Katsuyuki Takashima

Orcid: 0000-0001-5216-2229

According to our database1, Katsuyuki Takashima authored at least 50 papers between 2004 and 2025.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2025
On Lattice Isomorphism Problems for Lattices from LCD Codes over Finite Rings.
CoRR, July, 2025

2022
Compact FE for Unbounded Attribute-Weighted Sums for Logspace from SXDH.
Proceedings of the Advances in Cryptology - ASIACRYPT 2022, 2022

2021
Improved supersingularity testing of elliptic curves.
JSIAM Lett., 2021

Decomposed Richelot isogenies of Jacobian varieties of hyperelliptic curves and generalized Howe curves.
CoRR, 2021

Implementation Report of the Kohel-Lauter-Petit-Tignol Algorithm for the Constructive Deuring Correspondence.
Proceedings of the Seventh International Conference on Mathematics and Computing, 2021

2020
Decentralized Attribute-Based Encryption and Signatures.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2020

Counting superspecial Richelot isogenies and its cryptographic application.
CoRR, 2020

An Efficient Authenticated Key Exchange from Random Self-reducibility on CSIDH.
Proceedings of the Information Security and Cryptology - ICISC 2020, 2020

Hybrid Meet-in-the-Middle Attacks for the Isogeny Path-Finding Problem.
Proceedings of the 7th on ASIA Public-Key Cryptography Workshop, 2020

2019
Fully Secure Functional Encryption with a Large Class of Relations from the Decisional Linear Assumption.
J. Cryptol., 2019

One-Round Authenticated Group Key Exchange from Isogenies.
Proceedings of the Provable Security, 2019

Efficient Attribute-Based Signatures for Unbounded Arithmetic Branching Programs.
Proceedings of the Public-Key Cryptography - PKC 2019, 2019

Group Key Exchange from CSIDH and Its Application to Trusted Setup in Supersingular Isogeny Cryptosystems.
Proceedings of the Information Security and Cryptology - 15th International Conference, 2019

2018
Multi-party Key Exchange Protocols from Supersingular Isogenies.
Proceedings of the International Symposium on Information Theory and Its Applications, 2018

New Assumptions on Isogenous Pairing Groups with Applications to Attribute-Based Encryption.
Proceedings of the Information Security and Cryptology - ICISC 2018, 2018

Supersingular Isogeny Diffie-Hellman Authenticated Key Exchange.
Proceedings of the Information Security and Cryptology - ICISC 2018, 2018

Unbounded Inner Product Functional Encryption from Bilinear Maps.
Proceedings of the Advances in Cryptology - ASIACRYPT 2018, 2018

Adaptively Simulation-Secure Attribute-Hiding Predicate Encryption.
Proceedings of the Advances in Cryptology - ASIACRYPT 2018, 2018

2017
Constructing an efficient hash function from $3$-isogenies.
JSIAM Lett., 2017

New Proof Techniques for DLIN-Based Adaptively Secure Attribute-Based Encryption.
Proceedings of the Information Security and Privacy - 22nd Australasian Conference, 2017

Efficient Algorithms for Isogeny Sequences and Their Cryptographic Applications.
Proceedings of the Mathematical Modelling for Next-Generation Cryptography: CREST Crypto-Math Project, 2017

2016
Pairing Cryptography Meets Isogeny: A New Framework of Isogenous Pairing Groups.
IACR Cryptol. ePrint Arch., 2016

2015
Dual Pairing Vector Spaces and Their Applications.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2015

New Proof Techniques for DLIN-Based Adaptively Secure Attribute-Based Encryption and Their Application.
IACR Cryptol. ePrint Arch., 2015

Tighter Security for Efficient Lattice Cryptography via the Rényi Divergence of Optimized Orders.
Proceedings of the Provable Security, 2015

2014
Heuristic counting of Kachisa-Schaefer-Scott curves.
JSIAM Lett., 2014

Expressive Attribute-Based Encryption with Constant-Size Ciphertexts from the Decisional Linear Assumption.
Proceedings of the Security and Cryptography for Networks - 9th International Conference, 2014

Recent Topics on Practical Functional Encryption.
Proceedings of the Second International Symposium on Computing and Networking, 2014

2013
Computing a Sequence of 2-Isogenies on Supersingular Elliptic Curves.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2013

Efficient (Hierarchical) Inner-Product Encryption Tightly Reduced from the Decisional Linear Assumption.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2013

Fully-Anonymous Functional Proxy-Re-Encryption.
IACR Cryptol. ePrint Arch., 2013

Decentralized Attribute-Based Signatures.
Proceedings of the Public-Key Cryptography - PKC 2013 - 16th International Conference on Practice and Theory in Public-Key Cryptography, Nara, Japan, February 26, 2013

Predicate- and Attribute-Hiding Inner Product Encryption in a Public Key Setting.
Proceedings of the Pairing-Based Cryptography - Pairing 2013, 2013

2012
Provably-Secure Cancelable Biometrics Using 2-DNF Evaluation.
Inf. Media Technol., 2012

Adaptively Attribute-Hiding (Hierarchical) Inner Product Encryption.
Proceedings of the Advances in Cryptology - EUROCRYPT 2012, 2012

Fully Secure Unbounded Inner-Product and Attribute-Based Encryption.
Proceedings of the Advances in Cryptology - ASIACRYPT 2012, 2012

2011
Efficient Attribute-Based Signatures for Non-monotone Predicates in the Standard Model.
Proceedings of the Public Key Cryptography - PKC 2011, 2011

Achieving Short Ciphertexts or Short Secret-Keys for Adaptively Secure General Inner-Product Encryption.
Proceedings of the Cryptology and Network Security - 10th International Conference, 2011

Some Key Techniques on Pairing Vector Spaces.
Proceedings of the Progress in Cryptology - AFRICACRYPT 2011, 2011

2010
Fully Secure Functional Encryption: Attribute-Based Encryption and (Hierarchical) Inner Product Encryption.
Proceedings of the Advances in Cryptology - EUROCRYPT 2010, 29th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Monaco / French Riviera, May 30, 2010

Fully Secure Functional Encryption with General Relations from the Decisional Linear Assumption.
Proceedings of the Advances in Cryptology, 2010

2009
Hierarchical Predicate Encryption for Inner-Products.
Proceedings of the Advances in Cryptology, 2009

2008
Homomorphic Encryption and Signatures from Vector Decomposition.
Proceedings of the Pairing-Based Cryptography, 2008

Simple Algorithms for Computing a Sequence of 2-Isogenies.
Proceedings of the Information Security and Cryptology, 2008

Efficiently Computable Distortion Maps for Supersingular Curves.
Proceedings of the Algorithmic Number Theory, 8th International Symposium, 2008

2007
Scaling Security of Elliptic Curves with Fast Pairing Using Efficient Endomorphisms.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2007

2006
Practical Application of Lattice Basis Reduction Algorithm to Side-Channel Analysis on (EC)DSA.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2006

A New Type of Fast Endomorphisms on Jacobians of Hyperelliptic Curves and Their Cryptographic Application.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2006

2005
Practical Modifications of Leadbitter et al.'s Repeated-Bits Side-Channel Analysis on (EC)DSA.
Proceedings of the Information Security Applications, 6th International Workshop, 2005

2004
New Families of Hyperelliptic Curves with Efficient Gallant-Lambert-Vanstone Method.
Proceedings of the Information Security and Cryptology, 2004


  Loading...