九州大学 研究者情報
論文一覧
池松 泰彦(いけまつ やすひこ) データ更新日:2024.04.25

助教 /  マス・フォア・インダストリ研究所 先進暗号数理デザイン室


原著論文
1. Yasuhiko Ikematsu, Tsunekazu Saito, Hilbert series for systems of UOV polynomials, IEICE Transaction on Fundamentals of Electronics, Communications and Computer Sciences (Special Section on Cryptography and Information Security), Vol.E107-A, No. 3, 275-282, 2024.03.
2. Yasuhiko Ikematsu, Hyungrok Jo, Takanori Yasuda, A security analysis on MQ-Sign, Proceedings of the 24th World Conference on Information Security Applications (WISA 2023), LNCS 14402, 40-51, 2024.01.
3. Hiroki Furue, Yasuhiko Ikematsu, A New Security Analysis Against MAYO and QR-UOV Using Rectangular MinRank Attack, Proceedings of IWSEC 2023, LNCS 14128, 101-116, 2023.08.
4. Shuhei Nakamura, Yasuhiko Ikematsu, Yacheng Wang, A New Analysis of the Kipnis-Shamir Method Solving the MinRank Problem, IEICE Transaction on Fundamentals of Electronics, Communications and Computer Sciences (Special Section on Cryptography and Information Security), 203-211, Vol. E106-A, No.3, 2023.03.
5. Yuntao Wang, Yasuhiko Ikematsu, Takanori Yasuda, Lattice-based Public Key Cryptosystems invoking Linear Mapping Mask, ProvSec 2022, 2022.11.
6. Bagus Santoso, Shuhei Nakamura, Yasuhiko Ikematsu, Takanori Yasuda, Three-Pass Identification Scheme Based on MinRank Problem with Half Cheating Probability, ISITA2022, 2022.10.
7. Yasuhiko Ikematsu, Shuhei Nakamura, Tsuyoshi Takagi, Recent Progress in the Security Evaluation of Multivariate Public-Key Cryptography, IET Information Security, 2022.09.
8. Ryoya Fukasaku, Yasuhiko Ikematsu, Momonari Kudo, Masaya Yasuda, Kazuhiro Yokoyama, Introduction to algebraic approaches for solving isogeny path-finding problems, RIMS Kokyuroku Bessatsu (Theory and Applications of Supersingular Curves and Supersingular Abelian Varieties), 2022.06.
9. Shuhei Nakamura, Yasuhiko Ikematsu, Yacheng Wang, Tsuyoshi Takagi, New complexity estimation on the Rainbow-Band-Separation attack, Theoretical Computer Science, 896, 1-18, 2021.12.
10. Hiroki Furue, Yasuhiko Ikematsu, Yutaro Kiyomura, Tsuyoshi Takagi, A New Variant of Unbalanced Oil and Vinegar Using Quotient Ring: QR-UOV, Lecture Notes in Computer Science, 13093, 187-217, 2021.12.
11. Yasuhiko Ikematsu, Shuhei Nakamura, Bagus Santoso, Takanori Yasuda, Security Analysis on an ElGamal-Like Multivariate Encryption Scheme Based on Isomorphism of Polynomials, Lecture Notes in Computer Science, 13007, 235-250, 2021.10.
12. Yasuhiko Ikematsu, Satoshi Nakamura, Masaya Yasuda, A Trace Map Attack Against Special Ring-LWE Samples, Lecture Notes in Computer Science, 12835, 3-22, 2021.08.
13. Yasuhiko Ikematsu, A study on randomness used in signature generation of UOV, Proceedings of the Seventh International Conference on Mathematics and Computing , 1412, 39-50, 2022.03.
14. Yasuhiko Ikematsu, Shuhei Nakamura, Security Analysis via Algebraic Attack Against "A New Encryption Scheme for Multivariate Quadratic System", Proceedings of the Seventh International Conference on Mathematics and Computing , 1412, 9-21, 2022.03.
15. Yasushi Takahashi, Momonari Kudo, Ryoya Fukasaku, Yasuhiko Ikematsu, Masaya Yasuda, Kazuhiro Yokoyama, Algebraic approaches for solving isogeny problems of prime power degrees, Journal of Mathematical Cryptology, 15, 1, 31-44, 2020.11.
16. Yacheng Wang, Yasuhiko Ikematsu, Shuhei Nakamura, Tsuyoshi Takagi, Revisiting the Minrank Problem on Multivariate Cryptography, 21st World Conference on Information Security Applications, 2020.08.
17. Yasuhiko Ikematsu, Ryoya Fukasaku, Momonari Kudo, Masaya Yasuda, Katsuyuki Takashima, Kazuhiro Yokoyama, Hybrid meet-in-the-middle-attacks for the isogeny path-finding problem, Proceedings of the 7th ACM Workshop on ASIA Public-Key Cryptography, 2020.10.
18. Yuntao Wang, Yasuhiko Ikematsu, Koichi Akiyama, Tsuyoshi Takagi, Cryptanalysis of Giophantus(TM) Schemes against Hybrid Attack, Proceedings of the 7th ACM Workshop on ASIA Public-Key Cryptography, 2020.10.
19. Satoshi Nakamura, Nariaki Tateiwa, Koha Kinjo, Yasuhiko Ikematsu, Masaya Yasuda, Katsuki Fujisawa, Solving the Search-LWE Problem by Lattice Reduction over Projected Bases, Proceedings of the Sixth International Conference on Mathematics and Computing, https://doi.org/10.1007/978-981-15-8061-1_3, 29-42, 2020.11.
20. Satoshi Nakamura, Yasuhiko Ikematsu, Masaya Yasuda, Dynamic Self-dual DeepBKZ Lattice Reduction with Free Dimensions, Proceedings of the Sixth International Conference on Mathematics and Computing, https://doi.org/10.1007/978-981-15-8061-1, 377-391, 2020.11.
21. Hiroki Furue, Koha Kinjo, Yasuhiko Ikematsu, Yacheng Wang, Tsuyoshi Takagi, A Structual Attack on Bloch-Anti-Circulant UOV at SAC 2019, Proceedings of the International Conference on Post-Quantum Cryptography (PQCrypto 2020), 323-339, 2020.04.
22. Yacheng Wang, Yasuhiko Ikematsu, Dung Hoang Duong, Tsuyoshi Takagi, The Secure Parameters and Efficient Decryption Algorithm for Multivariate Public Key Cryptosystem EFC
, IEICE Transaction on Fundamentals of Electronics, Communications and Computer Sciences (Special Section on Discrete Mathematics and Its Applications) , Volume E102.A, Issue 9, 1028-1036, 2019.09.
23. Yasuhiko Ikematsu, Local theta lift for p-adic unitary dual pairs U(2)×U(1) and U(2)×U(3), Kyoto Journal of Mathematics, Vol. 59, No. 4, 1075-1110, 2019.12.
24. Yasufumi Hashimoto, Yasuhiko Ikematsu, Tsuyoshi Takagi, Chosen Message Attack on Multivariate Signature ELSA at Asiacrypt 2017
, Journal of Information Processing , Vol. 27 , 517 -524, 2019.01.
25. Yasuhiko Ikematsu, Koichiro Akiyama, Tsuyoshi Takagi, An Improvement on the Linear Algebraic Attack for the Indeterminate Equation Encryption Scheme
, Proceedings of 2018 International Symposium on Information Theory and Its Applications, ISITA 2018 , 389-393, 2018.10.
26. Yasufumi Hashimoto, Yasuhiko Ikematsu, Tsuyoshi Takagi, Chosen Message Attack on Multivariate Signature ELSA at Asiacrypt 2017, Proceedings of the 13th International Workshop on Security (IWSEC 2018), 3-18, 2018.07.
27. Yacheng Wang, Yasuhiko Ikematsu, Dung Hoang Duong, Tsuyoshi Takagi, Efficient decryption algorithms for extension field cancellation type encryption schemes, 23rd Australasian Conference on Information Security and Privacy, ACISP 2018
Information Security and Privacy - 23rd Australasian Conference, ACISP 2018, Proceedings
, 10.1007/978-3-319-93638-3_28, 487-501, 2018.06, [URL].
28. Yasuhiko Ikematsu, Ray Perlner, Daniel Smith-Tone, Tsuyoshi Takagi, Jeremy Vates, HFERP - A new multivariate encryption scheme, 9th International Conference on Post-Quantum Cryptography, PQCrypto 2018
Post-Quantum Cryptography - 9th International Conference, PQCrypto 2018, Proceedings
, 10.1007/978-3-319-79063-3_19, 396-416, 2018.04, [URL].
29. Yasuhiko Ikematsu, Dung Hoang Duong, Albrecht Petzoldt, Tsuyoshi Takagi, An efficient key generation of ZHFE public key cryptosystem, IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, 10.1587/transfun.E101.A.29, E101A, 1, 29-38, 2018.01, [URL].
30. Yasuhiko Ikematsu, Dung H. Duong, Albrecht Petzoldt, Tsuyoshi Takagi, Revisiting the Efficient Key Generation of ZHFE, Proceedings of the International Conference on Codes, Cryptology, and Information Security, 195-212, 2017.03.

九大関連コンテンツ

pure2017年10月2日から、「九州大学研究者情報」を補完するデータベースとして、Elsevier社の「Pure」による研究業績の公開を開始しました。