If you made any changes in Pure these will be visible here soon.

Fingerprint Dive into the research topics where Yasuhiko Ikematsu is active. These topic labels come from the works of this person. Together they form a unique fingerprint.

  • 2 Similar Profiles
Cryptography Engineering & Materials Science
Encryption Mathematics
Public-key Cryptosystem Mathematics
Polynomials Engineering & Materials Science
Field extension Mathematics
Attack Mathematics
Cancellation Mathematics
Efficient Algorithms Mathematics

Network Recent external collaboration on country level. Dive into details by clicking on the dots.

Research Output 2017 2019

  • 2 Citations
  • 1 h-Index
  • 5 Conference contribution
  • 1 Article

An Improvement on the Linear Algebraic Attack for the Indeterminate Equation Encryption Scheme

Ikematsu, Y., Akiyama, K. & Takagi, T., Mar 8 2019, Proceedings of 2018 International Symposium on Information Theory and Its Applications, ISITA 2018. Institute of Electrical and Electronics Engineers Inc., p. 389-393 5 p. 8664254. (Proceedings of 2018 International Symposium on Information Theory and Its Applications, ISITA 2018).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Cryptography
Recovery
Polynomials
Experiments

An efficient key generation of ZHFE public key cryptosystem

Ikematsu, Y., Duong, D. H., Petzoldt, A. & Takagi, T., Jan 1 2018, In : IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences. E101A, 1, p. 29-38 10 p.

Research output: Contribution to journalArticle

Public-key Cryptosystem
Cryptography
Linear algebra
Cryptosystem
Encryption

Chosen Message Attack on Multivariate Signature ELSA at Asiacrypt 2017

Hashimoto, Y., Ikematsu, Y. & Takagi, T., Jan 1 2018, Advances in Information and Computer Security - 13th International Workshop on Security, IWSEC 2018, Proceedings. Yasuda, K. & Inomata, A. (eds.). Springer Verlag, p. 3-18 16 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11049 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Signature
Hardness
Attack
Polynomials
Quadratic equation

Efficient decryption algorithms for extension field cancellation type encryption schemes

Wang, Y., Ikematsu, Y., Duong, D. H. & Takagi, T., Jan 1 2018, Information Security and Privacy - 23rd Australasian Conference, ACISP 2018, Proceedings. Susilo, W. & Yang, G. (eds.). Springer Verlag, p. 487-501 15 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10946 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Field extension
Cancellation
Encryption
Cryptography
Efficient Algorithms
1 Citation (Scopus)

HFERP - A new multivariate encryption scheme

Ikematsu, Y., Perlner, R., Smith-Tone, D., Takagi, T. & Vates, J., Jan 1 2018, Post-Quantum Cryptography - 9th International Conference, PQCrypto 2018, Proceedings. Lange, T. & Steinwandt, R. (eds.). Springer Verlag, p. 396-416 21 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10786 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Encryption
Cryptography
Blow-up
Attack
Doubling