Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: Jun Kogure
@article{DBLP:journals/jmc/YokoyamaYTK20, author = {Kazuhiro Yokoyama and Masaya Yasuda and Yasushi Takahashi and Jun Kogure}, title = {Complexity bounds on Semaev's naive index calculus method for {ECDLP}}, journal = {J. Math. Cryptol.}, volume = {14}, number = {1}, pages = {460--485}, year = {2020}, url = {https://doi.org/10.1515/jmc-2019-0029}, doi = {10.1515/JMC-2019-0029}, timestamp = {Wed, 17 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jmc/YokoyamaYTK20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jmc/YasudaYSKK17, author = {Masaya Yasuda and Kazuhiro Yokoyama and Takeshi Shimoyama and Jun Kogure and Takeshi Koshiba}, title = {Analysis of decreasing squared-sum of Gram-Schmidt lengths for short lattice vectors}, journal = {J. Math. Cryptol.}, volume = {11}, number = {1}, pages = {1--24}, year = {2017}, url = {https://doi.org/10.1515/jmc-2016-0008}, doi = {10.1515/JMC-2016-0008}, timestamp = {Wed, 17 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jmc/YasudaYSKK17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/aaecc/YasudaSKI16, author = {Masaya Yasuda and Takeshi Shimoyama and Jun Kogure and Tetsuya Izu}, title = {Computational hardness of {IFP} and {ECDLP}}, journal = {Appl. Algebra Eng. Commun. Comput.}, volume = {27}, number = {6}, pages = {493--521}, year = {2016}, url = {https://doi.org/10.1007/s00200-016-0291-x}, doi = {10.1007/S00200-016-0291-X}, timestamp = {Thu, 18 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/aaecc/YasudaSKI16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/YasudaSKYK15, author = {Masaya Yasuda and Takeshi Shimoyama and Jun Kogure and Kazuhiro Yokoyama and Takeshi Koshiba}, title = {New packing method in somewhat homomorphic encryption and its applications}, journal = {Secur. Commun. Networks}, volume = {8}, number = {13}, pages = {2194--2213}, year = {2015}, url = {https://doi.org/10.1002/sec.1164}, doi = {10.1002/SEC.1164}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/YasudaSKYK15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/YasudaSKYK15, author = {Masaya Yasuda and Takeshi Shimoyama and Jun Kogure and Kazuhiro Yokoyama and Takeshi Koshiba}, editor = {Ernest Foo and Douglas Stebila}, title = {Secure Statistical Analysis Using RLWE-Based Homomorphic Encryption}, booktitle = {Information Security and Privacy - 20th Australasian Conference, {ACISP} 2015, Brisbane, QLD, Australia, June 29 - July 1, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9144}, pages = {471--487}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-19962-7\_27}, doi = {10.1007/978-3-319-19962-7\_27}, timestamp = {Tue, 14 May 2019 10:00:46 +0200}, biburl = {https://dblp.org/rec/conf/acisp/YasudaSKYK15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/YasudaKSKY15, author = {Masaya Yasuda and Takeshi Koshiba and Takeshi Shimoyama and Jun Kogure and Kazuhiro Yokoyama}, editor = {Feng Bao and Steven Miller and Sherman S. M. Chow and Danfeng Yao}, title = {Secure Data Devolution: Practical Re-encryption with Auxiliary Data in LWE-based Somewhat Homomorphic Encryption}, booktitle = {Proceedings of the 3rd International Workshop on Security in Cloud Computing, SCC@ASIACCS '15, Singapore, Republic of Singapore, April 14, 2015}, pages = {53--61}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2732516.2732521}, doi = {10.1145/2732516.2732521}, timestamp = {Thu, 20 Oct 2022 10:45:07 +0200}, biburl = {https://dblp.org/rec/conf/ccs/YasudaKSKY15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jmc/YasudaYSKK14, author = {Masaya Yasuda and Kazuhiro Yokoyama and Takeshi Shimoyama and Jun Kogure and Takeshi Koshiba}, title = {On the exact decryption range for Gentry-Halevi's implementation of fully homomorphic encryption}, journal = {J. Math. Cryptol.}, volume = {8}, number = {3}, pages = {305--329}, year = {2014}, url = {https://doi.org/10.1515/jmc-2013-0024}, doi = {10.1515/JMC-2013-0024}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jmc/YasudaYSKK14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/YasudaSKYK14, author = {Masaya Yasuda and Takeshi Shimoyama and Jun Kogure and Kazuhiro Yokoyama and Takeshi Koshiba}, editor = {Willy Susilo and Yi Mu}, title = {Privacy-Preserving Wildcards Pattern Matching Using Symmetric Somewhat Homomorphic Encryption}, booktitle = {Information Security and Privacy - 19th Australasian Conference, {ACISP} 2014, Wollongong, NSW, Australia, July 7-9, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8544}, pages = {338--353}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-08344-5\_22}, doi = {10.1007/978-3-319-08344-5\_22}, timestamp = {Thu, 14 