研究成果 1997 2019

2019
Insertion
Polynomial time
Lattice Basis Reduction
Polynomials
Output

The secure parameters and efficient decryption algorithm for multivariate public key cryptosystem EFC

Wang, Y., Ikematsu, Y., Duong, D. H. & Takagi, T., 1 1 2019, : : IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences. E102A, 9, p. 1028-1036 9 p.

研究成果: ジャーナルへの寄稿記事

Public-key Cryptosystem
Field extension
Cancellation
Cryptography
Efficient Algorithms
2018

Acceleration of index calculus for solving ECDLP over prime fields and its limitation

Kudo, M., Yokota, Y., Takahashi, Y. & Yasuda, M., 1 1 2018, Cryptology and Network Security - 17th International Conference, CANS 2018, Proceedings. Papadimitratos, P. & Camenisch, J. (版). Springer Verlag, p. 377-393 17 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); 巻数 11124 LNCS).

研究成果: 著書/レポートタイプへの貢献会議での発言

Discrete Logarithm Problem
Elliptic Curves
Calculus
Polynomials
Summation

An efficient key generation of ZHFE public key cryptosystem

Ikematsu, Y., Duong, D. H., Petzoldt, A. & Takagi, T., 1 1 2018, : : IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences. E101A, 1, p. 29-38 10 p.

研究成果: ジャーナルへの寄稿記事

Public-key Cryptosystem
Cryptography
Linear algebra
Cryptosystem
Encryption
3 引用 (Scopus)

An experimental study of Kannan’s embedding technique for the search LWE problem

Wang, Y., Aono, Y. & Takagi, T., 1 1 2018, Information and Communications Security - 19th International Conference, ICICS 2017, Proceedings. Qing, S., Liu, D., Mitchell, C. & Chen, L. (版). Springer Verlag, p. 541-553 13 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); 巻数 10631 LNCS).

研究成果: 著書/レポートタイプへの貢献会議での発言

Experimental Study
Enumeration
Learning
Lattice Reduction
Experimental Results
2 引用 (Scopus)

A public-key encryption scheme based on non-linear indeterminate equations

Akiyama, K., Goto, Y., Okumura, S., Takagi, T., Nuida, K. & Hanaoka, G., 1 1 2018, Selected Areas in Cryptography – SAC 2017 - 24th International Conference, Revised Selected Papers. Adams, C. & Camenisch, J. (版). Springer Verlag, p. 215-234 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); 巻数 10719 LNCS).

研究成果: 著書/レポートタイプへの貢献会議での発言

Public Key Encryption
Nonlinear equations
Cryptography
Cryptosystem
Small Solutions

Chosen Message Attack on Multivariate Signature ELSA at Asiacrypt 2017

Hashimoto, Y., Ikematsu, Y. & Takagi, T., 1 1 2018, Advances in Information and Computer Security - 13th International Workshop on Security, IWSEC 2018, Proceedings. Yasuda, K. & Inomata, A. (版). Springer Verlag, p. 3-18 16 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); 巻数 11049 LNCS).

研究成果: 著書/レポートタイプへの貢献会議での発言

Signature
Hardness
Attack
Polynomials
Quadratic equation

Development of a dual version of DeepBKZ and its application to solving the LWE challenge

Yasuda, M., Yamaguchi, J., Ooka, M. & Nakamura, S., 1 1 2018, Progress in Cryptology - AFRICACRYPT 2018 - 10th International Conference on Cryptology in Africa, Proceedings. Nitaj, A., Rachidi, T. & Joux, A. (版). Springer Verlag, p. 162-182 21 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); 巻数 10831 LNCS).

研究成果: 著書/レポートタイプへの貢献会議での発言

Decoding
Subroutines
Enumeration
Dual Basis
Pruning
1 引用 (Scopus)

Efficient decryption algorithms for extension field cancellation type encryption schemes

Wang, Y., Ikematsu, Y., Duong, D. H. & Takagi, T., 1 1 2018, Information Security and Privacy - 23rd Australasian Conference, ACISP 2018, Proceedings. Susilo, W. & Yang, G. (版). Springer Verlag, p. 487-501 15 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); 巻数 10946 LNCS).

