BibTeX records: Jun Kogure

download as .bib file

@article{DBLP:journals/jmc/YokoyamaYTK20,
  author       = {Kazuhiro Yokoyama and
                  Masaya Yasuda and
                  Yasushi Takahashi and
                  Jun Kogure},
  title        = {Complexity bounds on Semaev's naive index calculus method for {ECDLP}},
  journal      = {J. Math. Cryptol.},
  volume       = {14},
  number       = {1},
  pages        = {460--485},
  year         = {2020},
  url          = {https://doi.org/10.1515/jmc-2019-0029},
  doi          = {10.1515/JMC-2019-0029},
  timestamp    = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jmc/YokoyamaYTK20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jmc/YasudaYSKK17,
  author       = {Masaya Yasuda and
                  Kazuhiro Yokoyama and
                  Takeshi Shimoyama and
                  Jun Kogure and
                  Takeshi Koshiba},
  title        = {Analysis of decreasing squared-sum of Gram-Schmidt lengths for short
                  lattice vectors},
  journal      = {J. Math. Cryptol.},
  volume       = {11},
  number       = {1},
  pages        = {1--24},
  year         = {2017},
  url          = {https://doi.org/10.1515/jmc-2016-0008},
  doi          = {10.1515/JMC-2016-0008},
  timestamp    = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jmc/YasudaYSKK17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/aaecc/YasudaSKI16,
  author       = {Masaya Yasuda and
                  Takeshi Shimoyama and
                  Jun Kogure and
                  Tetsuya Izu},
  title        = {Computational hardness of {IFP} and {ECDLP}},
  journal      = {Appl. Algebra Eng. Commun. Comput.},
  volume       = {27},
  number       = {6},
  pages        = {493--521},
  year         = {2016},
  url          = {https://doi.org/10.1007/s00200-016-0291-x},
  doi          = {10.1007/S00200-016-0291-X},
  timestamp    = {Thu, 18 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/aaecc/YasudaSKI16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/YasudaSKYK15,
  author       = {Masaya Yasuda and
                  Takeshi Shimoyama and
                  Jun Kogure and
                  Kazuhiro Yokoyama and
                  Takeshi Koshiba},
  title        = {New packing method in somewhat homomorphic encryption and its applications},
  journal      = {Secur. Commun. Networks},
  volume       = {8},
  number       = {13},
  pages        = {2194--2213},
  year         = {2015},
  url          = {https://doi.org/10.1002/sec.1164},
  doi          = {10.1002/SEC.1164},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/YasudaSKYK15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/YasudaSKYK15,
  author       = {Masaya Yasuda and
                  Takeshi Shimoyama and
                  Jun Kogure and
                  Kazuhiro Yokoyama and
                  Takeshi Koshiba},
  editor       = {Ernest Foo and
                  Douglas Stebila},
  title        = {Secure Statistical Analysis Using RLWE-Based Homomorphic Encryption},
  booktitle    = {Information Security and Privacy - 20th Australasian Conference, {ACISP}
                  2015, Brisbane, QLD, Australia, June 29 - July 1, 2015, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9144},
  pages        = {471--487},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-19962-7\_27},
  doi          = {10.1007/978-3-319-19962-7\_27},
  timestamp    = {Tue, 14 May 2019 10:00:46 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/YasudaSKYK15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/YasudaKSKY15,
  author       = {Masaya Yasuda and
                  Takeshi Koshiba and
                  Takeshi Shimoyama and
                  Jun Kogure and
                  Kazuhiro Yokoyama},
  editor       = {Feng Bao and
                  Steven Miller and
                  Sherman S. M. Chow and
                  Danfeng Yao},
  title        = {Secure Data Devolution: Practical Re-encryption with Auxiliary Data
                  in LWE-based Somewhat Homomorphic Encryption},
  booktitle    = {Proceedings of the 3rd International Workshop on Security in Cloud
                  Computing, SCC@ASIACCS '15, Singapore, Republic of Singapore, April
                  14, 2015},
  pages        = {53--61},
  publisher    = {{ACM}},
  year         = {2015},
  url          = {https://doi.org/10.1145/2732516.2732521},
  doi          = {10.1145/2732516.2732521},
