[Japanese]/[English]

 

Updated on May 15, 2019

 

 

Kazuo Takaragi, Dr. Eng.

Biography

 

Kazuo Takaragi obtained BS and MS degree from Kyushu Institute of Technology and Tokyo Institute of Technology in 1975 and 1977 respectively. In 1977, he joined Hitachi, Ltd. At Systems Development Laboratory in Hitachi, he engaged in the research and development of system safety and security. In 1886, he obtained a doctor degree in safety engineering from the University of Tokyo. In 2004, he became the senior chief scientist at Yokohama Laboratory, Hitachi, Ltd. During the fall semester in 2007, he served as a visiting professor for Freiburg University in Germany.  In 2012, he joined National Institute of Advanced Industrial Science and Technology (AIST), Japan as a deputy. director of Information Technology Research Institute (ITRI). Currently, he is a project manager of AIST. He also serves as a chief executive officer of HISAFE, LTD., and a guest professor of Chuo University. He wrote books such as "Practice, policy and law of blockchain," Chuokeizai-sha Inc., “Information Security,” Kindai Kagaku Sha Co., Ltd., "Firewall," Shokodo Co., Ltd., and "Internet Security," Ohmusha, Ltd., all in Japanese.

 

1.Books, publications, research reports

 

 

a.English

1)"Information Technology for a Safe and Secure Society in Japan", K. Takaragi, Advances in cyber security, Edited by D. Frank Hsu and Dorothy Marinucci, Fordham University Press, New York, pp. 207-216, 2013.

 

b.Japanese

1)" Current Situation and Issues of Cryptography and Quantum Computer," Kazuo Takaragi, Sven Wohlgemuth, Practice, policy and law of blockchain, Edited by Takashi Kubota, Chuokeizai-sha Inc, pp. 131153, 2018.

2)"Information security -Cryptography · Authentication · Management ," Kazuo Takaragi, Kindai Kagaku Sha Co., Ltd., 2012.

3)"Firewall - About Internet technology ," Kazuo TakaragiMinoru KoizumiMasato Terada, Makoto Kayashima, Shokodo Co. Ltd, 1998.

4)"Internet Security - Foundation and countermeasure technology ," Ryoichi Sasaki, Kazuo Takaragi, Taketoshi Sakuraba, Masato Terada, Nariyasu Hamada, Ohmusha, Ltd., 1996.

 

2.Invited lecture

a.English

1)"IT Technology for Safe and Secure Society in Japan: Towards Cyber Physical Solution", K. Takaragi, International Conference on Cyber Security, 2010.8.

2)"Security Technology for Ubiquitous Information Society", K. Takaragi, Keynote Presentation at ETRICS, 2006.6.

 

b.Japanese

1)"Biometrics application situation for social infrastructure and its future subject," Kazuo Takaragi, BioX ITE-ME ITE-IST, IEICE, 2014.6.

2)"Road of IT Security Standard : From Cryptography to Cloud and M2M Security," Kazuo TakaragiITISECWBS, IEICE, 2013.3.

3)"Expectations from industry Application to information security ," Kazuo TakaragiWorkshop, Think about future scenario of mathematics ― Toward the development of interdisciplinary research based on mathematics ― National Institute of Science and Technology Policy, Mathematical Society of Japan, 2005.6.

 

3. Review, Report

 

 

a.English

1)"IT Technology for Safe & Secure Society in the Asian Region", K. Takaragi, Keynote Speech 7th AFIT, 2009.2.

2)"Security Techniques for Next Generation Cancelable bio and post quantum", K. Takaragi, ZISC Information Security Colloquium, 2007.12.

 

b.Japanese

1)"Security of Olympic," Kazuo TakaragiInformation Processing Society of JapanVol.55, No.11,pp1196-1203, 2014.11.

2)"New Object for Information Security," Kazuo Takaragi, Japan Society of Security Management, Vol. 28, No. 1, pp.36-43, 2014.5.

3)"Road of IT security standard -- From cryptography to cloud and M2M security --," Kazuo TakaragiFundamentals Review, IEICE Engineering Sciences Society, pp. 51-59, Vol.7, No.1,2013.7.

4)"The Front Line of Next Generation Core Technology - Information Security Technology," Kazuo Takaragi, Hitachi Hyoron, Vol.87, No.5, pp.63-68, 2005.5

5)"Cryptographic technology for promoting e-society, - Progress of symmetric-key ciphers ," Kazuo Takaragi, Yukiyasu Tsunoo, Kenji Ohkuma, Mitsuru Matsui, Shiho Moriai, Takeshi ShimoyamaIPSJ MagazineVol.45, No.11, pp.1117-1122, 2004.11.

6)"System LSIs with cryptographic function and their applications," Kazuo Takaragi, Takao Arai, Kunihiko Nakada, Hideyuki Hara, Toru YamadaHitachi HyoronVol. 81, No. 10, pp. 21-24, 1999.10.

7)"Information system and cryptographic technology," Kazuo Takaragi, The Journal of The Institute of Electrical Engineers of JapanVol, 112, No. 9, pp. 721-725,1992.9.

8)「Cryptography method and application」、Kazuo TakaragiTsutomu NakamuraIPSJ MagazineVol. 1, No. 4, pp. 714-733,1991.6.

9)"Trend of authentication technology in transactions using computer networks," Ryoichi Sasaki, Kazuo Takaragi, IEICE Journal,Vol. 71, No. 12, pp. 1285-1287, 1988.12.

10)"Security Techniques for Financial Systems," Kazuo Takaragi, Ryoichi Sasaki, Makoto Okumura, Hitachi Hyoron, Vol. 70, N0. 3, pp. 103-108, 1988.3.

11)"Network security technology," Kazuo Takaragi, Ryoichi Sasaki, Yu Miura, Makoto Okumura, Hitachi Hyoron, Vol. 69, No. 9, pp. 67-74 1987.9.

12)"Challenges remaining in RFID," Kazuo Takaragi, RSA Conference, 2004.6.

 

4.International Conference Committee Activity

1)The Fourth Resilience and IT-Risk in Social Infrastructures (RISI 20132015) PC

2)25th IFIP International Information Security Conference Security & Privacy (SEC-2010) PC

3)IFIP World Computer Congress 2010 (WCC 2010) PC

4)The 4th International Workshop on Security (IWSEC2009) General Co-Chair

 

5.Award

1)" CYBER 2018 Best Paper Award," Katsuyuki Umezawa, Yusuke Mishina, Sven Wohlgemuth, Kazuo Takaragi, 2018.

2)"Kanto Region Invention Awards - Incentive Awards Prize," Dai Watanabe, Soichi Furuya, Kazuo Takaragi, 2013.

3)"IPSJ Standardization Achievement Award," Kazuo Takaragi, 2011.

4)" METI Industrial Standardization Project Contributors Award, Kazuo Takaragi, 2010.

5)"IEICE Engineering Sciences Society - Achievement Award," Kazuo Takaragi, 2010.

6)" Top 100 inventors of Hitachi," Kazuo Takaragi, 2009.

7)"IPSJ Standardization Contribution Award," Kazuo Takaragi, 2007.

8)" IPSJ Best Paper Award," Ryoichi Sasaki, Kazuo Takaragi, 2002.

9)" Kanto Region Invention Awards - Incentive Awards Prize," Kazuo Takaragi, Ryoichi Sasaki, Fusao Nakagawa, 2002.

10)"IEEJ Book of the Year Award," Ryoichi Sasaki, Kazuo Takaragi, Taketoshi Sakuraba, Masato Terada, Nariyasu Hamada, 1998.

 

. Journal

 a.English, Peer reviewed, First author

1)"An Ultra Small Individual Recognition Security Chip", Kazuo Takaragi, Mitsuo Usami, Ryo Imura, Rei Itsuki, Tsuneo Satoh, IEEE MICRO, November– December 2001, pp 43-49, 2001.12.

2)"System LSIs with Cryptographic Functions and Their Applications," Kazuo Takaragi, Kunihiko Nakada, Tooru Yamada, Takao Arai, Hideyuki Hara, Hitachi Review Vol. 48, No. 6, pp. 323-327, 1999

3)"On Differential Cryptanalysis", K. Takaragi, K. Hashimoto and T. Nakamura, IEICE Transactions, Vol. E 74, No. 8, pp. 2153-2159, 1991.8

4)"An Algorithm for Obtaining Simplified Prime Implicant Sets in Fault Tree and Event Tree Analysis", K. Takaragi, R. Sasaki and S. Shingai, IEEE Transaction on Reliability, Vol. R-32, No. 4, pp. 386-392, 1983.10.

