Jun Kogure
According to our database1,
Jun Kogure
authored at least 21 papers
between 1998 and 2020.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2020
J. Math. Cryptol., 2020
2017
Analysis of decreasing squared-sum of Gram-Schmidt lengths for short lattice vectors.
J. Math. Cryptol., 2017
2016
2015
Secur. Commun. Networks, 2015
Secure Data Devolution: Practical Re-encryption with Auxiliary Data in LWE-based Somewhat Homomorphic Encryption.
Proceedings of the 3rd International Workshop on Security in Cloud Computing, 2015
Proceedings of the Information Security and Privacy - 20th Australasian Conference, 2015
2014
On the exact decryption range for Gentry-Halevi's implementation of fully homomorphic encryption.
J. Math. Cryptol., 2014
Privacy-Preserving Wildcards Pattern Matching Using Symmetric Somewhat Homomorphic Encryption.
Proceedings of the Information Security and Privacy - 19th Australasian Conference, 2014
2013
Proceedings of the Data Privacy Management and Autonomous Spontaneous Security, 2013
Proceedings of the CCSW'13, 2013
Packed Homomorphic Encryption Based on Ideal Lattices and Its Application to Biometrics.
Proceedings of the Security Engineering and Intelligence Informatics, 2013
2012
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2012
Proceedings of the Security and Cryptography for Networks - 8th International Conference, 2012
Analysis of Lattice Reduction Attack against the Somewhat Homomorphic Encryption Based on Ideal Lattices.
Proceedings of the Public Key Infrastructures, Services and Applications, 2012
2011
Proceedings of the Information Security Applications - 12th International Workshop, 2011
2010
Proceedings of the 13th International Conference on Network-Based Information Systems, 2010
2007
CAIRN 2: An FPGA Implementation of the Sieving Step in the Number Field Sieve Method.
Proceedings of the Cryptographic Hardware and Embedded Systems, 2007
2000
Proceedings of the Public Key Cryptography, 2000
1998
Parameters for Secure Elliptic Curve Cryptosystem - Improvements on Schoof's Algorithm.
Proceedings of the Public Key Cryptography, 1998
Proceedings of the Advances in Cryptology, 1998