  timestamp    = {Thu, 20 Oct 2022 10:45:07 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/YasudaKSKY15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jmc/YasudaYSKK14,
  author       = {Masaya Yasuda and
                  Kazuhiro Yokoyama and
                  Takeshi Shimoyama and
                  Jun Kogure and
                  Takeshi Koshiba},
  title        = {On the exact decryption range for Gentry-Halevi's implementation of
                  fully homomorphic encryption},
  journal      = {J. Math. Cryptol.},
  volume       = {8},
  number       = {3},
  pages        = {305--329},
  year         = {2014},
  url          = {https://doi.org/10.1515/jmc-2013-0024},
  doi          = {10.1515/JMC-2013-0024},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jmc/YasudaYSKK14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/YasudaSKYK14,
  author       = {Masaya Yasuda and
                  Takeshi Shimoyama and
                  Jun Kogure and
                  Kazuhiro Yokoyama and
                  Takeshi Koshiba},
  editor       = {Willy Susilo and
                  Yi Mu},
  title        = {Privacy-Preserving Wildcards Pattern Matching Using Symmetric Somewhat
                  Homomorphic Encryption},
  booktitle    = {Information Security and Privacy - 19th Australasian Conference, {ACISP}
                  2014, Wollongong, NSW, Australia, July 7-9, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8544},
  pages        = {338--353},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-08344-5\_22},
  doi          = {10.1007/978-3-319-08344-5\_22},
  timestamp    = {Thu, 14 Oct 2021 10:41:30 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/YasudaSKYK14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/YasudaSKYK13,
  author       = {Masaya Yasuda and
                  Takeshi Shimoyama and
                  Jun Kogure and
                  Kazuhiro Yokoyama and
                  Takeshi Koshiba},
  editor       = {Alfredo Cuzzocrea and
                  Christian Kittl and
                  Dimitris E. Simos and
                  Edgar R. Weippl and
                  Lida Xu},
  title        = {Packed Homomorphic Encryption Based on Ideal Lattices and Its Application
                  to Biometrics},
  booktitle    = {Security Engineering and Intelligence Informatics - {CD-ARES} 2013
                  Workshops: MoCrySEn and SeCIHD, Regensburg, Germany, September 2-6,
                  2013. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8128},
  pages        = {55--74},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-40588-4\_5},
  doi          = {10.1007/978-3-642-40588-4\_5},
  timestamp    = {Tue, 14 May 2019 10:00:49 +0200},
  biburl       = {https://dblp.org/rec/conf/IEEEares/YasudaSKYK13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/YasudaSKYK13,
  author       = {Masaya Yasuda and
                  Takeshi Shimoyama and
                  Jun Kogure and
                  Kazuhiro Yokoyama and
                  Takeshi Koshiba},
  editor       = {Ari Juels and
                  Bryan Parno},
  title        = {Secure pattern matching using somewhat homomorphic encryption},
  booktitle    = {CCSW'13, Proceedings of the 2013 {ACM} Cloud Computing Security Workshop,
                  Co-located with {CCS} 2013, Berlin, Germany, November 4, 2013},
  pages        = {65--76},
  publisher    = {{ACM}},
  year         = {2013},
  url          = {https://doi.org/10.1145/2517488.2517497},
  doi          = {10.1145/2517488.2517497},
  timestamp    = {Tue, 10 Nov 2020 16:06:16 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/YasudaSKYK13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/YasudaSKYK13,
  author       = {Masaya Yasuda and
                  Takeshi Shimoyama and
                  Jun Kogure and
                  Kazuhiro Yokoyama and
                  Takeshi Koshiba},
  editor       = {Joaqu{\'{\i}}n Garc{\'{\i}}a{-}Alfaro and
                  Georgios V. Lioudakis and
                  Nora Cuppens{-}Boulahia and
                  Simon N. Foley and
                  William M. Fitzgerald},
  title        = {Practical Packing Method in Somewhat Homomorphic Encryption},
  booktitle    = {Data Privacy Management and Autonomous Spontaneous Security - 8th
                  International Workshop, {DPM} 2013, and 6th International Workshop,
                  {SETOP} 2013, Egham, UK, September 12-13, 2013, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8247},
