Blättern nach Person
Ebene hoch |
2011
Kuo, Po-Chun ; Schneider, Michael ; Dagdelen, Özgür ; Reichelt, Jan ; Buchmann, Johannes ; Cheng, Chen-Mou ; Yang, Bo-Yin
Hrsg.: Preneel, Bart ; Takagi, Tsuyoshi (2011)
Extreme Enumeration on GPU and in Clouds - How Many Dollars You Need to Break SVP Challenges -.
Konferenzveröffentlichung, Bibliographie
Schneider, Michael ; Göttert, Norman
Hrsg.: Preneel, Bart ; Takagi, Tsuyoshi (2011)
Random Sampling for Short Lattice Vectors on Graphics Cards.
Nara, Japan
doi: 10.1007/978-3-642-23951-9_11
Konferenzveröffentlichung, Bibliographie
Petzoldt, Albrecht ; Thomae, Enrico ; Bulygin, Stanislav ; Wolf, Christopher
Hrsg.: Preneel, Bart ; Takagi, Tsuyoshi (2011)
Small Public Keys and Fast Verification for Multivariate Quadratic Public Key Systems.
Konferenzveröffentlichung, Bibliographie
2008
Dahmen, Erik ; Okeya, Katsuyuki ; Takagi, Tsuyoshi ; Vuillaume, Camille
Hrsg.: Buchmann, Johannes ; Ding, Jintai (2008)
Digital Signatures out of Second-Preimage Resistant Hash Functions.
Cincinnati, USA
Konferenzveröffentlichung, Bibliographie
2007
Dahmen, Erik ; Okeya, Katsuyuki ; Takagi, Tsuyoshi (2007)
A New Upper Bound for the Minimal Density of Joint
Representations in Elliptic Curve Cryptosystems.
In: >IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences, Special Section on Discrete Mathematics and Its Applications, E90-A (5)
Artikel, Bibliographie
2006
Schmidt-Samoa, Katja ; Semay, Olivier ; Takagi, Tsuyoshi (2006)
Analysis of Fractional Window Recoding Methods and Their Application to Elliptic Curve Cryptosystems.
In: >IEEE Transactions on Computers, 55 (1)
Artikel, Bibliographie
Araújo, Roberto ; Custódio, Ricardo Felipe ; Wiesmaier, Alexander ; Takagi, Tsuyoshi (2006)
An Electronic Scheme for the Farnel Paper-Based Voting Protocol.
Konferenzveröffentlichung, Bibliographie
2005
Schmidt-Samoa, Katja ; Takagi, Tsuyoshi (2005)
Paillier's Cryptosystem Modulo p2q and Its Applications to Trapdoor Commitment Schemes.
Kuala Lumpur, Malaysia
doi: 10.1007/11554868_21
Konferenzveröffentlichung, Bibliographie
Dahmen, Erik ; Okeya, Katsuyuki ; Takagi, Tsuyoshi (2005)
Efficient Left-to-Right
Multi-Exponentiations.
Report, Bibliographie
2004
Sato, Hisayoshi ; Schepers, Daniel ; Takagi, Tsuyoshi (2004)
Exact Analysis of Montgomery
Multiplication.
Chennai, India
Konferenzveröffentlichung, Bibliographie
Okeya, Katsuyuki ; Takagi, Tsuyoshi ; Vuillaume, Camille (2004)
On the Importance of Protecting
{$Delta$} in {SFLASH} against Side Channel Attacks.
Las Vegas, Nevada, USA
Konferenzveröffentlichung, Bibliographie
Okeya, Katsuyuki ; Schmidt-Samoa, Katja ; Spahn, Christian ; Takagi, Tsuyoshi (2004)
Signed binary representations revisited.
Konferenzveröffentlichung, Bibliographie
Schmidt-Samoa, Katja ; Semay, Olivier ; Takagi, Tsuyoshi (2004)
Analysis of Some Efficient Window
Methods and their Application to Elliptic Curve Cryptosystems.
Report, Bibliographie
Biehl, Ingrid ; Paulus, Sachar ; Takagi, Tsuyoshi (2004)
Efficient Undeniable Signature Schemes
Based on Ideal Arithmetic in Quadratic Orders.
