Takashima, Katsuyuki
193  Ergebnisse:
Personensuche X
?
1

Compact FE for Unbounded Attribute-Weighted Sums for Logspa..:

, In: Advances in Cryptology – ASIACRYPT 2022; Lecture Notes in Computer Science,
 
?
2

Implementation Report of the Kohel–Lauter–Petit–Tignol Algo..:

, In: Proceedings of the Seventh International Conference on Mathematics and Computing; Advances in Intelligent Systems and Computing,
Kambe, Yuta ; Aikawa, Yusuke ; Kudo, Momonari... - p. 953-966 , 2022
 
?
4

An Efficient Authenticated Key Exchange from Random Self-re..:

, In: Information Security and Cryptology – ICISC 2020; Lecture Notes in Computer Science,
 
?
5

Efficient Attribute-Based Signatures for Unbounded Arithmet..:

DATTA, Pratish ; OKAMOTO, Tatsuaki ; TAKASHIMA, Katsuyuki
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences.  E104.A (2021)  1 - p. 25-57 , 2021
 
?
6

Expressive Attribute-Based Encryption with Constant-Size Ci..:

TAKASHIMA, Katsuyuki
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences.  E103.A (2020)  1 - p. 74-106 , 2020
 
?
7

Hybrid Meet-in-the-Middle Attacks for the Isogeny Path-Find..:

, In: Proceedings of the 7th ACM Workshop on ASIA Public-Key Cryptography,
 
?
8

Decentralized Attribute-Based Encryption and Signatures:

OKAMOTO, Tatsuaki ; TAKASHIMA, Katsuyuki
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences.  E103.A (2020)  1 - p. 41-73 , 2020
 
?
9

Adaptively Simulation-Secure Attribute-Hiding Predicate Enc..:

DATTA, Pratish ; OKAMOTO, Tatsuaki ; TAKASHIMA, Katsuyuki
IEICE Transactions on Information and Systems.  E103.D (2020)  7 - p. 1556-1597 , 2020
 
?
10

Unbounded inner product functional encryption from bilinear..:

Tomida, Junichi ; Takashima, Katsuyuki
Japan Journal of Industrial and Applied Mathematics.  37 (2020)  3 - p. 723-779 , 2020
 
?
11

Group Key Exchange from CSIDH and Its Application to Truste..:

, In: Information Security and Cryptology; Lecture Notes in Computer Science,
 
?
12

Post-Quantum Constant-Round Group Key Exchange from Static ..:

, In: International Symposium on Mathematics, Quantum Theory, and Cryptography; Mathematics for Industry,
Takashima, Katsuyuki - p. 251-272 , 2020
 
?
13

One-Round Authenticated Group Key Exchange from Isogenies:

, In: Provable Security; Lecture Notes in Computer Science,
 
?
14

Supersingular Isogeny Diffie–Hellman Authenticated Key Exch..:

, In: Lecture Notes in Computer Science; Information Security and Cryptology – ICISC 2018,
 
?
15

New Assumptions on Isogenous Pairing Groups with Applicatio..:

, In: Lecture Notes in Computer Science; Information Security and Cryptology – ICISC 2018,
 
1-15