Skip to main content

and
  1. No Access

    Chapter and Conference Paper

    An Efficient \(F_4\) -style Based Algorithm to Solve MQ Problems

    The multivariate public key cryptosystem (MPKC) is a potential post-quantum cryptosystem. Its safety depends on the hardness of solving systems of algebraic equations over finite fields. In particular, the mul...

    Takuma Ito, Naoyuki Shinohara in Advances in Information and Computer Secur… (2019)

  2. Article

    Open Access

    Improvement of FPPR method to solve ECDLP

    Solving the elliptic curve discrete logarithm problem (ECDLP) by using Gröbner basis has recently appeared as a new threat to the security of elliptic curve cryptography and pairing-based cryptosystems. At Eur...

    Yun-Ju Huang, Christophe Petit in Pacific Journal of Mathematics for Industry (2015)

  3. Chapter and Conference Paper

    Recovering RSA Secret Keys from Noisy Key Bits with Erasures and Errors

    We discuss how to recover RSA secret keys from noisy key bits with erasures and errors. There are two known algorithms recovering original secret keys from noisy keys. At Crypto 2009, Heninger and Shacham prop...

    Noboru Kunihiro, Naoyuki Shinohara, Tetsuya Izu in Public-Key Cryptography – PKC 2013 (2013)

  4. No Access

    Chapter and Conference Paper

    Improvement of Faugère et al.’s Method to Solve ECDLP

    Solving the elliptic curve discrete logarithm problem (ECDLP) by using Gröbner basis has recently appeared as a new threat to the security of elliptic curve cryptography and pairing-based cryptosystems. At Eur...

    Yun-Ju Huang, Christophe Petit in Advances in Information and Computer Secur… (2013)

  5. Chapter and Conference Paper

    Breaking Pairing-Based Cryptosystems Using η T Pairing over GF(397)

    In this paper, we discuss solving the DLP over GF(36·97) by using the function field sieve (FFS) for breaking paring-based cryptosystems using the η T pairing o...

    Takuya Hayashi, Takeshi Shimoyama in Advances in Cryptology – ASIACRYPT 2012 (2012)

  6. Chapter and Conference Paper

    A Unified Framework for Small Secret Exponent Attack on RSA

    We address a lattice based method on small secret exponent attack on RSA scheme. Boneh and Durfee reduced the attack into finding small roots of a bivariate modular equation:

    Noboru Kunihiro, Naoyuki Shinohara, Tetsuya Izu in Selected Areas in Cryptography (2012)

  7. No Access

    Chapter and Conference Paper

    Key Length Estimation of Pairing-Based Cryptosystems Using η T Pairing

    The security of pairing-based cryptosystems depends on the difficulty of the discrete logarithm problem (DLP) over certain types of finite fields. One of the most efficient algorithms for computing a pairing i...

    Naoyuki Shinohara, Takeshi Shimoyama in Information Security Practice and Experien… (2012)

  8. Chapter and Conference Paper

    Solving a 676-Bit Discrete Logarithm Problem in GF(36n )

    Pairings on elliptic curves over finite fields are crucial for constructing various cryptographic schemes. The η T pairing on supersingular curves over GF(3 ...

    Takuya Hayashi, Naoyuki Shinohara, Lihua Wang in Public Key Cryptography – PKC 2010 (2010)