Lattice-based revocable (hierarchical) IBE with decryption key exposure resistance S Katsumata, T Matsuda, A Takayasu Public-Key Cryptography–PKC 2019: 22nd IACR International Conference on …, 2019 | 71 | 2019 |
Partial key exposure attacks on RSA: achieving the Boneh-Durfee bound A Takayasu, N Kunihiro International Conference on Selected Areas in Cryptography, 345-362, 2014 | 58* | 2014 |
Lattice-based revocable identity-based encryption with bounded decryption key exposure resistance A Takayasu, Y Watanabe Information Security and Privacy: 22nd Australasian Conference, ACISP 2017 …, 2017 | 54 | 2017 |
Better lattice constructions for solving multivariate linear equations modulo unknown divisors A Takayasu, N Kunihiro IEICE Transactions on Fundamentals of Electronics, Communications and …, 2014 | 43 | 2014 |
Cryptanalysis of RSA with multiple small secret exponents A Takayasu, N Kunihiro Australasian Conference on Information Security and Privacy, 176-191, 2014 | 31 | 2014 |
Small CRT-exponent RSA revisited A Takayasu, Y Lu, L Peng Annual International Conference on the Theory and Applications of …, 2017 | 30 | 2017 |
How to generalize RSA cryptanalyses A Takayasu, N Kunihiro Public-Key Cryptography--PKC 2016, 67-97, 2016 | 28 | 2016 |
A tool kit for partial key exposure attacks on RSA A Takayasu, N Kunihiro Topics in Cryptology–CT-RSA 2017: The Cryptographers’ Track at the RSA …, 2017 | 22 | 2017 |
Tighter security for efficient lattice cryptography via the Rényi divergence of optimized orders K Takashima, A Takayasu Provable Security: 9th International Conference, ProvSec 2015, Kanazawa …, 2015 | 21 | 2015 |
Tight reductions for Diffie-Hellman variants in the algebraic group model T Mizuide, A Takayasu, T Takagi Topics in Cryptology–CT-RSA 2019: The Cryptographers' Track at the RSA …, 2019 | 20 | 2019 |
General bounds for small inverse problems and its applications to multi-prime RSA A Takayasu, N Kunihiro IEICE Transactions on Fundamentals of Electronics, Communications and …, 2017 | 20 | 2017 |
Partial key exposure attacks on CRT-RSA: better cryptanalysis to full size encryption exponents A Takayasu, N Kunihiro International Conference on Applied Cryptography and Network Security, 518-537, 2015 | 19 | 2015 |
l1-norm ball for CSIDH: optimal strategy for choosing the secret key space K Nakagawa, H Onuki, A Takayasu, T Takagi Discrete Applied Mathematics 328, 70-88, 2023 | 14 | 2023 |
Adaptively secure revocable hierarchical IBE from k-linear assumption K Emura, A Takayasu, Y Watanabe Designs, Codes and Cryptography 89 (7), 1535-1574, 2021 | 13 | 2021 |
Partial key exposure attacks on CRT-RSA: general improvement for the exposed least significant bits A Takayasu, N Kunihiro International Conference on Information Security, 35-47, 2016 | 13 | 2016 |
Extended partial key exposure attacks on RSA: improvement up to full size decryption exponents K Suzuki, A Takayasu, N Kunihiro Theoretical Computer Science 841, 62-83, 2020 | 12 | 2020 |
Keyed-fully homomorphic encryption without indistinguishability obfuscation S Sato, K Emura, A Takayasu International Conference on Applied Cryptography and Network Security, 3-23, 2022 | 11 | 2022 |
Revocable identity-based encryption with bounded decryption key exposure resistance: Lattice-based construction and more A Takayasu, Y Watanabe Theoretical Computer Science 849, 64-98, 2021 | 11 | 2021 |
Adaptively secure lattice-based revocable IBE in the QROM: compact parameters, tight security, and anonymity A Takayasu Designs, Codes and Cryptography 89 (8), 1965-1992, 2021 | 10 | 2021 |
Generic constructions of revocable hierarchical identity-based encryption K Emura, A Takayasu, Y Watanabe Cryptology ePrint Archive, 2021 | 10 | 2021 |