Yoshinori Aono

Orcid: 0000-0003-1538-7220

According to our database1, Yoshinori Aono authored at least 30 papers between 2009 and 2023.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Anonymous Broadcast Authentication with Logarithmic-order Ciphertexts from DLP or LWE.
IACR Cryptol. ePrint Arch., 2023

Anonymous Broadcast Authentication with Logarithmic-Order Ciphertexts from LWE.
Proceedings of the Cryptology and Network Security - 22nd International Conference, 2023

2021
The Present and Future of Discrete Logarithm Problems on Noisy Quantum Computers.
CoRR, 2021

2020
Enhanced Secure Comparison Schemes Using Homomorphic Encryption.
Proceedings of the Advances in Networked-Based Information Systems, 2020

2018
Privacy-Preserving Deep Learning via Additively Homomorphic Encryption.
IEEE Trans. Inf. Forensics Secur., 2018

Hardness Evaluation for Search LWE Problem Using Progressive BKZ Simulator.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2018

Efficient Homomorphic Encryption with Key Rotation and Security Update.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2018

Lower Bounds on Lattice Enumeration with Extreme Pruning.
IACR Cryptol. ePrint Arch., 2018

Quantum Lattice Enumeration and Tweaking Discrete Pruning.
IACR Cryptol. ePrint Arch., 2018

On the optimality of lattices for the coppersmith technique.
Appl. Algebra Eng. Commun. Comput., 2018

2017
Input and Output Privacy-Preserving Linear Regression.
IEICE Trans. Inf. Syst., 2017

Random Sampling Revisited: Lattice Enumeration with Discrete Pruning.
IACR Cryptol. ePrint Arch., 2017

Privacy preserving extreme learning machine using additively homomorphic encryption.
Proceedings of the 2017 IEEE Symposium Series on Computational Intelligence, 2017

A Generic yet Efficient Method for Secure Inner Product.
Proceedings of the Network and System Security - 11th International Conference, 2017

An Experimental Study of Kannan's Embedding Technique for the Search LWE Problem.
Proceedings of the Information and Communications Security - 19th International Conference, 2017

Efficient Key-Rotatable and Security-Updatable Homomorphic Encryption.
Proceedings of the Fifth ACM International Workshop on Security in Cloud Computing, 2017

A New Secure Matrix Multiplication from Ring-LWE.
Proceedings of the Cryptology and Network Security - 16th International Conference, 2017

Privacy-Preserving Deep Learning: Revisited and Enhanced.
Proceedings of the Applications and Techniques in Information Security, 2017

2016
Privacy-Preserving Logistic Regression with Distributed Data Sources via Homomorphic Encryption.
IEICE Trans. Inf. Syst., 2016

Proxy Re-Encryption Schemes with Key Privacy from LWE.
IACR Cryptol. ePrint Arch., 2016

Improved Progressive BKZ Algorithms and their Precise Cost Estimation by Sharp Simulator.
IACR Cryptol. ePrint Arch., 2016

Scalable and Secure Logistic Regression via Homomorphic Encryption.
IACR Cryptol. ePrint Arch., 2016

2015
Hardness Estimation of LWE via Band Pruning.
IACR Cryptol. ePrint Arch., 2015

Fast and Secure Linear Regression and Biometric Authentication with Security Update.
IACR Cryptol. ePrint Arch., 2015

2014
A faster method for computing Gama-Nguyen-Regev's extreme pruning coefficients.
CoRR, 2014

2013
Key-Private Proxy Re-encryption under LWE.
Proceedings of the Progress in Cryptology - INDOCRYPT 2013, 2013

Minkowski Sum Based Lattice Construction for Multivariate Simultaneous Coppersmith's Technique and Applications to RSA.
Proceedings of the Information Security and Privacy - 18th Australasian Conference, 2013

2012
Minkowski sum based lattice construction for solving simultaneous modular equations and applications to RSA.
IACR Cryptol. ePrint Arch., 2012

2009
A New Lattice Construction for Partial Key Exposure Attack for RSA.
Proceedings of the Public Key Cryptography, 2009

Simplification of the Lattice Based Attack of Boneh and Durfee for RSA Cryptoanalysis.
Proceedings of the Computer Mathematics, 2009


  Loading...