Follow
Atsushi Takayasu
Atsushi Takayasu
Verified email at g.ecc.u-tokyo.ac.jp - Homepage
Title
Cited by
Cited by
Year
Lattice-based revocable (hierarchical) IBE with decryption key exposure resistance
S Katsumata, T Matsuda, A Takayasu
Theoretical Computer Science 809, 103-136, 2020
652020
Lattice-based revocable identity-based encryption with bounded decryption key exposure resistance
A Takayasu, Y Watanabe
Information Security and Privacy: 22nd Australasian Conference, ACISP 2017 …, 2017
532017
Partial key exposure attacks on RSA: achieving the Boneh-Durfee bound
A Takayasu, N Kunihiro
International Conference on Selected Areas in Cryptography, 345-362, 2014
52*2014
Better lattice constructions for solving multivariate linear equations modulo unknown divisors
A Takayasu, N Kunihiro
IEICE Transactions on Fundamentals of Electronics, Communications and …, 2014
402014
Cryptanalysis of RSA with multiple small secret exponents
A Takayasu, N Kunihiro
Australasian Conference on Information Security and Privacy, 176-191, 2014
292014
Small CRT-exponent RSA revisited
A Takayasu, Y Lu, L Peng
Annual International Conference on the Theory and Applications of …, 2017
282017
How to generalize RSA cryptanalyses
A Takayasu, N Kunihiro
Public-Key Cryptography--PKC 2016, 67-97, 2016
252016
A tool kit for partial key exposure attacks on RSA
A Takayasu, N Kunihiro
Topics in Cryptology–CT-RSA 2017: The Cryptographers’ Track at the RSA …, 2017
222017
Tight reductions for Diffie-Hellman variants in the algebraic group model
T Mizuide, A Takayasu, T Takagi
Topics in Cryptology–CT-RSA 2019: The Cryptographers' Track at the RSA …, 2019
202019
General bounds for small inverse problems and its applications to multi-prime RSA
A Takayasu, N Kunihiro
IEICE Transactions on Fundamentals of Electronics, Communications and …, 2017
202017
Tighter security for efficient lattice cryptography via the Rényi divergence of optimized orders
K Takashima, A Takayasu
Provable Security: 9th International Conference, ProvSec 2015, Kanazawa …, 2015
202015
Partial key exposure attacks on CRT-RSA: better cryptanalysis to full size encryption exponents
A Takayasu, N Kunihiro
International Conference on Applied Cryptography and Network Security, 518-537, 2015
192015
L1-norm ball for CSIDH: Optimal strategy for choosing the secret key space
K Nakagawa, H Onuki, A Takayasu, T Takagi
Discrete Applied Mathematics 328, 70-88, 2023
142023
Partial key exposure attacks on CRT-RSA: general improvement for the exposed least significant bits
A Takayasu, N Kunihiro
International Conference on Information Security, 35-47, 2016
132016
Adaptively secure revocable hierarchical IBE from k-linear assumption
K Emura, A Takayasu, Y Watanabe
Designs, Codes and Cryptography 89 (7), 1535-1574, 2021
122021
Generic constructions of revocable hierarchical identity-based encryption
K Emura, A Takayasu, Y Watanabe
Cryptology ePrint Archive, 2021
102021
Partial key exposure attacks on RSA with multiple exponent pairs
A Takayasu, N Kunihiro
Australasian Conference on Information Security and Privacy, 243-257, 2016
102016
Adaptively secure lattice-based revocable IBE in the QROM: compact parameters, tight security, and anonymity
A Takayasu
Designs, Codes and Cryptography 89 (8), 1965-1992, 2021
92021
Revocable identity-based encryption with bounded decryption key exposure resistance: Lattice-based construction and more
A Takayasu, Y Watanabe
Theoretical Computer Science 849, 64-98, 2021
92021
Extended partial key exposure attacks on RSA: improvement up to full size decryption exponents
K Suzuki, A Takayasu, N Kunihiro
Theoretical Computer Science 841, 62-83, 2020
92020
The system can't perform the operation now. Try again later.
Articles 1–20