東京大学 大学院情報理工学系研究科 数理情報学専攻 高木・高安研究室 暗号数理情報学研究室(数理情報第1研究室)

発表論文 2016 - 2020

2020年

査読有

  • Hiroshi Onuki, Yusuke Aikawa, Tsuyoshi Takagi, "The Existence of Cycles in the Supersingular Isogeny Graphs Used in SIKE", 2020 International Symposium on Information Theory and its Applications, ISITA 2020, pp.358-362, 2020.
  • Reo Eriguchi, Noboru Kunihiro, and Koji Nuida, "A Linear Algebraic Approach to Strongly Secure Ramp Secret Sharing for General Access Structures". 2020 International Symposium on Information Theory and its Applications, ISITA 2020, pp.427-431, 2020.
  • Reo Eriguchi, Noboru Kunihiro, "Strong Security of Linear Ramp Secret Sharing Schemes with General Access Structures", Information Processing Letters, Vol.164, 106019, 2020.
  • Momonari Kudo, Shushi Harashita, Everett Howe, "Algorithms to enumerate superspecial Howe curves of genus four", Proceedings of Fourteenth Algorithmic Number Theory Symposium, ANTS-XIV, The Open Book Series, Vol.4, No.1, pp.301–316, 2020.
  • Mriganka Mandal, Koji Nuida, "Identity-based Outsider Anonymous Broadcast Encryption with Simultaneous Individual Messaging", 14th International Conference on Network and System Security, NSS 2020, LNCS 12570, pp.167-186, 2020.
  • Yacheng Wang, Yasuhiko Ikematsu, Shunhei Nakamura, Tsuyoshi Takagi, "Revisiting the Minrank Problem on Multivariate Cryptography", 21st World Conference on Information Security Applications, WISA 2020, LNCS 12583, pp.291-307, 2020.
  • Tomoki Moriya; Hiroshi Onuki; Tsuyoshi Takagi, "SiGamal: A supersingular isogeny-based PKE and its application to a PRF", the 26th Annual International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2020, LNCS 12492, pp.551–580, 2020.
  • Hiroki Okada, Atsushi Takayasu, Kazuhide Fukushima, Shinsaku Kiyomoto, Tsuyoshi Takagi, "A Compact Digital Signature Scheme Based on the Module-LWR Problem", The 22nd International Conference on Information and Communications Security, ICICS 2020, LNCS 12282, pp.73-90, 2020.
  • Kaisei Kajita, Kazuto Ogawa, Koji Nuida, Tsuyoshi Takagi, "Short Lattice Signatures in the Standard Model with Efficient Tag Generation", The 14th International Conference on Provable Security, ProvSec 2020, LNCS 12505, pp.85-102, 2020.
  • Hikaru Tsuchida, Takashi Nishide, Yusaku Maeda, "Private Decision Tree Evaluation with Constant Rounds via (Only) SS-3PC over Ring", The 14th International Conference on Provable Security, ProvSec 2020, LNCS 12505, pp.298-317, 2020.
  • Yuntao Wang, Yasuhiko Ikematsu, Koichiro Akiyama, Tsuyoshi Takagi, "Cryptanalysis of Giophantus(TM) Schemes against Hybrid Attack", Proceedings of the 7th ACM Workshop on ASIA Public-Key Cryptography, APKC2020, pp.28–35, 2020.
  • Yasuhiko Ikematsu, Ryoya Fukasaku, Momonari Kudo, Masaya Yasuda, Katsuyuki Takashima, Kazuhiro Yokoyama, "Hybrid meet-in-the-middle attacks for the isogeny path-finding problem", Proceedings of the 7th ACM Workshop on ASIA Public-Key Cryptography, APKC2020, pp.36–44, 2020.
  • Hiroshi Onuki, Yusuke Aikawa, Tsutomu Yamazaki, Tsuyoshi Takagi, "A Constant-time Algorithm of CSIDH keeping Two Points", IEICE Transactions, Vol.E103–A, No.10, pp.1174-1182, 2020.
  • Hiroshi Onuki, Tsuyoshi Takagi, "On collisions related to an ideal class of order 3 in CSIDH", 15th International Workshop on Security, IWSEC 2020, LNCS 12231, pp.131-148, 2020.
  • Kota Sasaki, Koji Nuida, "Efficiency and Accuracy Improvements of Secure Floating-Point Addition over Secret Sharing", 15th International Workshop on Security, IWSEC 2020, LNCS 12231, pp.77-94, 2020.
  • Keitaro Hiwatashi, Satsuya Ohata, Koji Nuida, "An Efficient Secure Division Protocol Using Approximate Multi-Bit Product and New Constant-Round Building Blocks", 18th International Conference on Applied Cryptography and Network Security, ACNS 2020, LNCS 12146, pp.357-376, 2020.
  • Kento Oonishi, Noboru Kunihiro, "Recovering CRT-RSA Secret Keys from Noisy Square-and-Multiply Sequences in the Sliding Window Method", 25th Australasian Conference on Information Security and Privacy, ACISP 2020, LNCS 12248, pp.642-652, 2020.
  • Reo Eriguchi, Noboru Kunihiro, "d-Multiplicative Secret Sharing for Multipartite Adversary Structures", The first Information-Theoretic Cryptography Conference, ITC 2020, Aticle No.2, pp.2:1–2:16, 2020.
  • Satoshi Okada, Yuntao Wang, Tsuyoshi Takagi, "Improving Key Mismatch Attack on NewHope with Fewer Queries", 25th Australasian Conference on Information Security and Privacy, ACISP 2020, LNCS 12248, pp.505-524, 2020.
  • Hiroki Furue, Dung Hoang Duong, Tsuyoshi Takagi, "An Efficient MQ-based Signature with Tight Security Proof", International Journal of Networking and Computing, Vol.10, No.2, pp.308-324, 2020.
  • Satsuya Ohata, Koji Nuida, "Communication-Efficient (Client-Aided) Secure Two-Party Protocols and Its Application", Twenty-Fourth International Conference on Financial Cryptography and Data Security, FC 2020, LNCS 12059, pp.369-385, 2020.
  • Hiroki Furue, Koha Kinjo, Yasuhiko Ikematsu, Yacheng Wang, Tsuyoshi Takagi, "A Structural Attack on Block-Anti-Circulant UOV at SAC 2019", The Eleventh International Conference on Post-Quantum Cryptography, PQCrypto 2020, LNCS 12100, pp.323-339, 2020.
  • Takanori Yasuda, Yacheng Wang, Tsuyoshi Takagi, "Multivariate Encryption Schemes Based on Polynomial Equations over Real Numbers", The Eleventh International Conference on Post-Quantum Cryptography, PQCrypto 2020, LNCS 12100, pp.402-421, 2020.
  • Tomoki Moriya, Katsuyuki Takashima, Tsuyoshi Takagi, "Group Key Exchange from CSIDH and Its Application to Trusted Setup in Supersingular Isogeny Cryptosystems", The 15th International Conference on Information Security and Cryptology, Inscrypt 2019, LNCS 12020, pp.86–98, 2020.
  • Jiahui Chen, Jie Ling, Jianting Ning, Terry Shue Chien Lau, Yacheng Wang, "A new encryption scheme for multivariate quadratic systems Author links open overlay panel", Theoretical Computer Science, Vol.809, pp.372-383, 2020.
  • Noboru Kunihiro, Atsushi Takayasu, "Worst Case Short Lattice Vector Enumeration on Block Reduced Bases of Arbitrary BlockSizes", Discrete Applied Mathematics, Vol.277, pp.198-220, 2020.
  • Kento Oonishi, Xiaoxuan Huang, Noboru Kunihiro, "Improved CRT-RSA Secret Key Recovery Method from Sliding Window Leakage", 22nd International Conference on Information Security and Cryptology, ICISC 2019, LNCS 11975, pp.278-296, 2020.
  • Tomoki Moriya, Hiroshi Onuki, Tsuyoshi Takagi, "How to Construct CSIDH on Edwards Curves", RSA Conference 2020 Cryptographer's Track, CT-RSA 2020, LNCS 12006, pp.512-537, 2020.
  • Hiroki Furue, Dung Hoang Duong, Tsuyoshi Takagi, "An Efficient MQ-based Signature in the QROM", The Seventh International Symposium on Computing and Networking, CANDAR 2019, pp.10-17, 2020.
  • Hiraku Morita, Nuttapong Attrapadung, Tadanori Teruya, Satsuya Ohata, Koji Nuida, Goichiro Hanaoka, "Constant-Round Client-Aided Two-Server Secure Comparison Protocol and Its Applications", IEICE Transactions, Vol.E103-A, No.1, pp.21-32, 2020.
  • Hiroki Okada, Atsushi Takayasu, Kazuhide Fukushima, Shinsaku Kiyomoto, Tsuyoshi Takagi, "On the Complexity of the LWR-Solving BKW Algorithm", IEICE Transactions, Vol.E103-A, No.1, pp.173-182, 2020.

