TAKAGI Tsuyoshi

J-GLOBAL         Last updated: Feb 28, 2019 at 13:47
 
Avatar
Name
TAKAGI Tsuyoshi
Affiliation
The University of Tokyo
Section
The Graduate School of Information Science and Technology Department of Mathematical Informatics

Published Papers

 
Yasuhiko Ikematsu,Ray A. Perlner,Daniel Smith-Tone,Tsuyoshi Takagi,Jeremy Vates
Post-Quantum Cryptography - 9th International Conference, PQCrypto 2018, Fort Lauderdale, FL, USA, April 9-11, 2018, Proceedings   396-416   2018   [Refereed]
Weiyao Wang,Yuntao Wang,Atsushi Takayasu,Tsuyoshi Takagi
Advances in Information and Computer Security - 13th International Workshop on Security, IWSEC 2018, Sendai, Japan, September 3-5, 2018, Proceedings   87-103   2018   [Refereed]
Taiga Mizuide,Atsushi Takayasu,Tsuyoshi Takagi
Topics in Cryptology - CT-RSA 2019 - The Cryptographers' Track at the RSA Conference 2019, San Francisco, CA, USA, March 4-8, 2019, Proceedings   169-188   2019   [Refereed]
Array,Yoshinori Aono,Tsuyoshi Takagi
Information and Communications Security - 19th International Conference, ICICS 2017, Beijing, China, December 6-8, 2017, Proceedings   541-553   2017   [Refereed]
Yasufumi Hashimoto,Yasuhiko Ikematsu,Tsuyoshi Takagi
Advances in Information and Computer Security - 13th International Workshop on Security, IWSEC 2018, Sendai, Japan, September 3-5, 2018, Proceedings   3-18   2018   [Refereed]
Hiroki Okada,Atsushi Takayasu,Kazuhide Fukushima,Shinsaku Kiyomoto,Tsuyoshi Takagi
Information Security and Cryptology - ICISC 2018 - 21st International Conference, Seoul, South Korea, November 28-30, 2018, Revised Selected Papers   196-214   2018   [Refereed]
Array,Junting Xiao,Kazuhide Fukushima,Shinsaku Kiyomoto,Tsuyoshi Takagi
Security and Communication Networks   2018 9846168:1-9846168:14   2018   [Refereed]
Dung Hoang Duong,Albrecht Petzoldt,Tsuyoshi Takagi
IEICE Transactions   100-A(12) 2691-2698   2017   [Refereed]
Koichiro Akiyama,Yasuhiro Goto,Shinya Okumura,Tsuyoshi Takagi,Koji Nuida,Goichiro Hanaoka
Selected Areas in Cryptography - SAC 2017 - 24th International Conference, Ottawa, ON, Canada, August 16-18, 2017, Revised Selected Papers   215-234   2017   [Refereed]
Yuntao Wang,Yoshinori Aono,Tsuyoshi Takagi
IEICE Transactions   101-A(12) 2162-2170   2018   [Refereed]
Ye Yuan,Kazuhide Fukushima,Shinsaku Kiyomoto,Tsuyoshi Takagi
2017 IEEE International Symposium on Hardware Oriented Security and Trust, HOST 2017, McLean, VA, USA, May 1-5, 2017   47-50   2017   [Refereed]
Hyungrok Jo,Christophe Petit,Tsuyoshi Takagi
IEICE Transactions   100-A(9) 1891-1899   2017   [Refereed]
Dung Hoang Duong,Masaya Yasuda,Tsuyoshi Takagi
Information Security - 20th International Conference, ISC 2017, Ho Chi Minh City, Vietnam, November 22-24, 2017, Proceedings   79-91   2017   [Refereed]
Yuntao Wang,Tsuyoshi Takagi
Information Security and Privacy - 23rd Australasian Conference, ACISP 2018, Wollongong, NSW, Australia, July 11-13, 2018, Proceedings   787-795   2018   [Refereed]
Yasuhiko Ikematsu,Dung Hoang Duong,Albrecht Petzoldt,Tsuyoshi Takagi
Codes, Cryptology and Information Security - Second International Conference, C2SI 2017, Rabat, Morocco, April 10-12, 2017, Proceedings - In Honor of Claude Carlet   195-212   2017   [Refereed]
Rui Xu,Kirill Morozov,Yanjiang Yang,Jianying Zhou 0001,Tsuyoshi Takagi
Computers & Security   69 65-83   2017   [Refereed]
Saed Alsayigh,Jintai Ding,Tsuyoshi Takagi,Yuntao Wang
Advances in Information and Computer Security - 12th International Workshop on Security, IWSEC 2017, Hiroshima, Japan, August 30 - September 1, 2017, Proceedings   19-35   2017   [Refereed]
Yacheng Wang,Yasuhiko Ikematsu,Dung Hoang Duong,Tsuyoshi Takagi
Information Security and Privacy - 23rd Australasian Conference, ACISP 2018, Wollongong, NSW, Australia, July 11-13, 2018, Proceedings   487-501   2018   [Refereed]
Rui Xu,Sze Ling Yeo,Kazuhide Fukushima,Tsuyoshi Takagi,Hwajung Seo,Shinsaku Kiyomoto,Matt Henricksen
Applied Cryptography and Network Security - 15th International Conference, ACNS 2017, Kanazawa, Japan, July 10-12, 2017, Proceedings   253-272   2017   [Refereed]
Yutaro Kiyomura,Akiko Inoue,Yuto Kawahara,Masaya Yasuda,Tsuyoshi Takagi,Tetsutaro Kobayashi
Applied Cryptography and Network Security - 15th International Conference, ACNS 2017, Kanazawa, Japan, July 10-12, 2017, Proceedings   59-79   2017   [Refereed]
Yasuhiko Ikematsu,Dung Hoang Duong,Albrecht Petzoldt,Tsuyoshi Takagi
IEICE Transactions   101-A(1) 29-38   2018   [Refereed]
Tsuyoshi Takagi
IEICE Transactions   101-A(1) 3-11   2018   [Refereed]
Rui Xu,Kirill Morozov,Tsuyoshi Takagi
IEICE Transactions   E100.A(1) 125-125   2017   [Refereed]
Chi Cheng,Rongxing Lu,Albrecht Petzoldt,Tsuyoshi Takagi
IEEE Communications Magazine   55(2) 116-120   2017   [Refereed]
Zhenhua Liu,Xiangsong Zhang,Yupu Hu,Tsuyoshi Takagi
Security and Communication Networks   9(14) 2422-2433   2016   [Refereed]
Shaoquan Jiang,Tsuyoshi Takagi,Guilin Wang
Security and Communication Networks   9(12) 1635-1637   2016   [Refereed]
Youwen Zhu,Zhiqiu Huang,Tsuyoshi Takagi
J. Parallel Distrib. Comput.   89 1-12   2016   [Refereed]
Ye Yuan,Chen-Mou Cheng,Shinsaku Kiyomoto,Yutaka Miyake,Tsuyoshi Takagi
IJNC   6(2) 309-327   2016   [Refereed]
Keisuke Hakuta,Hisayoshi Sato,Tsuyoshi Takagi
Adv. in Math. of Comm.   10(2) 221-228   2016   [Refereed]
Jintai Ding,Momonari Kudo,Shinya Okumura,Tsuyoshi Takagi,Chengdong Tao
Advances in Information and Computer Security - 11th International Workshop on Security, IWSEC 2016, Tokyo, Japan, September 12-14, 2016, Proceedings   9836 LNCS 305-315   2016   [Refereed]
Dung Hoang Duong,Albrecht Petzoldt,Yacheng Wang,Tsuyoshi Takagi
Information Security and Cryptology - ICISC 2016 - 19th International Conference, Seoul, South Korea, November 30 - December 2, 2016, Revised Selected Papers   223-238   2016   [Refereed]
Shinya Okumura,Koichiro Akiyama,Tsuyoshi Takagi
Fourth International Symposium on Computing and Networking, CANDAR 2016, Hiroshima, Japan, November 22-25, 2016   2016(CANDAR) 36-36   2016   [Refereed]
Chi Cheng,Jemin Lee,Tao Jiang 0002,Tsuyoshi Takagi
IEEE Trans. Information Forensics and Security   11(5) 1002-1002   2016   [Refereed]
Yoshinori Aono,Yuntao Wang,Takuya Hayashi 0001,Tsuyoshi Takagi
Advances in Cryptology - EUROCRYPT 2016 - 35th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Vienna, Austria, May 8-12, 2016, Proceedings, Part I   9665 789-819   2016   [Refereed]
Dung Hoang Duong,Albrecht Petzoldt,Tsuyoshi Takagi
Information Security and Privacy - 21st Australasian Conference, ACISP 2016, Melbourne, VIC, Australia, July 4-6, 2016, Proceedings, Part II   9723 427-434   2016   [Refereed]
Rui Xu,Kirill Morozov,Yanjiang Yang,Jianying Zhou,Tsuyoshi Takagi
Information Security and Privacy - 21st Australasian Conference, ACISP 2016, Melbourne, VIC, Australia, July 4-6, 2016, Proceedings, Part I   9722 181-197   2016   [Refereed]
Fagen Li,Di Zhong,Tsuyoshi Takagi
IEEE Trans. Information Forensics and Security   11(11) 2486-2486   2016   [Refereed]
Takanori Yasuda,Tsuyoshi Takagi,Kouichi Sakurai
Third International Symposium on Computing and Networking, CANDAR 2015, Sapporo, Hokkaido, Japan, December 8-11, 2015   477-483   2015   [Refereed]
Array,Chen-Mou Cheng,Shinsaku Kiyomoto,Yutaka Miyake,Tsuyoshi Takagi
Third International Symposium on Computing and Networking, CANDAR 2015, Sapporo, Hokkaido, Japan, December 8-11, 2015   58-67   2015   [Refereed]
Youwen Zhu,Zhiqiu Huang,Liusheng Huang,Tsuyoshi Takagi
IEEE Trans. Dependable Sec. Comput.   12(3) 373-374   2015   [Refereed]
Xiangsong Zhang,Zhenhua Liu,Yupu Hu,Tsuyoshi Takagi
I. J. Network Security   17(2) 110-122   2015   [Refereed]
Rui Xu,Kirill Morozov,Tsuyoshi Takagi
IEICE Transactions   98-A(8) 1814-1819   2015   [Refereed]
Takanori Yasuda,Xavier Dahan,Yun-Ju Huang,Tsuyoshi Takagi,Kouichi Sakurai
ACM Comm. Computer Algebra   49(3) 105-107   2015   [Refereed]
Mingwu Zhang,Chunzhi Wang,Tsuyoshi Takagi,Yi Mu
Comput. J.   58(4) 735-749   2015   [Refereed]
Youwen Zhu,Tsuyoshi Takagi
IJESDF   7(1) 1-19   2015   [Refereed]
Rong Hu,Kirill Morozov,Tsuyoshi Takagi
IEICE Transactions   98-A(10) 2139-2151   2015   [Refereed]
Chen-Mou Cheng,Yasufumi Hashimoto,Hiroyuki Miura,Tsuyoshi Takagi
Post-Quantum Cryptography - 6th International Workshop, PQCrypto 2014, Waterloo, ON, Canada, October 1-3, 2014. Proceedings   40-58   2014   [Refereed]
Tsukasa Ishiguro,Shinsaku Kiyomoto,Yutaka Miyake,Tsuyoshi Takagi
Public-Key Cryptography - PKC 2014 - 17th International Conference on Practice and Theory in Public-Key Cryptography, Buenos Aires, Argentina, March 26-28, 2014. Proceedings   411-428   2014   [Refereed]
Rui Xu 0006,Kirill Morozov,Tsuyoshi Takagi
Advances in Information and Computer Security - 9th International Workshop on Security, IWSEC 2014, Hirosaki, Japan, August 27-29, 2014. Proceedings   72-87   2014   [Refereed]
Takanori Yasuda,Tsuyoshi Takagi,Kouichi Sakurai
Information and Communication Technology - Second IFIP TC5/8 International Conference, ICT-EurAsia 2014, Bali, Indonesia, April 14-17, 2014. Proceedings   532-541   2014   [Refereed]
Mingwu Zhang,Bo Yang 0003,Chunzhi Wang,Tsuyoshi Takagi
Security and Communication Networks   7(11) 1974-1987   2014   [Refereed]
Chunhua Su,Jianying Zhou 0001,Feng Bao 0001,Tsuyoshi Takagi,Kouichi Sakurai
Security and Communication Networks   7(6) 964-978   2014   [Refereed]
Takanori Yasuda,Tsuyoshi Takagi,Kouichi Sakurai
JoWUA   5(3) 3-13   2014   [Refereed]
Mingwu Zhang,Bo Yang 0003,Tsuyoshi Takagi
Inf. Sci.   277 715-730   2014   [Refereed]
Mingwu Zhang,Chunzhi Wang,Bo Yang 0003,Tsuyoshi Takagi
Int. J. Communication Systems   27(12) 4307-4327   2014   [Refereed]
Mingwu Zhang,Takashi Nishide,Bo Yang 0003,Tsuyoshi Takagi
IET Information Security   8(4) 240-249   2014   [Refereed]
Yutaro Kiyomura,Tsuyoshi Takagi
IEICE Transactions   97-A(10) 2055-2063   2014   [Refereed]
Hui Zhang,Tsuyoshi Takagi
IEICE Transactions   97-A(7) 1533-1541   2014   [Refereed]
Hiroyuki Miura,Yasufumi Hashimoto,Tsuyoshi Takagi
IEICE Transactions   97-A(6) 1418-1425   2014   [Refereed]
Youwen Zhu,Tsuyoshi Takagi,Rong Hu
IEICE Transactions   97-D(2) 326-330   2014   [Refereed]
Youwen Zhu,Tsuyoshi Takagi
IEICE Transactions   97-A(1) 409-412   2014   [Refereed]
Takanori Yasuda,Tsuyoshi Takagi,Kouichi Sakurai
IEICE Transactions   97-A(1) 245-252   2014   [Refereed]
Naoyuki Shinohara,Takeshi Shimoyama,Takuya Hayashi 0001,Tsuyoshi Takagi
IEICE Transactions   97-A(1) 236-244   2014   [Refereed]
Rong Hu,Kirill Morozov,Tsuyoshi Takagi
Eighth Asia Joint Conference on Information Security, AsiaJCIS 2013, Seoul, Korea, July 25-26, 2013   12-18   2013   [Refereed]
Hui Zhang,Tsuyoshi Takagi
Information Security and Privacy - 18th Australasian Conference, ACISP 2013, Brisbane, Australia, July 1-3, 2013. Proceedings   41-56   2013   [Refereed]
Array,Tsuyoshi Takagi
Wireless Personal Communications   69(4) 1391-1398   2013   [Refereed]
Array,Hui Zhang,Tsuyoshi Takagi
IEEE Systems Journal   7(3) 420-429   2013   [Refereed]
Mingwu Zhang,Bo Yang 0003,Zhenhua Chen,Tsuyoshi Takagi
Security and Communication Networks   6(8) 1044-1052   2013   [Refereed]
Array,Mingwu Zhang,Tsuyoshi Takagi
Mathematical and Computer Modelling   58(1-2) 196-203   2013   [Refereed]
Array,Tsuyoshi Takagi
Mathematical and Computer Modelling   57(11-12) 2685-2694   2013   [Refereed]
Array,Masaaki Shirase,Tsuyoshi Takagi
Mathematical and Computer Modelling   57(3-4) 324-343   2013   [Refereed]
Mingwu Zhang,Jintao Yao,Chunzhi Wang,Tsuyoshi Takagi
I. J. Network Security   15(2) 133-138   2013   [Refereed]
Youwen Zhu,Rui Xu 0006,Tsuyoshi Takagi
IJESDF   5(3/4) 201-217   2013   [Refereed]
Yasufumi Hashimoto,Tsuyoshi Takagi,Kouichi Sakurai
IEICE Transactions   96-A(1) 196-205   2013   [Refereed]
Array,Fahad Bin Muhaya,Muhammad Khurram Khan,Tsuyoshi Takagi
Concurrency and Computation: Practice and Experience   25(14) 2112-2122   2013   [Refereed]
Mingwu Zhang,Bo Yang 0003,Tsuyoshi Takagi
Comput. J.   56(4) 464-477   2013   [Refereed]