Tsuyoshi Takagi

From MaRDI portal
Person:203449

Available identifiers

zbMath Open takagi.tsuyoshiMaRDI QIDQ203449

List of research outcomes

PublicationDate of PublicationType
Correction to: ``Efficient search for superspecial hyperelliptic curves of genus four with automorphism group containing \({\mathbf{C}}_6\)2024-02-06Paper
Improvement of the square-root Vélu's formulas for isogeny-based cryptography2023-12-19Paper
How to construct CSIDH on Edwards curves2023-11-07Paper
Efficient search for superspecial hyperelliptic curves of genus four with automorphism group containing \(\mathbf{C}_6\)2023-10-24Paper
A new fault attack on UOV multivariate signature scheme2023-07-07Paper
A New Variant of Unbalanced Oil and Vinegar Using Quotient Ring: QR-UOV2023-05-26Paper
Short lattice signatures in the standard model with efficient tag generation2023-03-21Paper
SiGamal: a supersingular isogeny-based PKE and its application to a PRF2023-03-21Paper
\( L_1\)-norm ball for CSIDH: optimal strategy for choosing the secret key space2023-02-22Paper
The multi-variable modular polynomial and its applications to cryptography2023-01-25Paper
Improving Fault Attacks on Rainbow with Fixing Random Vinegar Values2023-01-18Paper
A physical study of the LLL algorithm2023-01-12Paper
A Compact Digital Signature Scheme Based on the Module-LWR Problem2022-12-21Paper
Explicit construction of the square-root Vélu's formula on Edwards curves2022-11-09Paper
Choosing parameters for the subfield lattice attack against overstretched NTRU2022-11-02Paper
Cryptanalysis of efficient proxy signature schemes for mobile communication2022-10-28Paper
Group Key Exchange from CSIDH and Its Application to Trusted Setup in Supersingular Isogeny Cryptosystems2022-10-14Paper
A Structural Attack on Block-Anti-Circulant UOV at SAC 20192022-10-13Paper
Multivariate Encryption Schemes Based on Polynomial Equations over Real Numbers2022-10-13Paper
Secure and Efficient Pairing at 256-Bit Security Level2022-07-01Paper
Comments on efficient batch verification test for digital signatures based on elliptic curves2022-06-14Paper
Shortest vectors in lattices of Bai-Galbraith's embedding attack on the LWR problem2022-04-22Paper
(Short paper) Simple matrix signature scheme2022-04-22Paper
An efficient authenticated key exchange from random self-reducibility on CSIDH2022-03-24Paper
Improving Thomae-Wolf algorithm for solving underdetermined multivariate quadratic polynomial problem2022-03-22Paper
New complexity estimation on the rainbow-band-separation attack2021-11-18Paper
Improving key mismatch attack on NewHope with fewer queries2021-06-08Paper
A physical study of the LLL algorithm2021-06-03Paper
On collisions related to an ideal class of order 3 in CSIDH2021-02-23Paper
How to construct CSIDH on Edwards curves2020-08-05Paper
An Experimental Study of Kannan’s Embedding Technique for the Search LWE Problem2020-07-20Paper
One sample ring-LWE with rounding and its application to key exchange2020-01-30Paper
Tight reductions for Diffie-Hellman variants in the algebraic group model2020-01-28Paper
On the complexity of the LWR-solving BKW algorithm2019-03-29Paper
Efficient system parameters for Identity-Based Encryption using supersingular elliptic curves2019-03-18Paper
An experiment of number field sieve for discrete logarithm problem over $\text{GF}(p^n)$2019-03-18Paper
Heuristic counting of Kachisa-Schaefer-Scott curves2019-03-18Paper
Constructing an efficient hash function from $3$-isogenies2019-03-18Paper
Security analysis of cryptosystems using short generators over ideal lattices2018-12-21Paper
Cryptanalysis of a public key cryptosystem based on Diophantine equations via weighted LLL reduction2018-12-07Paper
Cryptanalysis of a public key cryptosystem based on Diophantine equations via weighted LLL reduction (short paper)2018-10-24Paper
Chosen message attack on multivariate signature ELSA at Asiacrypt 20172018-10-24Paper
Estimated cost for solving generalized learning with errors problem via embedding techniques2018-10-24Paper
The Beauty and the Beasts -- the hard cases in LLL reduction2018-10-24Paper
Efficient decryption algorithms for extension field cancellation type encryption schemes2018-09-26Paper
Improving the BKZ reduction algorithm by quick reordering technique2018-09-26Paper
Some properties of \(\tau\)-adic expansions on hyperelliptic Koblitz curves2018-09-25Paper
HFERP -- a new multivariate encryption scheme2018-06-22Paper
A public-key encryption scheme based on non-linear indeterminate equations2018-04-26Paper
LLL and stochastic sandpile models2018-04-07Paper
Short-Memory Scalar Multiplication for Koblitz Curves2017-11-10Paper
One-Wayness Equivalent to General Factoring2017-08-08Paper
Algorithms and Arithmetic Operators for Computing the ηT Pairing in Characteristic Three2017-08-08Paper
A multivariate quadratic challenge toward post-quantum generation cryptography2017-06-22Paper
Revisiting the Efficient Key Generation of ZHFE2017-06-01Paper
Revisiting the Cubic UOV Signature Scheme2017-05-19Paper
Anonymous spatial encryption under affine space delegation functionality with full security2017-01-31Paper
On tameness of Matsumoto-Imai central maps in three variables over the finite field \(\mathbb F_2\)2016-10-12Paper
Improved Progressive BKZ Algorithms and Their Precise Cost Estimation by Sharp Simulator2016-09-09Paper
Reducing the Key Size of the SRP Encryption Scheme2016-09-02Paper
Privacy-Preserving k-Nearest Neighbour Query on Outsourced Database2016-08-31Paper
Improvement of FPPR method to solve ECDLP2016-08-12Paper
Mathematics of post-quantum cryptography (to appear)2016-03-11Paper
Power Analysis to ECC Using Differential Power Between Multiplication and Squaring2015-11-11Paper
Cheater Identifiable Secret Sharing Schemes via Multi-Receiver Authentication2015-05-27Paper
Certificateless hybrid signcryption2015-02-19Paper
A Polynomial-Time Algorithm for Solving a Class of Underdetermined Multivariate Quadratic Equations over Fields of Odd Characteristics2015-01-14Paper
Identity-based partially blind signature in the standard model for electronic cash2014-10-21Paper
Improvement of Faugère et al.’s Method to Solve ECDLP2014-09-15Paper
Efficient Algorithm for Tate Pairing of Composite Order2014-09-15Paper
On Cheater Identifiable Secret Sharing Schemes Secure against Rushing Adversary2014-09-15Paper
Secure identity-based signcryption in the standard model2014-05-14Paper
Parallel Gauss Sieve Algorithm: Solving the SVP Challenge over a 128-Dimensional Ideal Lattice2014-03-25Paper
An Experiment of Number Field Sieve for Discrete Logarithm Problem over GF(p 12)2013-12-10Paper
Further improvement of an identity-based signcryption scheme in the standard model2013-08-19Paper
An exhaustive search method to find all small solutions of a multivariate modular linear equation2013-08-09Paper
Attacks on Multi-Prime RSA with Small Prime Difference2013-06-28Paper
Extended Algorithm for Solving Underdefined Multivariate Quadratic Equations2013-06-14Paper
Multivariate Signature Scheme Using Quadratic Forms2013-06-14Paper
Batch Verification Suitable for Efficiently Verifying a Limited Number of Signatures2013-06-04Paper
Application of Scalar Multiplication of Edwards Curves to Pairing-Based Cryptography2013-04-04Paper
Efficient Secure Primitive for Privacy Preserving Distributed Computations2013-04-04Paper
Breaking Pairing-Based Cryptosystems Using η T Pairing over GF(397)2013-03-19Paper
Zero-Knowledge Protocols for the McEliece Encryption2012-09-07Paper
Group-oriented setting's multisigncryption scheme with threshold designcryption2012-07-13Paper
Key Length Estimation of Pairing-Based Cryptosystems Using η T Pairing2012-06-29Paper
Reducing the Key Size of Rainbow Using Non-commutative Rings2012-06-08Paper
General Fault Attacks on Multivariate Public Key Cryptosystems2011-11-25Paper
Efficient Identity-Based Signcryption in the Standard Model2011-09-16Paper
Anonymous Encryption with Partial-Order Subset Delegation Functionality2011-09-16Paper
GeoEnc: Geometric Area Based Keys and Policies in Functional Encryption Systems2011-07-07Paper
An Experiment of Number Field Sieve over GF(p) of Low Hamming Weight Characteristic2011-06-08Paper
https://portal.mardi4nfdi.de/entity/Q29962852011-05-06Paper
Some properties of ${\tau}$-adic expansions on hyperelliptic Koblitz curves2011-01-21Paper
Efficient arithmetic on subfield elliptic curves over small finite fields of odd characteristic2011-01-13Paper
https://portal.mardi4nfdi.de/entity/Q57479082010-09-14Paper
Solving a 676-Bit Discrete Logarithm Problem in GF(36n )2010-05-28Paper
FPGA and ASIC implementations of the \(\eta _T\) pairing in characteristic three2010-04-07Paper
A More Flexible Countermeasure against Side Channel Attacks Using Window Method2010-03-09Paper
https://portal.mardi4nfdi.de/entity/Q34080922010-02-24Paper
Zero-Value Point Attacks on Elliptic Curve Cryptosystem2010-02-09Paper
Advances in Cryptology - ASIACRYPT 20032010-01-05Paper
Advances in Cryptology - ASIACRYPT 20032010-01-05Paper
Advances in Cryptology - ASIACRYPT 20032010-01-05Paper
An Efficient Residue Group Multiplication for the η T Pairing over ${\mathbb F}_{3^m}$2009-12-09Paper
Public Key Cryptography – PKC 20042009-05-14Paper
Efficient Signcryption Key Encapsulation without Random Oracles2009-04-29Paper
Efficient Multi-PKG ID-Based Signcryption for Ad Hoc Networks2009-04-29Paper
Further Security Analysis of XTR2009-04-02Paper
Compressed XTR2009-03-10Paper
New Security Problem in RFID Systems “Tag Killing”2009-02-10Paper
Faster Implementation of η T Pairing over GF(3 m ) Using Minimum Number of Logical Instructions for GF(3)-Addition2009-02-10Paper
Side Channel Attacks and Countermeasures on Pairing Based Cryptosystems over Binary Fields2009-01-09Paper
On the Security of Online/Offline Signatures and Multisignatures from ACISP’062009-01-09Paper
Digital Signatures Out of Second-Preimage Resistant Hash Functions2008-11-11Paper
Reduction Optimal Trinomials for Efficient Software Implementation of the η T Pairing2008-07-25Paper
New Approach for Selectively Convertible Undeniable Signature Schemes2008-04-24Paper
Some Improved Algorithms for Hyperelliptic Curve Cryptosystems Using Degenerate Divisors2008-03-17Paper
A Coprocessor for the Final Exponentiation of the η T Pairing in Characteristic Three2007-11-15Paper
Analysis of fractional window recoding methods and their application to elliptic curve cryptosystems2007-01-09Paper
Information Security2006-10-16Paper
Progress in Cryptology – Mycrypt 20052006-10-05Paper
https://portal.mardi4nfdi.de/entity/Q54890622006-09-25Paper
Information Security and Privacy2006-06-22Paper
Information Security and Privacy2006-06-22Paper
Progress in Cryptology - INDOCRYPT 20042005-12-22Paper
Progress in Cryptology - INDOCRYPT 20042005-12-22Paper
Information Security and Privacy2005-09-07Paper
Contemporary cryptology.2005-08-30Paper
Advances in Cryptology – CRYPTO 20042005-08-23Paper
Applied Cryptography and Network Security2005-06-13Paper
https://portal.mardi4nfdi.de/entity/Q46648372005-04-08Paper
https://portal.mardi4nfdi.de/entity/Q30439232004-08-09Paper
https://portal.mardi4nfdi.de/entity/Q30439452004-08-09Paper
Efficient undeniable signature schemes based on ideal arithmetic in quadratic orders2004-06-11Paper
https://portal.mardi4nfdi.de/entity/Q44283472003-09-15Paper
https://portal.mardi4nfdi.de/entity/Q44185472003-08-10Paper
https://portal.mardi4nfdi.de/entity/Q44174142003-07-29Paper
Exceptional Procedure Attack on Elliptic Curve Cryptosystems2003-07-27Paper
https://portal.mardi4nfdi.de/entity/Q44129562003-07-17Paper
https://portal.mardi4nfdi.de/entity/Q44129982003-07-17Paper
https://portal.mardi4nfdi.de/entity/Q44133322003-07-17Paper
https://portal.mardi4nfdi.de/entity/Q44133372003-07-17Paper
An ethological and emotional basis for human–robot interaction2003-04-03Paper
https://portal.mardi4nfdi.de/entity/Q45366382002-11-24Paper
How to choose secret parameters for RSA-type cryptosystems over elliptic curves2002-06-10Paper
https://portal.mardi4nfdi.de/entity/Q45025022002-01-13Paper
https://portal.mardi4nfdi.de/entity/Q45027992000-11-07Paper
https://portal.mardi4nfdi.de/entity/Q42493412000-03-08Paper
A new public-key cryptosystem over a quadratic order with quadratic decryption time.2000-01-01Paper
https://portal.mardi4nfdi.de/entity/Q42496461999-09-09Paper
https://portal.mardi4nfdi.de/entity/Q43645641998-07-06Paper
Product formula of the cubic Gauss sum modulo the product of the primes1997-12-03Paper

Research outcomes over time


Doctoral students

No records found.


Known relations from the MaRDI Knowledge Graph

PropertyValue
MaRDI profile typeMaRDI person profile
instance ofhuman


This page was built for person: Tsuyoshi Takagi