5)"A Method for Rapid Markov Reliability Calculation", K. Takaragi, R. Sasaki, S. Shingai, IEEE Transaction on Reliability, Vol. R-34, No. 3, pp. 262-268, 1985.8

6)"An Probability Bound Estimation Method in Markov Reliability Analysis", K. Takaragi, R. Sasaki, S. Shingai, IEEE Transaction on Reliability, Vol. R-34, No. 3, pp. 257-261, 1985.8

7)"An Improved Moment-Matching Algorithm for Evaluating Top-Event Probability Bounds", K. Takaragi, R. Sasaki, S. Shingai,IEEE Transaction on Reliability, Vol. R-32, No. 4, pp. 386-392, 1983.10

 

b.English, Peer reviewed, Co-author

1)"Privacy-Enhancing Trust Infrastructure for Process Mining," Sven Wohlgemuth, Kazuo Takaragi, IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, Special Section on Cryptography and Information Security, E101.A.149, pp. 149-156, 2018.

2)"Verifying a signature architecture: a comparative case study," David Basin, Hironobu Kuruma, Kunihiko Miyazaki, Kazuo Takaragi, Burkhart Wolff, Formal Aspects of Computing (2007) 19: 63–91, 2007.

3)"A Formal Analysis of a Digital Signature Architecture," David Basin, Kunihiko Miyazaki, Kazuo Takaragi, Integrity and Internal Control in Information Systems VI pp 31-47, 2004.

4)"A New Keystream Generator MUGI," Dai Watanabe, Soichi Furuya, Hirotaka Yoshida, Kazuo Takaragi, Bart Preneel, IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences   Vol.E87-A   No.1   pp.37-45, 2003.1.

5)"Integrity-Aware Mode of Stream Cipher," Soichi Furuya, Dai Watanabe, Yoichi Seto, Kazuo Takaragi, IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences   Vol.E85-A   No.1   pp.58-65, 2002.1.

6)"A Threshold Digital Signature Scheme for a Smart Card Based System," Kunihiko Miyazaki, Kazuo Takaragi, IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences   Vol.E84-A   No.1   pp.205-213, 2001.1.

7)"A Threshold Digital Signature Scheme for a Smart Card Based System", K. Miyazaki, K. Takaragi, IEICE Transactions, Vol. E84-A, No. 1, pp. 205-213, 2001.1.

8)"A lightweight Encryption Method Suitable for Copyright Protection", M. Aikawa, K. Takaragi, S. Furuya and M. Sasamoto

, IEEE Transactions on Consumer Electronics, Vol. 44, No. 3, pp.902-910, 1998.8.

9)"Group Cipher System for Intranet Security", H. Ito, S. Susaki, M. Arai, M. Koizumi and K. Takaragi, IEICE Transactions, Vol. E81 A, No. 1, pp. 28-34, 1998.1.

 

c.Japanese, Peer reviewed, First author

1)"Hitachi's Cryptographic Technologies Focusing on Public Key Cryptosystem," Kazuo Takaragi, Mototsugu Nishioka, Hitachi Hyoron, Vol.88, No.07, 592-593, pp 74-79, 2006.7.

2)"Improvement of Rabin Type Public Key Cipher Algorithm for Authentication," Kazuo Takaragi, Ryoichi Sasaki, IEICE Journal D-I, Vol. J73-D-I, No. 3, pp. 350-3571990.3.

3)"A Method of Risk Analysis for Computer Systems," Kazuo Takaragi, Ryoichi Sasaki, Yasuhiko

Nagai, Transaction on IEEJ, Vol. 108-C, No. 4, pp. 260-267, 1988.4.

4)"Authentication method for electronic contracts with IC card key management," Kazuo Takaragi,  Takayoshi Shiraishi, Ryoichi Sasaki, Transaction on IEEJ, Vol 107-C, No. 1, pp. 46-531987.1.

5)"An Estimation Method of System Failure Frequency using Both Structure and Component Failure Data," Kazuo Takaragi, Ryoichi Sasaki, Sadanori Shingai, Kenji Tominaga, Transaction on Vol. 101-C, No. 8, pp.185-192.1981.8.

 

d.Japanese, Peer reviewed, Co-author

1)"A Formal Analysis of a Digital Signature System," Kunihiko MIYAZAKI, David BASIN, Hironobu KURUMA, Kazuo TAKARAGI, Satoru TEZUKA, JSSST, Computer Software, Vol.22, No.2, pp.74-84, 2005.4

2)"Analysis on History and Similarity of Seal and Electronic Sea," Ryoichi Sasaki, Kazuo Takaragi, IPSJ Journal, Vol. 42, No. 8, pp. 1968-19742001.8.

3)"RSA cryptographic key high-speed generation method," Yasuko Goto, Kazuo Takaragi, Ryoichi Sasaki, Transaction on IEICE, D-I, Vol. J72-D-I, No. 3, pp. 213-2201989.3.

4)"Extensions of Mao & Wallingford's Method of Discrete Optimization," Ryoichi Sasaki, Sadanori Shingai, Kazuo Takaragi, Transaction on IEEJ, Vol. 100-C, No. 5, pp. 167-1731980.5.

 

e.Proceedings, Peer reviewed, First Author

1)"A Practical and Fair Protocol for Signing Contract", K. Takaragi, T. Shiraishi and R. Sasaki, Proceedings of International Symposium in Information Theory, October 1986.

2)"A New Phased Mission Method and Its Application to FBR Shutdown Heat Removal Systems", K. Takaragi, R. Sasaki and S. Shingai, Proceedings of American Nuclear Society/European Nuclear Society Probabilistic Risk Analysis Topical Meeting, Vol. III, USA, pp. 1267-1276, 1981.9.

3)"A Technique for Analyzing Common Cause Failure in Subsystems", K. Takaragi, K. Tominaga, R. Sasaki and S. Shingai, Proceedings of American Nuclear Society Annual Meeting, pp. 298-299, 1979.6.

 

f.Proceedings, Peer reviewed, Co-author

1)"Competitive Compliance with Blockchain," Sven Wohlgemuth, Katsuyuki Umezawa, Yusuke Mishina and Kazuo Takaragi,PerCom 2019 Workshop SPT-IOT, 2019.3.

2)"Threat Analysis using Vulnerability Databases – Matching Attack Cases and Vulnerability Database by Topic Model Analysis –," Katsuyuki Umezawa, Yusuke Mishinay, Sven Wohlgemuthz and Kazuo Takaragi, CYBER 2018, 2018.11.

3)"A Method of Threat Analysis for Cyber-Physical System using Vulnerability Databases," Yusuke Mishina, Kazuo Takaragi, Katsuyuki Umezawa, the 18th Annual IEEE Symposium on Technologies for Homeland Security, 2018.10.

4)"Privacy with Secondary Use of Personal Information," Sven Wohlgemuth, Kazuo Takaragi, Isao Echizen, MKWI 2016.

5)"A Toolset for Usable Security with ICT Service Networks," Sven Wohlgemuth, Kazuo Takaragi, The 11th International Workshop on Security (IWSEC) 2016.

6)"Verification of a Signature Architecture with HOL-Z", David A. Basin, Hironobu Kuruma, Kazuo Takaragi, Burkhart Wolff, FM, pp. 269-285, 2005.

7)Dai Watanabe, Soichi Furuya, Hirotaka Yoshida, Kazuo Takaragi, Bart Preneel, "A New Keystream Generator MUGI," FSE 2002, pp.179-194, 2002.

8)"Generalized Powering Functions and Their Application to Digital Signatures", Hisayoshi Sato,

Tsuyoshi Takagi, Satoru Tezuka, Kazuo Takaragi, ASIACRYPT, pp. 434-451, 2003.

9)"Legally Authorized and Unauthorized Digital Evidence", Hiroshi Yoshiura, Kunihiko Miyazaki, Shinji Itoh, Kazuo Takaragi, Ryoichi Sasaki, Security Protocols Workshop, pp. 67-73, 2002.

10)"A New Keystream Generator MUGI", Dai Watanabe, Soichi Furuya, Hirotaka Yoshida, Kazuo Takaragi, Bart Preneel, Proceedings of 9th International Workshop, FSE 2002, Leuven, Belgium, pp. 179-194, 2002.2.

11)"Observations on Hierocrypt-3/L1 Key-scheduling Algorithms", Soichi Furuya, Hirotaka Yoshida, Dai Watanabe, Yoichi Seto, Kazuo Takaragi, 2nd NESSIE Workshop, Sep.2001.

12)"A Multi-OS Approach to Trusted Computer Systems", Hiroshi Yoshiura, Kunihiko Miyazaki, Shinji Itoh, Kazuo Takaragi, Ryoichi Sasaki, Security Protocols Workshop, pp. 107-114, 2001.

13)Hiroshi Yoshiura, Ryoichi Sasaki, Kazuo Takaragi, "Secure Fingerprinting Using Public-Key Cryptography," International Workshop on Security Protocols, pp 83-89, 1998.

14)"Application of Probabilistic Safety Assessment Method to Evaluate the Effect of Test and Inspection on Nuclear Power Plant", K. Seki, K. Kumasaka, S. Itooka, K. Takaragi, SMiRT 11 Transactions Vol. G, Tokyo, Japan, pp. 381-386, 1991.8.

1)"Development of Computer Program to Assist Event Tree Analysis", R. Sasaki, K. Tominaga, K. Takaragi, S. Shingai, Proceedings of American Nuclear Society Annual Meeting, pp. 294-295, 1979.

 

7.Oral presentation, Poster presentation

a.English

None.

 

b.Japanese

) "Technical issues and direction of research on virtual currency and block chain", Kazuo Takagi, International Trade Law Society and UNCITRAL co-sponsored symposium "UNCITRAL model method and virtual currency and block chain", 2019.3.

) "The threat analysis method using vulnerability database-About utilization of topic model and reuse of past analysis results-", Katsuyuki Umezawa, Yusuke Sanshin, Sven Wohlgemuth, Kazuo Takaragi, Symposium on Cryptography and Information Security (SCIS 2019 ), 2019.1.

) "Blockchain and IoT", Kazuo Takagi, Japan Measurement Instruments Association Conference, 2018.9.

4)"A Proposal of Threat Analyses using Vulnerability Databases," Katsuyuki Umezawa, Yusuke Mishina, Kenji Taguchi, Kazuo Takaragi, 2018 Symposium on Cryptography and Information Security2018.1.

5)"Standards / guidelines and measures to promote security technology," Kazuo Takaragi, Hitoshi Ohsaki, Yusuke Mishina, Kenichi Handa, Hirofumi Sakane, AIST Information Technology and Human Factors Department Symposium - IoT and security - 2017 – Security of Connected Industry, 2017.12.

6)"Standards / guidelines and measures to promote security technology," Kazuo Takaragi, NEDO SIP Symposium on Securing Cyber Security in Critical Infrastructure, 2017.10.

7)"A consideration of a block chain that enables effective utilization of personal information," Kazuo Takaragi, Waseda University Academic Forum, the future that block chains open up, 2017.5.

8)"Conformity check method to encourage social implementation of research and development technology," Kazuo Takaragi, NEDO SIP Symposium on Securing Cyber Security in Critical Infrastructure, 2016.11.

9)"Design of certification system of cyber security in critical infrastructure etc," Kazuo Takaragi, Hitoshi Ohsaki, Hirofumi Sakane, Kenichi Handa, Kenji Taguchi, Daisuke Souma, AIST Information Technology and Human Factors Department Symposium - IoT and security - , 2016.3.

10)"Biometrics application status and issues," Kazuo Takaragi, AIST Technical Exchange Salon, AIST Chugoku Center2014.11.

11)"Biometrics · Security", Takeshi Ohki, Rei Otsuka, Asahiko Yamada, Kazuo Takaragi, AIST 2nd Secure Systems Symposium, 2014.3.

12)"Privacy-preserving database search technology", Goichiro Hanaoka, Kazuo Takaragi, AIST open lab, AISTech talk, 2013.10.

13)"A Survey on Biometric Presentation Attack and It’s Security Evaluation

Method," Tetsushi Ohki, Akira Otsuka, Kazuo Takaragi, Proceedings of Biometrics Workshop, Biox2013-16, pp. 59-63, 2013.8

14)"Information risk and management", Kazuo Takaragi, a forum for science of risk, Science Council of Japan2012.9

15)"Expectations from enterprise to mathematical association - from cryptographic development site", Kazuo Takaragi, Opening Ceremony of Institute of Mathematics for Industry, Kyushu University, 2011.4.

 

8.Industrial Property

a.International (Priority date)]

1)"Unique code generating apparatus, method, program and recording medium," Masahiro Mimura, Kenta Takahashi, Kazuo Takaragi, Masakatsu Nishigaki, Yoichi Shibata, US7447339B2, 2003-10-17.

2)"Time stamp generating system," Kunihiko Miyazaki, Seiichi Susaki, Kazuo Takaragi, Hiroshi Yoshiura, Takeshi Matsuki, Hisashi Toyoshima,Mitsuru Iwamura, Tsutomu Matsumoto, Ryoichi Sasaki, US7200682B2, 2002-05-08.

3)"RFID tag, and RFID tag-related determining device and method, and management system and method," Masaru Ohki, Hideki Tokuyama, Rei Itsuki, Shojiro Asai, Kazuo Takaragi, Atsushi Tanaka, US7173515B2, 2002-03-07.

4)"Handling support method and handling support system," Hajime Morito, Yasuko Fukuzawa, Kazuo Takaragi, Shojiro Asai, US7138915B2, 2001-11-30.

5)"Trusted computer system," Kunihiko Miyazaki, Shinji Itoh, Hiroshi Yoshiura, Kazuo Takaragi, Masato Arai, Toshiaki Arai, Takeshi Matsuki, Hisashi Toyoshima, US7210043B2, 2001-04-24.

6)"Pseudorandom number generating apparatus or encryption or decryption apparatus using the same," Dai Watanabe, Soichi Furuya, Kazuo Takaragi, US7280659B2, 2001-01-23.

7)Kunihiko Miyazaki, Ryoichi Sasaki, Kazuo Takaragi, Seiichi Susaki, Hisanori Mishima, Takeshi Matsuki, Kunihito Takeuchi, Mitsuru Iwamura, Tsutomu Matsumoto, "Digital signature generating method and digital signature verifying method," US6816969B2, 2000-12-07.

8)"Database integration management method and apparatus and processing program, medium therefor," Chikashi Okamoto, Kazuo Takaragi, Yasuko Fukuzawa, Hideki Tokuyama, Mitsuo Usami, US6922686B2, 2000-11-02.

9)"Database integration management method and apparatus and processing program, medium therefor," Chikashi Okamoto, Kazuo Takaragi, Yasuko Fukuzawa, Hideki Tokuyama, Mitsuo Usami, US7333972B2, 2000-11-02.

10)"Identification code management method and management system," Chikashi Okamoto, Kazuo Takaragi, Yasuko Fukuzawa, US6934842B2, 2000-07-06.

11)"Identification code management method and management system," Chikashi Okamoto, Kazuo Takaragi, Yasuko Fukuzawa, US7178026B2, 2000-07-06.

12)Soichi Furuya, Kazuo Takaragi, Hiroyuki Kurumatani, Masashi Takahashi, Kunihiko Miyazaki, Hisayoshi Sato, Dai Watanabe, "Method and apparatus for symmetric-key encryption," US7110545B2, 2000-03-09.

13)Soichi Furuya, Kazuo Takaragi, Hiroyuki Kurumatani, Masashi Takahashi, Kunihiko Miyazaki, Hisayoshi Sato, Dai Watanabe, "Method and apparatus for symmetric-key decryption," US7359515B2, 2000-03-09.

14)"Method and system for recovering the validity of cryptographically signed digital data," Kunihiko Miyazaki, Hiroshi Yoshiura, Seiichi Susaki, Ryoichi Sasaki, Kazuo Takaragi, Hisashi Toyoshima, Takeshi Matsuki, US7694126B2, 1999-10-22.

15)"Method and system for recovering the validity of cryptographically signed digital data," Kunihiko Miyazaki, Hiroshi Yoshiura, Seiichi Susaki, Ryoichi Sasaki, Kazuo Takaragi, Hisashi Toyoshima, Takeshi Matsuki, US7134021B2, 1999-10-22.

16)"Digital signing method," Kunihiko Miyazaki, Ryoichi Sasaki, Kazuo Takaragi, Seiichi Susaki, Toshiyuki Moritsu, Mizuhiro Sakai, Mitsuru Iwamura, Tsutomu Matsumoto, US7305558B1, 1999-10-22.

17)"Digital signing method," Kunihiko Miyazaki, Ryoichi Sasaki, Kazuo Takaragi, Seiichi Susaki, Toshiyuki Moritsu, Mizuhiro Sakai, Mitsuru Iwamura, Tsutomu Matsumoto, US7770009B2, 1999-10-22.

18)"Processing apparatus, program, or system of secret information," Kunihiko Miyazaki, Kazuo Takaragi, Yasuko Fukuzawa, US6873706B1, 1999-09-29.

19)"Control system and method of controlling information written into storage media," Kazuo Takaragi, Chikashi Okamoto, US6592032B1, 1999-08-27.

20)"Terminal for use in a system interfacing with storage media," Kazuo Takaragi, Chikashi Okamoto, US7089388B1, 1999-08-27.

21)Kazuo Takaragi, Chikashi Okamoto, "Terminal for use in a system interfacing with storage media," US7330949B2, 1999-08-27.

22)"Semiconductor devices," Mitsuo Usami, Kazutaka Tsuji,Takeshi Saito, Akira Sato, Kenji Sameshima, Kazuo Takaragi, Chizuko Yasunobu, US7061083B1, 1998-12-17.

23)"Method of checking authenticity of sheet with built-in electronic circuit chip," Chikashi Okamoto, Kazuo Takaragi, Kazutaka Tsuji, Mitsuo Usami, Chizuko Yasunobu, Asahiko Isobe, Yasuhiro Tsunemi, Hiroyuki Yagi, US7007854B2, 1998-12-07.

24)"Method of checking authenticity of sheet with built-in electronic circuit chip," Chikashi Okamoto, Kazuo Takaragi, Kazutaka Tsuji, Mitsuo Usami, Chizuko Yasunobu, Asahiko Isobe, Yasuhiro Tsunemi, Hiroyuki Yagi,US7309019B2, 1998-12-07.

25)"Method for mounting electronic circuit chip," Chikashi Okamoto, Kazuo Takaragi, Kazutaka Tsuji, Mitsuo Usami, Chizuko Yasunobu, Asahiko Sobe, Yasuhiro Tsunemi, Hiroyuki Yagi, US6731509B1, 1998-11-30.

26)"Method of checking authenticity of sheet with built-in electronic circuit chip," Chikashi Okamoto, Kazuo Takaragi, Kazutaka Tsuji, Mitsuo Usami, Chizuko Yasunobu, Asahiko Isobe, Yasuhiro Tsunemi, Hiroyuki Yagi, US6659353B1, 1998-07-12.

27)"Encrypting conversion apparatus, decrypting conversion apparatus, cryptographic communication system, and electronic toll collection apparatus," Makoto Aikawa, Shigeru Hirahata, Kazuo Takaragi, Yoshimichi Kudo,US20030026430A1, 1998-05-29.

28)"Encrypting conversion apparatus, decrypting conversion apparatus, cryptographic communication system, and electronic toll collection apparatus," Makoto Aikawa, Shigeru Hirahata, Kazuo Takaragi, Yoshimichi Kudo, US6683956B1, 1998-05-29.

29)"Network system using a threshold secret sharing method," Seiji Miyazaki, Kazuo Takaragi, US6477254B1, 1998-02-13..

30)"IC card equipped with elliptical curve encryption processing facility," Seiji Miyazaki, Kazuo Takaragi, US6466668B1, 1998-01-28

31)"IC card equipped with elliptic curve encryption processing facility," Seiji Miyazaki, Kazuo Takaragi , US6714648B2, 1998-01-28.

32)"Data encrypting/decrypting conversion methods and apparatuses and data communication system adopting the same," Makoto Aikawa, Kazuo Takaragi, Hiroyuki Koreeda, Manabu Sasamoto, Hiroo Okamoto, Takaharu Noguchi, Soichi Furuya, Shigeru Hirahata, US6606385B1, 1997-08-07.

33)"Data encrypting/decrypting conversion methods and apparatuses and data communication system adopting the same," Makoto Aikawa, Kazuo Takaragi, Hiroyuki Koreeda, Manabu Sasamoto, Hiroo Okamoto, Takaharu Noguchi, Soichi Furuya, Shigeru Hirahata, US20010014154A1, 1997-08-07.

34)"Digital data authentication method," Hiroshi YoshiuraKazuo Takaragi, Ryoichi Sasaki, Seiichi Susaki, Hisashi Toyoshima, Tsukasa Saito, US6499105B1, 1997-06-05.

35)"Key recovery method and system," Kazuo Takaragi, Hiroyuki Kurumatani, US6236729B1, 1997-06-06.

36)"Digital data authentication method," Hiroshi Yoshiura, Kazuo Takaragi, Ryoichi Sasaki, Seiichi Susaki, Hisashi Toyoshima, Tsukasa Saito, US6131162A, 1997-06-05.

37)"Encrypted data recovery method using split storage key and system thereof," Eiji Okamoto, Masahiro Mambo, Seiichi Domyo, Hiroyoshi Tsuchiya, Tooru Kawai, Kazuo Takaragi, Naoya Torii, Takeshi Tanida, US6118874A, 1997-03-31.

38)"Method and apparatus for generating hash value," Kazuo Takaragi, Hiroyuki Kurumatani, US6141421A , 1996-12-10.

39)"Hash value generating method and device, data encryption method and device, data decryption method and device," Kazuo Takaragi, Hiroyuki Kurumatani, US6370247B1, 1996-12-10.

40)"Hash value generating method and device, data encryption method and device, data decryption method and device," Kazuo Takaragi, Hiroyuki Kurumatani, US6122375A, 1996-12-10.

41)"Digital signature generating/verifying method and system using public key encryption," Kazuo Takaragi, Hiroyuki Kurumatani, US6341349B1, 1996-10-31.

42)"Method and device for managing computer network," Kazuo Takaragi, Seiichi Domyo, Hiroshi Yoshiura, US6311277B1, 1996-03-22.

43)"Method and a device for managing a computer network," Kazuo Takaragi, Seiichi Domyo, Hiroshi Yoshiura, US7139759B2, 1996-03-22.

44)"Method and apparatus for encrypting data," Hiroshi Yoshiura, Kazuo Takaragi, Mayuko Shimizu, US6157720A, 1996-02-28.

45)"Method and apparatus for encrypting data," Hiroshi Yoshiura, Kazuo Takaragi, Mayuko Shimizu, US6504931B1, 1996-02-28.

46)"Data compression/encryption method and system," Hiroshi Yoshiura, Kazuo Takaragi, Yusuke Hino, Yutaka Otsu, US6122378A, 1995-09-13.

47)"Cryptographic communication system," Hikari Namba, Kazuo Takaragi, Satoshi Miyazaki, US5966448A, 1995-08-30.

48)"Electronic document processing system and method of forming digital signature," Hiroshi Matsumoto, Kazuo Takaragi, Seiichi Susaki, Hiroyuki Maezawa, Shinobu Koizumi, US5465299A, 1992-12-03.

49)"Group cipher communication method and group cipher communication system," Kazuo Takaragi, Seiichi Susaki, Hiroshi Matsumoto, Tsutomu Nakamura, US5309516A, 1990-12-07.

50)"Encipher method and decipher method," Hiroshi Matsumoto, Kazuo Takaragi, Yasuko Fukuzawa, US5218638A, 1990-12-07.

51)"Limited broadcast system," Hiroshi Matsumoto, Kazuo Takaragi, Yasuko Fukuzawa, US5351294A, 1990-12-07.

52)"Cryptographic method and apparatus," Kazuo Takaragi, Tsutomu Nakamura, Masahiro Yamashita, Kazuo Hashimoto, Hiroshi Matsumoto, US5222139A, 1990-11-02.

53)"File encryption method and file cryptographic system," Masafumi Nozawa, Akinobu Shimada, Toshifumi Nishimura, Katsuharu Kakuse, Tokuhiro Tsukiyama, Kiyoshi Yata, Yasuhiro Ishii, Kazuo Takaragi, Yasushi Kuba, Fujio Fujita, US5235641A, 1990-03-13.

54)"Cryptographic communication method and system," Kazuo Takaragi, Yasuhiro Ishii, Tsutomu Nakamura, US5144665A, 1990-02-21.

55)"Secret information service system and method," Kazuo Takaragi, Ryoichi Sasaki, Tsutomu Nakamura, Minoru Koizumi, Yasuko Fukuzawa, Kenji Kataoka, US5117458A, 1989-11-01.

56)"Automatic trading method and apparatus," Kazuaki Tanaka, Takeshi Matsuki, Kazuo Takaragi, US5315634A, 1989-09-04.

57)"System and method for performing interlocution at a plurality of terminals connected to communication network," Yoshiyuki Nakayama, Kenjiro Mori, Kazuo Takaragi, Singi Domen,US5280583A, 1988-05-13.

58)"Encipher method and decipher method," Kazuo Takaragi, Fusao Nakagawa, Ryoichi Sasaki, US5103479A, 1988-04-28.

59)"Encipher method and decipher method," Kazuo Takaragi, Fusao Nakagawa, Ryoichi Sasaki, US4982429A, 1988-04-28.

60)"Encrypting system of data," Kazuo Takaragi, Fusao Nakagawa, Yasuhiko Nagai, Ryoichi Sasaki, US4969190A, 1988-04-13.

61)"IC card," Kazuo Takaragi, Takayoshi Shiraishi, Ryoichi Sasaki, US4885788A, 1986-02-17.

62)"Method for electronic transaction with digital signature," Kazuo Takaragi, Ryoichi Sasaki, US5018196A, 1985-09-04.

63)"Electronic transaction system," Kazuo Takaragi, Ryoichi Sasaki, Takayoshi Shiraishi, Nobuhiro Kurashiki, US4885777A, 1985-09-04.

 

c.Japan Domestic

NA