Follow
Kazuhiro Yokoyama
Kazuhiro Yokoyama
Verified email at rikkyo.ac.jp
Title
Cited by
Cited by
Year
Localization and primary decomposition of polynomial ideals
T Shimoyama, K Yokoyama
Journal of Symbolic Computation 22 (3), 247-277, 1996
1671996
Secure pattern matching using somewhat homomorphic encryption
M Yasuda, T Shimoyama, J Kogure, K Yokoyama, T Koshiba
Proceedings of the 2013 ACM workshop on Cloud computing security workshop, 65-76, 2013
1422013
Packed homomorphic encryption based on ideal lattices and its application to biometrics
M Yasuda, T Shimoyama, J Kogure, K Yokoyama, T Koshiba
Security Engineering and Intelligence Informatics: CD-ARES 2013 Workshops …, 2013
942013
Distance transitive graphs and finite simple groups
CE Praeger, J Saxl, K Yokoyama
Proceedings of the London Mathematical Society 3 (1), 1-21, 1987
841987
Practical packing method in somewhat homomorphic encryption
M Yasuda, T Shimoyama, J Kogure, K Yokoyama, T Koshiba
Data Privacy Management and Autonomous Spontaneous Security: 8th …, 2014
692014
Solutions of systems of algebraic equations and linear maps on residue class rings
K Yokoyama, M Noro, T Takeshima
Journal of Symbolic Computation 14 (4), 399-417, 1992
661992
A modular method to compute the rational univariate representation of zero-dimensional ideals
M Noro, K Yokoyama
Journal of Symbolic Computation 28 (1-2), 243-263, 1999
611999
The block cipher SC2000
T Shimoyama, H Yanami, K Yokoyama, M Takenaka, K Itoh, J Yajima, ...
Fast Software Encryption: 8th International Workshop, FSE 2001 Yokohama …, 2002
582002
Efficient implementation of Schoof’s algorithm
T Izu, J Kogure, M Noro, K Yokoyama
Advances in Cryptology—ASIACRYPT’98: International Conference on the Theory …, 1998
551998
Computation of the splitting fields and the Galois groups of polynomials
H Anai, M Noro, K Yokoyama
Algorithms in algebraic geometry and applications, 29-50, 1996
481996
New packing method in somewhat homomorphic encryption and its applications
M Yasuda, T Shimoyama, J Kogure, K Yokoyama, T Koshiba
Security and Communication Networks 8 (13), 2194-2213, 2015
462015
A modular method for computing the Galois groups of polynomials
K Yokoyama
Journal of Pure and Applied Algebra 117, 617-636, 1997
411997
Elliptic curve cryptosystem
N Torii, K Yokoyama
Fujitsu Scientific and Technical Journal 36 (2), 140-146, 2000
372000
Extended key preparing apparatus, extended key preparing method, recording medium and computer program
T Shimoyama, K Ito, M Takenaka, N Torii, J Yajima, H Yanami, ...
US Patent 6,956,951, 2005
342005
An effective implementation of a symbolic-numeric cylindrical algebraic decomposition for quantifier elimination
H Iwane, H Yanami, H Anai, K Yokoyama
Proceedings of the 2009 conference on Symbolic numeric computation, 55-64, 2009
332009
Computing primitive elements of extension fields
K Yokoyama, M Noro, T Takeshima
Journal of symbolic computation 8 (6), 553-580, 1989
331989
Privacy-preserving wildcards pattern matching using symmetric somewhat homomorphic encryption
M Yasuda, T Shimoyama, J Kogure, K Yokoyama, T Koshiba
Information Security and Privacy: 19th Australasian Conference, ACISP 2014 …, 2014
322014
QE の計算アルゴリズムとその応用: 数式処理による最適化
穴井, 横山和弘
(No Title), 2011
322011
ℤ3 symmetry and W3 algebra in lattice vertex operator algebras
C Dong, CH Lam, K Tanabe, H Yamada, K Yokoyama
Pacific journal of mathematics 215 (2), 245-296, 2004
322004
An effective implementation of symbolic–numeric cylindrical algebraic decomposition for quantifier elimination
H Iwane, H Yanami, H Anai, K Yokoyama
Theoretical Computer Science 479, 43-69, 2013
302013
The system can't perform the operation now. Try again later.
Articles 1–20