Masaya Yasuda
Orcid: 0000-0002-1534-5648
According to our database1,
Masaya Yasuda
authored at least 57 papers
between 2008 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
Proceedings of the Computer Algebra in Scientific Computing - 26th International Workshop, 2024
2022
2021
J. Math. Cryptol., 2021
Inf. Secur. J. A Glob. Perspect., 2021
Dynamic self-dual DeepBKZ lattice reduction with free dimensions and its implementation.
Discret. Appl. Math., 2021
Proceedings of the Advances in Information and Computer Security, 2021
Proceedings of the Cryptography and Coding - 18th IMA International Conference, 2021
Implementation Report of the Kohel-Lauter-Petit-Tignol Algorithm for the Constructive Deuring Correspondence.
Proceedings of the Seventh International Conference on Mathematics and Computing, 2021
Proceedings of the 28th IEEE International Conference on High Performance Computing, 2021
2020
J. Math. Cryptol., 2020
IET Inf. Secur., 2020
Des. Codes Cryptogr., 2020
Massive parallelization for finding shortest lattice vectors based on ubiquity generator framework.
Proceedings of the International Conference for High Performance Computing, 2020
Proceedings of the Sixth International Conference on Mathematics and Computing, 2020
Proceedings of the Sixth International Conference on Mathematics and Computing, 2020
Proceedings of the 7th on ASIA Public-Key Cryptography Workshop, 2020
2019
A new polynomial-time variant of LLL with deep insertions for decreasing the squared-sum of Gram-Schmidt lengths.
Des. Codes Cryptogr., 2019
2018
IACR Cryptol. ePrint Arch., 2018
Proceedings of the Cryptology and Network Security - 17th International Conference, 2018
Acceleration of Index Calculus for Solving ECDLP over Prime Fields and Its Limitation.
Proceedings of the Cryptology and Network Security - 17th International Conference, 2018
Development of a Dual Version of DeepBKZ and Its Application to Solving the LWE Challenge.
Proceedings of the Progress in Cryptology - AFRICACRYPT 2018, 2018
2017
JSIAM Lett., 2017
Analysis of decreasing squared-sum of Gram-Schmidt lengths for short lattice vectors.
J. Math. Cryptol., 2017
Secure Hamming distance computation for biometrics using ideal-lattice and ring-LWE homomorphic encryption.
Inf. Secur. J. A Glob. Perspect., 2017
IACR Cryptol. ePrint Arch., 2017
Explicit Formula for Gram-Schmidt Vectors in LLL with Deep Insertions and Its Applications.
Proceedings of the Number-Theoretic Methods in Cryptology - First International Conference, 2017
Recovering Attacks Against Linear Sketch in Fuzzy Signature Schemes of ACNS 2015 and 2016.
Proceedings of the Information Security Practice and Experience, 2017
Enhancement for Secure Multiple Matrix Multiplications over Ring-LWE Homomorphic Encryption.
Proceedings of the Information Security Practice and Experience, 2017
Proceedings of the Applied Cryptography and Network Security, 2017
Proceedings of the Mathematical Modelling for Next-Generation Cryptography: CREST Crypto-Math Project, 2017
2016
Proceedings of the Advances in Information and Computer Security, 2016
2015
Secur. Commun. Networks, 2015
Secur. Commun. Networks, 2015
IACR Cryptol. ePrint Arch., 2015
Privacy-Preserving Fuzzy Commitment for Biometrics via Layered Error-Correcting Codes.
Proceedings of the Foundations and Practice of Security - 8th International Symposium, 2015
Proceedings of the Data Privacy Management, and Security Assurance, 2015
Secure Data Devolution: Practical Re-encryption with Auxiliary Data in LWE-based Somewhat Homomorphic Encryption.
Proceedings of the 3rd International Workshop on Security in Cloud Computing, 2015
Proceedings of the Information Security and Privacy - 20th Australasian Conference, 2015
2014
On the exact decryption range for Gentry-Halevi's implementation of fully homomorphic encryption.
J. Math. Cryptol., 2014
Proceedings of the BIOSIG 2014, 2014
Privacy-Preserving Wildcards Pattern Matching Using Symmetric Somewhat Homomorphic Encryption.
Proceedings of the Information Security and Privacy - 19th Australasian Conference, 2014
2013
Proceedings of the Data Privacy Management and Autonomous Spontaneous Security, 2013
Proceedings of the CCSW'13, 2013
Packed Homomorphic Encryption Based on Ideal Lattices and Its Application to Biometrics.
Proceedings of the Security Engineering and Intelligence Informatics, 2013
2012
Proceedings of the Security and Cryptography for Networks - 8th International Conference, 2012
Solving a Discrete Logarithm Problem with Auxiliary Input on a 160-Bit Elliptic Curve.
Proceedings of the Public Key Cryptography - PKC 2012, 2012
Analysis of Lattice Reduction Attack against the Somewhat Homomorphic Encryption Based on Ideal Lattices.
Proceedings of the Public Key Infrastructures, Services and Applications, 2012
2011
J. Inf. Process., 2011
Proceedings of the Information Security Theory and Practice. Security and Privacy of Mobile Devices in Wireless Communication, 2011
Proceedings of the Information Security Applications - 12th International Workshop, 2011
Time Estimation of Cheon's Algorithm over Elliptic Curves on Finite Fields with Characteristic 3.
Proceedings of the Fifth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2011
Proceedings of the 25th IEEE International Conference on Advanced Information Networking and Applications, 2011
2010
The Elliptic Curve Discrete Logarithm Problems over the <i>p</i>-adic Field and Formal Groups.
Proceedings of the Information Security, 2010
2008
ACM Commun. Comput. Algebra, 2008