Jun Kogure

According to our database1, Jun Kogure authored at least 21 papers between 1998 and 2020.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2020
Complexity bounds on Semaev's naive index calculus method for ECDLP.
J. Math. Cryptol., 2020

2017
Analysis of decreasing squared-sum of Gram-Schmidt lengths for short lattice vectors.
J. Math. Cryptol., 2017

2016
Computational hardness of IFP and ECDLP.
Appl. Algebra Eng. Commun. Comput., 2016

2015
New packing method in somewhat homomorphic encryption and its applications.
Secur. Commun. Networks, 2015

Secure Data Devolution: Practical Re-encryption with Auxiliary Data in LWE-based Somewhat Homomorphic Encryption.
Proceedings of the 3rd International Workshop on Security in Cloud Computing, 2015

Secure Statistical Analysis Using RLWE-Based Homomorphic Encryption.
Proceedings of the Information Security and Privacy - 20th Australasian Conference, 2015

2014
On the exact decryption range for Gentry-Halevi's implementation of fully homomorphic encryption.
J. Math. Cryptol., 2014

Privacy-Preserving Wildcards Pattern Matching Using Symmetric Somewhat Homomorphic Encryption.
Proceedings of the Information Security and Privacy - 19th Australasian Conference, 2014

2013
Practical Packing Method in Somewhat Homomorphic Encryption.
Proceedings of the Data Privacy Management and Autonomous Spontaneous Security, 2013

Secure pattern matching using somewhat homomorphic encryption.
Proceedings of the CCSW'13, 2013

Packed Homomorphic Encryption Based on Ideal Lattices and Its Application to Biometrics.
Proceedings of the Security Engineering and Intelligence Informatics, 2013

2012
On the Hardness of Subset Sum Problem from Different Intervals.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2012

On the Strength Comparison of the ECDLP and the IFP.
Proceedings of the Security and Cryptography for Networks - 8th International Conference, 2012

Analysis of Lattice Reduction Attack against the Somewhat Homomorphic Encryption Based on Ideal Lattices.
Proceedings of the Public Key Infrastructures, Services and Applications, 2012

2011
Generalized Security Analysis of the Random Key Bits Leakage Attack.
Proceedings of the Information Security Applications - 12th International Workshop, 2011

2010
CAIRN: Dedicated Integer Factoring Devices.
Proceedings of the 13th International Conference on Network-Based Information Systems, 2010

2007
Low-density attack revisited.
Des. Codes Cryptogr., 2007

CAIRN 2: An FPGA Implementation of the Sieving Step in the Number Field Sieve Method.
Proceedings of the Cryptographic Hardware and Embedded Systems, 2007

2000
Efficient Implementation of Schoof's Algorithm in Case of Characteristic 2.
Proceedings of the Public Key Cryptography, 2000

1998
Parameters for Secure Elliptic Curve Cryptosystem - Improvements on Schoof's Algorithm.
Proceedings of the Public Key Cryptography, 1998

Efficient Implementation of Schoof's Algorithm.
Proceedings of the Advances in Cryptology, 1998


  Loading...