If you made any changes in Pure these will be visible here soon.

Research Output 2017 2019

  • 5 Citations
  • 1 h-Index
  • 5 Conference contribution
  • 2 Article
Filter
Conference contribution
Conference contribution

An Improvement on the Linear Algebraic Attack for the Indeterminate Equation Encryption Scheme

Ikematsu, Y., Akiyama, K. & Takagi, T., Mar 8 2019, Proceedings of 2018 International Symposium on Information Theory and Its Applications, ISITA 2018. Institute of Electrical and Electronics Engineers Inc., p. 389-393 5 p. 8664254. (Proceedings of 2018 International Symposium on Information Theory and Its Applications, ISITA 2018).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Cryptography
Recovery
Polynomials
Experiments
1 Citation (Scopus)

Chosen Message Attack on Multivariate Signature ELSA at Asiacrypt 2017

Hashimoto, Y., Ikematsu, Y. & Takagi, T., Jan 1 2018, Advances in Information and Computer Security - 13th International Workshop on Security, IWSEC 2018, Proceedings. Yasuda, K. & Inomata, A. (eds.). Springer Verlag, p. 3-18 16 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11049 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Signature
Hardness
Attack
Polynomials
Quadratic equation
1 Citation (Scopus)

Efficient decryption algorithms for extension field cancellation type encryption schemes

Wang, Y., Ikematsu, Y., Duong, D. H. & Takagi, T., Jan 1 2018, Information Security and Privacy - 23rd Australasian Conference, ACISP 2018, Proceedings. Susilo, W. & Yang, G. (eds.). Springer Verlag, p. 487-501 15 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10946 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Field extension
Cancellation
Encryption
Cryptography
Efficient Algorithms
2 Citations (Scopus)

HFERP - A new multivariate encryption scheme

Ikematsu, Y., Perlner, R., Smith-Tone, D., Takagi, T. & Vates, J., Jan 1 2018, Post-Quantum Cryptography - 9th International Conference, PQCrypto 2018, Proceedings. Lange, T. & Steinwandt, R. (eds.). Springer Verlag, p. 396-416 21 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10786 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Encryption
Cryptography
Blow-up
Attack
Doubling
1 Citation (Scopus)

Revisiting the efficient key generation of ZHFE

Ikematsu, Y., Duong, D. H., Petzoldt, A. & Takagi, T., Jan 1 2017, Codes, Cryptology and Information Security - 2nd International Conference, C2SI 2017, Proceedings In Honor of Claude Carlet. Nitaj, A., El Hajji, S. & Souidi, E. M. (eds.). Springer Verlag, p. 195-212 18 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10194 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Cryptography
Linear algebra
Cryptosystem
Encryption
Efficient Algorithms