Takagi-Takayasu Laboratory Mathematical Informatics 1st Laboratory

2016 - 2020

2020

  • Hiroshi Onuki, Yusuke Aikawa, Tsuyoshi Takagi, "The Existence of Cycles in the Supersingular Isogeny Graphs Used in SIKE", 2020 International Symposium on Information Theory and its Applications, ISITA 2020, pp.358-362, 2020.
  • Reo Eriguchi, Noboru Kunihiro, and Koji Nuida, "A Linear Algebraic Approach to Strongly Secure Ramp Secret Sharing for General Access Structures". 2020 International Symposium on Information Theory and its Applications, ISITA 2020, pp.427-431, 2020.
  • Reo Eriguchi, Noboru Kunihiro, "Strong Security of Linear Ramp Secret Sharing Schemes with General Access Structures", Information Processing Letters, Vol.164, 106019, 2020.
  • Momonari Kudo, Shushi Harashita, Everett Howe, "Algorithms to enumerate superspecial Howe curves of genus four", Proceedings of Fourteenth Algorithmic Number Theory Symposium, ANTS-XIV, The Open Book Series, Vol.4, No.1, pp.301–316, 2020.
  • Mriganka Mandal, Koji Nuida, "Identity-based Outsider Anonymous Broadcast Encryption with Simultaneous Individual Messaging", 14th International Conference on Network and System Security, NSS 2020, LNCS 12570, pp.167-186, 2020.
  • Yacheng Wang, Yasuhiko Ikematsu, Shunhei Nakamura, Tsuyoshi Takagi, "Revisiting the Minrank Problem on Multivariate Cryptography", 21st World Conference on Information Security Applications, WISA 2020, LNCS 12583, pp.291-307, 2020.
  • Tomoki Moriya; Hiroshi Onuki; Tsuyoshi Takagi, "SiGamal: A supersingular isogeny-based PKE and its application to a PRF", the 26th Annual International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2020, LNCS 12492, pp.551–580, 2020.
  • Hiroki Okada, Atsushi Takayasu, Kazuhide Fukushima, Shinsaku Kiyomoto, Tsuyoshi Takagi, "A Compact Digital Signature Scheme Based on the Module-LWR Problem", The 22nd International Conference on Information and Communications Security, ICICS 2020, LNCS 12282, pp.73-90, 2020.
  • Kaisei Kajita, Kazuto Ogawa, Koji Nuida, Tsuyoshi Takagi, "Short Lattice Signatures in the Standard Model with Efficient Tag Generation", The 14th International Conference on Provable Security, ProvSec 2020, LNCS 12505, pp.85-102, 2020.
  • Hikaru Tsuchida, Takashi Nishide, Yusaku Maeda, "Private Decision Tree Evaluation with Constant Rounds via (Only) SS-3PC over Ring", The 14th International Conference on Provable Security, ProvSec 2020, LNCS 12505, pp.298-317, 2020.
  • Yuntao Wang, Yasuhiko Ikematsu, Koichiro Akiyama, Tsuyoshi Takagi, "Cryptanalysis of Giophantus(TM) Schemes against Hybrid Attack", Proceedings of the 7th ACM Workshop on ASIA Public-Key Cryptography, APKC2020, pp.28–35, 2020.
  • Yasuhiko Ikematsu, Ryoya Fukasaku, Momonari Kudo, Masaya Yasuda, Katsuyuki Takashima, Kazuhiro Yokoyama, "Hybrid meet-in-the-middle attacks for the isogeny path-finding problem", Proceedings of the 7th ACM Workshop on ASIA Public-Key Cryptography, APKC2020, pp.36–44, 2020.
  • Hiroshi Onuki, Yusuke Aikawa, Tsutomu Yamazaki, Tsuyoshi Takagi, "A Constant-time Algorithm of CSIDH keeping Two Points", IEICE Transactions, Vol.E103–A, No.10, pp.1174-1182, 2020.
  • Hiroshi Onuki, Tsuyoshi Takagi, "On collisions related to an ideal class of order 3 in CSIDH", 15th International Workshop on Security, IWSEC 2020, LNCS 12231, pp.131-148, 2020.
  • Kota Sasaki, Koji Nuida, "Efficiency and Accuracy Improvements of Secure Floating-Point Addition over Secret Sharing", 15th International Workshop on Security, IWSEC 2020, LNCS 12231, pp.77-94, 2020.
