


default search action
Yasuhiko Ikematsu
Person information
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2025
- [j9]Hiroki Furue, Yasuhiko Ikematsu:
A New Cryptanalysis Against UOV-Based Variants MAYO, QR-UOV and VOX. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 108(3): 174-182 (2025) - 2024
- [j8]Yasuhiko Ikematsu, Tsunekazu Saito:
Hilbert Series for Systems of UOV Polynomials. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 107(3): 275-282 (2024) - [c21]Yasuhiko Ikematsu
, Rika Akiyama
:
Revisiting the security analysis of SNOVA. APKC@AsiaCCS 2024 - [i11]Yasuhiko Ikematsu, Rika Akiyama:
Revisiting the security analysis of SNOVA. IACR Cryptol. ePrint Arch. 2024: 96 (2024) - 2023
- [j7]Shuhei Nakamura, Yacheng Wang, Yasuhiko Ikematsu:
A New Analysis of the Kipnis-Shamir Method Solving the MinRank Problem. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 106(3): 203-211 (2023) - [j6]Yasuhiko Ikematsu
, Shuhei Nakamura, Tsuyoshi Takagi:
Recent progress in the security evaluation of multivariate public-key cryptography. IET Inf. Secur. 17(2): 210-226 (2023) - [c20]Hiroki Furue, Yasuhiko Ikematsu:
A New Security Analysis Against MAYO and QR-UOV Using Rectangular MinRank Attack. IWSEC 2023: 101-116 - [c19]Yasuhiko Ikematsu, Hyungrok Jo, Takanori Yasuda:
A Security Analysis on MQ-Sign. WISA 2023: 40-51 - [i10]Yasuhiko Ikematsu, Hyungrok Jo, Takanori Yasuda:
A security analysis on MQ-Sign. IACR Cryptol. ePrint Arch. 2023: 581 (2023) - 2022
- [c18]Bagus Santoso, Yasuhiko Ikematsu, Shuhei Nakamura, Takanori Yasuda:
Three-Pass Identification Scheme Based on MinRank Problem with Half Cheating Probability. ISITA 2022: 59-63 - [c17]Yuntao Wang
, Yasuhiko Ikematsu
, Takanori Yasuda
:
Lattice-Based Public Key Cryptosystems Invoking Linear Mapping Mask. ProvSec 2022: 88-104 - [i9]Bagus Santoso, Yasuhiko Ikematsu, Shuhei Nakamura, Takanori Yasuda:
Three-Pass Identification Scheme Based on MinRank Problem with Half Cheating Probability. CoRR abs/2205.03255 (2022) - 2021
- [j5]Yasushi Takahashi, Momonari Kudo, Ryoya Fukasaku, Yasuhiko Ikematsu, Masaya Yasuda, Kazuhiro Yokoyama:
Algebraic approaches for solving isogeny problems of prime power degrees. J. Math. Cryptol. 15(1): 31-44 (2021) - [j4]Shuhei Nakamura, Yasuhiko Ikematsu, Yacheng Wang, Jintai Ding, Tsuyoshi Takagi:
New complexity estimation on the Rainbow-Band-Separation attack. Theor. Comput. Sci. 896: 1-18 (2021) - [c16]Hiroki Furue, Yasuhiko Ikematsu, Yutaro Kiyomura, Tsuyoshi Takagi:
A New Variant of Unbalanced Oil and Vinegar Using Quotient Ring: QR-UOV. ASIACRYPT (4) 2021: 187-217 - [c15]Yasuhiko Ikematsu, Shuhei Nakamura, Bagus Santoso, Takanori Yasuda:
Security Analysis on an ElGamal-Like Multivariate Encryption Scheme Based on Isomorphism of Polynomials. Inscrypt 2021: 235-250 - [c14]Yasuhiko Ikematsu, Shuhei Nakamura:
Security Analysis via Algebraic Attack Against "A New Encryption Scheme for Multivariate Quadratic System". ICMC 2021: 9-21 - [c13]Yasuhiko Ikematsu:
A Study on Randomness Used in Signature Generation of UOV. ICMC 2021: 39-50 - [c12]Yasuhiko Ikematsu, Satoshi Nakamura, Masaya Yasuda:
A Trace Map Attack Against Special Ring-LWE Samples. IWSEC 2021: 3-22 - [i8]Yasuhiko Ikematsu, Shuhei Nakamura, Bagus Santoso, Takanori Yasuda:
Security Analysis on an El-Gamal-like Multivariate Encryption Scheme Based on Isomorphism of Polynomials. IACR Cryptol. ePrint Arch. 2021: 169 (2021) - 2020
- [c11]Yuntao Wang
, Yasuhiko Ikematsu, Koichiro Akiyama, Tsuyoshi Takagi:
Cryptanalysis of GiophantusTM Schemes against Hybrid Attack. APKC@AsiaCCS 2020: 28-35 - [c10]Yasuhiko Ikematsu, Ryoya Fukasaku, Momonari Kudo, Masaya Yasuda, Katsuyuki Takashima, Kazuhiro Yokoyama:
Hybrid Meet-in-the-Middle Attacks for the Isogeny Path-Finding Problem. APKC@AsiaCCS 2020: 36-44 - [c9]Satoshi Nakamura, Nariaki Tateiwa, Koha Kinjo, Yasuhiko Ikematsu, Masaya Yasuda, Katsuki Fujisawa
:
Solving the Search-LWE Problem by Lattice Reduction over Projected Bases. ICMC 2020: 29-42 - [c8]Satoshi Nakamura, Yasuhiko Ikematsu, Masaya Yasuda:
Dynamic Self-dual DeepBKZ Lattice Reduction with Free Dimensions. ICMC 2020: 377-391 - [c7]Hiroki Furue, Koha Kinjo, Yasuhiko Ikematsu, Yacheng Wang, Tsuyoshi Takagi:
A Structural Attack on Block-Anti-Circulant UOV at SAC 2019. PQCrypto 2020: 323-339 - [c6]Yacheng Wang, Yasuhiko Ikematsu, Shuhei Nakamura, Tsuyoshi Takagi:
Revisiting the Minrank Problem on Multivariate Cryptography. WISA 2020: 291-307 - [i7]Yasuhiko Ikematsu, Shuhei Nakamura:
Security Analysis Against "A New Encryption Scheme for Multivariate Quadratic Systems". IACR Cryptol. ePrint Arch. 2020: 53 (2020) - [i6]Shuhei Nakamura, Yasuhiko Ikematsu, Yacheng Wang, Jintai Ding, Tsuyoshi Takagi:
New Complexity Estimation on the Rainbow-Band-Separation Attack. IACR Cryptol. ePrint Arch. 2020: 703 (2020) - [i5]Shuhei Nakamura, Yacheng Wang, Yasuhiko Ikematsu:
Analysis on the MinRank Attack using Kipnis-Shamir Method Against Rainbow. IACR Cryptol. ePrint Arch. 2020: 908 (2020) - [i4]Hiroki Furue, Yasuhiko Ikematsu, Yutaro Kiyomura, Tsuyoshi Takagi:
A New Variant of Unbalanced Oil and Vinegar Using Quotient Ring: QR-UOV. IACR Cryptol. ePrint Arch. 2020: 1243 (2020)
2010 – 2019
- 2019
- [j3]Yacheng Wang, Yasuhiko Ikematsu, Dung Hoang Duong
, Tsuyoshi Takagi:
The Secure Parameters and Efficient Decryption Algorithm for Multivariate Public Key Cryptosystem EFC. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 102-A(9): 1028-1036 (2019) - [j2]Yasufumi Hashimoto
, Yasuhiko Ikematsu, Tsuyoshi Takagi:
Chosen Message Attack on Multivariate Signature ELSA at Asiacrypt 2017. J. Inf. Process. 27: 517-524 (2019) - 2018
- [j1]Yasuhiko Ikematsu, Dung Hoang Duong
, Albrecht Petzoldt, Tsuyoshi Takagi:
An Efficient Key Generation of ZHFE Public Key Cryptosystem. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 101-A(1): 29-38 (2018) - [c5]Yacheng Wang, Yasuhiko Ikematsu, Dung Hoang Duong
, Tsuyoshi Takagi:
Efficient Decryption Algorithms for Extension Field Cancellation Type Encryption Schemes. ACISP 2018: 487-501 - [c4]Yasuhiko Ikematsu, Koichiro Akiyama, Tsuyoshi Takagi:
An Improvement on the Linear Algebraic Attack for the Indeterminate Equation Encryption Scheme. ISITA 2018: 389-393 - [c3]Yasufumi Hashimoto
, Yasuhiko Ikematsu, Tsuyoshi Takagi:
Chosen Message Attack on Multivariate Signature ELSA at Asiacrypt 2017. IWSEC 2018: 3-18 - [c2]Yasuhiko Ikematsu, Ray A. Perlner, Daniel Smith-Tone, Tsuyoshi Takagi, Jeremy Vates:
HFERP - A New Multivariate Encryption Scheme. PQCrypto 2018: 396-416 - [i3]Yasufumi Hashimoto, Yasuhiko Ikematsu, Tsuyoshi Takagi:
Chosen Message Attack on Multivariate Signature ELSA at Asiacrypt 2017. IACR Cryptol. ePrint Arch. 2018: 310 (2018) - 2017
- [c1]Yasuhiko Ikematsu, Dung Hoang Duong
, Albrecht Petzoldt, Tsuyoshi Takagi:
Revisiting the Efficient Key Generation of ZHFE. C2SI 2017: 195-212 - [i2]Koichiro Akiyama, Yasuhiro Goto, Shinya Okumura, Tsuyoshi Takagi, Koji Nuida, Goichiro Hanaoka, Hideo Shimizu, Yasuhiko Ikematsu:
A Public-key Encryption Scheme Based on Non-linear Indeterminate Equations (Giophantus). IACR Cryptol. ePrint Arch. 2017: 1241 (2017) - 2016
- [i1]Yasuhiko Ikematsu, Dung Hoang Duong, Albrecht Petzoldt, Tsuyoshi Takagi:
Revisiting the Efficient Key Generation of ZHFE. IACR Cryptol. ePrint Arch. 2016: 1065 (2016)
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-03-27 23:33 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint