Masaya Yasuda

Orcid: 0000-0002-1534-5648

According to our database1, Masaya Yasuda authored at least 56 papers between 2008 and 2022.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2022
Solving the search-LWE problem over projected lattices.
Discret. Appl. Math., 2022

2021
Algebraic approaches for solving isogeny problems of prime power degrees.
J. Math. Cryptol., 2021

Fast secure matrix multiplications over ring-based homomorphic encryption.
Inf. Secur. J. A Glob. Perspect., 2021

Dynamic self-dual DeepBKZ lattice reduction with free dimensions and its implementation.
Discret. Appl. Math., 2021

A Trace Map Attack Against Special Ring-LWE Samples.
Proceedings of the Advances in Information and Computer Security, 2021

An Extension of Kannan's Embedding for Solving Ring-Based LWE Problems.
Proceedings of the Cryptography and Coding - 18th IMA International Conference, 2021

Implementation Report of the Kohel-Lauter-Petit-Tignol Algorithm for the Constructive Deuring Correspondence.
Proceedings of the Seventh International Conference on Mathematics and Computing, 2021

CMAP-LAP: Configurable Massively Parallel Solver for Lattice Problems.
Proceedings of the 28th IEEE International Conference on High Performance Computing, 2021

2020
Complexity bounds on Semaev's naive index calculus method for ECDLP.
J. Math. Cryptol., 2020

Self-dual DeepBKZ for finding short lattice vectors.
J. Math. Cryptol., 2020

Impact of the modulus switching technique on some attacks against learning problems.
IET Inf. Secur., 2020

Analysis of DeepBKZ reduction for finding short lattice vectors.
Des. Codes Cryptogr., 2020

Massive parallelization for finding shortest lattice vectors based on ubiquity generator framework.
Proceedings of the International Conference for High Performance Computing, 2020

Solving the Search-LWE Problem by Lattice Reduction over Projected Bases.
Proceedings of the Sixth International Conference on Mathematics and Computing, 2020

Dynamic Self-dual DeepBKZ Lattice Reduction with Free Dimensions.
Proceedings of the Sixth International Conference on Mathematics and Computing, 2020

Hybrid Meet-in-the-Middle Attacks for the Isogeny Path-Finding Problem.
Proceedings of the 7th on ASIA Public-Key Cryptography Workshop, 2020

2019
A new polynomial-time variant of LLL with deep insertions for decreasing the squared-sum of Gram-Schmidt lengths.
Des. Codes Cryptogr., 2019

2018
Faster PCA and Linear Regression through Hypercubes in HElib.
IACR Cryptol. ePrint Arch., 2018

Solving LWR via BDD Strategy: Modulus Switching Approach.
Proceedings of the Cryptology and Network Security - 17th International Conference, 2018

Acceleration of Index Calculus for Solving ECDLP over Prime Fields and Its Limitation.
Proceedings of the Cryptology and Network Security - 17th International Conference, 2018

Development of a Dual Version of DeepBKZ and Its Application to Solving the LWE Challenge.
Proceedings of the Progress in Cryptology - AFRICACRYPT 2018, 2018

2017
Application of mixed integer quadratic program to shortest vector problems.
JSIAM Lett., 2017

Analysis of decreasing squared-sum of Gram-Schmidt lengths for short lattice vectors.
J. Math. Cryptol., 2017

Secure Hamming distance computation for biometrics using ideal-lattice and ring-LWE homomorphic encryption.
Inf. Secur. J. A Glob. Perspect., 2017

Choosing Parameters for the Subfield Lattice Attack against overstretched NTRU.
IACR Cryptol. ePrint Arch., 2017

Explicit Formula for Gram-Schmidt Vectors in LLL with Deep Insertions and Its Applications.
Proceedings of the Number-Theoretic Methods in Cryptology - First International Conference, 2017

Recovering Attacks Against Linear Sketch in Fuzzy Signature Schemes of ACNS 2015 and 2016.
Proceedings of the Information Security Practice and Experience, 2017

Enhancement for Secure Multiple Matrix Multiplications over Ring-LWE Homomorphic Encryption.
Proceedings of the Information Security Practice and Experience, 2017

Secure and Efficient Pairing at 256-Bit Security Level.
Proceedings of the Applied Cryptography and Network Security, 2017

Simple Analysis of Key Recovery Attack Against LWE.
Proceedings of the Mathematical Modelling for Next-Generation Cryptography: CREST Crypto-Math Project, 2017

2016
Computational hardness of IFP and ECDLP.
Appl. Algebra Eng. Commun. Comput., 2016

Practical Analysis of Key Recovery Attack Against Search-LWE Problem.
Proceedings of the Advances in Information and Computer Security, 2016

2015
New packing method in somewhat homomorphic encryption and its applications.
Secur. Commun. Networks, 2015

Biometric key-binding using lattice masking<sup><i>†</i></sup>.
Secur. Commun. Networks, 2015

Security Analysis of Cryptosystems Using Short Generators over Ideal Lattices.
IACR Cryptol. ePrint Arch., 2015

Privacy-Preserving Fuzzy Commitment for Biometrics via Layered Error-Correcting Codes.
Proceedings of the Foundations and Practice of Security - 8th International Symposium, 2015

Comprehensive and Improved Secure Biometric System Using Homomorphic Encryption.
Proceedings of the Data Privacy Management, and Security Assurance, 2015

Secure Data Devolution: Practical Re-encryption with Auxiliary Data in LWE-based Somewhat Homomorphic Encryption.
Proceedings of the 3rd International Workshop on Security in Cloud Computing, 2015

Secure Statistical Analysis Using RLWE-Based Homomorphic Encryption.
Proceedings of the Information Security and Privacy - 20th Australasian Conference, 2015

2014
On the exact decryption range for Gentry-Halevi's implementation of fully homomorphic encryption.
J. Math. Cryptol., 2014

A Biometric Key-Binding Scheme Using Lattice Masking.
Proceedings of the BIOSIG 2014, 2014

Privacy-Preserving Wildcards Pattern Matching Using Symmetric Somewhat Homomorphic Encryption.
Proceedings of the Information Security and Privacy - 19th Australasian Conference, 2014

2013
Practical Packing Method in Somewhat Homomorphic Encryption.
Proceedings of the Data Privacy Management and Autonomous Spontaneous Security, 2013

Secure pattern matching using somewhat homomorphic encryption.
Proceedings of the CCSW'13, 2013

Packed Homomorphic Encryption Based on Ideal Lattices and Its Application to Biometrics.
Proceedings of the Security Engineering and Intelligence Informatics, 2013

2012
On the Strength Comparison of the ECDLP and the IFP.
Proceedings of the Security and Cryptography for Networks - 8th International Conference, 2012

Solving a Discrete Logarithm Problem with Auxiliary Input on a 160-Bit Elliptic Curve.
Proceedings of the Public Key Cryptography - PKC 2012, 2012

Analysis of Lattice Reduction Attack against the Somewhat Homomorphic Encryption Based on Ideal Lattices.
Proceedings of the Public Key Infrastructures, Services and Applications, 2012

2011
Experimental Analysis of Cheon's Algorithm against Pairing-friendly Curves.
J. Inf. Process., 2011

Solving DLP with Auxiliary Input over an Elliptic Curve Used in TinyTate Library.
Proceedings of the Information Security Theory and Practice. Security and Privacy of Mobile Devices in Wireless Communication, 2011

Solving a DLP with Auxiliary Input with the ρ-Algorithm.
Proceedings of the Information Security Applications - 12th International Workshop, 2011

Time Estimation of Cheon's Algorithm over Elliptic Curves on Finite Fields with Characteristic 3.
Proceedings of the Fifth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2011

Experimantal Analysis of Cheon's Algorithm Against Pairing-Friendly Curves.
Proceedings of the 25th IEEE International Conference on Advanced Information Networking and Applications, 2011

2010
The Elliptic Curve Discrete Logarithm Problems over the <i>p</i>-adic Field and Formal Groups.
Proceedings of the Information Security, 2010

Experimental Results on Cheon's Algorithm.
Proceedings of the ARES 2010, 2010

2008
The discrete logarithm problem on elliptic curves defined over Q (abstract only).
ACM Commun. Comput. Algebra, 2008


  Loading...