  • Keitaro Hiwatashi, Satsuya Ohata, Koji Nuida, "An Efficient Secure Division Protocol Using Approximate Multi-Bit Product and New Constant-Round Building Blocks", 18th International Conference on Applied Cryptography and Network Security, ACNS 2020, LNCS 12146, pp.357-376, 2020.
  • Kento Oonishi, Noboru Kunihiro, "Recovering CRT-RSA Secret Keys from Noisy Square-and-Multiply Sequences in the Sliding Window Method", 25th Australasian Conference on Information Security and Privacy, ACISP 2020, LNCS 12248, pp.642-652, 2020.
  • Reo Eriguchi, Noboru Kunihiro, "d-Multiplicative Secret Sharing for Multipartite Adversary Structures", The first Information-Theoretic Cryptography Conference, ITC 2020, Aticle No.2, pp.2:1–2:16, 2020.
  • Satoshi Okada, Yuntao Wang, Tsuyoshi Takagi, "Improving Key Mismatch Attack on NewHope with Fewer Queries", 25th Australasian Conference on Information Security and Privacy, ACISP 2020, LNCS 12248, pp.505-524, 2020.
  • Hiroki Furue, Dung Hoang Duong, Tsuyoshi Takagi, "An Efficient MQ-based Signature with Tight Security Proof", International Journal of Networking and Computing, Vol.10, No.2, pp.308-324, 2020.
  • Satsuya Ohata, Koji Nuida, "Communication-Efficient (Client-Aided) Secure Two-Party Protocols and Its Application", Twenty-Fourth International Conference on Financial Cryptography and Data Security, FC 2020, LNCS 12059, pp.369-385, 2020.
  • Hiroki Furue, Koha Kinjo, Yasuhiko Ikematsu, Yacheng Wang, Tsuyoshi Takagi, "A Structural Attack on Block-Anti-Circulant UOV at SAC 2019", The Eleventh International Conference on Post-Quantum Cryptography, PQCrypto 2020, LNCS 12100, pp.323-339, 2020.
  • Takanori Yasuda, Yacheng Wang, Tsuyoshi Takagi, "Multivariate Encryption Schemes Based on Polynomial Equations over Real Numbers", The Eleventh International Conference on Post-Quantum Cryptography, PQCrypto 2020, LNCS 12100, pp.402-421, 2020.
  • Tomoki Moriya, Katsuyuki Takashima, Tsuyoshi Takagi, "Group Key Exchange from CSIDH and Its Application to Trusted Setup in Supersingular Isogeny Cryptosystems", The 15th International Conference on Information Security and Cryptology, Inscrypt 2019, LNCS 12020, pp.86–98, 2020.
  • Jiahui Chen, Jie Ling, Jianting Ning, Terry Shue Chien Lau, Yacheng Wang, "A new encryption scheme for multivariate quadratic systems Author links open overlay panel", Theoretical Computer Science, Vol.809, pp.372-383, 2020.
  • Noboru Kunihiro, Atsushi Takayasu, "Worst Case Short Lattice Vector Enumeration on Block Reduced Bases of Arbitrary BlockSizes", Discrete Applied Mathematics, Vol.277, pp.198-220, 2020.
  • Kento Oonishi, Xiaoxuan Huang, Noboru Kunihiro, "Improved CRT-RSA Secret Key Recovery Method from Sliding Window Leakage", 22nd International Conference on Information Security and Cryptology, ICISC 2019, LNCS 11975, pp.278-296, 2020.
  • Tomoki Moriya, Hiroshi Onuki, Tsuyoshi Takagi, "How to Construct CSIDH on Edwards Curves", RSA Conference 2020 Cryptographer's Track, CT-RSA 2020, LNCS 12006, pp.512-537, 2020.
  • Hiroki Furue, Dung Hoang Duong, Tsuyoshi Takagi, "An Efficient MQ-based Signature in the QROM", The Seventh International Symposium on Computing and Networking, CANDAR 2019, pp.10-17, 2020.
  • Hiraku Morita, Nuttapong Attrapadung, Tadanori Teruya, Satsuya Ohata, Koji Nuida, Goichiro Hanaoka, "Constant-Round Client-Aided Two-Server Secure Comparison Protocol and Its Applications", IEICE Transactions, Vol.E103-A, No.1, pp.21-32, 2020.
  • Hiroki Okada, Atsushi Takayasu, Kazuhide Fukushima, Shinsaku Kiyomoto, Tsuyoshi Takagi, "On the Complexity of the LWR-Solving BKW Algorithm", IEICE Transactions, Vol.E103-A, No.1, pp.173-182, 2020.

