English Japanese
publications

Publications 2017 -

2018

  • Weiyao Wang, Yuntao Wang, Atsushi Takayasu, Tsuyoshi Takagi, "Estimated Cost for Solving Generalized Learning with Errors Problem via Embedding Techniques", IWSEC 2018, to appear.
  • Yasufumi Hashimoto, Yasuhiko Ikematsu, Tsuyoshi Takagi, "Chosen Message Attack on Multivariate Signature ELSA at Asiacrypt 2017", IWSEC 2018, to appear.
  • Shinya Okumura, Shingo Sugiyama, Masaya Yasuda, Tsuyoshi Takagi, "Security analysis of cryptosystems using short generators over ideal lattices", Japan Journal of Industrial and Applied Mathematics, to appear.
  • Jintai Ding, Momonari Kudo, Shinya Okumura, Tsuyoshi Takagi, Chengdong Tao, "Cryptanalysis of a public key cryptosystem based on Diophantine equations via weighted LLL reduction", Japan Journal of Industrial and Applied Mathematics, to appear.
  • Xiaoling Yu, Yuntao Wang, Chungen Xu, Tsuyoshi Takagi, "Studying the Bounds on Required Samples Numbers for Solving the General Approximate Common Divisors Problem," 5th International Conference on Information Science and Control Engineering, ICISCE 2018, to appear.
  • Yacheng Wang, Yasuhiko Ikematsu, Dung Hoang Duong, Tsuyoshi Takagi, "Efficient Decryption Algorithms for Extension Field Cancellation Type Encryption Schemes", 23rd Australasian Conference on Information Security and Privacy, ACISP 2018, to appear.
  • Yuntao Wang and Tsuyoshi Takagi, "Improving the BKZ Reduction Algorithm by Quick Reordering Technique", 23rd Australasian Conference on Information Security and Privacy, ACISP 2018, to appear.
  • Yasuhiko Ikematsu, Ray Perlner, Daniel Smith-Tone, Tsuyoshi Takagi, Jeremy Vates, "HFERP - A New Multivariate Encryption Scheme", PQCrypto 2018, LNCS 10786, pp.396-416, 2018.
  • Yuntao Wang, Yoshinori Aono and Tsuyoshi Takagi, "An Experimental Study of Kannan's Embedding Technique for the Search LWE Problem", The 19th International Conference on Information and Communications Security, ICICS 2017, LNCS 10631, pp.541-553, 2018.
  • Tsuyoshi Takagi, "Recent Developments in Post-Quantum Cryptography", IEICE Transaction, Vol.E101-A, No.1, pp.3-11, 2018.
  • Yasuhiko Ikematsu, Dung Hoang Duong, Albrecht Petzoldt, Tsuyoshi Takagi, "An Efficient Key Generation of ZHFE Public Key Cryptosystem", IEICE Transaction, Vol.E101-A, No.1, pp.29-38, 2018.
  • Koichiro Akiyama, Yasuhiro Goto, Shinya Okumura, Tsuyoshi Takagi, Koji Nuida and Goichiro Hanaoka, "A Public-key Encryption Scheme based on Non-linear Indeterminate Equations", The 24th Annual Conference on Selected Areas in Cryptography, SAC 2017, LNCS 10719, pp.215-234, 2018.

2017

  • Dung Hoang Duong, Albrecht Petzoldt, Tsuyoshi Takagi, "CyclicSRP - A Multivariate Encryption Scheme with a Partially Cyclic Public Key", IEICE Transaction, Vol.E100-A, No.12, pp.2691-2698, 2017.
  • Hyungrok Jo, Christophe Petit, and Tsuyoshi Takagi, "Full Cryptanalysis of Hash Functions Based on Cubic Ramanujan Graphs", IEICE Transaction, Vol.E100-A, No.9, pp.1891-1899, 2017.
  • Dung Hoang Duong, Masaya Yasuda, Tsuyoshi Takagi, "Choosing Parameters for the Subfield Lattice Attack Against Overstretched NTRU", The 20th International Conference on Information Security, ISC 2017, LNCS 10599, pp.79-91, 2017.
  • Saed Alsayigh, Jintai Ding, Tsuyoshi Takagi, Yuntao Wang, "The Beauty and the Beasts — The Hard Cases in LLL Reduction", 12th International Workshop on Security, IWSEC 2017, LNCS 10418, pp.19–35, 2017.
  • Rui Xu, Kirill Morozov, Yanjiang Yang, Jianying Zhou, Tsuyoshi Takagi, "Efficient Outsourcing of Secure k-Nearest Neighbour Query over Encrypted Database", Computers & Security, Vol.69, pp.65-83, 2017.
  • Yutaro Kiyomura, Akiko Inoue, Yuto Kawahara, Masaya Yasuda, Tsuyoshi Takagi, Tetsutaro Kobayashi, "Secure and Efficient Pairing at 256-bit Security Level", The 15th International Conference on Applied Cryptography and Network Security, ACNS 2017, LNCS 10355, pp.59-79, 2017
  • Rui Xu, Yeo Sze Ling, Kazuhide Fukushima, Tsuyoshi Takagi, Seo Hwajung, Shinsaku Kiyomoto, Henricksen Matt, "An Experimental Study of the BDD Approach for the Search LWE Problem", The 15th International Conference on Applied Cryptography and Network Security, ACNS 2017, LNCS 10355, pp.253-272, 2017.
  • Atsushi Takayasu, Yohei Watanabe, "Lattice-based Revocable Identity-based Encryption with Bounded Decryption Key Exposure Resistance", ACISP 2017, LNCS 10342, pp.184-204, 2017.
  • Atsushi Takayasu, Yao Lu, Liqiang Peng, "Small CRT-exponent RSA Revisited", Eurocrypt 2017, LNCS 10211, pp.130-159, 2017.
  • Ye Yuan, Kazuhide Fukushima, Shinsaku Kiyomoto, Tsuyoshi Takagi, "Memory-constrained implementation of lattice-based encryption scheme on standard Java Card", IEEE International Symposium on Hardware Oriented Security and Trust, HOST 2017, pp.47-50, 2017.
  • Hikari Tachibana, Katsuyuki Takashima, Tsuyoshi Takagi, "Constructing an Efficient Hash Function from 3-Isogenies ", JSIAM Letters, Vol.9, p.29-32, 2017.
  • Yasuhiko Ikematsu, Dung Hoang Duong, Albrecht Petzoldt, Tsuyoshi Takagi, "Revisiting the Efficient Key Generation of ZHFE", The 2nd International Conference on Codes, Cryptology and Information Security, C2SI 2017, LNCS 10194, pp.195-212, 2017.
  • Chi Cheng, Rongxing Lu, Albrecht Petzoldt, Tsuyoshi Takagi, "Securing Internet of Things in a Quantum World", IEEE Communications Magazine, Vol.55, No.2, pp.116-120, 2017.
  • Dung Hoang Duong, Albrecht Petzoldt, Yacheng Wang, Tsuyoshi Takagi, "Revisiting the Cubic UOV Signature Scheme", The 19th Annual International Conference on Information Security and Cryptology, ICISC 2016, LNCS 10157, pp.223-238, 2017.
  • Rui Xu, Kirill Morozov, Tsuyoshi Takagi, "Secret Sharing with Cheaters Using Multi-Receiver Authentication", IEICE Transaction, Vol.E100-A, No.1, pp.115-125, 2017.


PAGE TOP