Yuntao Wang

Orcid: 0000-0002-2872-4508

Affiliations:
  • Osaka University, Japan
  • Japan Advanced Institute of Science and Technology (JAIST), Japan
  • University of Tokyo, Graduate School of Information Science and Technology, Japan
  • Kyushu University, Graduate School of Mathematics, Fukuoka, Japan


According to our database1, Yuntao Wang authored at least 26 papers between 2014 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
Improved lattice enumeration algorithms by primal and dual reordering methods.
IET Inf. Secur., January, 2023

PPNNP: A privacy-preserving neural network prediction with separated data providers using multi-client inner-product encryption.
Comput. Stand. Interfaces, 2023

Privacy-Enhanced Anonymous and Deniable Post-quantum X3DH.
Proceedings of the Science of Cyber Security - 5th International Conference, 2023

A Trade-off SVP-solving Strategy based on a Sharper pnj-BKZ Simulator.
Proceedings of the 2023 ACM Asia Conference on Computer and Communications Security, 2023

2022
TPM-Based Conditional Privacy-Preserving Authentication Protocol in VANETs.
Symmetry, 2022

Revisiting the Orthogonal Lattice Algorithm in Solving General Approximate Common Divisor Problem.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2022

Lattice-Based Public Key Cryptosystems Invoking Linear Mapping Mask.
Proceedings of the Provable and Practical Security, 2022

2021
Multi-user search on the encrypted multimedia database: lattice-based searchable encryption scheme with time-controlled proxy re-encryption.
Multim. Tools Appl., 2021

Studying lattice reduction algorithms improved by quick reordering technique.
Int. J. Inf. Sec., 2021

Recovery Attack on Bob's Reused Randomness in CRYSTALS-KYBER and SABER.
Proceedings of the Provable and Practical Security, 2021

Message-Restriction-Free Commitment Scheme Based on Lattice Assumption.
Proceedings of the Information Security Practice and Experience: 16th International Conference, 2021

2020
Improving Key Mismatch Attack on NewHope with Fewer Queries.
IACR Cryptol. ePrint Arch., 2020

Key Recovery Attack on Bob's Secrets in CRYSTALS-KYBER and SABER.
IACR Cryptol. ePrint Arch., 2020

Homomorphic commitment scheme with constant output locality.
Proceedings of the Eighth International Symposium on Computing and Networking, 2020

Cryptanalysis of GiophantusTM Schemes against Hybrid Attack.
Proceedings of the 7th on ASIA Public-Key Cryptography Workshop, 2020

2019
LLL and stochastic sandpile models.
IACR Cryptol. ePrint Arch., 2019

One Sample Ring-LWE with Rounding and Its Application to Key Exchange.
Proceedings of the Applied Cryptography and Network Security, 2019

2018
Hardness Evaluation for Search LWE Problem Using Progressive BKZ Simulator.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2018

Why 1.02? The root Hermite factor of LLL and stochastic sandpile models.
CoRR, 2018

Estimated Cost for Solving Generalized Learning with Errors Problem via Embedding Techniques.
Proceedings of the Advances in Information and Computer Security, 2018

Revisiting the Sparsification Technique in Kannan's Embedding Attack on LWE.
Proceedings of the Information Security Practice and Experience, 2018

Improving the BKZ Reduction Algorithm by Quick Reordering Technique.
Proceedings of the Information Security and Privacy - 23rd Australasian Conference, 2018

2017
The Beauty and the Beasts - The Hard Cases in LLL Reduction.
Proceedings of the Advances in Information and Computer Security, 2017

An Experimental Study of Kannan's Embedding Technique for the Search LWE Problem.
Proceedings of the Information and Communications Security - 19th International Conference, 2017

2016
Improved Progressive BKZ Algorithms and their Precise Cost Estimation by Sharp Simulator.
IACR Cryptol. ePrint Arch., 2016

2014
Heuristic counting of Kachisa-Schaefer-Scott curves.
JSIAM Lett., 2014


  Loading...