フォロー
Yuntao Wang
Yuntao Wang
確認したメール アドレス: uec.ac.jp - ホームページ
タイトル
引用先
引用先
Improved progressive BKZ algorithms and their precise cost estimation by sharp simulator
Y Aono, Y Wang, T Hayashi, T Takagi
Advances in Cryptology–EUROCRYPT 2016: 35th Annual International Conference …, 2016
1462016
Improving key mismatch attack on NewHope with fewer queries
S Okada, Y Wang, T Takagi
Information Security and Privacy: 25th Australasian Conference, ACISP 2020 …, 2020
222020
Ding key exchange
J Ding, T Takagi, X Gao, Y Wang
Technical Report. National Institute of Standards and Technology, 2017
222017
PPNNP: A privacy-preserving neural network prediction with separated data providers using multi-client inner-product encryption
M Zhang, S Huang, G Shen, Y Wang
Computer Standards & Interfaces 84, 103678, 2023
152023
An experimental study of Kannan’s embedding technique for the search LWE problem
Y Wang, Y Aono, T Takagi
International Conference on Information and Communications Security, 541-553, 2017
132017
One sample ring-LWE with rounding and its application to key exchange
J Ding, X Gao, T Takagi, Y Wang
International Conference on Applied Cryptography and Network Security, 323-343, 2019
122019
Lattice-Based Searchable Encryption Scheme against Inside Keywords Guessing Attack.
X Yu, C Xu, L Xu, Y Wang
Computers, Materials & Continua 64 (2), 2020
72020
A stochastic variant of the abelian sandpile model
S Kim, Y Wang
Journal of Statistical Physics 178 (3), 711-724, 2020
72020
Tpm-based conditional privacy-preserving authentication protocol in vanets
M Zhang, B Zhu, Y Li, Y Wang
Symmetry 14 (6), 1123, 2022
62022
Multi-user search on the encrypted multimedia database: lattice-based searchable encryption scheme with time-controlled proxy re-encryption
X Yu, C Xu, B Dou, Y Wang
Multimedia Tools and Applications 80, 3193-3211, 2021
62021
Why 1.02? The root Hermite factor of LLL and stochastic sandpile models
J Ding, S Kim, T Takagi, Y Wang
arXiv preprint arXiv:1804.03285, 2018
62018
Recovery Attack on Bob’s Reused Randomness in CRYSTALS-KYBER and SABER
S Okada, Y Wang
Provable and Practical Security: 15th International Conference, ProvSec 2021 …, 2021
42021
Hardness evaluation for search LWE problem using progressive BKZ simulator
Y Wang, Y Aono, T Takagi
IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and …, 2018
42018
Estimated cost for solving generalized learning with errors problem via embedding techniques
W Wang, Y Wang, A Takayasu, T Takagi
Advances in Information and Computer Security: 13th International Workshop …, 2018
42018
Progressive BKZ library
Y Aono, Y Wang, T Hayashi, T Takagi
http://www2.nict.go.jp/security/pbkzcode/index.html, 2016
42016
Improved lattice enumeration algorithms by primal and dual reordering methods
K Yamamura, Y Wang, E Fujisaki
IET Information Security, 1-11, 2022
32022
Message-restriction-free commitment scheme based on lattice assumption
H Miyaji, Y Wang, A Miyaji
Information Security Practice and Experience: 16th International Conference …, 2021
32021
Studying lattice reduction algorithms improved by quick reordering
Y Wang, T Takagi
International Journal of Information Security 20 (2), 257-268, 2020
3*2020
Improving the BKZ Reduction Algorithm by Quick Reordering Technique
Y Wang, T Takagi
Australasian Conference on Information Security and Privacy, 787-795, 2018
32018
Studying the Bounds on Required Samples Numbers for Solving the General Approximate Common Divisors Problem
X Yu, Y Wang, C Xu, T Takagi
2018 5th International Conference on Information Science and Control …, 2018
32018
現在システムで処理を実行できません。しばらくしてからもう一度お試しください。
論文 1–20