-
Computing endomorphism rings of supersingular elliptic curves by finding cycles in concatenated supersingular isogeny graphs
Peer-reviewed
Yuta Kambe, Akira Katayama, Yusuke Aikawa, Yuki Ishihara, Masaya Yasuda, Kazuhiro Yokoyama
Commentarii Mathematici Universitatis Sancti Pauli72
(
1
)
19
-
42
10 2024
-
Experimental Analysis of Integer Factorization Methods Using Lattices
Peer-reviewed
Arata Sato, Aurélien Auzemery, Akira Katayama, Masaya Yasuda
Lecture Notes in Computer Science14977
142
-
157
13 9 2024
-
Computing a Basis of the Set of Isogenies Between Two Supersingular Elliptic Curves
Peer-reviewed
Akira Katayama, Masaya Yasuda
Lecture Notes in Computer Science14938
178
-
192
21 8 2024
-
Parallel DeepBKZ 2.0: Development of parallel DeepBKZ reduction with large blocksizes
Peer-reviewed
Satoshi Nakamura, Nariaki Tateiwa, Masaya Yasuda, Katsuki Fujisawa
accepted at CREST BOOK: Mathematical Foundations for Post- Quantum Cryptography
2024
-
Expanded lattices for solving ring-based LWE and NTRU problems
Peer-reviewed
Satoshi Nakamura, Masaya Yasuda
accepted at CREST BOOK: Mathematical Foundations for Post- Quantum Cryptography
2024
-
On the feasibility of computing constructive Deuring correspondence
Peer-reviewed
Yuta Kambe, Yasushi Takahashi, Masaya Yasuda, Kazuhiro Yokoyama
Banach Center Publications: Post-proceedings of Number-Theoretic Methods in Cryptology (NuTMiC 2021)126
105
-
121
12 2023
-
Development and analysis of massive parallelization of a lattice basis reduction algorithm
Peer-reviewed
Nariaki Tateiwa, Yuji Shinano, Masaya Yasuda, Shizuo Kaji, Keiichiro Yamamura, Katsuki Fujisawa
Japan Journal of Industrial and Applied Mathematics41
(
1
)
13
-
56
3 4 2023
-
Computing the Brauer group of the product of two elliptic curves over a finite field
Peer-reviewed
Akira Katayama, Masaya Yasuda
Japan Journal of Industrial and Applied Mathematics (JJIAM), Online First
2023
-
Solving the search-LWE problem over projected lattices
Peer-reviewed
Satoshi Nakamura, Nariaki Tateiwa, Masaya Yasuda, Katsuki Fujisawa
Discrete Applied Mathematics318
69
-
81
9 2022
-
Introduction to algebraic approaches for solving isogeny path-finding problems
Peer-reviewed
Ryoya Fukasaku, Yasuhiko Ikematsu, Momonari Kudo, Masaya Yasuda, Kazuhiro Yokoyama
RIMS Kˆokyˆuroku BessatsuB90
169
-
184
6 2022
-
CMAP-LAP: Configurable Massively Parallel Solver for Lattice Problems
Peer-reviewed
Nariaki Tateiwa, Yuji Shinano, Keiichiro Yamamura, Akihiro Yoshida, Shizuo Kaji, Masaya Yasuda, Katsuki Fujisawa
2021 IEEE 28th International Conference on High Performance Computing, Data, and Analytics (HiPC)
42
-
52
12 2021
-
Dynamic self-dual DeepBKZ lattice reduction with free dimensions and its implementation
Peer-reviewed
Satoshi Nakamura, Masaya Yasuda
Discrete Applied Mathematics304
220
-
229
12 2021
-
A Trace Map Attack Against Special Ring-LWE Samples
Peer-reviewed
Yasuhiko Ikematsu, Satoshi Nakamura, Masaya Yasuda
Advances in Information and Computer Security
3
-
22
9 2021
-
Solving the constructive Deuring correspondence via the Kohel-Lauter-Petit-Tignol algorithm
Peer-reviewed
Yuta Kambe, Masaya Yasuda, Masayuki Noro, Kazuhiro Yokoyama, Yusuke Aikawa, Katsuyuki Takashima, Momonari Kudo
Mathematical Cryptology (Special Issue of MathCrypt 2021)1
(
2
)
10
-
24
8 2021
-
Implementation report of the Kohel-Lauter-Petit-Tignol algorithm for the constructive Deuring correspondence
Peer-reviewed
Yuta Kambda, Yusuke Aikawa, Momonari Kudo, Katsuyuki Takashima, Masaya Yasuda, Kazuhiro Yokoyama
International Conference on Mathematics and Computing (ICMC 2021)
3 2021
-
An Extension of Kannan’s Embedding for Solving Ring-Based LWE Problems
Peer-reviewed
Satoshi Nakamura, Masaya Yasuda
Cryptography and Coding
201
-
219
2021
-
A survey of solving SVP algorithms and recent strategies for solving the SVP challenge
Invited
Peer-reviewed
Masaya Yasuda
Proceedings of MQC 2019 (International Symposium on Mathematics, Quantum Theory, and Cryptography)
189
-
207
2021
-
Symbolic Computation of Isogenies of Elliptic Curves by Vélu’s Formula
Peer-reviewed
Masayuki NORO, Masaya YASUDA, Kazuhiro YOKOYAMA
COMMENTARII MATHEMATICI UNIVERSITATIS SANCTI PAULI68
93
-
127
12 2020
-
Massive Parallelization for Finding Shortest Lattice Vectors Based on Ubiquity Generator Framework
Peer-reviewed
Nariaki Tateiwa, Yuji Shinano, Satoshi Nakamura, Akihiro Yoshida, Shizuo Kaji, Masaya Yasuda, Katsuki Fujisawa
SC20: International Conference for High Performance Computing, Networking, Storage and Analysis2020-November
1
-
15
11 2020
-
Fast secure matrix multiplications over ring-based homomorphic encryption
Peer-reviewed
Pradeep Kumar Mishra, Deevashwer Rathee, Dung Hoang Duong, Masaya Yasuda
Information Security Journal: A Global Perspective
1
-
16
28 10 2020
-
Dynamic self-dual DeepBKZ lattice reduction with free dimensions
Peer-reviewed
the 6th International Conference on Mathematics and Computing (ICMC 2020) to be held from September 23--25, 2020 at the Sikkim University, Gangtok, Sikkim, India
9 2020
-
Solving the search-LWE problem by lattice reduction over projected bases
Peer-reviewed
Satoshi Nakamura, Nariaki Tateiwa, Koha Kinjo, Yasuhiko, Ikematsu, Masaya Yasuda, Katsuki Fujisawa
the 6th International Conference on Mathematics and Computing (ICMC 2020) to be held from September 23--25, 2020 at the Sikkim University, Gangtok, Sikkim, India
29
-
42
9 2020
-
Analysis of DeepBKZ reduction for finding short lattice vectors.
Peer-reviewed
Masaya Yasuda, Satoshi Nakamura, Junpei Yamaguchi
Des. Codes Cryptogr.88
(
10
)
2077
-
2100
2020
-
Impact of the modulus switching technique on some attacks against learning problems.
Peer-reviewed
Huy Quoc Le, Pradeep Kumar Mishra, Satoshi Nakamura, Koha Kinjo, Dung Hoang Duong, Masaya Yasuda
IET Inf. Secur.14
(
3
)
286
-
303
2020
-
Hybrid Meet-in-the-Middle Attacks for the Isogeny Path-Finding Problem.
Peer-reviewed
Yasuhiko Ikematsu, Ryoya Fukasaku, Momonari Kudo, Masaya Yasuda, Katsuyuki Takashima, Kazuhiro Yokoyama
Proceedings of the 7th on ASIA Public-Key Cryptography Workshop(APKC@AsiaCCS)
36
-
44
2020
-
Algebraic approaches for solving isogeny problems of prime power degrees.
