Tetsuya Izu

866 total citations
29 papers, 72 citations indexed

About

Tetsuya Izu is a scholar working on Artificial Intelligence, Information Systems and Computer Vision and Pattern Recognition. According to data from OpenAlex, Tetsuya Izu has authored 29 papers receiving a total of 72 indexed citations (citations by other indexed papers that have themselves been cited), including 22 papers in Artificial Intelligence, 17 papers in Information Systems and 5 papers in Computer Vision and Pattern Recognition. Recurrent topics in Tetsuya Izu's work include Cryptography and Data Security (16 papers), Coding theory and cryptography (13 papers) and Cryptography and Residue Arithmetic (12 papers). Tetsuya Izu is often cited by papers focused on Cryptography and Data Security (16 papers), Coding theory and cryptography (13 papers) and Cryptography and Residue Arithmetic (12 papers). Tetsuya Izu collaborates with scholars based in Japan, United Kingdom and China. Tetsuya Izu's co-authors include Takeshi Shimoyama, Noboru Kunihiro, Jun Kogure, Tsuyoshi Takagi, Masahiko Takenaka, Masaya Yasuda, Takeshi Koshiba, Kazuo Ohta, Takashi Yoshioka and Naoya Torii and has published in prestigious journals such as Lecture notes in computer science, Designs Codes and Cryptography and IEICE Transactions on Fundamentals of Electronics Communications and Computer Sciences.

In The Last Decade

Tetsuya Izu

22 papers receiving 67 citations

Peers — A (Enhanced Table)

Peers by citation overlap · career bar shows stage (early→late) cites · hero ref

Name h Career Trend Papers Cites
Tetsuya Izu Japan 5 57 45 13 10 7 29 72
Benjamin Wesolowski France 5 46 0.8× 50 1.1× 16 1.2× 13 1.3× 8 1.1× 8 67
Nadia El Mrabet France 5 91 1.6× 70 1.6× 10 0.8× 17 1.7× 5 0.7× 22 106
M. Murphy United States 2 34 0.6× 27 0.6× 19 1.5× 13 1.3× 6 0.9× 2 56
Andrew Regenscheid United States 5 54 0.9× 34 0.8× 24 1.8× 11 1.1× 5 0.7× 8 75
Katsuyuki Okeya Japan 3 33 0.6× 17 0.4× 8 0.6× 14 1.4× 4 0.6× 17 40
Christian Hanser Austria 5 93 1.6× 61 1.4× 26 2.0× 9 0.9× 11 1.6× 14 129
Sven Schäge Germany 5 45 0.8× 27 0.6× 21 1.6× 4 0.4× 5 0.7× 8 52
Yvonne Hitchcock Australia 4 40 0.7× 50 1.1× 37 2.8× 7 0.7× 4 0.6× 9 60
Andreas Pashalidis Belgium 5 42 0.7× 43 1.0× 31 2.4× 9 0.9× 9 1.3× 19 76
Benoît Chevallier-Mames France 2 124 2.2× 90 2.0× 5 0.4× 26 2.6× 4 0.6× 2 133

Countries citing papers authored by Tetsuya Izu

Since Specialization
Citations

This map shows the geographic impact of Tetsuya Izu's research. It shows the number of citations coming from papers published by authors working in each country. You can also color the map by specialization and compare the number of citations received by Tetsuya Izu with the expected number of citations based on a country's size and research output (numbers larger than one mean the country cites Tetsuya Izu more than expected).

Fields of papers citing papers by Tetsuya Izu

Since Specialization
Physical SciencesHealth SciencesLife SciencesSocial Sciences

This network shows the impact of papers produced by Tetsuya Izu. Nodes represent research fields, and links connect fields that are likely to share authors. Colored nodes show fields that tend to cite the papers produced by Tetsuya Izu. The network helps show where Tetsuya Izu may publish in the future.

Co-authorship network of co-authors of Tetsuya Izu

This figure shows the co-authorship network connecting the top 25 collaborators of Tetsuya Izu. A scholar is included among the top collaborators of Tetsuya Izu based on the total number of citations received by their joint publications. Widths of edges represent the number of papers authors have co-authored together. Node borders signify the number of papers an author published with Tetsuya Izu. Tetsuya Izu is excluded from the visualization to improve readability, since they are connected to all nodes in the network.

