Pureに変更を加えた場合、すぐここに表示されます。

Fingerprint Yasuhiko Ikematsuが取り組む研究トピックをご確認ください。これらのトピックラベルは、この人物の研究に基づいています。これらを共に使用することで、固有の認識が可能になります。

  • 2 同様のプロファイル
Cryptography Engineering & Materials Science
Public-key Cryptosystem Mathematics
Field extension Mathematics
Encryption Mathematics
Cancellation Mathematics
Efficient Algorithms Mathematics
Public key cryptography Engineering & Materials Science
Attack Mathematics

ネットワーク 最近の共同研究。丸をクリックして詳細を確認しましょう。

研究成果 2017 2019

  • 4 引用
  • 1 h指数
  • 5 会議での発言
  • 2 記事

An Improvement on the Linear Algebraic Attack for the Indeterminate Equation Encryption Scheme

Ikematsu, Y., Akiyama, K. & Takagi, T., 3 8 2019, Proceedings of 2018 International Symposium on Information Theory and Its Applications, ISITA 2018. Institute of Electrical and Electronics Engineers Inc., p. 389-393 5 p. 8664254. (Proceedings of 2018 International Symposium on Information Theory and Its Applications, ISITA 2018).

研究成果: 著書/レポートタイプへの貢献会議での発言

Cryptography
Recovery
Polynomials
Experiments

The secure parameters and efficient decryption algorithm for multivariate public key cryptosystem EFC

Wang, Y., Ikematsu, Y., Duong, D. H. & Takagi, T., 1 1 2019, : : IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences. E102A, 9, p. 1028-1036 9 p.

研究成果: ジャーナルへの寄稿記事

Public key cryptography
Public Key Cryptography
Public-key Cryptosystem
Field extension
Cancellation

An efficient key generation of ZHFE public key cryptosystem

Ikematsu, Y., Duong, D. H., Petzoldt, A. & Takagi, T., 1 1 2018, : : IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences. E101A, 1, p. 29-38 10 p.

研究成果: ジャーナルへの寄稿記事

Public-key Cryptosystem
Cryptography
Linear algebra
Cryptosystem
Encryption

Chosen Message Attack on Multivariate Signature ELSA at Asiacrypt 2017

Hashimoto, Y., Ikematsu, Y. & Takagi, T., 1 1 2018, Advances in Information and Computer Security - 13th International Workshop on Security, IWSEC 2018, Proceedings. Yasuda, K. & Inomata, A. (版). Springer Verlag, p. 3-18 16 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); 巻数 11049 LNCS).

研究成果: 著書/レポートタイプへの貢献会議での発言

Signature
Hardness
Attack
Polynomials
Quadratic equation
1 引用 (Scopus)

Efficient decryption algorithms for extension field cancellation type encryption schemes

Wang, Y., Ikematsu, Y., Duong, D. H. & Takagi, T., 1 1 2018, Information Security and Privacy - 23rd Australasian Conference, ACISP 2018, Proceedings. Susilo, W. & Yang, G. (版). Springer Verlag, p. 487-501 15 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); 巻数 10946 LNCS).

研究成果: 著書/レポートタイプへの貢献会議での発言

Field extension
Cancellation
Encryption
Cryptography
Efficient Algorithms