# Masaya Yasuda

Orcid: 0000-0002-1534-5648
According to our database

Collaborative distances:

^{1}, Masaya Yasuda authored at least 57 papers between 2008 and 2024.Collaborative distances:

## Timeline

#### Legend:

Book In proceedings Article PhD thesis Dataset Other## Links

#### On csauthors.net:

## Bibliography

2024

Computing a Basis of the Set of Isogenies Between Two Supersingular Elliptic Curves.

Proceedings of the Computer Algebra in Scientific Computing - 26th International Workshop, 2024

2022

Discret. Appl. Math., 2022

2021

J. Math. Cryptol., 2021

Inf. Secur. J. A Glob. Perspect., 2021

Dynamic self-dual DeepBKZ lattice reduction with free dimensions and its implementation.

Discret. Appl. Math., 2021

Proceedings of the Advances in Information and Computer Security, 2021

Proceedings of the Cryptography and Coding - 18th IMA International Conference, 2021

Implementation Report of the Kohel-Lauter-Petit-Tignol Algorithm for the Constructive Deuring Correspondence.

Proceedings of the Seventh International Conference on Mathematics and Computing, 2021

Proceedings of the 28th IEEE International Conference on High Performance Computing, 2021

2020

J. Math. Cryptol., 2020

J. Math. Cryptol., 2020

Impact of the modulus switching technique on some attacks against learning problems.

IET Inf. Secur., 2020

Des. Codes Cryptogr., 2020

Massive parallelization for finding shortest lattice vectors based on ubiquity generator framework.

Proceedings of the International Conference for High Performance Computing, 2020

Proceedings of the Sixth International Conference on Mathematics and Computing, 2020

Proceedings of the Sixth International Conference on Mathematics and Computing, 2020

Proceedings of the 7th on ASIA Public-Key Cryptography Workshop, 2020

2019

A new polynomial-time variant of LLL with deep insertions for decreasing the squared-sum of Gram-Schmidt lengths.

Des. Codes Cryptogr., 2019

2018

IACR Cryptol. ePrint Arch., 2018

Proceedings of the Cryptology and Network Security - 17th International Conference, 2018

Acceleration of Index Calculus for Solving ECDLP over Prime Fields and Its Limitation.

Proceedings of the Cryptology and Network Security - 17th International Conference, 2018

Development of a Dual Version of DeepBKZ and Its Application to Solving the LWE Challenge.

Proceedings of the Progress in Cryptology - AFRICACRYPT 2018, 2018

2017

JSIAM Lett., 2017

Analysis of decreasing squared-sum of Gram-Schmidt lengths for short lattice vectors.

J. Math. Cryptol., 2017

Secure Hamming distance computation for biometrics using ideal-lattice and ring-LWE homomorphic encryption.

Inf. Secur. J. A Glob. Perspect., 2017

IACR Cryptol. ePrint Arch., 2017

Explicit Formula for Gram-Schmidt Vectors in LLL with Deep Insertions and Its Applications.

Proceedings of the Number-Theoretic Methods in Cryptology - First International Conference, 2017

Recovering Attacks Against Linear Sketch in Fuzzy Signature Schemes of ACNS 2015 and 2016.

Proceedings of the Information Security Practice and Experience, 2017

Enhancement for Secure Multiple Matrix Multiplications over Ring-LWE Homomorphic Encryption.

Proceedings of the Information Security Practice and Experience, 2017

Proceedings of the Applied Cryptography and Network Security, 2017

Proceedings of the Mathematical Modelling for Next-Generation Cryptography: CREST Crypto-Math Project, 2017

2016

Appl. Algebra Eng. Commun. Comput., 2016

Proceedings of the Advances in Information and Computer Security, 2016

2015

Secur. Commun. Networks, 2015

Secur. Commun. Networks, 2015

IACR Cryptol. ePrint Arch., 2015

Privacy-Preserving Fuzzy Commitment for Biometrics via Layered Error-Correcting Codes.

Proceedings of the Foundations and Practice of Security - 8th International Symposium, 2015

Proceedings of the Data Privacy Management, and Security Assurance, 2015

Secure Data Devolution: Practical Re-encryption with Auxiliary Data in LWE-based Somewhat Homomorphic Encryption.

Proceedings of the 3rd International Workshop on Security in Cloud Computing, 2015

Proceedings of the Information Security and Privacy - 20th Australasian Conference, 2015

2014

On the exact decryption range for Gentry-Halevi's implementation of fully homomorphic encryption.

J. Math. Cryptol., 2014

Proceedings of the BIOSIG 2014, 2014

Privacy-Preserving Wildcards Pattern Matching Using Symmetric Somewhat Homomorphic Encryption.

Proceedings of the Information Security and Privacy - 19th Australasian Conference, 2014

2013

Proceedings of the Data Privacy Management and Autonomous Spontaneous Security, 2013

Proceedings of the CCSW'13, 2013

Packed Homomorphic Encryption Based on Ideal Lattices and Its Application to Biometrics.

Proceedings of the Security Engineering and Intelligence Informatics, 2013

2012

Proceedings of the Security and Cryptography for Networks - 8th International Conference, 2012

Solving a Discrete Logarithm Problem with Auxiliary Input on a 160-Bit Elliptic Curve.

Proceedings of the Public Key Cryptography - PKC 2012, 2012

Analysis of Lattice Reduction Attack against the Somewhat Homomorphic Encryption Based on Ideal Lattices.

Proceedings of the Public Key Infrastructures, Services and Applications, 2012

2011

J. Inf. Process., 2011

Proceedings of the Information Security Theory and Practice. Security and Privacy of Mobile Devices in Wireless Communication, 2011

Proceedings of the Information Security Applications - 12th International Workshop, 2011

Time Estimation of Cheon's Algorithm over Elliptic Curves on Finite Fields with Characteristic 3.

Proceedings of the Fifth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2011

Proceedings of the 25th IEEE International Conference on Advanced Information Networking and Applications, 2011

2010

The Elliptic Curve Discrete Logarithm Problems over the <i>p</i>-adic Field and Formal Groups.

Proceedings of the Information Security, 2010

Proceedings of the ARES 2010, 2010

2008

ACM Commun. Comput. Algebra, 2008