2019

  • Liqiang Peng, Atsushi Takayasu, "Generalized Cryptanalysis of Small CRT-Exponent RSA", Theoretical Computer Science, Vol.795, pp.432-458, 2019.
  • Chi Cheng, Yue Qin, Rongxing Lu, Tao Jiang, Tsuyoshi Takagi, "Batten Down the Hatches: Securing Neighborhood Area Networks of Smart Grid in the Quantum Era", IEEE Transactions on Smart Grid, Vol.10, pp.6386-6395, 2019.
  • Atsushi Takayasu, Yao Lu, Liqiang Peng, "Small CRT-exponent RSA Revisited", Journal of Cryptology, Volume 32, pp.1337–1382, 2019.
  • Yasufumi Hashimoto, Yasuhiko Ikematsu, Tsuyoshi Takagi, "Chosen Message Attack on Multivariate Signature ELSA at Asiacrypt 2017", Journal of Information Processing, Vol.27, pp.517–524, 2019.
  • Yacheng Wang, Yasuhiko Ikematsu, Dung Hong Dung, Tsuyoshi Takagi, "The Secure Parameters and Efficient Decryption Algorithm for Multivariate Public Key Cryptosystem EFC", IEICE Transactions, Vol.E102-A, No.9, pp.1028-1036, 2019.
  • Kotaro Matsuda, Atsushi Takayasu, Tsuyoshi Takagi, "Explicit Relation between Low-dimensional LLL-reduced Bases and Shortest Vectors", IEICE Transactions, Vol.E102-A, No.9, pp.1091-1100, 2019.
  • Hiroshi Onuki, Yusuke Aikawa, Tsutomu Yamazaki, Tsuyoshi Takagi, "(Short paper) A Faster Constant-time Algorithm of CSIDH keeping Two Points", 14th International Workshop on Security, IWSEC 2019, LNCS 11689, pp.23-33, 2019.
  • Kazuto Ogawa, Koji Nuida, "Privacy Preservation for Versatile Pay-TV Services", First International Conference on HCI for Cybersecurity, Privacy and Trust, HCII 2019, LNCS 11594, pp.417-428, 2019.
  • Shizuo Kaji, Toshiaki Maeno, Koji Nuida, Yasuhide Numata. "Polynomial Expressions of p-ary Auction Functions", Journal of Mathematical Cryptology, Vol.13, No.2, pp.69-80, 2019.
  • Partha Sarathi Roy, Kirill Morozov, Kazuhide Fukushima, Shinsaku Kiyomoto, Tsuyoshi Takagi, "Security Analysis and Efficient Implementation of Code-based Signature Schemes", 5th International Conference on Information Systems Security and Privacy, ICISSP 2019, pp.213-220, 2019.
  • Jintai Ding, Xinwei Gao, Tsuyoshi Takagi, Yuntao Wang, "One Sample Ring-LWE with Rounding and its Application to Key Exchange", 17th International Conference on Applied Cryptography and Network Security, ACNS 2019, LNCS 11464, pp.323-343, 2019.
  • Shuichi Katsumata, Takahiro Matsuda, Atsushi Takayasu, "Lattice-based Revocable (Hierarchical) IBE with Decryption Key Exposure Resistance", 22nd International Conference on Practice and Theory of Public Key Cryptography, PKC 2019, LNCS 11443, pp.441-471, 2019.
  • Taiga Mizuide, Atsushi Takayasu, Tsuyoshi Takagi, "Tight Reductions for Diffie-Hellman Variants in the Algebraic Group Model", RSA Conference 2019 Cryptographer's Track, CT-RSA 2019, LCNS 11405, pp.169-188, 2019.
  • Atsushi Takayasu, Noboru Kunihiro, "Partial Key Exposure Attacks on RSA: Achieving the Boneh-Durfee Bound", Theoretical Computer Science, Vol.761, pp.51-77, 2019.
  • Kento Oonishi, Noboru Kunihiro, "Attacking Noisy Secret CRT-RSA Exponents in Binary Method", 21st International Conference on Information Security and Cryptology, ICISC 2018, LNCS 11396, pp.37-54, 2019.
  • Hiroki Sudo, Koji Nuida, Kana Shimizu, "An efficient private evaluation of a decision graph", 21st International Conference on Information Security and Cryptology, ICISC 2018, LNCS 11396, pp.143-160, 2019.
  • Hiroki Okada, Atsushi Takayasu, Kazuhide Fukushima, Shinsaku Kiyomoto, Tsuyoshi Takagi, "On the Complexity of the LWR-Solving BKW Algorithm", 21st International Conference on Information Security and Cryptology, ICISC 2018, LNCS 11396, pp.196-214, 2019.
  • Yusuke Aikawa, Koji Nuida, Masaaki Shirase, "Elliptic Curve Method Using Complex Multiplication Method", IEICE Transactions, Vol.102-A, No.1, pp.74-80, 2019.

