Takanori Yasuda

Orcid: 0000-0002-2536-7429

According to our database1, Takanori Yasuda authored at least 28 papers between 2011 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
A security analysis on MQ-Sign.
IACR Cryptol. ePrint Arch., 2023

2022
Three-Pass Identification Scheme Based on MinRank Problem with Half Cheating Probability.
CoRR, 2022

Lattice-Based Public Key Cryptosystems Invoking Linear Mapping Mask.
Proceedings of the Provable and Practical Security, 2022

2021
Security Analysis on an El-Gamal-like Multivariate Encryption Scheme Based on Isomorphism of Polynomials.
IACR Cryptol. ePrint Arch., 2021

Security Analysis on an ElGamal-Like Multivariate Encryption Scheme Based on Isomorphism of Polynomials.
Proceedings of the Information Security and Cryptology - 17th International Conference, 2021

2020
Multivariate Encryption Schemes Based on Polynomial Equations over Real Numbers.
Proceedings of the Post-Quantum Cryptography - 11th International Conference, 2020

2019
RSA public keys with inside structure: Proofs of key generation and identities for web-of-trust.
J. Inf. Secur. Appl., 2019

2018
Multivariate Encryption Schemes Based on the Constrained MQ Problem.
Proceedings of the Provable Security, 2018

2015
Characterizing NTRU-Variants Using Group Ring and Evaluating their Lattice Security.
IACR Cryptol. ePrint Arch., 2015

MQ Challenge: Hardness Evaluation of Solving Multivariate Quadratic Problems.
IACR Cryptol. ePrint Arch., 2015

A multivariate quadratic challenge toward post-quantum generation cryptography.
ACM Commun. Comput. Algebra, 2015

Application of NTRU Using Group Rings to Partial Decryption Technique.
Proceedings of the Trusted Systems - 7th International Conference, 2015

A Multivariate Encryption Scheme with Rainbow.
Proceedings of the Information and Communications Security - 17th International Conference, 2015

Constructing Pairing-Friendly Elliptic Curves Using Global Number Fields.
Proceedings of the Third International Symposium on Computing and Networking, 2015

2014
Heuristic counting of Kachisa-Schaefer-Scott curves.
JSIAM Lett., 2014

Efficient variant of Rainbow using sparse secret keys.
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2014

Fast Evaluation of Multivariate Quadratic Polynomials over GF(2^32) using Grahpics Processing Units.
J. Internet Serv. Inf. Secur., 2014

Security of Multivariate Signature Scheme Using Non-commutative Rings.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2014

Efficient Variant of Rainbow without Triangular Matrix Representation.
Proceedings of the Information and Communication Technology, 2014

Implementation of Efficient Operations over GF(232) Using Graphics Processing Units.
Proceedings of the Information and Communication Technology, 2014

Parallelization of QUAD Stream Cipher Using Linear Recurring Sequences on Graphics Processing Units.
Proceedings of the Second International Symposium on Computing and Networking, 2014

2013
Multivariate Signature Scheme Using Quadratic Forms.
Proceedings of the Post-Quantum Cryptography - 5th International Workshop, 2013

Efficient Computing over GF(2^16) Using Graphics Processing Unit.
Proceedings of the Seventh International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2013

A variant of rainbow with shorter secret key and faster signature generation.
Proceedings of the first ACM workshop on Asia public-key cryptography, 2013

Upper bound of the length of information embedd in RSA public key efficiently.
Proceedings of the first ACM workshop on Asia public-key cryptography, 2013

2012
Application of Scalar Multiplication of Edwards Curves to Pairing-Based Cryptography.
Proceedings of the Advances in Information and Computer Security, 2012

Reducing the Key Size of Rainbow Using Non-commutative Rings.
Proceedings of the Topics in Cryptology - CT-RSA 2012 - The Cryptographers' Track at the RSA Conference 2012, San Francisco, CA, USA, February 27, 2012

2011
A Security Analysis of Uniformly-Layered Rainbow - Revisiting Sato-Araki's Non-commutative Approach to Ong-Schnorr-Shamir Signature towards PostQuantum Paradigm.
Proceedings of the Post-Quantum Cryptography - 4th International Workshop, 2011


  Loading...