Yasufumi Hashimoto

Orcid: 0000-0001-6011-1683

According to our database1, Yasufumi Hashimoto authored at least 28 papers between 2009 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
An improvement of algorithms to solve under-defined systems of multivariate quadratic equations.
JSIAM Lett., 2023

2022
Key recovery attack on Hufu-UOV.
JSIAM Lett., 2022

An elementary construction of QR-UOV.
IACR Cryptol. ePrint Arch., 2022

2021
On the modifier Q for multivariate signature schemes.
IACR Cryptol. ePrint Arch., 2021

Minor improvements of algorithm to solve under-defined systems of multivariate quadratic equations.
IACR Cryptol. ePrint Arch., 2021

On the security of Hufu-UOV.
IACR Cryptol. ePrint Arch., 2021

Solving the Problem of Blockwise Isomorphism of Polynomials with Circulant Matrices.
Proceedings of the Advances in Information and Computer Security, 2021

2020
On the security of Diene-Thabet-Yusuf's cubic multivariate signature scheme.
IACR Cryptol. ePrint Arch., 2020

2019
Key recovery attack on Circulant UOV/Rainbow.
JSIAM Lett., 2019

A note on the multivariate cryptosystem based on a linear code.
IACR Cryptol. ePrint Arch., 2019

2018
High-rank attack on HMFEv.
JSIAM Lett., 2018

On the security of Circulant UOV/Rainbow.
IACR Cryptol. ePrint Arch., 2018

Chosen Message Attack on Multivariate Signature ELSA at Asiacrypt 2017.
Proceedings of the Advances in Information and Computer Security, 2018

2017
Chosen ciphertext attack on ZHFE.
JSIAM Lett., 2017

Key Recovery Attacks on Multivariate Public Key Cryptosystems Derived from Quadratic Forms over an Extension Field.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2017

On the security of HMFEv.
IACR Cryptol. ePrint Arch., 2017

Multivariate Public Key Cryptosystems.
Proceedings of the Mathematical Modelling for Next-Generation Cryptography: CREST Crypto-Math Project, 2017

2016
On the security of Cubic UOV.
IACR Cryptol. ePrint Arch., 2016

On the security of new vinegar-like variant of multivariate signature scheme.
IACR Cryptol. ePrint Arch., 2016

A note on Tensor Simple Matrix Encryption Scheme.
IACR Cryptol. ePrint Arch., 2016

2015
Cryptanalysis of multi-HFE.
IACR Cryptol. ePrint Arch., 2015

2014
Cryptanalysis of the Multivariate Signature Scheme Proposed in PQCrypto 2013.
Proceedings of the Post-Quantum Cryptography - 6th International Workshop, 2014

A Polynomial-Time Algorithm for Solving a Class of Underdetermined Multivariate Quadratic Equations over Fields of Odd Characteristics.
Proceedings of the Post-Quantum Cryptography - 6th International Workshop, 2014

2013
Extended Algorithm for Solving Underdefined Multivariate Quadratic Equations.
Proceedings of the Post-Quantum Cryptography - 5th International Workshop, 2013

Cryptanalysis of the Quaternion Rainbow.
Proceedings of the Advances in Information and Computer Security, 2013

2011
General Fault Attacks on Multivariate Public Key Cryptosystems.
Proceedings of the Post-Quantum Cryptography - 4th International Workshop, 2011

2010
On Small Secret Key Attack against RSA with High Bits Known Prime Factor.
Proceedings of the Advances in Information and Computer Security, 2010

2009
Algorithms to solve massively under-defined systems of multivariate quadratic equations.
IACR Cryptol. ePrint Arch., 2009


  Loading...