Tsuyoshi TAKAGI


Hardness Evaluation for Search LWE Problem Using Progressive BKZ Simulator
Yuntao WANG Yoshinori AONO Tsuyoshi TAKAGI 
Publication:   
Publication Date: 2018/12/01
Vol. E101-A  No. 12  pp. 2162-2170
Type of Manuscript:  Special Section PAPER (Special Section on Information Theory and Its Applications)
Category: Cryptography and Information Security
Keyword: 
latticeLWE challengeBDDunique SVPembedding techniqueprogressive BKZ simulatorpost-quantum cryptography
 Summary | Full Text:PDF(1.2MB)

An Efficient Key Generation of ZHFE Public Key Cryptosystem
Yasuhiko IKEMATSU Dung Hoang DUONG Albrecht PETZOLDT Tsuyoshi TAKAGI 
Publication:   
Publication Date: 2018/01/01
Vol. E101-A  No. 1  pp. 29-38
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: 
Keyword: 
post-quantum cryptographymultivariate cryptographyencryption schemesZHFE
 Summary | Full Text:PDF(1.5MB)

Recent Developments in Post-Quantum Cryptography
Tsuyoshi TAKAGI 
Publication:   
Publication Date: 2018/01/01
Vol. E101-A  No. 1  pp. 3-11
Type of Manuscript:  INVITED PAPER (Special Section on Cryptography and Information Security)
Category: 
Keyword: 
post-quantum cryptographylattice-based cryptosystemsmultivariate polynomial cryptosystems
 Summary | Full Text:PDF(645.1KB)

CyclicSRP - A Multivariate Encryption Scheme with a Partially Cyclic Public Key
Dung Hoang DUONG Albrecht PETZOLDT Tsuyoshi TAKAGI 
Publication:   
Publication Date: 2017/12/01
Vol. E100-A  No. 12  pp. 2691-2698
Type of Manuscript:  Special Section PAPER (Special Section on Information Theory and Its Applications)
Category: Cryptography and Information Security
Keyword: 
multivariate cryptographySRP encryption schemekey size reductionefficiency
 Summary | Full Text:PDF(1.1MB)

Full Cryptanalysis of Hash Functions Based on Cubic Ramanujan Graphs
Hyungrok JO Christophe PETIT Tsuyoshi TAKAGI 
Publication:   
Publication Date: 2017/09/01
Vol. E100-A  No. 9  pp. 1891-1899
Type of Manuscript:  Special Section PAPER (Special Section on Discrete Mathematics and Its Applications)
Category: 
Keyword: 
Cayley hash functionsCornacchia's algorithmlifting attacksRamanujan graphscubic Ramanujan graphs
 Summary | Full Text:PDF(1.1MB)

Secret Sharing with Cheaters Using Multi-Receiver Authentication
Rui XU Kirill MOROZOV Tsuyoshi TAKAGI 
Publication:   
Publication Date: 2017/01/01
Vol. E100-A  No. 1  pp. 115-125
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: 
Keyword: 
cheater identifiable secret sharingmulti-receiver authentication coderobust secret sharingrushing adversary
 Summary | Full Text:PDF(363.2KB)

Zero-Knowledge Protocols for Code-Based Public-Key Encryption
Rong HU Kirill MOROZOV Tsuyoshi TAKAGI 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2015/10/01
Vol. E98-A  No. 10  pp. 2139-2151
Type of Manuscript:  PAPER
Category: Cryptography and Information Security
Keyword: 
proof of plaintext knowledgeverifiable encryptionNiederreiter PKEMcEliece PKEzero-knowledge proof
 Summary | Full Text:PDF(886.4KB)

Note on Some Recent Cheater Identifiable Secret Sharing Schemes
Rui XU Kirill MOROZOV Tsuyoshi TAKAGI 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2015/08/01
Vol. E98-A  No. 8  pp. 1814-1819
Type of Manuscript:  PAPER
Category: Cryptography and Information Security
Keyword: 
secret sharingcheater identifiable secret sharingcryptanalysisReed-Solomon code
 Summary | Full Text:PDF(880.7KB)

Efficient Algorithm for Tate Pairing of Composite Order
Yutaro KIYOMURA Tsuyoshi TAKAGI 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2014/10/01
Vol. E97-A  No. 10  pp. 2055-2063
Type of Manuscript:  PAPER
Category: Cryptography and Information Security
Keyword: 
composite order pairingMiller's algorithmnon-adjacent Form (NAF)window hybrid binary-ternary form (w-HBTF)
 Summary | Full Text:PDF(529KB)

Improved Attacks on Multi-Prime RSA with Small Prime Difference
Hui ZHANG Tsuyoshi TAKAGI 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2014/07/01
Vol. E97-A  No. 7  pp. 1533-1541
Type of Manuscript:  PAPER
Category: Cryptography and Information Security
Keyword: 
cryptanalysismulti-prime RSAsmall prime differencelattice reduction
 Summary | Full Text:PDF(820.4KB)

Extended Algorithm for Solving Underdefined Multivariate Quadratic Equations
Hiroyuki MIURA Yasufumi HASHIMOTO Tsuyoshi TAKAGI 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2014/06/01
Vol. E97-A  No. 6  pp. 1418-1425
Type of Manuscript:  PAPER
Category: Cryptography and Information Security
Keyword: 
multivariate public key cryptosystems (MPKCs)multivariate quadratic equationsMQ-problem
 Summary | Full Text:PDF(881KB)

Security Analysis of Collusion-Resistant Nearest Neighbor Query Scheme on Encrypted Cloud Data
Youwen ZHU Tsuyoshi TAKAGI Rong HU 
Publication:   IEICE TRANSACTIONS on Information and Systems
Publication Date: 2014/02/01
Vol. E97-D  No. 2  pp. 326-330
Type of Manuscript:  LETTER
Category: Data Engineering, Web Information Systems
Keyword: 
cloud computingencrypted querynearest neighborattack
 Summary | Full Text:PDF(215KB)

Security of Multivariate Signature Scheme Using Non-commutative Rings
Takanori YASUDA Tsuyoshi TAKAGI Kouichi SAKURAI 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2014/01/01
Vol. E97-A  No. 1  pp. 245-252
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: Foundations
Keyword: 
Multivariate Public Key Cryptosystemdigital signaturerainbownon-commutative ringpost-quantum cryptography
 Summary | Full Text:PDF(595.1KB)

Efficient Privacy-Preserving Reputation Evaluation in Decentralized Environments
Youwen ZHU Tsuyoshi TAKAGI 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2014/01/01
Vol. E97-A  No. 1  pp. 409-412
Type of Manuscript:  LETTER
Category: Cryptography and Information Security
Keyword: 
reputation evaluationdecentralized environmentprivacy-preservingcommunication delay
 Summary | Full Text:PDF(138.2KB)

Key Length Estimation of Pairing-Based Cryptosystems Using ηT Pairing over GF(3n)
Naoyuki SHINOHARA Takeshi SHIMOYAMA Takuya HAYASHI Tsuyoshi TAKAGI 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2014/01/01
Vol. E97-A  No. 1  pp. 236-244
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: Foundations
Keyword: 
pairing-based cryptosystemsdiscrete logarithm problemfinite fieldkey length
 Summary | Full Text:PDF(582.3KB)

General Fault Attacks on Multivariate Public Key Cryptosystems
Yasufumi HASHIMOTO Tsuyoshi TAKAGI Kouichi SAKURAI 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2013/01/01
Vol. E96-A  No. 1  pp. 196-205
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: Implementation
Keyword: 
post-quantum cryptographymultivariate public-key cryptosystemsfault attacks
 Summary | Full Text:PDF(359.9KB)

Analysis and Improvement of a Secret Broadcast with Binding Encryption in Broadcasting Networks
Mingwu ZHANG Fagen LI Tsuyoshi TAKAGI 
Publication:   IEICE TRANSACTIONS on Information and Systems
Publication Date: 2012/02/01
Vol. E95-D  No. 2  pp. 686-689
Type of Manuscript:  LETTER
Category: Information Network
Keyword: 
secret broadcastbinding encryptionpublic keydecryption consistency
 Summary | Full Text:PDF(83.7KB)

