Yasuhiko Ikematsu

Orcid: 0000-0002-9714-2675

According to our database1, Yasuhiko Ikematsu authored at least 32 papers between 2016 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Hilbert Series for Systems of UOV Polynomials.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2024

Revisiting the security analysis of SNOVA.
IACR Cryptol. ePrint Arch., 2024

2023
Recent progress in the security evaluation of multivariate public-key cryptography.
IET Inf. Secur., March, 2023

A New Analysis of the Kipnis-Shamir Method Solving the MinRank Problem.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., March, 2023

A security analysis on MQ-Sign.
IACR Cryptol. ePrint Arch., 2023

A New Security Analysis Against MAYO and QR-UOV Using Rectangular MinRank Attack.
Proceedings of the Advances in Information and Computer Security, 2023

2022
Three-Pass Identification Scheme Based on MinRank Problem with Half Cheating Probability.
CoRR, 2022

Lattice-Based Public Key Cryptosystems Invoking Linear Mapping Mask.
Proceedings of the Provable and Practical Security, 2022

2021
New complexity estimation on the Rainbow-Band-Separation attack.
Theor. Comput. Sci., 2021

Algebraic approaches for solving isogeny problems of prime power degrees.
J. Math. Cryptol., 2021

Security Analysis on an El-Gamal-like Multivariate Encryption Scheme Based on Isomorphism of Polynomials.
IACR Cryptol. ePrint Arch., 2021

A Trace Map Attack Against Special Ring-LWE Samples.
Proceedings of the Advances in Information and Computer Security, 2021

Security Analysis via Algebraic Attack Against "A New Encryption Scheme for Multivariate Quadratic System".
Proceedings of the Seventh International Conference on Mathematics and Computing, 2021

A Study on Randomness Used in Signature Generation of UOV.
Proceedings of the Seventh International Conference on Mathematics and Computing, 2021

Security Analysis on an ElGamal-Like Multivariate Encryption Scheme Based on Isomorphism of Polynomials.
Proceedings of the Information Security and Cryptology - 17th International Conference, 2021

2020
Analysis on the MinRank Attack using Kipnis-Shamir Method Against Rainbow.
IACR Cryptol. ePrint Arch., 2020

Security Analysis Against "A New Encryption Scheme for Multivariate Quadratic Systems".
IACR Cryptol. ePrint Arch., 2020

A New Variant of Unbalanced Oil and Vinegar Using Quotient Ring: QR-UOV.
IACR Cryptol. ePrint Arch., 2020

Revisiting the Minrank Problem on Multivariate Cryptography.
Proceedings of the Information Security Applications - 21st International Conference, 2020

A Structural Attack on Block-Anti-Circulant UOV at SAC 2019.
Proceedings of the Post-Quantum Cryptography - 11th International Conference, 2020

Solving the Search-LWE Problem by Lattice Reduction over Projected Bases.
Proceedings of the Sixth International Conference on Mathematics and Computing, 2020

Dynamic Self-dual DeepBKZ Lattice Reduction with Free Dimensions.
Proceedings of the Sixth International Conference on Mathematics and Computing, 2020

Cryptanalysis of GiophantusTM Schemes against Hybrid Attack.
Proceedings of the 7th on ASIA Public-Key Cryptography Workshop, 2020

Hybrid Meet-in-the-Middle Attacks for the Isogeny Path-Finding Problem.
Proceedings of the 7th on ASIA Public-Key Cryptography Workshop, 2020

2019
Chosen Message Attack on Multivariate Signature ELSA at Asiacrypt 2017.
J. Inf. Process., 2019

The Secure Parameters and Efficient Decryption Algorithm for Multivariate Public Key Cryptosystem EFC.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2019

2018
An Efficient Key Generation of ZHFE Public Key Cryptosystem.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2018

HFERP - A New Multivariate Encryption Scheme.
Proceedings of the Post-Quantum Cryptography - 9th International Conference, 2018

An Improvement on the Linear Algebraic Attack for the Indeterminate Equation Encryption Scheme.
Proceedings of the International Symposium on Information Theory and Its Applications, 2018

Efficient Decryption Algorithms for Extension Field Cancellation Type Encryption Schemes.
Proceedings of the Information Security and Privacy - 23rd Australasian Conference, 2018

2017
A Public-key Encryption Scheme Based on Non-linear Indeterminate Equations (Giophantus).
IACR Cryptol. ePrint Arch., 2017

2016
Revisiting the Efficient Key Generation of ZHFE.
IACR Cryptol. ePrint Arch., 2016


  Loading...