Kyushu University Academic Staff Educational and Research Activities Database
Researcher information (To researchers) Need Help? How to update
Yasuhiko Ikematsu Last modified date:2024.04.27





E-Mail *Since the e-mail address is not displayed in Internet Explorer, please use another web browser:Google Chrome, safari.
Homepage
https://kyushu-u.elsevierpure.com/en/persons/yasuhiko-ikematsu
 Reseacher Profiling Tool Kyushu University Pure
Phone
092-802-4491
Academic Degree
Doctor of Mathematical Science
Country of degree conferring institution (Overseas)
No
Field of Specialization
Public Key Cryptograph, Mathematical Cryptography, Multivariate Public Key Cryptosystem
Total Priod of education and research career in the foreign country
00years00months
Research
Research Interests
  • Cryptography, Multivariate Public Key Cryptosystem
    keyword : Cryptography, Multivariate Public Key Cryptosystem
    2016.04.
Academic Activities
Papers
1. Yasuhiko Ikematsu, Shuhei Nakamura, Tsuyoshi Takagi, Recent Progress in the Security Evaluation of Multivariate Public-Key Cryptography, IET Information Security, 2022.09.
2. Yasuhiko Ikematsu, Shuhei Nakamura, Security Analysis via Algebraic Attack Against "A New Encryption Scheme for Multivariate Quadratic System", Proceedings of the Seventh International Conference on Mathematics and Computing , 1412, 9-21, 2022.03.
3. Hiroki Furue, Yasuhiko Ikematsu, Yutaro Kiyomura, Tsuyoshi Takagi, A New Variant of Unbalanced Oil and Vinegar Using Quotient Ring: QR-UOV, Lecture Notes in Computer Science, 13093, 187-217, 2021.12.
4. Yasuhiko Ikematsu, Ryoya Fukasaku, Momonari Kudo, Masaya Yasuda, Katsuyuki Takashima, Kazuhiro Yokoyama, Hybrid meet-in-the-middle-attacks for the isogeny path-finding problem, Proceedings of the 7th ACM Workshop on ASIA Public-Key Cryptography, 2020.10.
5. Yasuhiko Ikematsu, Local theta lift for p-adic unitary dual pairs U(2)×U(1) and U(2)×U(3), Kyoto Journal of Mathematics, Vol. 59, No. 4, 1075-1110, 2019.12.
6. Yacheng Wang, Yasuhiko Ikematsu, Dung Hoang Duong, Tsuyoshi Takagi, Efficient decryption algorithms for extension field cancellation type encryption schemes, 23rd Australasian Conference on Information Security and Privacy, ACISP 2018 Information Security and Privacy - 23rd Australasian Conference, ACISP 2018, Proceedings, 10.1007/978-3-319-93638-3_28, 487-501, 2018.06.
7. Yasuhiko Ikematsu, Ray Perlner, Daniel Smith-Tone, Tsuyoshi Takagi, Jeremy Vates, HFERP - A new multivariate encryption scheme, 9th International Conference on Post-Quantum Cryptography, PQCrypto 2018 Post-Quantum Cryptography - 9th International Conference, PQCrypto 2018, Proceedings, 10.1007/978-3-319-79063-3_19, 396-416, 2018.04.
8. Yasuhiko Ikematsu, Dung Hoang Duong, Albrecht Petzoldt, Tsuyoshi Takagi, An efficient key generation of ZHFE public key cryptosystem, IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, 10.1587/transfun.E101.A.29, E101A, 1, 29-38, 2018.01.
Works, Software and Database
1.
[URL].
Presentations
1. Yasuhiko Ikematsu, Hybrid meet-in-the-middle attacks for the isogeny path-finding problem, The 7th ACM ASIA Public-Key Cryptography Workshop (APKC 2020), 2020.10.
2. Yasuhiko Ikematsu, Chosen Message Attack on Multivariate Signature ELSA at Asiacrypt 2017, 13th International Workshop on Security, IWSEC 2018, 2018.09.
3. Yasuhiko Ikematsu, The description of local theta lift for U(2)×U(3)
, The 16th Korea-Japan Workshop on Algebra and Combinatorics, 2018.02.
4. Yasuhiko Ikematsu, Revisiting the efficient key generation of ZHFE, 2nd International Conference on Codes, Cryptology and Information Security, C2SI 2017, 2017.04.