Cryptanalysis of Strong Designated Verifier Signature Scheme with Non-delegatability and Non-transferability
Mingwu ZHANG Tsuyoshi TAKAGI Bo YANG Fagen LI 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2012/01/01
Vol. E95-A  No. 1  pp. 259-262
Type of Manuscript:  Special Section LETTER (Special Section on Cryptography and Information Security)
Category: 
Keyword: 
strong designated verifier signatureunforgeabilitynon-delegatabilitynon-transferabilityprivacy of signer identity
 Summary | Full Text:PDF(86.2KB)

Solving a 676-Bit Discrete Logarithm Problem in GF(36n)
Takuya HAYASHI Naoyuki SHINOHARA Lihua WANG Shin'ichiro MATSUO Masaaki SHIRASE Tsuyoshi TAKAGI 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2012/01/01
Vol. E95-A  No. 1  pp. 204-212
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: Mathematics
Keyword: 
function field sievediscrete logarithm problempairing-based cryptosystems
 Summary | Full Text:PDF(594.5KB)

An Improved Authenticated Encryption Scheme
Fagen LI Jiang DENG Tsuyoshi TAKAGI 
Publication:   IEICE TRANSACTIONS on Information and Systems
Publication Date: 2011/11/01
Vol. E94-D  No. 11  pp. 2171-2172
Type of Manuscript:  Special Section LETTER (Special Section on Information and Communication System Security)
Category: 
Keyword: 
authenticated encryptionunforgeabilityconfidentialitynon-repudiation
 Summary | Full Text:PDF(54.6KB)

Faster MapToPoint on Supersingular Elliptic Curves in Characteristic 3
Yuto KAWAHARA Tetsutaro KOBAYASHI Gen TAKAHASHI Tsuyoshi TAKAGI 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2011/01/01
Vol. E94-A  No. 1  pp. 150-155
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: Mathematics
Keyword: 
MapToPointcharacteristic 3supersingular elliptic curvestraceηT pairing
 Summary | Full Text:PDF(588.1KB)

Distributed Noise Generation for Density Estimation Based Clustering without Trusted Third Party
Chunhua SU Feng BAO Jianying ZHOU Tsuyoshi TAKAGI Kouichi SAKURAI 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2009/08/01
Vol. E92-A  No. 8  pp. 1868-1871
Type of Manuscript:  Special Section LETTER (Special Section on Discrete Mathematics and Its Applications)
Category: 
Keyword: 
data clusteringprivacy-preservingrandom data perturbation
 Summary | Full Text:PDF(144KB)

Efficient Implementation of Pairing-Based Cryptography on a Sensor Node
Masaaki SHIRASE Yukinori MIYAZAKI Tsuyoshi TAKAGI Dong-Guk HAN Dooho CHOI 
Publication:   IEICE TRANSACTIONS on Information and Systems
Publication Date: 2009/05/01
Vol. E92-D  No. 5  pp. 909-917
Type of Manuscript:  Special Section PAPER (Special Section on Information and Communication System Security)
Category: Implementation Issues
Keyword: 
ηT pairingsensor nodeATmega128Lfinite field multiplicationassembly implementation
 Summary | Full Text:PDF(253.2KB)

Security and Correctness Analysis on Privacy-Preserving k-Means Clustering Schemes
Chunhua SU Feng BAO Jianying ZHOU Tsuyoshi TAKAGI Kouichi SAKURAI 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2009/04/01
Vol. E92-A  No. 4  pp. 1246-1250
Type of Manuscript:  LETTER
Category: Cryptography and Information Security
Keyword: 
privacy-preservingk-means clusteringsecurity analysis
 Summary | Full Text:PDF(81.3KB)

A More Compact Representation of XTR Cryptosystem
Masaaki SHIRASE Dong-Guk HAN Yasushi HIBINO Howon KIM Tsuyoshi TAKAGI 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2008/10/01
Vol. E91-A  No. 10  pp. 2843-2850
Type of Manuscript:  Special Section PAPER (Special Section on Information Theory and Its Applications)
Category: Cryptography and Information Security
Keyword: 
cryptographyXTR cryptosystemfinite fieldefficient implementationcompact representation
 Summary | Full Text:PDF(263.2KB)

Reduction Optimal Trinomials for Efficient Software Implementation of the ηT Pairing
Toshiya NAKAJIMA Tetsuya IZU Tsuyoshi TAKAGI 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2008/09/01
Vol. E91-A  No. 9  pp. 2379-2386
Type of Manuscript:  Special Section PAPER (Special Section on Discrete Mathematics and Its Applications)
Category: 
Keyword: 
pairingsoftware implementationirreducible polynomialreduction optimal trinomialcharacteristic threefinite field
 Summary | Full Text:PDF(208.5KB)

Efficient Implementation of the Pairing on Mobilephones Using BREW
Motoi YOSHITOMI Tsuyoshi TAKAGI Shinsaku KIYOMOTO Toshiaki TANAKA 
Publication:   IEICE TRANSACTIONS on Information and Systems
Publication Date: 2008/05/01
Vol. E91-D  No. 5  pp. 1330-1337
Type of Manuscript:  Special Section PAPER (Special Section on Information and Communication System Security)
Category: Implementation
Keyword: 
pairing based cryptosystemmobilephoneBREWefficient implementation
 Summary | Full Text:PDF(272.9KB)

Some Efficient Algorithms for the Final Exponentiation of ηT Pairing
Masaaki SHIRASE Tsuyoshi TAKAGI Eiji OKAMOTO 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2008/01/01
Vol. E91-A  No. 1  pp. 221-228
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: Implementation
Keyword: 
Tate pairingηT pairingfinal exponentiationtorus
 Summary | Full Text:PDF(252.8KB)

A New Upper Bound for the Minimal Density of Joint Representations in Elliptic Curve Cryptosystems
Erik DAHMEN Katsuyuki OKEYA Tsuyoshi TAKAGI 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2007/05/01
Vol. E90-A  No. 5  pp. 952-959
Type of Manuscript:  Special Section PAPER (Special Section on Discrete Mathematics and Its Applications)
Category: 
Keyword: 
elliptic curve cryptosystemjoint sparse formleft-to-rightmulti-scalar multiplicationshamir method
 Summary | Full Text:PDF(248.3KB)

Defeating Simple Power Analysis on Koblitz Curves
Camille VUILLAUME Katsuyuki OKEYA Tsuyoshi TAKAGI 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2006/05/01
Vol. E89-A  No. 5  pp. 1362-1369
Type of Manuscript:  Special Section PAPER (Special Section on Discrete Mathematics and Its Applications)
Category: 
Keyword: 
elliptic curve cryptosystemsKoblitz curvessmartcardside channel attacksSPA countermeasure
 Summary | Full Text:PDF(257.3KB)

Security Analysis of the SPA-Resistant Fractional Width Method
Katsuyuki OKEYA Tsuyoshi TAKAGI Camille VUILLAUME 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2006/01/01
Vol. E89-A  No. 1  pp. 161-168
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: Elliptic Curve Cryptography
Keyword: 
elliptic curve cryptosystemssmartcardfractional windowside channel attacksflexibilitydiscrete logarithm problem
 Summary | Full Text:PDF(167KB)

Generalized Powering Functions and Their Application to Digital Signatures
Hisayoshi SATO Tsuyoshi TAKAGI Satoru TEZUKA Kazuo TAKARAGI 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2006/01/01
Vol. E89-A  No. 1  pp. 81-89
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: Digital Signature
Keyword: 
factoringRSAmodular powering functiondigital signature
 Summary | Full Text:PDF(236.1KB)

Efficient Hyperelliptic Curve Cryptosystems Using Theta Divisors
Masanobu KATAGI Toru AKISHITA Izuru KITAMURA Tsuyoshi TAKAGI 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2006/01/01
Vol. E89-A  No. 1  pp. 151-160
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: Elliptic Curve Cryptography
Keyword: 
hyperelliptic curve cryptosystemscalar multiplicationtheta divisorwindow method
 Summary | Full Text:PDF(287.7KB)

Radix-r Non-Adjacent Form and Its Application to Pairing-Based Cryptosystem
Tsuyoshi TAKAGI David REIS, Jr. Sung-Ming YEN Bo-Ching WU 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2006/01/01
Vol. E89-A  No. 1  pp. 115-123
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: Elliptic Curve Cryptography
Keyword: 
non-adjacent formradix-r representationsigned window methodelliptic curve cryptosystempairing based cryptosystem
 Summary | Full Text:PDF(209.6KB)

Fast Elliptic Curve Multiplications Resistant against Side Channel Attacks
Tetsuya IZU Tsuyoshi TAKAGI 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2005/01/01
Vol. E88-A  No. 1  pp. 161-171
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: Tamper-Resistance
Keyword: 
elliptic curve cryptosystems (ECC)side channel attacksscalar multiplicationSIMD operation
 Summary | Full Text:PDF(204KB)

Zero-Value Register Attack on Elliptic Curve Cryptosystem
Toru AKISHITA Tsuyoshi TAKAGI 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2005/01/01
Vol. E88-A  No. 1  pp. 132-139
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: Tamper-Resistance
Keyword: 
side channel attackdifferential power analysiselliptic curve cryptosystemaddition formulazero-value register
 Summary | Full Text:PDF(165.1KB)

On the Importance of Protecting Δ in SFLASH against Side Channel Attacks
Katsuyuki OKEYA Tsuyoshi TAKAGI Camille VUILLAUME 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2005/01/01
Vol. E88-A  No. 1  pp. 123-131
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: Tamper-Resistance
Keyword: 
asymmetric signatureSFLASHside channel attacksSHA-1C*C*--hidden monomial problem
 Summary | Full Text:PDF(294.3KB)

On the Optimal Parameter Choice for Elliptic Curve Cryptosystems Using Isogeny
Toru AKISHITA Tsuyoshi TAKAGI 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2005/01/01
Vol. E88-A  No. 1  pp. 140-146
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: Tamper-Resistance
Keyword: 
elliptic curve cryptosystemsisomorphismisogenyside channel attackzero-value point attack
 Summary | Full Text:PDF(151KB)

Fast Elliptic Curve Multiplications with SIMD Operations
Tetsuya IZU Tsuyoshi TAKAGI 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2004/01/01
Vol. E87-A  No. 1  pp. 85-93
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: Asymmetric Cipher
Keyword: 
Elliptic Curve Cryptosystems (ECC)scalar multiplicationwindow methodSIMD operationsside channel attacks
 Summary | Full Text:PDF(291.1KB)

SCA-Resistant and Fast Elliptic Scalar Multiplication Based on wNAF
Katsuyuki OKEYA Tsuyoshi TAKAGI 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2004/01/01
Vol. E87-A  No. 1  pp. 75-84
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: Asymmetric Cipher
Keyword: 
elliptic curve cryptosystemside channel attackswidth-w NAFsmart card
 Summary | Full Text:PDF(468.2KB)

A Fast RSA-Type Public-Key Primitive Modulo pkq Using Hensel Lifting
Tsuyoshi TAKAGI 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2004/01/01
Vol. E87-A  No. 1  pp. 94-101
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: Asymmetric Cipher
Keyword: 
RSA cryptosystemPKCS #1 version 2.1factoringmodular inversefast decryptionsmart cards
 Summary | Full Text:PDF(244.8KB)

Low Exponent Attacks against the Schwenk-Eisfeld Cryptoscheme and Signature
Tsuyoshi TAKAGI Shozo NAITO 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 1998/03/25
Vol. E81-A  No. 3  pp. 483-488
Type of Manuscript:  PAPER
Category: Information Security
Keyword: 
Schwenk-Eisfeld cryptosystemRSA cryptosystempolynomialfactoringlow exponent attack
 Summary | Full Text:PDF(557.6KB)

Extension of Rabin Cryptosystem to Eisenstein and Gauss Fields
Tsuyoshi TAKAGI Shozo NAITO 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 1997/04/25
Vol. E80-A  No. 4  pp. 753-760
Type of Manuscript:  PAPER
Category: Information Security
Keyword: 
Rabin cryptosystemquadratic fieldEisenstein fieldGauss fieldfactoring low exponent attack
 Summary | Full Text:PDF(641.8KB)