Research Output per year

## Fingerprint Dive into the research topics where Yasuhiko Ikematsu is active. These topic labels come from the works of this person. Together they form a unique fingerprint.

- 2 Similar Profiles

Cryptography
Engineering & Materials Science

Public-key Cryptosystem
Mathematics

Field extension
Mathematics

Encryption
Mathematics

Cancellation
Mathematics

Efficient Algorithms
Mathematics

Public key cryptography
Engineering & Materials Science

Attack
Mathematics

##
Network
Recent external collaboration on country level. Dive into details by clicking on the dots.

## Research Output 2017 2019

### An Improvement on the Linear Algebraic Attack for the Indeterminate Equation Encryption Scheme

Ikematsu, Y., Akiyama, K. & Takagi, T., Mar 8 2019,*Proceedings of 2018 International Symposium on Information Theory and Its Applications, ISITA 2018.*Institute of Electrical and Electronics Engineers Inc., p. 389-393 5 p. 8664254. (Proceedings of 2018 International Symposium on Information Theory and Its Applications, ISITA 2018).

Research output: Chapter in Book/Report/Conference proceeding › Conference contribution

Cryptography

Recovery

Polynomials

Experiments

### The secure parameters and efficient decryption algorithm for multivariate public key cryptosystem EFC

Wang, Y., Ikematsu, Y., Duong, D. H. & Takagi, T., Jan 1 2019, In : IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences. E102A, 9, p. 1028-1036 9 p.Research output: Contribution to journal › Article

Public key cryptography

Public Key Cryptography

Public-key Cryptosystem

Field extension

Cancellation

### An efficient key generation of ZHFE public key cryptosystem

Ikematsu, Y., Duong, D. H., Petzoldt, A. & Takagi, T., Jan 1 2018, In : IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences. E101A, 1, p. 29-38 10 p.Research output: Contribution to journal › Article

Public-key Cryptosystem

Cryptography

Linear algebra

Cryptosystem

Encryption

### Chosen Message Attack on Multivariate Signature ELSA at Asiacrypt 2017

Hashimoto, Y., Ikematsu, Y. & Takagi, T., Jan 1 2018,*Advances in Information and Computer Security - 13th International Workshop on Security, IWSEC 2018, Proceedings.*Yasuda, K. & Inomata, A. (eds.). Springer Verlag, p. 3-18 16 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11049 LNCS).

Research output: Chapter in Book/Report/Conference proceeding › Conference contribution

Signature

Hardness

Attack

Polynomials

Quadratic equation

1
Citation
(Scopus)

### Efficient decryption algorithms for extension field cancellation type encryption schemes

Wang, Y., Ikematsu, Y., Duong, D. H. & Takagi, T., Jan 1 2018,*Information Security and Privacy - 23rd Australasian Conference, ACISP 2018, Proceedings.*Susilo, W. & Yang, G. (eds.). Springer Verlag, p. 487-501 15 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10946 LNCS).

Research output: Chapter in Book/Report/Conference proceeding › Conference contribution

Field extension

Cancellation

Encryption

Cryptography

Efficient Algorithms