Committee |
Date Time |
Place |
Paper Title / Authors |
Abstract |
Paper # |
ISEC |
2024-05-15 15:20 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
[Invited Talk]
A Lattice Attack on CRYSTALS-Kyber with Correlation Power Analysis (from ICISC 2023) Yen-Ting Kuo, Atsushi Takayasu (Univ. of Tokyo) |
[more] |
|
RCC, ISEC, IT, WBS |
2024-03-14 09:05 |
Osaka |
Osaka Univ. (Suita Campus) |
Partial Key Exposure Attacks on UOV-like Signatures Yuki Seto, Hiroki Furue, Atsushi Takayasu (UTokyo) IT2023-104 ISEC2023-103 WBS2023-92 RCC2023-86 |
NIST is currently working on the standardization of post-quantum cryptography (PQC). Forty signature schemes were submit... [more] |
IT2023-104 ISEC2023-103 WBS2023-92 RCC2023-86 pp.189-196 |
ISEC |
2023-05-17 14:45 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
BDD enumeration for Module-LWE using lattice rotation structure Togo Sakurai, Atsushi Takayasu (The Univ. of Tokyo) ISEC2023-10 |
Module-LWE is the analog of LWE that includes algebraic structures. In July 2022, two cryptographic schemes based on Mod... [more] |
ISEC2023-10 pp.54-61 |
ISEC |
2023-05-17 16:25 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
[Invited Talk]
Concrete Quantum Cryptanalysis of Binary Elliptic Curves via Addition Chain (from CT-RSA 2023) Ren Taguchi, Atsushi Takayasu (The Univ. of Tokyo) ISEC2023-13 |
(To be available after the conference date) [more] |
ISEC2023-13 p.66 |
EMM, BioX, ISEC, SITE, ICSS, HWS, IPSJ-CSEC, IPSJ-SPT [detail] |
2022-07-20 16:40 |
Online |
Online |
Efficient Constructions of Adaptively and CCA-secure Identity-based Encryption with Equality Test from LWE Assumption in the Standard Model Kyoichi Asano (UEC/NICT), Keita Emura (NICT), Atsushi Takayasu (Univ. Tokyo) ISEC2022-29 SITE2022-33 BioX2022-54 HWS2022-29 ICSS2022-37 EMM2022-37 |
Identity-based Encryption with Equality Test (IBEET) is an extension of identity-based Encryption (IBE) that can check t... [more] |
ISEC2022-29 SITE2022-33 BioX2022-54 HWS2022-29 ICSS2022-37 EMM2022-37 pp.131-138 |
ISEC |
2022-05-18 14:30 |
Online |
Online |
Improved Orthogonal Lattice Attack for Solving Multi-prime Approximate Common Divisor Problem Kento Urano, Atsushi Takayasu (Univ. Tokyo) ISEC2022-3 |
[more] |
ISEC2022-3 pp.11-18 |
ISEC |
2020-05-20 10:45 |
Online |
Online |
Improved Quantum Information Set Decoding Algorithm with Low Memory Naoto Kimura (Univ. Tokyo), Atsushi Takayasu (NICT), Tsuyoshi Takagi (Univ. Tokyo) ISEC2020-3 |
The security of code-based cryptoststems relates to the hardness of the syndrome decoding problem. The best decoding alg... [more] |
ISEC2020-3 pp.15-22 |
ISEC, SITE, ICSS, EMM, HWS, BioX, IPSJ-CSEC, IPSJ-SPT [detail] |
2019-07-23 13:10 |
Kochi |
Kochi University of Technology |
Constructing More Efficient Lattice-based Revocable IBE with Adaptive Security Atsushi Takayasu (Univ. Tokyo) ISEC2019-21 SITE2019-15 BioX2019-13 HWS2019-16 ICSS2019-19 EMM2019-24 |
[more] |
ISEC2019-21 SITE2019-15 BioX2019-13 HWS2019-16 ICSS2019-19 EMM2019-24 pp.99-106 |
HWS, ISEC, SITE, ICSS, EMM, IPSJ-CSEC, IPSJ-SPT [detail] |
2018-07-25 10:20 |
Hokkaido |
Sapporo Convention Center |
Construction of Revocable HIBE with Adaptive Security Atsushi Takayasu (Univ. Tokyo) ISEC2018-14 SITE2018-6 HWS2018-11 ICSS2018-17 EMM2018-13 |
Revocable hierarchical identity-based encryption (RHIBE) is an extension of IBE with a key revocation mechanism and a ke... [more] |
ISEC2018-14 SITE2018-6 HWS2018-11 ICSS2018-17 EMM2018-13 pp.9-16 |
HWS, ISEC, SITE, ICSS, EMM, IPSJ-CSEC, IPSJ-SPT [detail] |
2018-07-25 15:50 |
Hokkaido |
Sapporo Convention Center |
Extended Partial Key Exposure Attacks on RSA Kaichi Suzuki, Atsushi Takayasu, Noboru Kunihiro (Univ. of Tokyo) ISEC2018-29 SITE2018-21 HWS2018-26 ICSS2018-32 EMM2018-28 |
Thus far, emph{partial key exposure attacks} on RSA, i.e., attackers are given the most significant bits (MSBs) emph{or}... [more] |
ISEC2018-29 SITE2018-21 HWS2018-26 ICSS2018-32 EMM2018-28 pp.155-162 |
HWS, ISEC, SITE, ICSS, EMM, IPSJ-CSEC, IPSJ-SPT [detail] |
2018-07-26 14:10 |
Hokkaido |
Sapporo Convention Center |
A New Embedding Method for Generalized LWE Weiyao Wang, Yuntao Wang, Atsushi Takayasu, Tsuyoshi Takagi (Univ. Tokyo) ISEC2018-46 SITE2018-38 HWS2018-43 ICSS2018-49 EMM2018-45 |
Estimating the computational cost for solving learning with errors (LWE) problem is an indispensable research topic to u... [more] |
ISEC2018-46 SITE2018-38 HWS2018-43 ICSS2018-49 EMM2018-45 pp.363-370 |
LOIS, ISEC, SITE |
2017-11-10 15:10 |
Kyoto |
|
Lattice Attacks on Elliptic Curve Diffie-Hellman key exchange Sota Onozawa (The Univ. of Tokyo), Atsushi Takayasu (The Univ. of Tokyo/AIST), Noboru Kunihiro (The Univ. of Tokyo) ISEC2017-69 SITE2017-51 LOIS2017-46 |
Boneh and Venkatesan (Crypto’96) introduced the hidden number problem (HNP) to study the security of Diffie-Hellman key... [more] |
ISEC2017-69 SITE2017-51 LOIS2017-46 pp.115-122 |
LOIS, ISEC, SITE |
2017-11-10 16:10 |
Kyoto |
|
Revocable Hierarchical Identity-Based Encryption based on LWE Assumption Atsushi Takayasu, Shuichi Katsumata (Univ. Tokyo), Takahiro Matsuda (AIST) ISEC2017-71 SITE2017-53 LOIS2017-48 |
Revocable hierarchical identity-based encryption~(RHIBE) is an advanced form of standard identity-based encryption. RHIB... [more] |
ISEC2017-71 SITE2017-53 LOIS2017-48 pp.129-136 |
ISEC |
2017-09-04 10:00 |
Tokyo |
Kikai-Shinko-Kaikan Bldg. |
[Invited Talk]
Small CRT-exponent RSA Revisited from Eurocrypt 2017 Atsushi Takayasu (Univ. Tokyo) ISEC2017-39 |
[more] |
ISEC2017-39 pp.1-2 |
ISEC, WBS, IT |
2017-03-09 14:00 |
Tokyo |
TOKAI University |
Security Analysis of Ordinary Isogeny Diffie--Hellman Satoshi Furukawa, Atsushi Takayasu, Noboru Kunihiro (The Univ. of Tokyo) IT2016-104 ISEC2016-94 WBS2016-80 |
In this paper, we analyze the security of Ordinary Isogeny Diffie--Hellman (OIDH) key exchange proposed by Stolbunov (Ad... [more] |
IT2016-104 ISEC2016-94 WBS2016-80 pp.33-40 |
EMM, ISEC, SITE, ICSS, IPSJ-CSEC, IPSJ-SPT [detail] |
2016-07-15 13:25 |
Yamaguchi |
|
Worst Case Short Lattice Point Enumeration on Block Reduced Bases Atsushi Takayasu, Noboru Kunihiro (Univ. Tokyo) ISEC2016-33 SITE2016-27 ICSS2016-33 EMM2016-41 |
(To be available after the conference date) [more] |
ISEC2016-33 SITE2016-27 ICSS2016-33 EMM2016-41 pp.177-184 |
ICSS, ISEC, SITE, EMM, IPSJ-CSEC, IPSJ-SPT [detail] |
2014-07-03 14:15 |
Hokkaido |
San-Refure Hakodate |
Security of RSA with Many Decryption Exponents Atsushi Takayasu, Noboru Kunihiro (Univ. of Tokyo) ISEC2014-19 SITE2014-14 ICSS2014-23 EMM2014-19 |
When we use small secret exponents, RSA becomes efficient for its decryption cost and signature generation cost. However... [more] |
ISEC2014-19 SITE2014-14 ICSS2014-23 EMM2014-19 pp.93-96 |
EMM, ISEC, SITE, ICSS, IPSJ-CSEC, IPSJ-SPT [detail] |
2013-07-19 16:05 |
Hokkaido |
|
Recovering RSA Secret Keys from Observed Analog Data (I) Noboru Kunihiro, Atsushi Takayasu (Univ. of Tokyo) ISEC2013-46 SITE2013-41 ICSS2013-51 EMM2013-48 |
[more] |
ISEC2013-46 SITE2013-41 ICSS2013-51 EMM2013-48 pp.339-343 |
EMM, ISEC, SITE, ICSS, IPSJ-CSEC, IPSJ-SPT [detail] |
2012-07-20 14:20 |
Hokkaido |
|
An Improved Algorithm for Approximate GCD Problems Atsushi Takayasu, Noboru Kunihiro (UT) ISEC2012-35 SITE2012-31 ICSS2012-37 EMM2012-27 |
In this paper, we analyze multivariate approximate common divisor problem(ACDP), given approximate multiples of the inte... [more] |
ISEC2012-35 SITE2012-31 ICSS2012-37 EMM2012-27 pp.189-194 |