User profiles for Kazuo Takaragi
![]() | Kazuo TakaragiHISAFE, Ltd. Verified email at aist.go.jp Cited by 4797 |
A new keystream generator MUGI
D Watanabe, S Furuya, H Yoshida, K Takaragi… - Fast Software Encryption …, 2002 - Springer
We present a new keystream generator (KSG) MUGI, which is a variant of Panama proposed
at FSE ’98. MUGI has a 128-bit secret key and a 128-bit initial vector as parameters and …
at FSE ’98. MUGI has a 128-bit secret key and a 128-bit initial vector as parameters and …
An ultra small individual recognition security chip
K Takaragi, M Usami, R Imura, R Itsuki, T Satoh - IEEE micro, 2001 - ieeexplore.ieee.org
The manufacturing and distribution of goods requires good quality and inventory control.
The RFID (radiofrequency identification) enabled microchip's small size and low cost make it …
The RFID (radiofrequency identification) enabled microchip's small size and low cost make it …
[PDF][PDF] A threshold digital signature issuing scheme without secret communication
K Takaragi, K Miyazaki, M Takahashi - IEEE P1363 Study, 2000 - Citeseer
This paper describes an efficient (k, n) threshold digital signature scheme. In the scheme, k
out of n signers cooperate to issue a signature without using trusted center. No secret …
out of n signers cooperate to issue a signature without using trusted center. No secret …
Secure revocation features in eKYC-privacy protection in central bank digital currency
K Takaragi, T Kubota, S Wohlgemuth… - … on Fundamentals of …, 2023 - search.ieice.org
Central bank digital currencies require the implementation of eKYC to verify whether a
trading customer is eligible online. When an organization issues an ID proof of a customer for …
trading customer is eligible online. When an organization issues an ID proof of a customer for …
A lightweight encryption method suitable for copyright protection
M Aikawa, K Takaragi, S Furuya… - IEEE Transactions on …, 1998 - ieeexplore.ieee.org
… Makoto Aikawa’, Kazuo Takaragi2, Soichi Furuya’ and Manabu Sasamoto’ ’Multimedia
Systems R&D Division, Hitachi, Ltd. ‘Systems Development Laboratory, Hitachi, Ltd. … [4] …
Systems R&D Division, Hitachi, Ltd. ‘Systems Development Laboratory, Hitachi, Ltd. … [4] …
A method of threat analysis for cyber-physical system using vulnerability databases
Y Mishina, K Takaragi… - 2018 IEEE International …, 2018 - ieeexplore.ieee.org
Safety and security are major issues for cyber-physical systems. We propose a threat analysis
method effective for the design stage of a safety-critical cyber-physical system, utilizing the …
method effective for the design stage of a safety-critical cyber-physical system, utilizing the …
Competitive compliance with blockchain
…, K Umezawa, Y Mishina, K Takaragi - 2019 IEEE …, 2019 - ieeexplore.ieee.org
Authentication is essential for sharing information in IoT and its secondary use with AI-capable
machines. The aim is to support humans in optimizing risk of supply chains for industrial …
machines. The aim is to support humans in optimizing risk of supply chains for industrial …
A threshold digital signature scheme for a smart card based system
K Miyazaki, K Takaragi - IEICE transactions on fundamentals of …, 2001 - search.ieice.org
This paper describes an efficient k-out-of-n threshold digital signature scheme for a smart card
based system where a signer uses multiple cards so that the signature can be issued in a …
based system where a signer uses multiple cards so that the signature can be issued in a …
Safety and Security Analysis using LDA based on Case Reports: Case Study and Trust Evaluation Method
…, S Wohlgemuth, Y Mishina, K Takaragi - Proceedings of the 17th …, 2022 - dl.acm.org
There are many cases where the safety and security of systems are threatened by accidental
or intentional human error. This study focuses on the fact that there is information available …
or intentional human error. This study focuses on the fact that there is information available …
[PDF][PDF] Threat analysis using vulnerability databases–matching attack cases to vulnerability database by topic model analysis–
…, Y Mishina, S Wohlgemuth, K Takaragi - Proceeding of the …, 2018 - researchgate.net
In this paper, we propose a threat analysis method utilizing vulnerability databases and
system design information. The method is based on attack tree analysis. We created an attack …
system design information. The method is based on attack tree analysis. We created an attack …