TU Darmstadt / ULB / TUbiblio

Browse by Person

Up a level
Export as [feed] Atom [feed] RSS 1.0 [feed] RSS 2.0
Group by: No Grouping | Item Type | Date | Language
Number of items: 51.

Kuo, Po-Chun and Schneider, Michael and Dagdelen, Özgür and Reichelt, Jan and Buchmann, Johannes and Cheng, Chen-Mou and Yang, Bo-Yin Preneel, Bart and Takagi, Tsuyoshi (eds.) (2011):
Extreme Enumeration on GPU and in Clouds - How Many Dollars You Need to Break SVP Challenges -.
In: LNCS, In: Workshop on Cryptographic Hardware and Embedded Systems - CHES 2011, Springer, pp. 176-191, [Conference or Workshop Item]

Schneider, Michael and Göttert, Norman Preneel, Bart and Takagi, Tsuyoshi (eds.) (2011):
Random Sampling for Short Lattice Vectors on Graphics Cards.
In: LNCS, In: Workshop on Cryptographic Hardware and Embedded Systems 2011 (CHES 2011), Springer, Nara, Japan, pp. 160-175, DOI: 10.1007/978-3-642-23951-9_11,
[Conference or Workshop Item]

Petzoldt, Albrecht and Thomae, Enrico and Bulygin, Stanislav and Wolf, Christopher Preneel, Bart and Takagi, Tsuyoshi (eds.) (2011):
Small Public Keys and Fast Verification for Multivariate Quadratic Public Key Systems.
6917In: Lecture Notes in Computer Science, In: Proceedings of "Workshop on Cryptographic Hardware and Embedded Systems 2011 (CHES 2011)", Springer, pp. 475-490, [Conference or Workshop Item]

Dahmen, Erik and Okeya, Katsuyuki and Takagi, Tsuyoshi and Vuillaume, Camille Buchmann, Johannes and Ding, Jintai (eds.) (2008):
Digital Signatures out of Second-Preimage Resistant Hash Functions.
In: LNCS, In: PQCrypto 2008, Springer, Cincinnati, USA, pp. 109-123, ISBN 978-3-540-88402-6,
[Conference or Workshop Item]

Dahmen, Erik and Okeya, Katsuyuki and Takagi, Tsuyoshi (2007):
A New Upper Bound for the Minimal Density of Joint Representations in Elliptic Curve Cryptosystems.
In: >IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences, Special Section on Discrete Mathematics and Its Applications, E90-A (5), pp. 952-959, [Article]

Schmidt-Samoa, Katja and Semay, Olivier and Takagi, Tsuyoshi (2006):
Analysis of Fractional Window Recoding Methods and Their Application to Elliptic Curve Cryptosystems.
In: >IEEE Transactions on Computers, 55 (1), pp. 48-57, [Article]

Araújo, Roberto and Custódio, Ricardo Felipe and Wiesmaier, Alexander and Takagi, Tsuyoshi (2006):
An Electronic Scheme for the Farnel Paper-Based Voting Protocol.
In: Industrial Track Proceedings of the 4th International Conference on Applied Cryptography and Network Security (ACNS 06), Springer, pp. 78-91, [Conference or Workshop Item]

Schmidt-Samoa, Katja and Takagi, Tsuyoshi (2005):
Paillier's Cryptosystem Modulo p2q and Its Applications to Trapdoor Commitment Schemes.
3715In: LNCS, In: Progress in Cryptology - Mycrypt 2005, First International Conference on Cryptology in Malaysia, Springer, Kuala Lumpur, Malaysia, pp. 296-313, ISBN 3-540-28938-0,
DOI: 10.1007/11554868_21,
[Conference or Workshop Item]

Dahmen, Erik and Okeya, Katsuyuki and Takagi, Tsuyoshi (2005):
Efficient Left-to-Right Multi-Exponentiations.
(TI-2/05), [Report]

Sato, Hisayoshi and Schepers, Daniel and Takagi, Tsuyoshi (2004):
Exact Analysis of Montgomery Multiplication.
3348In: LNCS, In: INDOCRYPT 2004 - 5th International Conference on Cryptology in India, Springer, Chennai, India, pp. 290-304, ISBN 3-540-24130-2,
[Conference or Workshop Item]

Okeya, Katsuyuki and Takagi, Tsuyoshi and Vuillaume, Camille (2004):
On the Importance of Protecting {$Delta$} in {SFLASH} against Side Channel Attacks.
In: Itcc 2004: International Conference on Information Technology: Coding and Computing, Las Vegas, Nevada, USA, pp. 560-568, [Conference or Workshop Item]

Okeya, Katsuyuki and Schmidt-Samoa, Katja and Spahn, Christian and Takagi, Tsuyoshi (2004):
Signed binary representations revisited.
In: Advances in cryptology : proceedings / CRYPTO 2004, 24th Annual International Cryptology Conference, Santa Barbara, California, USA, August 15 - 19, 2004. Matt Franklin (ed.). - Berlin [u.a.] : Springer, 2004. - XI, 578 S.- (Lecture notes in computer scie, Berlin [u.a.], Springer, [Conference or Workshop Item]

Schmidt-Samoa, Katja and Semay, Olivier and Takagi, Tsuyoshi (2004):
Analysis of Some Efficient Window Methods and their Application to Elliptic Curve Cryptosystems.
(TI-3/04), [Report]

Biehl, Ingrid and Paulus, Sachar and Takagi, Tsuyoshi (2004):
Efficient Undeniable Signature Schemes Based on Ideal Arithmetic in Quadratic Orders.
In: >IJDCC: Designs, Codes and Cryptography, 31 (2), pp. 99-123, [Article]

Sato, Hisayoshi and Schepers, Daniel and Takagi, Tsuyoshi (2004):
Exact Analysis of Montgomery Multiplication.
(TI-2/04), [Report]

Buchmann, Johannes and Takagi, Tsuyoshi and Vollmer, Ulrich (2004):
Number field cryptography.
41In: High Primes and Misdemeanours: Lectures in Honour of the 60th Birthday of Hugh Cowie Williams, pp. 111-125, ISBN 200-8218-3353-7,
[Conference or Workshop Item]

Okeya, Katsuyuki and Takagi, Tsuyoshi and Vuillaume, Camille (2004):
On the Importance of Protecting {$Delta$} in {SFLASH} against Side Channel Attack.
(TI-8/04), [Report]

Okeya, Katsuyuki and Schmidt-Samoa, Katja and Spahn, Christian and Takagi, Tsuyoshi (2004):
Signed Binary Representations Revisited.
3152In: LNCS, In: CRYPTO 2004, Springer, In: Advances in cryptology : proceedings / CRYPTO 2004, 24th Annual International Cryptology Conference, Santa Barbara, California, USA, August 15 - 19, 2004, pp. 123-139, [Conference or Workshop Item]

Kurosawa, Kaoru and Schmidt-Samoa, Katja and Takagi, Tsuyoshi (2003):
A Complete and Explicit Security Reduction Algorithm for RSA-Based Cryptosystems.
2894In: LNCS, In: ASIACRYPT 2003 - 9th International Conference on the Theory and Application of Cryptology and Information Security, Springer, Taipei, Taiwan, pp. 474-491, ISBN 3-540-20592-6,
DOI: 10.1007/b94617,
[Conference or Workshop Item]

Akishita, Toru and Takagi, Tsuyoshi (2003):
Zero-Value Point Attacks on Elliptic Curve Cryptosystem.
2851In: LNCS, In: ISC 2003 - Information Security, 6th International Conference, Springer, Bristol, UK, pp. 218-233, ISBN 3-540-20176-9,
[Conference or Workshop Item]

Kurosawa, Kaoru and Schmidt-Samoa, Katja and Takagi, Tsuyoshi (2003):
A Complete and Explicit Security Reduction Algorithm for RSA-Based Cryptosystems.
(TI-9/03), [Report]

Buchmann, Johannes and Takagi, Tsuyoshi (2003):
Kryptographie - Chancen und Risiken.
(TI-6/03), [Report]

Buchmann, Johannes and Takagi, Tsuyoshi and Vollmer, Ulrich (2003):
Number field cryptography.
(TI-11/03), [Report]

Akishita, Toru and Takagi, Tsuyoshi (2003):
Zero-Value Point Attacks on Elliptic Curve Cryptosystem.
(TI-1/03), [Report]

Izu, Tetsuya and Möller, Bodo and Takagi, Tsuyoshi (2002):
Improved Elliptic Curve Multiplication Methods Resistant against Side Channel Attacks.
In: LNCS, In: Progress in Cryptology - INDOCRYPT 2002, Third International Conference on Cryptology, Springer, Hyderabad, India, pp. 296-313, ISBN 3-540-00263-4,
[Conference or Workshop Item]

Buchmann, Johannes and Sakurai, Kouichi and Takagi, Tsuyoshi (2002):
An IND-CCA2 Public-Key Cryptosystem with Fast Decryption.
In: LNCS, In: ICISC 2002 - Information Security and Cryptology, 5th International Conference, Springer, Seoul, Korea, pp. 51-71, ISBN {3-540-00716-4,
[Conference or Workshop Item]

Sakurai, Kouichi and Takagi, Tsuyoshi (2002):
On the Security of a Modified Paillier Public-Key Primitive.
2384In: LNCS, In: ACISP 2002 - Information Security and Privacy, 7th Australian Conference, Springer, Melbourne, Australia, pp. 49-115, ISBN 3-540-43861-0,
[Conference or Workshop Item]

Sakurai, Kouichi and Takagi, Tsuyoshi (2002):
New Semantically Secure Public-Key Cryptosystems from the {RSA}-Primitive.
In: LNCS, In: PKC 2002 - Public Key Cryptography, 5th International Workshop on Practice and Theory in Public Key Cryptosystems, Springer, Paris, France, pp. 387-390, ISBN 3-540-43168-3,
[Conference or Workshop Item]

Izu, Tetsuya and Möller, Bodo and Takagi, Tsuyoshi (2002):
Improved elliptic curve multiplication methods resistant against side channel attacks.
In: Progress in cryptology : INDOCRYPT <3, 2002, Hyderabad> / ed. Alfred Menezes ... - Berlin [u.a.] : Springer, 2002. - (Lecture notes in computer science ; 2551). - ISBN 3-540-00263-4. - S. 296-313, Berlin [u.a.], Springer, [Conference or Workshop Item]

Izu, Tetsuya and Takagi, Tsuyoshi (2002):
On the Security of Brier-Joye{'}s Addition Formula for Weierstrass-form Elliptic Curves.
(TI-3/02), [Report]

Sakurai, Kouichi and Takagi, Tsuyoshi (2002):
On the Security of a Modified Paillier Public-Key Primitive.
(TI-4/02), [Report]

Takagi, Tsuyoshi (2001):
New public-key cryptosystems with fast decryption.
Darmstadt, Technische Universität, TU Darmstadt, [Online-Edition: urn:nbn:de:tuda-tuprints-1043],
[Ph.D. Thesis]

Takagi, Tsuyoshi (2001):
New public key cryptosystems with fast decryption.
Darmstadt, Techn. Univ., TU Darmstadt, [Ph.D. Thesis]

Joye, Marc and Quisquater, Jean-Jacques and Takagi, Tsuyoshi (2001):
How to Choose Secret Parameters for {RSA}-Type Cryptosystems over Elliptic Curves.
In: >Designs, Codes and Cryptography, 23 (3), pp. 297-316, [Article]

Buchmann, Johannes and Sakurai, Kouichi and Takagi, Tsuyoshi (2001):
An {IND-CCA2} Public-Key Cryptosystem with Fast Decryption.
(TI-10/01), [Report]

Sakurai, Kouichi and Takagi, Tsuyoshi (2001):
New Semantically Secure Public-Key Cryptosystems from the {RSA}-Primitive.
(TI-12/01), [Report]

Takagi, Tsuyoshi (2001):
New public-key cryptosystems with fast decryption.
Technische Universit&auml;t Darmstadt, [Ph.D. Thesis]

