| Publication | Date of Publication | Type |
|---|
| A hybrid approach to speeding up Schoof's algorithm on supersingular elliptic curves | 2026-02-27 | Paper |
| Computing a basis of the set of isogenies between two supersingular elliptic curves | 2025-01-10 | Paper |
Computing endomorphism rings of supersingular elliptic curves by finding cycles in concatenated supersingular isogeny graphs Commentarii Mathematici Universitatis Sancti Pauli | 2024-11-13 | Paper |
Computing the Brauer group of the product of two elliptic curves over a finite field Japan Journal of Industrial and Applied Mathematics | 2024-05-07 | Paper |
On the feasibility of computing constructive Deuring correspondence Banach Center Publications | 2024-03-15 | Paper |
Development and analysis of massive parallelization of a lattice basis reduction algorithm Japan Journal of Industrial and Applied Mathematics | 2024-01-18 | Paper |
Acceleration of Index Calculus for Solving ECDLP over Prime Fields and Its Limitation Cryptology and Network Security | 2023-06-28 | Paper |
Solving LWR via BDD Strategy: Modulus Switching Approach Cryptology and Network Security | 2023-06-28 | Paper |
Enhancement for Secure Multiple Matrix Multiplications over Ring-LWE Homomorphic Encryption Information Security Practice and Experience | 2022-12-09 | Paper |
Recovering Attacks Against Linear Sketch in Fuzzy Signature Schemes of ACNS 2015 and 2016 Information Security Practice and Experience | 2022-12-09 | Paper |
| scientific article; zbMATH DE number 7623648 (Why is no real title available?) | 2022-11-25 | Paper |
| Choosing parameters for the subfield lattice attack against overstretched NTRU | 2022-11-02 | Paper |
| Implementation report of the Kohel-Lauter-Petit-Tignol algorithm for the constructive Deuring correspondence | 2022-10-07 | Paper |
| Secure and Efficient Pairing at 256-Bit Security Level | 2022-07-01 | Paper |
| An extension of Kannan's embedding for solving ring-based LWE problems | 2022-06-29 | Paper |
Solving the search-LWE problem over projected lattices Discrete Applied Mathematics | 2022-06-21 | Paper |
| A trace map attack against special ring-LWE samples | 2022-04-22 | Paper |
Dynamic self-dual DeepBKZ lattice reduction with free dimensions and its implementation Discrete Applied Mathematics | 2021-09-30 | Paper |
| Solving the search-LWE problem by lattice reduction over projected bases | 2021-08-31 | Paper |
| Dynamic self-dual DeepBKZ lattice reduction with free dimensions | 2021-08-31 | Paper |
| Symbolic computation of isogenies of elliptic curves by Vélu's formula | 2021-08-03 | Paper |
Algebraic approaches for solving isogeny problems of prime power degrees Journal of Mathematical Cryptology | 2021-05-25 | Paper |
Complexity bounds on Semaev's naive index calculus method for ECDLP Journal of Mathematical Cryptology | 2021-05-12 | Paper |
A survey of solving SVP algorithms and recent strategies for solving the SVP challenge International Symposium on Mathematics, Quantum Theory, and Cryptography | 2021-02-25 | Paper |
Analysis of DeepBKZ reduction for finding short lattice vectors Designs, Codes and Cryptography | 2020-10-07 | Paper |
Self-dual DeepBKZ for finding short lattice vectors Journal of Mathematical Cryptology | 2020-06-24 | Paper |
A new polynomial-time variant of LLL with deep insertions for decreasing the squared-sum of Gram-Schmidt lengths Designs, Codes and Cryptography | 2019-10-17 | Paper |
Application of mixed integer quadratic program to shortest vector problems JSIAM Letters | 2019-03-18 | Paper |
Security analysis of cryptosystems using short generators over ideal lattices Japan Journal of Industrial and Applied Mathematics | 2018-12-21 | Paper |
| Practical analysis of key recovery attack against search-LWE problem | 2018-10-24 | Paper |
| Development of a dual version of DeepBKZ and its application to solving the LWE challenge | 2018-07-17 | Paper |
| Explicit formula for Gram-Schmidt vectors in LLL with deep insertions and its applications | 2018-06-05 | Paper |
Efficient Secure Matrix Multiplication Over LWE-Based Homomorphic Encryption Tatra Mountains Mathematical Publications | 2017-03-29 | Paper |
Analysis of decreasing squared-sum of Gram-Schmidt lengths for short lattice vectors Journal of Mathematical Cryptology | 2017-03-16 | Paper |
Computational hardness of IFP and ECDLP Applicable Algebra in Engineering, Communication and Computing | 2017-01-26 | Paper |
Torsion points and reduction of elliptic curves Acta Arithmetica | 2016-11-18 | Paper |
Secret computation of purchase history data using somewhat homomorphic encryption Pacific Journal of Mathematics for Industry | 2015-11-10 | Paper |
Secure statistical analysis using RLWE-based homomorphic encryption Information Security and Privacy | 2015-10-20 | Paper |
Practical packing method in somewhat homomorphic encryption Data Privacy Management and Autonomous Spontaneous Security | 2015-10-01 | Paper |
Ramification of the Kummer extension generated from torsion points of elliptic curves International Journal of Number Theory | 2015-09-11 | Paper |
Packed homomorphic encryption based on ideal lattices and its application to biometrics Security Engineering and Intelligence Informatics | 2014-09-30 | Paper |
On the exact decryption range for Gentry-Halevi's implementation of fully homomorphic encryption Journal of Mathematical Cryptology | 2014-09-17 | Paper |
Analysis of Lattice Reduction Attack against the Somewhat Homomorphic Encryption Based on Ideal Lattices Public Key Infrastructures, Services and Applications | 2014-08-11 | Paper |
Privacy-Preserving Wildcards Pattern Matching Using Symmetric Somewhat Homomorphic Encryption Information Security and Privacy | 2014-07-24 | Paper |
Kummer generators and torsion points of elliptic curves with bad reduction at some primes International Journal of Number Theory | 2013-12-10 | Paper |
Torsion points of elliptic curves with bad reduction at some primes Commentarii Mathematici Universitatis Sancti Pauli | 2013-07-12 | Paper |
TORSION POINTS OF ELLIPTIC CURVES WITH BAD REDUCTION AT SOME PRIMES II Bulletin of the Korean Mathematical Society | 2013-02-21 | Paper |
| On random walks of Pollard's rho method for the ECDLP on Koblitz curves | 2013-01-25 | Paper |
On the strength comparison of the ECDLP and the IFP Lecture Notes in Computer Science | 2012-09-25 | Paper |
A generalization of the anomalous attack for the ECDLP over \(\mathbb Q_p\) International Journal of Pure and Applied Mathematics | 2012-09-21 | Paper |
On the number of the pairing-friendly curves International Journal of Pure and Applied Mathematics | 2012-09-21 | Paper |
On elliptic curves whose 3-torsion subgroup splits as \(\mu_3 \oplus \mathbb Z/ 3\mathbb Z\) Communications of the Korean Mathematical Society | 2012-08-13 | Paper |
Solving a Discrete Logarithm Problem with Auxiliary Input on a 160-Bit Elliptic Curve Public Key Cryptography – PKC 2012 | 2012-07-20 | Paper |
The lifting problem for the ECDLP and the Selmer rank International Journal of Pure and Applied Mathematics | 2012-03-28 | Paper |
On the canonical bundle formula for abelian fiber spaces in positive characteristic Kodai Mathematical Journal | 2011-05-18 | Paper |
Torsion points of elliptic curves with good reduction Kodai Mathematical Journal | 2009-01-16 | Paper |