1. |
Yasuhiko Ikematsu, Security Analysis on an ElGamal-like Multivariate Encryption Scheme Based on Isomorphism of Polynomials, Inscrypt2021, 2021.08. |
2. |
Yasuhiko Ikematsu, A study on randomness used in signature generation of UOV, The 7th International Conference on Mathematics and Computing (ICMC2021), 2021.03. |
3. |
池松 泰彦, Security analysis on an El-Gamal-like multivariate encryption scheme based on a generalization of IP2S problem, Symposium on Cryptography and Information Security (SCIS2021), 2021.01. |
4. |
Yasuhiko Ikematsu, Hybrid meet-in-the-middle attacks for the isogeny path-finding problem, The 7th ACM ASIA Public-Key Cryptography Workshop (APKC 2020), 2020.10. |
5. |
Yasuhiko Ikematsu, Hybrid meet-in-the-middle-attacks for the isogeny path-finding problem , The 12th Workshop among Asia Information Security Labs (WAIS2020) , 2020.02. |
6. |
Yasuhiko Ikematsu, Public Key Cryptosystems using Multivariate Polynomials , IMI Crypto Seminar, 2019.08. |
7. |
Yasuhiko Ikematsu, A Multivariate Encryption Scheme HFEPR , The 11th Workshop among Asia Information Security Labs (WAIS2019) , 2019.02. |
8. |
Yasuhiko Ikematsu, An Improvement on the Linear Algebraic Attack for the Indeterminate Equation Encryption Scheme, 15th International Symposium on Information Theory and Its Applications, ISITA 2018, 2018.10. |
9. |
Yasuhiko Ikematsu, Chosen Message Attack on Multivariate Signature ELSA at Asiacrypt 2017, 13th International Workshop on Security, IWSEC 2018, 2018.09. |
10. |
Yasuhiko Ikematsu, The description of local theta lift for U(2)×U(3) , The 16th Korea-Japan Workshop on Algebra and Combinatorics, 2018.02. |
11. |
Yasuhiko Ikematsu, Revisiting the efficient key generation of ZHFE, 2nd International Conference on Codes, Cryptology and Information Security, C2SI 2017, 2017.04. |
12. |
Yasuhiko Ikematsu, Revisiting the Efficient Key Generation of ZHFE , The Ninth Workshop among Asia Information Security Labs (WAIS2017), 2017.01. |