フォロー
Hiroki Okada
Hiroki Okada
KDDI Research, Inc.
確認したメール アドレス: kddi-research.jp - ホームページ
タイトル
引用先
引用先
Randomness evaluation with the discrete Fourier transform test based on exact analysis of the reference distribution
H Okada, K Umeno
IEEE Transactions on Information Forensics and Security 12 (5), 1218-1226, 2017
272017
Linear depth integer-wise homomorphic division
H Okada, C Cid, S Hidano, S Kiyomoto
IFIP International Conference on Information Security Theory and Practice …, 2018
102018
Integerwise functional bootstrapping on TFHE
H Okada, S Kiyomoto, C Cid
International Conference on Information Security, 107-125, 2020
52020
Homomorphic polynomial evaluation using Galois structure and applications to BFV bootstrapping
H Okada, R Player, S Pohmann
International Conference on the Theory and Application of Cryptology and …, 2023
42023
A compact digital signature scheme based on the module-LWR problem
H Okada, A Takayasu, K Fukushima, S Kiyomoto, T Takagi
IEICE Transactions on Fundamentals of Electronics, Communications and …, 2021
42021
Towards practical doubly-efficient private information retrieval
H Okada, R Player, S Pohmann, C Weinert
Cryptology ePrint Archive, 2023
32023
Integer-wise functional bootstrapping on TFHE: applications in secure integer arithmetics
H Okada, S Kiyomoto, C Cid
Information 12 (8), 297, 2021
22021
新たな非線形時系列解析の手法-移動最大リアプノフ指数線によるカオス解析
岡田大樹, 梅野健
レーザー研究 43 (6), 359, 2015
22015
GPU Acceleration of High-Precision Homomorphic Computation Utilizing Redundant Representation
S Narisada, H Okada, K Fukushima, S Kiyomoto, T Nishide
Proceedings of the 11th Workshop on Encrypted Computing & Applied …, 2023
12023
Achieving Private Verification in Multi-stakeholder Environment and Application to Stable Matching.
T Nakamura, H Okada, K Fukushima, T Isohara
ICEIS (1), 768-775, 2023
12023
A Comparison of GKE Protocols based on SIDH.
H Okada, S Kiyomoto, C Cid
SECRYPT, 507-514, 2021
12021
Simulation-Secure Threshold PKE from Standard (Ring-) LWE
H Okada, T Takagi
Cryptology ePrint Archive, 2024
2024
Spherical Gaussian Leftover Hash Lemma via the Rényi Divergence
H Okada, K Fukushima, S Kiyomoto, T Takagi
International Conference on Applied Cryptography and Network Security, 695-724, 2023
2023
Revisiting the DFT Test in the NIST SP 800-22 Randomness Test Suite.
H Okada, K Fukushima
ICISSP, 366-372, 2023
2023
Erratum: A Compact Digital Signature Scheme Based on the Module-LWR Problem [IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences Vol. E104 …
H Okada, A Takayasu, K Fukushima, S Kiyomoto, T Takagi
IEICE Transactions on Fundamentals of Electronics, Communications and …, 2022
2022
Side-channel Analysis and Countermeasure for Implementation of Lattice-based Signature.
K Fukushima, H Okada, S Takarabt, A Korchi, M Hamoud, K Karray, ...
SECRYPT, 701-706, 2022
2022
Faster Rotation-Based Gauss Sieve for Solving the SVP on General Ideal Lattices
S Narisada, H Okada, K Fukushima, S Kiyomoto
IEICE Transactions on Fundamentals of Electronics, Communications and …, 2021
2021
On the complexity of the LWR-solving BKW algorithm
H Okada, A Takayasu, K Fukushima, S Kiyomoto, T Takagi
IEICE Transactions on Fundamentals of Electronics, Communications and …, 2020
2020
On the Complexity of the LWR-Solving BKW Algorithm
S Kiyomoto, T Takagi
Information Security and Cryptology–ICISC 2018: 21st International …, 2019
2019
LWR 問題解読のためのサンプル増幅法を用いた BKW アルゴリズム
岡田大樹, 高安敦, 福島和英, 清本晋作, 高木剛
コンピュータセキュリティシンポジウム 2017 論文集 2017 (2), 2017
2017
現在システムで処理を実行できません。しばらくしてからもう一度お試しください。
論文 1–20