Atsushi Takayasu

Orcid: 0000-0002-9310-6976

According to our database1, Atsushi Takayasu authored at least 44 papers between 2013 and 2025.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2025
Tight Adaptive Simulation Security for Identity-Based Inner-Product FE in the (Quantum) Random Oracle Model.
Proceedings of the Public-Key Cryptography - PKC 2025, 2025

Partial Key Exposure Attacks on UOV and Its Variants.
Proceedings of the Information Security and Privacy - 30th Australasian Conference, 2025

Efficient Revocable Identity-Based Encryption from Middle-Product LWE.
Proceedings of the Information Security and Privacy - 30th Australasian Conference, 2025

2024
Attribute-Based Keyed Fully Homomorphic Encryption.
Proceedings of the Security and Cryptography for Networks - 14th International Conference, 2024

On the Untapped Potential of the Quantum FLT-Based Inversion.
Proceedings of the Applied Cryptography and Network Security, 2024

2023
A Generic Construction of CCA-Secure Identity-Based Encryption with Equality Test against Insider Attacks.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., March, 2023

L1-norm ball for CSIDH: Optimal strategy for choosing the secret key space.
Discret. Appl. Math., March, 2023

A Lattice Attack on CRYSTALS-Kyber with Correlation Power Analysis.
Proceedings of the Information Security and Cryptology - ICISC 2023, 2023

Concrete Quantum Cryptanalysis of Binary Elliptic Curves via Addition Chain.
Proceedings of the Topics in Cryptology - CT-RSA 2023, 2023

Memory-Efficient Quantum Information Set Decoding Algorithm.
Proceedings of the Information Security and Privacy - 28th Australasian Conference, 2023

2022
Erratum: A Compact Digital Signature Scheme Based on the Module-LWR Problem [IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences Vol. E104.A (2021), No. 9 pp.1219-1234].
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2022

A Generic Construction of CCA-Secure Attribute-Based Encryption with Equality Test.
Proceedings of the Provable and Practical Security, 2022

More Efficient Adaptively Secure Lattice-Based IBE with Equality Test in the Standard Model.
Proceedings of the Information Security - 25th International Conference, 2022

Keyed-Fully Homomorphic Encryption Without Indistinguishability Obfuscation.
Proceedings of the Applied Cryptography and Network Security, 2022

2021
Revocable identity-based encryption with bounded decryption key exposure resistance: Lattice-based construction and more.
Theor. Comput. Sci., 2021

Adaptively Secure Lattice-based Revocable IBE in the QROM: Compact Parameters, Tight Security, and Anonymity.
IACR Cryptol. ePrint Arch., 2021

More Efficient Adaptively Secure Revocable Hierarchical Identity-based Encryption with Compact Ciphertexts: Achieving Shorter Keys and Tighter Reductions.
IACR Cryptol. ePrint Arch., 2021

Generic Constructions of Revocable Hierarchical Identity-based Encryption.
IACR Cryptol. ePrint Arch., 2021

Tag-based ABE in prime-order groups via pair encoding.
Des. Codes Cryptogr., 2021

2020
Extended partial key exposure attacks on RSA: Improvement up to full size decryption exponents.
Theor. Comput. Sci., 2020

L<sub>1</sub>-Norm Ball for CSIDH: Optimal Strategy for Choosing the Secret Key Space.
IACR Cryptol. ePrint Arch., 2020

Efficient Identity-Based Encryption with Hierarchical Key-Insulation from HIBE.
IACR Cryptol. ePrint Arch., 2020

Adaptively Secure Revocable Hierarchical IBE from k-linear Assumption.
IACR Cryptol. ePrint Arch., 2020

Worst case short lattice vector enumeration on block reduced bases of arbitrary blocksizes.
Discret. Appl. Math., 2020

A Compact Digital Signature Scheme Based on the Module-LWR Problem.
Proceedings of the Information and Communications Security - 22nd International Conference, 2020

2019
Generalized cryptanalysis of small CRT-exponent RSA.
Theor. Comput. Sci., 2019

Explicit Relation between Low-Dimensional LLL-Reduced Bases and Shortest Vectors.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2019

Lattice-Based Revocable (Hierarchical) IBE with Decryption Key Exposure Resistance.
Proceedings of the Public-Key Cryptography - PKC 2019, 2019

Tight Reductions for Diffie-Hellman Variants in the Algebraic Group Model.
Proceedings of the Topics in Cryptology - CT-RSA 2019, 2019

2018
Estimated Cost for Solving Generalized Learning with Errors Problem via Embedding Techniques.
Proceedings of the Advances in Information and Computer Security, 2018

On the Complexity of the LWR-Solving BKW Algorithm.
Proceedings of the Information Security and Cryptology - ICISC 2018, 2018

2017
Small CRT-Exponent RSA Revisited.
Proceedings of the Advances in Cryptology - EUROCRYPT 2017 - 36th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Paris, France, April 30, 2017

A Tool Kit for Partial Key Exposure Attacks on RSA.
Proceedings of the Topics in Cryptology - CT-RSA 2017, 2017

Lattice-Based Revocable Identity-Based Encryption with Bounded Decryption Key Exposure Resistance.
Proceedings of the Information Security and Privacy - 22nd Australasian Conference, 2017

2016
How to Generalize RSA Cryptanalyses.
Proceedings of the Public-Key Cryptography - PKC 2016, 2016

Partial Key Exposure Attacks on CRT-RSA: General Improvement for the Exposed Least Significant Bits.
Proceedings of the Information Security - 19th International Conference, 2016

Small secret exponent attacks on RSA with unbalanced prime factors.
Proceedings of the 2016 International Symposium on Information Theory and Its Applications, 2016

Partial Key Exposure Attacks on RSA with Multiple Exponent Pairs.
Proceedings of the Information Security and Privacy - 21st Australasian Conference, 2016

2015
Tighter Security for Efficient Lattice Cryptography via the Rényi Divergence of Optimized Orders.
Proceedings of the Provable Security, 2015

Partial Key Exposure Attacks on CRT-RSA: Better Cryptanalysis to Full Size Encryption Exponents.
Proceedings of the Applied Cryptography and Network Security, 2015

2014
Partial Key Exposure Attacks on RSA: Achieving the Boneh-Durfee Bound.
Proceedings of the Selected Areas in Cryptography - SAC 2014, 2014

General Bounds for Small Inverse Problems and Its Applications to Multi-Prime RSA.
Proceedings of the Information Security and Cryptology - ICISC 2014, 2014

Cryptanalysis of RSA with Multiple Small Secret Exponents.
Proceedings of the Information Security and Privacy - 19th Australasian Conference, 2014

2013
Better Lattice Constructions for Solving Multivariate Linear Equations Modulo Unknown Divisors.
Proceedings of the Information Security and Privacy - 18th Australasian Conference, 2013


  Loading...