Oct 2021 10:41:30 +0200}, biburl = {https://dblp.org/rec/conf/acisp/YasudaSKYK14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEares/YasudaSKYK13, author = {Masaya Yasuda and Takeshi Shimoyama and Jun Kogure and Kazuhiro Yokoyama and Takeshi Koshiba}, editor = {Alfredo Cuzzocrea and Christian Kittl and Dimitris E. Simos and Edgar R. Weippl and Lida Xu}, title = {Packed Homomorphic Encryption Based on Ideal Lattices and Its Application to Biometrics}, booktitle = {Security Engineering and Intelligence Informatics - {CD-ARES} 2013 Workshops: MoCrySEn and SeCIHD, Regensburg, Germany, September 2-6, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8128}, pages = {55--74}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-40588-4\_5}, doi = {10.1007/978-3-642-40588-4\_5}, timestamp = {Tue, 14 May 2019 10:00:49 +0200}, biburl = {https://dblp.org/rec/conf/IEEEares/YasudaSKYK13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/YasudaSKYK13, author = {Masaya Yasuda and Takeshi Shimoyama and Jun Kogure and Kazuhiro Yokoyama and Takeshi Koshiba}, editor = {Ari Juels and Bryan Parno}, title = {Secure pattern matching using somewhat homomorphic encryption}, booktitle = {CCSW'13, Proceedings of the 2013 {ACM} Cloud Computing Security Workshop, Co-located with {CCS} 2013, Berlin, Germany, November 4, 2013}, pages = {65--76}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2517488.2517497}, doi = {10.1145/2517488.2517497}, timestamp = {Tue, 10 Nov 2020 16:06:16 +0100}, biburl = {https://dblp.org/rec/conf/ccs/YasudaSKYK13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/YasudaSKYK13, author = {Masaya Yasuda and Takeshi Shimoyama and Jun Kogure and Kazuhiro Yokoyama and Takeshi Koshiba}, editor = {Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro and Georgios V. Lioudakis and Nora Cuppens{-}Boulahia and Simon N. Foley and William M. Fitzgerald}, title = {Practical Packing Method in Somewhat Homomorphic Encryption}, booktitle = {Data Privacy Management and Autonomous Spontaneous Security - 8th International Workshop, {DPM} 2013, and 6th International Workshop, {SETOP} 2013, Egham, UK, September 12-13, 2013, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8247}, pages = {34--50}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-54568-9\_3}, doi = {10.1007/978-3-642-54568-9\_3}, timestamp = {Sun, 25 Oct 2020 22:34:56 +0100}, biburl = {https://dblp.org/rec/conf/esorics/YasudaSKYK13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/KogureKY12, author = {Jun Kogure and Noboru Kunihiro and Hirosuke Yamamoto}, title = {On the Hardness of Subset Sum Problem from Different Intervals}, journal = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.}, volume = {95-A}, number = {5}, pages = {903--908}, year = {2012}, url = {https://doi.org/10.1587/transfun.E95.A.903}, doi = {10.1587/TRANSFUN.E95.A.903}, timestamp = {Mon, 15 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieicet/KogureKY12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/europki/YasudaYSK12, author = {Masaya Yasuda and Jun Yajima and Takeshi Shimoyama and Jun Kogure}, editor = {Sabrina De Capitani di Vimercati and Chris J. Mitchell}, title = {Analysis of Lattice Reduction Attack against the Somewhat Homomorphic Encryption Based on Ideal Lattices}, booktitle = {Public Key Infrastructures, Services and Applications - 9th European Workshop, EuroPKI 2012, Pisa, Italy, September 13-14, 2012, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7868}, pages = {1--16}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-40012-4\_1}, doi = {10.1007/978-3-642-40012-4\_1}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/europki/YasudaYSK12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/scn/YasudaSKI12, author = {Masaya Yasuda and Takeshi Shimoyama and Jun Kogure and Tetsuya Izu}, editor = {Ivan Visconti and Roberto De Prisco}, title = {On the Strength Comparison of the {ECDLP} and the {IFP}}, booktitle = {Security and Cryptography for Networks - 8th International Conference, {SCN} 2012, Amalfi, Italy, September 5-7, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7485}, pages = {302--325}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-32928-9\_17}, doi = {10.1007/978-3-642-32928-9\_17}, timestamp = {Thu, 23 Jun 2022 19:58:57 +0200}, biburl = {https://dblp.org/rec/conf/scn/YasudaSKI12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/KogureKY11, author = {Jun Kogure and Noboru Kunihiro and Hirosuke Yamamoto}, editor = {Souhwan Jung and Moti Yung}, title = {Generalized Security Analysis of the Random Key Bits Leakage Attack}, booktitle = {Information Security Applications - 12th International Workshop, {WISA} 2011, Jeju Island, Korea, August 22-24, 2011. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7115}, pages = {13--27}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-27890-7\_2}, doi = {10.1007/978-3-642-27890-7\_2}, timestamp = {Mon, 15 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisa/KogureKY11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nbis/IzuKS10, author = {Tetsuya Izu and Jun Kogure and Takeshi Shimoyama}, editor = {Tomoya Enokido and Fatos Xhafa and Leonard Barolli and Makoto Takizawa and Minoru Uehara and Arjan Durresi}, title = {{CAIRN:} Dedicated Integer Factoring Devices}, booktitle = {The 13th International Conference on Network-Based Information Systems, NBiS 2010, Takayama, Gifu, Japan, 14-16 September 2010}, pages = {558--563}, publisher = {{IEEE} Computer Society}, year = {2010}, url = {https://doi.org/10.1109/NBiS.2010.60}, doi = {10.1109/NBIS.2010.60}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nbis/IzuKS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/IzuKKS07, author = {Tetsuya Izu and Jun Kogure and Takeshi Koshiba and Takeshi Shimoyama}, title = {Low-density attack revisited}, journal = {Des. Codes Cryptogr.}, volume = {43}, number = {1}, pages = {47--59}, year = {2007}, url = {https://doi.org/10.1007/s10623-007-9058-5}, doi = {10.1007/S10623-007-9058-5}, timestamp = {Mon, 17 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/IzuKKS07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/IzuKS07, author = {Tetsuya Izu and Jun Kogure and Takeshi Shimoyama}, editor = {Pascal Paillier and Ingrid Verbauwhede}, title = {{CAIRN} 2: An {FPGA} Implementation of the Sieving Step in the Number Field Sieve Method}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2007, 9th International Workshop, Vienna, Austria, September 10-13, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4727}, pages = {364--377}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-74735-2\_25}, doi = {10.1007/978-3-540-74735-2\_25}, timestamp = {Tue, 14 May 2019 10:00:47 +0200}, biburl = {https://dblp.org/rec/conf/ches/IzuKS07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/IzuKKS07, author = {Tetsuya Izu and Jun Kogure and Takeshi Koshiba and Takeshi Shimoyama}, title = {Low-Density Attack Revisited}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {66}, year = {2007}, url = {http://eprint.iacr.org/2007/066}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/IzuKKS07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/IzuKY00, author = {Tetsuya Izu and Jun Kogure and Kazuhiro Yokoyama}, editor = {Hideki Imai and Yuliang Zheng}, title = {Efficient Implementation of Schoof's Algorithm in Case of Characteristic 2}, booktitle = {Public Key Cryptography, Third International Workshop on Practice and Theory in Public Key Cryptography, {PKC} 2000, Melbourne, Victoria, Australia, January 18-20, 2000, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1751}, pages = {210--222}, publisher = {Springer}, year = {2000}, url = {https://doi.org/10.1007/978-3-540-46588-1\_15}, doi = {10.1007/978-3-540-46588-1\_15}, timestamp = {Tue, 30 Nov 2021 15:21:24 +0100}, biburl = {https://dblp.org/rec/conf/pkc/IzuKY00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/IzuKNY98, author = {Tetsuya Izu and Jun Kogure and Masayuki Noro and Kazuhiro Yokoyama}, editor = {Kazuo Ohta and Dingyi Pei}, title = {Efficient Implementation of Schoof's Algorithm}, booktitle = {Advances in Cryptology - {ASIACRYPT} '98, International Conference on the Theory and Applications of Cryptology and Information Security, Beijing, China, October 18-22, 1998, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1514}, pages = {66--79}, publisher = {Springer}, year = {1998}, url = {https://doi.org/10.1007/3-540-49649-1\_7}, doi = {10.1007/3-540-49649-1\_7}, timestamp = {Tue, 14 May 2019 10:00:40 +0200}, biburl = {https://dblp.org/rec/conf/asiacrypt/IzuKNY98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/IzuKNY98, author = {Tetsuya Izu and Jun Kogure and Masayuki Noro and Kazuhiro Yokoyama}, editor = {Hideki Imai and Yuliang Zheng}, title = {Parameters for Secure Elliptic Curve Cryptosystem - Improvements on Schoof's Algorithm}, booktitle = {Public Key Cryptography, First International Workshop on Practice and Theory in Public Key Cryptography, {PKC} '98, Pacifico Yokohama, Japan, February 5-6, 1998, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1431}, pages = {253--257}, publisher = {Springer}, year = {1998}, url = {https://doi.org/10.1007/BFb0054030}, doi = {10.1007/BFB0054030}, timestamp = {Tue, 30 Nov 2021 15:21:24 +0100}, biburl = {https://dblp.org/rec/conf/pkc/IzuKNY98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.