Member List | ||
---|---|---|
Tsuyoshi Takagi | Professor, Graduate School of Information Science and Technology, University of Tokyo | HP |
Katsuki Fujisawa | Professor, Institute of Mathematics for Industry, Kyushu University |
HP |
Masaya Yasuda | Associate Professor, College of Science, Rikkyo University | HP |
Hayato Waki | Associate Professor, Institute of Mathematics for Industry, Kyushu University |
HP |
Yasufumi Hashimoto | Associate Professor, Department of Mathematical Sciences, University of the Ryukyus |
HP |
Koji Nuida | Professor, Institute of Mathematics for Industry, Kyushu University |
HP |
Atsushi Takayasu | Lecturer, Graduate School of Information Science and Technology, University of Tokyo | HP |
Yasuhiko Ikematsu | Assistant Professor, Institute of Mathematics for Industry, Kyushu University | HP |
Yuntao Wang | Assistant Professor, Japan Advanced Institute of Science and Technology | HP |
Momonari Kudo | Research Associate, Graduate School of Information Science and Technology, University of Tokyo | |
Hiroshi Onuki | Project Research Associate, Graduate School of Information Science and Technology, University of Tokyo | HP |
Kosuke Sakata | Project Researcher, Graduate School of Information Science and Technology, University of Tokyo | |
Maxim Jourenko | Project Researcher, Graduate School of Information Science and Technology, University of Tokyo |
We aim at development and security evaluation of the next-generation cryptographic systems, which will be resistant against attacks using quantum computers. In particular, we will study algorithms for solving the mathematical problems underlying such the systems, including the shortest vector problem on lattices (SVP), solving the systems of multivariate quadratic equations over a finite field (MQ problem) and others. Moreover, we will study the impact of attackers possessing massive computational resources by running the corresponding cryptanalytic experiments with major mathematical problems underlying the above mentioned cryptographic systems. Finally, we will check the possibility of using the next-generation high-performance cryptographic systems in the real-world environment by building their software implementation and evaluating its performance.