2018

  • Jintai Ding, Momonari Kudo, Shinya Okumura, Tsuyoshi Takagi, Chengdong Tao, "Cryptanalysis of a public key cryptosystem based on Diophantine equations via weighted LLL reduction", Japan Journal of Industrial and Applied Mathematics, Volume 35, Issue 3, pp.1123–1152, 2018.
  • Hiraku Morita, Nuttapong Attrapadung, Satsuya Ohata, Shota Yamada, Koji Nuida, and Goichiro Hanaoka, "Tree-Based Secure Comparison of Secret Shared Data", The International Symposium on Information Theory and Its Applications, ISITA 2018, pp.557-561, 2018.
  • Hiraku Morita, Nuttapong Attrapadung, Satsuya Ohata, Koji Nuida, Shota Yamada, Kana Shimizu, Goichiro Hanaoka, and Kiyoshi Asai, "Secure Division Protocol and Applications to Privacy-Preserving Chi-Squared Tests", The International Symposium on Information Theory and Its Applications, ISITA 2018, pp.562-566, 2018.
  • Yasuhiko Ikematsu, Koichiro Akiyama, Tsuyoshi Takagi, "An Improvement on the Linear Algebraic Attack for the Indeterminate Equation Encryption Scheme", The International Symposium on Information Theory and Its Applications, ISITA 2018, pp.389-393, 2018.
  • Ye Yuan, Junting Xiao, Kazuhide Fukushima, Shinsaku Kiyomoto, Tsuyoshi Takagi, "Portable Implementation of Post-Quantum Encryption Schemes and Key Exchange Protocols on JavaScript-enabled Platforms", Security and Communication Networks, Volume 2018, Article ID 9846168, 14 pages, 2018.
  • Yuntao Wang, Yoshinori Aono and Tsuyoshi Takagi, "Hardness Evaluation for Search LWE Problem using Progressive BKZ Simulator", IEICE Transaction, Vol.E101-A, No.12, pp.2162-2170, 2018.
  • Yuntao Wang, Thomas Wunderer, "Revisiting the Sparsification Technique in Kannan’s Embedding Attack on LWE", 14th International Conference on Information Security Practice and Experience, ISPEC 2018, LNCS 11125, pp.440-452, 2018.
  • Hiraku Morita, Nuttapong Attrapadung, Tadanori Teruya, Satsuya Ohata, Koji Nuida and Goichiro Hanaoka, "Constant-Round Client-Aided Secure Comparison Protocol", 23rd European Symposium on Research in Computer Security, ESORICS 2018, LNCS 11099, pp.395-415, 2018.
  • Yasufumi Hashimoto, Yasuhiko Ikematsu, Tsuyoshi Takagi, "Chosen Message Attack on Multivariate Signature ELSA at Asiacrypt 2017", 13th International Workshop on Security, IWSEC 2018, LNCS 11049, pp.3-18, 2018.
  • Weiyao Wang, Yuntao Wang, Atsushi Takayasu, Tsuyoshi Takagi, "Estimated Cost for Solving Generalized Learning with Errors Problem via Embedding Techniques", 13th International Workshop on Security, IWSEC 2018, LNCS 11049, pp.87-103, 2018.
  • Xiaoling Yu, Yuntao Wang, Chungen Xu, Tsuyoshi Takagi, "Studying the Bounds on Required Samples Numbers for Solving the General Approximate Common Divisors Problem," 5th International Conference on Information Science and Control Engineering, ICISCE 2018, pp.533-537, 2018.
  • Yacheng Wang, Yasuhiko Ikematsu, Dung Hoang Duong, Tsuyoshi Takagi, "Efficient Decryption Algorithms for Extension Field Cancellation Type Encryption Schemes", 23rd Australasian Conference on Information Security and Privacy, ACISP2018, LNCS 10946, pp.487-501, 2018.
  • Yuntao Wang and Tsuyoshi Takagi, "Improving the BKZ Reduction Algorithm by Quick Reordering Technique", 23rd Australasian Conference on Information Security and Privacy, ACISP2018, LNCS 10946, pp.787-795, 2018.
  • Shinya Okumura, Shingo Sugiyama, Masaya Yasuda, Tsuyoshi Takagi, "Security analysis of cryptosystems using short generators over ideal lattices", Japan Journal of Industrial and Applied Mathematics, Volume 35, Issue 2, pp.739–771, 2018.
  • Yasuhiko Ikematsu, Ray Perlner, Daniel Smith-Tone, Tsuyoshi Takagi, Jeremy Vates, "HFERP - A New Multivariate Encryption Scheme", The Ninth International Conference on Post-Quantum Cryptography, PQCrypto 2018, LNCS 10786, pp.396-416, 2018.
  • Yuntao Wang, Yoshinori Aono and Tsuyoshi Takagi, "An Experimental Study of Kannan's Embedding Technique for the Search LWE Problem", The 19th International Conference on Information and Communications Security, ICICS 2017, LNCS 10631, pp.541-553, 2018.
  • Tsuyoshi Takagi, "Recent Developments in Post-Quantum Cryptography", IEICE Transaction, Vol.E101-A, No.1, pp.3-11, 2018.
  • Yasuhiko Ikematsu, Dung Hoang Duong, Albrecht Petzoldt, Tsuyoshi Takagi, "An Efficient Key Generation of ZHFE Public Key Cryptosystem", IEICE Transaction, Vol.E101-A, No.1, pp.29-38, 2018.
  • Koichiro Akiyama, Yasuhiro Goto, Shinya Okumura, Tsuyoshi Takagi, Koji Nuida and Goichiro Hanaoka, "A Public-key Encryption Scheme based on Non-linear Indeterminate Equations", The 24th Annual Conference on Selected Areas in Cryptography, SAC 2017, LNCS 10719, pp.215-234, 2018.

