Masaya Yasuda

From MaRDI portal
(Redirected from Person:505660)



List of research outcomes

This list is not complete and representing at the moment only items from zbMATH Open and arXiv. We are working on additional sources - please check back here soon!

PublicationDate of PublicationType
A hybrid approach to speeding up Schoof's algorithm on supersingular elliptic curves2026-02-27Paper
Computing a basis of the set of isogenies between two supersingular elliptic curves2025-01-10Paper
Computing endomorphism rings of supersingular elliptic curves by finding cycles in concatenated supersingular isogeny graphs
Commentarii Mathematici Universitatis Sancti Pauli
2024-11-13Paper
Computing the Brauer group of the product of two elliptic curves over a finite field
Japan Journal of Industrial and Applied Mathematics
2024-05-07Paper
On the feasibility of computing constructive Deuring correspondence
Banach Center Publications
2024-03-15Paper
Development and analysis of massive parallelization of a lattice basis reduction algorithm
Japan Journal of Industrial and Applied Mathematics
2024-01-18Paper
Acceleration of Index Calculus for Solving ECDLP over Prime Fields and Its Limitation
Cryptology and Network Security
2023-06-28Paper
Solving LWR via BDD Strategy: Modulus Switching Approach
Cryptology and Network Security
2023-06-28Paper
Enhancement for Secure Multiple Matrix Multiplications over Ring-LWE Homomorphic Encryption
Information Security Practice and Experience
2022-12-09Paper
Recovering Attacks Against Linear Sketch in Fuzzy Signature Schemes of ACNS 2015 and 2016
Information Security Practice and Experience
2022-12-09Paper
scientific article; zbMATH DE number 7623648 (Why is no real title available?)2022-11-25Paper
Choosing parameters for the subfield lattice attack against overstretched NTRU2022-11-02Paper
Implementation report of the Kohel-Lauter-Petit-Tignol algorithm for the constructive Deuring correspondence2022-10-07Paper
Secure and Efficient Pairing at 256-Bit Security Level2022-07-01Paper
An extension of Kannan's embedding for solving ring-based LWE problems2022-06-29Paper
Solving the search-LWE problem over projected lattices
Discrete Applied Mathematics
2022-06-21Paper
A trace map attack against special ring-LWE samples2022-04-22Paper
Dynamic self-dual DeepBKZ lattice reduction with free dimensions and its implementation
Discrete Applied Mathematics
2021-09-30Paper
Solving the search-LWE problem by lattice reduction over projected bases2021-08-31Paper
Dynamic self-dual DeepBKZ lattice reduction with free dimensions2021-08-31Paper
Symbolic computation of isogenies of elliptic curves by Vélu's formula2021-08-03Paper
Algebraic approaches for solving isogeny problems of prime power degrees
Journal of Mathematical Cryptology
2021-05-25Paper
Complexity bounds on Semaev's naive index calculus method for ECDLP
Journal of Mathematical Cryptology
2021-05-12Paper
A survey of solving SVP algorithms and recent strategies for solving the SVP challenge
International Symposium on Mathematics, Quantum Theory, and Cryptography
2021-02-25Paper
Analysis of DeepBKZ reduction for finding short lattice vectors
Designs, Codes and Cryptography
2020-10-07Paper
Self-dual DeepBKZ for finding short lattice vectors
Journal of Mathematical Cryptology
2020-06-24Paper
A new polynomial-time variant of LLL with deep insertions for decreasing the squared-sum of Gram-Schmidt lengths
Designs, Codes and Cryptography
2019-10-17Paper
Application of mixed integer quadratic program to shortest vector problems
JSIAM Letters
2019-03-18Paper
Security analysis of cryptosystems using short generators over ideal lattices
Japan Journal of Industrial and Applied Mathematics
2018-12-21Paper
Practical analysis of key recovery attack against search-LWE problem2018-10-24Paper
Development of a dual version of DeepBKZ and its application to solving the LWE challenge2018-07-17Paper
Explicit formula for Gram-Schmidt vectors in LLL with deep insertions and its applications2018-06-05Paper
Efficient Secure Matrix Multiplication Over LWE-Based Homomorphic Encryption
Tatra Mountains Mathematical Publications
2017-03-29Paper
Analysis of decreasing squared-sum of Gram-Schmidt lengths for short lattice vectors
Journal of Mathematical Cryptology
2017-03-16Paper
Computational hardness of IFP and ECDLP
Applicable Algebra in Engineering, Communication and Computing
2017-01-26Paper
Torsion points and reduction of elliptic curves
Acta Arithmetica
2016-11-18Paper
Secret computation of purchase history data using somewhat homomorphic encryption
Pacific Journal of Mathematics for Industry
2015-11-10Paper
Secure statistical analysis using RLWE-based homomorphic encryption
Information Security and Privacy
2015-10-20Paper
Practical packing method in somewhat homomorphic encryption
Data Privacy Management and Autonomous Spontaneous Security
2015-10-01Paper
Ramification of the Kummer extension generated from torsion points of elliptic curves
International Journal of Number Theory
2015-09-11Paper
Packed homomorphic encryption based on ideal lattices and its application to biometrics
Security Engineering and Intelligence Informatics
2014-09-30Paper
On the exact decryption range for Gentry-Halevi's implementation of fully homomorphic encryption
Journal of Mathematical Cryptology
2014-09-17Paper
Analysis of Lattice Reduction Attack against the Somewhat Homomorphic Encryption Based on Ideal Lattices
Public Key Infrastructures, Services and Applications
2014-08-11Paper
Privacy-Preserving Wildcards Pattern Matching Using Symmetric Somewhat Homomorphic Encryption
Information Security and Privacy
2014-07-24Paper
Kummer generators and torsion points of elliptic curves with bad reduction at some primes
International Journal of Number Theory
2013-12-10Paper
Torsion points of elliptic curves with bad reduction at some primes
Commentarii Mathematici Universitatis Sancti Pauli
2013-07-12Paper
TORSION POINTS OF ELLIPTIC CURVES WITH BAD REDUCTION AT SOME PRIMES II
Bulletin of the Korean Mathematical Society
2013-02-21Paper
On random walks of Pollard's rho method for the ECDLP on Koblitz curves2013-01-25Paper
On the strength comparison of the ECDLP and the IFP
Lecture Notes in Computer Science
2012-09-25Paper
A generalization of the anomalous attack for the ECDLP over \(\mathbb Q_p\)
International Journal of Pure and Applied Mathematics
2012-09-21Paper
On the number of the pairing-friendly curves
International Journal of Pure and Applied Mathematics
2012-09-21Paper
On elliptic curves whose 3-torsion subgroup splits as \(\mu_3 \oplus \mathbb Z/ 3\mathbb Z\)
Communications of the Korean Mathematical Society
2012-08-13Paper
Solving a Discrete Logarithm Problem with Auxiliary Input on a 160-Bit Elliptic Curve
Public Key Cryptography – PKC 2012
2012-07-20Paper
The lifting problem for the ECDLP and the Selmer rank
International Journal of Pure and Applied Mathematics
2012-03-28Paper
On the canonical bundle formula for abelian fiber spaces in positive characteristic
Kodai Mathematical Journal
2011-05-18Paper
Torsion points of elliptic curves with good reduction
Kodai Mathematical Journal
2009-01-16Paper


Research outcomes over time


This page was built for person: Masaya Yasuda