Tetsuya Izu

J-GLOBAL         Last updated: Jan 19, 2017 at 17:57
 
Avatar
Name
Tetsuya Izu
Affiliation
FUJITSU Laboratories of Europe Ltd.
Section
Data Analytics Research Division
Job title
Manager
Degree
Ph D.

Academic & Professional Experience

 
Dec 2016
 - 
Today
Security Research Center, FUJITSU Laboratories Ltd
 
Dec 2013
 - 
Nov 2016
Data Analytics Research Division, FUJITSU Laboratories of Europe Ltd.
 
Apr 1997
 - 
Nov 2013
Secure Computing Laboratory, 株式会社富士通研究所
 

Awards & Honors

 
Jun 2014
Development and Realization of Side Channel Analysis Countermeasure Technology, IPSJ Kiyasu Special Industrial Achievement Award, Information Processing Society of Japan
Winner: Naoya Torii, Koichi Itoh, Masahiko Takenaka, Tetsuya Izu, Yumiko Takasaki
 
Apr 2007
Research on the Side Channel Analysis Countermeasures in Security Area, The Commendation for Science and Technology by the Minister of Education, Culture, Sports, Science and Technology (The Young Scientists’ Prize), Ministry of Education, Culture, Sports, Science and Technology
 

Published Papers

 
Tetsuya Izu, Yumi Sakemi, Masahiko Takenana
IEICE Transactions on Information and Systems   E94-D(11) 2111-2118   Nov 2011   [Refereed]
Yumi Sakemi, Tetsuya Izu, Masahiko Takenaka, Yasuyuki Nogami, Yoshitaka Morikawa
IPSJ Journal   51(9) 1542-1553   Sep 2010
For establishing strict and rapid immigration control, ICAO has been spreading the electronic passport (e-Passport), which is introduced in some countries including Japan. Recently, on August 2009, Coron, Naccache, Tibouchi, and Weinmann announced...
Toshiya Nakajima, Tetsuya Izu, Tsuyoshi Takagi
IPSJ Journal   50(7) 1745-1756   Jul 2009
The theme of this paper is to achieve fast pairing computation with supersingular elliptic curves over prime field GF(p) where p is greater than or equal to 5. Fast pairing computation for these curves is possible by using suitably c...
IZU TETSUYA, KUNIHIRO NOBORU, SHIMOYAMA TAKESHI
IPSJ Journal   48(9) 2957-2965   Sep 2007
Dedicated factoring devices have attracted much attention in recent years. While a large number of theoretic results are shown, it is hard to evaluate since various assumptions are required. This paper surveys dedicated factoring hardware of the N...
IZU TETSUYA, KANAYA NOBUYUKI, TAKENAKA MASAHIKO, YOSHIOKA TAKASHI
IPSJ Journal   48(9) 2990-2998   Sep 2007
When a document is disclosed with hiding privacy information, masking (sanitization) is widely used as a standard technology for paper documents. However, no corresponding technology has not been established for electronic documents. In addition, ...

Books etc

 
伊豆 哲也, 佐藤 証, 田中 実, 花岡 悟一郎, 岩田 哲
日刊工業新聞社   Apr 2010   ISBN:4526064521

Misc

 
IZU Tetsuya
Proceedings of the Society Conference of IEICE   2011(0)    Aug 2011
SAKEMI Yumi, IZU Tetsuya, TAKENAKA Masahiko, YASUDA Masaya
Technical report of IEICE. ISEC   111(123) 151-158   Jul 2011
The discrete logarithm problem with auxiliary input (DLPwAI) is a problem to find a positive integer α from elements G, αG, α^dG in an additive cyclic group generated by G of prime order r and a positive integer d dividing r-1. In 2010, Sakemi et ...
YASUDA Masaya, IZU Tetsuya, TAKENAKA Masahiko
Technical report of IEICE. ISEC   110(113) 173-180   Jun 2010
The security of many cryptographic systems is based on the hardness of the discrete logarithm problem (DLP). In 2006, Cheon proposed an algorithm for solving DLP with auxiliary input, whcich works better than conventional algorithms. In recent yea...
IZU Tetsuya, TAKENAKA Masahiko, HANAOKA Goichiro, YASUDA Masaya
Technical report of IEICE. ISEC   110(113) 189-194   Jun 2010
The security of publick-key cryptographic protocols are reduced to the infeasibility of underlying mathematical problems. More cryptographic protocols have been designed, more new mathematical problems have been introduced. Especially in paring-ba...
SAKEMI Yumi, IZU Tetsuya, TAKENAKA Masahiko, NOGAMI Yasuyuki, MORIKAWA Yoshitaka
Technical report of IEICE. ISEC   110(113) 195-201   Jun 2010
Specification of EMV signatures is an ISO/IEC 9796-2 compliant format with extra redundancy, and used for certifying credit cards. At CRYPTO 2009, Coron, Naccache, Tibouchi, and Weinmann proposed a new forgery attack against the signature ISO/IEC ...
Shimoyama Takeshi, Izu Tetsuya, Kogure Jun
Bulletin of the Japan Society for Industrial and applied Mathematics   19(1) 28-32   Mar 2009
KOGURE Jun, SHIMOYAMA Takeshi, IZU Tetsuya, TORII Naoya, FUEKI Shunsuke
IPSJ Magazine   49(7)    Jul 2008
SHIMOYAMA Takeshi, IZU Tetsuya, KOGURE Jun
The Journal of the Institute of Electronics, Information, and Communication Engineers   91(6) 469-473   Jun 2008
NAKAJIMA Toshiya, IZU Tetsuya, TAKAGI Tsuyoshi
Technical report of IEICE. ISEC   107(346) 27-32   Nov 2007
In [10] we proposed to use the "Reduction Optimal Trinomials (ROTs)" which make reduction in GF(3^m) multiplication efficient for software implementation of the ηT pairing. We also showed examples of ROTs which are suitable to enough security leve...
NAKAJIMA Toshiya, IZU Tetsuya, TAKAGI Tsuyoshi
IEICE technical report. Office Information Systems   107(348) 27-32   Nov 2007
In [10] we proposed to use the "Reduction Optimal Trinomials (ROTs)" which make reduction in GF(3^m) multiplication efficient for software implementation of the ηT pairing. We also showed examples of ROTs which are suitable to enough security leve...
SHIMOYAMA Takeshi, IZU Tetsuya, KOGURE Jun
Technical report of IEICE. ISEC   107(209) 77-83   Aug 2007
The hardness of the integer factorization problem assures the security of some public-key cryptosystems including RSA, and the number field sieve method (NFS), the most efficient algorithm for factoring large integers currently, is a threat for su...
HIGASHIKADO Yoshiki, IZU Tetsuya, TAKENAKA Masahiko, YOSHIOKA Takashi
IPSJ SIG Notes   2007(71) 337-340   Jul 2007
Recently, the sender domain authentication protocol DKIM (DomainKeys Identified Mail) attracts much attention, in which the sender domain adds a signature header generated from headers and body of the original email, and the sender domain authenti...
IZUMI Masami, IZU Tetsuya, KUNIHIRO Noboru, OHTA Kazuo
IPSJ SIG Notes   2007(71) 355-361   Jul 2007
Sanitizable or deletable signatures attract much attention because of their privacy-perserving property in which after generating a signature on an original document, partial information can be masked with keeping the integrity of disclosed part. ...
HIGASHIKADO Yoshiki, IZU Tetsuya, TAKENAKA Masahiko, YOSHIOKA Takashi
Technical report of IEICE. ISEC   107(141) 129-132   Jul 2007
Recently, the sender domain authentication protocol DKIM (DomainKeys Identified Mail) attracts much attention, in which the sender domain adds a signature header generated from headers and body of the original email, and the sender domain authenti...
IZUMI Masami, IZU Tetsuya, KUNIHIRO Noboru, OHTA Kazuo
Technical report of IEICE. ISEC   107(141) 147-153   Jul 2007
Sanitizable or deletable signatures attract much attention because of their privacy-perserving property in which after generating a signature on an original document, partial information can be masked with keeping the integrity of disclosed part. ...
TAKENAKA Masahiko, SHIMOYAMA Takeshi, IZU Tetsuya
Technical report of IEICE. ISEC   107(141) 155-160   Jul 2007
This paper shows how to forge a time-stamp which the latest versions of Adobe's Acrobat accept improperly. The targeted signature algorithm used in the time-stamp scheme is RSASSA-PKCS1-v1_5 with a 1024-bit public composite and the public key e=3....
IZU Tetsuya, KUNIHIRO Noboru, SHIMOYAMA Takeshi
IEICE technical report. Office Information Systems   106(354) 27-32   Nov 2006
The Number Field Sieve (NFS) method of integer factorization is known as a great threat for the RSA cryptosystem. Recently, manufacturability of dedicated NFS devices is actively discussed. This article surveys hardware designs for the mini-factor...
IZU Tetsuya, KUNIHIRO Noboru, SHIMOYAMA Takeshi
Technical report of IEICE. ISEC   106(352) 27-32   Nov 2006
The Number Field Sieve (NFS) method of integer factorization is known as a great threat for the RSA cryptosystem. Recently, manufacturability of dedicated NFS devices is actively discussed. This article surveys hardware designs for the mini-factor...
IZU Tetsuya, KUNIHIRO Noboru, SHIMOYAMA Takeshi
IPSJ SIG Notes   2006(81) 27-34   Jul 2006
Dedicated factoring devices have attracted much attention since it might be a new threat for RSA. Among the Number Field Sieve method of integer factorization, the relation finding step is the most dominant step in both theory and practice. This a...
IZU Tetsuya, KUNIHIRO Noboru, SHIMOYAMA Takeshi
Technical report of IEICE. ISEC   106(175) 27-34   Jul 2006
Dedicated factoring devices have attracted much attention since it might be a new threat for RSA. Among the Number Field Sieve method of integer factorization, the relation finding step is the most dominant step in both theory and practice. This a...