Research Output 1981 2020

Filter
Conference contribution
2019

Learning with Coherence Patterns in Multivariate Time-series Data via Dynamic Mode Decomposition

Bito, T., Hiraoka, M. & Kawahara, Y., Jul 2019, 2019 International Joint Conference on Neural Networks, IJCNN 2019. Institute of Electrical and Electronics Engineers Inc., 8852177. (Proceedings of the International Joint Conference on Neural Networks; vol. 2019-July).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Time series
Decomposition
Laser modes
Labels

Mobility Optimization on Cyber Physical System via Multiple Object Tracking and Mathematical Programming

Hata, N., Nakayama, T., Tanaka, A., Wakamatsu, T., Yoshida, A., Tateiwa, N., Nishikawa, Y., Ozawa, J. & Fujisawa, K., Jan 22 2019, Proceedings - 2018 IEEE International Conference on Big Data, Big Data 2018. Song, Y., Liu, B., Lee, K., Abe, N., Pu, C., Qiao, M., Ahmed, N., Kossmann, D., Saltz, J., Tang, J., He, J., Liu, H. & Hu, X. (eds.). Institute of Electrical and Electronics Engineers Inc., p. 4026-4035 10 p. 8622146. (Proceedings - 2018 IEEE International Conference on Big Data, Big Data 2018).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Mathematical programming
Integer programming
Industrial applications
Data reduction
Experiments

Shortest reconfiguration of perfect matchings via alternating cycles

Ito, T., Kakimura, N., Kamiyama, N., Kobayashi, Y. & Okamoto, Y., Sep 2019, 27th Annual European Symposium on Algorithms, ESA 2019. Bender, M. A., Svensson, O. & Herman, G. (eds.). Schloss Dagstuhl- Leibniz-Zentrum fur Informatik GmbH, Dagstuhl Publishing, 61. (Leibniz International Proceedings in Informatics, LIPIcs; vol. 144).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Computational complexity
Polynomials
2018

Acceleration of index calculus for solving ECDLP over prime fields and its limitation

Kudo, M., Yokota, Y., Takahashi, Y. & Yasuda, M., Jan 1 2018, Cryptology and Network Security - 17th International Conference, CANS 2018, Proceedings. Papadimitratos, P. & Camenisch, J. (eds.). Springer Verlag, p. 377-393 17 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11124 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Discrete Logarithm Problem
Elliptic Curves
Calculus
Polynomials
Summation
3 Citations (Scopus)

An experimental study of Kannan’s embedding technique for the search LWE problem

Wang, Y., Aono, Y. & Takagi, T., Jan 1 2018, Information and Communications Security - 19th International Conference, ICICS 2017, Proceedings. Qing, S., Liu, D., Mitchell, C. & Chen, L. (eds.). Springer Verlag, p. 541-553 13 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10631 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Experimental Study
Enumeration
Learning
Lattice Reduction
Experimental Results
2 Citations (Scopus)

A public-key encryption scheme based on non-linear indeterminate equations

Akiyama, K., Goto, Y., Okumura, S., Takagi, T., Nuida, K. & Hanaoka, G., Jan 1 2018, Selected Areas in Cryptography – SAC 2017 - 24th International Conference, Revised Selected Papers. Adams, C. & Camenisch, J. (eds.). Springer Verlag, p. 215-234 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10719 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Public Key Encryption
Nonlinear equations
Cryptography
Cryptosystem
Small Solutions

Development of a dual version of DeepBKZ and its application to solving the LWE challenge

Yasuda, M., Yamaguchi, J., Ooka, M. & Nakamura, S., Jan 1 2018, Progress in Cryptology - AFRICACRYPT 2018 - 10th International Conference on Cryptology in Africa, Proceedings. Nitaj, A., Rachidi, T. & Joux, A. (eds.). Springer Verlag, p. 162-182 21 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10831 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Decoding
Subroutines
Enumeration
Dual Basis
Pruning

Dynamic determinantal point processes

Osogami, T., Raymond, R., Shirai, T., Goel, A. & Maehara, T., Jan 1 2018, 32nd AAAI Conference on Artificial Intelligence, AAAI 2018. AAAI Press, p. 3868-3875 8 p. (32nd AAAI Conference on Artificial Intelligence, AAAI 2018).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Learning algorithms
Factorization
Learning systems
1 Citation (Scopus)

