default search action
Yoshinori Aono
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [c18]Yoshinori Aono, Junji Shikata:
Anonymous Broadcast Authentication with Logarithmic-Order Ciphertexts from LWE. CANS 2023: 28-50 - [i14]Yoshinori Aono, Junji Shikata:
Anonymous Broadcast Authentication with Logarithmic-order Ciphertexts from DLP or LWE. IACR Cryptol. ePrint Arch. 2023: 351 (2023) - 2021
- [i13]Yoshinori Aono, Sitong Liu, Tomoki Tanaka, Shumpei Uno, Rodney Van Meter, Naoyuki Shinohara, Ryo Nojima:
The Present and Future of Discrete Logarithm Problems on Noisy Quantum Computers. CoRR abs/2111.06102 (2021) - 2020
- [c17]Lihua Wang, Tushar Kanti Saha, Yoshinori Aono, Takeshi Koshiba, Shiho Moriai:
Enhanced Secure Comparison Schemes Using Homomorphic Encryption. NBiS 2020: 211-224
2010 – 2019
- 2018
- [j6]Yoshinori Aono, Manindra Agrawal, Takakazu Satoh, Osamu Watanabe:
On the optimality of lattices for the coppersmith technique. Appl. Algebra Eng. Commun. Comput. 29(2): 169-195 (2018) - [j5]Yoshinori Aono, Takuya Hayashi, Le Trieu Phong, Lihua Wang:
Efficient Homomorphic Encryption with Key Rotation and Security Update. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 101-A(1): 39-50 (2018) - [j4]Yuntao Wang, Yoshinori Aono, Tsuyoshi Takagi:
Hardness Evaluation for Search LWE Problem Using Progressive BKZ Simulator. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 101-A(12): 2162-2170 (2018) - [j3]Le Trieu Phong, Yoshinori Aono, Takuya Hayashi, Lihua Wang, Shiho Moriai:
Privacy-Preserving Deep Learning via Additively Homomorphic Encryption. IEEE Trans. Inf. Forensics Secur. 13(5): 1333-1345 (2018) - [c16]Yoshinori Aono, Phong Q. Nguyen, Yixin Shen:
Quantum Lattice Enumeration and Tweaking Discrete Pruning. ASIACRYPT (1) 2018: 405-434 - [c15]Yoshinori Aono, Phong Q. Nguyen, Takenobu Seito, Junji Shikata:
Lower Bounds on Lattice Enumeration with Extreme Pruning. CRYPTO (2) 2018: 608-637 - [i12]Yoshinori Aono, Phong Q. Nguyen, Yixin Shen:
Quantum Lattice Enumeration and Tweaking Discrete Pruning. IACR Cryptol. ePrint Arch. 2018: 546 (2018) - [i11]Yoshinori Aono, Phong Q. Nguyen, Takenobu Seito, Junji Shikata:
Lower Bounds on Lattice Enumeration with Extreme Pruning. IACR Cryptol. ePrint Arch. 2018: 586 (2018) - 2017
- [j2]Yoshinori Aono, Takuya Hayashi, Le Trieu Phong, Lihua Wang:
Input and Output Privacy-Preserving Linear Regression. IEICE Trans. Inf. Syst. 100-D(10): 2339-2347 (2017) - [c14]Le Trieu Phong, Yoshinori Aono, Takuya Hayashi, Lihua Wang, Shiho Moriai:
Privacy-Preserving Deep Learning: Revisited and Enhanced. ATIS 2017: 100-110 - [c13]Lihua Wang, Yoshinori Aono, Le Trieu Phong:
A New Secure Matrix Multiplication from Ring-LWE. CANS 2017: 93-111 - [c12]Yoshinori Aono, Takuya Hayashi, Le Trieu Phong, Lihua Wang:
Efficient Key-Rotatable and Security-Updatable Homomorphic Encryption. SCC@AsiaCCS 2017: 35-42 - [c11]Yoshinori Aono, Phong Q. Nguyen:
Random Sampling Revisited: Lattice Enumeration with Discrete Pruning. EUROCRYPT (2) 2017: 65-102 - [c10]Yuntao Wang, Yoshinori Aono, Tsuyoshi Takagi:
An Experimental Study of Kannan's Embedding Technique for the Search LWE Problem. ICICS 2017: 541-553 - [c9]Lihua Wang, Takuya Hayashi, Yoshinori Aono, Le Trieu Phong:
A Generic yet Efficient Method for Secure Inner Product. NSS 2017: 217-232 - [c8]Shohei Kuri, Takuya Hayashi, Toshiaki Omori, Seiichi Ozawa, Yoshinori Aono, Le Trieu Phong, Lihua Wang, Shiho Moriai:
