default search action
Yuntao Wang 0002
Person information
- unicode name: 王贇弢
- unicode name: オウ イントウ
- affiliation: Osaka University, Japan
- affiliation: Japan Advanced Institute of Science and Technology (JAIST), Japan
- affiliation: University of Tokyo, Graduate School of Information Science and Technology, Japan
- affiliation: Kyushu University, Graduate School of Mathematics, Fukuoka, Japan
Other persons with the same name
- Yuntao Wang — disambiguation page
- Yuntao Wang 0001 — Tsinghua University, Key Laboratory of Pervasive Computing, Ministry of Education, Tsinghua National Laboratory for Information Science and Technology, Beijing, China
- Yuntao Wang 0003 — China Satellite Co., Ltd., Beijing, China (and 1 more)
- Yuntao Wang 0004 — Xi'an Jiaotong University, Xi'an, China (and 1 more)
- Yuntao Wang 0005 — State Key Laboratory of Satellite Ocean Environment Dynamics, Second Institute of Oceanography, Ministry of Natural Resources, Hangzhou, China
- Yuntao Wang 0006 — Beijing Institute of Geology, Beijing, China
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j10]Hideaki Miyaji, Yuntao Wang, Atsuko Miyaji:
Lattice-Based Commitment Scheme for Low Communication Costs. IEEE Access 12: 111400-111410 (2024) - 2023
- [j9]Mingwu Zhang, Shuo Huang, Gang Shen, Yuntao Wang:
PPNNP: A privacy-preserving neural network prediction with separated data providers using multi-client inner-product encryption. Comput. Stand. Interfaces 84: 103678 (2023) - [j8]Kazuki Yamamura, Yuntao Wang, Eiichiro Fujisaki:
Improved lattice enumeration algorithms by primal and dual reordering methods. IET Inf. Secur. 17(1): 35-45 (2023) - [j7]Mingwu Zhang, Mingxuan Yang, Gang Shen, Zhe Xia, Yuntao Wang:
A verifiable and privacy-preserving cloud mining pool selection scheme in blockchain of things. Inf. Sci. 623: 293-310 (2023) - [c16]Leizhang Wang, Yuntao Wang, Baocang Wang:
A Trade-off SVP-solving Strategy based on a Sharper pnj-BKZ Simulator. AsiaCCS 2023: 664-677 - [c15]Kaiming Chen, Atsuko Miyaji, Yuntao Wang:
Privacy-Enhanced Anonymous and Deniable Post-quantum X3DH. SciSec 2023: 157-177 - 2022
- [j6]Xiaoling Yu, Yuntao Wang, Chungen Xu, Tsuyoshi Takagi:
Revisiting the Orthogonal Lattice Algorithm in Solving General Approximate Common Divisor Problem. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 105-A(3): 195-202 (2022) - [j5]Mingwu Zhang, Boyao Zhu, Yumei Li, Yuntao Wang:
TPM-Based Conditional Privacy-Preserving Authentication Protocol in VANETs. Symmetry 14(6): 1123 (2022) - [c14]Yuntao Wang, Yasuhiko Ikematsu, Takanori Yasuda:
Lattice-Based Public Key Cryptosystems Invoking Linear Mapping Mask. ProvSec 2022: 88-104 - 2021
- [j4]Yuntao Wang, Tsuyoshi Takagi:
Studying lattice reduction algorithms improved by quick reordering technique. Int. J. Inf. Sec. 20(2): 257-268 (2021) - [j3]Xiaoling Yu, Chungen Xu, Bennian Dou, Yuntao Wang:
Multi-user search on the encrypted multimedia database: lattice-based searchable encryption scheme with time-controlled proxy re-encryption. Multim. Tools Appl. 80(2): 3193-3211 (2021) - [c13]Kazuki Yamamura, Yuntao Wang, Eiichiro Fujisaki:
Improved Lattice Enumeration Algorithms by Primal and Dual Reordering Methods. ICISC 2021: 159-174 - [c12]Hideaki Miyaji, Yuntao Wang, Atsuko Miyaji:
