Lattice-based revocable (hierarchical) IBE with decryption key exposure resistance S Katsumata, T Matsuda, A Takayasu Theoretical Computer Science 809, 103-136, 2020 | 67 | 2020 |
Lattice-based revocable identity-based encryption with bounded decryption key exposure resistance A Takayasu, Y Watanabe Information Security and Privacy: 22nd Australasian Conference, ACISP 2017 …, 2017 | 54 | 2017 |
Partial key exposure attacks on RSA: achieving the Boneh-Durfee bound A Takayasu, N Kunihiro International Conference on Selected Areas in Cryptography, 345-362, 2014 | 52* | 2014 |
Better lattice constructions for solving multivariate linear equations modulo unknown divisors A Takayasu, N Kunihiro IEICE Transactions on Fundamentals of Electronics, Communications and …, 2014 | 41 | 2014 |
Small CRT-exponent RSA revisited A Takayasu, Y Lu, L Peng Annual International Conference on the Theory and Applications of …, 2017 | 29 | 2017 |
Cryptanalysis of RSA with multiple small secret exponents A Takayasu, N Kunihiro Australasian Conference on Information Security and Privacy, 176-191, 2014 | 29 | 2014 |
How to generalize RSA cryptanalyses A Takayasu, N Kunihiro Public-Key Cryptography--PKC 2016, 67-97, 2016 | 25 | 2016 |
A tool kit for partial key exposure attacks on RSA A Takayasu, N Kunihiro Topics in Cryptology–CT-RSA 2017: The Cryptographers’ Track at the RSA …, 2017 | 22 | 2017 |
Tight reductions for Diffie-Hellman variants in the algebraic group model T Mizuide, A Takayasu, T Takagi Topics in Cryptology–CT-RSA 2019: The Cryptographers' Track at the RSA …, 2019 | 20 | 2019 |
General bounds for small inverse problems and its applications to multi-prime RSA A Takayasu, N Kunihiro IEICE Transactions on Fundamentals of Electronics, Communications and …, 2017 | 20 | 2017 |
Tighter security for efficient lattice cryptography via the Rényi divergence of optimized orders K Takashima, A Takayasu Provable Security: 9th International Conference, ProvSec 2015, Kanazawa …, 2015 | 20 | 2015 |
Partial key exposure attacks on CRT-RSA: better cryptanalysis to full size encryption exponents A Takayasu, N Kunihiro International Conference on Applied Cryptography and Network Security, 518-537, 2015 | 19 | 2015 |
L1-norm ball for CSIDH: Optimal strategy for choosing the secret key space K Nakagawa, H Onuki, A Takayasu, T Takagi Discrete Applied Mathematics 328, 70-88, 2023 | 14 | 2023 |
Adaptively secure revocable hierarchical IBE from k-linear assumption K Emura, A Takayasu, Y Watanabe Designs, Codes and Cryptography 89 (7), 1535-1574, 2021 | 13 | 2021 |
Partial key exposure attacks on CRT-RSA: general improvement for the exposed least significant bits A Takayasu, N Kunihiro International Conference on Information Security, 35-47, 2016 | 13 | 2016 |
Adaptively secure lattice-based revocable IBE in the QROM: compact parameters, tight security, and anonymity A Takayasu Designs, Codes and Cryptography 89 (8), 1965-1992, 2021 | 10 | 2021 |
Generic constructions of revocable hierarchical identity-based encryption K Emura, A Takayasu, Y Watanabe Cryptology ePrint Archive, 2021 | 10 | 2021 |
Partial key exposure attacks on RSA with multiple exponent pairs A Takayasu, N Kunihiro Australasian Conference on Information Security and Privacy, 243-257, 2016 | 10 | 2016 |
Revocable identity-based encryption with bounded decryption key exposure resistance: Lattice-based construction and more A Takayasu, Y Watanabe Theoretical Computer Science 849, 64-98, 2021 | 9 | 2021 |
Extended partial key exposure attacks on RSA: improvement up to full size decryption exponents K Suzuki, A Takayasu, N Kunihiro Theoretical Computer Science 841, 62-83, 2020 | 9 | 2020 |