査読無

  • Changze Yin, Yacheng Wang, Tsuyoshi Takagi, "A New Trapdoor for Constructing Multivariate Signature Schemes: Simple Matrix Signature Scheme", コンピュータセキュリティシンポジウム, CSS2020, 1D5-1, 2020.
  • Hiroki Furue, Yasuhiko Ikematsu, Yutaro Kiyomura, Tsuyoshi Takagi, "A New Variant of Unbalanced Oil and Vinegar Using Quotient Ring: QR-UOV", コンピュータセキュリティシンポジウム, CSS2020, 1D5-2, 2020.
  • Yacheng Wang, Tsuyoshi Takagi, "On the Weil Descent Attack against the Multivariate Quadratic Problem", コンピュータセキュリティシンポジウム, CSS2020, 1D5-4, 2020.
  • Tomoki Moriya, Hiroshi Onuki, Tsuyoshi Takagi, "SiGamal: A Supersingular Isogeny-Based PKE", コンピュータセキュリティシンポジウム, CSS2020, 3D5-1, 2020.
  • Shuhei Nakamura, Yasuhiko Ikematsu, Yacheng Wang, Jintai Ding, Tsuyoshi Takagi, "New Complexity Estimation on the Rainbow-Band-Separation Attack", コンピュータセキュリティシンポジウム, CSS2020, 3D5-2, 2020.
  • 樋渡啓太郎, 縫田光司, "定数ラウンドかつ対数サイズ通信量の秘匿配列アクセスプロトコル", コンピュータセキュリティシンポジウム, CSS2020, 3D3-3, 2020.
  • 小貫啓史, "同種写像暗号OSIDHの理論的背景について", 日本応用数理学会2020年度年会講演予稿集, pp.70-71, 2020.
  • 守谷共起, 小貫啓史, 高木剛, "同種写像による点の像の判定困難性に基づく公開鍵暗号方式", 日本応用数理学会2020年度年会講演予稿集, pp.72-73, 2020.
  • 工藤桃成, 原下秀士, Howe Everett, "Efficient algorithms for finding and enumerating superspecial Howe curves in much larger characteristic", 日本応用数理学会2020年度年会講演予稿集, pp.76-77, 2020.
  • 木村直人, 高安敦, 高木剛, "メモリ制限下における量子Information Set Decodingアルゴリズムの高速化", 信学技報, Vol.120, No.28, ISEC2020-3, pp.15-22, 2019.
  • 守谷共起, 小貫啓史, 高木剛, "How to Construct CSIDH on Edwards Curves (from CT-RSA 2020)", 信学技報, Vol.120, No.28, ISEC2020-8, pp.31-31, 2019.
  • 梶田海成, 小川一人, 縫田光司, 高木剛, "効率的なタグ生成を用いた署名サイズの小さい格子ベース署名方式", 2020年暗号と情報セキュリティシンポジウム, SCIS2020, 2A1-1, 2020.
  • 縫田光司, 大畑幸矢, 光成滋生, Nuttapong Attrapadung, "エルガマル型暗号文に対する任意関数演算・再暗号化の二者間秘密計算プロトコルとその応用", SCIS2020, 2C3-4, 2020.
  • 秋山浩一郎, 王イントウ, 池松泰彦, 高木剛, "一方向性を仮定した不定方程式暗号のバリエーションに関する考察", SCIS2020, 3A1-1, 2020.
  • Hiroki Furue, Koha Kinjo, Yasuhiko Ikematsu, Yacheng Wang, Tsuyoshi Takagi, "A Structural Attack on Block-Anti-Circulant UOV at SAC 2019", SCIS2020, 3A1-3, 2020.
  • 中村周平, 池松泰彦, 王亜成, "On the First Fall Degrees of Small Field Type MPKCs", SCIS2020, 3A2-1, 2020.
  • Yuntao Wang, Yasuhiko Ikematsu, Koichiro Akiyama, Tsuyoshi Takagi, "Cryptanalysis of Giophantus(TM) Schemes against Hybrid Attack", SCIS2020, 3A2-2, 2020.
  • 岡田怜士, 王イントウ, 高木剛, "格子暗号NewHopeに対する鍵不一致攻撃の改良", SCIS2020, 3A2-3, 2020.
  • 前田勇作, 土田光, 大原一真, 古川諒, 寺西勇, 縫田光司, "3者秘密計算による異種混合モデルを用いた予測の実装評価", SCIS2020, 3C3-5, 2020.
  • 大西健斗, 梨本翔永, 鈴木大輔, 國廣昇, "Arduino Uno上に実装されたEd25519に対するマルチショット単純電力解析攻撃", SCIS2020, 3E2-4, 2020.
  • 小貫啓史, 相川勇輔, 高木剛, "次数固定同種写像問題と関連した問題群の計算帰着について", SCIS2020, 4A2-1, 2020.
  • 守谷共起, 小貫啓史, 高木剛, "同種写像暗号CSIDHのEdwards曲線のw座標による構成について", SCIS2020, 4A2-3, 2020.
  • 中川皓平, 小貫啓史, 高安敦, 高木剛, "同種写像暗号CSIDHにおける最適な秘密鍵空間の考察", SCIS2020, 4A2-4, 2020.
  • Tomoki Kawashima, Katsuyuki Takashima, Yusuke Aikawa, Tsuyoshi Takagi, "Isogeny-Based Authenticated Key Exchange Protocol from CSIDH with Tight Security Proof", SCIS2020, 4A2-5, 2020.
  • 青木大地, 福島和英, 清本晋作, 高木剛, "ユニモジュラ行列による格子基底のランダム化について", SCIS2020, 4B1-2, 2020.

