Masaya Yasuda

From MaRDI portal
Person:505660

Available identifiers

zbMath Open yasuda.masayaMaRDI QIDQ505660

List of research outcomes





PublicationDate of PublicationType
Computing a basis of the set of isogenies between two supersingular elliptic curves2025-01-10Paper
Computing endomorphism rings of supersingular elliptic curves by finding cycles in concatenated supersingular isogeny graphs2024-11-13Paper
Computing the Brauer group of the product of two elliptic curves over a finite field2024-05-07Paper
On the feasibility of computing constructive Deuring correspondence2024-03-15Paper
Development and analysis of massive parallelization of a lattice basis reduction algorithm2024-01-18Paper
Acceleration of Index Calculus for Solving ECDLP over Prime Fields and Its Limitation2023-06-28Paper
Solving LWR via BDD Strategy: Modulus Switching Approach2023-06-28Paper
Enhancement for Secure Multiple Matrix Multiplications over Ring-LWE Homomorphic Encryption2022-12-09Paper
Recovering Attacks Against Linear Sketch in Fuzzy Signature Schemes of ACNS 2015 and 20162022-12-09Paper
https://portal.mardi4nfdi.de/entity/Q50529402022-11-25Paper
Choosing parameters for the subfield lattice attack against overstretched NTRU2022-11-02Paper
Implementation report of the Kohel-Lauter-Petit-Tignol algorithm for the constructive Deuring correspondence2022-10-07Paper
Secure and Efficient Pairing at 256-Bit Security Level2022-07-01Paper
An extension of Kannan's embedding for solving ring-based LWE problems2022-06-29Paper
Solving the search-LWE problem over projected lattices2022-06-21Paper
A trace map attack against special ring-LWE samples2022-04-22Paper
Dynamic self-dual DeepBKZ lattice reduction with free dimensions and its implementation2021-09-30Paper
Solving the search-LWE problem by lattice reduction over projected bases2021-08-31Paper
Dynamic self-dual DeepBKZ lattice reduction with free dimensions2021-08-31Paper
https://portal.mardi4nfdi.de/entity/Q50049812021-08-03Paper
Algebraic approaches for solving isogeny problems of prime power degrees2021-05-25Paper
Complexity bounds on Semaev's naive index calculus method for ECDLP2021-05-12Paper
A Survey of Solving SVP Algorithms and Recent Strategies for Solving the SVP Challenge2021-02-25Paper
Analysis of DeepBKZ reduction for finding short lattice vectors2020-10-07Paper
Self-dual DeepBKZ for finding short lattice vectors2020-06-24Paper
A new polynomial-time variant of LLL with deep insertions for decreasing the squared-sum of Gram-Schmidt lengths2019-10-17Paper
Application of mixed integer quadratic program to shortest vector problems2019-03-18Paper
Security analysis of cryptosystems using short generators over ideal lattices2018-12-21Paper
Practical analysis of key recovery attack against search-LWE problem2018-10-24Paper
Development of a dual version of DeepBKZ and its application to solving the LWE challenge2018-07-17Paper
Explicit formula for Gram-Schmidt vectors in LLL with deep insertions and its applications2018-06-05Paper
Efficient Secure Matrix Multiplication Over LWE-Based Homomorphic Encryption2017-03-29Paper
Analysis of decreasing squared-sum of Gram-Schmidt lengths for short lattice vectors2017-03-16Paper
Computational hardness of IFP and ECDLP2017-01-26Paper
Torsion points and reduction of elliptic curves2016-11-18Paper
Secret computation of purchase history data using somewhat homomorphic encryption2015-11-10Paper
Secure Statistical Analysis Using RLWE-Based Homomorphic Encryption2015-10-20Paper
Practical Packing Method in Somewhat Homomorphic Encryption2015-10-01Paper
Ramification of the Kummer extension generated from torsion points of elliptic curves2015-09-11Paper
Packed Homomorphic Encryption Based on Ideal Lattices and Its Application to Biometrics2014-09-30Paper
On the exact decryption range for Gentry-Halevi's implementation of fully homomorphic encryption2014-09-17Paper
Analysis of Lattice Reduction Attack against the Somewhat Homomorphic Encryption Based on Ideal Lattices2014-08-11Paper
Privacy-Preserving Wildcards Pattern Matching Using Symmetric Somewhat Homomorphic Encryption2014-07-24Paper
Kummer generators and torsion points of elliptic curves with bad reduction at some primes2013-12-10Paper
Torsion points of elliptic curves with bad reduction at some primes2013-07-12Paper
TORSION POINTS OF ELLIPTIC CURVES WITH BAD REDUCTION AT SOME PRIMES II2013-02-21Paper
https://portal.mardi4nfdi.de/entity/Q49021352013-01-25Paper
On the Strength Comparison of the ECDLP and the IFP2012-09-25Paper
A generalization of the anomalous attack for the ECDLP over \(\mathbb Q_p\)2012-09-21Paper
On the number of the pairing-friendly curves2012-09-21Paper
On elliptic curves whose 3-torsion subgroup splits as \(\mu_3 \oplus \mathbb Z/ 3\mathbb Z\)2012-08-13Paper
Solving a Discrete Logarithm Problem with Auxiliary Input on a 160-Bit Elliptic Curve2012-07-20Paper
The lifting problem for the ECDLP and the Selmer rank2012-03-28Paper
On the canonical bundle formula for abelian fiber spaces in positive characteristic2011-05-18Paper
Torsion points of elliptic curves with good reduction2009-01-16Paper

Research outcomes over time

This page was built for person: Masaya Yasuda