What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Atsushi Takayasu
Google Scholar
ORCID:
0000-0002-9310-6976
26
publications in security and cryptology related venues
Year
Venue
Title
2025
conf/acisp
Partial Key Exposure Attacks on UOV and Its Variants.
Yuki Seto
Hiroki Furue
Atsushi Takayasu
2025
conf/acisp
Efficient Revocable Identity-Based Encryption from Middle-Product LWE.
Takumi Nishimura
Atsushi Takayasu
2025
conf/pkc
Tight Adaptive Simulation Security for Identity-Based Inner-Product FE in the (Quantum) Random Oracle Model.
Tenma Edamura
Atsushi Takayasu
2024
conf/acns
On the Untapped Potential of the Quantum FLT-Based Inversion.
Ren Taguchi
Atsushi Takayasu
2023
conf/acisp
Memory-Efficient Quantum Information Set Decoding Algorithm.
Naoto Kimura
Atsushi Takayasu
Tsuyoshi Takagi
2023
conf/icisc
A Lattice Attack on CRYSTALS-Kyber with Correlation Power Analysis.
Yen-Ting Kuo
Atsushi Takayasu
2023
conf/ctrsa
Concrete Quantum Cryptanalysis of Binary Elliptic Curves via Addition Chain.
Ren Taguchi
Atsushi Takayasu
2022
conf/acns
Keyed-Fully Homomorphic Encryption Without Indistinguishability Obfuscation.
Shingo Sato
Keita Emura
Atsushi Takayasu
2022
conf/provsec
A Generic Construction of CCA-Secure Attribute-Based Encryption with Equality Test.
Kyoichi Asano
Keita Emura
Atsushi Takayasu
Yohei Watanabe
2020
conf/icics
A Compact Digital Signature Scheme Based on the Module-LWR Problem.
Hiroki Okada
Atsushi Takayasu
Kazuhide Fukushima
Shinsaku Kiyomoto
Tsuyoshi Takagi
2019
journals/joc
Small CRT-Exponent RSA Revisited.
Atsushi Takayasu
Yao Lu
Liqiang Peng
2019
conf/pkc
Lattice-Based Revocable (Hierarchical) IBE with Decryption Key Exposure Resistance.
Shuichi Katsumata
Takahiro Matsuda
Atsushi Takayasu
2019
conf/ctrsa
Tight Reductions for Diffie-Hellman Variants in the Algebraic Group Model.
Taiga Mizuide
Atsushi Takayasu
Tsuyoshi Takagi
2018
conf/icisc
On the Complexity of the LWR-Solving BKW Algorithm.
Hiroki Okada
Atsushi Takayasu
Kazuhide Fukushima
Shinsaku Kiyomoto
Tsuyoshi Takagi
2018
conf/iwsec
Estimated Cost for Solving Generalized Learning with Errors Problem via Embedding Techniques.
Weiyao Wang
Yuntao Wang
Atsushi Takayasu
Tsuyoshi Takagi
2017
conf/acisp
Lattice-Based Revocable Identity-Based Encryption with Bounded Decryption Key Exposure Resistance.
Atsushi Takayasu
Yohei Watanabe
2017
conf/ctrsa
A Tool Kit for Partial Key Exposure Attacks on RSA.
Atsushi Takayasu
Noboru Kunihiro
2017
conf/eurocrypt
Small CRT-Exponent RSA Revisited.
Atsushi Takayasu
Yao Lu
Liqiang Peng
2016
conf/acisp
Partial Key Exposure Attacks on RSA with Multiple Exponent Pairs.
Atsushi Takayasu
Noboru Kunihiro
2016
conf/pkc
How to Generalize RSA Cryptanalyses.
Atsushi Takayasu
Noboru Kunihiro
2015
conf/acns
Partial Key Exposure Attacks on CRT-RSA: Better Cryptanalysis to Full Size Encryption Exponents.
Atsushi Takayasu
Noboru Kunihiro
2015
conf/provsec
Tighter Security for Efficient Lattice Cryptography via the Rényi Divergence of Optimized Orders.
Katsuyuki Takashima
Atsushi Takayasu
2014
conf/acisp
Cryptanalysis of RSA with Multiple Small Secret Exponents.
Atsushi Takayasu
Noboru Kunihiro
2014
conf/icisc
General Bounds for Small Inverse Problems and Its Applications to Multi-Prime RSA.
Atsushi Takayasu
Noboru Kunihiro
2014
conf/sacrypt
Partial Key Exposure Attacks on RSA: Achieving the Boneh-Durfee Bound.
Atsushi Takayasu
Noboru Kunihiro
2013
conf/acisp
Better Lattice Constructions for Solving Multivariate Linear Equations Modulo Unknown Divisors.
Atsushi Takayasu
Noboru Kunihiro
Coauthors
Atsushi Takayasu
(26)
Hiroki Furue
(1)
Hiroki Okada
(2)
Katsuyuki Takashima
(1)
Kazuhide Fukushima
(2)
Keita Emura
(2)
Kyoichi Asano
(1)
Liqiang Peng
(2)
Naoto Kimura
(1)
Noboru Kunihiro
(8)
Ren Taguchi
(2)
Shingo Sato
(1)
Shinsaku Kiyomoto
(2)
Shuichi Katsumata
(1)
Taiga Mizuide
(1)
Takahiro Matsuda
(1)
Takumi Nishimura
(1)
Tenma Edamura
(1)
Tsuyoshi Takagi
(5)
Weiyao Wang
(1)
Yao Lu
(2)
Yen-Ting Kuo
(1)
Yohei Watanabe
(2)
Yuki Seto
(1)
Yuntao Wang
(1)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to