default search action
Takuya Kusaka
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [j20]Kazuma Ikesaka, Yuki Nanjo, Yuta Kodera, Takuya Kusaka, Yasuyuki Nogami:
Improvement of Miller Loop for a Pairing on FK12 Curve and Evaluation with other STNFS Curves. Int. J. Netw. Comput. 13(2): 242-257 (2023) - [c55]Muhammad Bisri Musthafa, Ali Md. Arshad, Samsul Huda, Yuta Kodera, Takuya Kusaka, Yasuyuki Nogami:
Evaluation of machine learning based optimized feature selection approaches and classification methods for Intrusion Detection System. ICCE-Taiwan 2023: 285-286 - [c54]Yuki Takeuchi, Itsuki Maebayashi, Ali Md. Arshad, Takuya Kusaka, Yasuyuki Nogami, Yuta Kodera:
A Consideration of Parameters for a Nonlinear Filter Generator and its Linear Complexity Profile. ICCE-Taiwan 2023: 345-346 - [c53]Itsuki Maebayashi, Yuki Takeuchi, Ali Md. Arshad, Takuya Kusaka, Yasuyuki Nogami, Yuta Kodera:
A modified M-sequence with dynamic mapping and its autocorrelation. ICCE-Taiwan 2023: 347-348 - [c52]Akane Miyoshi, Kazuma Ikesaka, Ali Md. Arshad, Yuta Kodera, Takuya Kusaka, Yasuyuki Nogami:
A Consideration of Averaging the Calculation Cost of CVMA for A Secure Session based Data Transmission. ICCE-Taiwan 2023: 493-494 - [c51]Takuro Manabe, Ken Ikuta, Sho Joichi, Hiromasa Miura, Shota Kanzawa, Yasuyuki Nogami, Yuta Kodera, Takuya Kusaka:
An Attack for a 116bit ECDLP for a Barreto-Naehrig Curve. ICCE-Taiwan 2023: 527-528 - [c50]Masakazu Awakiahra, Jun Miura, Ali Md. Arshad, Takuya Kusaka, Yasuyuki Nogami, Yuta Kodera:
A Proposal for Efficient Multiplication and Inverse Calculation in Streamlined NTRU Prime. ICCE-Taiwan 2023: 541-542 - 2022
- [j19]Yuta Kodera, Ryoichi Sato, Ali Md. Arshad, Takuya Kusaka, Yasuyuki Nogami:
Transition Probability Test for an RO-Based Generator and the Relevance between the Randomness and the Number of ROs. Entropy 24(6): 780 (2022) - [j18]Yuki Nanjo, Masaaki Shirase, Yuta Kodera, Takuya Kusaka, Yasuyuki Nogami:
Efficient Final Exponentiation for Cyclotomic Families of Pairing-Friendly Elliptic Curves with Any Prime Embedding Degrees. Int. J. Netw. Comput. 12(2): 317-338 (2022) - [c49]Kazuma Ikesaka, Yuki Nanjo, Yuta Kodera, Takuya Kusaka, Yasuyuki Nogami:
Improvement of Miller Loop for a Pairing on FK12 Curve and its Implementation. CANDAR 2022: 104-109 - [c48]Shota Kanzawa, Hiromasa Miura, Yasuyuki Nogami, Yuta Kodera, Takuya Kusaka:
A Method to Eliminate Fruitless Cycles for Pollard's Rho Method by Splitting a Seed-point Table for a Random Walk. CANDAR 2022: 110-116 - [c47]Tomohiro Iida, Kazuma Ikesaka, Yuta Kodera, Takuya Kusaka, Yasuyuki Nogami:
Improvement of Optimal-Ate Pairing on Cocks-Pinch Curve with Embedding Degree 6 in Affine Coordinates. CANDARW 2022: 309-315 - 2021
- [j17]Ryoichi Sato, Yuta Kodera, Ali Md. Arshad, Takuya Kusaka, Yasuyuki Nogami, Robert H. Morelos-Zaragoza:
Consideration for Affects of an XOR in a Random Number Generator Using Ring Oscillators. Entropy 23(9): 1168 (2021) - [j16]Yuki Nanjo, Masaaki Shirase, Takuya Kusaka, Yasuyuki Nogami:
Improvement of Final Exponentiation for Pairings on BLS Curves with Embedding Degree 15. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 104-A(1): 315-318 (2021) - [j15]Toru Fujiwara, Takuya Kusaka:
The Weight Distributions of the (256, k) Extended Binary Primitive BCH Codes with k≤71 and k≥187. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 104-A(9): 1321-1328 (2021) - [j14]Hiromasa Miura, Syota Kanzawa, Rikuya Matsumura, Yuta Kodera, Takuya Kusaka, Yasuyuki Nogami:
Sophisticated analysis of a method to eliminate fruitless cycles for Pollard's rho method with skew Frobenius mapping over a Barreto-Naehrig curve. Int. J. Netw. Comput. 11(2): 231-250 (2021) - [j13]Yuki Nanjo, Masaaki Shirase, Takuya Kusaka, Yasuyuki Nogami:
Restrictions of Integer Parameters for Generating Attractive BLS Subfamilies of Pairing-Friendly Elliptic Curves with Specific Embedding Degrees. Int. J. Netw. Comput. 11(2): 383-411 (2021) - [c46]Yuki Nanjo, Masaaki Shirase, Yuta Kodera, Takuya Kusaka, Yasuyuki Nogami:
Efficient Final Exponentiation for Pairings on Several Curves Resistant to Special TNFS. CANDAR 2021: 48-55 - [c45]Yuki Nanjo, Masaaki Shirase, Yuta Kodera, Takuya Kusaka, Yasuyuki Nogami:
A Construction Method of Final Exponentiation for a Specific Cyclotomic Family of Pairing-Friendly Elliptic Curves with Prime Embedding Degrees. CANDAR 2021: 148-154 - [c44]Masaki Nakanose, Yuta Kodera, Takuya Kusaka, Yasuyuki Nogami:
Consideration of the side-channel attack to SPECK implemented on Arduino Uno. CANDAR (Workshops) 2021: 339-345 - [c43]Harunobu Enami, Yuta Kodera, Takuya Kusaka, Yasuyuki Nogami:
Consideration of the side-channel attack to SIMON implemented on Arduino Uno. CANDAR (Workshops) 2021: 412-415 - [c42]Daichi Hattori, Yuto Takahashi, Tomoya Tatara, Yuki Nanjo, Takuya Kusaka, Yasuyuki Nogami:
An Optimal Curve Parameters for BLS12 Elliptic Curve Pairing and Its Efficiency Evaluation. ICCE-TW 2021: 1-2 - [c41]Taiki Miyamoto, Ryo Fukushima, Kazuaki Harada, Keiji Yoshimoto, Yuta Kodera, Takuya Kusaka, Yasuyuki Nogami:
A Property Management System Using Image Recognition by YOLO. ICCE-TW 2021: 1-2 - [c40]Ryoichi Sato, Yuta Kodera, Takuya Kusaka, Yasuyuki Nogami:
A Proposal for Testing Physical Random Numbers Using Stochastic Process. ICCE-TW 2021: 1-2 - [c39]Keiji Yoshimoto, Yuta Kodera, Takuya Kusaka, Yasuyuki Nogami:
Consideration of Generating Suitable Parameters for Constructing type (h, m) Gauss Period Normal Basis. ICCE-TW 2021: 1-2 - 2020
- [j12]Yuki Nanjo, Masaaki Shirase, Takuya Kusaka, Yasuyuki Nogami:
A Construction Method of an Isomorphic Map between Quadratic Extension Fields Applicable for SIDH. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 103-A(12): 1403-1406 (2020) - [j11]Keiji Yoshimoto, Yoshinori Uetake, Yuta Kodera, Takuya Kusaka, Yasuyuki Nogami:
Evaluating Side-Channel Resistance Using Low Order Rational Points Against Curve25519 and an Associated Quadratic Twist. Int. J. Netw. Comput. 10(2): 144-158 (2020) - [j10]Yuki Nanjo, Masaaki Shirase, Takuya Kusaka, Yasuyuki Nogami:
A Performance Analysis and Evaluation of SIDH Applied Several Implementation-Friendly Quadratic Extension Fields. Int. J. Netw. Comput. 10(2): 227-241 (2020) - [c38]Hiromasa Miura, Rikuya Matsumura, Takuya Kusaka, Yasuyuki Nogami:
Analysis of a method to eliminate fruitless cycles for Pollard's rho method with skew Frobenius mapping over a Barreto-Naehrig curve. CANDAR 2020: 160-166 - [c37]Fatema Akhter, Tomoya Tatara, Yasuyuki Nogami, Takuya Kusaka, Nobuo Funabiki:
Improvement of Bit Distribution of Binary Sequence Generated by Alternative Trace Map Function. CANDAR (Workshops) 2020: 302-306 - [c36]Yuki Nanjo, Masaaki Shirase, Takuya Kusaka, Yasuyuki Nogami:
Specific Congruence Classes of Integer Parameters for Generating BLS Curves for Fast Pairings. CANDAR (Workshops) 2020: 348-354 - [c35]Jianjie Tang, Kengo Iokibe, Takuya Kusaka, Yasuyuki Nogami:
An Approach for Attacking Speck on Microcontroller with Correlation Power Analysis. CANDAR (Workshops) 2020: 368-372 - [c34]Yuta Kodera, Tomoya Tatara, Takuya Kusaka, Yasuyuki Nogami, Satoshi Uehara:
A Parallel Blum-Micali Generator Based on the Gauss Periods. ISITA 2020: 447-450 - [c33]Yuta Kodera, Yuki Taketa, Takuya Kusaka, Yasuyuki Nogami, Satoshi Uehara:
Equivalent Keys of a Nonlinear Filter Generator Using a Power Residue Symbol. IWSEC 2020: 23-36 - [c32]Yuki Taketa, Yuta Kodera, Takuya Kusaka, Yasuyuki Nogami:
Path Authentication Protocol: Based on a Lightweight MAC and a Nonlinear Filter Generator. SVCC 2020: 38-48
2010 – 2019
- 2019
- [j9]Yuta Kodera, Ali Md. Arshad, Takeru Miyazaki, Takuya Kusaka, Yasuyuki Nogami, Satoshi Uehara, Robert H. Morelos-Zaragoza:
Algebraic Group Structure of the Random Number Generator: Theoretical Analysis of NTU Sequence(s). IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 102-A(12): 1659-1667 (2019) - [j8]Yuta Kodera, Minoru Kuribayashi, Takuya Kusaka, Yasuyuki Nogami:
Advanced Searchable Encryption: An Adaptively Secure Keyword Search for Matrix-type Storages. Int. J. Netw. Comput. 9(2): 171-187 (2019) - [c31]Yuta Kodera, Yuki Taketa, Takuya Kusaka, Yasuyuki Nogami:
Decomposing the Inverse of a Masked Vector in an Isomorphic Galois Field for Perfectly Masked S-Box. CANDAR 2019: 157-163 - [c30]Yuki Nanjo, Masaaki Shirase, Takuya Kusaka, Yasuyuki Nogami:
A Performance Analysis and Evaluation of SIDH with Implementation-Friendly Classes of Quadratic Extension Fields. CANDAR 2019: 178-184 - [c29]Yoshinori Uetake, Keiji Yoshimoto, Yuta Kodera, Leo Weissbart, Takuya Kusaka, Yasuyuki Nogami:
A Side-Channel Attack Using Order 8 Rational Points against Curve25519 on an 8-Bit Microcontroller. CANDAR 2019: 225-231 - [c28]Keiji Yoshimoto, Yoshinori Uetake, Yuta Kodera, Takuya Kusaka, Yasuyuki Nogami:
Evaluating a Side-Channel Resistance against Order 4 Rational Points in Arduino Cryptography Library. CANDAR 2019: 245-250 - [c27]Hiromasa Miura, Rikuya Matsumura, Ken Ikuta, Sho Joichi, Takuya Kusaka, Yasuyuki Nogami:
A Preliminary Study on Methods to Eliminate Short Fruitless Cycles for Pollard's Rho Method for ECDLP over BN Curves. CANDAR Workshops 2019: 353-359 - [c26]Yuki Taketa, Yuta Kodera, Shogo Tanida, Takuya Kusaka, Yasuyuki Nogami, Norikazu Takahashi, Satoshi Uehara:
Mutual Relationship between the Neural Network Model and Linear Complexity for Pseudorandom Binary Number Sequence. CANDAR Workshops 2019: 394-400 - [c25]Fatema Akhter, Yasuyuki Nogami, Takuya Kusaka, Yuki Taketa, Tomoya Tatara:
Binary Sequence Generated by Alternative Trace Map Function and Its Properties. CANDAR Workshops 2019: 408-411 - [c24]Shinichi Kageyama, Ken Ikuta, Yuki Nanjo, Yuta Kodera, Takuya Kusaka, Yasuyuki Nogami:
An Analysis of Computational Complexity of Low Level Quantizers for Block Turbo Decoding for Product Codes of Binary Linear Code. CANDAR Workshops 2019: 425-429 - [c23]Fatema Akhter, Yuta Kodera, Yasuyuki Nogami, Takuya Kusaka:
NIST Statistical Test for Random Sequence Generated by Möbius Function. ICCE-TW 2019: 1-2 - [c22]Yuta Kodera, Takuya Kusaka, Yasuyuki Nogami:
Boundary for the Linear Complexity of Well Balanced NTU. ICCE-TW 2019: 1-2 - [c21]Tomoya Tatara, Yuta Kodera, Takuya Kusaka, Yasuyuki Nogami:
A Consideration on Generating Uniform Binary Sequence with High Linear Complexity. ICCE-TW 2019: 1-2 - 2018
- [j7]Takuya Kusaka:
Analysis of a Sufficient Condition on the Optimality of a Decoded Codeword of Soft-Decision Decodings for Binary Linear Codes on a 4-Level Quantization over an AWGN Channel. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 101-A(3): 570-576 (2018) - [j6]Shunsuke Ueda, Ken Ikuta, Takuya Kusaka, Md. Al-Amin Khandaker, Ali Md. Arshad, Yasuyuki Nogami:
An Extended Generalized Minimum Distance Decoding for Binary Linear Codes on a 4-Level Quantization over an AWGN Channel. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 101-A(8): 1235-1244 (2018) - [j5]Yuta Kodera, Takeru Miyazaki, Md. Al-Amin Khandaker, Ali Md. Arshad, Takuya Kusaka, Yasuyuki Nogami, Satoshi Uehara:
Distribution of Digit Patterns in Multi-Value Sequence over the Odd Characteristic Field. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 101-A(9): 1525-1536 (2018) - [j4]Yuta Hashimoto, Md. Al-Amin Khandaker, Yuta Kodera, Taehwan Park, Takuya Kusaka, Howon Kim, Yasuyuki Nogami:
An Implementation of ECC with Twisted Montgomery Curve over 32nd Degree Tower Field on Arduino Uno. Int. J. Netw. Comput. 8(2): 341-350 (2018) - [j3]Yuki Nanjo, Md. Al-Amin Khandaker, Takuya Kusaka, Yasuyuki Nogami:
Efficient Pairing-Based Cryptography on Raspberry Pi. J. Commun. 13(2): 88-93 (2018) - [c20]Md. Al-Amin Khandaker, Yuki Nanjo, Takuya Kusaka, Yasuyuki Nogami:
A Comparative Implementation of GLV Technique on KSS-16 Curve. CANDAR 2018: 106-112 - [c19]Guillaume Carel, Ryunosuke Isshiki, Takuya Kusaka, Yasuyuki Nogami, Shunsuke Araki:
Design of a Message Authentication Protocol for CAN FD Based on Chaskey Lightweight MAC. CANDAR Workshops 2018: 267-271 - [c18]Yuta Kodera, Minoru Kuribayashi, Takuya Kusaka, Yasuyuki Nogami:
Advanced Searchable Encryption: Keyword Search for Matrix-Type Storage. CANDAR Workshops 2018: 292-297 - [c17]Yuki Nanjo, Md. Al-Amin Khandaker, Takuya Kusaka, Yasuyuki Nogami:
Consideration of Efficient Pairing Applying Two Construction Methods of Extension Fields. CANDAR Workshops 2018: 445-451 - [c16]Ali Md. Arshad, Yuta Kodera, Shoji Heguri, Takuya Kusaka, Satoshi Uehara, Robert H. Morelos-Zaragoza:
Bit Distribution of Binary Sequence Generated by Trace Function and Legendre Symbol Over Sub Extension Field. ICIT 2018: 92-96 - [c15]Yoshinori Uetake, Akihiro Sanada, Takuya Kusaka, Yasuyuki Nogami, Leo Weissbart, Sylvain Duquesne:
Side-Channel Attack using Order 4 Element against Curve25519 on ATmega328P. ISITA 2018: 618-622 - [c14]Ken Ikuta, Sho Joichi, Kazuya Kobayashi, Md. Al-Amin Khandaker, Takuya Kusaka, Yasuyuki Nogami:
A Study on the Parameter Size of the Montgomery Trick for ECDLP. ISITA 2018: 623-627 - [c13]Ken Ikuta, Sho Joichi, Kazuya Kobayashi, Md. Al-Amin Khandaker, Takuya Kusaka, Yasuyuki Nogami:
A Study on the Parameter of the Distinguished Point Method in Pollard's Rho Method for ECDLP. ISITA 2018: 628-632 - [c12]Yuki Nanjo, Md. Al-Amin Khandaker, Masaaki Shirase, Takuya Kusaka, Yasuyuki Nogami:
Efficient Ate-Based Pairing over the Attractive Classes of BN Curves. WISA 2018: 55-67 - [c11]Yuta Kodera, Minoru Kuribayashi, Takuya Kusaka, Yasuyuki Nogami:
A Construction of a Keyword Search to Allow Partial Matching with a Block Cipher. WISA 2018: 241-252 - 2017
- [j2]Takuya Kusaka:
A Study on the Error Performance of Soft-Decision Decodings for Binary Linear Codes on a 4-Level Quantization over an AWGN Channel. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 100-A(12): 3016-3022 (2017) - [c10]Yuta Hashimoto, Md. Al-Amin Khandaker, Yuta Kodera, Taehwan Park, Takuya Kusaka, Howon Kim, Yasuyuki Nogami:
An ECC Implementation with a Twisted Montgomery Curve over Fq32 on an 8-Bit Microcontroller. CANDAR 2017: 445-450 - [c9]Yuta Kodera, Takuya Kusaka, Takeru Miyazaki, Md. Al-Amin Khandaker, Yasuyuki Nogami, Satoshi Uehara:
An Efficient Implementation of Trace Calculation over Finite Field for a Pseudorandom Sequence. CANDAR 2017: 451-455 - [c8]Shunsuke Ueda, Takuya Kusaka:
Study on Reduction on Average Computational Complexity of GMD Decoding Using Property of Bounded Distance Decoding. CANDAR 2017: 584-588 - [c7]Takuya Kusaka, Sho Joichi, Ken Ikuta, Md. Al-Amin Khandaker, Yasuyuki Nogami, Satoshi Uehara, Nariyoshi Yamai, Sylvain Duquesne:
Solving 114-Bit ECDLP for a Barreto-Naehrig Curve. ICISC 2017: 231-244 - 2016
- [c6]Shohei Fujimoto, Takuya Kusaka, Shunsuke Ueda:
A study on soft-out of soft-in/soft-out decoding algorithms for binary linear codes. ISITA 2016: 300-304 - 2014
- [c5]Yuki Kono, Yasuyuki Nogami, Takuya Kusaka:
Experimental evaluation of the efficiency of associative rational points for random walks on ECDLP. ISCIT 2014: 366-367 - [c4]Takuya Kusaka:
Introduction of a recursive method for specific weight binary vector generation in decreasing order of its reliability measure. ISITA 2014: 521-525 - 2012
- [j1]Takuya Kusaka, Ryuhei Yokoyama, Toru Fujiwara:
A Recursive Method for Vector Generation in Non-increasing Order of Its Likelihood for All Binary Vectors and Its Application for Linear Block Code Decodings. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 95-A(4): 801-810 (2012) - [c3]Takuya Kusaka, Ryuhei Yokoyama, Toru Fujiwara:
A soft-decision sphere decoding based on the recursive vector generator. ISITA 2012: 111-115 - 2010
- [c2]Tetsushi Masuno, Toru Fujiwara, Takuya Kusaka:
A New method to reduce the probability of detection errors for a digital watermark using complementary decoding algorithms and minimum weight codewords of linear code. ISITA 2010: 326-331 - [c1]Ryuhei Yokoyama, Toru Fujiwara, Takuya Kusaka:
Adaptive recursive MLD using ordered statistics for low rate codes. ISITA 2010: 772-777
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-09 12:49 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint