Katsuyuki Takashima
Orcid: 0000-0001-5216-2229
According to our database1,
Katsuyuki Takashima
authored at least 50 papers
between 2004 and 2025.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2025
CoRR, July, 2025
2022
Proceedings of the Advances in Cryptology - ASIACRYPT 2022, 2022
2021
Decomposed Richelot isogenies of Jacobian varieties of hyperelliptic curves and generalized Howe curves.
CoRR, 2021
Implementation Report of the Kohel-Lauter-Petit-Tignol Algorithm for the Constructive Deuring Correspondence.
Proceedings of the Seventh International Conference on Mathematics and Computing, 2021
2020
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2020
CoRR, 2020
Proceedings of the Information Security and Cryptology - ICISC 2020, 2020
Proceedings of the 7th on ASIA Public-Key Cryptography Workshop, 2020
2019
Fully Secure Functional Encryption with a Large Class of Relations from the Decisional Linear Assumption.
J. Cryptol., 2019
Proceedings of the Provable Security, 2019
Proceedings of the Public-Key Cryptography - PKC 2019, 2019
Group Key Exchange from CSIDH and Its Application to Trusted Setup in Supersingular Isogeny Cryptosystems.
Proceedings of the Information Security and Cryptology - 15th International Conference, 2019
2018
Proceedings of the International Symposium on Information Theory and Its Applications, 2018
New Assumptions on Isogenous Pairing Groups with Applications to Attribute-Based Encryption.
Proceedings of the Information Security and Cryptology - ICISC 2018, 2018
Proceedings of the Information Security and Cryptology - ICISC 2018, 2018
Proceedings of the Advances in Cryptology - ASIACRYPT 2018, 2018
Proceedings of the Advances in Cryptology - ASIACRYPT 2018, 2018
2017
Proceedings of the Information Security and Privacy - 22nd Australasian Conference, 2017
Proceedings of the Mathematical Modelling for Next-Generation Cryptography: CREST Crypto-Math Project, 2017
2016
IACR Cryptol. ePrint Arch., 2016
2015
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2015
New Proof Techniques for DLIN-Based Adaptively Secure Attribute-Based Encryption and Their Application.
IACR Cryptol. ePrint Arch., 2015
Tighter Security for Efficient Lattice Cryptography via the Rényi Divergence of Optimized Orders.
Proceedings of the Provable Security, 2015
2014
Expressive Attribute-Based Encryption with Constant-Size Ciphertexts from the Decisional Linear Assumption.
Proceedings of the Security and Cryptography for Networks - 9th International Conference, 2014
Proceedings of the Second International Symposium on Computing and Networking, 2014
2013
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2013
Efficient (Hierarchical) Inner-Product Encryption Tightly Reduced from the Decisional Linear Assumption.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2013
Proceedings of the Public-Key Cryptography - PKC 2013 - 16th International Conference on Practice and Theory in Public-Key Cryptography, Nara, Japan, February 26, 2013
Proceedings of the Pairing-Based Cryptography - Pairing 2013, 2013
2012
Inf. Media Technol., 2012
Proceedings of the Advances in Cryptology - EUROCRYPT 2012, 2012
Proceedings of the Advances in Cryptology - ASIACRYPT 2012, 2012
2011
Efficient Attribute-Based Signatures for Non-monotone Predicates in the Standard Model.
Proceedings of the Public Key Cryptography - PKC 2011, 2011
Achieving Short Ciphertexts or Short Secret-Keys for Adaptively Secure General Inner-Product Encryption.
Proceedings of the Cryptology and Network Security - 10th International Conference, 2011
Proceedings of the Progress in Cryptology - AFRICACRYPT 2011, 2011
2010
Fully Secure Functional Encryption: Attribute-Based Encryption and (Hierarchical) Inner Product Encryption.
Proceedings of the Advances in Cryptology - EUROCRYPT 2010, 29th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Monaco / French Riviera, May 30, 2010
Fully Secure Functional Encryption with General Relations from the Decisional Linear Assumption.
Proceedings of the Advances in Cryptology, 2010
2009
Proceedings of the Advances in Cryptology, 2009
2008
Proceedings of the Pairing-Based Cryptography, 2008
Proceedings of the Information Security and Cryptology, 2008
Proceedings of the Algorithmic Number Theory, 8th International Symposium, 2008
2007
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2007
2006
Practical Application of Lattice Basis Reduction Algorithm to Side-Channel Analysis on (EC)DSA.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2006
A New Type of Fast Endomorphisms on Jacobians of Hyperelliptic Curves and Their Cryptographic Application.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2006
2005
Practical Modifications of Leadbitter et al.'s Repeated-Bits Side-Channel Analysis on (EC)DSA.
Proceedings of the Information Security Applications, 6th International Workshop, 2005
2004
Proceedings of the Information Security and Cryptology, 2004