TU Darmstadt / ULB / TUbiblio

Browse by Person

Up a level
Export as [feed] Atom [feed] RSS 1.0 [feed] RSS 2.0
Group by: No Grouping | Item Type | Date | Language
Number of items: 51.

Kuo, Po-Chun and Schneider, Michael and Dagdelen, Özgür and Reichelt, Jan and Buchmann, Johannes and Cheng, Chen-Mou and Yang, Bo-Yin
Preneel, Bart and Takagi, Tsuyoshi (eds.) (2011):
Extreme Enumeration on GPU and in Clouds - How Many Dollars You Need to Break SVP Challenges -.
In: Workshop on Cryptographic Hardware and Embedded Systems - CHES 2011, Springer, In: LNCS, [Conference or Workshop Item]

Schneider, Michael and Göttert, Norman
Preneel, Bart and Takagi, Tsuyoshi (eds.) (2011):
Random Sampling for Short Lattice Vectors on Graphics Cards.
In: Workshop on Cryptographic Hardware and Embedded Systems 2011 (CHES 2011), Springer, Nara, Japan, In: LNCS, DOI: 10.1007/978-3-642-23951-9_11,
[Conference or Workshop Item]

Petzoldt, Albrecht and Thomae, Enrico and Bulygin, Stanislav and Wolf, Christopher
Preneel, Bart and Takagi, Tsuyoshi (eds.) (2011):
Small Public Keys and Fast Verification for Multivariate Quadratic Public Key Systems.
In: Proceedings of "Workshop on Cryptographic Hardware and Embedded Systems 2011 (CHES 2011)", Springer, In: Lecture Notes in Computer Science, 6917, [Conference or Workshop Item]

Dahmen, Erik and Okeya, Katsuyuki and Takagi, Tsuyoshi and Vuillaume, Camille
Buchmann, Johannes and Ding, Jintai (eds.) (2008):
Digital Signatures out of Second-Preimage Resistant Hash Functions.
In: PQCrypto 2008, Springer, Cincinnati, USA, In: LNCS, ISBN 978-3-540-88402-6,
[Conference or Workshop Item]

Dahmen, Erik and Okeya, Katsuyuki and Takagi, Tsuyoshi (2007):
A New Upper Bound for the Minimal Density of Joint Representations in Elliptic Curve Cryptosystems.
In: >IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences, Special Section on Discrete Mathematics and Its Applications, pp. 952-959, E90-A, (5), [Article]

Schmidt-Samoa, Katja and Semay, Olivier and Takagi, Tsuyoshi (2006):
Analysis of Fractional Window Recoding Methods and Their Application to Elliptic Curve Cryptosystems.
In: >IEEE Transactions on Computers, pp. 48-57, 55, (1), [Article]

Araújo, Roberto and Custódio, Ricardo Felipe and Wiesmaier, Alexander and Takagi, Tsuyoshi (2006):
An Electronic Scheme for the Farnel Paper-Based Voting Protocol.
In: Industrial Track Proceedings of the 4th International Conference on Applied Cryptography and Network Security (ACNS 06), Springer, [Conference or Workshop Item]

Schmidt-Samoa, Katja and Takagi, Tsuyoshi (2005):
Paillier's Cryptosystem Modulo p2q and Its Applications to Trapdoor Commitment Schemes.
In: Progress in Cryptology - Mycrypt 2005, First International Conference on Cryptology in Malaysia, Springer, Kuala Lumpur, Malaysia, In: LNCS, 3715, ISBN 3-540-28938-0,
DOI: 10.1007/11554868_21,
[Conference or Workshop Item]

Dahmen, Erik and Okeya, Katsuyuki and Takagi, Tsuyoshi (2005):
Efficient Left-to-Right Multi-Exponentiations.
(TI-2/05), [Report]

Sato, Hisayoshi and Schepers, Daniel and Takagi, Tsuyoshi (2004):
Exact Analysis of Montgomery Multiplication.
In: INDOCRYPT 2004 - 5th International Conference on Cryptology in India, Springer, Chennai, India, In: LNCS, 3348, ISBN 3-540-24130-2,
[Conference or Workshop Item]

Okeya, Katsuyuki and Takagi, Tsuyoshi and Vuillaume, Camille (2004):
On the Importance of Protecting {$Delta$} in {SFLASH} against Side Channel Attacks.
In: Itcc 2004: International Conference on Information Technology: Coding and Computing, Las Vegas, Nevada, USA, [Conference or Workshop Item]

Okeya, Katsuyuki and Schmidt-Samoa, Katja and Spahn, Christian and Takagi, Tsuyoshi (2004):
Signed binary representations revisited.
Berlin [u.a.], Springer, In: Advances in cryptology : proceedings / CRYPTO 2004, 24th Annual International Cryptology Conference, Santa Barbara, California, USA, August 15 - 19, 2004. Matt Franklin (ed.). - Berlin [u.a.] : Springer, 2004. - XI, 578 S.- (Lecture notes in computer scie, [Conference or Workshop Item]

Schmidt-Samoa, Katja and Semay, Olivier and Takagi, Tsuyoshi (2004):
Analysis of Some Efficient Window Methods and their Application to Elliptic Curve Cryptosystems.
(TI-3/04), [Report]

Biehl, Ingrid and Paulus, Sachar and Takagi, Tsuyoshi (2004):
Efficient Undeniable Signature Schemes Based on Ideal Arithmetic in Quadratic Orders.
In: >IJDCC: Designs, Codes and Cryptography, pp. 99-123, 31, (2), [Article]

Sato, Hisayoshi and Schepers, Daniel and Takagi, Tsuyoshi (2004):
Exact Analysis of Montgomery Multiplication.
(TI-2/04), [Report]

Buchmann, Johannes and Takagi, Tsuyoshi and Vollmer, Ulrich (2004):
Number field cryptography.
In: High Primes and Misdemeanours: Lectures in Honour of the 60th Birthday of Hugh Cowie Williams, 41, ISBN 200-8218-3353-7,
[Conference or Workshop Item]

Okeya, Katsuyuki and Takagi, Tsuyoshi and Vuillaume, Camille (2004):
On the Importance of Protecting {$Delta$} in {SFLASH} against Side Channel Attack.
(TI-8/04), [Report]

Okeya, Katsuyuki and Schmidt-Samoa, Katja and Spahn, Christian and Takagi, Tsuyoshi (2004):
Signed Binary Representations Revisited.
In: CRYPTO 2004, Springer, In: Advances in cryptology : proceedings / CRYPTO 2004, 24th Annual International Cryptology Conference, Santa Barbara, California, USA, August 15 - 19, 2004, In: LNCS, 3152, [Conference or Workshop Item]

Kurosawa, Kaoru and Schmidt-Samoa, Katja and Takagi, Tsuyoshi (2003):
A Complete and Explicit Security Reduction Algorithm for RSA-Based Cryptosystems.
In: ASIACRYPT 2003 - 9th International Conference on the Theory and Application of Cryptology and Information Security, Springer, Taipei, Taiwan, In: LNCS, 2894, ISBN 3-540-20592-6,
DOI: 10.1007/b94617,
[Conference or Workshop Item]

Akishita, Toru and Takagi, Tsuyoshi (2003):
Zero-Value Point Attacks on Elliptic Curve Cryptosystem.
In: ISC 2003 - Information Security, 6th International Conference, Springer, Bristol, UK, In: LNCS, 2851, ISBN 3-540-20176-9,
[Conference or Workshop Item]

Kurosawa, Kaoru and Schmidt-Samoa, Katja and Takagi, Tsuyoshi (2003):
A Complete and Explicit Security Reduction Algorithm for RSA-Based Cryptosystems.
(TI-9/03), [Report]

Buchmann, Johannes and Takagi, Tsuyoshi (2003):
Kryptographie - Chancen und Risiken.
(TI-6/03), [Report]

Buchmann, Johannes and Takagi, Tsuyoshi and Vollmer, Ulrich (2003):
Number field cryptography.
(TI-11/03), [Report]

Akishita, Toru and Takagi, Tsuyoshi (2003):
Zero-Value Point Attacks on Elliptic Curve Cryptosystem.
(TI-1/03), [Report]

Izu, Tetsuya and Möller, Bodo and Takagi, Tsuyoshi (2002):
Improved Elliptic Curve Multiplication Methods Resistant against Side Channel Attacks.
In: Progress in Cryptology - INDOCRYPT 2002, Third International Conference on Cryptology, Springer, Hyderabad, India, In: LNCS, ISBN 3-540-00263-4,
[Conference or Workshop Item]

Buchmann, Johannes and Sakurai, Kouichi and Takagi, Tsuyoshi (2002):
An IND-CCA2 Public-Key Cryptosystem with Fast Decryption.
In: ICISC 2002 - Information Security and Cryptology, 5th International Conference, Springer, Seoul, Korea, In: LNCS, ISBN {3-540-00716-4,
[Conference or Workshop Item]

Sakurai, Kouichi and Takagi, Tsuyoshi (2002):
On the Security of a Modified Paillier Public-Key Primitive.
In: ACISP 2002 - Information Security and Privacy, 7th Australian Conference, Springer, Melbourne, Australia, In: LNCS, 2384, ISBN 3-540-43861-0,
[Conference or Workshop Item]

Sakurai, Kouichi and Takagi, Tsuyoshi (2002):
New Semantically Secure Public-Key Cryptosystems from the {RSA}-Primitive.
In: PKC 2002 - Public Key Cryptography, 5th International Workshop on Practice and Theory in Public Key Cryptosystems, Springer, Paris, France, In: LNCS, ISBN 3-540-43168-3,
[Conference or Workshop Item]

Izu, Tetsuya and Möller, Bodo and Takagi, Tsuyoshi (2002):
Improved elliptic curve multiplication methods resistant against side channel attacks.
Berlin [u.a.], Springer, In: Progress in cryptology : INDOCRYPT <3, 2002, Hyderabad> / ed. Alfred Menezes ... - Berlin [u.a.] : Springer, 2002. - (Lecture notes in computer science ; 2551). - ISBN 3-540-00263-4. - S. 296-313, [Conference or Workshop Item]

Izu, Tetsuya and Takagi, Tsuyoshi (2002):
On the Security of Brier-Joye{'}s Addition Formula for Weierstrass-form Elliptic Curves.
(TI-3/02), [Report]

Sakurai, Kouichi and Takagi, Tsuyoshi (2002):
On the Security of a Modified Paillier Public-Key Primitive.
(TI-4/02), [Report]

Takagi, Tsuyoshi (2001):
New public-key cryptosystems with fast decryption.
Darmstadt, Technische Universität, TU Darmstadt, [Online-Edition: urn:nbn:de:tuda-tuprints-1043],
[Ph.D. Thesis]

Takagi, Tsuyoshi (2001):
New public key cryptosystems with fast decryption.
Darmstadt, Techn. Univ., TU Darmstadt, [Ph.D. Thesis]

Joye, Marc and Quisquater, Jean-Jacques and Takagi, Tsuyoshi (2001):
How to Choose Secret Parameters for {RSA}-Type Cryptosystems over Elliptic Curves.
In: >Designs, Codes and Cryptography, pp. 297-316, 23, (3), [Article]

Buchmann, Johannes and Sakurai, Kouichi and Takagi, Tsuyoshi (2001):
An {IND-CCA2} Public-Key Cryptosystem with Fast Decryption.
(TI-10/01), [Report]

Sakurai, Kouichi and Takagi, Tsuyoshi (2001):
New Semantically Secure Public-Key Cryptosystems from the {RSA}-Primitive.
(TI-12/01), [Report]

Takagi, Tsuyoshi (2001):
New public-key cryptosystems with fast decryption.
Technische Universit&auml;t Darmstadt, [Ph.D. Thesis]

Paulus, Sachar and Takagi, Tsuyoshi (2000):
A New Public-Key Cryptosystem over a Quadratic Order with Quadratic Decryption Time.
In: >Journal of Cryptology, 13, [Article]

Hühnlein, Detlef and Takagi, Tsuyoshi (1999):
Reducing Logarithms in Totally Non-maximal Imaginary Quadratic Orders to Logarithms in Finite Fields.
In: ASIACRYPT '99, International Conference on the Theory and Applications of Cryptology and Information Security, Springer, Singapore, In: LNCS, ISBN 3-540-66666-4,
[Conference or Workshop Item]

Hartmann, Michael and Paulus, Sachar and Takagi, Tsuyoshi (1999):
NICE - New Ideal Coset Encryption.
In: CHES '99 - Cryptographic Hardware and Embedded Systems, First International Workshop, Springer, Worcester, MA, USA, In: LNCS, ISBN 3-540-66646-X,
[Conference or Workshop Item]

Biehl, Ingrid and Paulus, Sachar and Takagi, Tsuyoshi (1999):
Efficient Undeniable Signature Schemes based on Ideal Arithmetic in Quadratic Orders.
(TI-10/99), [Report]

Appel, Helo and Biehl, Ingrid and Fuhrmann, Arnulf and Ruppert, Markus and Takagi, Tsuyoshi and Takura, Akira and Valentin, Christian (1999):
Ein sicherer, robuster Zeitstempeldienst auf der Basis verteilter {RSA}-Signaturen.
(TI-21/99), [Report]

Hartmann, Michael and Paulus, Sachar and Takagi, Tsuyoshi (1999):
{NICE} - New Ideal Coset Encryption.
(TI-11/99), [Report]

Hühnlein, Detlef and Meyer, Andreas and Takagi, Tsuyoshi (1999):
Rabin and {RSA} analogues based on non-maximal imaginary quadratic orders.
(TI-7/99), [Report]

Hühnlein, Detlef and Takagi, Tsuyoshi (1999):
Reducing logarithms in totally non-maximal imaginary quadratic orders to logarithms in finite fields.
(TI-8/99), [Report]

Paulus, Sachar and Takagi, Tsuyoshi (1999):
A new public-key cryptosystem over quadratic orders with quadratic decryption time.
(TI-9/99), [Report]

Hühnlein, Detlef and Meyer, Andreas and Takagi, Tsuyoshi (1998):
Rabin and {RSA} analogues based on non-maximal imaginary quadratic orders.
In: ICSCI '98 - 1st International Conference on Information Security and Cryptology, Korea Institute of Information Security and Cryptology (KIISC), Seoul, Korea, [Conference or Workshop Item]

Paulus, Sachar and Takagi, Tsuyoshi (1998):
A generalization of the Diffie-Hellman problem and related cryptosystems allowing fast decryption.
In: ICSCI '98 - 1st International Conference on Information Security and Cryptology, Korea Institute of Information Security and Cryptology (KIISC), Seoul, Korea, [Conference or Workshop Item]

Hühnlein, Detlef and Jacobson, Michael J. and Paulus, Sachar and Takagi, Tsuyoshi (1998):
A Cryptosystem Based on Non-maximal Imaginary Quadratic Orders with Fast Decryption.
In: EUROCRYPT '98 - International Conference on the Theory and Application of Cryptographic Techniques, Springer, Espoo, Finland, In: LNCS, ISBN 3-540-64518-7,
[Conference or Workshop Item]

Paulus, Sachar and Takagi, Tsuyoshi (1998):
A generalization of the Diffie-Hellman problem and related cryptosystems allowing fast decryption.
(TI-5/98), [Report]

Joye, Marc and Quisquater, Jean-Jacques and Takagi, Tsuyoshi (1997):
How to Choose Secret Parameters for {RSA}-Type Cryptosystems over Elliptic Curves.
(TI-35/97), [Report]

This list was generated on Sat Oct 19 02:20:02 2019 CEST.