  pages        = {34--50},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-54568-9\_3},
  doi          = {10.1007/978-3-642-54568-9\_3},
  timestamp    = {Sun, 25 Oct 2020 22:34:56 +0100},
  biburl       = {https://dblp.org/rec/conf/esorics/YasudaSKYK13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/KogureKY12,
  author       = {Jun Kogure and
                  Noboru Kunihiro and
                  Hirosuke Yamamoto},
  title        = {On the Hardness of Subset Sum Problem from Different Intervals},
  journal      = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.},
  volume       = {95-A},
  number       = {5},
  pages        = {903--908},
  year         = {2012},
  url          = {https://doi.org/10.1587/transfun.E95.A.903},
  doi          = {10.1587/TRANSFUN.E95.A.903},
  timestamp    = {Mon, 15 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieicet/KogureKY12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/europki/YasudaYSK12,
  author       = {Masaya Yasuda and
                  Jun Yajima and
                  Takeshi Shimoyama and
                  Jun Kogure},
  editor       = {Sabrina De Capitani di Vimercati and
                  Chris J. Mitchell},
  title        = {Analysis of Lattice Reduction Attack against the Somewhat Homomorphic
                  Encryption Based on Ideal Lattices},
  booktitle    = {Public Key Infrastructures, Services and Applications - 9th European
                  Workshop, EuroPKI 2012, Pisa, Italy, September 13-14, 2012, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7868},
  pages        = {1--16},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-40012-4\_1},
  doi          = {10.1007/978-3-642-40012-4\_1},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/europki/YasudaYSK12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/scn/YasudaSKI12,
  author       = {Masaya Yasuda and
                  Takeshi Shimoyama and
                  Jun Kogure and
                  Tetsuya Izu},
  editor       = {Ivan Visconti and
                  Roberto De Prisco},
  title        = {On the Strength Comparison of the {ECDLP} and the {IFP}},
  booktitle    = {Security and Cryptography for Networks - 8th International Conference,
                  {SCN} 2012, Amalfi, Italy, September 5-7, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7485},
  pages        = {302--325},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-32928-9\_17},
  doi          = {10.1007/978-3-642-32928-9\_17},
  timestamp    = {Thu, 23 Jun 2022 19:58:57 +0200},
  biburl       = {https://dblp.org/rec/conf/scn/YasudaSKI12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/KogureKY11,
  author       = {Jun Kogure and
                  Noboru Kunihiro and
                  Hirosuke Yamamoto},
  editor       = {Souhwan Jung and
                  Moti Yung},
  title        = {Generalized Security Analysis of the Random Key Bits Leakage Attack},
  booktitle    = {Information Security Applications - 12th International Workshop, {WISA}
                  2011, Jeju Island, Korea, August 22-24, 2011. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7115},
  pages        = {13--27},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-27890-7\_2},
  doi          = {10.1007/978-3-642-27890-7\_2},
  timestamp    = {Mon, 15 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/KogureKY11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nbis/IzuKS10,
  author       = {Tetsuya Izu and
                  Jun Kogure and
                  Takeshi Shimoyama},
  editor       = {Tomoya Enokido and
                  Fatos Xhafa and
                  Leonard Barolli and
                  Makoto Takizawa and
                  Minoru Uehara and
                  Arjan Durresi},
  title        = {{CAIRN:} Dedicated Integer Factoring Devices},
  booktitle    = {The 13th International Conference on Network-Based Information Systems,
                  NBiS 2010, Takayama, Gifu, Japan, 14-16 September 2010},
  pages        = {558--563},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/NBiS.2010.60},
  doi          = {10.1109/NBIS.2010.60},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nbis/IzuKS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/IzuKKS07,
  author       = {Tetsuya Izu and
                  Jun Kogure and
                  Takeshi Koshiba and
                  Takeshi Shimoyama},
  title        = {Low-density attack revisited},
  journal      = {Des. Codes Cryptogr.},
  volume       = {43},
  number       = {1},
  pages        = {47--59},
  year         = {2007},
  url          = {https://doi.org/10.1007/s10623-007-9058-5},
  doi          = {10.1007/S10623-007-9058-5},
  timestamp    = {Mon, 17 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/IzuKKS07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/IzuKS07,
  author       = {Tetsuya Izu and
                  Jun Kogure and
                  Takeshi Shimoyama},
  editor       = {Pascal Paillier and
                  Ingrid Verbauwhede},
  title        = {{CAIRN} 2: An {FPGA} Implementation of the Sieving Step in the Number
                  Field Sieve Method},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2007, 9th International
                  Workshop, Vienna, Austria, September 10-13, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4727},
  pages        = {364--377},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-74735-2\_25},
  doi          = {10.1007/978-3-540-74735-2\_25},
  timestamp    = {Tue, 14 May 2019 10:00:47 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/IzuKS07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/IzuKKS07,
  author       = {Tetsuya Izu and
                  Jun Kogure and
                  Takeshi Koshiba and
                  Takeshi Shimoyama},
  title        = {Low-Density Attack Revisited},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {66},
  year         = {2007},
  url          = {http://eprint.iacr.org/2007/066},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/IzuKKS07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/IzuKY00,
  author       = {Tetsuya Izu and
                  Jun Kogure and
                  Kazuhiro Yokoyama},
  editor       = {Hideki Imai and
                  Yuliang Zheng},
  title        = {Efficient Implementation of Schoof's Algorithm in Case of Characteristic
                  2},
  booktitle    = {Public Key Cryptography, Third International Workshop on Practice
                  and Theory in Public Key Cryptography, {PKC} 2000, Melbourne, Victoria,
                  Australia, January 18-20, 2000, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1751},
  pages        = {210--222},
  publisher    = {Springer},
  year         = {2000},
  url          = {https://doi.org/10.1007/978-3-540-46588-1\_15},
  doi          = {10.1007/978-3-540-46588-1\_15},
  timestamp    = {Tue, 30 Nov 2021 15:21:24 +0100},
  biburl       = {https://dblp.org/rec/conf/pkc/IzuKY00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/IzuKNY98,
  author       = {Tetsuya Izu and
                  Jun Kogure and
                  Masayuki Noro and
                  Kazuhiro Yokoyama},
  editor       = {Kazuo Ohta and
                  Dingyi Pei},
  title        = {Efficient Implementation of Schoof's Algorithm},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} '98, International Conference
                  on the Theory and Applications of Cryptology and Information Security,
                  Beijing, China, October 18-22, 1998, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1514},
  pages        = {66--79},
  publisher    = {Springer},
  year         = {1998},
  url          = {https://doi.org/10.1007/3-540-49649-1\_7},
  doi          = {10.1007/3-540-49649-1\_7},
  timestamp    = {Tue, 14 May 2019 10:00:40 +0200},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/IzuKNY98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/IzuKNY98,
  author       = {Tetsuya Izu and
                  Jun Kogure and
                  Masayuki Noro and
                  Kazuhiro Yokoyama},
  editor       = {Hideki Imai and
                  Yuliang Zheng},
  title        = {Parameters for Secure Elliptic Curve Cryptosystem - Improvements on
                  Schoof's Algorithm},
  booktitle    = {Public Key Cryptography, First International Workshop on Practice
                  and Theory in Public Key Cryptography, {PKC} '98, Pacifico Yokohama,
                  Japan, February 5-6, 1998, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1431},
  pages        = {253--257},
  publisher    = {Springer},
  year         = {1998},
  url          = {https://doi.org/10.1007/BFb0054030},
  doi          = {10.1007/BFB0054030},
  timestamp    = {Tue, 30 Nov 2021 15:21:24 +0100},
  biburl       = {https://dblp.org/rec/conf/pkc/IzuKNY98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics