| Publication | Date of Publication | Type |
|---|
On the weak key of post-quantum key agreement SAA-5 JSIAM Letters | 2024-11-18 | Paper |
Explicit addition formulae on hyperelliptic curves of genus 2 for isogeny-based cryptography JSIAM Letters | 2024-09-10 | Paper |
Fast Enumeration Algorithm for Multivariate Polynomials over General Finite Fields | 2024-04-26 | Paper |
Correction to: ``Efficient search for superspecial hyperelliptic curves of genus four with automorphism group containing \({\mathbf{C}}_6\) Mathematics in Computer Science | 2024-02-06 | Paper |
Memory-efficient quantum information set decoding algorithm | 2024-01-11 | Paper |
Improvement of the square-root Vélu's formulas for isogeny-based cryptography JSIAM Letters | 2023-12-19 | Paper |
Spherical Gaussian leftover hash lemma via the Rényi divergence | 2023-11-09 | Paper |
How to construct CSIDH on Edwards curves Finite Fields and their Applications | 2023-11-07 | Paper |
Efficient search for superspecial hyperelliptic curves of genus four with automorphism group containing \(\mathbf{C}_6\) Mathematics in Computer Science | 2023-10-24 | Paper |
A new fault attack on UOV multivariate signature scheme Post-Quantum Cryptography | 2023-07-07 | Paper |
A New Variant of Unbalanced Oil and Vinegar Using Quotient Ring: QR-UOV Lecture Notes in Computer Science | 2023-05-26 | Paper |
Short lattice signatures in the standard model with efficient tag generation | 2023-03-21 | Paper |
SiGamal: a supersingular isogeny-based PKE and its application to a PRF | 2023-03-21 | Paper |
\( L_1\)-norm ball for CSIDH: optimal strategy for choosing the secret key space Discrete Applied Mathematics | 2023-02-22 | Paper |
The multi-variable modular polynomial and its applications to cryptography | 2023-01-25 | Paper |
Improving Fault Attacks on Rainbow with Fixing Random Vinegar Values | 2023-01-18 | Paper |
A physical study of the LLL algorithm Journal of Number Theory | 2023-01-12 | Paper |
A Compact Digital Signature Scheme Based on the Module-LWR Problem 1515.94104 | 2022-12-21 | Paper |
Explicit construction of the square-root Vélu's formula on Edwards curves JSIAM Letters | 2022-11-09 | Paper |
Choosing parameters for the subfield lattice attack against overstretched NTRU | 2022-11-02 | Paper |
Cryptanalysis of efficient proxy signature schemes for mobile communication Science China Information Sciences | 2022-10-28 | Paper |
Group Key Exchange from CSIDH and Its Application to Trusted Setup in Supersingular Isogeny Cryptosystems Information Security and Cryptology | 2022-10-14 | Paper |
A structural attack on block-anti-circulant UOV at SAC 2019 Post-Quantum Cryptography | 2022-10-13 | Paper |
Multivariate encryption schemes based on polynomial equations over real numbers Post-Quantum Cryptography | 2022-10-13 | Paper |
Secure and Efficient Pairing at 256-Bit Security Level | 2022-07-01 | Paper |
Comments on efficient batch verification test for digital signatures based on elliptic curves Mathematica Slovaca | 2022-06-14 | Paper |
Shortest vectors in lattices of Bai-Galbraith's embedding attack on the LWR problem | 2022-04-22 | Paper |
(Short paper) Simple matrix signature scheme | 2022-04-22 | Paper |
An efficient authenticated key exchange from random self-reducibility on CSIDH | 2022-03-24 | Paper |
Improving Thomae-Wolf algorithm for solving underdetermined multivariate quadratic polynomial problem | 2022-03-22 | Paper |
New complexity estimation on the rainbow-band-separation attack Theoretical Computer Science | 2021-11-18 | Paper |
Improving key mismatch attack on NewHope with fewer queries | 2021-06-08 | Paper |
A physical study of the LLL algorithm | 2021-06-03 | Paper |
On collisions related to an ideal class of order 3 in CSIDH | 2021-02-23 | Paper |
How to construct CSIDH on Edwards curves | 2020-08-05 | Paper |
An experimental study of Kannan's embedding technique for the search LWE problem Information and Communications Security | 2020-07-20 | Paper |
One sample ring-LWE with rounding and its application to key exchange | 2020-01-30 | Paper |
Tight reductions for Diffie-Hellman variants in the algebraic group model | 2020-01-28 | Paper |
On the complexity of the LWR-solving BKW algorithm | 2019-03-29 | Paper |
Efficient system parameters for identity-based encryption using supersingular elliptic curves JSIAM Letters | 2019-03-18 | Paper |
An experiment of number field sieve for discrete logarithm problem over \(\mathrm{GF}(p^n)\) JSIAM Letters | 2019-03-18 | Paper |
Heuristic counting of Kachisa-Schaefer-Scott curves JSIAM Letters | 2019-03-18 | Paper |
Constructing an efficient hash function from \(3\)-isogenies JSIAM Letters | 2019-03-18 | Paper |
Security analysis of cryptosystems using short generators over ideal lattices Japan Journal of Industrial and Applied Mathematics | 2018-12-21 | Paper |
Cryptanalysis of a public key cryptosystem based on Diophantine equations via weighted LLL reduction Japan Journal of Industrial and Applied Mathematics | 2018-12-07 | Paper |
Cryptanalysis of a public key cryptosystem based on Diophantine equations via weighted LLL reduction (short paper) | 2018-10-24 | Paper |
Chosen message attack on multivariate signature ELSA at Asiacrypt 2017 | 2018-10-24 | Paper |
Estimated cost for solving generalized learning with errors problem via embedding techniques | 2018-10-24 | Paper |
The Beauty and the Beasts -- the hard cases in LLL reduction | 2018-10-24 | Paper |
Efficient decryption algorithms for extension field cancellation type encryption schemes | 2018-09-26 | Paper |
Improving the BKZ reduction algorithm by quick reordering technique | 2018-09-26 | Paper |
Some properties of \(\tau\)-adic expansions on hyperelliptic Koblitz curves Journal of Applied Mathematics and Computing | 2018-09-25 | Paper |
HFERP -- a new multivariate encryption scheme | 2018-06-22 | Paper |
A public-key encryption scheme based on non-linear indeterminate equations | 2018-04-26 | Paper |
LLL and stochastic sandpile models | 2018-04-07 | Paper |
Short-Memory Scalar Multiplication for Koblitz Curves IEEE Transactions on Computers | 2017-11-10 | Paper |
One-Wayness Equivalent to General Factoring IEEE Transactions on Information Theory | 2017-08-08 | Paper |
Algorithms and Arithmetic Operators for Computing the ηT Pairing in Characteristic Three IEEE Transactions on Computers | 2017-08-08 | Paper |
A multivariate quadratic challenge toward post-quantum generation cryptography ACM Communications in Computer Algebra | 2017-06-22 | Paper |
Revisiting the efficient key generation of ZHFE Codes, Cryptology and Information Security | 2017-06-01 | Paper |
Revisiting the cubic UOV signature scheme Information Security and Cryptology – ICISC 2016 | 2017-05-19 | Paper |
Anonymous spatial encryption under affine space delegation functionality with full security Information Sciences | 2017-01-31 | Paper |
On tameness of Matsumoto-Imai central maps in three variables over the finite field \(\mathbb F_2\) Advances in Mathematics of Communications | 2016-10-12 | Paper |
Improved progressive BKZ algorithms and their precise cost estimation by sharp simulator Advances in Cryptology – EUROCRYPT 2016 | 2016-09-09 | Paper |
Reducing the key size of the SRP encryption scheme Information Security and Privacy | 2016-09-02 | Paper |
Privacy-preserving \(k\)-nearest neighbour query on outsourced database Information Security and Privacy | 2016-08-31 | Paper |
Improvement of FPPR method to solve ECDLP Pacific Journal of Mathematics for Industry | 2016-08-12 | Paper |
Mathematics of post-quantum cryptography (to appear) Mathematics for Industry | 2016-03-11 | Paper |
Power analysis to ECC using differential power between multiplication and squaring Smart Card Research and Advanced Applications | 2015-11-11 | Paper |
Cheater Identifiable Secret Sharing Schemes via Multi-Receiver Authentication Advances in Information and Computer Security | 2015-05-27 | Paper |
Certificateless hybrid signcryption Mathematical and Computer Modelling | 2015-02-19 | Paper |
A polynomial-time algorithm for solving a class of underdetermined multivariate quadratic equations over fields of odd characteristics Post-Quantum Cryptography | 2015-01-14 | Paper |
Identity-based partially blind signature in the standard model for electronic cash Mathematical and Computer Modelling | 2014-10-21 | Paper |
Efficient Algorithm for Tate Pairing of Composite Order Advances in Information and Computer Security | 2014-09-15 | Paper |
Improvement of Faugère et al.'s method to solve ECDLP Advances in Information and Computer Security | 2014-09-15 | Paper |
On cheater identifiable secret sharing schemes secure against rushing adversary Advances in Information and Computer Security | 2014-09-15 | Paper |
Secure identity-based signcryption in the standard model Mathematical and Computer Modelling | 2014-05-14 | Paper |
Parallel Gauss sieve algorithm: solving the SVP challenge over a 128-dimensional ideal lattice Public-Key Cryptography – PKC 2014 | 2014-03-25 | Paper |
An experiment of number field sieve for discrete logarithm problem over \(\mathrm{GF}(p^{12})\) Lecture Notes in Computer Science | 2013-12-10 | Paper |
Further improvement of an identity-based signcryption scheme in the standard model Computers and Electrical Engineering | 2013-08-19 | Paper |
An exhaustive search method to find all small solutions of a multivariate modular linear equation JSIAM Letters | 2013-08-09 | Paper |
Attacks on multi-prime RSA with small prime difference Information Security and Privacy | 2013-06-28 | Paper |
Multivariate Signature Scheme Using Quadratic Forms Post-Quantum Cryptography | 2013-06-14 | Paper |
Extended algorithm for solving underdefined multivariate quadratic equations Post-Quantum Cryptography | 2013-06-14 | Paper |
Batch verification suitable for efficiently verifying a limited number of signatures Lecture Notes in Computer Science | 2013-06-04 | Paper |
Efficient secure primitive for privacy preserving distributed computations Advances in Information and Computer Security | 2013-04-04 | Paper |
Application of scalar multiplication of Edwards curves to pairing-based cryptography Advances in Information and Computer Security | 2013-04-04 | Paper |
Breaking Pairing-Based Cryptosystems Using η T Pairing over GF(397) Advances in Cryptology – ASIACRYPT 2012 | 2013-03-19 | Paper |
Zero-knowledge protocols for the McEliece encryption Information Security and Privacy | 2012-09-07 | Paper |
Group-oriented setting's multisigncryption scheme with threshold designcryption Information Sciences | 2012-07-13 | Paper |
Key Length Estimation of Pairing-Based Cryptosystems Using η T Pairing Information Security Practice and Experience | 2012-06-29 | Paper |
Reducing the key size of rainbow using non-commutative rings Lecture Notes in Computer Science | 2012-06-08 | Paper |
General Fault Attacks on Multivariate Public Key Cryptosystems Post-Quantum Cryptography | 2011-11-25 | Paper |
Efficient identity-based signcryption in the standard model Provable Security | 2011-09-16 | Paper |
Anonymous encryption with partial-order subset delegation functionality Provable Security | 2011-09-16 | Paper |
GeoENC: geometric area based keys and policies in functional encryption systems Information Security and Privacy | 2011-07-07 | Paper |
An experiment of number field sieve over \(\mathrm{GF}(p)\) of low Hamming weight characteristic Lecture Notes in Computer Science | 2011-06-08 | Paper |
Pairing-based cryptography and its security analysis | 2011-05-06 | Paper |
Some properties of ${\tau}$-adic expansions on hyperelliptic Koblitz curves | 2011-01-21 | Paper |
Efficient arithmetic on subfield elliptic curves over small finite fields of odd characteristic Journal of Mathematical Cryptology | 2011-01-13 | Paper |
On the zero-run length of a signed binary representation | 2010-09-14 | Paper |
Solving a 676-bit discrete logarithm problem in \(\text{GF}(3^{6n})\) Public Key Cryptography – PKC 2010 | 2010-05-28 | Paper |
FPGA and ASIC implementations of the \(\eta _T\) pairing in characteristic three Computers and Electrical Engineering | 2010-04-07 | Paper |
A more flexible countermeasure against side channel attacks using window method. Lecture Notes in Computer Science | 2010-03-09 | Paper |
Pairing-based cryptography and its security analysis | 2010-02-24 | Paper |
Zero-Value Point Attacks on Elliptic Curve Cryptosystem Lecture Notes in Computer Science | 2010-02-09 | Paper |
A complete and explicit security reduction algorithm for RSA-based cryptosystems Lecture Notes in Computer Science | 2010-01-05 | Paper |
Some RSA-based encryption schemes with tight security reduction Lecture Notes in Computer Science | 2010-01-05 | Paper |
Generalized powering functions and their application to digital signatures Lecture Notes in Computer Science | 2010-01-05 | Paper |
An efficient residue group multiplication for the \(\eta _{T }\) pairing over \({\mathbb F}_{3^m}\) Selected Areas in Cryptography | 2009-12-09 | Paper |
Public Key Cryptography – PKC 2004 Lecture Notes in Computer Science | 2009-05-14 | Paper |
Efficient Signcryption Key Encapsulation without Random Oracles Information Security and Cryptology | 2009-04-29 | Paper |
Efficient Multi-PKG ID-Based Signcryption for Ad Hoc Networks Information Security and Cryptology | 2009-04-29 | Paper |
Further Security Analysis of XTR Information Security Practice and Experience | 2009-04-02 | Paper |
Compressed XTR Applied Cryptography and Network Security | 2009-03-10 | Paper |
New Security Problem in RFID Systems “Tag Killing” Computational Science and Its Applications - ICCSA 2006 | 2009-02-10 | Paper |
Faster Implementation of η T Pairing over GF(3 m ) Using Minimum Number of Logical Instructions for GF(3)-Addition Pairing-Based Cryptography – Pairing 2008 | 2009-02-10 | Paper |
Side Channel Attacks and Countermeasures on Pairing Based Cryptosystems over Binary Fields Cryptology and Network Security | 2009-01-09 | Paper |
On the Security of Online/Offline Signatures and Multisignatures from ACISP’06 Cryptology and Network Security | 2009-01-09 | Paper |
Digital Signatures Out of Second-Preimage Resistant Hash Functions Post-Quantum Cryptography | 2008-11-11 | Paper |
Reduction Optimal Trinomials for Efficient Software Implementation of the η T Pairing Advances in Information and Computer Security | 2008-07-25 | Paper |
New Approach for Selectively Convertible Undeniable Signature Schemes Advances in Cryptology – ASIACRYPT 2006 | 2008-04-24 | Paper |
Some Improved Algorithms for Hyperelliptic Curve Cryptosystems Using Degenerate Divisors Lecture Notes in Computer Science | 2008-03-17 | Paper |
A Coprocessor for the Final Exponentiation of the η T Pairing in Characteristic Three Arithmetic of Finite Fields | 2007-11-15 | Paper |
Analysis of fractional window recoding methods and their application to elliptic curve cryptosystems IEEE Transactions on Computers | 2007-01-09 | Paper |
Information Security Lecture Notes in Computer Science | 2006-10-16 | Paper |
Progress in Cryptology – Mycrypt 2005 Lecture Notes in Computer Science | 2006-10-05 | Paper |
scientific article; zbMATH DE number 5056807 (Why is no real title available?) | 2006-09-25 | Paper |
Information Security and Privacy Lecture Notes in Computer Science | 2006-06-22 | Paper |
Information Security and Privacy Lecture Notes in Computer Science | 2006-06-22 | Paper |
Progress in Cryptology - INDOCRYPT 2004 Lecture Notes in Computer Science | 2005-12-22 | Paper |
Progress in Cryptology - INDOCRYPT 2004 Lecture Notes in Computer Science | 2005-12-22 | Paper |
Information Security and Privacy Lecture Notes in Computer Science | 2005-09-07 | Paper |
Contemporary cryptology. Advanced Courses in Mathematics -- CRM Barcelona | 2005-08-30 | Paper |
Advances in Cryptology – CRYPTO 2004 Lecture Notes in Computer Science | 2005-08-23 | Paper |
Applied Cryptography and Network Security Lecture Notes in Computer Science | 2005-06-13 | Paper |
scientific article; zbMATH DE number 2154276 (Why is no real title available?) | 2005-04-08 | Paper |
scientific article; zbMATH DE number 2085418 (Why is no real title available?) | 2004-08-09 | Paper |
scientific article; zbMATH DE number 2085437 (Why is no real title available?) | 2004-08-09 | Paper |
Efficient undeniable signature schemes based on ideal arithmetic in quadratic orders Designs, Codes and Cryptography | 2004-06-11 | Paper |
scientific article; zbMATH DE number 1980962 (Why is no real title available?) | 2003-09-15 | Paper |
scientific article; zbMATH DE number 1962161 (Why is no real title available?) | 2003-08-10 | Paper |
scientific article; zbMATH DE number 1955800 (Why is no real title available?) | 2003-07-29 | Paper |
Exceptional Procedure Attack on Elliptic Curve Cryptosystems Public Key Cryptography — PKC 2003 | 2003-07-27 | Paper |
scientific article; zbMATH DE number 1950328 (Why is no real title available?) | 2003-07-17 | Paper |
scientific article; zbMATH DE number 1950619 (Why is no real title available?) | 2003-07-17 | Paper |
scientific article; zbMATH DE number 1950624 (Why is no real title available?) | 2003-07-17 | Paper |
scientific article; zbMATH DE number 1950360 (Why is no real title available?) | 2003-07-17 | Paper |
An ethological and emotional basis for human–robot interaction Robotics and Autonomous Systems | 2003-04-03 | Paper |
scientific article; zbMATH DE number 1759644 (Why is no real title available?) | 2002-11-24 | Paper |
How to choose secret parameters for RSA-type cryptosystems over elliptic curves Designs, Codes and Cryptography | 2002-06-10 | Paper |
scientific article; zbMATH DE number 1504551 (Why is no real title available?) | 2002-01-13 | Paper |
scientific article; zbMATH DE number 1504821 (Why is no real title available?) | 2000-11-07 | Paper |
scientific article; zbMATH DE number 1302856 (Why is no real title available?) | 2000-03-08 | Paper |
A new public-key cryptosystem over a quadratic order with quadratic decryption time. Journal of Cryptology | 2000-01-01 | Paper |
scientific article; zbMATH DE number 1303130 (Why is no real title available?) | 1999-09-09 | Paper |
scientific article; zbMATH DE number 1088247 (Why is no real title available?) | 1998-07-06 | Paper |
Product formula of the cubic Gauss sum modulo the product of the primes Journal of Number Theory | 1997-12-03 | Paper |