Tetsuya IZU


A Unified Framework for Small Secret Exponent Attack on RSA
Noboru KUNIHIRO Naoyuki SHINOHARA Tetsuya IZU 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2014/06/01
Vol. E97-A  No. 6  pp. 1285-1295
Type of Manuscript:  Special Section PAPER (Special Section on Discrete Mathematics and Its Applications)
Category: 
Keyword: 
LLL algorithmsmall inverse problemRSAlattice-based cryptanalysis
 Summary | Full Text:PDF(521.9KB)

Recovering RSA Secret Keys from Noisy Key Bits with Erasures and Errors
Noboru KUNIHIRO Naoyuki SHINOHARA Tetsuya IZU 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2014/06/01
Vol. E97-A  No. 6  pp. 1273-1284
Type of Manuscript:  Special Section PAPER (Special Section on Discrete Mathematics and Its Applications)
Category: 
Keyword: 
RSAkey-recoverycold boot attackside-channel attackmaximal likelihood
 Summary | Full Text:PDF(570.9KB)

Detailed Cost Estimation of CNTW Forgery Attack against EMV Signature Scheme
Tetsuya IZU Yumi SAKEMI Masahiko TAKENAKA 
Publication:   IEICE TRANSACTIONS on Information and Systems
Publication Date: 2011/11/01
Vol. E94-D  No. 11  pp. 2111-2118
Type of Manuscript:  Special Section PAPER (Special Section on Information and Communication System Security)
Category: 
Keyword: 
ISO/IEC 9796-2 signatureEMV signatureCNTW forgery attackcost estimation
 Summary | Full Text:PDF(196.5KB)

Small Secret CRT-Exponent Attacks on Takagi's RSA
Naoyuki SHINOHARA Tetsuya IZU Noboru KUNIHIRO 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2011/01/01
Vol. E94-A  No. 1  pp. 19-27
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: Public Key Cryptography
Keyword: 
CRT-exponentlatticeLLLTakagi's RSA
 Summary | Full Text:PDF(485.9KB)

Forgery Attacks on Time-Stamp, Signed PDF and X.509 Certificate
Kouichi ITOH Tetsuya IZU Wakaha OGATA Takeshi SHIMOYAMA Masahiko TAKENAKA 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2009/01/01
Vol. E92-A  No. 1  pp. 67-75
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: Digital Signature
Keyword: 
Bleichenbacher's forgery attackRSASSA-PKCS-v1_5time-stampPDFX.509 certificateAcrobatAcrobat Reader
 Summary | Full Text:PDF(458KB)

Reduction Optimal Trinomials for Efficient Software Implementation of the ηT Pairing
Toshiya NAKAJIMA Tetsuya IZU Tsuyoshi TAKAGI 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2008/09/01
Vol. E91-A  No. 9  pp. 2379-2386
Type of Manuscript:  Special Section PAPER (Special Section on Discrete Mathematics and Its Applications)
Category: 
Keyword: 
pairingsoftware implementationirreducible polynomialreduction optimal trinomialcharacteristic threefinite field
 Summary | Full Text:PDF(208.5KB)

Side Channel Cryptanalysis on XTR Public Key Cryptosystem
Dong-Guk HAN Tetsuya IZU Jongin LIM Kouichi SAKURAI 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2005/05/01
Vol. E88-A  No. 5  pp. 1214-1223
Type of Manuscript:  Special Section PAPER (Special Section on Discrete Mathematics and Its Applications)
Category: 
Keyword: 
XTR public key cryptosystemside channel attacksSPAdata-bit DPAaddress-bit DPAdoubling attackrefined power analysiszero-value attack
 Summary | Full Text:PDF(221.9KB)

Fast Elliptic Curve Multiplications Resistant against Side Channel Attacks
Tetsuya IZU Tsuyoshi TAKAGI 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2005/01/01
Vol. E88-A  No. 1  pp. 161-171
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: Tamper-Resistance
Keyword: 
elliptic curve cryptosystems (ECC)side channel attacksscalar multiplicationSIMD operation
 Summary | Full Text:PDF(204KB)

Fast Elliptic Curve Multiplications with SIMD Operations
Tetsuya IZU Tsuyoshi TAKAGI 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2004/01/01
Vol. E87-A  No. 1  pp. 85-93
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: Asymmetric Cipher
Keyword: 
Elliptic Curve Cryptosystems (ECC)scalar multiplicationwindow methodSIMD operationsside channel attacks
 Summary | Full Text:PDF(291.1KB)

A Note on the Lattice Factoring Method
Tetsuya IZU 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2004/01/01
Vol. E87-A  No. 1  pp. 221-223
Type of Manuscript:  Special Section LETTER (Special Section on Cryptography and Information Security)
Category: 
Keyword: 
integer factoring problemLattice Factoring Method (LFM)LLL-algorithmUchiyama-Kanayama's improvement
 Summary | Full Text:PDF(135.2KB)