Follow
Masaya Yasuda
Masaya Yasuda
Rikkyo University, Department of Mathematics
Verified email at rikkyo.ac.jp
Title
Cited by
Cited by
Year
Secure pattern matching using somewhat homomorphic encryption
M Yasuda, T Shimoyama, J Kogure, K Yokoyama, T Koshiba
Proceedings of the 2013 ACM workshop on Cloud computing security workshop, 65-76, 2013
1342013
Packed homomorphic encryption based on ideal lattices and its application to biometrics
M Yasuda, T Shimoyama, J Kogure, K Yokoyama, T Koshiba
Security Engineering and Intelligence Informatics: CD-ARES 2013 Workshops …, 2013
862013
Practical packing method in somewhat homomorphic encryption
M Yasuda, T Shimoyama, J Kogure, K Yokoyama, T Koshiba
Data Privacy Management and Autonomous Spontaneous Security: 8th …, 2014
672014
New packing method in somewhat homomorphic encryption and its applications
M Yasuda, T Shimoyama, J Kogure, K Yokoyama, T Koshiba
Security and Communication Networks 8 (13), 2194-2213, 2015
412015
Efficient secure matrix multiplication over LWE-based homomorphic encryption
DH Duong, PK Mishra, M Yasuda
Tatra mountains mathematical publications 67 (1), 69-83, 2016
352016
Encryption processing apparatus and method
M Yasuda, T Shimoyama, J Kogure
US Patent 9,100,185, 2015
322015
Privacy-preserving wildcards pattern matching using symmetric somewhat homomorphic encryption
M Yasuda, T Shimoyama, J Kogure, K Yokoyama, T Koshiba
Information Security and Privacy: 19th Australasian Conference, ACISP 2014 …, 2014
282014
Solving a Discrete Logarithm Problem with Auxiliary Input on a 160-Bit Elliptic Curve.
Y Sakemi, G Hanaoka, T Izu, M Takenaka, M Yasuda
Public Key Cryptography, 595-608, 2012
232012
Secure Hamming distance computation for biometrics using ideal-lattice and ring-LWE homomorphic encryption
M Yasuda
Information Security Journal: A Global Perspective 26 (2), 85-103, 2017
222017
Secure statistical analysis using RLWE-based homomorphic encryption
M Yasuda, T Shimoyama, J Kogure, K Yokoyama, T Koshiba
Information Security and Privacy: 20th Australasian Conference, ACISP 2015 …, 2015
212015
Fast secure matrix multiplications over ring-based homomorphic encryption
PK Mishra, D Rathee, DH Duong, M Yasuda
Information Security Journal: A Global Perspective 30 (4), 219-234, 2021
202021
Explicit formula for Gram-Schmidt vectors in LLL with deep insertions and its applications
J Yamaguchi, M Yasuda
Number-Theoretic Methods in Cryptology: First International Conference …, 2018
202018
Faster PCA and linear regression through hypercubes in HElib
D Rathee, PK Mishra, M Yasuda
Proceedings of the 2018 Workshop on Privacy in the Electronic Society, 42-53, 2018
152018
Secure and efficient pairing at 256-bit security level
Y Kiyomura, A Inoue, Y Kawahara, M Yasuda, T Takagi, T Kobayashi
Applied Cryptography and Network Security: 15th International Conference …, 2017
152017
A new polynomial-time variant of LLL with deep insertions for decreasing the squared-sum of Gram–Schmidt lengths
M Yasuda, J Yamaguchi
Designs, Codes and Cryptography 87, 2489-2505, 2019
142019
On the strength comparison of the ECDLP and the IFP
M Yasuda, T Shimoyama, J Kogure, T Izu
Security and Cryptography for Networks: 8th International Conference, SCN …, 2012
142012
Computational hardness of IFP and ECDLP
M Yasuda, T Shimoyama, J Kogure, T Izu
Applicable Algebra in Engineering, Communication and Computing 27, 493-521, 2016
132016
Contents processing device and contents partial integrity assurance method
K Furukawa, T Izu, M Takenaka, M Yasuda
US Patent App. 12/885,886, 2011
122011
A survey of solving SVP algorithms and recent strategies for solving the SVP challenge
M Yasuda
International Symposium on Mathematics, Quantum Theory, and Cryptography …, 2021
112021
Encryption processing method, encryption processing device, and computer-readable recording medium storing program for encryption processing
M Takenaka, Y Sakemi, M Yasuda
US Patent 9,614,665, 2017
112017
The system can't perform the operation now. Try again later.
Articles 1–20