@@@@@@@@@@@@@@@@@@     @@@@@@@@@@@@@@@@@@@@@@[JAPANESE] /ENGLISH

 

@@@@@@@@@      @@@@@@@ @@@@@@    @@          @@@April 1, 2015

 

@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@

National Institute of Advanced Industrial Science and Technology (AIST)

Deputy Director, Information Technology Research Institute (ITRI)

 

Kazuo Takaragi, Dr. Eng.

 

 

Biography

 

Kazuo Takaragi obtained BS and MS degree from  Kyushu Institute of

Technology and Tokyo Institute of Technology in 1975 and 1977 respectively.  In

1977, he joined Hitachi, Ltd. At Systems Development Laboratory in Hitachi, he

engaged in the research and development of system safety and security. In 1886,

Dr. Takaragi obtained a doctor degree in safety engineering from the University of

Tokyo. During the fall semester in 2007, he served as a visiting professor for

Freiburg University in Germany.  In 2011, he became the senior chief scientist at

Yokohama Laboratory, Hitahci, Ltd.  In 2012, he joined National Institute of

Advanced Industrial Science and Technology (AIST), Japan.  Currently, he is a

deputy director of Information Technology Research Institute (ITRI) in AIST.  He

also serves as a cooperation member of Science Council of Japan, guest professor

of Chuo University, a part time lecturer of Keio University and so on.  He wrote

books such asgInformation Security,h Kindai Kagaku Sha Co.,Ltd.,

"Firewall," Shokodo Co. Ltd., and "Internet Security," Ohmusha, Ltd., all in

Japanese.

 

 

Publications

 

1998

1)  H. Ito, S. Susaki, M. Arai, M. Koizumi and K. Takaragi, "Group Cipher

   System for Intranet Security", IEICE Transactions, Vol. E81 A, No. 1, pp.

   28-34, 1998.1

2)  Hiroshi Yoshiura, Ryôichi Sasaki, Kazuo Takaragi: Secure Fingerprinting

   Using Public-Key Cryptography (Position Paper). Security Protocols Workshop

   1998: 83-89

3)   M. Aikawa, K. Takaragi, S. Furuya and M. Sasamoto, "A Lightweight

   Encryption Method Suitable for Copyright Protection", IEEE Transactions on

   Consumer Electronics, Vol. 44, No. 3, pp.902-910, 1998.8

 

2001

4)  K. Miyazaki and K. Takaragi, "A Threshold Digital Signature Scheme for a

   Smart Card Based System",

   IEICE Transactions, Vol. E84-A, No. 1, pp. 205-213, 2001.1

5)  Kazuo Takaragi, Mitsuo Usami, Ryo Imura, Rei Itsuki, Tsuneo Satoh: An

   Ultra Small Individual Recognition Security Chip. IEEE Micro 21(6): 43-49,

   2001.

6)    Hiroshi Yoshiura, Kunihiko Miyazaki, Shinji Itoh, Kazuo Takaragi and

   Ryoichi Sasaki, "A Multi-OS Approach to Trusted Computer Systems",

   Security Protocols Workshop, pp. 107-114, 2001.

7)  Soichi Furuya, Hirotaka Yoshida, Dai Watanabe, Yoichi Seto and Kazuo

   Takaragi, "Observations on Hierocrypt-3/L1 Key-scheduling Algorithms", 2nd

   NESSIE Workshop, Sep. 2001.

 

2002

8)  S. Furuya, D. Watanabe, Y. Seto and K. Takaragi, IEICE Transactions,

   "Integrity-Aware Mode of Stream Cipher", Vol. E85-A, No. 1, pp. 58-65, 2002.1

9)   Hiroshi Yoshiura, Kunihiko Miyazaki, Shinji Itoh, Kazuo Takaragi, Ryôichi

   Sasaki: Legally Authorized and Unauthorized Digital Evidence. Security

   Protocols Workshop 2002: 67-73

10) Dai Watanabe, Soichi Furuya, Hirotaka Yoshida, Kazuo Takaragi, Bart

   Preneel: A New Keystream Generator MUGI. FSE 2002: 179-194

 

2003

11) Hisayoshi Sato, Tsuyoshi Takagi, Satoru Tezuka and Kazuo Takaragi,

   "Generalized Powering Functions and Their Application to Digital Signatures",

   ASIACRYPT, pp. 434-451, 2003

 

2004

12) Dai Watanabe, Soichi Furuya, Hirotaka Yoshida, Kazuo Takaragi, Bart

   Preneel: A New Keystream Generator MUGI. IEICE Transactions 87-A(1):

   37-45 (2004)

 

2005

13) David A. Basin, Hironobu Kuruma, Kazuo Takaragi and Burkhart Wolff,

   "Verification of a Signature Architecture with HOL-Z", FM, pp. 269-285, 2005.

   2006

14) Hisayoshi Sato, Tsuyoshi Takagi, Satoru Tezuka, Kazuo Takaragi:

   Generalized Powering Functions and Their Application to Digital Signatures.

   IEICE Transactions 89-A(1): 81-89 (2006)

15)    K. Takaragi, "Security Technology for Ubiquitous Information Society",

   Keynote Presentation at ETRICS, 2006.6

 

2007

16) David A. Basin, Hironobu Kuruma, Kunihiko Miyazaki, Kazuo Takaragi,

   Burkhart Wolff, gVerifying a signature architecture: a comparative case study,h

   Formal Asp. Comput. 19(1): 63-91 (2007)

17)    K. Takaragi, "Security Techniques for Next Generation Cancelable bio and

   post quantum", ZISC Information Security Colloquium, 2007.12

 

2009

18) K. Takaragi, "IT Technology for Safe & Secure Society in the Asian Region",

   Keynote Speech 7th AFIT, 2009.2

 

2010

19jK. Takaragi, "IT Technology for Safe and Secure Society in Japan: Towards

   Cyber Physical Solution", International Conference on Cyber Security, 2010.8

 

2013

20) K. Takaragi, "Information Technology for a Safe and Secure Society in Japan",

   Advances in Cyber Security, Fordham University Press, New York, pp.

   207-216, 2013.

21) K. Takaragi, gRoad of IT security standard  - From cryptography to cloud and

   M2M security -,g IEICE ESS Fundamentals Review Vol. 7, No. 1, pp. 51-59,

   2013.7

 

2014

22) K. Takaragi,gNew Object for Information Security,h Japan Society of Security

   Management, Vol. 28, No. 1, pp. 36-43, 2014-05

23) K. Takaragi, gSecurity of Olympic,h IPSJ Magazine gJoho Shori,h Vol.55,

   No.11, pp1196-1203, 2014.11

 

 

Committee Activities

 

E@The 4th International Workshop on Security (IWSEC2009) General co-Chair

E      25th IFIP International Information Security Conference Security & Privacy

(SEC-2010) PC

E@IFIP World Computer Congress 2010 (WCC 2010) PC

E@The Fourth Resilience and IT-Risk in Social Infrastructures (RISI 2013) PC

E@The Fourth Resilience and IT-Risk in Social Infrastructures (RISI 2014) PC

E@The Fifth Resilience and IT-Risk in Social Infrastructures (RISI 2015) PC