Laboratory of Mathematical Design for Advanced Cryptography

Fingerprint The fingerprint is based on mining the text of the scientific documents related to the associated persons. Based on that an index of weighted terms is created, which defines the key subjects of research unit

Cryptography Engineering & Materials Science
Cryptosystem Mathematics
Attack Mathematics
Encryption Mathematics
Elliptic Curves Mathematics
Public-key Cryptosystem Mathematics
Signcryption Mathematics
Pairing Mathematics

Network Recent external collaboration on country level. Dive into details by clicking on the dots.

Research Output 1997 2018

An efficient key generation of ZHFE public key cryptosystem

Ikematsu, Y., Duong, D. H., Petzoldt, A. & Takagi, T., Jan 1 2018, In : IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences. E101A, 1, p. 29-38 10 p.

Research output: Contribution to journalArticle

Public-key Cryptosystem
Cryptography
Linear algebra
Cryptosystem
Encryption
1 Citations

An experimental study of Kannan’s embedding technique for the search LWE problem

Wang, Y., Aono, Y. & Takagi, T., Jan 1 2018, Information and Communications Security - 19th International Conference, ICICS 2017, Proceedings. Springer Verlag, p. 541-553 13 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10631 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Experimental Study
Enumeration
Learning
Lattice Reduction
Experimental Results
1 Citations

A public-key encryption scheme based on non-linear indeterminate equations

Akiyama, K., Goto, Y., Okumura, S., Takagi, T., Nuida, K. & Hanaoka, G., Jan 1 2018, Selected Areas in Cryptography – SAC 2017 - 24th International Conference, Revised Selected Papers. Springer Verlag, p. 215-234 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10719 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Public Key Encryption
Nonlinear equations
Cryptography
Cryptosystem
Small Solutions