Atsushi Takayasu
Orcid: 0000-0002-9310-6976
According to our database1,
Atsushi Takayasu
authored at least 44 papers
between 2013 and 2025.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2025
Tight Adaptive Simulation Security for Identity-Based Inner-Product FE in the (Quantum) Random Oracle Model.
Proceedings of the Public-Key Cryptography - PKC 2025, 2025
Proceedings of the Information Security and Privacy - 30th Australasian Conference, 2025
Proceedings of the Information Security and Privacy - 30th Australasian Conference, 2025
2024
Proceedings of the Security and Cryptography for Networks - 14th International Conference, 2024
Proceedings of the Applied Cryptography and Network Security, 2024
2023
A Generic Construction of CCA-Secure Identity-Based Encryption with Equality Test against Insider Attacks.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., March, 2023
Discret. Appl. Math., March, 2023
Proceedings of the Information Security and Cryptology - ICISC 2023, 2023
Proceedings of the Topics in Cryptology - CT-RSA 2023, 2023
Proceedings of the Information Security and Privacy - 28th Australasian Conference, 2023
2022
Erratum: A Compact Digital Signature Scheme Based on the Module-LWR Problem [IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences Vol. E104.A (2021), No. 9 pp.1219-1234].
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2022
Proceedings of the Provable and Practical Security, 2022
More Efficient Adaptively Secure Lattice-Based IBE with Equality Test in the Standard Model.
Proceedings of the Information Security - 25th International Conference, 2022
Proceedings of the Applied Cryptography and Network Security, 2022
2021
Revocable identity-based encryption with bounded decryption key exposure resistance: Lattice-based construction and more.
Theor. Comput. Sci., 2021
Adaptively Secure Lattice-based Revocable IBE in the QROM: Compact Parameters, Tight Security, and Anonymity.
IACR Cryptol. ePrint Arch., 2021
More Efficient Adaptively Secure Revocable Hierarchical Identity-based Encryption with Compact Ciphertexts: Achieving Shorter Keys and Tighter Reductions.
IACR Cryptol. ePrint Arch., 2021
IACR Cryptol. ePrint Arch., 2021
2020
Extended partial key exposure attacks on RSA: Improvement up to full size decryption exponents.
Theor. Comput. Sci., 2020
L<sub>1</sub>-Norm Ball for CSIDH: Optimal Strategy for Choosing the Secret Key Space.
IACR Cryptol. ePrint Arch., 2020
IACR Cryptol. ePrint Arch., 2020
IACR Cryptol. ePrint Arch., 2020
Worst case short lattice vector enumeration on block reduced bases of arbitrary blocksizes.
Discret. Appl. Math., 2020
Proceedings of the Information and Communications Security - 22nd International Conference, 2020
2019
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2019
Proceedings of the Public-Key Cryptography - PKC 2019, 2019
Proceedings of the Topics in Cryptology - CT-RSA 2019, 2019
2018
Estimated Cost for Solving Generalized Learning with Errors Problem via Embedding Techniques.
Proceedings of the Advances in Information and Computer Security, 2018
Proceedings of the Information Security and Cryptology - ICISC 2018, 2018
2017
Proceedings of the Advances in Cryptology - EUROCRYPT 2017 - 36th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Paris, France, April 30, 2017
Proceedings of the Topics in Cryptology - CT-RSA 2017, 2017
Lattice-Based Revocable Identity-Based Encryption with Bounded Decryption Key Exposure Resistance.
Proceedings of the Information Security and Privacy - 22nd Australasian Conference, 2017
2016
Proceedings of the Public-Key Cryptography - PKC 2016, 2016
Partial Key Exposure Attacks on CRT-RSA: General Improvement for the Exposed Least Significant Bits.
Proceedings of the Information Security - 19th International Conference, 2016
Proceedings of the 2016 International Symposium on Information Theory and Its Applications, 2016
Proceedings of the Information Security and Privacy - 21st Australasian Conference, 2016
2015
Tighter Security for Efficient Lattice Cryptography via the Rényi Divergence of Optimized Orders.
Proceedings of the Provable Security, 2015
Partial Key Exposure Attacks on CRT-RSA: Better Cryptanalysis to Full Size Encryption Exponents.
Proceedings of the Applied Cryptography and Network Security, 2015
2014
Proceedings of the Selected Areas in Cryptography - SAC 2014, 2014
Proceedings of the Information Security and Cryptology - ICISC 2014, 2014
Proceedings of the Information Security and Privacy - 19th Australasian Conference, 2014
2013
Better Lattice Constructions for Solving Multivariate Linear Equations Modulo Unknown Divisors.
Proceedings of the Information Security and Privacy - 18th Australasian Conference, 2013