| Fast RSA-type cryptosystem modulo pkq T Takagi Annual International Cryptology Conference, 318-326, 1998 | 300 | 1998 |
| Securing the Internet of Things in a quantum world C Cheng, R Lu, A Petzoldt, T Takagi IEEE Communications Magazine 55 (2), 116-120, 2017 | 296 | 2017 |
| An efficient and secure RFID security method with ownership transfer K Osaka, T Takagi, K Yamazaki, O Takahashi 2006 International Conference on Computational Intelligence and Security 2 …, 2006 | 284 | 2006 |
| A fast parallel elliptic curve multiplication resistant against side channel attacks T Izu, T Takagi International Workshop on Public Key Cryptography, 280-296, 2002 | 270 | 2002 |
| Zero-value point attacks on elliptic curve cryptosystem T Akishita, T Takagi International Conference on Information Security, 218-233, 2003 | 205 | 2003 |
| Signed binary representations revisited K Okeya, K Schmidt-Samoa, C Spahn, T Takagi Annual International Cryptology Conference, 123-139, 2004 | 194 | 2004 |
| Improved progressive BKZ algorithms and their precise cost estimation by sharp simulator Y Aono, Y Wang, T Hayashi, T Takagi Annual International Conference on the Theory and Applications of …, 2016 | 190 | 2016 |
| The Width-w NAF Method Provides Small Memory and Fast Elliptic Scalar Multiplications Secure against Side Channel Attacks K Okeya, T Takagi Cryptographers’ Track at the RSA Conference, 328-343, 2003 | 164 | 2003 |
| Certificateless hybrid signcryption F Li, M Shirase, T Takagi Mathematical and Computer Modelling 57 (3-4), 324-343, 2013 | 132 | 2013 |
| Improved elliptic curve multiplication methods resistant against side channel attacks T Izu, B Möller, T Takagi International Conference on Cryptology in India, 296-313, 2002 | 120 | 2002 |
| Cryptographic Hardware and Embedded Systems--CHES 2011: 13th International Workshop, Nara, Japan, September 28--October 1, 2011, Proceedings B Preneel, T Takagi Springer, 2011 | 119* | 2011 |
| Efficient signcryption for heterogeneous systems F Li, H Zhang, T Takagi IEEE Systems Journal 7 (3), 420-429, 2013 | 107 | 2013 |
| Secure and controllable k-NN query over encrypted cloud data with key confidentiality Y Zhu, Z Huang, T Takagi Journal of Parallel and Distributed Computing 89, 1-12, 2016 | 101 | 2016 |
| Exceptional procedure attack on elliptic curve cryptosystems T Izu, T Takagi International Workshop on Public Key Cryptography, 224-239, 2002 | 97 | 2002 |
| Digital signatures out of second-preimage resistant hash functions E Dahmen, K Okeya, T Takagi, C Vuillaume International Workshop on Post-Quantum Cryptography, 109-123, 2008 | 95 | 2008 |
| Efficient conjunctive keyword-searchable encryption EK Ryu, T Takagi 21st International Conference on Advanced Information Networking and …, 2007 | 79 | 2007 |
| An algorithm for the nt pairing calculation in characteristic three and its hardware implementation JL Beuchat, M Shirase, T Takagi, E Okamoto 18th IEEE Symposium on Computer Arithmetic (ARITH'07), 97-104, 2007 | 76 | 2007 |
| Parallel Gauss sieve algorithm: Solving the SVP challenge over a 128-dimensional ideal lattice T Ishiguro, S Kiyomoto, Y Miyake, T Takagi International Workshop on Public Key Cryptography, 411-428, 2014 | 70 | 2014 |
| Algorithms and arithmetic operators for computing the ηT pairing in characteristic three JL Beuchat, N Brisebarre, J Detrey, E Okamoto, M Shirase, T Takagi IEEE Transactions on Computers 57 (11), 1454-1468, 2008 | 68 | 2008 |
| A cryptosystem based on non-maximal imaginary quadratic orders with fast decryption D Hühnlein, MJ Jacobson Jr, S Paulus, T Takagi International Conference on the Theory and Applications of Cryptographic …, 1998 | 64 | 1998 |