In: >IJDCC: Designs, Codes and Cryptography, 31 (2)
Artikel, Bibliographie
Sato, Hisayoshi ; Schepers, Daniel ; Takagi, Tsuyoshi (2004)
Exact Analysis of Montgomery
Multiplication.
Report, Bibliographie
Buchmann, Johannes ; Takagi, Tsuyoshi ; Vollmer, Ulrich (2004)
Number field cryptography.
Konferenzveröffentlichung, Bibliographie
Okeya, Katsuyuki ; Takagi, Tsuyoshi ; Vuillaume, Camille (2004)
On the Importance of Protecting
{$Delta$} in {SFLASH} against Side Channel Attack.
Report, Bibliographie
Okeya, Katsuyuki ; Schmidt-Samoa, Katja ; Spahn, Christian ; Takagi, Tsuyoshi (2004)
Signed Binary Representations
Revisited.
Advances in cryptology : proceedings / CRYPTO 2004, 24th Annual International Cryptology Conference. Santa Barbara, California, USA (15.08.2004-19.08.2004)
Konferenzveröffentlichung, Bibliographie
2003
Kurosawa, Kaoru ; Schmidt-Samoa, Katja ; Takagi, Tsuyoshi (2003)
A Complete and Explicit Security
Reduction Algorithm for RSA-Based Cryptosystems.
Taipei, Taiwan
doi: 10.1007/b94617
Konferenzveröffentlichung, Bibliographie
Akishita, Toru ; Takagi, Tsuyoshi (2003)
Zero-Value Point Attacks on Elliptic
Curve Cryptosystem.
Bristol, UK
Konferenzveröffentlichung, Bibliographie
Kurosawa, Kaoru ; Schmidt-Samoa, Katja ; Takagi, Tsuyoshi (2003)
A Complete and Explicit Security
Reduction Algorithm for RSA-Based Cryptosystems.
Report, Bibliographie
Buchmann, Johannes ; Takagi, Tsuyoshi (2003)
Kryptographie - Chancen und Risiken.
Report, Bibliographie
Buchmann, Johannes ; Takagi, Tsuyoshi ; Vollmer, Ulrich (2003)
Number field cryptography.
Report, Bibliographie
Akishita, Toru ; Takagi, Tsuyoshi (2003)
Zero-Value Point Attacks on Elliptic
Curve Cryptosystem.
Report, Bibliographie
2002
Izu, Tetsuya ; Möller, Bodo ; Takagi, Tsuyoshi (2002)
Improved Elliptic Curve Multiplication
Methods Resistant against Side Channel Attacks.
Hyderabad, India
Konferenzveröffentlichung, Bibliographie
Buchmann, Johannes ; Sakurai, Kouichi ; Takagi, Tsuyoshi (2002)
An IND-CCA2 Public-Key Cryptosystem with Fast Decryption.
Seoul, Korea
Konferenzveröffentlichung, Bibliographie
Sakurai, Kouichi ; Takagi, Tsuyoshi (2002)
On the Security of a Modified Paillier
Public-Key Primitive.
Melbourne, Australia
Konferenzveröffentlichung, Bibliographie
Sakurai, Kouichi ; Takagi, Tsuyoshi (2002)
New Semantically Secure Public-Key
Cryptosystems from the {RSA}-Primitive.
Paris, France
Konferenzveröffentlichung, Bibliographie
Izu, Tetsuya ; Möller, Bodo ; Takagi, Tsuyoshi (2002)
Improved elliptic curve multiplication methods resistant against side channel attacks.
Konferenzveröffentlichung, Bibliographie
Izu, Tetsuya ; Takagi, Tsuyoshi (2002)
On the Security of Brier-Joye{'}s
Addition Formula for Weierstrass-form Elliptic Curves.
Report, Bibliographie
Sakurai, Kouichi ; Takagi, Tsuyoshi (2002)
On the Security of a Modified Paillier
Public-Key Primitive.
Report, Bibliographie
2001
Takagi, Tsuyoshi (2001)
New public-key cryptosystems with fast decryption.
Technische Universität Darmstadt
Dissertation, Erstveröffentlichung
Takagi, Tsuyoshi (2001)
New public key cryptosystems with fast decryption.
Technische Universität Darmstadt
Dissertation, Bibliographie
Joye, Marc ; Quisquater, Jean-Jacques ; Takagi, Tsuyoshi (2001)
How to Choose Secret Parameters for
{RSA}-Type Cryptosystems over Elliptic Curves.