研究成果: 著書/レポートタイプへの貢献会議での発言

Field extension
Cancellation
Encryption
Cryptography
Efficient Algorithms
3 引用 (Scopus)

Explicit formula for gram-schmidt vectors in LLL with deep insertions and its applications

Yamaguchi, J. & Yasuda, M., 1 1 2018, Number-Theoretic Methods in Cryptology - 1st International Conference, NuTMiC 2017, Revised Selected Papers. Pieprzyk, J., Pieprzyk, J., Kaczorowski, J. & Pomykała, J. (版). Springer Verlag, p. 142-160 19 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); 巻数 10737 LNCS).

研究成果: 著書/レポートタイプへの貢献会議での発言

Orthogonalization
Subroutines
Insertion
Explicit Formula
Lattice Basis Reduction

Faster PCA and linear regression through hypercubes in HElib

Rathee, D., Mishra, P. K. & Yasuda, M., 10 15 2018, WPES 2018 - Proceedings of the 2018 Workshop on Privacy in the Electronic Society, co-located with CCS 2018. Association for Computing Machinery, p. 42-53 12 p. (Proceedings of the ACM Conference on Computer and Communications Security).

研究成果: 著書/レポートタイプへの貢献会議での発言

Linear regression
Principal component analysis
Cryptography
Outsourcing
Experiments
2 引用 (Scopus)

HFERP - A new multivariate encryption scheme

Ikematsu, Y., Perlner, R., Smith-Tone, D., Takagi, T. & Vates, J., 1 1 2018, Post-Quantum Cryptography - 9th International Conference, PQCrypto 2018, Proceedings. Lange, T. & Steinwandt, R. (版). Springer Verlag, p. 396-416 21 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); 巻数 10786 LNCS).

研究成果: 著書/レポートタイプへの貢献会議での発言

Encryption
Cryptography
Blow-up
Attack
Doubling

Recent developments in post-quantum cryptography

Takagi, T., 1 1 2018, : : IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences. E101A, 1, p. 3-11 9 p.

研究成果: ジャーナルへの寄稿記事

Quantum Cryptography
Quantum cryptography
Cryptography
Quantum computers
Quantum Computer

Security analysis of cryptosystems using short generators over ideal lattices

Okumura, S., Sugiyama, S., Yasuda, M. & Takagi, T., 7 1 2018, : : Japan Journal of Industrial and Applied Mathematics. 35, 2, p. 739-771 33 p.

研究成果: ジャーナルへの寄稿記事

Lattice Ideal
Cyclotomic Fields
Security Analysis
Cryptosystem
Cryptography

Solving LWR via BDD strategy: Modulus switching approach

Le, H. Q., Mishra, P. K., Duong, D. H. & Yasuda, M., 1 1 2018, Cryptology and Network Security - 17th International Conference, CANS 2018, Proceedings. Papadimitratos, P. & Camenisch, J. (版). Springer Verlag, p. 357-376 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); 巻数 11124 LNCS).

研究成果: 著書/レポートタイプへの貢献会議での発言

Modulus
Modulo
Attack
Hermite
Probability distributions

Some properties of τ -adic expansions on hyperelliptic Koblitz curves

Hakuta, K., Sato, H. & Takagi, T., 10 1 2018, : : Journal of Applied Mathematics and Computing. 58, 1-2, p. 367-388 22 p.

研究成果: ジャーナルへの寄稿記事

Hyperelliptic Curves
Concretes
Elliptic Curve Cryptosystem
Cryptography
Hamming Weight
2017
3 引用 (Scopus)

Analysis of decreasing squared-sum of Gram-Schmidt lengths for short lattice vectors

Yasuda, M., Yokoyama, K., Shimoyama, T., Kogure, J. & Koshiba, T., 3 1 2017, : : Journal of Mathematical Cryptology. 11, 1, p. 1-24 24 p.

研究成果: ジャーナルへの寄稿記事

Vector Lattice
Random Sampling
Decrease
Strictly
Sampling

An estimate of the complexity of the section finding problem on algebraic surfaces

Okumura, S., Akiyama, K. & Takagi, T., 1 13 2017, Proceedings - 2016 4th International Symposium on Computing and Networking, CANDAR 2016. Institute of Electrical and Electronics Engineers Inc., p. 28-36 9 p. 7818591. (Proceedings - 2016 4th International Symposium on Computing and Networking, CANDAR 2016).

研究成果: 著書/レポートタイプへの貢献会議での発言

Cryptography
Quantum cryptography
Quantum computers
5 引用 (Scopus)

An experimental study of the BDD approach for the search LWE problem

Xu, R., Yeo, S. L., Fukushima, K., Takagi, T., Seo, H., Kiyomoto, S. & Henricksen, M., 1 1 2017, Applied Cryptography and Network Security - 15th International Conference, ACNS 2017, Proceedings. Gollmann, D., Miyaji, A. & Kikuchi, H. (版). Springer Verlag, p. 253-272 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); 巻数 10355 LNCS).

研究成果: 著書/レポートタイプへの貢献会議での発言

Decoding
Experimental Study
Enumeration
Cryptography
Cryptosystem

Application of mixed integer quadratic program to shortest vector problems

Kimura, K., Waki, H. & Yasuda, M., 2017, (受理済み/印刷中) : : JSIAM Letters.

研究成果: ジャーナルへの寄稿記事

1 引用 (Scopus)

Choosing Parameters for the Subfield Lattice Attack Against Overstretched NTRU

Duong, D. H., Yasuda, M. & Takagi, T., 1 1 2017, Information Security - 20th International Conference, ISC 2017, Proceedings. Nguyen, P. Q., Nguyen, P. Q. & Zhou, J. (版). Springer Verlag, p. 79-91 13 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); 巻数 10599 LNCS).

研究成果: 著書/レポートタイプへの貢献会議での発言

Subfield
Attack
Lattice Reduction
Public key
Modulus

CyclicSRP - A multivariate encryption scheme with a partially cyclic public key

Duong, D. H., Petzoldt, A. & Takagi, T., 12 1 2017, : : IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences. E100A, 12, p. 2691-2698 8 p.

研究成果: ジャーナルへの寄稿記事

Public key cryptography
Public key
Encryption
Cryptography
Public Key Cryptography
7 引用 (Scopus)

Efficient outsourcing of secure k-nearest neighbour query over encrypted database

Xu, R., Morozov, K., Yang, Y., Zhou, J. & Takagi, T., 8 1 2017, : : Computers and Security. 69, p. 65-83 19 p.

研究成果: ジャーナルへの寄稿記事

Outsourcing
outsourcing
Data privacy
Random access storage
Cloud computing
2 引用 (Scopus)

Enhancement for secure multiple matrix multiplications over ring-LWE homomorphic encryption

Mishra, P. K., Duong, D. H. & Yasuda, M., 1 1 2017, Information Security Practice and Experience - 13th International Conference, ISPEC 2017, Proceedings. Liu, J. K. & Samarati, P. (版). Springer Verlag, p. 320-330 11 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); 巻数 10701 LNCS).

研究成果: 著書/レポートタイプへの貢献会議での発言

Homomorphic Encryption
Matrix multiplication
Cryptography
Enhancement
Ring
1 引用 (Scopus)

Full cryptanalysis of hash functions based on cubic Ramanujan graphs

Jo, H., Petit, C. & Takagi, T., 9 1 2017, : : IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences. E100A, 9, p. 1891-1899 9 p.

研究成果: ジャーナルへの寄稿記事

Ramanujan Graphs
Hash functions
Cubic Graph
Cryptanalysis
Hash Function
3 引用 (Scopus)

Memory-constrained implementation of lattice-based encryption scheme on standard Java Card

Yuan, Y., Fukushima, K., Kiyomoto, S. & Takagi, T., 6 16 2017, Proceedings of the 2017 IEEE International Symposium on Hardware Oriented Security and Trust, HOST 2017. Institute of Electrical and Electronics Engineers Inc., p. 47-50 4 p. 7951796. (Proceedings of the 2017 IEEE International Symposium on Hardware Oriented Security and Trust, HOST 2017).

研究成果: 著書/レポートタイプへの貢献会議での発言

Cryptography
Quantum cryptography
Data storage equipment
Quantum computers
Smart cards

Preface

Takagi, T. & Peyrin, T., 1 1 2017, : : Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 10626 LNCS, p. V-VI

研究成果: ジャーナルへの寄稿編集

Preface

Takagi, T. & Peyrin, T., 1 1 2017, : : Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 10624 LNCS, p. V-VI

研究成果: ジャーナルへの寄稿編集

Preface

Lange, T. & Takagi, T., 1 1 2017, : : Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 10346 LNCS, p. VI

研究成果: ジャーナルへの寄稿編集

Preface

Takagi, T. & Peyrin, T., 1 1 2017, : : Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 10625 LNCS, p. V-VI

研究成果: ジャーナルへの寄稿編集

3 引用 (Scopus)

Recovering attacks against linear sketch in fuzzy signature schemes of ACNS 2015 and 2016

Yasuda, M., Shimoyama, T., Takenaka, M., Abe, N., Yamada, S. & Yamaguchi, J., 1 1 2017, Information Security Practice and Experience - 13th International Conference, ISPEC 2017, Proceedings. Liu, J. K. & Samarati, P. (版). Springer Verlag, p. 409-421 13 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); 巻数 10701 LNCS).