Message-Restriction-Free Commitment Scheme Based on Lattice Assumption. ISPEC 2021: 90-105 - [c11]Satoshi Okada, Yuntao Wang:
Recovery Attack on Bob's Reused Randomness in CRYSTALS-KYBER and SABER. ProvSec 2021: 155-173 - [e1]Keita Emura, Yuntao Wang:
Proceedings of the 8th on ASIA Public-Key Cryptography Workshop, APKC@AsiaCCS 2021, Virtual Event Hong Kong, 7 June, 2021. ACM 2021, ISBN 978-1-4503-8401-8 [contents] - 2020
- [c10]Satoshi Okada, Yuntao Wang, Tsuyoshi Takagi:
Improving Key Mismatch Attack on NewHope with Fewer Queries. ACISP 2020: 505-524 - [c9]Yuntao Wang, Yasuhiko Ikematsu, Koichiro Akiyama, Tsuyoshi Takagi:
Cryptanalysis of GiophantusTM Schemes against Hybrid Attack. APKC@AsiaCCS 2020: 28-35 - [c8]Hideaki Miyaji, Atsuko Miyaji, Yuntao Wang:
Homomorphic commitment scheme with constant output locality. CANDAR 2020: 167-173 - [i5]Satoshi Okada, Yuntao Wang, Tsuyoshi Takagi:
Improving Key Mismatch Attack on NewHope with Fewer Queries. IACR Cryptol. ePrint Arch. 2020: 585 (2020) - [i4]Satoshi Okada, Yuntao Wang:
Key Recovery Attack on Bob's Secrets in CRYSTALS-KYBER and SABER. IACR Cryptol. ePrint Arch. 2020: 1503 (2020)
2010 – 2019
- 2019
- [c7]Jintai Ding, Xinwei Gao, Tsuyoshi Takagi, Yuntao Wang:
One Sample Ring-LWE with Rounding and Its Application to Key Exchange. ACNS 2019: 323-343 - [i3]Jintai Ding, Seungki Kim, Tsuyoshi Takagi, Yuntao Wang:
LLL and stochastic sandpile models. IACR Cryptol. ePrint Arch. 2019: 1009 (2019) - 2018
- [j2]Yuntao Wang, Yoshinori Aono, Tsuyoshi Takagi:
Hardness Evaluation for Search LWE Problem Using Progressive BKZ Simulator. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 101-A(12): 2162-2170 (2018) - [c6]Yuntao Wang, Tsuyoshi Takagi:
Improving the BKZ Reduction Algorithm by Quick Reordering Technique. ACISP 2018: 787-795 - [c5]Yuntao Wang, Thomas Wunderer:
Revisiting the Sparsification Technique in Kannan's Embedding Attack on LWE. ISPEC 2018: 440-452 - [c4]Weiyao Wang, Yuntao Wang, Atsushi Takayasu, Tsuyoshi Takagi:
Estimated Cost for Solving Generalized Learning with Errors Problem via Embedding Techniques. IWSEC 2018: 87-103 - [i2]Jintai Ding, Seungki Kim, Tsuyoshi Takagi, Yuntao Wang:
Why 1.02? The root Hermite factor of LLL and stochastic sandpile models. CoRR abs/1804.03285 (2018) - 2017
- [c3]Yuntao Wang, Yoshinori Aono, Tsuyoshi Takagi:
An Experimental Study of Kannan's Embedding Technique for the Search LWE Problem. ICICS 2017: 541-553 - [c2]Saed Alsayigh, Jintai Ding, Tsuyoshi Takagi, Yuntao Wang:
The Beauty and the Beasts - The Hard Cases in LLL Reduction. IWSEC 2017: 19-35 - 2016
- [c1]Yoshinori Aono, Yuntao Wang, Takuya Hayashi, Tsuyoshi Takagi:
Improved Progressive BKZ Algorithms and Their Precise Cost Estimation by Sharp Simulator. EUROCRYPT (1) 2016: 789-819 - [i1]Yoshinori Aono, Yuntao Wang, Takuya Hayashi, Tsuyoshi Takagi:
Improved Progressive BKZ Algorithms and their Precise Cost Estimation by Sharp Simulator. IACR Cryptol. ePrint Arch. 2016: 146 (2016) - 2014
- [j1]Yutaro Kiyomura, Noriyasu Iwamoto, Shun'ichi Yokoyama, Kenichiro Hayasaka, Yuntao Wang, Takanori Yasuda, Katsuyuki Takashima, Tsuyoshi Takagi:
Heuristic counting of Kachisa-Schaefer-Scott curves. JSIAM Lett. 6: 73-76 (2014)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-30 20:34 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint