


default search action
CREST Crypto-Math Project 2017
- Tsuyoshi Takagi, Masato Wakayama, Keisuke Tanaka, Noboru Kunihiro, Kazufumi Kimoto, Dung Hoang Duong:

Mathematical Modelling for Next-Generation Cryptography: CREST Crypto-Math Project. Mathematics for Industry, Springer Singapore 2017, ISBN 978-981-10-5064-0 - Tsuyoshi Takagi:

Introduction to CREST Crypto-Math Project. 1-14 - Yasufumi Hashimoto:

Multivariate Public Key Cryptosystems. 17-42 - Kirill Morozov:

Code-Based Zero-Knowledge Protocols and Their Applications. 43-62 - Hyungrok Jo:

Hash Functions Based on Ramanujan Graphs. 63-79 - Masahiro Ishii

:
Pairings on Hyperelliptic Curves with Considering Recent Progress on the NFS Algorithms. 81-96 - Katsuyuki Takashima:

Efficient Algorithms for Isogeny Sequences and Their Cryptographic Applications. 97-114 - Cid Reyes-Bustos

, Masato Wakayama:
Spectral Degeneracies in the Asymmetric Quantum Rabi Model. 117-137 - Kazufumi Kimoto:

Spectra of Group-Subgroup Pair Graphs. 139-157 - Yoshinori Yamasaki:

Ramanujan Cayley Graphs of the Generalized Quaternion Groups and the Hardy-Littlewood Conjecture. 159-175 - Jun Muramatsu, Shigeki Miyake:

Uniform Random Number Generation and Secret Key Agreement for General Sources by Using Sparse Matrices. 177-198 - Noboru Kunihiro:

Mathematical Approach for Recovering Secret Key from Its Noisy Version. 199-217 - Masaya Yasuda:

Simple Analysis of Key Recovery Attack Against LWE. 221-238 - Keiji Kimura, Hayato Waki

:
A Mixed Integer Quadratic Formulation for the Shortest Vector Problem. 239-255 - Shingo Sugiyama:

On Analysis of Recovering Short Generator Problems via Upper and Lower Bounds of Dirichlet L-Functions: Part 1. 257-278 - Shinya Okumura:

On Analysis of Recovering Short Generator Problems via Upper and Lower Bounds of Dirichlet L-functions: Part 2. 279-295 - Yao Lu, Liqiang Peng, Noboru Kunihiro:

Recent Progress on Coppersmith's Lattice-Based Method: A Survey. 297-312 - Yuyu Wang, Keisuke Tanaka:

How to Strengthen the Security of Signature Schemes in the Leakage Models: A Survey. 315-330 - Satoshi Yasuda, Fuyuki Kitagawa, Keisuke Tanaka:

Constructions for the IND-CCA1 Secure Fully Homomorphic Encryption. 331-347 - Goichiro Hanaoka, Shota Yamada:

A Survey on Identity-Based Encryption from Lattices. 349-365

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














