Yusuke Aikawa

According to our database1, Yusuke Aikawa authored at least 19 papers between 2019 and 2026.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book  In proceedings  Article  PhD thesis  Dataset  Other 

Links

On csauthors.net:

Bibliography

2026
Faster CGL Hash Function via Reduced Backtracking Checks.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2026

Revisiting ISD Algorithms and New Decoding Records for Large Weight Syndrome Decoding over F q.
Proceedings of the 12th International Conference on Information Systems Security and Privacy, 2026

2025
An Improved Both-May Information Set Decoding Algorithm: Towards More Efficient Time-Memory Trade-Offs.
Proceedings of the Post-Quantum Cryptography - 16th International Workshop, 2025

Refined Analysis of the Concrete Hardness of the Quasi-Cyclic Syndrome Decoding.
Proceedings of the Advances in Information and Computer Security, 2025

Lower Bounds of Costs of 3-Isogenies Formulas in the Framework of Generalized Montgomery Coordinates.
Proceedings of the Computer Algebra in Scientific Computing - 27th International Workshop, 2025

2024
Revisiting the May-Meurer-Thomae Algorithm - Solving McEliece-1409 in One Day.
IACR Cryptol. ePrint Arch., 2024

Sieving Method for SDP with the Zero Window: An Improvement in Low Memory Environments.
Proceedings of the Advances in Information and Computer Security, 2024

Solving McEliece-1409 in One Day - Cryptanalysis with the Improved BJMM Algorithm.
Proceedings of the Information Security - 27th International Conference, 2024

A Faster Variant of CGL Hash Function via Efficient Backtracking Checks.
Proceedings of the Information Security - 27th International Conference, 2024

2023
Lower bound of costs of formulas to compute image curves of 3-isogenies in the framework of generalized Montgomery coordinates.
IACR Cryptol. ePrint Arch., 2023

2022
The Generalized Montgomery Coordinate: A New Computational Tool for Isogeny-based Cryptography.
IACR Cryptol. ePrint Arch., 2022

2021
Computational self-testing for entangled magic states.
IACR Cryptol. ePrint Arch., 2021

Implementation Report of the Kohel-Lauter-Petit-Tignol Algorithm for the Constructive Deuring Correspondence.
Proceedings of the Seventh International Conference on Mathematics and Computing, 2021

2020
A Constant-Time Algorithm of CSIDH Keeping Two Points.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2020

The Existence of Cycles in the Supersingular Isogeny Graphs Used in SIKE.
Proceedings of the International Symposium on Information Theory and Its Applications, 2020

An Efficient Authenticated Key Exchange from Random Self-reducibility on CSIDH.
Proceedings of the Information Security and Cryptology - ICISC 2020, 2020

2019
Elliptic Curve Method Using Complex Multiplication Method.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2019

A Faster Constant-time Algorithm of CSIDH keeping Two Torsion Points.
IACR Cryptol. ePrint Arch., 2019

(Short Paper) A Faster Constant-Time Algorithm of CSIDH Keeping Two Points.
Proceedings of the Advances in Information and Computer Security, 2019


  Loading...