Yukimasa Sugizaki, Hikaru Tsuchida, Takuya Hayashi, Koji Nuida, Akira Nakashima, Toshiyuki Isshiki, and Kengo Mori,
"Threshold Fully Homomorphic Encryption over the Torus",
28th European Symposium on Research in Computer Security (ESORICS 2023),
Lecture Notes in Computer Science,
Vol.14344, pp.45-65, 2023.
Yuji Koike, Kosei Sakamoto, Takuya Hayashi, and Takanori Isobe,
"Galaxy: A Family of Stream-Cipher-Based Space-Hard Ciphers",
25th Australasian Conference on Information Security and Privacy (ACISP 2020),
Lecture Notes in Computer Science,
Vol.12248, pp.142-159, 2020.
Takehiro Tezuka, Lihua Wang, Takuya Hayashi, and Seiichi Ozawa,
"A Fast Privacy-Preserving Multi-Layer Perceptron Using Ring-LWE Based Homomorphic Encryption",
2nd International Workshop on Cross-disciplinary Data Exchange and Collaboration (CDEC),
Workshop on IEEE International Conference on Data Mining (ICDM 2019),
2019.
Sangwook Kim, Masahiro Omori, Takuya Hayashi, Toshiaki Omori, Lihua Wang, and Seiichi
Ozawa,
"Privacy-Preserving Naive Bayes Classification Using Fully Homomorphic Encryption",
25th International Conference on Neural Information Processing (ICONIP 2018),
Lecture Notes in Computer Science,
Vol.11304, pp.349-358, 2018.
Keita Emura and Takuya Hayashi,
"A Revocable Group Signature Scheme with Scalability from Simple Assumptions and Its Implementation”,
21st Information Security Conference (ISC 2018),
Lecture Notes in Computer Science,
Vol.11060, pp.442-460, 2018.
Shohei Kuri, Takuya Hayashi, Toshiaki Omori, Seiichi Ozawa, Yoshinori Aono,
Le Trieu Phong, Lihua Wang, and Shiho Moriai,
"Privacy Preserving Extreme Learning Machine using Additively Homomorphic Encryption",
2017 IEEE Symposium Series on Computational Intelligence (SSCI 2017),
2017.
Hiromi Arai, Keita Emura, and Takuya Hayashi,
"A Framework of Privacy Preserving Anomaly Detection: Providing Traceability without Big Brother",
16th Workshop on Privacy in the Electronic Society (WPES 2017),
pp.111-122, 2017.
Lihua Wang, Takuya Hayashi, Yoshinori Aono, and Le Trieu Phong,
"A Generic yet Efficient Method for Secure Inner Product",
11th International Conference on Network and System Security (NSS 2017),
Lecture Notes in Computer Science,
Vol.10394, pp.217-232, 2017.
Le Trieu Phong, Yoshinori Aono, Takuya Hayashi, Lihua Wang, and Shiho Moriai,
"Privacy-Preserving Deep Learning: Revisited and Enhanced",
8th International Conference on Applications and Technologies in Information Security (ATIS 2017),
Communications in Computer and Information Science,
Vol.719, pp.100-110, 2017.
Yoshinori Aono, Takuya Hayashi, Le Trieu Phong, and Lihua Wang,
"Efficient Key-Rotatable and Security-Updatable Homomorphic Encryption",
5th International Workshop on Security in Cloud Computing (SCC 2017),
pp.35-42, 2017.
Keita Emura, Takuya Hayashi, Noboru Kunihiro, and Jun Sakuma,
12th ACM Asia Conference on Computer and Communications Security (ASIACCS 2017),
pp.215-229, 2017.
Keita Emura, Takuya Hayashi, and Ai Ishida,
"Group Signatures with Time-bound Keys Revisited: A New Model and an Efficient Construction",
12th ACM Asia Conference on Computer and Communications Security (ASIACCS 2017),
pp.777-788, 2017.
Keita Emura, Takuya Hayashi, and Shiho Moriai,
"Toward Securing Tire Pressure Monitoring Systems: A Case of PRESENT-based implementation",
International Symposium on Information Theory and Its Applications (ISITA 2016),
pp.403-407, 2016.
Yoshinori Aono, Yuntao Wang, Takuya Hayashi, and Tsuyoshi Takagi,
"Improved Progressive BKZ Algorithms and Their Precise Cost Estimation by Sharp Simulator",
35th Annual International Conference on the Theory and Applications of Cryptographic Techniques
(EUROCRYPT 2016),
Lecture Notes in Computer Science,
Vol.9665, pp.789-819, 2016.
Keita Emura and Takuya Hayashi,
"A Light-weight Group Signature Scheme with Time-token Dependent Linking",
4th International Workshop on Lightweight Cryptography for Security & Privacy (LightSec 2015),
Lecture Notes in Computer Science,
Vol.9542, pp.37-57, 2016.
Takuya Hayashi, Takeshi Shimoyama, Naoyuki Shinohara, and Tsuyoshi Takagi,
"Breaking Pairing-Based Cryptosystems using EtaT Pairing over GF(3^97)",
18th Annual International Conference on the Theory and Application of Cryptology and Information
Security (ASIACRYPT 2012),
Lecture Notes in Computer Science,
Vol.7658, pp.46-60, 2012.
Naoyuki Shinohara, Takeshi Shimoyama, Takuya Hayashi, and Tsuyoshi Takagi,
"Key Length Estimation of Pairing-Based Cryptosystems using EtaT Pairing",
8th International Conference on Information Security Practice and Experience (ISPEC 2012),
Lecture Notes in Computer Science,
Vol.7232, pp.228-244, 2012.