Lattice-based revocable (hierarchical) IBE with decryption key exposure resistance S Katsumata, T Matsuda, A Takayasu Theoretical Computer Science 809, 103-136, 2020 | 54 | 2020 |
Lattice-based revocable identity-based encryption with bounded decryption key exposure resistance A Takayasu, Y Watanabe Information Security and Privacy: 22nd Australasian Conference, ACISP 2017 …, 2017 | 48 | 2017 |
Partial key exposure attacks on RSA: achieving the Boneh-Durfee bound A Takayasu, N Kunihiro Selected Areas in Cryptography--SAC 2014: 21st International Conference …, 2014 | 46* | 2014 |
Better lattice constructions for solving multivariate linear equations modulo unknown divisors A Takayasu, N Kunihiro IEICE Transactions on Fundamentals of Electronics, Communications and …, 2014 | 38 | 2014 |
Small CRT-exponent RSA revisited A Takayasu, Y Lu, L Peng Advances in Cryptology–EUROCRYPT 2017: 36th Annual International Conference …, 2017 | 28 | 2017 |
How to generalize RSA cryptanalyses A Takayasu, N Kunihiro Public-Key Cryptography–PKC 2016: 19th IACR International Conference on …, 2016 | 25 | 2016 |
Cryptanalysis of RSA with multiple small secret exponents A Takayasu, N Kunihiro Information Security and Privacy: 19th Australasian Conference, ACISP 2014 …, 2014 | 25 | 2014 |
A tool kit for partial key exposure attacks on RSA A Takayasu, N Kunihiro Topics in Cryptology–CT-RSA 2017: The Cryptographers’ Track at the RSA …, 2017 | 21 | 2017 |
Partial key exposure attacks on CRT-RSA: better cryptanalysis to full size encryption exponents A Takayasu, N Kunihiro Applied Cryptography and Network Security: 13th International Conference …, 2016 | 19 | 2016 |
Tight reductions for Diffie-Hellman variants in the algebraic group model T Mizuide, A Takayasu, T Takagi Topics in Cryptology–CT-RSA 2019: The Cryptographers' Track at the RSA …, 2019 | 17 | 2019 |
General bounds for small inverse problems and its applications to multi-prime RSA A Takayasu, N Kunihiro IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and …, 2017 | 17 | 2017 |
Tighter security for efficient lattice cryptography via the Rényi divergence of optimized orders K Takashima, A Takayasu Provable Security: 9th International Conference, ProvSec 2015, Kanazawa …, 2015 | 17 | 2015 |
Partial key exposure attacks on CRT-RSA: general improvement for the exposed least significant bits A Takayasu, N Kunihiro Information Security: 19th International Conference, ISC 2016, Honolulu, HI …, 2016 | 14 | 2016 |
l1-norm ball for CSIDH: optimal strategy for choosing the secret key space K Nakagawa, H Onuki, A Takayasu, T Takagi Discrete Applied Mathematics 328, 70-88, 2023 | 13 | 2023 |
Adaptively secure revocable hierarchical IBE from k-linear assumption K Emura, A Takayasu, Y Watanabe Designs, Codes and Cryptography 89 (7), 1535-1574, 2021 | 10 | 2021 |
Partial key exposure attacks on RSA with multiple exponent pairs A Takayasu, N Kunihiro Information Security and Privacy: 21st Australasian Conference, ACISP 2016 …, 2016 | 10 | 2016 |
Generalized cryptanalysis of small CRT-exponent RSA L Peng, A Takayasu Theoretical Computer Science 795, 432-458, 2019 | 9 | 2019 |
Generic constructions of revocable hierarchical identity-based encryption K Emura, A Takayasu, Y Watanabe Cryptology ePrint Archive, 2021 | 8 | 2021 |
Extended partial key exposure attacks on RSA: improvement up to full size decryption exponents K Suzuki, A Takayasu, N Kunihiro Theoretical Computer Science 841, 62-83, 2020 | 8 | 2020 |
Small secret exponent attacks on RSA with unbalanced prime factors A Takayasu, N Kunihiro 2016 International Symposium on Information Theory and Its Applications …, 2016 | 8 | 2016 |