Follow
Atsushi Takayasu
Atsushi Takayasu
Verified email at g.ecc.u-tokyo.ac.jp - Homepage
Title
Cited by
Cited by
Year
Lattice-based revocable (hierarchical) IBE with decryption key exposure resistance
S Katsumata, T Matsuda, A Takayasu
Public-Key Cryptography–PKC 2019: 22nd IACR International Conference on …, 2019
752019
Partial key exposure attacks on RSA: achieving the Boneh-Durfee bound
A Takayasu, N Kunihiro
International Conference on Selected Areas in Cryptography, 345-362, 2014
60*2014
Lattice-based revocable identity-based encryption with bounded decryption key exposure resistance
A Takayasu, Y Watanabe
Information Security and Privacy: 22nd Australasian Conference, ACISP 2017 …, 2017
562017
Better lattice constructions for solving multivariate linear equations modulo unknown divisors
A Takayasu, N Kunihiro
IEICE Transactions on Fundamentals of Electronics, Communications and …, 2014
432014
Small CRT-exponent RSA revisited
A Takayasu, Y Lu, L Peng
Annual International Conference on the Theory and Applications of …, 2017
322017
Cryptanalysis of RSA with multiple small secret exponents
A Takayasu, N Kunihiro
Australasian Conference on Information Security and Privacy, 176-191, 2014
322014
How to generalize RSA cryptanalyses
A Takayasu, N Kunihiro
Public-Key Cryptography--PKC 2016, 67-97, 2016
282016
A tool kit for partial key exposure attacks on RSA
A Takayasu, N Kunihiro
Topics in Cryptology–CT-RSA 2017: The Cryptographers’ Track at the RSA …, 2017
222017
Tight reductions for Diffie-Hellman variants in the algebraic group model
T Mizuide, A Takayasu, T Takagi
Topics in Cryptology–CT-RSA 2019: The Cryptographers' Track at the RSA …, 2019
212019
Tighter security for efficient lattice cryptography via the Rényi divergence of optimized orders
K Takashima, A Takayasu
Provable Security: 9th International Conference, ProvSec 2015, Kanazawa …, 2015
212015
General bounds for small inverse problems and its applications to multi-prime RSA
A Takayasu, N Kunihiro
IEICE Transactions on Fundamentals of Electronics, Communications and …, 2017
202017
Partial key exposure attacks on CRT-RSA: better cryptanalysis to full size encryption exponents
A Takayasu, N Kunihiro
International Conference on Applied Cryptography and Network Security, 518-537, 2015
192015
l1-norm ball for CSIDH: optimal strategy for choosing the secret key space
K Nakagawa, H Onuki, A Takayasu, T Takagi
Discrete Applied Mathematics 328, 70-88, 2023
142023
Adaptively secure revocable hierarchical IBE from k-linear assumption
K Emura, A Takayasu, Y Watanabe
Designs, Codes and Cryptography 89 (7), 1535-1574, 2021
132021
Partial key exposure attacks on CRT-RSA: general improvement for the exposed least significant bits
A Takayasu, N Kunihiro
International Conference on Information Security, 35-47, 2016
132016
Keyed-fully homomorphic encryption without indistinguishability obfuscation
S Sato, K Emura, A Takayasu
International Conference on Applied Cryptography and Network Security, 3-23, 2022
122022
Adaptively secure lattice-based revocable IBE in the QROM: compact parameters, tight security, and anonymity
A Takayasu
Designs, Codes and Cryptography 89 (8), 1965-1992, 2021
122021
Revocable identity-based encryption with bounded decryption key exposure resistance: Lattice-based construction and more
A Takayasu, Y Watanabe
Theoretical Computer Science 849, 64-98, 2021
122021
Extended partial key exposure attacks on RSA: improvement up to full size decryption exponents
K Suzuki, A Takayasu, N Kunihiro
Theoretical Computer Science 841, 62-83, 2020
122020
Generic constructions of revocable hierarchical identity-based encryption
K Emura, A Takayasu, Y Watanabe
Cryptology ePrint Archive, 2021
102021
The system can't perform the operation now. Try again later.
Articles 1–20