All Works

20 of 20 papers shown
1.
Suzuki, Tatsuya, et al.. (2021). Detecting Fake QR Codes Using Information from Error-Correction. Journal of Information Processing. 29(0). 548–558. 2 indexed citations
2.
Izu, Tetsuya, et al.. (2014). A Spoofing Attack against a Cancelable Biometric Authentication Scheme. 3 d2 4. 234–239. 3 indexed citations
3.
Kunihiro, Noboru, et al.. (2014). A Unified Framework for Small Secret Exponent Attack on RSA. IEICE Transactions on Fundamentals of Electronics Communications and Computer Sciences. E97.A(6). 1285–1295. 6 indexed citations
4.
Izu, Tetsuya, et al.. (2013). Faster Scalar Multiplication for Elliptic Curve Cryptosystems. 523–527. 1 indexed citations
5.
Izu, Tetsuya, et al.. (2012). Integrity Assurance for Real-Time Video Recording. 3679. 651–655.
6.
Izu, Tetsuya, et al.. (2011). Experimental Analysis of Cheon's Algorithm against Pairing-friendly Curves (特集 人と共存するコンピュータセキュリティ技術). 52(9). 2652–2661.
7.
Izu, Tetsuya, Masahiko Takenaka, & Masaya Yasuda. (2011). Experimental Analysis of Cheon's Algorithm against Pairing-friendly Curves. Journal of Information Processing. 19. 441–450.
8.
Yasuda, Masaya, Tetsuya Izu, Takeshi Shimoyama, & Jun Kogure. (2011). On random walks of Pollard's rho method for the ECDLP on Koblitz curves. Kyushu University Institutional Repository (QIR) (Kyushu University). 3. 107–112. 1 indexed citations
9.
Izu, Tetsuya, et al.. (2011). Small Secret CRT-Exponent Attacks on Takagi's RSA. IEICE Transactions on Fundamentals of Electronics Communications and Computer Sciences. E94-A(1). 19–27. 3 indexed citations
10.
Izu, Tetsuya, Masahiko Takenaka, & Masaya Yasuda. (2010). Experimental Results on Cheon's Algorithm. 32. 625–628. 1 indexed citations
11.
Izu, Tetsuya, et al.. (2009). Yet Another Sanitizable Signature from Bilinear Maps. 2248. 941–946. 2 indexed citations
12.
Izu, Tetsuya, et al.. (2008). An Extension of the Sender Domain Authentication DKIM. 565–568. 1 indexed citations
13.
Nakajima, Tatsuo, et al.. (2008). Reduction Optimal Trinomials for Efficient Software Implementation of the  T Pairing. IEICE Transactions on Fundamentals of Electronics Communications and Computer Sciences. E91-A(9). 2379–2386.
14.
Izu, Tetsuya, et al.. (2007). Reduction Optimal Polynomials over GF(3) with Four Terms. IEICE Technical Report; IEICE Tech. Rep.. 107(346). 27–32. 1 indexed citations
15.
Shimoyama, Takeshi, Tetsuya Izu, & Jun Kogure. (2007). CAIRN3: An FPGA Implementation of the Sieving Step with the Lattice Sieving. IEICE Technical Report; IEICE Tech. Rep.. 107(209). 77–83. 1 indexed citations
16.
Izu, Tetsuya, et al.. (2007). An Extension of Sanitizable and Deletable Signature. IEICE Technical Report; IEICE Tech. Rep.. 2007(141). 147–154.
17.
Izu, Tetsuya, Masahiko Takenaka, & Takeshi Shimoyama. (2007). Analysis on Bleichenbacher's Forgery Attack. 1167–1174. 3 indexed citations
18.
Izu, Tetsuya. (2005). Fast Elliptic Curve Multiplications Resistant against Side Channel Attacks. IEICE Transactions on Fundamentals of Electronics Communications and Computer Sciences. E88-A(1). 161–171. 12 indexed citations
19.
Izu, Tetsuya & Tsuyoshi Takagi. (2003). Exceptional Procedure Attackon Elliptic Curve Cryptosystems. 224–239. 3 indexed citations
20.
Izu, Tetsuya & Tsuyoshi Takagi. (2002). Fast Elliptic Curve Multiplications with SIMD Operations. Lecture notes in computer science. 87(1). 217–230. 4 indexed citations

Rankless uses publication and citation data sourced from OpenAlex, an open and comprehensive bibliographic database. While OpenAlex provides broad and valuable coverage of the global research landscape, it—like all bibliographic datasets—has inherent limitations. These include incomplete records, variations in author disambiguation, differences in journal indexing, and delays in data updates. As a result, some metrics and network relationships displayed in Rankless may not fully capture the entirety of a scholar's output or impact.

Explore authors with similar magnitude of impact

Rankless by CCL
2026