What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Masahiko Takenaka
Google Scholar
19
publications in security and cryptology related venues
Year
Venue
Title
2014
conf/iwsec
A Technique Using PUFs for Protecting Circuit Layout Designs against Reverse Engineering.
Dai Yamamoto
Masahiko Takenaka
Kazuo Sakiyama
Naoya Torii
2012
conf/pkc
Solving a Discrete Logarithm Problem with Auxiliary Input on a 160-Bit Elliptic Curve.
Yumi Sakemi
Goichiro Hanaoka
Tetsuya Izu
Masahiko Takenaka
Masaya Yasuda
2011
conf/fc
Detailed Cost Estimation of CNTW Attack against EMV Signature Scheme.
Tetsuya Izu
Yoshitaka Morikawa
Yasuyuki Nogami
Yumi Sakemi
Masahiko Takenaka
2011
conf/ches
Uniqueness Enhancement of PUF Responses Based on the Locations of Random Outputting RS Latches.
Dai Yamamoto
Kazuo Sakiyama
Mitsugu Iwamoto
Kazuo Ohta
Takao Ochiai
Masahiko Takenaka
Kouichi Itoh
2011
conf/wisa
Solving a DLP with Auxiliary Input with the ρ-Algorithm.
Yumi Sakemi
Tetsuya Izu
Masahiko Takenaka
Masaya Yasuda
2010
conf/iwsec
A Prototype System for Ensuring Integrity of Extracted Video Data (Extended Abstract).
Tetsuya Izu
Masahiko Takenaka
Takashi Yoshioka
2008
conf/wisa
Sanitizable and Deletable Signature.
Tetsuya Izu
Noboru Kunihiro
Kazuo Ohta
Makoto Sano
Masahiko Takenaka
2006
conf/acns
Improving the Randomized Initial Point Countermeasure Against DPA.
Kouichi Itoh
Tetsuya Izu
Masahiko Takenaka
2006
conf/icics
A Fast RSA Implementation on Itanium 2 Processor.
Kazuyoshi Furukawa
Masahiko Takenaka
Kouichi Itoh
2005
conf/icics
PIATS: A Partially Sanitizable Signature Scheme.
Tetsuya Izu
Nobuyuki Kanaya
Masahiko Takenaka
Takashi Yoshioka
2003
conf/acisp
Theoretical Analysis of chi<sup>2</sup> Attack on RC6.
Masahiko Takenaka
Takeshi Shimoyama
Takeshi Koshiba
2003
conf/ches
A Practical Countermeasure against Address-Bit Differential Power Analysis.
Kouichi Itoh
Tetsuya Izu
Masahiko Takenaka
2002
conf/fse
Multiple Linear Cryptanalysis of a Reduced Round RC6.
Takeshi Shimoyama
Masahiko Takenaka
Takeshi Koshiba
2002
conf/ches
DPA Countermeasures by Improving the Window Method.
Kouichi Itoh
Jun Yajima
Masahiko Takenaka
Naoya Torii
2002
conf/ches
Address-Bit Differential Power Analysis of Cryptographic Schemes OK-ECDH and OK-ECDSA.
Kouichi Itoh
Tetsuya Izu
Masahiko Takenaka
2001
conf/fse
The Block Cipher SC2000.
Takeshi Shimoyama
Hitoshi Yanami
Kazuhiro Yokoyama
Masahiko Takenaka
Kouichi Itoh
Jun Yajima
Naoya Torii
Hidema Tanaka
2001
conf/icisc
DPA Countermeasure Based on the "Masking Method".
Kouichi Itoh
Masahiko Takenaka
Naoya Torii
2000
conf/ches
Implementation of Elliptic Curve Cryptographic Coprocessor over GF(2<sup>m</sup>) on an FPGA.
Souichi Okada
Naoya Torii
Kouichi Itoh
Masahiko Takenaka
1999
conf/ches
Fast Implementation of Public-Key Cryptography ona DSP TMS320C6201.
Kouichi Itoh
Masahiko Takenaka
Naoya Torii
Syouji Temma
Yasushi Kurihara
Coauthors
Dai Yamamoto
(2)
Goichiro Hanaoka
(1)
Hidema Tanaka
(1)
Hitoshi Yanami
(1)
Jun Yajima
(2)
Kazuhiro Yokoyama
(1)
Kazuo Ohta
(2)
Kazuo Sakiyama
(2)
Kazuyoshi Furukawa
(1)
Kouichi Itoh
(10)
Makoto Sano
(1)
Masahiko Takenaka
(19)
Masaya Yasuda
(2)
Mitsugu Iwamoto
(1)
Naoya Torii
(6)
Noboru Kunihiro
(1)
Nobuyuki Kanaya
(1)
Souichi Okada
(1)
Syouji Temma
(1)
Takao Ochiai
(1)
Takashi Yoshioka
(2)
Takeshi Koshiba
(2)
Takeshi Shimoyama
(3)
Tetsuya Izu
(9)
Yasushi Kurihara
(1)
Yasuyuki Nogami
(1)
Yoshitaka Morikawa
(1)
Yumi Sakemi
(3)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to