研究成果: 著書/レポートタイプへの貢献会議での発言

Biometrics
Signature Scheme
Attack
Template
Signature

Representation growth of the Heisenberg group over O[x]/(x3)

Dung, D. H., 4 1 2017, : : Journal of Algebra and its Applications. 16, 4, 1750077.

研究成果: ジャーナルへの寄稿記事

Heisenberg Group
Number field
Riemann zeta function
Ring
Integer
2 引用 (Scopus)

Revisiting the cubic UOV signature scheme

Duong, D. H., Petzoldt, A., Wang, Y. & Takagi, T., 1 1 2017, Information Security and Cryptology – ICISC 2016 - 19th International Conference, Revised Selected Papers. Hong, S. & Park, J. H. (版). Springer Verlag, p. 223-238 16 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); 巻数 10157 LNCS).

研究成果: 著書/レポートタイプへの貢献会議での発言

Quantum computers
Electronic document identification systems
Signature Scheme
Cryptography
Attack
1 引用 (Scopus)

Revisiting the efficient key generation of ZHFE

Ikematsu, Y., Duong, D. H., Petzoldt, A. & Takagi, T., 1 1 2017, Codes, Cryptology and Information Security - 2nd International Conference, C2SI 2017, Proceedings In Honor of Claude Carlet. Nitaj, A., El Hajji, S. & Souidi, E. M. (版). Springer Verlag, p. 195-212 18 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); 巻数 10194 LNCS).

研究成果: 著書/レポートタイプへの貢献会議での発言

Cryptography
Linear algebra
Cryptosystem
Encryption
Efficient Algorithms
1 引用 (Scopus)

Secret sharing with cheaters using multi-receiver authentication

Xu, R., Morozov, K. & Takagi, T., 1 1 2017, : : IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences. E100A, 1, p. 115-125 11 p.

研究成果: ジャーナルへの寄稿記事

Secret Sharing Scheme
Secret Sharing
Authentication
Receiver
Authentication Codes
2 引用 (Scopus)

Secure and efficient pairing at 256-Bit security level

Kiyomura, Y., Inoue, A., Kawahara, Y., Yasuda, M., Takagi, T. & Kobayashi, T., 1 1 2017, Applied Cryptography and Network Security - 15th International Conference, ACNS 2017, Proceedings. Gollmann, D., Miyaji, A. & Kikuchi, H. (版). Springer Verlag, p. 59-79 21 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); 巻数 10355 LNCS).

研究成果: 著書/レポートタイプへの貢献会議での発言

Pairing
Cryptography
Pairing-based Cryptography
Sieves
Curve
1 引用 (Scopus)
Hamming distance
Biometrics
Cryptography
Authentication
Encryption
42 引用 (Scopus)

Securing the Internet of Things in a Quantum World

Cheng, C., Lu, R., Petzoldt, A. & Takagi, T., 2 1 2017, : : IEEE Communications Magazine. 55, 2, p. 116-120 5 p., 7842421.

研究成果: ジャーナルへの寄稿記事

Quantum computers
Cryptography
Internet of things
Communication
1 引用 (Scopus)

The beauty and the beasts—The hard cases in LLL reduction

Alsayigh, S., Ding, J., Takagi, T. & Wang, Y., 1 1 2017, Advances in Information and Computer Security - 12th International Workshop on Security, IWSEC 2017, Proceedings. Obana, S. & Chida, K. (版). Springer Verlag, p. 19-35 17 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); 巻数 10418 LNCS).

研究成果: 著書/レポートタイプへの貢献会議での発言

Beast
Higher Dimensions
Failure Probability
Geometric Structure
Angle
7 引用 (Scopus)

Uniform analytic properties of representation zeta functions of finitely generated nilpotent groups

Duong, D. H. & Voll, C., 1 1 2017, : : Transactions of the American Mathematical Society. 369, 9, p. 6327-6349 23 p.

研究成果: ジャーナルへの寄稿記事

G-convergence
Abscissa
Finitely Generated Group
Nilpotent Group
Twist
2016

Applications of fully homomorphic encryption

Yasuda, M., 12 1 2016, : : Journal of the Institute of Electronics, Information and Communication Engineers. 99, 12, p. 1167-1175 9 p.

研究成果: ジャーナルへの寄稿記事

Cryptography
2 引用 (Scopus)

Comprehensive and improved secure biometric system using homomorphic encryption

Mandal, A., Roy, A. & Yasuda, M., 1 1 2016, Data Privacy Management, and Security Assurance - 10th International Workshop, DPM 2015 and 4th International Workshop, QASA 2015, Revised Selected Papers. Navarro-Arribas, G., Aldini, A., Martinelli, F., Suri, N. & Garcia-Alfaro, J. (版). Springer Verlag, p. 183-198 16 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); 巻数 9481).

研究成果: 著書/レポートタイプへの貢献会議での発言

Homomorphic Encryption
Biometrics
Authentication
Cryptography
Template
4 引用 (Scopus)

Computational hardness of IFP and ECDLP

Yasuda, M., Shimoyama, T., Kogure, J. & Izu, T., 12 1 2016, : : Applicable Algebra in Engineering, Communications and Computing. 27, 6, p. 493-521 29 p.

研究成果: ジャーナルへの寄稿記事

Integer Factorization
Discrete Logarithm Problem
Factorization
Elliptic Curves
Hardness
1 引用 (Scopus)

Constructing Pairing-Friendly Elliptic Curves Using Global Number Fields

Yasuda, T., Takagi, T. & Sakurai, K., 3 2 2016, Proceedings - 2015 3rd International Symposium on Computing and Networking, CANDAR 2015. Institute of Electrical and Electronics Engineers Inc., p. 477-483 7 p. 7424760. (Proceedings - 2015 3rd International Symposium on Computing and Networking, CANDAR 2015).

研究成果: 著書/レポートタイプへの貢献会議での発言

Number theory
Cryptography

Cryptanalysis of a public key cryptosystem based on diophantine equations via weighted LLL reduction

Ding, J., Kudo, M., Okumura, S., Takagi, T. & Tao, C., 1 1 2016, Advances in Information and Computer Security - 11th International Workshop on Security, IWSEC 2016, Proceedings. Springer Verlag, p. 305-315 11 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); 巻数 9836 LNCS).

研究成果: 著書/レポートタイプへの貢献会議での発言

Public-key Cryptosystem
Diophantine equation
Cryptanalysis
LLL Algorithm
Cryptography
10 引用 (Scopus)

Efficient Deniably Authenticated Encryption and Its Application to E-Mail

Li, F., Zhong, D. & Takagi, T., 11 1 2016, : : IEEE Transactions on Information Forensics and Security. 11, 11, p. 2477-2486 10 p., 7499859.

研究成果: ジャーナルへの寄稿記事

Electronic mail
Authentication
Electronic document identification systems
Cryptography
Internet
6 引用 (Scopus)

Efficient Secure Matrix Multiplication over LWE-Based Homomorphic Encryption

Duong, D. H., Mishra, P. K. & Yasuda, M., 9 1 2016, : : Tatra Mountains Mathematical Publications. 67, 1, p. 69-83 15 p.

研究成果: ジャーナルへの寄稿記事

Homomorphic Encryption
Matrix multiplication
Packing
Confidentiality
Scalar, inner or dot product

Finiteness of Profinite Groups with a Rational Probabilistic Zeta Function

Dung, D. H., 2 1 2016, : : Communications in Algebra. 44, 2, p. 787-795 9 p.

研究成果: ジャーナルへの寄稿記事

Profinite Groups
Maximal Subgroup
Finiteness
Riemann zeta function
Class
27 引用 (Scopus)

Improved progressive BKZ algorithms and their precise cost estimation by sharp simulator

Aono, Y., Wang, Y., Hayashi, T. & Takagi, T., 1 1 2016, Advances in Cryptology - EUROCRYPT 2016 - 35th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Proceedings. Coron, J-S. & Fischlin, M. (版). Springer Verlag, p. 789-819 31 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); 巻数 9665).

研究成果: 著書/レポートタイプへの貢献会議での発言

Cost Estimation
Simulator
Simulators
Costs
Enumeration

On tameness of matsumoto-imai central maps in three variables over the finite field F2

Hakuta, K., Sato, H. & Takagi, T., 5 1 2016, : : Advances in Mathematics of Communications. 10, 2, p. 221-228 8 p.

研究成果: ジャーナルへの寄稿記事

Problem Decomposition
Public-key Cryptosystem
Cryptography
Galois field
Automorphisms