Privacy preserving extreme learning machine using additively homomorphic encryption. SSCI 2017: 1-8 - [i10]Yoshinori Aono, Phong Q. Nguyen:
Random Sampling Revisited: Lattice Enumeration with Discrete Pruning. IACR Cryptol. ePrint Arch. 2017: 155 (2017) - [i9]Le Trieu Phong, Yoshinori Aono, Takuya Hayashi, Lihua Wang, Shiho Moriai:
Privacy-Preserving Deep Learning via Additively Homomorphic Encryption. IACR Cryptol. ePrint Arch. 2017: 715 (2017) - 2016
- [j1]Yoshinori Aono, Takuya Hayashi, Le Trieu Phong, Lihua Wang:
Privacy-Preserving Logistic Regression with Distributed Data Sources via Homomorphic Encryption. IEICE Trans. Inf. Syst. 99-D(8): 2079-2089 (2016) - [c7]Yoshinori Aono, Takuya Hayashi, Le Trieu Phong, Lihua Wang:
Scalable and Secure Logistic Regression via Homomorphic Encryption. CODASPY 2016: 142-144 - [c6]Yoshinori Aono, Yuntao Wang, Takuya Hayashi, Tsuyoshi Takagi:
Improved Progressive BKZ Algorithms and Their Precise Cost Estimation by Sharp Simulator. EUROCRYPT (1) 2016: 789-819 - [i8]Yoshinori Aono, Takuya Hayashi, Le Trieu Phong, Lihua Wang:
Scalable and Secure Logistic Regression via Homomorphic Encryption. IACR Cryptol. ePrint Arch. 2016: 111 (2016) - [i7]Yoshinori Aono, Yuntao Wang, Takuya Hayashi, Tsuyoshi Takagi:
Improved Progressive BKZ Algorithms and their Precise Cost Estimation by Sharp Simulator. IACR Cryptol. ePrint Arch. 2016: 146 (2016) - [i6]Le Trieu Phong, Lihua Wang, Yoshinori Aono, Manh Ha Nguyen, Xavier Boyen:
Proxy Re-Encryption Schemes with Key Privacy from LWE. IACR Cryptol. ePrint Arch. 2016: 327 (2016) - 2015
- [i5]Yoshinori Aono, Takuya Hayashi, Le Trieu Phong, Lihua Wang:
Fast and Secure Linear Regression and Biometric Authentication with Security Update. IACR Cryptol. ePrint Arch. 2015: 692 (2015) - [i4]Yoshinori Aono, Le Trieu Phong, Lihua Wang:
Hardness Estimation of LWE via Band Pruning. IACR Cryptol. ePrint Arch. 2015: 1026 (2015) - 2014
- [i3]Yoshinori Aono:
A faster method for computing Gama-Nguyen-Regev's extreme pruning coefficients. CoRR abs/1406.0342 (2014) - 2013
- [c5]Yoshinori Aono:
Minkowski Sum Based Lattice Construction for Multivariate Simultaneous Coppersmith's Technique and Applications to RSA. ACISP 2013: 88-103 - [c4]Yoshinori Aono, Xavier Boyen, Le Trieu Phong, Lihua Wang:
Key-Private Proxy Re-encryption under LWE. INDOCRYPT 2013: 1-18 - 2012
- [c3]Yoshinori Aono, Manindra Agrawal, Takakazu Satoh, Osamu Watanabe:
On the Optimality of Lattices for the Coppersmith Technique. ACISP 2012: 376-389 - [i2]Yoshinori Aono, Manindra Agrawal, Takakazu Satoh, Osamu Watanabe:
On the Optimality of Lattices for the Coppersmith Technique. IACR Cryptol. ePrint Arch. 2012: 108 (2012) - [i1]Yoshinori Aono:
Minkowski sum based lattice construction for solving simultaneous modular equations and applications to RSA. IACR Cryptol. ePrint Arch. 2012: 675 (2012)
2000 – 2009
- 2009
- [c2]Yoshinori Aono:
Simplification of the Lattice Based Attack of Boneh and Durfee for RSA Cryptoanalysis. ASCM 2009: 15-32 - [c1]Yoshinori Aono:
A New Lattice Construction for Partial Key Exposure Attack for RSA. Public Key Cryptography 2009: 34-53
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-21 00:18 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint