Tsuyoshi Takagi

From MaRDI portal
Person:203449


List of research outcomes

This list is not complete and representing at the moment only items from zbMATH Open and arXiv. We are working on additional sources - please check back here soon!

PublicationDate of PublicationType
On the weak key of post-quantum key agreement SAA-5
JSIAM Letters
2024-11-18Paper
Explicit addition formulae on hyperelliptic curves of genus 2 for isogeny-based cryptography
JSIAM Letters
2024-09-10Paper
Fast Enumeration Algorithm for Multivariate Polynomials over General Finite Fields
 
2024-04-26Paper
Correction to: ``Efficient search for superspecial hyperelliptic curves of genus four with automorphism group containing \({\mathbf{C}}_6\)
Mathematics in Computer Science
2024-02-06Paper
Memory-efficient quantum information set decoding algorithm
 
2024-01-11Paper
Improvement of the square-root Vélu's formulas for isogeny-based cryptography
JSIAM Letters
2023-12-19Paper
Spherical Gaussian leftover hash lemma via the Rényi divergence
 
2023-11-09Paper
How to construct CSIDH on Edwards curves
Finite Fields and their Applications
2023-11-07Paper
Efficient search for superspecial hyperelliptic curves of genus four with automorphism group containing \(\mathbf{C}_6\)
Mathematics in Computer Science
2023-10-24Paper
A new fault attack on UOV multivariate signature scheme
Post-Quantum Cryptography
2023-07-07Paper
A New Variant of Unbalanced Oil and Vinegar Using Quotient Ring: QR-UOV
Lecture Notes in Computer Science
2023-05-26Paper
Short lattice signatures in the standard model with efficient tag generation
 
2023-03-21Paper
SiGamal: a supersingular isogeny-based PKE and its application to a PRF
 
2023-03-21Paper
\( L_1\)-norm ball for CSIDH: optimal strategy for choosing the secret key space
Discrete Applied Mathematics
2023-02-22Paper
The multi-variable modular polynomial and its applications to cryptography
 
2023-01-25Paper
Improving Fault Attacks on Rainbow with Fixing Random Vinegar Values
 
2023-01-18Paper
A physical study of the LLL algorithm
Journal of Number Theory
2023-01-12Paper
A Compact Digital Signature Scheme Based on the Module-LWR Problem
1515.94104
2022-12-21Paper
Explicit construction of the square-root Vélu's formula on Edwards curves
JSIAM Letters
2022-11-09Paper
Choosing parameters for the subfield lattice attack against overstretched NTRU
 
2022-11-02Paper
Cryptanalysis of efficient proxy signature schemes for mobile communication
Science China Information Sciences
2022-10-28Paper
Group Key Exchange from CSIDH and Its Application to Trusted Setup in Supersingular Isogeny Cryptosystems
Information Security and Cryptology
2022-10-14Paper
A structural attack on block-anti-circulant UOV at SAC 2019
Post-Quantum Cryptography
2022-10-13Paper
Multivariate encryption schemes based on polynomial equations over real numbers
Post-Quantum Cryptography
2022-10-13Paper
Secure and Efficient Pairing at 256-Bit Security Level
 
2022-07-01Paper
Comments on efficient batch verification test for digital signatures based on elliptic curves
Mathematica Slovaca
2022-06-14Paper
Shortest vectors in lattices of Bai-Galbraith's embedding attack on the LWR problem
 
2022-04-22Paper
(Short paper) Simple matrix signature scheme
 
2022-04-22Paper
An efficient authenticated key exchange from random self-reducibility on CSIDH
 
2022-03-24Paper
Improving Thomae-Wolf algorithm for solving underdetermined multivariate quadratic polynomial problem
 
2022-03-22Paper
New complexity estimation on the rainbow-band-separation attack
Theoretical Computer Science
2021-11-18Paper
Improving key mismatch attack on NewHope with fewer queries
 
2021-06-08Paper
A physical study of the LLL algorithm
 
2021-06-03Paper
On collisions related to an ideal class of order 3 in CSIDH
 
2021-02-23Paper
How to construct CSIDH on Edwards curves
 
2020-08-05Paper
An experimental study of Kannan's embedding technique for the search LWE problem
Information and Communications Security
2020-07-20Paper
One sample ring-LWE with rounding and its application to key exchange
 
2020-01-30Paper
Tight reductions for Diffie-Hellman variants in the algebraic group model
 
2020-01-28Paper
On the complexity of the LWR-solving BKW algorithm
 
2019-03-29Paper
Efficient system parameters for identity-based encryption using supersingular elliptic curves
JSIAM Letters
2019-03-18Paper
An experiment of number field sieve for discrete logarithm problem over \(\mathrm{GF}(p^n)\)
JSIAM Letters
2019-03-18Paper
Heuristic counting of Kachisa-Schaefer-Scott curves
JSIAM Letters
2019-03-18Paper
Constructing an efficient hash function from \(3\)-isogenies
JSIAM Letters
2019-03-18Paper
Security analysis of cryptosystems using short generators over ideal lattices
Japan Journal of Industrial and Applied Mathematics
2018-12-21Paper
Cryptanalysis of a public key cryptosystem based on Diophantine equations via weighted LLL reduction
Japan Journal of Industrial and Applied Mathematics
2018-12-07Paper
Cryptanalysis of a public key cryptosystem based on Diophantine equations via weighted LLL reduction (short paper)
 
2018-10-24Paper
Chosen message attack on multivariate signature ELSA at Asiacrypt 2017
 
2018-10-24Paper
Estimated cost for solving generalized learning with errors problem via embedding techniques
 
2018-10-24Paper
The Beauty and the Beasts -- the hard cases in LLL reduction
 
2018-10-24Paper
Efficient decryption algorithms for extension field cancellation type encryption schemes
 
2018-09-26Paper
Improving the BKZ reduction algorithm by quick reordering technique
 
2018-09-26Paper
Some properties of \(\tau\)-adic expansions on hyperelliptic Koblitz curves
Journal of Applied Mathematics and Computing
2018-09-25Paper
HFERP -- a new multivariate encryption scheme
 
2018-06-22Paper
A public-key encryption scheme based on non-linear indeterminate equations
 
2018-04-26Paper
LLL and stochastic sandpile models
 
2018-04-07Paper
Short-Memory Scalar Multiplication for Koblitz Curves
IEEE Transactions on Computers
2017-11-10Paper
One-Wayness Equivalent to General Factoring
IEEE Transactions on Information Theory
2017-08-08Paper
Algorithms and Arithmetic Operators for Computing the ηT Pairing in Characteristic Three
IEEE Transactions on Computers
2017-08-08Paper
A multivariate quadratic challenge toward post-quantum generation cryptography
ACM Communications in Computer Algebra
2017-06-22Paper
Revisiting the efficient key generation of ZHFE
Codes, Cryptology and Information Security
2017-06-01Paper
Revisiting the cubic UOV signature scheme
Information Security and Cryptology – ICISC 2016
2017-05-19Paper
Anonymous spatial encryption under affine space delegation functionality with full security
Information Sciences
2017-01-31Paper
On tameness of Matsumoto-Imai central maps in three variables over the finite field \(\mathbb F_2\)
Advances in Mathematics of Communications
2016-10-12Paper
Improved progressive BKZ algorithms and their precise cost estimation by sharp simulator
Advances in Cryptology – EUROCRYPT 2016
2016-09-09Paper
Reducing the key size of the SRP encryption scheme
Information Security and Privacy
2016-09-02Paper
Privacy-preserving \(k\)-nearest neighbour query on outsourced database
Information Security and Privacy
2016-08-31Paper
Improvement of FPPR method to solve ECDLP
Pacific Journal of Mathematics for Industry
2016-08-12Paper
Mathematics of post-quantum cryptography (to appear)
Mathematics for Industry
2016-03-11Paper
Power analysis to ECC using differential power between multiplication and squaring
Smart Card Research and Advanced Applications
2015-11-11Paper
Cheater Identifiable Secret Sharing Schemes via Multi-Receiver Authentication
Advances in Information and Computer Security
2015-05-27Paper
Certificateless hybrid signcryption
Mathematical and Computer Modelling
2015-02-19Paper
A polynomial-time algorithm for solving a class of underdetermined multivariate quadratic equations over fields of odd characteristics
Post-Quantum Cryptography
2015-01-14Paper
Identity-based partially blind signature in the standard model for electronic cash
Mathematical and Computer Modelling
2014-10-21Paper
Efficient Algorithm for Tate Pairing of Composite Order
Advances in Information and Computer Security
2014-09-15Paper
Improvement of Faugère et al.'s method to solve ECDLP
Advances in Information and Computer Security
2014-09-15Paper
On cheater identifiable secret sharing schemes secure against rushing adversary
Advances in Information and Computer Security
2014-09-15Paper
Secure identity-based signcryption in the standard model
Mathematical and Computer Modelling
2014-05-14Paper
Parallel Gauss sieve algorithm: solving the SVP challenge over a 128-dimensional ideal lattice
Public-Key Cryptography – PKC 2014
2014-03-25Paper
An experiment of number field sieve for discrete logarithm problem over \(\mathrm{GF}(p^{12})\)
Lecture Notes in Computer Science
2013-12-10Paper
Further improvement of an identity-based signcryption scheme in the standard model
Computers and Electrical Engineering
2013-08-19Paper
An exhaustive search method to find all small solutions of a multivariate modular linear equation
JSIAM Letters
2013-08-09Paper
Attacks on multi-prime RSA with small prime difference
Information Security and Privacy
2013-06-28Paper
Multivariate Signature Scheme Using Quadratic Forms
Post-Quantum Cryptography
2013-06-14Paper
Extended algorithm for solving underdefined multivariate quadratic equations
Post-Quantum Cryptography
2013-06-14Paper
Batch verification suitable for efficiently verifying a limited number of signatures
Lecture Notes in Computer Science
2013-06-04Paper
Efficient secure primitive for privacy preserving distributed computations
Advances in Information and Computer Security
2013-04-04Paper
Application of scalar multiplication of Edwards curves to pairing-based cryptography
Advances in Information and Computer Security
2013-04-04Paper
Breaking Pairing-Based Cryptosystems Using η T Pairing over GF(397)
Advances in Cryptology – ASIACRYPT 2012
2013-03-19Paper
Zero-knowledge protocols for the McEliece encryption
Information Security and Privacy
2012-09-07Paper
Group-oriented setting's multisigncryption scheme with threshold designcryption
Information Sciences
2012-07-13Paper
Key Length Estimation of Pairing-Based Cryptosystems Using η T Pairing
Information Security Practice and Experience
2012-06-29Paper
Reducing the key size of rainbow using non-commutative rings
Lecture Notes in Computer Science
2012-06-08Paper
General Fault Attacks on Multivariate Public Key Cryptosystems
Post-Quantum Cryptography
2011-11-25Paper
Efficient identity-based signcryption in the standard model
Provable Security
2011-09-16Paper
Anonymous encryption with partial-order subset delegation functionality
Provable Security
2011-09-16Paper
GeoENC: geometric area based keys and policies in functional encryption systems
Information Security and Privacy
2011-07-07Paper
An experiment of number field sieve over \(\mathrm{GF}(p)\) of low Hamming weight characteristic
Lecture Notes in Computer Science
2011-06-08Paper
Pairing-based cryptography and its security analysis
 
2011-05-06Paper
Some properties of ${\tau}$-adic expansions on hyperelliptic Koblitz curves
 
2011-01-21Paper
Efficient arithmetic on subfield elliptic curves over small finite fields of odd characteristic
Journal of Mathematical Cryptology
2011-01-13Paper
On the zero-run length of a signed binary representation
 
2010-09-14Paper
Solving a 676-bit discrete logarithm problem in \(\text{GF}(3^{6n})\)
Public Key Cryptography – PKC 2010
2010-05-28Paper
FPGA and ASIC implementations of the \(\eta _T\) pairing in characteristic three
Computers and Electrical Engineering
2010-04-07Paper
A more flexible countermeasure against side channel attacks using window method.
Lecture Notes in Computer Science
2010-03-09Paper
Pairing-based cryptography and its security analysis
 
2010-02-24Paper
Zero-Value Point Attacks on Elliptic Curve Cryptosystem
Lecture Notes in Computer Science
2010-02-09Paper
A complete and explicit security reduction algorithm for RSA-based cryptosystems
Lecture Notes in Computer Science
2010-01-05Paper
Some RSA-based encryption schemes with tight security reduction
Lecture Notes in Computer Science
2010-01-05Paper
Generalized powering functions and their application to digital signatures
Lecture Notes in Computer Science
2010-01-05Paper
An efficient residue group multiplication for the \(\eta _{T }\) pairing over \({\mathbb F}_{3^m}\)
Selected Areas in Cryptography
2009-12-09Paper
Public Key Cryptography – PKC 2004
Lecture Notes in Computer Science
2009-05-14Paper
Efficient Signcryption Key Encapsulation without Random Oracles
Information Security and Cryptology
2009-04-29Paper
Efficient Multi-PKG ID-Based Signcryption for Ad Hoc Networks
Information Security and Cryptology
2009-04-29Paper
Further Security Analysis of XTR
Information Security Practice and Experience
2009-04-02Paper
Compressed XTR
Applied Cryptography and Network Security
2009-03-10Paper
New Security Problem in RFID Systems “Tag Killing”
Computational Science and Its Applications - ICCSA 2006
2009-02-10Paper
Faster Implementation of η T Pairing over GF(3 m ) Using Minimum Number of Logical Instructions for GF(3)-Addition
Pairing-Based Cryptography – Pairing 2008
2009-02-10Paper
Side Channel Attacks and Countermeasures on Pairing Based Cryptosystems over Binary Fields
Cryptology and Network Security
2009-01-09Paper
On the Security of Online/Offline Signatures and Multisignatures from ACISP’06
Cryptology and Network Security
2009-01-09Paper
Digital Signatures Out of Second-Preimage Resistant Hash Functions
Post-Quantum Cryptography
2008-11-11Paper
Reduction Optimal Trinomials for Efficient Software Implementation of the η T Pairing
Advances in Information and Computer Security
2008-07-25Paper
New Approach for Selectively Convertible Undeniable Signature Schemes
Advances in Cryptology – ASIACRYPT 2006
2008-04-24Paper
Some Improved Algorithms for Hyperelliptic Curve Cryptosystems Using Degenerate Divisors
Lecture Notes in Computer Science
2008-03-17Paper
A Coprocessor for the Final Exponentiation of the η T Pairing in Characteristic Three
Arithmetic of Finite Fields
2007-11-15Paper
Analysis of fractional window recoding methods and their application to elliptic curve cryptosystems
IEEE Transactions on Computers
2007-01-09Paper
Information Security
Lecture Notes in Computer Science
2006-10-16Paper
Progress in Cryptology – Mycrypt 2005
Lecture Notes in Computer Science
2006-10-05Paper
scientific article; zbMATH DE number 5056807 (Why is no real title available?)
 
2006-09-25Paper
Information Security and Privacy
Lecture Notes in Computer Science
2006-06-22Paper
Information Security and Privacy
Lecture Notes in Computer Science
2006-06-22Paper
Progress in Cryptology - INDOCRYPT 2004
Lecture Notes in Computer Science
2005-12-22Paper
Progress in Cryptology - INDOCRYPT 2004
Lecture Notes in Computer Science
2005-12-22Paper
Information Security and Privacy
Lecture Notes in Computer Science
2005-09-07Paper
Contemporary cryptology.
Advanced Courses in Mathematics -- CRM Barcelona
2005-08-30Paper
Advances in Cryptology – CRYPTO 2004
Lecture Notes in Computer Science
2005-08-23Paper
Applied Cryptography and Network Security
Lecture Notes in Computer Science
2005-06-13Paper
scientific article; zbMATH DE number 2154276 (Why is no real title available?)
 
2005-04-08Paper
scientific article; zbMATH DE number 2085418 (Why is no real title available?)
 
2004-08-09Paper
scientific article; zbMATH DE number 2085437 (Why is no real title available?)
 
2004-08-09Paper
Efficient undeniable signature schemes based on ideal arithmetic in quadratic orders
Designs, Codes and Cryptography
2004-06-11Paper
scientific article; zbMATH DE number 1980962 (Why is no real title available?)
 
2003-09-15Paper
scientific article; zbMATH DE number 1962161 (Why is no real title available?)
 
2003-08-10Paper
scientific article; zbMATH DE number 1955800 (Why is no real title available?)
 
2003-07-29Paper
Exceptional Procedure Attack on Elliptic Curve Cryptosystems
Public Key Cryptography — PKC 2003
2003-07-27Paper
scientific article; zbMATH DE number 1950328 (Why is no real title available?)
 
2003-07-17Paper
scientific article; zbMATH DE number 1950619 (Why is no real title available?)
 
2003-07-17Paper
scientific article; zbMATH DE number 1950624 (Why is no real title available?)
 
2003-07-17Paper
scientific article; zbMATH DE number 1950360 (Why is no real title available?)
 
2003-07-17Paper
An ethological and emotional basis for human–robot interaction
Robotics and Autonomous Systems
2003-04-03Paper
scientific article; zbMATH DE number 1759644 (Why is no real title available?)
 
2002-11-24Paper
How to choose secret parameters for RSA-type cryptosystems over elliptic curves
Designs, Codes and Cryptography
2002-06-10Paper
scientific article; zbMATH DE number 1504551 (Why is no real title available?)
 
2002-01-13Paper
scientific article; zbMATH DE number 1504821 (Why is no real title available?)
 
2000-11-07Paper
scientific article; zbMATH DE number 1302856 (Why is no real title available?)
 
2000-03-08Paper
A new public-key cryptosystem over a quadratic order with quadratic decryption time.
Journal of Cryptology
2000-01-01Paper
scientific article; zbMATH DE number 1303130 (Why is no real title available?)
 
1999-09-09Paper
scientific article; zbMATH DE number 1088247 (Why is no real title available?)
 
1998-07-06Paper
Product formula of the cubic Gauss sum modulo the product of the primes
Journal of Number Theory
1997-12-03Paper


Research outcomes over time


This page was built for person: Tsuyoshi Takagi