2019年

査読有

  • Liqiang Peng, Atsushi Takayasu, "Generalized Cryptanalysis of Small CRT-Exponent RSA", Theoretical Computer Science, Vol.795, pp.432-458, 2019.
  • Chi Cheng, Yue Qin, Rongxing Lu, Tao Jiang, Tsuyoshi Takagi, "Batten Down the Hatches: Securing Neighborhood Area Networks of Smart Grid in the Quantum Era", IEEE Transactions on Smart Grid, Vol.10, pp.6386-6395, 2019.
  • Atsushi Takayasu, Yao Lu, Liqiang Peng, "Small CRT-exponent RSA Revisited", Journal of Cryptology, Volume 32, pp.1337–1382, 2019.
  • Yasufumi Hashimoto, Yasuhiko Ikematsu, Tsuyoshi Takagi, "Chosen Message Attack on Multivariate Signature ELSA at Asiacrypt 2017", Journal of Information Processing, Vol.27, pp.517–524, 2019.
  • Yacheng Wang, Yasuhiko Ikematsu, Dung Hong Dung, Tsuyoshi Takagi, "The Secure Parameters and Efficient Decryption Algorithm for Multivariate Public Key Cryptosystem EFC", IEICE Transactions, Vol.E102-A, No.9, pp.1028-1036, 2019.
  • Kotaro Matsuda, Atsushi Takayasu, Tsuyoshi Takagi, "Explicit Relation between Low-dimensional LLL-reduced Bases and Shortest Vectors", IEICE Transactions, Vol.E102-A, No.9, pp.1091-1100, 2019.
  • Hiroshi Onuki, Yusuke Aikawa, Tsutomu Yamazaki, Tsuyoshi Takagi, "(Short paper) A Faster Constant-time Algorithm of CSIDH keeping Two Points", 14th International Workshop on Security, IWSEC 2019, LNCS 11689, pp.23-33, 2019.
  • Kazuto Ogawa, Koji Nuida, "Privacy Preservation for Versatile Pay-TV Services", First International Conference on HCI for Cybersecurity, Privacy and Trust, HCII 2019, LNCS 11594, pp.417-428, 2019.
  • Shizuo Kaji, Toshiaki Maeno, Koji Nuida, Yasuhide Numata. "Polynomial Expressions of p-ary Auction Functions", Journal of Mathematical Cryptology, Vol.13, No.2, pp.69-80, 2019.
  • Partha Sarathi Roy, Kirill Morozov, Kazuhide Fukushima, Shinsaku Kiyomoto, Tsuyoshi Takagi, "Security Analysis and Efficient Implementation of Code-based Signature Schemes", 5th International Conference on Information Systems Security and Privacy, ICISSP 2019, pp.213-220, 2019.
  • Jintai Ding, Xinwei Gao, Tsuyoshi Takagi, Yuntao Wang, "One Sample Ring-LWE with Rounding and its Application to Key Exchange", 17th International Conference on Applied Cryptography and Network Security, ACNS 2019, LNCS 11464, pp.323-343, 2019.
  • Shuichi Katsumata, Takahiro Matsuda, Atsushi Takayasu, "Lattice-based Revocable (Hierarchical) IBE with Decryption Key Exposure Resistance", 22nd International Conference on Practice and Theory of Public Key Cryptography, PKC 2019, LNCS 11443, pp.441-471, 2019.
  • Taiga Mizuide, Atsushi Takayasu, Tsuyoshi Takagi, "Tight Reductions for Diffie-Hellman Variants in the Algebraic Group Model", RSA Conference 2019 Cryptographer's Track, CT-RSA 2019, LCNS 11405, pp.169-188, 2019.
  • Atsushi Takayasu, Noboru Kunihiro, "Partial Key Exposure Attacks on RSA: Achieving the Boneh-Durfee Bound", Theoretical Computer Science, Vol.761, pp.51-77, 2019.
  • Kento Oonishi, Noboru Kunihiro, "Attacking Noisy Secret CRT-RSA Exponents in Binary Method", 21st International Conference on Information Security and Cryptology, ICISC 2018, LNCS 11396, pp.37-54, 2019.
  • Hiroki Sudo, Koji Nuida, Kana Shimizu, "An efficient private evaluation of a decision graph", 21st International Conference on Information Security and Cryptology, ICISC 2018, LNCS 11396, pp.143-160, 2019.
  • Hiroki Okada, Atsushi Takayasu, Kazuhide Fukushima, Shinsaku Kiyomoto, Tsuyoshi Takagi, "On the Complexity of the LWR-Solving BKW Algorithm", 21st International Conference on Information Security and Cryptology, ICISC 2018, LNCS 11396, pp.196-214, 2019.
  • Yusuke Aikawa, Koji Nuida, Masaaki Shirase, "Elliptic Curve Method Using Complex Multiplication Method", IEICE Transactions, Vol.102-A, No.1, pp.74-80, 2019.

査読無

  • 樋渡啓太郎, 大畑幸矢, 縫田光司, "近似多ビット乗算と新しい 定数ラウンド基本ツールを用いた省ラウンド秘匿除算プロトコル", コンピュータセキュリティシンポジウム, CSS2019, 1F2-4, pp.373-380, 2019.
  • Yuan Mei, Koji Nuida, "Improvement of Integer Factorization with Elliptic Curve and Complex Multiplication Method", コンピュータセキュリティシンポジウム, CSS2019, 1F3-2, pp.394-399, 2019.
  • Yacheng Wang, Yasuhiko Ikematsu, Shunhei Nakamura, Tsuyoshi Takagi, "A Hybrid Method for Solving the Minrank Problem", コンピュータセキュリティシンポジウム, CSS2019, 1F3-3, pp.400-407, 2019.
  • 小貫啓史, 高木剛, "同種写像暗号CSIDHにおける秘密鍵の衝突可能性について", コンピュータセキュリティシンポジウム, CSS2019, 1F3-4, pp.408-414, 2019.
  • 大西健斗, 國廣昇, "Sliding Window法の誤りつき演算情報を用いたCRT-RSA秘密鍵復元手法", コンピュータセキュリティシンポジウム, CSS2019, 2F1-2, pp.792-799, 2019.
  • 品川和雅, 縫田光司, "シングルカットフルオープンカードベースプロトコル", コンピュータセキュリティシンポジウム, CSS2019, 2F4-2, pp.878-885, 2019.
  • Hiroki Furue, Dung Hoang Duong, Tsuyoshi Takagi, "An Efficient MQ-based Signature in the QROM", コンピュータセキュリティシンポジウム, CSS2019, 3D3-3, pp.1242-1249, 2019.
  • 高安敦, "適応的安全でより効率的な格子鍵失効機能付きIDベース暗号の構成", 信学技報, Vol.119, No.140, ISEC2019-21, pp.99-106, 2019.
  • 大西健斗, 國廣昇, "Attacking Noisy Secret CRT-RSA Exponents in Binary Method (from ICISC 2018)", 信学技報, Vol.119, No.40, ISEC2019-2, pp.3-3, 2019.
  • 大西健斗, 國廣昇, "数論変換におけるサイドチャネル情報を用いたRing-LWE暗号方式の秘密鍵復元攻撃", 信学技報, Vol.118, No.478, ISEC2018-118, pp.229-234, 2019.
  • 縫田光司, "安全な暗号学的擬似乱数で実装した暗号方式の正当性について", 2019年暗号と情報セキュリティシンポジウム, SCIS2019, 1A1-1, 2019.
  • 小川一人, 縫田光司, "MPC: 放送サービスをもっとよくできる", 2019年暗号と情報セキュリティシンポジウム, SCIS2019, 1C2-2, 2019.
  • 大西健斗, 黄暁萱, 國廣昇, "Sliding Window法の演算情報に基づくビット復元率の厳密な解析", 2019年暗号と情報セキュリティシンポジウム, SCIS2019, 1D2-3, 2019.
  • 黄暁萱, 大西健斗, 國廣昇, "Sliding Window法からの漏洩情報を用いた秘密鍵復元アルゴリズムの改良", 2019年暗号と情報セキュリティシンポジウム, SCIS2019, 1D2-4, 2019.
  • 安井捷, 高木剛, "Davies-Meyer圧縮関数の原像計算に対する量子クエリ計算量下界の改善", 2019年暗号と情報セキュリティシンポジウム, SCIS2019, 2B1-4, 2019.
  • Ye Yuan, Junting Xiao, Tsuyoshi Takagi, "Implementing Post-Quantum Key Exchange Protocols on a Smartwatch using Multithreading Approach in JavaScript", 2019年暗号と情報セキュリティシンポジウム, SCIS2019, 2D1-5, 2019.
  • 高安敦, 渡邉洋平, 江村恵太, "より効率的で適応的に安全な鍵失効機能付きIDベース暗号の構成", 2019年暗号と情報セキュリティシンポジウム, SCIS2019, 2A3-2, 2019.
  • 當間伸之介, 林卓也, 高木剛, "拡大体上の離散対数問題に対する数体篩法の効率的な多項式選択法", 2019年暗号と情報セキュリティシンポジウム, SCIS2019, 2B3-1, 2019.
  • 鈴木海地, 高安敦, 國廣昇, "大きい復号鍵をもつRSA暗号に対する部分鍵導出攻撃の改良", 2019年暗号と情報セキュリティシンポジウム, SCIS2019, 2B3-5, 2019.
  • 井上晶登, 王贇弢, 高安敦, 高木剛, "少ないサンプル数のLWE問題に対するkannanの埋め込み法の挙動評価", 2019年暗号と情報セキュリティシンポジウム, SCIS2019, 2B4-1, 2019.
  • Shuhei Nakamura, Yacheng Wang, Yasuhiko Ikematsu, "Experimental discussion on the distinguishing based attack against HFEv-", 2019年暗号と情報セキュリティシンポジウム, SCIS2019, 2B4-2, 2019.
  • Yasuhiko Ikematsu, Yuntao Wang, Koichiro Akiyama, Tsuyoshi Takagi, "Experimental Analysis for Linear Algebraic Attack on a Variant of Indeterminate Equation Public-Key Cryptosystems", 2019年暗号と情報セキュリティシンポジウム, SCIS2019, 3B1-3, 2019.
  • 秋山浩一郎, 池松泰彦, 王贇弢, 高木剛, "不定方程式暗号のバリエーションに対する鍵復元攻撃に関する考察", 2019年暗号と情報セキュリティシンポジウム, SCIS2019, 3B1-4, 2019.
  • Junting Xiao, Ye Yuan, Tsuyoshi Takagi, "Parallel Implementation and Comparison of Lattice-based Digital Signature Schemes using JavaScript", 2019年暗号と情報セキュリティシンポジウム, SCIS2019, 3B2-4, 2019.
  • 相川勇輔, 山崎努, 小貫啓史, 高木剛, "同種写像暗号CSIDHの計算量評価と高速化パラメータ", 2019年暗号と情報セキュリティシンポジウム, SCIS2019, 3B3-2, 2019.
  • 守谷共起, 高島克幸, 高木剛, "同種写像暗号のCSIDHを用いたグループ鍵共有方式とその応用", 2019年暗号と情報セキュリティシンポジウム, SCIS2019, 3B3-3, 2019.
  • 大畑幸矢, 縫田光司, "効率的な秘匿大小比較プロトコルとその応用", 2019年暗号と情報セキュリティシンポジウム, SCIS2019, 3A4-2, 2019.
  • 山崎努, 高島克幸, 高木剛, "任意の奇数次同種写像を用いた暗号方式の計算量考察", 2019年暗号と情報セキュリティシンポジウム, SCIS2019, 3B4-2, 2019.
  • 青木大地, 福島和英, 清本晋作, 高木剛, "SubSieveを用いた最短ベクトル問題の求解実験", 2019年暗号と情報セキュリティシンポジウム, SCIS2019, 4B1-5, 2019.

