Follow
Hiroki Okada
Hiroki Okada
KDDI Research, Inc.
Verified email at kddi-research.jp - Homepage
Title
Cited by
Cited by
Year
Randomness evaluation with the discrete Fourier transform test based on exact analysis of the reference distribution
H Okada, K Umeno
IEEE Transactions on Information Forensics and Security 12 (5), 1218-1226, 2017
272017
Linear depth integer-wise homomorphic division
H Okada, C Cid, S Hidano, S Kiyomoto
IFIP International Conference on Information Security Theory and Practice …, 2018
102018
Homomorphic polynomial evaluation using galois structure and applications to BFV bootstrapping
H Okada, R Player, S Pohmann
International Conference on the Theory and Application of Cryptology and …, 2023
82023
Towards practical doubly-efficient private information retrieval
H Okada, R Player, S Pohmann, C Weinert
Cryptology ePrint Archive, 2023
82023
Integerwise functional bootstrapping on TFHE
H Okada, S Kiyomoto, C Cid
International Conference on Information Security, 107-125, 2020
62020
A compact digital signature scheme based on the module-LWR problem
H Okada, A Takayasu, K Fukushima, S Kiyomoto, T Takagi
IEICE Transactions on Fundamentals of Electronics, Communications and …, 2021
52021
Integer-wise functional bootstrapping on TFHE: applications in secure integer arithmetics
H Okada, S Kiyomoto, C Cid
Information 12 (8), 297, 2021
22021
新たな非線形時系列解析の手法-移動最大リアプノフ指数線によるカオス解析
岡田大樹, 梅野健
レーザー研究 43 (6), 359, 2015
22015
Gpu acceleration of high-precision homomorphic computation utilizing redundant representation
S Narisada, H Okada, K Fukushima, S Kiyomoto, T Nishide
Proceedings of the 11th Workshop on Encrypted Computing & Applied …, 2023
12023
Achieving Private Verification in Multi-stakeholder Environment and Application to Stable Matching.
T Nakamura, H Okada, K Fukushima, T Isohara
ICEIS (1), 768-775, 2023
12023
A Comparison of GKE Protocols based on SIDH.
H Okada, S Kiyomoto, C Cid
SECRYPT, 507-514, 2021
12021
Simulation-Secure Threshold PKE from Standard (Ring-) LWE
H Okada, T Takagi
Cryptology ePrint Archive, 2024
2024
Spherical Gaussian Leftover Hash Lemma via the Rényi Divergence
H Okada, K Fukushima, S Kiyomoto, T Takagi
International Conference on Applied Cryptography and Network Security, 695-724, 2023
2023
Revisiting the DFT Test in the NIST SP 800-22 Randomness Test Suite.
H Okada, K Fukushima
ICISSP, 366-372, 2023
2023
Erratum: A Compact Digital Signature Scheme Based on the Module-LWR Problem [IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences Vol. E104 …
H Okada, A Takayasu, K Fukushima, S Kiyomoto, T Takagi
IEICE Transactions on Fundamentals of Electronics, Communications and …, 2022
2022
Side-channel Analysis and Countermeasure for Implementation of Lattice-based Signature.
K Fukushima, H Okada, S Takarabt, A Korchi, M Hamoud, K Karray, ...
SECRYPT, 701-706, 2022
2022
Faster Rotation-Based Gauss Sieve for Solving the SVP on General Ideal Lattices
S Narisada, H Okada, K Fukushima, S Kiyomoto
IEICE Transactions on Fundamentals of Electronics, Communications and …, 2021
2021
On the complexity of the LWR-solving BKW algorithm
H Okada, A Takayasu, K Fukushima, S Kiyomoto, T Takagi
IEICE Transactions on Fundamentals of Electronics, Communications and …, 2020
2020
On the Complexity of the LWR-Solving BKW Algorithm
S Kiyomoto, T Takagi
Information Security and Cryptology–ICISC 2018: 21st International …, 2019
2019
LWR 問題解読のためのサンプル増幅法を用いた BKW アルゴリズム
岡田大樹, 高安敦, 福島和英, 清本晋作, 高木剛
コンピュータセキュリティシンポジウム 2017 論文集 2017 (2), 2017
2017
The system can't perform the operation now. Try again later.
Articles 1–20