Efficient decryption algorithms for extension field cancellation type encryption schemes

Wang, Y., Ikematsu, Y., Duong, D. H. & Takagi, T., Jan 1 2018, Information Security and Privacy - 23rd Australasian Conference, ACISP 2018, Proceedings. Susilo, W. & Yang, G. (eds.). Springer Verlag, p. 487-501 15 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10946 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Field extension
Cancellation
Encryption
Cryptography
Efficient Algorithms
3 Citations (Scopus)

Explicit formula for gram-schmidt vectors in LLL with deep insertions and its applications

Yamaguchi, J. & Yasuda, M., Jan 1 2018, Number-Theoretic Methods in Cryptology - 1st International Conference, NuTMiC 2017, Revised Selected Papers. Pieprzyk, J., Pieprzyk, J., Kaczorowski, J. & Pomykała, J. (eds.). Springer Verlag, p. 142-160 19 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10737 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Orthogonalization
Subroutines
Insertion
Explicit Formula
Lattice Basis Reduction
1 Citation (Scopus)

Faster PCA and linear regression through hypercubes in HElib

Rathee, D., Mishra, P. K. & Yasuda, M., Oct 15 2018, WPES 2018 - Proceedings of the 2018 Workshop on Privacy in the Electronic Society, co-located with CCS 2018. Association for Computing Machinery, p. 42-53 12 p. (Proceedings of the ACM Conference on Computer and Communications Security).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Linear regression
Principal component analysis
Cryptography
Outsourcing
Experiments
2 Citations (Scopus)

HFERP - A new multivariate encryption scheme

Ikematsu, Y., Perlner, R., Smith-Tone, D., Takagi, T. & Vates, J., Jan 1 2018, Post-Quantum Cryptography - 9th International Conference, PQCrypto 2018, Proceedings. Lange, T. & Steinwandt, R. (eds.). Springer Verlag, p. 396-416 21 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10786 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Encryption
Cryptography
Blow-up
Attack
Doubling

On the complexity of stable fractional hypergraph matching

Ishizuka, T. & Kamiyama, N., Dec 1 2018, 29th International Symposium on Algorithms and Computation, ISAAC 2018. Liao, C-S., Lee, D-T. & Hsu, W-L. (eds.). Schloss Dagstuhl- Leibniz-Zentrum fur Informatik GmbH, Dagstuhl Publishing, (Leibniz International Proceedings in Informatics, LIPIcs; vol. 123).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Polynomials
2 Citations (Scopus)

Practical approach to evacuation planning via network flow and deep learning

Tanaka, A., Hata, N., Tateiwa, N. & Fujisawa, K., Jan 12 2018, Proceedings - 2017 IEEE International Conference on Big Data, Big Data 2017. Obradovic, Z., Baeza-Yates, R., Kepner, J., Nambiar, R., Wang, C., Toyoda, M., Suzumura, T., Hu, X., Cuzzocrea, A., Baeza-Yates, R., Tang, J., Zang, H., Nie, J-Y. & Ghosh, R. (eds.). Institute of Electrical and Electronics Engineers Inc., p. 3368-3377 10 p. (Proceedings - 2017 IEEE International Conference on Big Data, Big Data 2017; vol. 2018-January).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Evacuation
Network Flow
Planning
Neural networks
Neural Networks
2 Citations (Scopus)

Reduction of H state feedback control problems for the servo systems

Waki, H. & Sebe, N., Feb 7 2018, 2017 Asian Control Conference, ASCC 2017. Institute of Electrical and Electronics Engineers Inc., Vol. 2018-January. p. 2244-2249 6 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Servo System
State Feedback Control
Matrix Inequality
Linear Inequalities
Control Problem

Singular fibers of stable maps of manifold pairs and their applications

Saeki, O. & Yamamoto, T., Jan 1 2018, Singularities and Foliations. Geometry, Topology and Applications - BMMS 2/NBMS 3. Snoussi, J., Araujo dos Santos, R. N., Saia, M. J., Mond, D. & Menegon Neto, A. (eds.). Springer New York LLC, p. 259-294 36 p. (Springer Proceedings in Mathematics and Statistics; vol. 222).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Stable Map
Fiber
Submanifolds
Closed
Morse Function

Solving LWR via BDD strategy: Modulus switching approach

Le, H. Q., Mishra, P. K., Duong, D. H. & Yasuda, M., Jan 1 2018, Cryptology and Network Security - 17th International Conference, CANS 2018, Proceedings. Papadimitratos, P. & Camenisch, J. (eds.). Springer Verlag, p. 357-376 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11124 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Modulus
Modulo
Attack
Hermite
Probability distributions

Specification and Verification of Invariant Properties of Transition Systems

Gaina, D., Tutu, I. & Riesco, A., Jul 2 2018, Proceedings - 25th Asia-Pacific Software Engineering Conference, APSEC 2018. IEEE Computer Society, p. 99-108 10 p. 8719485. (Proceedings - Asia-Pacific Software Engineering Conference, APSEC; vol. 2018-December).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Specifications
1 Citation (Scopus)

Strong feasibility of the dual problem of linear matrix inequality for H output feedback control problem

Waki, H. & Sebe, N., Apr 2 2018, SICE ISCS 2018 - 2018 SICE International Symposium on Control Systems. Institute of Electrical and Electronics Engineers Inc., p. 47-53 7 p. (SICE ISCS 2018 - 2018 SICE International Symposium on Control Systems; vol. 2018-January).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Output Feedback Control
Dual Problem
Linear matrix inequalities
Feedback control
Matrix Inequality

Submodular function minimization with submodular set covering constraints and precedence constraints

Kamiyama, N., Jan 1 2018, Approximation and Online Algorithms - 15th International Workshop, WAOA 2017, Revised Selected Papers. Solis-Oba, R. & Fleischer, R. (eds.). Springer Verlag, p. 90-101 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10787 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Function Minimization
Submodular Function
Set Covering
Precedence Constraints
Covering Problem

The B-branching problem in digraphs

Kakimura, N., Kamiyama, N. & Takazawa, K., Aug 1 2018, 43rd International Symposium on Mathematical Foundations of Computer Science, MFCS 2018. Potapov, I., Worrell, J. & Spirakis, P. (eds.). Schloss Dagstuhl- Leibniz-Zentrum fur Informatik GmbH, Dagstuhl Publishing, 12. (Leibniz International Proceedings in Informatics, LIPIcs; vol. 117).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Polynomials
Decomposition

Tight approximability of the server allocation problem for real-time applications

Ito, T., Kakimura, N., Kamiyama, N., Kobayashi, Y., Okamoto, Y. & Shiitada, T., Jan 1 2018, Algorithmic Aspects of Cloud Computing - 3rd International Workshop, ALGOCLOUD 2017, Revised Selected Papers. Delis, A., Pallis, G. & Alistarh, D. (eds.). Springer Verlag, p. 41-55 15 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10739 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Approximability
Servers
Server
Real-time
Approximation algorithms
2017

A counter-rotating vortex pair in inviscid fluid

Habibah, U. & Fukumoto, Y., Dec 5 2017, International Conference and Workshop on Mathematical Analysis and its Applications, ICWOMAA 2017. Kilicman, A., Marjono, Wibowo, R. B. E. & Imron, M. A. (eds.). American Institute of Physics Inc., 020022. (AIP Conference Proceedings; vol. 1913).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

counters
vortices
fluids
Biot-Savart law
Navier-Stokes equation

A multigrid-balancing preconditioner of domain decomposition methods for magnetic field problems

Tagami, D., Jan 12 2017, IEEE CEFC 2016 - 17th Biennial Conference on Electromagnetic Field Computation. Institute of Electrical and Electronics Engineers Inc., 7816393. (IEEE CEFC 2016 - 17th Biennial Conference on Electromagnetic Field Computation).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Domain decomposition methods
Domain Decomposition Method
Preconditioner
Balancing
Magnetic Field

An estimate of the complexity of the section finding problem on algebraic surfaces

Okumura, S., Akiyama, K. & Takagi, T., Jan 13 2017, Proceedings - 2016 4th International Symposium on Computing and Networking, CANDAR 2016. Institute of Electrical and Electronics Engineers Inc., p. 28-36 9 p. 7818591. (Proceedings - 2016 4th International Symposium on Computing and Networking, CANDAR 2016).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Cryptography
Quantum cryptography
Quantum computers
5 Citations (Scopus)