Paulus, Sachar and Takagi, Tsuyoshi (2000):
A New Public-Key Cryptosystem over a Quadratic Order with Quadratic Decryption Time.
In: >Journal of Cryptology, 13[Article]

Hühnlein, Detlef and Takagi, Tsuyoshi (1999):
Reducing Logarithms in Totally Non-maximal Imaginary Quadratic Orders to Logarithms in Finite Fields.
In: LNCS, In: ASIACRYPT '99, International Conference on the Theory and Applications of Cryptology and Information Security, Springer, Singapore, pp. 219-231, ISBN 3-540-66666-4,
[Conference or Workshop Item]

Hartmann, Michael and Paulus, Sachar and Takagi, Tsuyoshi (1999):
NICE - New Ideal Coset Encryption.
In: LNCS, In: CHES '99 - Cryptographic Hardware and Embedded Systems, First International Workshop, Springer, Worcester, MA, USA, pp. 726-737, ISBN 3-540-66646-X,
[Conference or Workshop Item]

Biehl, Ingrid and Paulus, Sachar and Takagi, Tsuyoshi (1999):
Efficient Undeniable Signature Schemes based on Ideal Arithmetic in Quadratic Orders.
(TI-10/99), [Report]

Appel, Helo and Biehl, Ingrid and Fuhrmann, Arnulf and Ruppert, Markus and Takagi, Tsuyoshi and Takura, Akira and Valentin, Christian (1999):
Ein sicherer, robuster Zeitstempeldienst auf der Basis verteilter {RSA}-Signaturen.
(TI-21/99), [Report]

Hartmann, Michael and Paulus, Sachar and Takagi, Tsuyoshi (1999):
{NICE} - New Ideal Coset Encryption.
(TI-11/99), [Report]

Hühnlein, Detlef and Meyer, Andreas and Takagi, Tsuyoshi (1999):
Rabin and {RSA} analogues based on non-maximal imaginary quadratic orders.
(TI-7/99), [Report]

Hühnlein, Detlef and Takagi, Tsuyoshi (1999):
Reducing logarithms in totally non-maximal imaginary quadratic orders to logarithms in finite fields.
(TI-8/99), [Report]

Paulus, Sachar and Takagi, Tsuyoshi (1999):
A new public-key cryptosystem over quadratic orders with quadratic decryption time.
(TI-9/99), [Report]

Hühnlein, Detlef and Meyer, Andreas and Takagi, Tsuyoshi (1998):
Rabin and {RSA} analogues based on non-maximal imaginary quadratic orders.
In: ICSCI '98 - 1st International Conference on Information Security and Cryptology, Korea Institute of Information Security and Cryptology (KIISC), Seoul, Korea, pp. 221-240, [Conference or Workshop Item]

Paulus, Sachar and Takagi, Tsuyoshi (1998):
A generalization of the Diffie-Hellman problem and related cryptosystems allowing fast decryption.
In: ICSCI '98 - 1st International Conference on Information Security and Cryptology, Korea Institute of Information Security and Cryptology (KIISC), Seoul, Korea, pp. 211-220, [Conference or Workshop Item]

Hühnlein, Detlef and Jacobson, Michael J. and Paulus, Sachar and Takagi, Tsuyoshi (1998):
A Cryptosystem Based on Non-maximal Imaginary Quadratic Orders with Fast Decryption.
In: LNCS, In: EUROCRYPT '98 - International Conference on the Theory and Application of Cryptographic Techniques, Springer, Espoo, Finland, pp. 294-307, ISBN 3-540-64518-7,
[Conference or Workshop Item]

Paulus, Sachar and Takagi, Tsuyoshi (1998):
A generalization of the Diffie-Hellman problem and related cryptosystems allowing fast decryption.
(TI-5/98), [Report]

Joye, Marc and Quisquater, Jean-Jacques and Takagi, Tsuyoshi (1997):
How to Choose Secret Parameters for {RSA}-Type Cryptosystems over Elliptic Curves.
(TI-35/97), [Report]

This list was generated on Sat Jun 6 00:33:24 2020 CEST.