Takanori Yasuda
Orcid: 0000-0002-2536-7429
According to our database1,
Takanori Yasuda
authored at least 28 papers
between 2011 and 2023.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2023
2022
Proceedings of the Provable and Practical Security, 2022
Three-Pass Identification Scheme Based on MinRank Problem with Half Cheating Probability.
Proceedings of the International Symposium on Information Theory and Its Applications, 2022
2021
Security Analysis on an El-Gamal-like Multivariate Encryption Scheme Based on Isomorphism of Polynomials.
IACR Cryptol. ePrint Arch., 2021
Security Analysis on an ElGamal-Like Multivariate Encryption Scheme Based on Isomorphism of Polynomials.
Proceedings of the Information Security and Cryptology - 17th International Conference, 2021
2020
Proceedings of the Post-Quantum Cryptography - 11th International Conference, 2020
2019
RSA public keys with inside structure: Proofs of key generation and identities for web-of-trust.
J. Inf. Secur. Appl., 2019
2018
Proceedings of the Provable Security, 2018
2015
IACR Cryptol. ePrint Arch., 2015
IACR Cryptol. ePrint Arch., 2015
ACM Commun. Comput. Algebra, 2015
Proceedings of the Trusted Systems - 7th International Conference, 2015
Proceedings of the Information and Communications Security - 17th International Conference, 2015
Proceedings of the Third International Symposium on Computing and Networking, 2015
2014
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl., 2014
Fast Evaluation of Multivariate Quadratic Polynomials over GF(2^32) using Grahpics Processing Units.
J. Internet Serv. Inf. Secur., 2014
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2014
Proceedings of the Information and Communication Technology, 2014
Proceedings of the Information and Communication Technology, 2014
Parallelization of QUAD Stream Cipher Using Linear Recurring Sequences on Graphics Processing Units.
Proceedings of the Second International Symposium on Computing and Networking, 2014
2013
Proceedings of the Post-Quantum Cryptography - 5th International Workshop, 2013
Proceedings of the Seventh International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2013
Proceedings of the first ACM workshop on Asia public-key cryptography, 2013
Proceedings of the first ACM workshop on Asia public-key cryptography, 2013
2012
Application of Scalar Multiplication of Edwards Curves to Pairing-Based Cryptography.
Proceedings of the Advances in Information and Computer Security, 2012
Proceedings of the Topics in Cryptology - CT-RSA 2012 - The Cryptographers' Track at the RSA Conference 2012, San Francisco, CA, USA, February 27, 2012
2011
A Security Analysis of Uniformly-Layered Rainbow - Revisiting Sato-Araki's Non-commutative Approach to Ong-Schnorr-Shamir Signature towards PostQuantum Paradigm.
Proceedings of the Post-Quantum Cryptography - 4th International Workshop, 2011