2017

  • Dung Hoang Duong, Albrecht Petzoldt, Tsuyoshi Takagi, "CyclicSRP - A Multivariate Encryption Scheme with a Partially Cyclic Public Key", IEICE Transaction, Vol.E100-A, No.12, pp.2691-2698, 2017.
  • Hyungrok Jo, Christophe Petit, and Tsuyoshi Takagi, "Full Cryptanalysis of Hash Functions Based on Cubic Ramanujan Graphs", IEICE Transaction, Vol.E100-A, No.9, pp.1891-1899, 2017.
  • Dung Hoang Duong, Masaya Yasuda, Tsuyoshi Takagi, "Choosing Parameters for the Subfield Lattice Attack Against Overstretched NTRU", The 20th International Conference on Information Security, ISC 2017, LNCS 10599, pp.79-91, 2017.
  • Saed Alsayigh, Jintai Ding, Tsuyoshi Takagi, Yuntao Wang, "The Beauty and the Beasts — The Hard Cases in LLL Reduction", 12th International Workshop on Security, IWSEC 2017, LNCS 10418, pp.19–35, 2017.
  • Rui Xu, Kirill Morozov, Yanjiang Yang, Jianying Zhou, Tsuyoshi Takagi, "Efficient Outsourcing of Secure k-Nearest Neighbour Query over Encrypted Database", Computers & Security, Vol.69, pp.65-83, 2017.
  • Yutaro Kiyomura, Akiko Inoue, Yuto Kawahara, Masaya Yasuda, Tsuyoshi Takagi, Tetsutaro Kobayashi, "Secure and Efficient Pairing at 256-bit Security Level", The 15th International Conference on Applied Cryptography and Network Security, ACNS 2017, LNCS 10355, pp.59-79, 2017.
  • Rui Xu, Yeo Sze Ling, Kazuhide Fukushima, Tsuyoshi Takagi, Seo Hwajung, Shinsaku Kiyomoto, Henricksen Matt, "An Experimental Study of the BDD Approach for the Search LWE Problem", The 15th International Conference on Applied Cryptography and Network Security, ACNS 2017, LNCS 10355, pp.253-272, 2017.
  • Atsushi Takayasu, Yohei Watanabe, "Lattice-based Revocable Identity-based Encryption with Bounded Decryption Key Exposure Resistance", The 22nd Australasian Conference on Information Security and Privacy, ACISP 2017, LNCS 10342, pp.184-204, 2017.
  • Atsushi Takayasu, Yao Lu, Liqiang Peng, "Small CRT-exponent RSA Revisited", The 36th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Eurocrypt 2017, LNCS 10211, pp.130-159, 2017.
  • Ye Yuan, Kazuhide Fukushima, Shinsaku Kiyomoto, Tsuyoshi Takagi, "Memory-constrained implementation of lattice-based encryption scheme on standard Java Card", IEEE International Symposium on Hardware Oriented Security and Trust, HOST 2017, pp.47-50, 2017.
  • Hikari Tachibana, Katsuyuki Takashima, Tsuyoshi Takagi, "Constructing an Efficient Hash Function from 3-Isogenies ", JSIAM Letters, Vol.9, p.29-32, 2017.
  • Yasuhiko Ikematsu, Dung Hoang Duong, Albrecht Petzoldt, Tsuyoshi Takagi, "Revisiting the Efficient Key Generation of ZHFE", The 2nd International Conference on Codes, Cryptology and Information Security, C2SI 2017, LNCS 10194, pp.195-212, 2017.
  • Chi Cheng, Rongxing Lu, Albrecht Petzoldt, Tsuyoshi Takagi, "Securing Internet of Things in a Quantum World", IEEE Communications Magazine, Vol.55, No.2, pp.116-120, 2017.
  • Dung Hoang Duong, Albrecht Petzoldt, Yacheng Wang, Tsuyoshi Takagi, "Revisiting the Cubic UOV Signature Scheme", The 19th Annual International Conference on Information Security and Cryptology, ICISC 2016, LNCS 10157, pp.223-238, 2017.
  • Rui Xu, Kirill Morozov, Tsuyoshi Takagi, "Secret Sharing with Cheaters Using Multi-Receiver Authentication", IEICE Transaction, Vol.E100-A, No.1, pp.115-125, 2017.

2016

  • Shinya Okumura, Koichiro Akiyama, Tsuyoshi Takagi, "An Estimate of the Complexity of the Section Finding Problem on Algebraic Surfaces", The Fourth International Symposium on Computing and Networking, CANDAR 2016, pp.28-36, 2016.
  • Jintai Ding, Momonari Kudo, Shinya Okumura, Tsuyoshi Takagi, Chengdong Tao, "Cryptanalysis of a public key cryptosystem based on Diophantine equations via weighted LLL reduction", 11th International Workshop on Security, IWSEC 2016, LNCS 9836, pp.305-315, 2016.
  • Shaoquan Jiang, Tsuyoshi Takagi, Guilin Wang, "Special Issue on Provable Security", Security and Communication Networks, Vol.9, No.12, pp.1635-1637, 2016.
  • Ye Yuan, Chen-Mou Cheng, Shinsaku Kiyomoto, Yutaka Miyake, Tsuyoshi Takagi, "Portable Implementation of Lattice-based Cryptography using JavaScript", International Journal of Networking and Computing, Vol.6, No.2, pp.309–327, 2016.
  • Duong Hoang Dung, Albrecht Petzoldt, Tsuyoshi Takagi, "Reducing the Key Size of the SRP Encryption Scheme", 21st Australasian Conference on Information Security and Privacy, ACISP 2016, LNCS 9723, pp.427-434, 2016.
  • Rui Xu, Kirill Morozov, Yanjiang Yang, Jianying Zhou, Tsuyoshi Takagi, "Privacy-preserving k-Nearest Neighbour Query on Outsourced Database", 21st Australasian Conference on Information Security and Privacy, ACISP 2016, LNCS 9722, pp.181-197, 2016.
  • Yoshinori Aono, Yuntao Wang, Takuya Hayashi, Tsuyoshi Takagi, "Improved Progressive BKZ Algorithms and their Precise Cost Estimation by Sharp Simulator", The 35th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Eurocrypt 2016, LNCS 9665, pp.789-819, 2016.
  • Keisuke Hakuta, Hisayoshi Sato, Tsuyoshi Takagi, "On tameness of Matsumoto-Imai central maps in three variables over the finite field F2", Advances in Mathematics of Communications, Vol.10, No.2, pp.221–228, 2016.
  • Youwen Zhu, Zhiqiu Huang, Tsuyoshi Takagi, "Secure and controllable k-NN query over encrypted cloud data with key confidentiality", Journal of Parallel and Distributed Computing, Vol.89, pp.1-12, 2016.
  • Chi Cheng, Jemin Lee, Tao Jiang, Tsuyoshi Takagi, "Security Analysis and Improvements on Two Homomorphic Authentication Schemes for Network Coding", IEEE Transactions on Information Forensics and Security, Vol.11, No.5, pp.993-1002,2016.