In: >Designs, Codes and Cryptography, 23 (3)
Artikel, Bibliographie
Buchmann, Johannes ; Sakurai, Kouichi ; Takagi, Tsuyoshi (2001)
An {IND-CCA2} Public-Key Cryptosystem
with Fast Decryption.
Report, Bibliographie
Sakurai, Kouichi ; Takagi, Tsuyoshi (2001)
New Semantically Secure Public-Key
Cryptosystems from the {RSA}-Primitive.
Report, Bibliographie
Takagi, Tsuyoshi (2001)
New public-key cryptosystems with fast
decryption.
Technische Universität Darmstadt
Dissertation, Bibliographie
2000
Paulus, Sachar ; Takagi, Tsuyoshi (2000)
A New Public-Key Cryptosystem over a
Quadratic Order with Quadratic Decryption Time.
In: >Journal of Cryptology, 13
Artikel, Bibliographie
1999
Hühnlein, Detlef ; Takagi, Tsuyoshi (1999)
Reducing Logarithms in Totally Non-maximal Imaginary Quadratic Orders to Logarithms in Finite Fields.
Singapore
Konferenzveröffentlichung, Bibliographie
Hartmann, Michael ; Paulus, Sachar ; Takagi, Tsuyoshi (1999)
NICE - New Ideal Coset Encryption.
Worcester, MA, USA
Konferenzveröffentlichung, Bibliographie
Biehl, Ingrid ; Paulus, Sachar ; Takagi, Tsuyoshi (1999)
Efficient Undeniable Signature Schemes
based on Ideal Arithmetic in Quadratic Orders.
Report, Bibliographie
Appel, Helo ; Biehl, Ingrid ; Fuhrmann, Arnulph ; Ruppert, Markus ; Takagi, Tsuyoshi ; Takura, Akira ; Valentin, Christian (1999)
Ein sicherer, robuster Zeitstempeldienst auf der Basis verteilter {RSA}-Signaturen.
Report, Bibliographie
Hartmann, Michael ; Paulus, Sachar ; Takagi, Tsuyoshi (1999)
{NICE} - New Ideal Coset Encryption.
Report, Bibliographie
Hühnlein, Detlef ; Meyer, Andreas ; Takagi, Tsuyoshi (1999)
Rabin and {RSA} analogues based on
non-maximal imaginary quadratic orders.
Report, Bibliographie
Hühnlein, Detlef ; Takagi, Tsuyoshi (1999)
Reducing logarithms in totally non-maximal imaginary quadratic orders to logarithms in finite fields.
Report, Bibliographie
Paulus, Sachar ; Takagi, Tsuyoshi (1999)
A new public-key cryptosystem over
quadratic orders with quadratic decryption time.
Report, Bibliographie
1998
Hühnlein, Detlef ; Meyer, Andreas ; Takagi, Tsuyoshi (1998)
Rabin and {RSA} analogues based on
non-maximal imaginary quadratic orders.
Seoul, Korea
Konferenzveröffentlichung, Bibliographie
Paulus, Sachar ; Takagi, Tsuyoshi (1998)
A generalization of the Diffie-Hellman
problem and related cryptosystems allowing fast decryption.
Seoul, Korea
Konferenzveröffentlichung, Bibliographie
Hühnlein, Detlef ; Jacobson, Michael J. ; Paulus, Sachar ; Takagi, Tsuyoshi (1998)
A Cryptosystem Based on Non-maximal
Imaginary Quadratic Orders with Fast Decryption.
Espoo, Finland
Konferenzveröffentlichung, Bibliographie
Paulus, Sachar ; Takagi, Tsuyoshi (1998)
A generalization of the Diffie-Hellman
problem and related cryptosystems allowing fast decryption.
Report, Bibliographie
1997
Joye, Marc ; Quisquater, Jean-Jacques ; Takagi, Tsuyoshi (1997)
How to choose secret parameters for RSA-type cryptosystems over elliptic curves.
Buch, Bibliographie
Joye, Marc ; Quisquater, Jean-Jacques ; Takagi, Tsuyoshi (1997)
How to Choose Secret Parameters for
{RSA}-Type Cryptosystems over Elliptic Curves.
Report, Bibliographie