Tsuyoshi Takagi

From MaRDI portal
Person:203449

Available identifiers

zbMath Open takagi.tsuyoshiMaRDI QIDQ203449

List of research outcomes





PublicationDate of PublicationType
On the weak key of post-quantum key agreement SAA-52024-11-18Paper
Explicit addition formulae on hyperelliptic curves of genus 2 for isogeny-based cryptography2024-09-10Paper
Fast Enumeration Algorithm for Multivariate Polynomials over General Finite Fields2024-04-26Paper
Correction to: ``Efficient search for superspecial hyperelliptic curves of genus four with automorphism group containing \({\mathbf{C}}_6\)2024-02-06Paper
Memory-efficient quantum information set decoding algorithm2024-01-11Paper
Improvement of the square-root Vélu's formulas for isogeny-based cryptography2023-12-19Paper
Spherical Gaussian leftover hash lemma via the Rényi divergence2023-11-09Paper
How to construct CSIDH on Edwards curves2023-11-07Paper
Efficient search for superspecial hyperelliptic curves of genus four with automorphism group containing \(\mathbf{C}_6\)2023-10-24Paper
A new fault attack on UOV multivariate signature scheme2023-07-07Paper
A New Variant of Unbalanced Oil and Vinegar Using Quotient Ring: QR-UOV2023-05-26Paper
Short lattice signatures in the standard model with efficient tag generation2023-03-21Paper
SiGamal: a supersingular isogeny-based PKE and its application to a PRF2023-03-21Paper
\( L_1\)-norm ball for CSIDH: optimal strategy for choosing the secret key space2023-02-22Paper
The multi-variable modular polynomial and its applications to cryptography2023-01-25Paper
Improving Fault Attacks on Rainbow with Fixing Random Vinegar Values2023-01-18Paper
A physical study of the LLL algorithm2023-01-12Paper
A Compact Digital Signature Scheme Based on the Module-LWR Problem2022-12-21Paper
Explicit construction of the square-root Vélu's formula on Edwards curves2022-11-09Paper
Choosing parameters for the subfield lattice attack against overstretched NTRU2022-11-02Paper
Cryptanalysis of efficient proxy signature schemes for mobile communication2022-10-28Paper
Group Key Exchange from CSIDH and Its Application to Trusted Setup in Supersingular Isogeny Cryptosystems2022-10-14Paper
Multivariate Encryption Schemes Based on Polynomial Equations over Real Numbers2022-10-13Paper
A Structural Attack on Block-Anti-Circulant UOV at SAC 20192022-10-13Paper
Secure and Efficient Pairing at 256-Bit Security Level2022-07-01Paper
Comments on efficient batch verification test for digital signatures based on elliptic curves2022-06-14Paper
Shortest vectors in lattices of Bai-Galbraith's embedding attack on the LWR problem2022-04-22Paper
(Short paper) Simple matrix signature scheme2022-04-22Paper
An efficient authenticated key exchange from random self-reducibility on CSIDH2022-03-24Paper
Improving Thomae-Wolf algorithm for solving underdetermined multivariate quadratic polynomial problem2022-03-22Paper
New complexity estimation on the rainbow-band-separation attack2021-11-18Paper
Improving key mismatch attack on NewHope with fewer queries2021-06-08Paper
A physical study of the LLL algorithm2021-06-03Paper
On collisions related to an ideal class of order 3 in CSIDH2021-02-23Paper
How to construct CSIDH on Edwards curves2020-08-05Paper
An Experimental Study of Kannan’s Embedding Technique for the Search LWE Problem2020-07-20Paper
One sample ring-LWE with rounding and its application to key exchange2020-01-30Paper
Tight reductions for Diffie-Hellman variants in the algebraic group model2020-01-28Paper
On the complexity of the LWR-solving BKW algorithm2019-03-29Paper
Constructing an efficient hash function from $3$-isogenies2019-03-18Paper
Efficient system parameters for Identity-Based Encryption using supersingular elliptic curves2019-03-18Paper
An experiment of number field sieve for discrete logarithm problem over $\text{GF}(p^n)$2019-03-18Paper
Heuristic counting of Kachisa-Schaefer-Scott curves2019-03-18Paper
Security analysis of cryptosystems using short generators over ideal lattices2018-12-21Paper
Cryptanalysis of a public key cryptosystem based on Diophantine equations via weighted LLL reduction2018-12-07Paper
Cryptanalysis of a public key cryptosystem based on Diophantine equations via weighted LLL reduction (short paper)2018-10-24Paper
Chosen message attack on multivariate signature ELSA at Asiacrypt 20172018-10-24Paper
Estimated cost for solving generalized learning with errors problem via embedding techniques2018-10-24Paper
The Beauty and the Beasts -- the hard cases in LLL reduction2018-10-24Paper
Efficient decryption algorithms for extension field cancellation type encryption schemes2018-09-26Paper
Improving the BKZ reduction algorithm by quick reordering technique2018-09-26Paper
Some properties of \(\tau\)-adic expansions on hyperelliptic Koblitz curves2018-09-25Paper
HFERP -- a new multivariate encryption scheme2018-06-22Paper
A public-key encryption scheme based on non-linear indeterminate equations2018-04-26Paper
LLL and stochastic sandpile models2018-04-07Paper
Short-Memory Scalar Multiplication for Koblitz Curves2017-11-10Paper
Algorithms and Arithmetic Operators for Computing the ηT Pairing in Characteristic Three2017-08-08Paper
One-Wayness Equivalent to General Factoring2017-08-08Paper
A multivariate quadratic challenge toward post-quantum generation cryptography2017-06-22Paper
Revisiting the Efficient Key Generation of ZHFE2017-06-01Paper
Revisiting the Cubic UOV Signature Scheme2017-05-19Paper
Anonymous spatial encryption under affine space delegation functionality with full security2017-01-31Paper
On tameness of Matsumoto-Imai central maps in three variables over the finite field \(\mathbb F_2\)2016-10-12Paper
Improved Progressive BKZ Algorithms and Their Precise Cost Estimation by Sharp Simulator2016-09-09Paper
Reducing the Key Size of the SRP Encryption Scheme2016-09-02Paper
Privacy-Preserving k-Nearest Neighbour Query on Outsourced Database2016-08-31Paper
Improvement of FPPR method to solve ECDLP2016-08-12Paper
Mathematics of post-quantum cryptography (to appear)2016-03-11Paper
Power Analysis to ECC Using Differential Power Between Multiplication and Squaring2015-11-11Paper
Cheater Identifiable Secret Sharing Schemes via Multi-Receiver Authentication2015-05-27Paper
Certificateless hybrid signcryption2015-02-19Paper
A Polynomial-Time Algorithm for Solving a Class of Underdetermined Multivariate Quadratic Equations over Fields of Odd Characteristics2015-01-14Paper
Identity-based partially blind signature in the standard model for electronic cash2014-10-21Paper
Improvement of Faugère et al.’s Method to Solve ECDLP2014-09-15Paper
On Cheater Identifiable Secret Sharing Schemes Secure against Rushing Adversary2014-09-15Paper
Efficient Algorithm for Tate Pairing of Composite Order2014-09-15Paper
Secure identity-based signcryption in the standard model2014-05-14Paper
Parallel Gauss Sieve Algorithm: Solving the SVP Challenge over a 128-Dimensional Ideal Lattice2014-03-25Paper
An Experiment of Number Field Sieve for Discrete Logarithm Problem over GF(p 12)2013-12-10Paper
Further improvement of an identity-based signcryption scheme in the standard model2013-08-19Paper
An exhaustive search method to find all small solutions of a multivariate modular linear equation2013-08-09Paper
Attacks on Multi-Prime RSA with Small Prime Difference2013-06-28Paper
Extended Algorithm for Solving Underdefined Multivariate Quadratic Equations2013-06-14Paper
Multivariate Signature Scheme Using Quadratic Forms2013-06-14Paper
Batch Verification Suitable for Efficiently Verifying a Limited Number of Signatures2013-06-04Paper
Efficient Secure Primitive for Privacy Preserving Distributed Computations2013-04-04Paper
Application of Scalar Multiplication of Edwards Curves to Pairing-Based Cryptography2013-04-04Paper
Breaking Pairing-Based Cryptosystems Using η T Pairing over GF(397)2013-03-19Paper
Zero-Knowledge Protocols for the McEliece Encryption2012-09-07Paper
Group-oriented setting's multisigncryption scheme with threshold designcryption2012-07-13Paper
Key Length Estimation of Pairing-Based Cryptosystems Using η T Pairing2012-06-29Paper
Reducing the Key Size of Rainbow Using Non-commutative Rings2012-06-08Paper
General Fault Attacks on Multivariate Public Key Cryptosystems2011-11-25Paper
Efficient Identity-Based Signcryption in the Standard Model2011-09-16Paper
Anonymous Encryption with Partial-Order Subset Delegation Functionality2011-09-16Paper
GeoEnc: Geometric Area Based Keys and Policies in Functional Encryption Systems2011-07-07Paper
An Experiment of Number Field Sieve over GF(p) of Low Hamming Weight Characteristic2011-06-08Paper
https://portal.mardi4nfdi.de/entity/Q29962852011-05-06Paper
Some properties of ${\tau}$-adic expansions on hyperelliptic Koblitz curves2011-01-21Paper
Efficient arithmetic on subfield elliptic curves over small finite fields of odd characteristic2011-01-13Paper
https://portal.mardi4nfdi.de/entity/Q57479082010-09-14Paper
Solving a 676-Bit Discrete Logarithm Problem in GF(36n )2010-05-28Paper
FPGA and ASIC implementations of the \(\eta _T\) pairing in characteristic three2010-04-07Paper
A More Flexible Countermeasure against Side Channel Attacks Using Window Method2010-03-09Paper
https://portal.mardi4nfdi.de/entity/Q34080922010-02-24Paper
Zero-Value Point Attacks on Elliptic Curve Cryptosystem2010-02-09Paper
Advances in Cryptology - ASIACRYPT 20032010-01-05Paper
Advances in Cryptology - ASIACRYPT 20032010-01-05Paper
Advances in Cryptology - ASIACRYPT 20032010-01-05Paper
An Efficient Residue Group Multiplication for the η T Pairing over ${\mathbb F}_{3^m}$2009-12-09Paper
Public Key Cryptography – PKC 20042009-05-14Paper
Efficient Signcryption Key Encapsulation without Random Oracles2009-04-29Paper
Efficient Multi-PKG ID-Based Signcryption for Ad Hoc Networks2009-04-29Paper
Further Security Analysis of XTR2009-04-02Paper
Compressed XTR2009-03-10Paper
New Security Problem in RFID Systems “Tag Killing”2009-02-10Paper
Faster Implementation of η T Pairing over GF(3 m ) Using Minimum Number of Logical Instructions for GF(3)-Addition2009-02-10Paper
Side Channel Attacks and Countermeasures on Pairing Based Cryptosystems over Binary Fields2009-01-09Paper
On the Security of Online/Offline Signatures and Multisignatures from ACISP’062009-01-09Paper
Digital Signatures Out of Second-Preimage Resistant Hash Functions2008-11-11Paper
Reduction Optimal Trinomials for Efficient Software Implementation of the η T Pairing2008-07-25Paper
New Approach for Selectively Convertible Undeniable Signature Schemes2008-04-24Paper
Some Improved Algorithms for Hyperelliptic Curve Cryptosystems Using Degenerate Divisors2008-03-17Paper
A Coprocessor for the Final Exponentiation of the η T Pairing in Characteristic Three2007-11-15Paper
Analysis of fractional window recoding methods and their application to elliptic curve cryptosystems2007-01-09Paper
Information Security2006-10-16Paper
Progress in Cryptology – Mycrypt 20052006-10-05Paper
https://portal.mardi4nfdi.de/entity/Q54890622006-09-25Paper
Information Security and Privacy2006-06-22Paper
Information Security and Privacy2006-06-22Paper
Progress in Cryptology - INDOCRYPT 20042005-12-22Paper
Progress in Cryptology - INDOCRYPT 20042005-12-22Paper
Information Security and Privacy2005-09-07Paper
Contemporary cryptology.2005-08-30Paper
Advances in Cryptology – CRYPTO 20042005-08-23Paper
Applied Cryptography and Network Security2005-06-13Paper
https://portal.mardi4nfdi.de/entity/Q46648372005-04-08Paper
https://portal.mardi4nfdi.de/entity/Q30439232004-08-09Paper
https://portal.mardi4nfdi.de/entity/Q30439452004-08-09Paper
Efficient undeniable signature schemes based on ideal arithmetic in quadratic orders2004-06-11Paper
https://portal.mardi4nfdi.de/entity/Q44283472003-09-15Paper
https://portal.mardi4nfdi.de/entity/Q44185472003-08-10Paper
https://portal.mardi4nfdi.de/entity/Q44174142003-07-29Paper
Exceptional Procedure Attack on Elliptic Curve Cryptosystems2003-07-27Paper
https://portal.mardi4nfdi.de/entity/Q44133322003-07-17Paper
https://portal.mardi4nfdi.de/entity/Q44133372003-07-17Paper
https://portal.mardi4nfdi.de/entity/Q44129982003-07-17Paper
https://portal.mardi4nfdi.de/entity/Q44129562003-07-17Paper
An ethological and emotional basis for human–robot interaction2003-04-03Paper
https://portal.mardi4nfdi.de/entity/Q45366382002-11-24Paper
How to choose secret parameters for RSA-type cryptosystems over elliptic curves2002-06-10Paper
https://portal.mardi4nfdi.de/entity/Q45025022002-01-13Paper
https://portal.mardi4nfdi.de/entity/Q45027992000-11-07Paper
https://portal.mardi4nfdi.de/entity/Q42493412000-03-08Paper
A new public-key cryptosystem over a quadratic order with quadratic decryption time.2000-01-01Paper
https://portal.mardi4nfdi.de/entity/Q42496461999-09-09Paper
https://portal.mardi4nfdi.de/entity/Q43645641998-07-06Paper
Product formula of the cubic Gauss sum modulo the product of the primes1997-12-03Paper

Research outcomes over time

This page was built for person: Tsuyoshi Takagi