Peer-reviewed
International journal
Yasushi Takahashi, Momonari Kudo, Ryoya Fukasaku, Yasuhiko Ikematsu, Masaya Yasuda, Kazuhiro Yokoyama
J. Math. Cryptol.15
(
1
)
31
-
44
2020
-
Complexity bounds on Semaev's naive index calculus method for ECDLP.
Peer-reviewed
Kazuhiro Yokoyama, Masaya Yasuda, Yasushi Takahashi, Jun Kogure
J. Math. Cryptol.14
(
1
)
460
-
485
2020
-
Self-dual DeepBKZ for finding short lattice vectors.
Peer-reviewed
Masaya Yasuda
J. Math. Cryptol.14
(
1
)
84
-
94
2020
-
A new polynomial-time variant of LLL with deep insertions for decreasing the squared-sum of Gram-Schmidt lengths.
Peer-reviewed
Masaya Yasuda, Junpei Yamaguchi
Des. Codes Cryptogr.87
(
11
)
2489
-
2505
2019
-
Security analysis of cryptosystems using short generators over ideal lattices
Peer-reviewed
Shinya Okumura, Shingo Sugiyama, Masaya Yasuda, Tsuyoshi Takagi
Japan Journal of Industrial and Applied Mathematics35
(
2
)
739
-
771
1 7 2018
-
Explicit formula for gram-schmidt vectors in LLL with deep insertions and its applications
Peer-reviewed
Junpei Yamaguchi, Masaya Yasuda
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)10737
142
-
160
2018
-
Faster PCA and Linear Regression through Hypercubes in HElib.
Peer-reviewed
Deevashwer Rathee, Pradeep Kumar Mishra, Masaya Yasuda
Proceedings of the 2018 Workshop on Privacy in the Electronic Society, WPES@CCS 2018, Toronto, ON, Canada, October 15-19, 2018
42
-
53
2018
-
Acceleration of Index Calculus for Solving ECDLP over Prime Fields and Its Limitation.
Peer-reviewed
Momonari Kudo, Yuki Yokota, Yasushi Takahashi, Masaya Yasuda
Cryptology and Network Security - 17th International Conference, CANS 2018, Naples, Italy, September 30 - October 3, 2018, Proceedings
377
-
393
2018
-
Solving LWR via BDD Strategy: Modulus Switching Approach.
Peer-reviewed
Huy Quoc Le, Pradeep Kumar Mishra, Dung Hoang Duong, Masaya Yasuda
Cryptology and Network Security - 17th International Conference, CANS 2018, Naples, Italy, September 30 - October 3, 2018, Proceedings
357
-
376
2018
-
Development of a Dual Version of DeepBKZ and Its Application to Solving the LWE Challenge.
Peer-reviewed
Masaya Yasuda, Junpei Yamaguchi, Michiko Ooka, Satoshi Nakamura
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)10831
162
-
182
2018
-
Practical Limit of Index Calculus Algorithms for ECDLP over Prime Fields
Peer-reviewed
International journal
Yuki Yokota, Momonari Kudo, Masaya Yasuda
Proceedings of The Tenth International Workshop on Coding and Cryptography 2017, WCC 2017, Saint-Petersburg, Russia, September 18-22, 2017
9 2017
-
Application of mixed integer quadratic program to shortest vector problems.
Peer-reviewed
Keiji Kimura, Hayato Waki, Masaya Yasuda
JSIAM Lett.9
65
-
68
2017
-
Choosing Parameters for the Subfield Lattice Attack Against Overstretched NTRU.
Peer-reviewed
Dung Hoang Duong, Masaya Yasuda, Tsuyoshi Takagi
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)10599
79
-
91
2017
-
Recovering Attacks Against Linear Sketch in Fuzzy Signature Schemes of ACNS 2015 and 2016.
Peer-reviewed
Masaya Yasuda, Takeshi Shimoyama, Masahiko Takenaka, Narishige Abe, Shigefumi Yamada, Junpei Yamaguchi
Information Security Practice and Experience - 13th International Conference, ISPEC 2017, Melbourne, VIC, Australia, December 13-15, 2017, Proceedings
409
-
421
2017
-
Enhancement for Secure Multiple Matrix Multiplications over Ring-LWE Homomorphic Encryption.
Peer-reviewed
Pradeep Kumar Mishra, Dung Hoang Duong, Masaya Yasuda
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)10701
320
-
330
2017
-
Secure and Efficient Pairing at 256-Bit Security Level.
Peer-reviewed
Yutaro Kiyomura, Akiko Inoue, Yuto Kawahara, Masaya Yasuda, Tsuyoshi Takagi, Tetsutaro Kobayashi
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)10355
59
-
79
2017
-
Analysis of decreasing squared-sum of Gram-Schmidt lengths for short lattice vectors.
Peer-reviewed
Masaya Yasuda, Kazuhiro Yokoyama, Takeshi Shimoyama, Jun Kogure, Takeshi Koshiba
J. Math. Cryptol.11
(
1
)
1
-
24
2017
-
Secure Hamming distance computation for biometrics using ideal-lattice and ring-LWE homomorphic encryption.
Peer-reviewed
Masaya Yasuda
Inf. Secur. J. A Glob. Perspect.26
(
2
)
85
-
103
2017
-
Computational hardness of IFP and ECDLP
Peer-reviewed
Masaya Yasuda, Takeshi Shimoyama, Jun Kogure, Tetsuya Izu
APPLICABLE ALGEBRA IN ENGINEERING COMMUNICATION AND COMPUTING27
(
6
)
493
-
521
12 2016
-
Efficient Secure Matrix Multiplication over LWE-Based Homomorphic Encryption
Peer-reviewed
Dung Hoang Duong, Pradeep Kumar Mishra, Masaya Yasuda
Tatra Mountains Mathematical Publications67
(
1
)
69
-
83
1 9 2016
-
Privacy-Preserving Fuzzy Commitment for Biometrics via Layered Error-Correcting Codes
Peer-reviewed
Masaya Yasuda, Takeshi Shimoyama, Narishige Abe, Shigefumi Yamada, Takashi Shinzaki, Takeshi Koshiba
FOUNDATIONS AND PRACTICE OF SECURITY (FPS 2015)9482
117
-
133
2016
-
Comprehensive and Improved Secure Biometric System Using Homomorphic Encryption
Peer-reviewed
Avradip Mandal, Arnab Roy, Masaya Yasuda
DATA PRIVACY MANAGEMENT, AND SECURITY ASSURANCE9481
183
-
198
2016
-
Torsion points and reduction of elliptic curves
Peer-reviewed
Masaya Yasuda
ACTA ARITHMETICA176
(
1
)
89
-
100
2016
-
Practical Analysis of Key Recovery Attack Against Search-LWE Problem
Peer-reviewed
Momonari Kudo, Junpei Yamaguchi, Yang Guo, Masaya Yasuda
ADVANCES IN INFORMATION AND COMPUTER SECURITY, IWSEC 20169836
164
-
181
2016
-
Biometric key-binding using lattice masking
Peer-reviewed
Masaya Yasuda, Yuka Sugimura
SECURITY AND COMMUNICATION NETWORKS8
(
18
)
3405
-
3414
12 2015
-
Ramification of the Kummer extension generated from torsion points of elliptic curves
Peer-reviewed
Masaya Yasuda
INTERNATIONAL JOURNAL OF NUMBER THEORY11
(
6
)
1725
-
1734
9 2015
-
Secure Data Devolution: Practical Re-encryption with Auxiliary Data in LWE-based Somewhat Homomorphic Encryption.
Peer-reviewed
Masaya Yasuda, Takeshi Koshiba, Takeshi Shimoyama, Jun Kogure, Kazuhiro Yokoyama
Proceedings of the 3rd International Workshop on Security in Cloud Computing, SCC@ASIACCS '15, Singapore, Republic of Singapore, April 14, 2015
53
-
61
2015
-
Secure Statistical Analysis Using RLWE-Based Homomorphic Encryption.
Peer-reviewed
Masaya Yasuda, Takeshi Shimoyama, Jun Kogure, Kazuhiro Yokoyama, Takeshi Koshiba
Information Security and Privacy - 20th Australasian Conference, ACISP 2015, Brisbane, QLD, Australia, June 29 - July 1, 2015, Proceedings9144
471
-
487
2015
-
New packing method in somewhat homomorphic encryption and its applications.
Peer-reviewed
Masaya Yasuda, Takeshi Shimoyama, Jun Kogure, Kazuhiro Yokoyama, Takeshi Koshiba
Security and Communication Networks8
(
13
)
2194
-
2213
2015
-
Practical Packing Method in Somewhat Homomorphic Encryption
Peer-reviewed
Masaya Yasuda, Takeshi Shimoyama, Jun Kogure, Kazuhiro Yokoyama, Takeshi Koshiba
DATA PRIVACY MANAGEMENT AND AUTONOMOUS SPONTANEOUS SECURITY, DPM 20138247
34
-
50
2014
-
On the exact decryption range for Gentry-Halevi's implementation of fully homomorphic encryption.
Peer-reviewed
Masaya Yasuda, Kazuhiro Yokoyama, Takeshi Shimoyama, Jun Kogure, Takeshi Koshiba
J. Mathematical Cryptology8
(
3
)
305
-
329
2014
-
Privacy-Preserving Wildcards Pattern Matching Using Symmetric Somewhat Homomorphic Encryption
Peer-reviewed
Masaya Yasuda, Takeshi Shimoyama, Jun Kogure, Kazuhiro Yokoyama, Takeshi Koshiba
INFORMATION SECURITY AND PRIVACY, ACISP 20148544
338
-
353
2014
-
A Biometric Key-Binding Scheme Using Lattice Masking
Peer-reviewed
Yuka Sugimura, Masaya Yasuda, Shigefumi Yamada, Narishige Abe, Takashi Shinzaki
2014 INTERNATIONAL CONFERENCE OF THE BIOMETRICS SPECIAL INTEREST GROUP (BIOSIG)
211
-
218
2014
-
KUMMER GENERATORS AND TORSION POINTS OF ELLIPTIC CURVES WITH BAD REDUCTION AT SOME PRIMES
Peer-reviewed
Masaya Yasuda
INTERNATIONAL JOURNAL OF NUMBER THEORY9
(
7
)
1743
-
1752
11 2013
-
Secure pattern matching using somewhat homomorphic encryption.
Peer-reviewed
Masaya Yasuda, Takeshi Shimoyama, Jun Kogure, Kazuhiro Yokoyama, Takeshi Koshiba
CCSW'13, Proceedings of the 2013 ACM Cloud Computing Security Workshop, Co-located with CCS 2013, Berlin, Germany, November 4, 2013
65
-
76
2013
-
Packed Homomorphic Encryption Based on Ideal Lattices and Its Application to Biometrics.
Peer-reviewed
Masaya Yasuda, Takeshi Shimoyama, Jun Kogure, Kazuhiro Yokoyama, Takeshi Koshiba
Security Engineering and Intelligence Informatics - CD-ARES 2013 Workshops: MoCrySEn and SeCIHD, Regensburg, Germany, September 2-6, 2013. Proceedings
55
-
74
2013
-
Torsion points of elliptic curves with bad reduction at some primes II
Peer-reviewed
Masaya Yasuda
Bulletin of the Korean Mathematical Society50
(
1
)
83
-
96
2013
-
On the number of the pairing-friendly curves
Takanori Yasuda, Masaya Yasuda, Takeshi Shimoyama, Jun Kogure
International Journal of Pure and Applied Mathematics77
(
1
)
11
-
15
2012
-
On elliptic curves whose 3-torsion subgroup splits as μ3 ⊕ ℤ/3ℤ
Peer-reviewed
Masaya Yasuda
Communications of the Korean Mathematical Society27
(
3
)
497
-
503
2012
-
Solving a DLP with auxiliary input with the ρ-algorithm
Peer-reviewed
Yumi Sakemi, Tetsuya Izu, Masahiko Takenaka, Masaya Yasuda
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)7115
98
-
108
2012
-
On the Strength Comparison of the ECDLP and the IFP.
Peer-reviewed
Masaya Yasuda, Takeshi Shimoyama, Jun Kogure, Tetsuya Izu
Security and Cryptography for Networks - 8th International Conference, SCN 2012, Amalfi, Italy, September 5-7, 2012. Proceedings
302
-
325
2012
-
Analysis of Lattice Reduction Attack against the Somewhat Homomorphic Encryption Based on Ideal Lattices.
Peer-reviewed
Masaya Yasuda, Jun Yajima, Takeshi Shimoyama, Jun Kogure
Public Key Infrastructures, Services and Applications - 9th European Workshop, EuroPKI 2012, Pisa, Italy, September 13-14, 2012, Revised Selected Papers
1
-
16
2012
-
Solving a Discrete Logarithm Problem with Auxiliary Input on a 160-Bit Elliptic Curve
Peer-reviewed
Yumi Sakemi, Goichiro Hanaoka, Tetsuya Izu, Masahiko Takenaka, Masaya Yasuda
PUBLIC KEY CRYPTOGRAPHY - PKC 20127293
595
-
608
2012
-
ON THE CANONICAL BUNDLE FORMULA FOR ABELIAN FIBER SPACES IN POSITIVE CHARACTERISTIC
Peer-reviewed
Masaya Yasuda
KODAI MATHEMATICAL JOURNAL34
(
1
)
55
-
70
3 2011
-
Experimental Analysis of Cheon's Algorithm against Pairing-friendly Curves
Izu Tetsuya, Takenaka Masahiko, Yasuda Masaya
Information and Media Technologies6
(
4
)
1175
-
1184
2011
-
Time estimation of Cheon's algorithm over elliptic curves on finite fields with characteristic 3
Peer-reviewed
Tetsuya Izu, Masahiko Takenaka, Masaya Yasuda
Proceedings - 2011 5th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, IMIS 2011
594
-
596
2011
-
Experimental analysis of cheon’s algorithm against pairing-friendly curves
Peer-reviewed
Tetsuya Izu, Masahiko Takenaka, Masaya Yasuda
Journal of Information Processing19
441
-
450
2011
-
Experimantal Analysis of Cheon's Algorithm against Pairing-Friendly Curves
Peer-reviewed
Tetsuya Izu, Masahiko Takenaka, Masaya Yasuda
25TH IEEE INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS (AINA 2011)
90
-
96
2011
-
Solving DLP with Auxiliary Input over an Elliptic Curve Used in TinyTate Library
Peer-reviewed
Yumi Sakemi, Tetsuya Izu, Masahiko Takenaka, Masaya Yasuda
INFORMATION SECURITY THEORY AND PRACTICE: SECURITY AND PRIVACY OF MOBILE DEVICES IN WIRELESS COMMUNICATION6633
116
-
127
2011
-
Experimental Results on Cheon's Algorithm
Peer-reviewed
Tetsuya Izu, Masahiko Takenaka, Masaya Yasuda
FIFTH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY, AND SECURITY: ARES 2010, PROCEEDINGS
625
-
628
2010
-
The Elliptic Curve Discrete Logarithm Problems over the p-adic Field and Formal Groups
Peer-reviewed
Masaya Yasuda
INFORMATION SECURITY PRACTICE AND EXPERIENCE, PROCEEDINGS6047
110
-
122
2010
-
TORSION POINTS OF ELLIPTIC CURVES WITH GOOD REDUCTION
Peer-reviewed
Masaya Yasuda
KODAI MATHEMATICAL JOURNAL31
(
3
)
385
-
403
10 2008
-
The discrete logarithm problem on elliptic curves defined over Q (abstract only).
Peer-reviewed
Masaya Yasuda
ACM Comm. Computer Algebra42
(
1-2
)
64
-
66
2008