Randomness evaluation with the discrete Fourier transform test based on exact analysis of the reference distribution H Okada, K Umeno IEEE Transactions on Information Forensics and Security 12 (5), 1218-1226, 2017 | 27 | 2017 |
Linear depth integer-wise homomorphic division H Okada, C Cid, S Hidano, S Kiyomoto IFIP International Conference on Information Security Theory and Practice …, 2018 | 10 | 2018 |
Homomorphic polynomial evaluation using galois structure and applications to BFV bootstrapping H Okada, R Player, S Pohmann International Conference on the Theory and Application of Cryptology and …, 2023 | 8 | 2023 |
Towards practical doubly-efficient private information retrieval H Okada, R Player, S Pohmann, C Weinert Cryptology ePrint Archive, 2023 | 8 | 2023 |
Integerwise functional bootstrapping on TFHE H Okada, S Kiyomoto, C Cid International Conference on Information Security, 107-125, 2020 | 6 | 2020 |
A compact digital signature scheme based on the module-LWR problem H Okada, A Takayasu, K Fukushima, S Kiyomoto, T Takagi IEICE Transactions on Fundamentals of Electronics, Communications and …, 2021 | 5 | 2021 |
Integer-wise functional bootstrapping on TFHE: applications in secure integer arithmetics H Okada, S Kiyomoto, C Cid Information 12 (8), 297, 2021 | 2 | 2021 |
新たな非線形時系列解析の手法-移動最大リアプノフ指数線によるカオス解析 岡田大樹, 梅野健 レーザー研究 43 (6), 359, 2015 | 2 | 2015 |
Gpu acceleration of high-precision homomorphic computation utilizing redundant representation S Narisada, H Okada, K Fukushima, S Kiyomoto, T Nishide Proceedings of the 11th Workshop on Encrypted Computing & Applied …, 2023 | 1 | 2023 |
Achieving Private Verification in Multi-stakeholder Environment and Application to Stable Matching. T Nakamura, H Okada, K Fukushima, T Isohara ICEIS (1), 768-775, 2023 | 1 | 2023 |
A Comparison of GKE Protocols based on SIDH. H Okada, S Kiyomoto, C Cid SECRYPT, 507-514, 2021 | 1 | 2021 |
Simulation-Secure Threshold PKE from Standard (Ring-) LWE H Okada, T Takagi Cryptology ePrint Archive, 2024 | | 2024 |
Spherical Gaussian Leftover Hash Lemma via the Rényi Divergence H Okada, K Fukushima, S Kiyomoto, T Takagi International Conference on Applied Cryptography and Network Security, 695-724, 2023 | | 2023 |
Revisiting the DFT Test in the NIST SP 800-22 Randomness Test Suite. H Okada, K Fukushima ICISSP, 366-372, 2023 | | 2023 |
Erratum: A Compact Digital Signature Scheme Based on the Module-LWR Problem [IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences Vol. E104 … H Okada, A Takayasu, K Fukushima, S Kiyomoto, T Takagi IEICE Transactions on Fundamentals of Electronics, Communications and …, 2022 | | 2022 |
Side-channel Analysis and Countermeasure for Implementation of Lattice-based Signature. K Fukushima, H Okada, S Takarabt, A Korchi, M Hamoud, K Karray, ... SECRYPT, 701-706, 2022 | | 2022 |
Faster Rotation-Based Gauss Sieve for Solving the SVP on General Ideal Lattices S Narisada, H Okada, K Fukushima, S Kiyomoto IEICE Transactions on Fundamentals of Electronics, Communications and …, 2021 | | 2021 |
On the complexity of the LWR-solving BKW algorithm H Okada, A Takayasu, K Fukushima, S Kiyomoto, T Takagi IEICE Transactions on Fundamentals of Electronics, Communications and …, 2020 | | 2020 |
On the Complexity of the LWR-Solving BKW Algorithm S Kiyomoto, T Takagi Information Security and Cryptology–ICISC 2018: 21st International …, 2019 | | 2019 |
LWR 問題解読のためのサンプル増幅法を用いた BKW アルゴリズム 岡田大樹, 高安敦, 福島和英, 清本晋作, 高木剛 コンピュータセキュリティシンポジウム 2017 論文集 2017 (2), 2017 | | 2017 |