年単位の研究成果
研究成果 2017 2019
2019
An Improvement on the Linear Algebraic Attack for the Indeterminate Equation Encryption Scheme
Ikematsu, Y., Akiyama, K. & Takagi, T., 3 8 2019, Proceedings of 2018 International Symposium on Information Theory and Its Applications, ISITA 2018. Institute of Electrical and Electronics Engineers Inc., p. 389-393 5 p. 8664254. (Proceedings of 2018 International Symposium on Information Theory and Its Applications, ISITA 2018).研究成果: 著書/レポートタイプへの貢献 › 会議での発言
Cryptography
Recovery
Polynomials
Experiments
2018
Chosen Message Attack on Multivariate Signature ELSA at Asiacrypt 2017
Hashimoto, Y., Ikematsu, Y. & Takagi, T., 1 1 2018, Advances in Information and Computer Security - 13th International Workshop on Security, IWSEC 2018, Proceedings. Yasuda, K. & Inomata, A. (版). Springer Verlag, p. 3-18 16 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); 巻数 11049 LNCS).研究成果: 著書/レポートタイプへの貢献 › 会議での発言
Signature
Hardness
Attack
Polynomials
Quadratic equation
1
引用
(Scopus)
Efficient decryption algorithms for extension field cancellation type encryption schemes
Wang, Y., Ikematsu, Y., Duong, D. H. & Takagi, T., 1 1 2018, Information Security and Privacy - 23rd Australasian Conference, ACISP 2018, Proceedings. Susilo, W. & Yang, G. (版). Springer Verlag, p. 487-501 15 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); 巻数 10946 LNCS).研究成果: 著書/レポートタイプへの貢献 › 会議での発言
Field extension
Cancellation
Encryption
Cryptography
Efficient Algorithms
2
引用
(Scopus)
HFERP - A new multivariate encryption scheme
Ikematsu, Y., Perlner, R., Smith-Tone, D., Takagi, T. & Vates, J., 1 1 2018, Post-Quantum Cryptography - 9th International Conference, PQCrypto 2018, Proceedings. Lange, T. & Steinwandt, R. (版). Springer Verlag, p. 396-416 21 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); 巻数 10786 LNCS).研究成果: 著書/レポートタイプへの貢献 › 会議での発言
Encryption
Cryptography
Blow-up
Attack
Doubling
2017
1
引用
(Scopus)
Revisiting the efficient key generation of ZHFE
Ikematsu, Y., Duong, D. H., Petzoldt, A. & Takagi, T., 1 1 2017, Codes, Cryptology and Information Security - 2nd International Conference, C2SI 2017, Proceedings In Honor of Claude Carlet. Nitaj, A., El Hajji, S. & Souidi, E. M. (版). Springer Verlag, p. 195-212 18 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); 巻数 10194 LNCS).研究成果: 著書/レポートタイプへの貢献 › 会議での発言
Cryptography
Linear algebra
Cryptosystem
Encryption
Efficient Algorithms