An experimental study of the BDD approach for the search LWE problem

Xu, R., Yeo, S. L., Fukushima, K., Takagi, T., Seo, H., Kiyomoto, S. & Henricksen, M., Jan 1 2017, Applied Cryptography and Network Security - 15th International Conference, ACNS 2017, Proceedings. Gollmann, D., Miyaji, A. & Kikuchi, H. (eds.). Springer Verlag, p. 253-272 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10355 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Decoding
Experimental Study
Enumeration
Cryptography
Cryptosystem
9 Citations (Scopus)

Bayesian dynamic mode decomposition

Takeishi, N., Kawahara, Y., Tabei, Y. & Yairi, T., Jan 1 2017, 26th International Joint Conference on Artificial Intelligence, IJCAI 2017. Sierra, C. (ed.). International Joint Conferences on Artificial Intelligence, p. 2814-2821 8 p. (IJCAI International Joint Conference on Artificial Intelligence).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Decomposition
Nonlinear dynamical systems
1 Citation (Scopus)

Choosing Parameters for the Subfield Lattice Attack Against Overstretched NTRU

Duong, D. H., Yasuda, M. & Takagi, T., Jan 1 2017, Information Security - 20th International Conference, ISC 2017, Proceedings. Nguyen, P. Q., Nguyen, P. Q. & Zhou, J. (eds.). Springer Verlag, p. 79-91 13 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10599 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Subfield
Attack
Lattice Reduction
Public key
Modulus
3 Citations (Scopus)

Enhancement for secure multiple matrix multiplications over ring-LWE homomorphic encryption

Mishra, P. K., Duong, D. H. & Yasuda, M., Jan 1 2017, Information Security Practice and Experience - 13th International Conference, ISPEC 2017, Proceedings. Liu, J. K. & Samarati, P. (eds.). Springer Verlag, p. 320-330 11 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10701 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Homomorphic Encryption
Matrix multiplication
Cryptography
Enhancement
Ring

Formal equivalence classes model of fuzzy relational databases using relational calculus

Akbar, M. D. & Mizoguchi, Y., Dec 4 2017, Proceedings - 2017 International Conference on Applied Computer and Communication Technologies, ComCom 2017. Institute of Electrical and Electronics Engineers Inc., p. 1-6 6 p. (Proceedings - 2017 International Conference on Applied Computer and Communication Technologies, ComCom 2017; vol. 2017-January).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Equivalence classes
Soft computing
Websites
Relational database
Equivalence

Formalization of proofs using relational calculus

Mizoguchi, Y., Tanaka, H. & Inokuchi, S., Feb 2 2017, Proceedings of 2016 International Symposium on Information Theory and Its Applications, ISITA 2016. Institute of Electrical and Electronics Engineers Inc., p. 527-531 5 p. 7840480. (Proceedings of 2016 International Symposium on Information Theory and Its Applications, ISITA 2016).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

formalization
Automata theory
Computer science
computer science
assistant
3 Citations (Scopus)

Memory-constrained implementation of lattice-based encryption scheme on standard Java Card

Yuan, Y., Fukushima, K., Kiyomoto, S. & Takagi, T., Jun 16 2017, Proceedings of the 2017 IEEE International Symposium on Hardware Oriented Security and Trust, HOST 2017. Institute of Electrical and Electronics Engineers Inc., p. 47-50 4 p. 7951796. (Proceedings of the 2017 IEEE International Symposium on Hardware Oriented Security and Trust, HOST 2017).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Cryptography
Quantum cryptography
Data storage equipment
Quantum computers
Smart cards

Modeling and managing airport passenger flow under uncertainty: A case of fukuoka airport in Japan

Yamada, H., Ohori, K., Iwao, T., Kira, A., Kamiyama, N., Yoshida, H. & Anai, H., Jan 1 2017, Social Informatics - 9th International Conference, SocInfo 2017, Proceedings. Ciampaglia, G. L., Yasseri, T. & Mashhadi, A. (eds.). Springer Verlag, p. 419-430 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10540 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Airports
Japan
Congestion
Uncertainty
Modeling

Persistent-homology-based detection of power system low-frequency oscillations using PMUs

Chen, Y., Chintakunta, H., Xie, L., Baryshnikov, Y. M. & Kumar, P. R., Apr 19 2017, 2016 IEEE Global Conference on Signal and Information Processing, GlobalSIP 2016 - Proceedings. Institute of Electrical and Electronics Engineers Inc., p. 796-800 5 p. 7905952. (2016 IEEE Global Conference on Signal and Information Processing, GlobalSIP 2016 - Proceedings).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Phasor measurement units
Modal analysis
Principal component analysis
2 Citations (Scopus)

Power-Efficient Breadth-First Search with DRAM Row Buffer Locality-Aware Address Mapping

Imamura, S., Yasui, Y., Inoue, K., Ono, T., Sasaki, H. & Fujisawa, K., Jan 23 2017, Proceedings of HPGDMP 2016: High Performance Graph Data Management and Processing - Held in conjunction with SC 2016: The International Conference for High Performance Computing, Networking, Storage and Analysis. Institute of Electrical and Electronics Engineers Inc., p. 17-24 8 p. 7830443. (Proceedings of HPGDMP 2016: High Performance Graph Data Management and Processing - Held in conjunction with SC 2016: The International Conference for High Performance Computing, Networking, Storage and Analysis).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Dynamic random access storage
Data storage equipment
Simulators
Controllers
3 Citations (Scopus)

Reconfiguration of maximum-weight b-matchings in a graph

Ito, T., Kakimura, N., Kamiyama, N., Kobayashi, Y. & Okamoto, Y., Jan 1 2017, Computing and Combinatorics - 23rd International Conference, COCOON 2017, Proceedings. Cao, Y. & Chen, J. (eds.). Springer Verlag, p. 287-296 10 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10392 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Reconfiguration
Polynomials
Graph in graph theory
Bipartite Graph
Integer
3 Citations (Scopus)

Recovering attacks against linear sketch in fuzzy signature schemes of ACNS 2015 and 2016

Yasuda, M., Shimoyama, T., Takenaka, M., Abe, N., Yamada, S. & Yamaguchi, J., Jan 1 2017, Information Security Practice and Experience - 13th International Conference, ISPEC 2017, Proceedings. Liu, J. K. & Samarati, P. (eds.). Springer Verlag, p. 409-421 13 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10701 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Biometrics
Signature Scheme
Attack
Template
Signature
1 Citation (Scopus)

Restrictions of free arrangements and the division theorem

Abe, T., Jan 1 2017, Perspectives in Lie Theory. Callegaro, F., Carnovale, G., Caselli, F., De Concini, C. & De Sole, A. (eds.). Springer International Publishing, p. 389-401 13 p. (Springer INdAM Series; vol. 19).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Division
Arrangement
Restriction
Theorem
Characteristic polynomial
2 Citations (Scopus)

Revisiting the cubic UOV signature scheme

Duong, D. H., Petzoldt, A., Wang, Y. & Takagi, T., Jan 1 2017, Information Security and Cryptology – ICISC 2016 - 19th International Conference, Revised Selected Papers. Hong, S. & Park, J. H. (eds.). Springer Verlag, p. 223-238 16 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10157 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Quantum computers
Electronic document identification systems
Signature Scheme
Cryptography
Attack
1 Citation (Scopus)

Revisiting the efficient key generation of ZHFE

Ikematsu, Y., Duong, D. H., Petzoldt, A. & Takagi, T., Jan 1 2017, Codes, Cryptology and Information Security - 2nd International Conference, C2SI 2017, Proceedings In Honor of Claude Carlet. Nitaj, A., El Hajji, S. & Souidi, E. M. (eds.). Springer Verlag, p. 195-212 18 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10194 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Cryptography
Linear algebra
Cryptosystem
Encryption
Efficient Algorithms
2 Citations (Scopus)

Secure and efficient pairing at 256-Bit security level

Kiyomura, Y., Inoue, A., Kawahara, Y., Yasuda, M., Takagi, T. & Kobayashi, T., Jan 1 2017, Applied Cryptography and Network Security - 15th International Conference, ACNS 2017, Proceedings. Gollmann, D., Miyaji, A. & Kikuchi, H. (eds.). Springer Verlag, p. 59-79 21 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10355 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Pairing
Cryptography
Pairing-based Cryptography
Sieves
Curve
1 Citation (Scopus)

The beauty and the beasts—The hard cases in LLL reduction

Alsayigh, S., Ding, J., Takagi, T. & Wang, Y., Jan 1 2017, Advances in Information and Computer Security - 12th International Workshop on Security, IWSEC 2017, Proceedings. Obana, S. & Chida, K. (eds.). Springer Verlag, p. 19-35 17 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10418 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Beast
Higher Dimensions
Failure Probability
Geometric Structure
Angle
2016
2 Citations (Scopus)

Advanced computing and optimization infrastructure for extremely large-scale graphs on post peta-scale supercomputers

Fujisawa, K., Endo, T. & Yasui, Y., Jan 1 2016, Mathematical Software - 5th International Conference, ICMS 2016, Proceedings. Greuel, G-M., Sommese, A., Koch, T. & Paule, P. (eds.). Springer Verlag, p. 265-274 10 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9725).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Supercomputers
Supercomputer
Semidefinite Programming
Infrastructure
Optimization

An elementary introduction to matrix exponential for CG

Ochiai, H., Anjyo, K. & Kimura, A., Jul 24 2016, ACM SIGGRAPH 2016 Courses, SIGGRAPH 2016. Association for Computing Machinery, Inc, a4

Research output: Chapter in Book/Report/Conference proceedingConference contribution

1 Citation (Scopus)

A regularized finite volume numerical method for the extended porous medium equation relevant to moisture dynamics with evaporation in non-woven fibrous sheets

Yoshioka, H. & Triadis, D., Jan 1 2016, Model Design and Simulation Analysis - 15th International Conference, AsiaSim 2015, Revised Selected Papers. Ohn, S. Y. & Chi, S. D. (eds.). Springer Verlag, p. 3-16 14 p. (Communications in Computer and Information Science; vol. 603).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Porous Medium Equation
Moisture
Evaporation
Finite Volume Method
Porous materials
2 Citations (Scopus)

A sufficient condition for tail asymptotics of SIR distribution in downlink cellular networks

Miyoshi, N. & Shirai, T., Jun 15 2016, 2016 14th International Symposium on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks, WiOpt 2016. Institute of Electrical and Electronics Engineers Inc., 7492955. (2016 14th International Symposium on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks, WiOpt 2016).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Tail Asymptotics
Cellular Networks
Interference
Sufficient Conditions
Stochastic models
2 Citations (Scopus)

Comprehensive and improved secure biometric system using homomorphic encryption

Mandal, A., Roy, A. & Yasuda, M., Jan 1 2016, Data Privacy Management, and Security Assurance - 10th International Workshop, DPM 2015 and 4th International Workshop, QASA 2015, Revised Selected Papers. Navarro-Arribas, G., Aldini, A., Martinelli, F., Suri, N. & Garcia-Alfaro, J. (eds.). Springer Verlag, p. 183-198 16 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9481).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Homomorphic Encryption
Biometrics
Authentication
Cryptography
Template
1 Citation (Scopus)

Constructing Pairing-Friendly Elliptic Curves Using Global Number Fields

Yasuda, T., Takagi, T. & Sakurai, K., Mar 2 2016, Proceedings - 2015 3rd International Symposium on Computing and Networking, CANDAR 2015. Institute of Electrical and Electronics Engineers Inc., p. 477-483 7 p. 7424760. (Proceedings - 2015 3rd International Symposium on Computing and Networking, CANDAR 2015).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Number theory
Cryptography

Cryptanalysis of a public key cryptosystem based on diophantine equations via weighted LLL reduction

Ding, J., Kudo, M., Okumura, S., Takagi, T. & Tao, C., Jan 1 2016, Advances in Information and Computer Security - 11th International Workshop on Security, IWSEC 2016, Proceedings. Yoshioka, K. & Ogawa, K. (eds.). Springer Verlag, p. 305-315 11 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9836 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Public-key Cryptosystem
Diophantine equation
Cryptanalysis
LLL Algorithm
Cryptography

Cyclicity in multivariate time series and applications to functional MRI data

Baryshnikov, Y. & Schlafly, E., Dec 27 2016, 2016 IEEE 55th Conference on Decision and Control, CDC 2016. Institute of Electrical and Electronics Engineers Inc., p. 1625-1630 6 p. 7798498. (2016 IEEE 55th Conference on Decision and Control, CDC 2016).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Cyclicity
Multivariate Time Series
Functional Magnetic Resonance Imaging
Time series
Reparametrization