Katsuyuki Takashima
Orcid: 0000-0001-5216-2229
According to our database1,
Katsuyuki Takashima
authored at least 49 papers
between 2004 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
Des. Codes Cryptogr., October, 2024
2021
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2021
Decomposed Richelot isogenies of Jacobian varieties of hyperelliptic curves and generalized Howe curves.
CoRR, 2021
Implementation Report of the Kohel-Lauter-Petit-Tignol Algorithm for the Constructive Deuring Correspondence.
Proceedings of the Seventh International Conference on Mathematics and Computing, 2021
2020
IEICE Trans. Inf. Syst., 2020
Expressive Attribute-Based Encryption with Constant-Size Ciphertexts from the Decisional Linear Assumption.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2020
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2020
IACR Cryptol. ePrint Arch., 2020
CoRR, 2020
Proceedings of the 7th on ASIA Public-Key Cryptography Workshop, 2020
2019
Fully Secure Functional Encryption with a Large Class of Relations from the Decisional Linear Assumption.
J. Cryptol., 2019
Group Key Exchange from CSIDH and Its Application to Trusted Setup in Supersingular Isogeny Cryptosystems.
Proceedings of the Information Security and Cryptology - 15th International Conference, 2019
2018
IACR Cryptol. ePrint Arch., 2018
IACR Cryptol. ePrint Arch., 2018
IACR Cryptol. ePrint Arch., 2018
Proceedings of the International Symposium on Information Theory and Its Applications, 2018
New Assumptions on Isogenous Pairing Groups with Applications to Attribute-Based Encryption.
Proceedings of the Information Security and Cryptology - ICISC 2018, 2018
2017
Proceedings of the Information Security and Privacy - 22nd Australasian Conference, 2017
Proceedings of the Mathematical Modelling for Next-Generation Cryptography: CREST Crypto-Math Project, 2017
2016
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2016
IACR Cryptol. ePrint Arch., 2016
2015
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2015
Tighter Security for Efficient Lattice Cryptography via the Rényi Divergence of Optimized Orders.
IACR Cryptol. ePrint Arch., 2015
New Proof Techniques for DLIN-Based Adaptively Secure Attribute-Based Encryption and Their Application.
IACR Cryptol. ePrint Arch., 2015
Achieving short ciphertexts or short secret-keys for adaptively secure general inner-product encryption.
Des. Codes Cryptogr., 2015
2014
Proceedings of the Second International Symposium on Computing and Networking, 2014
2013
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2013
Efficient (Hierarchical) Inner-Product Encryption Tightly Reduced from the Decisional Linear Assumption.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2013
IACR Cryptol. ePrint Arch., 2013
2012
IACR Cryptol. ePrint Arch., 2012
2011
Efficient Attribute-Based Signatures for Non-Monotone Predicates in the Standard Model.
IACR Cryptol. ePrint Arch., 2011
Proceedings of the Progress in Cryptology - AFRICACRYPT 2011, 2011
2010
Fully Secure Functional Encryption with General Relations from the Decisional Linear Assumption.
IACR Cryptol. ePrint Arch., 2010
Fully Secure Functional Encryption: Attribute-Based Encryption and (Hierarchical) Inner Product Encryption.
IACR Cryptol. ePrint Arch., 2010
2009
Proceedings of the Advances in Cryptology, 2009
2008
Proceedings of the Pairing-Based Cryptography, 2008
Proceedings of the Information Security and Cryptology, 2008
Proceedings of the Algorithmic Number Theory, 8th International Symposium, 2008
2007
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2007
2006
Practical Application of Lattice Basis Reduction Algorithm to Side-Channel Analysis on (EC)DSA.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2006
A New Type of Fast Endomorphisms on Jacobians of Hyperelliptic Curves and Their Cryptographic Application.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2006
2005
Practical Modifications of Leadbitter et al.'s Repeated-Bits Side-Channel Analysis on (EC)DSA.
Proceedings of the Information Security Applications, 6th International Workshop, 2005
2004
Proceedings of the Information Security and Cryptology, 2004