2018年

査読有

  • Jintai Ding, Momonari Kudo, Shinya Okumura, Tsuyoshi Takagi, Chengdong Tao, "Cryptanalysis of a public key cryptosystem based on Diophantine equations via weighted LLL reduction", Japan Journal of Industrial and Applied Mathematics, Volume 35, Issue 3, pp.1123–1152, 2018.
  • Hiraku Morita, Nuttapong Attrapadung, Satsuya Ohata, Shota Yamada, Koji Nuida, and Goichiro Hanaoka, "Tree-Based Secure Comparison of Secret Shared Data", The International Symposium on Information Theory and Its Applications, ISITA 2018, pp.557-561, 2018.
  • Hiraku Morita, Nuttapong Attrapadung, Satsuya Ohata, Koji Nuida, Shota Yamada, Kana Shimizu, Goichiro Hanaoka, and Kiyoshi Asai, "Secure Division Protocol and Applications to Privacy-Preserving Chi-Squared Tests", The International Symposium on Information Theory and Its Applications, ISITA 2018, pp.562-566, 2018.
  • Yasuhiko Ikematsu, Koichiro Akiyama, Tsuyoshi Takagi, "An Improvement on the Linear Algebraic Attack for the Indeterminate Equation Encryption Scheme", The International Symposium on Information Theory and Its Applications, ISITA 2018, pp.389-393, 2018.
  • Ye Yuan, Junting Xiao, Kazuhide Fukushima, Shinsaku Kiyomoto, Tsuyoshi Takagi, "Portable Implementation of Post-Quantum Encryption Schemes and Key Exchange Protocols on JavaScript-enabled Platforms", Security and Communication Networks, Volume 2018, Article ID 9846168, 14 pages, 2018.
  • Yuntao Wang, Yoshinori Aono and Tsuyoshi Takagi, "Hardness Evaluation for Search LWE Problem using Progressive BKZ Simulator", IEICE Transaction, Vol.E101-A, No.12, pp.2162-2170, 2018.
  • Yuntao Wang, Thomas Wunderer, "Revisiting the Sparsification Technique in Kannan’s Embedding Attack on LWE", 14th International Conference on Information Security Practice and Experience, ISPEC 2018, LNCS 11125, pp.440-452, 2018.
  • Hiraku Morita, Nuttapong Attrapadung, Tadanori Teruya, Satsuya Ohata, Koji Nuida and Goichiro Hanaoka, "Constant-Round Client-Aided Secure Comparison Protocol", 23rd European Symposium on Research in Computer Security, ESORICS 2018, LNCS 11099, pp.395-415, 2018.
  • Yasufumi Hashimoto, Yasuhiko Ikematsu, Tsuyoshi Takagi, "Chosen Message Attack on Multivariate Signature ELSA at Asiacrypt 2017", 13th International Workshop on Security, IWSEC 2018, LNCS 11049, pp.3-18, 2018.
  • Weiyao Wang, Yuntao Wang, Atsushi Takayasu, Tsuyoshi Takagi, "Estimated Cost for Solving Generalized Learning with Errors Problem via Embedding Techniques", 13th International Workshop on Security, IWSEC 2018, LNCS 11049, pp.87-103, 2018.
  • Xiaoling Yu, Yuntao Wang, Chungen Xu, Tsuyoshi Takagi, "Studying the Bounds on Required Samples Numbers for Solving the General Approximate Common Divisors Problem," 5th International Conference on Information Science and Control Engineering, ICISCE 2018, pp.533-537, 2018.
  • Yacheng Wang, Yasuhiko Ikematsu, Dung Hoang Duong, Tsuyoshi Takagi, "Efficient Decryption Algorithms for Extension Field Cancellation Type Encryption Schemes", 23rd Australasian Conference on Information Security and Privacy, ACISP2018, LNCS 10946, pp.487-501, 2018.
  • Yuntao Wang and Tsuyoshi Takagi, "Improving the BKZ Reduction Algorithm by Quick Reordering Technique", 23rd Australasian Conference on Information Security and Privacy, ACISP2018, LNCS 10946, pp.787-795, 2018.
  • Shinya Okumura, Shingo Sugiyama, Masaya Yasuda, Tsuyoshi Takagi, "Security analysis of cryptosystems using short generators over ideal lattices", Japan Journal of Industrial and Applied Mathematics, Volume 35, Issue 2, pp.739–771, 2018.
  • Yasuhiko Ikematsu, Ray Perlner, Daniel Smith-Tone, Tsuyoshi Takagi, Jeremy Vates, "HFERP - A New Multivariate Encryption Scheme", The Ninth International Conference on Post-Quantum Cryptography, PQCrypto 2018, LNCS 10786, pp.396-416, 2018.
  • Yuntao Wang, Yoshinori Aono and Tsuyoshi Takagi, "An Experimental Study of Kannan's Embedding Technique for the Search LWE Problem", The 19th International Conference on Information and Communications Security, ICICS 2017, LNCS 10631, pp.541-553, 2018.
  • Tsuyoshi Takagi, "Recent Developments in Post-Quantum Cryptography", IEICE Transaction, Vol.E101-A, No.1, pp.3-11, 2018.
  • Yasuhiko Ikematsu, Dung Hoang Duong, Albrecht Petzoldt, Tsuyoshi Takagi, "An Efficient Key Generation of ZHFE Public Key Cryptosystem", IEICE Transaction, Vol.E101-A, No.1, pp.29-38, 2018.
  • Koichiro Akiyama, Yasuhiro Goto, Shinya Okumura, Tsuyoshi Takagi, Koji Nuida and Goichiro Hanaoka, "A Public-key Encryption Scheme based on Non-linear Indeterminate Equations", The 24th Annual Conference on Selected Areas in Cryptography, SAC 2017, LNCS 10719, pp.215-234, 2018.

査読無

  • Partha Sarathi Roy, Kirill Morozov, Kazuhide Fukushima, Shinsaku Kiyomoto, Tsuyoshi Takagi, "Time Complexity of Syndrome Decoding Problem and Security Analysis of Code-based Signature Scheme", 信学技報, Vol.118, No.151, ISEC2018-77, pp.73-78, 2018.
  • 黄暁萱, 大西健斗, 國廣昇, "Sliding window法からの漏洩情報を用いた秘密鍵復元攻撃の改良", コンピュータセキュリティシンポジウム, CSS2018, 2A2-3, pp.299-306, 2018.
  • Trong-Thuc Trang, Yoshinori Aono, Tsuyoshi Takagi, "A Continuous Genetic Algorithm for Optimizing Pruning Function for Lattice Enumeration", コンピュータセキュリティシンポジウム, CSS2018, 2A2-4, pp.307-314, 2018.
  • Yacheng Wang, Yasuhiko Ikematsu, Tsuyoshi Takagi, "Estimating Secure Parameters for the Multivariate Encryption Scheme EFCp-", コンピュータセキュリティシンポジウム, CSS2018, 2A3-2, pp.398-405, 2018.
  • 高安敦, "適応的に安全な鍵失効機能付き階層型IDベース暗号の構成", 信学技報, Vol.118, No.151, ISEC2018-14, pp.9-16, 2018.
  • Partha Sarathi Roy, Kirill Morozov, Kazuhide Fukushima, Shinsaku Kiyomoto, Tsuyoshi Takagi, "Code-Based Signature Scheme without Trapdoors", 信学技報, Vol.118, No.151, ISEC2018-15, pp.17-22, 2018.
  • Weiyao Wang, Yuntao Wang, Atsushi Takayasu, Tsuyoshi Takagi, "A New Embedding Method for Generalized LWE", 信学技報, Vol.118, No.151, ISEC2018-46, pp.363-370, 2018.
  • 安井捷, 國廣昇, "安全性を高めた共通鍵暗号の量子アルゴリズムに対する詳細な安全性評価", 信学技報, Vol.118, No.151, ISEC2018-47, pp.371-378, 2018.
  • 秋山浩一郎, 池松泰彦, 高木剛, "不定方程式暗号における鍵復元攻撃の改良及びパラメータの考察", 2018年暗号と情報セキュリティシンポジウム, SCIS2018, 1B2-4, 2018.
  • Yasuhiko Ikematsu, Koichiro Akiyama, Tsuyoshi Takagi, "An Improvement on the Linear Algebraic Attack for the Indeterminate Equation Encryption Scheme", 2018年暗号と情報セキュリティシンポジウム, SCIS2018, 1B2-5, 2018.
  • Jintai Ding, Tsuyoshi Takagi, Xinwei Gao, Yuntao Wang, "Ding Key Exchange -- A Proposal to NIST PQC Competition", 2018年暗号と情報セキュリティシンポジウム, SCIS2018, 2B1-1, 2018.
  • Yuntao Wang, Xinwei Gao, Jintai Ding, Tsuyoshi Takagi, "Security Evaluation for Ding Key Exchange", 2018年暗号と情報セキュリティシンポジウム, SCIS2018, 2B1-2, 2018.
  • 山崎努, 高島克幸, 高木剛, "同種写像部分木計算とその暗号方式への応用", 2018年暗号と情報セキュリティシンポジウム, SCIS2018, 2B4-1, 2018.
  • Ye Yuan, Junting Xiao, Kazuhide Fukushima, Shinsaku Kiyomoto, Tsuyoshi Takagi, "Portable implementation of post-quantum encryption schemes and key exchange protocols on JavaScript-enabled platforms", 2018年暗号と情報セキュリティシンポジウム, SCIS2018, 3A4-4, 2018.
  • 小野澤綜大, 高安敦, 國廣昇, "Edwards型楕円曲線におけるHidden Number Problem", 2018年暗号と情報セキュリティシンポジウム, SCIS2018, 3B3-3, 2018.
  • 井上晶登, 齋藤恆和, 金城皓羽, 高木剛, "モンゴメリリダクションの改良によるNTTの高速化", 2018年暗号と情報セキュリティシンポジウム, SCIS2018, 3C1-4, 2018.
  • Yacheng Wang, Yasuhiko Ikematsu, Dung H. Duong, Tsuyoshi Takagi, "An Efficient Decryption Algorithm for Extension Field Cancellation", 2018年暗号と情報セキュリティシンポジウム, SCIS2018, 4A1-1, 2018.

2017年

査読有

  • Dung Hoang Duong, Albrecht Petzoldt, Tsuyoshi Takagi, "CyclicSRP - A Multivariate Encryption Scheme with a Partially Cyclic Public Key", IEICE Transaction, Vol.E100-A, No.12, pp.2691-2698, 2017.
  • Hyungrok Jo, Christophe Petit, and Tsuyoshi Takagi, "Full Cryptanalysis of Hash Functions Based on Cubic Ramanujan Graphs", IEICE Transaction, Vol.E100-A, No.9, pp.1891-1899, 2017.
  • 高木剛, 下山武司, 篠原直行, 林卓也, "ペアリング暗号解読の世界記録とその安全性評価", 電子情報通信学会論文誌, Vol.J100-B, No.9, pp.582-592, 2017.
  • Dung Hoang Duong, Masaya Yasuda, Tsuyoshi Takagi, "Choosing Parameters for the Subfield Lattice Attack Against Overstretched NTRU", The 20th International Conference on Information Security, ISC 2017, LNCS 10599, pp.79-91, 2017.
  • Saed Alsayigh, Jintai Ding, Tsuyoshi Takagi, Yuntao Wang, "The Beauty and the Beasts — The Hard Cases in LLL Reduction", 12th International Workshop on Security, IWSEC 2017, LNCS 10418, pp.19–35, 2017.
  • Rui Xu, Kirill Morozov, Yanjiang Yang, Jianying Zhou, Tsuyoshi Takagi, "Efficient Outsourcing of Secure k-Nearest Neighbour Query over Encrypted Database", Computers & Security, Vol.69, pp.65-83, 2017.
  • Yutaro Kiyomura, Akiko Inoue, Yuto Kawahara, Masaya Yasuda, Tsuyoshi Takagi, Tetsutaro Kobayashi, "Secure and Efficient Pairing at 256-bit Security Level", The 15th International Conference on Applied Cryptography and Network Security, ACNS 2017, LNCS 10355, pp.59-79, 2017
  • Rui Xu, Yeo Sze Ling, Kazuhide Fukushima, Tsuyoshi Takagi, Seo Hwajung, Shinsaku Kiyomoto, Henricksen Matt, "An Experimental Study of the BDD Approach for the Search LWE Problem", The 15th International Conference on Applied Cryptography and Network Security, ACNS 2017, LNCS 10355, pp.253-272, 2017.
  • Atsushi Takayasu, Yohei Watanabe, "Lattice-based Revocable Identity-based Encryption with Bounded Decryption Key Exposure Resistance", The 22nd Australasian Conference on Information Security and Privacy, ACISP 2017, LNCS 10342, pp.184-204, 2017.
  • Atsushi Takayasu, Yao Lu, Liqiang Peng, "Small CRT-exponent RSA Revisited", the 36th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Eurocrypt 2017, LNCS 10211, pp.130-159, 2017.
  • Ye Yuan, Kazuhide Fukushima, Shinsaku Kiyomoto, Tsuyoshi Takagi, "Memory-constrained implementation of lattice-based encryption scheme on standard Java Card", IEEE International Symposium on Hardware Oriented Security and Trust, HOST 2017, pp.47-50, 2017.
  • Hikari Tachibana, Katsuyuki Takashima, Tsuyoshi Takagi, "Constructing an Efficient Hash Function from 3-Isogenies ", JSIAM Letters, Vol.9, p.29-32, 2017.
  • Yasuhiko Ikematsu, Dung Hoang Duong, Albrecht Petzoldt, Tsuyoshi Takagi, "Revisiting the Efficient Key Generation of ZHFE", The 2nd International Conference on Codes, Cryptology and Information Security, C2SI 2017, LNCS 10194, pp.195-212, 2017.
  • Chi Cheng, Rongxing Lu, Albrecht Petzoldt, Tsuyoshi Takagi, "Securing Internet of Things in a Quantum World", IEEE Communications Magazine, Vol.55, No.2, pp.116-120, 2017.
  • Dung Hoang Duong, Albrecht Petzoldt, Yacheng Wang, Tsuyoshi Takagi, "Revisiting the Cubic UOV Signature Scheme", The 19th Annual International Conference on Information Security and Cryptology, ICISC 2016, LNCS 10157, pp.223-238, 2017.
  • Rui Xu, Kirill Morozov, Tsuyoshi Takagi, "Secret Sharing with Cheaters Using Multi-Receiver Authentication", IEICE Transaction, Vol.E100-A, No.1, pp.115-125, 2017.

査読無

  • 小野澤綜大, 高安敦, 國廣昇, "楕円曲線Diffie-Hellman鍵共有に対する格子簡約攻撃", 信学技報, Vol.117, No.285, ISEC2017-69, pp.115-122, 2017.
  • 高安敦, 勝又秀一, 松田隆宏, "LWE仮定に基づく鍵失効機能付き階層型IDベース暗号", 信学技報, Vol.117, No.285, ISEC2017-71, pp.129-136, 2017.
  • 岡田大樹,高安敦,福島和英,清本晋作,高木剛, "LWR問題解読のためのサンプル増幅法を用いたBKWアルゴリズム", コンピュータセキュリティシンポジウム, CSS2017, 1E4-2, pp.256-263, 2017.
  • Junting Xiao, Ye Yuan,Kazuhide Fukushima,Shinsaku Kiyomoto, Tsuyoshi Takagi, "Efficient Implementation of discrete Gaussian sampling for Lattice-based Cryptography using JavaScript", コンピュータセキュリティシンポジウム, CSS2017, 1E4-4, pp.272-279, 2017.
  • 高安敦,勝又秀一,松田隆宏, "復号鍵漏洩耐性を持つ鍵失効機能付きIDベース暗号の一般的な構成", コンピュータセキュリティシンポジウム, CSS2017, 3E2-1, pp.1156-1163, 2017.
  • 井上明子, 安田雅哉, 高木剛, 清村優太郎, 川原祐人, 小林鉄太郎, "256ビット安全性を持つペアリング暗号の鍵長見積もり", 2017年暗号と情報セキュリティシンポジウム, SCIS2017, 1B1-1, 2017.
  • 清村優太郎, 川原祐人, 小林鉄太郎, 井上明子, 安田雅哉, 高木剛,"ペアリング暗号を効率的に実装可能な256ビット安全性を持つペアリングフレンドリ曲線",2017年暗号と情報セキュリティシンポジウム, SCIS2017, 1B1-2, 2017.
  • Yuntao Wang, Yoshinori Aono, Tsuyoshi Takagi, "Experimental Analysis of LWE Problem", 2017年暗号と情報セキュリティシンポジウム, SCIS2017, 2B4-1, 2017.
  • Wang Kun, 林卓也, 高木剛, "A Comparison of Three-Dimensional Sieve Methods for Number Field Sieve over GF(p^6)", 2017年暗号と情報セキュリティシンポジウム, SCIS2017, 3A1-1, 2017.
  • Yasuhiko Ikematsu, Dung H. Duong, Albrecht Petzoldt, Tsuyoshi Takagi "Revisiting the Efficient Key Generation of ZHFE", 2017年暗号と情報セキュリティシンポジウム, SCIS2017, 3A3-2, 2017.
  • Yacheng Wang, Dung H. Duong, Tsuyoshi Takagi,"On Gu's Attack Against Simple Matrix Scheme", 2017年暗号と情報セキュリティシンポジウム,SCIS2017,3A3-4, 2017.
  • Dung H. Duong, Albrecht Petzoldt, Yacheng Wang, Tsuyoshi Takagi,"SVSv - A New Multivariate Signature Scheme with Vinegar",2017年暗号と情報セキュリティシンポジウム,SCIS2017, 3A3-5, 2017.
  • 立花ひかり, 高島克幸, 高木剛,"SIDH鍵共有法における効率的な計算法", 2017年暗号と情報セキュリティシンポジウム, SCIS2017,3B2-4, 2017.

2016年

査読有

  • Shinya Okumura, Koichiro Akiyama, Tsuyoshi Takagi, "An Estimate of the Complexity of the Section Finding Problem on Algebraic Surfaces", The Fourth International Symposium on Computing and Networking, CANDAR 2016, pp.28-36, 2016.
  • Jintai Ding, Momonari Kudo, Shinya Okumura, Tsuyoshi Takagi, Chengdong Tao, "Cryptanalysis of a public key cryptosystem based on Diophantine equations via weighted LLL reduction", 11th International Workshop on Security, IWSEC 2016, LNCS 9836, pp.305-315, 2016.
  • Shaoquan Jiang, Tsuyoshi Takagi, Guilin Wang, "Special Issue on Provable Security", Security and Communication Networks, Vol.9, No.12, pp.1635-1637, 2016.
  • Ye Yuan, Chen-Mou Cheng, Shinsaku Kiyomoto, Yutaka Miyake, Tsuyoshi Takagi, "Portable Implementation of Lattice-based Cryptography using JavaScript", International Journal of Networking and Computing, Vol.6, No.2, pp.309–327, 2016.
  • Duong Hoang Dung, Albrecht Petzoldt, Tsuyoshi Takagi, "Reducing the Key Size of the SRP Encryption Scheme", 21st Australasian Conference on Information Security and Privacy, ACISP 2016, LNCS 9723, pp.427-434, 2016.
  • Rui Xu, Kirill Morozov, Yanjiang Yang, Jianying Zhou, Tsuyoshi Takagi, "Privacy-preserving k-Nearest Neighbour Query on Outsourced Database", 21st Australasian Conference on Information Security and Privacy, ACISP 2016, LNCS 9722, pp.181-197, 2016.
  • Yoshinori Aono, Yuntao Wang, Takuya Hayashi, Tsuyoshi Takagi, "Improved Progressive BKZ Algorithms and their Precise Cost Estimation by Sharp Simulator", The 35th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Eurocrypt 2016, LNCS 9665, pp.789-819, 2016.
  • Keisuke Hakuta, Hisayoshi Sato, Tsuyoshi Takagi, "On tameness of Matsumoto-Imai central maps in three variables over the finite field F2", Advances in Mathematics of Communications, Vol.10, No.2, pp.221– 228, 2016.
  • Youwen Zhu, Zhiqiu Huang, Tsuyoshi Takagi, "Secure and controllable k-NN query over encrypted cloud data with key confidentiality", Journal of Parallel and Distributed Computing, Vol.89, pp.1-12, 2016.
  • Chi Cheng, Jemin Lee, Tao Jiang, Tsuyoshi Takagi, "Security Analysis and Improvements on Two Homomorphic Authentication Schemes for Network Coding", IEEE Transactions on Information Forensics and Security, Vol.11, No.5, pp.993-1002,2016.

査読無

  • Ye Yuan, Kazuhide Fukushima, Shinsaku Kiyomoto, Tsuyoshi Takagi, "Memory-Constrained Implementation of Lattice-based Encryption Scheme on Standard Java Card", コンピュータセキュリティシンポジウム CSS2016, 3C2-3, pp.981-988, 2016.
  • Rui Xu, Kazuhide Fukushima, Shinsaku Kiyomoto, Tsuyoshi Takagi, "An experimental study of the BDD approach for the search LWE problem", コンピュータセキュリティシンポジウム CSS2016, 3C4-4, pp.1268-1275, 2016.
  • 秋山浩一郎, 後藤泰宏, 奥村伸也, 高木剛, 縫田光司, 花岡悟一郎, "ある種の不定方程式の求解問題に基づく準同型暗号", 信学技法, IEICE Technicl Report, ISEC 2016-43, pp.27-34, 2016.
  • 奥村伸也, 秋山浩一郎, 高木剛, "有限体上の代数曲面に関する求セクション問題から生じる連立方程式の準正則性について", 信学技法, IEICE Technicl Report, ISEC 2016-34, pp.185-191, 2016.
  • 奥村伸也, 安田雅哉, 高木剛, "円分体に対するイデアル格子上の短い生成元の復元可能性について", 信学技法, IEICE Technicl Report, ISEC 2016-6, pp.25-32, 2016.
  • 立花ひかり, 高島克幸, 高木剛, "3-同種写像を用いた効率的なハッシュ関数の構成", 2016年暗号と情報セキュリティシンポジウム, SCIS2016, 1D2-1, 2016.
  • Chi Cheng, Jemin Lee, Tsuyoshi Takagi, "On the Security of Some Homomorphic Authentication Schemes for Network Coding", 2016年暗号と情報セキュリティシンポジウム, SCIS2016, 1E1-1, 2016.
  • Jintai Ding, Momonari Kudo, Shinya Okumura, Tsuyoshi Takagi, Chengdong Tao, "On the Security of a Public Key Cryptosystem based on Diophantine Equations of Degree Increasing Type", 2016年暗号と情報セキュリティシンポジウム, SCIS2016, 1D2-3, 2016.
  • 奥村伸也, 杉山真吾, 安田雅哉, 高木剛, "On the Security of Cryptosystems Using Short Generators over Ideal Lattices for Cyclotomic Fields", 2016年暗号と情報セキュリティシンポジウム, SCIS2016, 2D1-4, 2016.
  • 井上明子, 林卓也, 高木剛, "拡大体上の離散対数問題に対する数体篩法について", 2016年暗号と情報セキュリティシンポジウム, SCIS2016, 2D3-4, 2016.
  • Rui Xu, Kazuhide Fukushima, Shinsaku Kiyomoto, Tsuyoshi Takagi, "Preliminary Report of a LWE Distinguisher Implementation", 2016年暗号と情報セキュリティシンポジウム, SCIS2016, 2D4-2, 2016.
  • Hyungrok Jo, Tsuyoshi Takagi, "On the security of hash functions based on the cubic Ramanujan graphs", 2016年暗号と情報セキュリティシンポジウム, SCIS2016, 3D1-4, 2016.
  • Yun-Ju Huang, Takanori Yasuda, Xavier Dahan, Tsuyoshi Takagi, Kouichi Sakurai, "Recent Updates of MQ-Challenge Project", 2016年暗号と情報セキュリティシンポジウム, SCIS2016, 3E1-4, 2016.