Extended partial key exposure attacks on RSA: Improvement up to full size decryption exponents
Suzuki, Kaichi, Takayasu, Atsushi, Kunihiro, Noboru
Published in Theoretical computer science (12.11.2020)
Published in Theoretical computer science (12.11.2020)
Get full text
Journal Article
Efficient identity-based encryption with Hierarchical key-insulation from HIBE
Emura, Keita, Takayasu, Atsushi, Watanabe, Yohei
Published in Designs, codes, and cryptography (01.10.2021)
Published in Designs, codes, and cryptography (01.10.2021)
Get full text
Journal Article
Adaptively secure revocable hierarchical IBE from k-linear assumption
Emura, Keita, Takayasu, Atsushi, Watanabe, Yohei
Published in Designs, codes, and cryptography (2021)
Published in Designs, codes, and cryptography (2021)
Get full text
Journal Article
Partial Key Exposure Attacks on RSA: Achieving the Boneh-Durfee Bound
Takayasu, Atsushi, Kunihiro, Noboru
Published in Selected Areas in Cryptography -- SAC 2014 (01.01.2014)
Published in Selected Areas in Cryptography -- SAC 2014 (01.01.2014)
Get full text
Book Chapter
Lattice-based revocable (hierarchical) IBE with decryption key exposure resistance
Katsumata, Shuichi, Matsuda, Takahiro, Takayasu, Atsushi
Published in Theoretical computer science (24.02.2020)
Published in Theoretical computer science (24.02.2020)
Get full text
Journal Article