Takeshi Shimoyama

From MaRDI portal
(Redirected from Person:505661)



List of research outcomes

This list is not complete and representing at the moment only items from zbMATH Open and arXiv. We are working on additional sources - please check back here soon!

PublicationDate of PublicationType
Block Cipher Modes of Operation for Heterogeneous Format Preserving Encryption
Information Security Practice and Experience
2022-12-09Paper
Recovering Attacks Against Linear Sketch in Fuzzy Signature Schemes of ACNS 2015 and 2016
Information Security Practice and Experience
2022-12-09Paper
Annealing-based algorithm for solving CVP and SVP2022-11-25Paper
Higher Order Differential Attack of a CAST Cipher
Fast Software Encryption
2018-05-09Paper
Analysis of decreasing squared-sum of Gram-Schmidt lengths for short lattice vectors
Journal of Mathematical Cryptology
2017-03-16Paper
Computational hardness of IFP and ECDLP
Applicable Algebra in Engineering, Communication and Computing
2017-01-26Paper
Secret computation of purchase history data using somewhat homomorphic encryption
Pacific Journal of Mathematics for Industry
2015-11-10Paper
Secure statistical analysis using RLWE-based homomorphic encryption
Information Security and Privacy
2015-10-20Paper
Practical packing method in somewhat homomorphic encryption
Data Privacy Management and Autonomous Spontaneous Security
2015-10-01Paper
Packed homomorphic encryption based on ideal lattices and its application to biometrics
Security Engineering and Intelligence Informatics
2014-09-30Paper
On the exact decryption range for Gentry-Halevi's implementation of fully homomorphic encryption
Journal of Mathematical Cryptology
2014-09-17Paper
How to construct sufficient conditions for hash functions
Progress in Cryptology - VIETCRYPT 2006
2014-08-21Paper
Analysis of Lattice Reduction Attack against the Somewhat Homomorphic Encryption Based on Ideal Lattices
Public Key Infrastructures, Services and Applications
2014-08-11Paper
Privacy-Preserving Wildcards Pattern Matching Using Symmetric Somewhat Homomorphic Encryption
Information Security and Privacy
2014-07-24Paper
Breaking Pairing-Based Cryptosystems Using η T Pairing over GF(397)
Advances in Cryptology – ASIACRYPT 2012
2013-03-19Paper
On random walks of Pollard's rho method for the ECDLP on Koblitz curves2013-01-25Paper
On the strength comparison of the ECDLP and the IFP
Lecture Notes in Computer Science
2012-09-25Paper
On the number of the pairing-friendly curves
International Journal of Pure and Applied Mathematics
2012-09-21Paper
Preimage attacks on full-ARIRANG: analysis of DM-mode with middle feed-forward
Information Security Applications
2012-08-17Paper
Key Length Estimation of Pairing-Based Cryptosystems Using η T Pairing
Information Security Practice and Experience
2012-06-29Paper
Preimage attacks on step-reduced RIPEMD-128 and RIPEMD-160
Information Security and Cryptology
2011-07-29Paper
Preimage attacks on full-ARIRANG (poster)
Information Security and Privacy
2011-07-07Paper
Matrix representation of conditions for the collision attack of SHA-1 and its application to the message modification
Advances in Information and Computer Security
2010-11-09Paper
A New Strategy for Finding a Differential Path of SHA-1
Information Security and Privacy
2009-03-06Paper
CAIRN 2: An FPGA Implementation of the Sieving Step in the Number Field Sieve Method
Cryptographic Hardware and Embedded Systems - CHES 2007
2008-09-16Paper
Experiments on the Linear Algebra Step in the Number Field Sieve
Advances in Information and Computer Security
2008-07-25Paper
Improved Collision Search for SHA-0
Advances in Cryptology – ASIACRYPT 2006
2008-04-24Paper
How to Forge a Time-Stamp Which Adobe’s Acrobat Accepts
Cryptography and Coding
2008-03-07Paper
Low-density attack revisited
Designs, Codes and Cryptography
2007-09-20Paper
scientific article; zbMATH DE number 2089316 (Why is no real title available?)2004-08-12Paper
scientific article; zbMATH DE number 2089125 (Why is no real title available?)2004-08-12Paper
scientific article; zbMATH DE number 2089128 (Why is no real title available?)2004-08-12Paper
scientific article; zbMATH DE number 2043317 (Why is no real title available?)2004-02-16Paper
scientific article; zbMATH DE number 1952898 (Why is no real title available?)2003-07-24Paper
scientific article; zbMATH DE number 1418259 (Why is no real title available?)2000-03-19Paper
scientific article; zbMATH DE number 1304279 (Why is no real title available?)2000-02-15Paper
scientific article; zbMATH DE number 1304112 (Why is no real title available?)2000-02-01Paper
scientific article; zbMATH DE number 1380841 (Why is no real title available?)1999-12-20Paper
scientific article; zbMATH DE number 1380865 (Why is no real title available?)1999-12-20Paper
scientific article; zbMATH DE number 1302847 (Why is no real title available?)1999-06-17Paper
scientific article; zbMATH DE number 1107694 (Why is no real title available?)1998-01-21Paper
Localization and primary decomposition of polynomial ideals
Journal of Symbolic Computation
1997-03-06Paper
A Gröbner basis method for modules over rings of differential operators
Journal of Symbolic Computation
1995-04-04Paper


Research outcomes over time


This page was built for person: Takeshi Shimoyama