Secure pattern matching using somewhat homomorphic encryption M Yasuda, T Shimoyama, J Kogure, K Yokoyama, T Koshiba Proceedings of the 2013 ACM workshop on Cloud computing security workshop, 65-76, 2013 | 134 | 2013 |
Packed homomorphic encryption based on ideal lattices and its application to biometrics M Yasuda, T Shimoyama, J Kogure, K Yokoyama, T Koshiba Security Engineering and Intelligence Informatics: CD-ARES 2013 Workshops …, 2013 | 86 | 2013 |
Practical packing method in somewhat homomorphic encryption M Yasuda, T Shimoyama, J Kogure, K Yokoyama, T Koshiba Data Privacy Management and Autonomous Spontaneous Security: 8th …, 2014 | 67 | 2014 |
New packing method in somewhat homomorphic encryption and its applications M Yasuda, T Shimoyama, J Kogure, K Yokoyama, T Koshiba Security and Communication Networks 8 (13), 2194-2213, 2015 | 41 | 2015 |
Efficient secure matrix multiplication over LWE-based homomorphic encryption DH Duong, PK Mishra, M Yasuda Tatra mountains mathematical publications 67 (1), 69-83, 2016 | 35 | 2016 |
Encryption processing apparatus and method M Yasuda, T Shimoyama, J Kogure US Patent 9,100,185, 2015 | 32 | 2015 |
Privacy-preserving wildcards pattern matching using symmetric somewhat homomorphic encryption M Yasuda, T Shimoyama, J Kogure, K Yokoyama, T Koshiba Information Security and Privacy: 19th Australasian Conference, ACISP 2014 …, 2014 | 28 | 2014 |
Solving a Discrete Logarithm Problem with Auxiliary Input on a 160-Bit Elliptic Curve. Y Sakemi, G Hanaoka, T Izu, M Takenaka, M Yasuda Public Key Cryptography, 595-608, 2012 | 23 | 2012 |
Secure Hamming distance computation for biometrics using ideal-lattice and ring-LWE homomorphic encryption M Yasuda Information Security Journal: A Global Perspective 26 (2), 85-103, 2017 | 22 | 2017 |
Secure statistical analysis using RLWE-based homomorphic encryption M Yasuda, T Shimoyama, J Kogure, K Yokoyama, T Koshiba Information Security and Privacy: 20th Australasian Conference, ACISP 2015 …, 2015 | 21 | 2015 |
Fast secure matrix multiplications over ring-based homomorphic encryption PK Mishra, D Rathee, DH Duong, M Yasuda Information Security Journal: A Global Perspective 30 (4), 219-234, 2021 | 20 | 2021 |
Explicit formula for Gram-Schmidt vectors in LLL with deep insertions and its applications J Yamaguchi, M Yasuda Number-Theoretic Methods in Cryptology: First International Conference …, 2018 | 20 | 2018 |
Faster PCA and linear regression through hypercubes in HElib D Rathee, PK Mishra, M Yasuda Proceedings of the 2018 Workshop on Privacy in the Electronic Society, 42-53, 2018 | 15 | 2018 |
Secure and efficient pairing at 256-bit security level Y Kiyomura, A Inoue, Y Kawahara, M Yasuda, T Takagi, T Kobayashi Applied Cryptography and Network Security: 15th International Conference …, 2017 | 15 | 2017 |
A new polynomial-time variant of LLL with deep insertions for decreasing the squared-sum of Gram–Schmidt lengths M Yasuda, J Yamaguchi Designs, Codes and Cryptography 87, 2489-2505, 2019 | 14 | 2019 |
On the strength comparison of the ECDLP and the IFP M Yasuda, T Shimoyama, J Kogure, T Izu Security and Cryptography for Networks: 8th International Conference, SCN …, 2012 | 14 | 2012 |
Computational hardness of IFP and ECDLP M Yasuda, T Shimoyama, J Kogure, T Izu Applicable Algebra in Engineering, Communication and Computing 27, 493-521, 2016 | 13 | 2016 |
Contents processing device and contents partial integrity assurance method K Furukawa, T Izu, M Takenaka, M Yasuda US Patent App. 12/885,886, 2011 | 12 | 2011 |
A survey of solving SVP algorithms and recent strategies for solving the SVP challenge M Yasuda International Symposium on Mathematics, Quantum Theory, and Cryptography …, 2021 | 11 | 2021 |
Encryption processing method, encryption processing device, and computer-readable recording medium storing program for encryption processing M Takenaka, Y Sakemi, M Yasuda US Patent 9,614,665, 2017 | 11 | 2017 |