Shintaro Narisada

Orcid: 0000-0002-9399-9778

According to our database1, Shintaro Narisada authored at least 15 papers between 2017 and 2024.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Efficient Homomorphic Evaluation of Arbitrary Uni/Bivariate Integer Functions and Their Applications.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2024

Revisiting the May-Meurer-Thomae Algorithm - Solving McEliece-1409 in One Day.
IACR Cryptol. ePrint Arch., 2024

Gradient-Based Clean Label Backdoor Attack to Graph Neural Networks.
Proceedings of the 10th International Conference on Information Systems Security and Privacy, 2024

2023
Multiparallel MMT: Faster ISD Algorithm Solving High-Dimensional Syndrome Decoding Problem.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., March, 2023

GPU Acceleration of High-Precision Homomorphic Computation Utilizing Redundant Representation.
IACR Cryptol. ePrint Arch., 2023

Concrete Quantum Circuits to Prepare Generalized Dicke States on a Quantum Machine.
Proceedings of the 9th International Conference on Information Systems Security and Privacy, 2023

Fully Hidden Dynamic Trigger Backdoor Attacks.
Proceedings of the 15th International Conference on Agents and Artificial Intelligence, 2023

2021
Faster Rotation-Based Gauss Sieve for Solving the SVP on General Ideal Lattices.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2021

Fast GPU Implementation of Dumer's Algorithm Solving the Syndrome Decoding Problem.
Proceedings of the 2021 IEEE Intl Conf on Parallel & Distributed Processing with Applications, Big Data & Cloud Computing, Sustainable Computing & Communications, Social Computing & Networking (ISPA/BDCloud/SocialCom/SustainCom), New York City, NY, USA, September 30, 2021

Countermeasures Against Backdoor Attacks Towards Malware Detectors.
Proceedings of the Cryptology and Network Security - 20th International Conference, 2021

2020
Linear-time online algorithm for inferring the shortest path graph from a walk label.
Theor. Comput. Sci., 2020

Efficient computation of longest single-arm-gapped palindromes in a string.
Theor. Comput. Sci., 2020

Stronger Targeted Poisoning Attacks Against Malware Detection.
Proceedings of the Cryptology and Network Security - 19th International Conference, 2020

2018
Linear-Time Online Algorithm Inferring the Shortest Path from a Walk.
Proceedings of the String Processing and Information Retrieval, 2018

2017
Computing Longest Single-arm-gapped Palindromes in a String.
Proceedings of the SOFSEM 2017: Theory and Practice of Computer Science, 2017


  Loading...