for Multivariate Public Key Cryptosystem EFC.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2019
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2019
IACR Cryptol. ePrint Arch., 2019
IACR Cryptol. ePrint Arch., 2019
Proceedings of the Advances in Information and Computer Security, 2019
Proceedings of the 5th International Conference on Information Systems Security and Privacy, 2019
Proceedings of the 2019 Seventh International Symposium on Computing and Networking, 2019
Group Key Exchange from CSIDH and Its Application to Trusted Setup in Supersingular Isogeny Cryptosystems.
Proceedings of the Information Security and Cryptology - 15th International Conference, 2019
Proceedings of the Applied Cryptography and Network Security, 2019
2018
Portable Implementation of Postquantum Encryption Schemes and Key Exchange Protocols on JavaScript-Enabled Platforms.
Secur. Commun. Networks, 2018
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2018
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2018
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2018
IACR Cryptol. ePrint Arch., 2018
Proceedings of the Post-Quantum Cryptography - 9th International Conference, 2018
Estimated Cost for Solving Generalized Learning with Errors Problem via Embedding Techniques.
Proceedings of the Advances in Information and Computer Security, 2018
An Improvement on the Linear Algebraic Attack for the Indeterminate Equation Encryption Scheme.
Proceedings of the International Symposium on Information Theory and Its Applications, 2018
Proceedings of the Information Security and Privacy - 23rd Australasian Conference, 2018
Efficient Decryption Algorithms for Extension Field Cancellation Type Encryption Schemes.
Proceedings of the Information Security and Privacy - 23rd Australasian Conference, 2018
2017
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2017
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2017
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2017
IACR Cryptol. ePrint Arch., 2017
A Public-key Encryption Scheme Based on Non-linear Indeterminate Equations (Giophantus).
IACR Cryptol. ePrint Arch., 2017
Comput. Secur., 2017
Proceedings of the Selected Areas in Cryptography - SAC 2017, 2017
Proceedings of the Advances in Information and Computer Security, 2017
Proceedings of the Information and Communications Security - 19th International Conference, 2017
Memory-constrained implementation of lattice-based encryption scheme on standard Java Card.
Proceedings of the 2017 IEEE International Symposium on Hardware Oriented Security and Trust, 2017
Proceedings of the Applied Cryptography and Network Security, 2017
Proceedings of the Applied Cryptography and Network Security, 2017
Proceedings of the Mathematical Modelling for Next-Generation Cryptography: CREST Crypto-Math Project, 2017
2016
IEEE Trans. Inf. Forensics Secur., 2016
Security Analysis and Improvements on Two Homomorphic Authentication Schemes for Network Coding.
IEEE Trans. Inf. Forensics Secur., 2016
Revocable and strongly unforgeable identity-based signature scheme in the standard model.
Secur. Commun. Networks, 2016
Secure and controllable k-NN query over encrypted cloud data with key confidentiality.
J. Parallel Distributed Comput., 2016
Int. J. Netw. Comput., 2016
IACR Cryptol. ePrint Arch., 2016
Improved Progressive BKZ Algorithms and their Precise Cost Estimation by Sharp Simulator.
IACR Cryptol. ePrint Arch., 2016
On tameness of Matsumoto-Imai central maps in three variables over the finite field 픽<sub>2</sub>.
Adv. Math. Commun., 2016
Proceedings of the Fourth International Symposium on Computing and Networking, 2016
Image Sensor with Organic Photoconductive Films by Stacking Red/Green and Blue Components.
Proceedings of the Image Sensors and Imaging Systems 2016, 2016
Proceedings of the Information Security and Privacy - 21st Australasian Conference, 2016
Proceedings of the Information Security and Privacy - 21st Australasian Conference, 2016
2015
IEEE Trans. Dependable Secur. Comput., 2015
Int. J. Netw. Secur., 2015
Int. J. Electron. Secur. Digit. Forensics, 2015
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2015
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2015
IACR Cryptol. ePrint Arch., 2015
IACR Cryptol. ePrint Arch., 2015
IACR Cryptol. ePrint Arch., 2015
Cryptanalysis of a public key cryptosystem based on Diophantine equations via weighted LLL reduction.
IACR Cryptol. ePrint Arch., 2015
ACM Commun. Comput. Algebra, 2015
Proceedings of the Third International Symposium on Computing and Networking, 2015
2014
Secur. Commun. Networks, 2014
Secur. Commun. Networks, 2014
Efficient system parameters for Identity-Based Encryption using supersingular elliptic curves.
JSIAM Lett., 2014
An experiment of number field sieve for discrete logarithm problem over $\text{GF}(p^n)$.
JSIAM Lett., 2014
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2014
Anonymous spatial encryption under affine space delegation functionality with full security.
Inf. Sci., 2014
Int. J. Commun. Syst., 2014
Anonymous encryption with partial-order subset delegation and its application in privacy email systems.
IET Inf. Secur., 2014
Security Analysis of Collusion-Resistant Nearest Neighbor Query Scheme on Encrypted Cloud Data.
IEICE Trans. Inf. Syst., 2014
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2014
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2014
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2014
Key Length Estimation of Pairing-Based Cryptosystems Using <i>η<sub>T</sub></i> Pairing over <i>GF</i>(3<i><sup>n</sup></i>).
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2014
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2014
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2014
A Polynomial-Time Algorithm for Solving a Class of Underdetermined Multivariate Quadratic Equations over Fields of Odd Characteristics.
Proceedings of the Post-Quantum Cryptography - 6th International Workshop, 2014
Parallel Gauss Sieve Algorithm: Solving the SVP Challenge over a 128-Dimensional Ideal Lattice.
Proceedings of the Public-Key Cryptography - PKC 2014, 2014
Proceedings of the Advances in Information and Computer Security, 2014
Proceedings of the Information and Communication Technology, 2014
2013
Wirel. Pers. Commun., 2013
Efficient Constructions of Anonymous Multireceiver Encryption Protocol and Their Deployment in Group E-mail Systems With Privacy Preservation.
IEEE Syst. J., 2013
Secur. Commun. Networks, 2013
Math. Comput. Model., 2013
Int. J. Netw. Secur., 2013
Int. J. Electron. Secur. Digit. Forensics, 2013
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2013
Parallel Gauss Sieve Algorithm: Solving the SVP in the Ideal Lattice of 128 dimensions.
IACR Cryptol. ePrint Arch., 2013
Comput. J., 2013
Proceedings of the Post-Quantum Cryptography - 5th International Workshop, 2013
Proceedings of the Advances in Information and Computer Security, 2013
Proceedings of the Advances in Information and Computer Security, 2013
Post-quantum Strongly Unforgeable Identity-Based Signature Scheme from Lattices without Random Oracles.
Proceedings of the 2013 5th International Conference on Intelligent Networking and Collaborative Systems, 2013
Secure k-NN computation on encrypted cloud data without sharing key with query users.
Proceedings of the 2013 International Workshop on Security in Cloud Computing, 2013
Proceedings of the first ACM workshop on Asia public-key cryptography, 2013
Proceedings of the 8th ACM Symposium on Information, Computer and Communications Security, 2013
Proceedings of the Number Theory and Cryptography, 2013
Proceedings of the Eighth Asia Joint Conference on Information Security, 2013
Proceedings of the Information Security and Privacy - 18th Australasian Conference, 2013
2012
IEEE Wirel. Commun. Lett., 2012
Reconciling and improving of multi-receiver signcryption protocols with threshold decryption.
Secur. Commun. Networks, 2012
An exhaustive search method to find all small solutions of a multivariate modular linear equation.
JSIAM Lett., 2012
J. Netw. Comput. Appl., 2012
Cryptanalysis of Strong Designated Verifier Signature Scheme with Non-delegatability and Non-transferability.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2012
Analysis and Improvement of a Secret Broadcast with Binding Encryption in Broadcasting Networks.
IEICE Trans. Inf. Syst., 2012
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2012
IACR Cryptol. ePrint Arch., 2012
Breaking pairing-based cryptosystems using η<sub>T</sub> pairing over GF(3<sup>97</sup>).
IACR Cryptol. ePrint Arch., 2012
Comput. Electr. Eng., 2012
Proceedings of the Advances in Information and Computer Security, 2012
Application of Scalar Multiplication of Edwards Curves to Pairing-Based Cryptography.
Proceedings of the Advances in Information and Computer Security, 2012
Proceedings of the Information Security Practice and Experience, 2012
Batch Verification Suitable for Efficiently Verifying a Limited Number of Signatures.
Proceedings of the Information Security and Cryptology - ICISC 2012, 2012
Proceedings of the Topics in Cryptology - CT-RSA 2012 - The Cryptographers' Track at the RSA Conference 2012, San Francisco, CA, USA, February 27, 2012
Proceedings of the Advances in Cryptology - ASIACRYPT 2012, 2012
Proceedings of the Information Security and Privacy - 17th Australasian Conference, 2012
2011
Inf. Sci., 2011
Int. J. Netw. Secur., 2011
Cryptanalysis and Fixed of Short Signature Scheme without Random Oracle from Bilinear Parings.
Int. J. Netw. Secur., 2011
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2011
IACR Cryptol. ePrint Arch., 2011
Proceedings of the Provable Security - 5th International Conference, 2011
Proceedings of the Provable Security - 5th International Conference, 2011
Dual-Verifiers DVS with Message Recovery for Tolerant Routing in Wireless Sensor Networks.
Proceedings of the Intelligence and Security Informatics - Pacific Asia Workshop, 2011
An Experiment of Number Field Sieve over GF(<i>p</i>) of Low Hamming Weight Characteristic.
Proceedings of the Coding and Cryptology - Third International Workshop, 2011
Proceedings of the Information Security and Privacy - 16th Australasian Conference, 2011
2010
Efficient arithmetic on subfield elliptic curves over small finite fields of odd characteristic.
J. Math. Cryptol., 2010
IACR Cryptol. ePrint Arch., 2010
Sci. China Inf. Sci., 2010
FPGA and ASIC implementations of the eta<sub>T</sub> pairing in characteristic three.
Comput. Electr. Eng., 2010
Proceedings of the Intelligence and Security Informatics, Pacific Asia Workshop, 2010
Towards Confidentiality of ID-Based Signcryption Schemes under without Random Oracle Model.
Proceedings of the Intelligence and Security Informatics, Pacific Asia Workshop, 2010
Proceedings of the Advances in Information and Computer Security, 2010
2009
Distributed Noise Generation for Density Estimation Based Clustering without Trusted Third Party.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2009
Security and Correctness Analysis on Privacy-Preserving <i>k</i>-Means Clustering Schemes.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2009
IEICE Trans. Inf. Syst., 2009
An Efficient Residue Group Multiplication for the eta<sub><i>T</i></sub> Pairing over F<sub>3<sup>m</sup></sub>.
Proceedings of the Selected Areas in Cryptography, 16th Annual International Workshop, 2009
2008
Algorithms and Arithmetic Operators for Computing the etaT Pairing in Characteristic Three.
IEEE Trans. Computers, 2008
IEICE Trans. Inf. Syst., 2008
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2008
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2008
Reduction Optimal Trinomials for Efficient Software Implementation of the eta<sub>T</sub> Pairing.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2008
IACR Cryptol. ePrint Arch., 2008
Proceedings of the Post-Quantum Cryptography, Second International Workshop, 2008
Faster Implementation of eta-T Pairing over GF(3<sup>m</sup>) Using Minimum Number of Logical Instructions for GF(3)-Addition.
Proceedings of the Pairing-Based Cryptography, 2008
Proceedings of the Network and Parallel Computing, IFIP International Conference, 2008
Proceedings of the Knowledge-Based Intelligent Information and Engineering Systems, 2008
Proceedings of the Information Security Practice and Experience, 2008
Proceedings of the Information Security and Cryptology, 4th International Conference, 2008
Proceedings of the Information Security and Cryptology, 4th International Conference, 2008
Proceedings of the Cryptology and Network Security, 7th International Conference, 2008
Proceedings of the The Third International Conference on Availability, 2008
Proceedings of the The Third International Conference on Availability, 2008
2007
A New Upper Bound for the Minimal Density of Joint Representations in Elliptic Curve Cryptosystems.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2007
A Refined Algorithm for the eta<sub>T</sub> Pairing Calculation in Characteristic Three.
IACR Cryptol. ePrint Arch., 2007
A Coprocessor for the Final Exponentiation of the eta<sub>T</sub> Pairing in Characteristic Three.
IACR Cryptol. ePrint Arch., 2007
Algorithms and Arithmetic Operators for Computing the eta<sub>T</sub> Pairing in Characteristic Three.
IACR Cryptol. ePrint Arch., 2007
Proceedings of the Information Security Applications, 8th International Workshop, 2007
A Coprocessor for the Final Exponentiation of the <i>eta</i> <sub> <i>T</i> </sub> Pairing in Characteristic Three.
Proceedings of the Arithmetic of Finite Fields, First International Workshop, 2007
Proceedings of the Information Security Practice and Experience, 2007
Some Efficient Algorithms for the Final Exponentiation of <i>eta</i> <sub> <i>T</i> </sub> Pairing.
Proceedings of the Information Security Practice and Experience, 2007
An Algorithm for the nt Pairing Calculation in Characteristic Three and its Hardware Implementation.
Proceedings of the 18th IEEE Symposium on Computer Arithmetic (ARITH-18 2007), 2007
Proceedings of the 21st International Conference on Advanced Information Networking and Applications (AINA 2007), 2007
Proceedings of the 21st International Conference on Advanced Information Networking and Applications (AINA 2007), 2007
Proceedings of the Applied Cryptography and Network Security, 5th International Conference, 2007
2006
Analysis of Fractional Window Recoding Methods and Their Application to Elliptic Curve Cryptosystems.
IEEE Trans. Computers, 2006
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2006
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2006
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2006
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2006
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2006
IACR Cryptol. ePrint Arch., 2006
Side Channel Attacks and Countermeasures on Pairing Based Cryptosystems over Binary Fields.
IACR Cryptol. ePrint Arch., 2006
IACR Cryptol. ePrint Arch., 2006
An Algorithm for the η<sub>T</sub> Pairing Calculation in Characteristic Three and its Hardware Implementation.
IACR Cryptol. ePrint Arch., 2006
Proceedings of the Information Security Practice and Experience, 2006
Proceedings of the Computational Science and Its Applications, 2006
Proceedings of the Computational Intelligence and Security, International Conference, 2006
Proceedings of the Smart Card Research and Advanced Applications, 2006
Proceedings of the Advances in Cryptology, 2006
2005
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2005
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2005
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2005
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2005
IACR Cryptol. ePrint Arch., 2005
IACR Cryptol. ePrint Arch., 2005
IACR Cryptol. ePrint Arch., 2005
Paillier's Cryptosystem Modulo p<sup>2</sup>q and Its Applications to Trapdoor Commitment Schemes.
Proceedings of the Progress in Cryptology, 2005
Proceedings of the Security and Privacy in Ad-hoc and Sensor Networks, 2005
Insider Impersonation-MIM Attack to Tripartite Key Agreement Scheme and an Efficient Protocol for Multiple Keys.
Proceedings of the Computational Intelligence and Security, International Conference, 2005
An id-based non-interactive tripartite key agreement protocol with K-resilience.
Proceedings of the Third IASTED International Conference on Communications and Computer Networks, 2005
Proceedings of the Information Security and Privacy, 10th Australasian Conference, 2005
2004
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2004
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2004
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2004
A Complete Divisor Class Halving Algorithm for Hyperelliptic Curve Cryptosystems of Genus Two.
IACR Cryptol. ePrint Arch., 2004
Efficient Undeniable Signature Schemes Based on Ideal Arithmetic in Quadratic Orders.
Des. Codes Cryptogr., 2004
Proceedings of the International Conference on Information Technology: Coding and Computing (ITCC'04), 2004
Proceedings of the Information Security, 7th International Conference, 2004
Behavior selection and motion modulation in emotionally grounded architecture for QRIO SDR-4XII.
Proceedings of the 2004 IEEE/RSJ International Conference on Intelligent Robots and Systems, Sendai, Japan, September 28, 2004
Proceedings of the Progress in Cryptology, 2004
Proceedings of the Progress in Cryptology, 2004
Proceedings of the 2004 IEEE International Conference on Robotics and Automation, 2004
Some Improved Algorithms for Hyperelliptic Curve Cryptosystems Using Degenerate Divisors.
Proceedings of the Information Security and Cryptology, 2004
Learning behavior selection through interaction based on emotionally grounded symbol concept.
Proceedings of the 4th IEEE/RAS International Conference on Humanoid Robots, 2004
On the Exact Flexibility of the Flexible Countermeasure Against Side Channel Attacks.
Proceedings of the Information Security and Privacy: 9th Australasian Conference, 2004
2003
Robotics Auton. Syst., 2003
IACR Cryptol. ePrint Arch., 2003
Novel Efficient Implementations of Hyperelliptic Curve Cryptosystems using Degenerate Divisors.
IACR Cryptol. ePrint Arch., 2003
Proceedings of the Public Key Cryptography, 2003
Proceedings of the Information Security, 6th International Conference, 2003
The Width-w NAF Method Provides Small Memory and Fast Elliptic Scalar Multiplications Secure against Side Channel Attacks.
Proceedings of the Topics in Cryptology, 2003
Proceedings of the Cryptographic Hardware and Embedded Systems, 2003
Proceedings of the Advances in Cryptology - ASIACRYPT 2003, 9th International Conference on the Theory and Application of Cryptology and Information Security, Taipei, Taiwan, November 30, 2003
2002
Proceedings of the Public Key Cryptography, 2002
A Fast Parallel Elliptic Curve Multiplication Resistant against Side Channel Attacks.
Proceedings of the Public Key Cryptography, 2002
Improved Elliptic Curve Multiplication Methods Resistant against Side Channel Attacks.
Proceedings of the Progress in Cryptology, 2002
Proceedings of the Information Security and Cryptology, 2002
Proceedings of the Information Security and Cryptology, 2002
Proceedings of the Information Security and Privacy, 7th Australian Conference, 2002
Proceedings of the Information Security and Privacy, 7th Australian Conference, 2002
2001
How to Choose Secret Parameters for RSA-Type Cryptosystems over Elliptic Curves.
Des. Codes Cryptogr., 2001
Proceedings of the 2001 IEEE International Conference on Robotics and Automation, 2001
Proceedings of the Information Security and Cryptology, 2001
Architecture and preliminary experimental results for emotionally grounded symbol acquisition.
Proceedings of the Fifth International Conference on Autonomous Agents, 2001
2000
J. Cryptol., 2000
1999
Proceedings of the Cryptographic Hardware and Embedded Systems, 1999
Reducing Logarithms in Totally Non-maximal Imaginary Quadratic Orders to Logarithms in Finite Fields.
Proceedings of the Advances in Cryptology, 1999
1998
A generalization of the Diffie-Hellman problem and related cryptosystems allowing fast decryption.
Proceedings of the 1st International Conference on Information Security and Cryptology, 1998
Rabin and RSA analogues based on non-maximal imaginary quadratic orders.
Proceedings of the 1st International Conference on Information Security and Cryptology, 1998
Proceedings of the Advances in Cryptology - EUROCRYPT '98, International Conference on the Theory and Application of Cryptographic Techniques, Espoo, Finland, May 31, 1998
Proceedings of the Advances in Cryptology, 1998
1997
Proceedings of the Advances in Cryptology, 1997
1996
Proceedings of the Algorithms and Computation, 7th International Symposium, 1996