default search action
Takeshi Shimoyama
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2021
- [j20]Rikuhiro Kojima, Dai Yamamoto, Takeshi Shimoyama, Kouichi Yasaki, Kazuaki Nimura:
A New Schnorr Multi-Signatures to Support Both Multiple Messages Signing and Key Aggregation. J. Inf. Process. 29: 525-536 (2021) - 2020
- [j19]Goichiro Hanaoka, Yusuke Sakai, Toshiya Shimizu, Takeshi Shimoyama, SeongHan Shin:
A Setup-Free Threshold Encryption Scheme for the Bitcoin Protocol and Its Applications. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 103-A(1): 150-164 (2020) - [c42]Rikuhiro Kojima, Dai Yamamoto, Takeshi Shimoyama, Kouichi Yasaki, Kazuaki Nimura:
A Novel Scheme of Schnorr Multi-signatures for Multiple Messages with Key Aggregation. BWCCA 2020: 284-295
2010 – 2019
- 2017
- [j18]Masaya Yasuda, Kazuhiro Yokoyama, Takeshi Shimoyama, Jun Kogure, Takeshi Koshiba:
Analysis of decreasing squared-sum of Gram-Schmidt lengths for short lattice vectors. J. Math. Cryptol. 11(1): 1-24 (2017) - [c41]Toshiya Shimizu, Takeshi Shimoyama:
Block Cipher Modes of Operation for Heterogeneous Format Preserving Encryption. ISPEC 2017: 256-275 - [c40]Masaya Yasuda, Takeshi Shimoyama, Masahiko Takenaka, Narishige Abe, Shigefumi Yamada, Junpei Yamaguchi:
Recovering Attacks Against Linear Sketch in Fuzzy Signature Schemes of ACNS 2015 and 2016. ISPEC 2017: 409-421 - 2016
- [j17]Masaya Yasuda, Takeshi Shimoyama, Jun Kogure, Tetsuya Izu:
Computational hardness of IFP and ECDLP. Appl. Algebra Eng. Commun. Comput. 27(6): 493-521 (2016) - 2015
- [j16]Masaya Yasuda, Takeshi Shimoyama, Jun Kogure, Kazuhiro Yokoyama, Takeshi Koshiba:
New packing method in somewhat homomorphic encryption and its applications. Secur. Commun. Networks 8(13): 2194-2213 (2015) - [c39]Masaya Yasuda, Takeshi Shimoyama, Jun Kogure, Kazuhiro Yokoyama, Takeshi Koshiba:
Secure Statistical Analysis Using RLWE-Based Homomorphic Encryption. ACISP 2015: 471-487 - [c38]Masaya Yasuda, Takeshi Koshiba, Takeshi Shimoyama, Jun Kogure, Kazuhiro Yokoyama:
Secure Data Devolution: Practical Re-encryption with Auxiliary Data in LWE-based Somewhat Homomorphic Encryption. SCC@ASIACCS 2015: 53-61 - [c37]Masaya Yasuda, Takeshi Shimoyama, Narishige Abe, Shigefumi Yamada, Takashi Shinzaki, Takeshi Koshiba:
Privacy-Preserving Fuzzy Commitment for Biometrics via Layered Error-Correcting Codes. FPS 2015: 117-133 - 2014
- [j15]Naoyuki Shinohara, Takeshi Shimoyama, Takuya Hayashi, Tsuyoshi Takagi:
Key Length Estimation of Pairing-Based Cryptosystems Using ηT Pairing over GF(3n). IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 97-A(1): 236-244 (2014) - [j14]Masaya Yasuda, Kazuhiro Yokoyama, Takeshi Shimoyama, Jun Kogure, Takeshi Koshiba:
On the exact decryption range for Gentry-Halevi's implementation of fully homomorphic encryption. J. Math. Cryptol. 8(3): 305-329 (2014) - [c36]Masaya Yasuda, Takeshi Shimoyama, Jun Kogure, Kazuhiro Yokoyama, Takeshi Koshiba:
Privacy-Preserving Wildcards Pattern Matching Using Symmetric Somewhat Homomorphic Encryption. ACISP 2014: 338-353 - 2013
- [c35]Masaya Yasuda, Takeshi Shimoyama, Jun Kogure, Kazuhiro Yokoyama, Takeshi Koshiba:
Packed Homomorphic Encryption Based on Ideal Lattices and Its Application to Biometrics. CD-ARES Workshops 2013: 55-74 - [c34]Masaya Yasuda, Takeshi Shimoyama, Jun Kogure, Kazuhiro Yokoyama, Takeshi Koshiba:
Secure pattern matching using somewhat homomorphic encryption. CCSW 2013: 65-76 - [c33]Masaya Yasuda, Takeshi Shimoyama, Jun Kogure, Kazuhiro Yokoyama, Takeshi Koshiba:
Practical Packing Method in Somewhat Homomorphic Encryption. DPM/SETOP 2013: 34-50 - 2012
- [j13]Chiaki Ohtahara, Yu Sasaki, Takeshi Shimoyama:
Preimage Attacks on the Step-Reduced RIPEMD-128 and RIPEMD-160. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 95-A(10): 1729-1739 (2012) - [c32]Takuya Hayashi, Takeshi Shimoyama, Naoyuki Shinohara, Tsuyoshi Takagi:
Breaking Pairing-Based Cryptosystems Using η T Pairing over GF(397). ASIACRYPT 2012: 43-60 - [c31]Masaya Yasuda, Jun Yajima, Takeshi Shimoyama, Jun Kogure:
Analysis of Lattice Reduction Attack against the Somewhat Homomorphic Encryption Based on Ideal Lattices. EuroPKI 2012: 1-16 - [c30]Naoyuki Shinohara, Takeshi Shimoyama, Takuya Hayashi, Tsuyoshi Takagi:
Key Length Estimation of Pairing-Based Cryptosystems Using η T Pairing. ISPEC 2012: 228-244 - [c29]Masaya Yasuda, Takeshi Shimoyama, Jun Kogure, Tetsuya Izu:
On the Strength Comparison of the ECDLP and the IFP. SCN 2012: 302-325 - [i8]Naoyuki Shinohara, Takeshi Shimoyama, Takuya Hayashi, Tsuyoshi Takagi:
Key Length Estimation of Pairing-based Cryptosystems using ηT Pairing. IACR Cryptol. ePrint Arch. 2012: 42 (2012) - [i7]Takuya Hayashi, Takeshi Shimoyama, Naoyuki Shinohara, Tsuyoshi Takagi:
Breaking pairing-based cryptosystems using ηT pairing over GF(397). IACR Cryptol. ePrint Arch. 2012: 345 (2012) - 2011
- [c28]Chiaki Ohtahara, Keita Okada, Yu Sasaki, Takeshi Shimoyama:
Preimage Attacks on Full-ARIRANG (Poster). ACISP 2011: 417-422 - [c27]Chiaki Ohtahara, Keita Okada, Yu Sasaki, Takeshi Shimoyama:
Preimage Attacks on Full-ARIRANG: Analysis of DM-Mode with Middle Feed-Forward. WISA 2011: 40-54 - 2010
- [j12]Kazumasa Omote, Takeshi Shimoyama, Satoru Torii:
A Combinatorics Proliferation Model with Threshold for Malware Countermeasure. Inf. Media Technol. 5(2): 765-775 (2010) - [j11]Kazumasa Omote, Takeshi Shimoyama, Satoru Torii:
A Combinatorics Proliferation Model with Threshold for Malware Countermeasure. J. Inf. Process. 18: 77-87 (2010) - [c26]Chiaki Ohtahara, Yu Sasaki, Takeshi Shimoyama:
Preimage Attacks on Step-Reduced RIPEMD-128 and RIPEMD-160. Inscrypt 2010: 169-186 - [c25]Jun Yajima, Takeshi Shimoyama:
Matrix Representation of Conditions for the Collision Attack of SHA-1 and Its Application to the Message Modification. IWSEC 2010: 267-284 - [c24]Tetsuya Izu, Jun Kogure, Takeshi Shimoyama:
CAIRN: Dedicated Integer Factoring Devices. NBiS 2010: 558-563
2000 – 2009
- 2009
- [j10]Kouichi Itoh, Tetsuya Izu, Wakaha Ogata, Takeshi Shimoyama, Masahiko Takenaka:
Forgery Attacks on Time-Stamp, Signed PDF and X.509 Certificate. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 92-A(1): 67-75 (2009) - [j9]Jun Yajima, Terutoshi Iwasaki, Yusuke Naito, Yu Sasaki, Takeshi Shimoyama, Thomas Peyrin, Noboru Kunihiro, Kazuo Ohta:
A Strict Evaluation on the Number of Conditions for SHA-1 Collision Search. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 92-A(1): 87-95 (2009) - 2008
- [j8]Tetsuya Izu, Takeshi Shimoyama, Masahiko Takenaka:
Extending Bleichenbacher's Forgery Attack. Inf. Media Technol. 3(4): 780-787 (2008) - [j7]Tetsuya Izu, Takeshi Shimoyama, Masahiko Takenaka:
Extending Bleichenbacher's Forgery Attack. J. Inf. Process. 16: 122-129 (2008) - [c23]Jun Yajima, Terutoshi Iwasaki, Yusuke Naito, Yu Sasaki, Takeshi Shimoyama, Noboru Kunihiro, Kazuo Ohta:
A strict evaluation method on the number of conditions for the SHA-1 collision search. AsiaCCS 2008: 10-20 - 2007
- [j6]Tetsuya Izu, Jun Kogure, Takeshi Koshiba, Takeshi Shimoyama:
Low-density attack revisited. Des. Codes Cryptogr. 43(1): 47-59 (2007) - [j5]Ryoichi Honbo, Youichi Murakami, Koichiro Sawa, Hiroyuki Wakabayashi, Naruhiko Inayoshi, Kyoji Inukai, Takeshi Shimoyama, Naoki Morita:
Development of the Lead-Free Brush Material for the High-Load Starter. IEICE Trans. Electron. 90-C(8): 1634-1642 (2007) - [c22]Tetsuya Izu, Masahiko Takenaka, Takeshi Shimoyama:
Analysis on Bleichenbacher's Forgery Attack. ARES 2007: 1167-1174 - [c21]Jun Yajima, Yu Sasaki, Yusuke Naito, Terutoshi Iwasaki, Takeshi Shimoyama, Noboru Kunihiro, Kazuo Ohta:
A New Strategy for Finding a Differential Path of SHA-1. ACISP 2007: 45-58 - [c20]Tetsuya Izu, Jun Kogure, Takeshi Shimoyama:
CAIRN 2: An FPGA Implementation of the Sieving Step in the Number Field Sieve Method. CHES 2007: 364-377 - [c19]Kazumasa Omote, Takeshi Shimoyama, Satoru Torii:
Timing to Block Scanning Malwares by Using Combinatorics Proliferation Model. ICETE (Selected Papers) 2007: 125-138 - [c18]Takeshi Shimoyama, Yoichi Muraoka:
Two Methods for Speeding Up Similarity Measurement for Profile Data. IKE 2007: 67-71 - [c17]Tetsuya Izu, Takeshi Shimoyama, Masahiko Takenaka:
How to Forge a Time-Stamp Which Adobe's Acrobat Accepts. IMACC 2007: 54-72 - [c16]Kazumaro Aoki, Takeshi Shimoyama, Hiroki Ueda:
Experiments on the Linear Algebra Step in the Number Field Sieve. IWSEC 2007: 58-73 - [c15]Kazumasa Omote, Takeshi Shimoyama, Satoru Torii:
A Combinatorics Proliferation Model to Determine the Timing for Blocking Scanning Malware. SECRYPT 2007: 16-24 - [i6]Tetsuya Izu, Jun Kogure, Takeshi Koshiba, Takeshi Shimoyama:
Low-Density Attack Revisited. IACR Cryptol. ePrint Arch. 2007: 66 (2007) - 2006
- [c14]Yusuke Naito, Yu Sasaki, Takeshi Shimoyama, Jun Yajima, Noboru Kunihiro, Kazuo Ohta:
Improved Collision Search for SHA-0. ASIACRYPT 2006: 21-36 - [c13]Yu Sasaki, Yusuke Naito, Jun Yajima, Takeshi Shimoyama, Noboru Kunihiro, Kazuo Ohta:
How to Construct Sufficient Conditions for Hash Functions. VIETCRYPT 2006: 243-259 - [i5]Yusuke Naito, Yu Sasaki, Takeshi Shimoyama, Jun Yajima, Noboru Kunihiro, Kazuo Ohta:
Message Modification for Step 21-23 on SHA-0. IACR Cryptol. ePrint Arch. 2006: 16 (2006) - [i4]Yu Sasaki, Yusuke Naito, Jun Yajima, Takeshi Shimoyama, Noboru Kunihiro, Kazuo Ohta:
How to Construct Sufficient Condition in Searching Collisions of MD5. IACR Cryptol. ePrint Arch. 2006: 74 (2006) - 2005
- [j4]Ryoichi Honbo, Koichiro Sawa, Youichi Murakami, Hiroyuki Wakabayashi, Naruhiko Inayoshi, Kyoji Inukai, Takeshi Shimoyama, Naoki Morita:
Development of the Lead-Free Carbon Brush Material for Starters. IEICE Trans. Electron. 88-C(8): 1675-1681 (2005) - [c12]Tetsuya Izu, Noboru Kunihiro, Kazuo Ohta, Takeshi Shimoyama:
Analysis on the Clockwise Transposition Routing for Dedicated Factoring Devices. WISA 2005: 232-242 - [i3]Jun Yajima, Takeshi Shimoyama:
Wang's sufficient conditions of MD5 are not sufficient. IACR Cryptol. ePrint Arch. 2005: 263 (2005) - 2004
- [j3]Masahiko Takenaka, Takeshi Shimoyama, Takeshi Koshiba:
Theoretical Analysis of chi2 Attack on RC6. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 87-A(1): 28-36 (2004) - [i2]Kazumaro Aoki, Yuji Kida, Takeshi Shimoyama, Hiroki Ueda:
GNFS Factoring Statistics of RSA-100, 110, ..., 150. IACR Cryptol. ePrint Arch. 2004: 95 (2004) - 2003
- [c11]Masahiko Takenaka, Takeshi Shimoyama, Takeshi Koshiba:
Theoretical Analysis of chi2 Attack on RC6. ACISP 2003: 142-153 - 2002
- [c10]Hitoshi Yanami, Takeshi Shimoyama, Orr Dunkelman:
Differential and Linear Cryptanalysis of a Reduced-Round SC2000. FSE 2002: 34-48 - [c9]Takeshi Shimoyama, Masahiko Takenaka, Takeshi Koshiba:
Multiple Linear Cryptanalysis of a Reduced Round RC6. FSE 2002: 76-88 - [c8]Hitoshi Yanami, Takeshi Shimoyama:
Differential Cryptanalysis of a Reduced-Round SEED. SCN 2002: 186-198 - [i1]Masahiko Takenaka, Takeshi Shimoyama, Takeshi Koshiba:
Theoretical Analysis of "Correlations in RC6". IACR Cryptol. ePrint Arch. 2002: 176 (2002) - 2001
- [c7]Takeshi Shimoyama, Hitoshi Yanami, Kazuhiro Yokoyama, Masahiko Takenaka, Kouichi Itoh, Jun Yajima, Naoya Torii, Hidema Tanaka:
The Block Cipher SC2000. FSE 2001: 312-327
1990 – 1999
- 1999
- [c6]Shiho Moriai, Takeshi Shimoyama, Toshinobu Kaneko:
Interpolation Attacks of the Block Cipher: SNAKE. FSE 1999: 275-289 - 1998
- [c5]Takeshi Shimoyama, Toshinobu Kaneko:
Quadratic Relation of S-box and Its Application to the Linear Attack of Full Round DES. CRYPTO 1998: 200-211 - [c4]Shiho Moriai, Takeshi Shimoyama, Toshinobu Kaneko:
Higher Order Differential Attak of CAST Cipher. FSE 1998: 17-31 - [c3]Shiho Moriai, Takeshi Shimoyama, Toshinobu Kaneko:
Higher Order Differential Attack Using Chosen Higher Order Differences. Selected Areas in Cryptography 1998: 106-117 - 1997
- [c2]Takeshi Shimoyama, Seiichi Amada, Shiho Moriai:
Improved fast software implementation of block ciphers. ICICS 1997: 269-273 - [c1]Takeshi Shimoyama, Shiho Moriai, Toshinobu Kaneko:
Improving the Higher Order Differential Attack and Cryptanalysis of the KN Cipher. ISW 1997: 32-42 - 1996
- [j2]Takeshi Shimoyama, Kazuhiro Yokoyama:
Localization and Primary Decomposition of Polynomial Ideals. J. Symb. Comput. 22(3): 247-277 (1996) - 1994
- [j1]Toshinori Oaku, Takeshi Shimoyama:
A Gröbner Basis Method for Modules over Rings of Differential Operators. J. Symb. Comput. 18(3): 223-248 (1994)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-09-06 00:38 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint