WANG YUNTAO

Department of InformaticsAssociate Professor
Cluster II (Emerging Multi-interdisciplinary Engineering)Associate Professor

Degree

  • Ph.D, Kyushu University, 2018

Research Keyword

  • Cryptography, PKC, PQC, Number Theoretic Algorithm
  • Machine Learning, AI Security

Field Of Study

  • Informatics, Information security, Cryptography

Career

  • Feb. 2025 - Present
    株式会社ニッシン, 特別研究員, Japan
  • Jul. 2024 - Present
    Kyoto University, Graduate School of Informatics, Advisor, Japan
  • Mar. 2024 - Present
    The University of Electro-Communications, Graduate School of Informatics and Engineering, Department of Informatics, Associate Professor, Japan
  • Sep. 2024 - Jan. 2025
    株式会社スニード, 特別研究員, Japan
  • Oct. 2022 - Feb. 2024
    Japan Advanced Institute of Science and Technology, School of Information Science, Adjunct Instructor
  • Mar. 2022 - Feb. 2024
    Osaka University, Graduate School of Engineering, Lecturer
  • Apr. 2020 - Feb. 2022
    Japan Advanced Institute of Science and Technology, School of Information Science, Assistant Professor, Japan
  • Oct. 2019 - Mar. 2020
    The University of Tokyo, The Graduate School of Information Science and Technology, JSPS Research Fellowship for Young Scientists (PD), Japan
  • Oct. 2018 - Sep. 2019
    The University of Tokyo, The Graduate School of Information Science and Technology, Project Researcher, Japan
  • Apr. 2017 - Sep. 2018
    Kyushu University, Graduate School of Mathematics, JSPS Research Fellowship for Young Scientists (DC2), Japan

Educational Background

  • Apr. 2016 - Sep. 2018
    Kyushu University, Graduate School of Mathematics, Department of Mathematics, Ph.D., early graduation, Japan
  • Apr. 2014 - Mar. 2016
    Kyushu University, Graduate School of Mathematics, Department of Mathematics, Master Degree, Japan
  • Sep. 2007 - Jul. 2011
    Yunnan University, Faculty of Mathematics and Information Science, Bachelor Degree, China

Member History

  • Apr. 2025 - Present
    Professional Committee, Computer Security (CSEC) Group, Society
  • Feb. 2025 - Present
    Program Committee, ISC 2025: The 28th Information Security Conference, Society
  • Nov. 2024 - Present
    Local Organizing Committee of IWSEC2025, CSEC研究会, ISEC研究会, Society
  • Sep. 2024 - Present
    Guest Editor, IET Blockchain (Special Issue): Blockchain-Assisted Secure Data Sharing and Access Control, Society
  • Sep. 2024 - Present
    II類セキュリティ情報学プログラム卒研発表会世話人(兼取りまとめ), 電気通信大学, Others
  • Jun. 2024 - Present
    論文誌ジャーナル/JIP「AI社会を安全にするコンピュータセキュリティ技術」 特集号編集委員, 情報処理学会, Society
  • Apr. 2024 - Present
    大学院 情報理工学研究科 情報学専攻 セキュリティ情報学プログラム修論発表会世話人, 電気通信大学, Others
  • Mar. 2025 - Mar. 2026
    Program Committee, ProvSec 2025: The 19th International Conference on Provable and Practical Security, Society
  • Jun. 2024 - Mar. 2025
    Program Committee, KSE 2024: The 16th International Conference on Knowledge and Systems Engineering 2024, Society
  • Jun. 2024 - Mar. 2025
    学力検査部会専門委員, 電気通信大学 学域入学試験委員会, Society
  • May 2024 - Mar. 2025
    Program Committee, ISPEC 2024: The 19th International Conference on Information Security Practice and Experience, Society
  • Apr. 2024 - Mar. 2025
    General Co-chairs, Mini-Symposium of "Code, Cryptography, AI" at Japanese Conference on Combinatorics and its Applications 2024 (JCCA2024), Society
  • Apr. 2024 - Mar. 2025
    Program Committee, IWSEC 2024: The 19th International Workshop on Security, Society
  • Mar. 2024 - Mar. 2025
    Program Committee, QCNC 2024: International Conference on Quantum Communications, Networking, and Computing, Society
  • Jan. 2024 - Mar. 2025
    Program Committee of "Selected Areas in Cryptography 2024 (SAC 2024)", IACR, Society
  • Jan. 2024 - Mar. 2025
    Program Committee, ProvSec 2024: The 18th International Conference on Provable and Practical Security, Society
  • Jun. 2023 - Mar. 2025
    論文誌ジャーナル/JIP「サプライチェーンを安全にするサイバーセキュリティ技術 」 特集号編集委員, 情報処理学会, Society
  • Apr. 2021 - Mar. 2025
    Steering Committee, Computer Security (CSEC) Group, Society
  • Aug. 2024 - Jan. 2025
    Publicity Co-Chairs, MobiSec 2024: The 8th International Conference on Mobile Internet Security, Society
  • Apr. 2023 - Mar. 2024
    Program Committee of "Selected Areas in Cryptography 2023 (SAC 2023)", IACR, Society
  • Jul. 2022 - Mar. 2024
    論文誌ジャーナル/JIP「サイバー空間を安全にするコンピュータセキュリティ技術」特集号編集委員, 情報処理学会, Society
  • Aug. 2023 - Jan. 2024
    Publicity Co-Chairs, MobiSec 2023: The 7th International Conference on Mobile Internet Security, Society
  • Mar. 2023 - Dec. 2023
    Program Committee, ProvSec 2023: The 17th International Conference on Provable and Practical Security, Society
  • Jan. 2023 - Dec. 2023
    Workshops Co-Chairs, ProvSec 2023: The 17th International Conference on Provable and Practical Security, Society
  • Oct. 2022 - Sep. 2023
    国際会議IWSEC2023組織委員, CSEC研究会, ISEC研究会, Society
  • Apr. 2022 - Sep. 2023
    Journal of Surveillance, Security and Safety「Post-Quantum Cryptography and AI Privacy (PQAP)」特集号ゲストエディタ, OAE Publishing Inc., Society
  • Apr. 2023 - Aug. 2023
    Program Committee, AIGC 2023: The 1st International Conference on AI-generated Content, Society
  • Apr. 2023 - Aug. 2023
    Program Committee, KSE 2023: The 15th IEEE International Conference on Knowledge and Systems Engineering, Society
  • Feb. 2023 - Aug. 2023
    Publicity Co-Chairs, SocialSec 2023: The 9th International Symposium on Security and Privacy in Social Networks and Big Data, Society
  • Jan. 2023 - Aug. 2023
    Technical Program Committee, NSS 2023 : The 17th International Conference on Network and System Security, Society
  • Jan. 2023 - Aug. 2023
    Publicity Co-Chairs, NSS 2023 : The 17th International Conference on Network and System Security, Society
  • Apr. 2022 - Mar. 2023
    Program Committee of "Selected Areas in Cryptography 2022 (SAC 2022)", IACR, Society
  • Apr. 2022 - Mar. 2023
    "Special Session: Next Generation of Affective Computing (NGAC) in 14th IEEE International Conference on Knowledge and Systems Engineering (KSE 2022)", IEEE, Society
  • Apr. 2021 - Mar. 2023
    The editorial committee of Journal of Information Processing, Special issue of “Computer Security technologies for Quantum-Safe World”., 情報処理学会, Society
  • Nov. 2022 - Nov. 2022
    一般研究・研究集会(II)「高度化する暗号技術と数学的技法の進展」組織委員, 九州大学 IMI研究所, Society
  • Apr. 2022 - Sep. 2022
    Program Committee, IWSEC 2022: The 17th International Workshop on Security, Society
  • Oct. 2021 - Sep. 2022
    Local Organizing Committee of IWSEC2022, CSEC研究会, ISEC研究会, Society
  • Mar. 2022 - Mar. 2022
    Organizing Committee of "International Workshop on Affective Interaction between Humans and Machines in Multicultural Society (IWAM2022)"
  • Apr. 2021 - Mar. 2022
    第39回 暗号と情報セキュリティシンポジウム(SCIS2022) プログラム実行委員, Society
  • Apr. 2021 - Mar. 2022
    Program Committee of "Selected Areas in Cryptography (SAC) 2021", IACR, Society
  • Oct. 2021 - Feb. 2022
    The editorial committee of lecture note of IMI Workshop of the Joint Usage Research Projects of “Exploring Mathematical and Practical Principles of Secure Computation and Secret Sharing”., 九州大学 IMI研究所, Society
  • Jan. 2022 - Jan. 2022
    Organizing Committee of "The 39th Symposium on Cryptography and Information Security (SCIS 2022)", ISEC研究会, Society
  • Nov. 2021 - Nov. 2021
    共同利用・研究集会「秘密計算・秘密分散の数理と実用の探求」組織委員, 九州大学 IMI研究所, Society
  • Nov. 2021 - Nov. 2021
    共同利用・研究集会「新世代暗号の設計・評価」主催(代表者), 九州大学 IMI研究所, Society
  • Jun. 2021 - Jun. 2021
    Program Co-Chair of "The 8th ACM ASIA Public-Key Cryptography Workshop (APKC 2021)", Society
  • Apr. 2020 - Mar. 2021
    Program Committee of "Selected Areas in Cryptography (SAC) 2020", IACR, Society
  • Sep. 2019 - Sep. 2019
    Organizing Committee of "International Symposium on Mathematics, Quantum Theory, and Cryptography (MQC 2019)"
  • Mar. 2019 - Mar. 2019
    CREST暗号数理ミニワークショップ「若手研究者講演」 世話人, Society
  • Dec. 2018 - Dec. 2018
    CREST暗号数理平成30年度第二回全体会議 「チュートリアルワークショップ」 世話人, Society

Award

  • Mar. 2025
    電気通信大学
    2024年度電気通信大学目黒会賞受賞
    2024年度電気通信大学目黒会賞, 戸田 和孝
  • Dec. 2024
    The 8th International Conference on Mobile Internet Security(MobiSec2024)
    Certificate of Appreciation, Yuntao Wang
  • Aug. 2024
    The 19th Asia Joint Conference on Information Security (AsiaJCIS 2024)
    Backdoored-input Detection by Trigger Embedding
    Best Paper Award, Akira Fujimoto;Shintaro Yamashita;Yuntao Wang;Atsuko Miyaji
  • Nov. 2021
    The 24th Annual International Conference on Information Security and Cryptology (ICISC 2021)
    Improved Lattice Enumeration Algorithms by Primal and Dual Reordering Methods
    Best Paper Award, Kazuki Yamamura;Yuntao Wang;Eiichiro Fujisaki
  • Jul. 2021
    JSSM
    One Sample Ring-LWE with Rounding and Its Application to Key Exchange
    Tsujii Shigeo Security Paper Award (Special Award), Yuntao Wang;Jintai Ding;Xinwei Gao;Tsuyoshi Takagi
  • Jun. 2020
    JSSM
    Estimated Cost for Solving Generalized Learning with Errors Problem via Embedding Techniques
    Tsujii Shigeo Security Paper Award (Special Award), Yuntao Wang;Weiyao Wang;Atsushi Takayasu;Tsuyoshi Takagi
  • Sep. 2018
    Kyushu University
    Academic Research Award to Outstanding PhD Graduate, Yuntao Wang
  • Sep. 2018
    International Workshop on Security 2018 (IWSEC 2018)
    Estimated Cost for Solving Generalized Learning with Errors Problem via Embedding Techniques
    Best Student Paper Award, Weiyao Wang;Yuntao Wang;Atsushi Takayasu;Tsuyoshi Takagi
  • Nov. 2016
    Forum “Math-for-Industry” 2016 (FMfI 2016)
    Breaking Lattice Challenge by Progressive BKZ Algorithm
    Best Poster Award, Yuntao Wang
  • Jan. 2015
    The 8th Workshop among Asia Information Security Labs (WAIS 2015)
    Biggest Applause Award, Yuntao Wang
  • Oct. 2014
    Forum “Math-for-Industry” 2014 (FMfI 2014)
    An Improved Reordering-BKC Algorithm for High-Dimensional Lattices
    Excellent Poster Award, Yuntao Wang;Po-Chun Kuo;Chen-Mou Cheng;Tsuyoshi Takagi
  • Nov. 2013
    International Workshop on Security 2013 (IWSEC 2013)
    Best Poster Award, Yuntao Wang;Hui Zhang;Tsuyoshi Takagi

Paper

  • A Reversible-Zero Watermarking Scheme for Medical Volume Data via Difference Expansion
    Jiangnan Zhu; Yuntao Wang; Yujie Gu
    2025 IEEE Conference on Artificial Intelligence (CAI 2025), May 2025, Peer-reviwed
    International conference proceedings
  • Anti-Collusion and Latency-Tolerant Privacy-Preserving Federated Learning Framework via Multi-Key Homomorphic Aggregation
    Yuntao Wang; Yujie Gu; Xun Shen
    Lead, 2025 IEEE Conference on Artificial Intelligence (CAI 2025), May 2025, Peer-reviwed
    International conference proceedings
  • Quantum-resistant ring signature-based authentication scheme against secret key exposure for VANETs
    Xiaoling Yu; Yuntao Wang; Xin Huang
    Corresponding, Computer Networks, May 2025, Peer-reviwed
    Scientific journal
  • A Study on Parallel Tuple Sieve Algorithm
    Yuntao Wang; Keiichi Imai; Eiichiro Fujisaki
    Lead, The 8th International Conference on Mobile Internet Security (Mobisec 2024), Dec. 2024, Peer-reviwed
    International conference proceedings, English
  • Controlled Multi-client Functional Encryption for Flexible Access Control
    Mingwu Zhang; Yulu Zhong; Yifei Wang; Yuntao Wang
    Last, Lecture Notes in Computer Science, Springer Nature Singapore, 329-346, 25 Oct. 2024, Peer-reviwed
    International conference proceedings
  • Backdoored-input Detection by Trigger Embedding
    Akira Fujimoto; Shintaro Yamashita; Yuntao Wang; Atsuko Miyaji
    Corresponding, 2024 19th Asia Joint Conference on Information Security (AsiaJCIS), IEEE, 121-128, 13 Aug. 2024, Peer-reviwed
    International conference proceedings
  • Lattice-Based Commitment Scheme for Low Communication Costs
    Hideaki Miyaji; Yuntao Wang; Atsuko Miyaji
    IEEE Access, Institute of Electrical and Electronics Engineers (IEEE), 12, 111400-111410, 2024, Peer-reviwed
    Scientific journal
  • Forward Secure Lattice-based Ring Signature Scheme in the Standard Model
    Xiaoling Yu; Yuntao Wang
    Last, The 25th International Conference on Information and Communications Security (ICICS 2023), 14252, 146-158, Nov. 2023, Peer-reviwed
  • Privacy-enhanced Anonymous and Deniable Post-Quantum X3DH
    Kaiming Chen; Atsuko Miyaji; Yuntao Wang
    Last, The 5th International Conference on Science of Cyber Security (SciSec 2023), 14299, 157-177, Oct. 2023, Peer-reviwed
  • A Trade-off SVP-solving Strategy based on a Sharper pnj-BKZ Simulator
    Leizhang Wang; Yuntao Wang; Baocang Wang
    Corresponding, Proceedings of the ACM Asia Conference on Computer and Communications Security, ACM, 664-677, 10 Jul. 2023, Peer-reviwed
    International conference proceedings
  • A verifiable and privacy-preserving cloud mining pool selection scheme in blockchain of things
    Mingwu Zhang; Mingxuan Yang; Gang Shen; Zhe Xia; Yuntao Wang
    Last, Information Sciences, Elsevier BV, 623, 293-310, Apr. 2023, Peer-reviwed
    Scientific journal
  • A physical study of the LLL algorithm
    Jintai Ding; Seungki Kim; Tsuyoshi Takagi; Yuntao Wang; Bo-yin Yang
    Journal of Number Theory, Elsevier BV, 244, 339-368, Mar. 2023, Peer-reviwed
    Scientific journal
  • PPNNP: A privacy-preserving neural network prediction with separated data providers using multi-client inner-product encryption
    Mingwu Zhang; Shuo Huang; Gang Shen; Yuntao Wang
    Last, Computer Standards & Interfaces, Elsevier BV, 103678-103678, Mar. 2023, Peer-reviwed
    Scientific journal
  • Improved lattice enumeration algorithms by primal and dual reordering methods
    Kazuki Yamamura; Yuntao Wang; Eiichiro Fujisaki
    IET Information Security, Institution of Engineering and Technology (IET), 17, 1, 35-45, Jan. 2023, Peer-reviwed, Invited
    Scientific journal
  • A Privacy-Preserving Distributed Medical Data Integration Security System for Accuracy Assessment of Cancer Screening: Development Study of Novel Data Integration System
    Atsuko Miyaji; Kaname Watanabe; Yuuki Takano; Kazuhisa Nakasho; Sho Nakamura; Yuntao Wang; Hiroto Narimatsu
    JMIR Medical Informatics, JMIR Publications Inc., 10, 12, e38922-e38922, 30 Dec. 2022, Peer-reviwed, Background

    Big data useful for epidemiological research can be obtained by integrating data corresponding to individuals between databases managed by different institutions. Privacy information must be protected while performing efficient, high-level data matching.

    Objective

    Privacy-preserving distributed data integration (PDDI) enables data matching between multiple databases without moving privacy information; however, its actual implementation requires matching security, accuracy, and performance. Moreover, identifying the optimal data item in the absence of a unique matching key is necessary. We aimed to conduct a basic matching experiment using a model to assess the accuracy of cancer screening.

    Methods

    To experiment with actual data, we created a data set mimicking the cancer screening and registration data in Japan and conducted a matching experiment using a PDDI system between geographically distant institutions. Errors similar to those found empirically in data sets recorded in Japanese were artificially introduced into the data set. The matching-key error rate of the data common to both data sets was set sufficiently higher than expected in the actual database: 85.0% and 59.0% for the data simulating colorectal and breast cancers, respectively. Various combinations of name, gender, date of birth, and address were used for the matching key. To evaluate the matching accuracy, the matching sensitivity and specificity were calculated based on the number of cancer-screening data points, and the effect of matching accuracy on the sensitivity and specificity of cancer screening was estimated based on the obtained values. To evaluate the performance, we measured central processing unit use, memory use, and network traffic.

    Results

    For combinations with a specificity ≥99% and high sensitivity, the date of birth and first name were used in the data simulating colorectal cancer, and the matching sensitivity and specificity were 55.00% and 99.85%, respectively. In the data simulating breast cancer, the date of birth and family name were used, and the matching sensitivity and specificity were 88.71% and 99.98%, respectively. Assuming the sensitivity and specificity of cancer screening at 90%, the apparent values decreased to 74.90% and 89.93%, respectively. A trial calculation was performed using a combination with the same data set and 100% specificity. When the matching sensitivity was 82.26%, the apparent screening sensitivity was maintained at 90%, and the screening specificity decreased to 89.89%. For 214 data points, the execution time was 82 minutes and 26 seconds without parallelization and 11 minutes and 38 seconds with parallelization; 19.33% of the calculation time was for the data-holding institutions. Memory use was 3.4 GB for the PDDI server and 2.7 GB for the data-holding institutions.

    Conclusions

    We demonstrated the rudimentary feasibility of introducing a PDDI system for cancer-screening accuracy assessment. We plan to conduct matching experiments based on actual data and compare them with the existing methods.
    Scientific journal
  • Lattice-Based Public Key Cryptosystems Invoking Linear Mapping Mask
    Yuntao Wang; Yasuhiko Ikematsu; Takanori Yasuda
    Lead, The 16th International Conference on Provable and Practical Security (ProvSec 2022), Springer Nature Switzerland, 13600, 88-104, Nov. 2022, Peer-reviwed
    In book
  • Improved Lattice Enumeration Algorithms by Primal and Dual Reordering Methods
    Kazuki Yamamura; Yuntao Wang; Eiichiro Fujisaki
    Corresponding, Information Security and Cryptology – ICISC 2021, Springer International Publishing, 159-174, Jul. 2022, Peer-reviwed
    In book
  • TPM-Based Conditional Privacy-Preserving Authentication Protocol in VANETs
    Mingwu Zhang; Boyao Zhu; Yumei Li; Yuntao Wang
    Last, Symmetry, MDPI AG, 14, 6, 1123-1123, 30 May 2022, Peer-reviwed, With the establishment of intelligent transportation systems (ITS), research on vehicle ad-hoc networks (VANETs) has played an irreplaceable role in improving traffic safety and efficiency. However, because the deployment of devices based on the IoV is in an open field, the IoV is extremely vulnerable to various attacks without security protection, e.g., remote intrusion, control, trajectory tracking, etc. In order to avoid the above-mentioned attacks and resource abuses, provably secure cryptography primitives are generally considered to guarantee and realize the security of VANETs. This paper proposes a TPM-based conditional privacy-preserving authentication protocol (T-CPPA) which achieves both the integrity and the authenticity of the message/instruct content. The vehicle’s privacy is protected by embedding the system master private key into the trust platform module (TPM) which is responsible for generating pseudonyms and signature keys. The authenticity of message content is ensured by calculating message similarity in a cluster-based model. We give the concrete construction of our T-CPPA authentication scheme in symmetric bilinear groups and design a batch validation algorithm to improve efficiency. Security analysis shows that our scheme can resist various traditional attacks in VANETs, and the experimental results indicate that our scheme is efficient and useful in practice.
    Scientific journal
  • Revisiting the Orthogonal Lattice Algorithm in Solving General Approximate Common Divisor Problem
    Xiaoling YU; Yuntao WANG; Chungen XU; Tsuyoshi TAKAGI
    Corresponding, IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, Institute of Electronics, Information and Communications Engineers (IEICE), E105.A, 3, 195-202, 01 Mar. 2022, Peer-reviwed
    Scientific journal
  • A Commitment Scheme with Output Locality-3 Fit for the IoT Device
    Hideaki Miyaji; Yuntao Wang; Akinori Kawachi; Atsuko Miyaji
    Security and Communication Networks, Hindawi Limited, 2021, 1-10, 29 Nov. 2021, Peer-reviwed, Low output locality is a property of functions, in which every output bit depends on a small number of input bits. In IoT devices with only a fragile CPU, it is important for many IoT devices to cooperate to execute a single function. In such IoT’s collaborative work, a feature of low output locality is very useful. This is why it is desirable to reconstruct cryptographic primitives with low output locality. However, until now, commitment with a constant low output locality has been constructed by using strong randomness extractors from a nonconstant-output-locality collision-resistant hash function. In this paper, we construct a commitment scheme with output locality-3 from a constant-output-locality collision-resistant hash function for the first time. We prove the computational hiding property of our commitment by the decisional



    M
    ,
    δ



    -bSVP assumption and prove the computational binding property by the



    M
    ,
    δ



    -bSVP assumption, respectively. Furthermore, we prove that the



    M
    ,
    δ



    -bSVP assumption can be reduced to the decisional



    M
    ,
    δ



    -bSVP assumption. We also give a parameter suggestion for our commitment scheme with the 128 bit security.
    Scientific journal, English
  • Recovery Attack on Bob’s Reused Randomness in CRYSTALS-KYBER and SABER
    Satoshi Okada; Yuntao Wang
    Corresponding, Provable and Practical Security, Springer International Publishing, 13059, 155-173, Nov. 2021, Peer-reviwed
    International conference proceedings
  • Studying lattice reduction algorithms improved by quick reordering technique
    Yuntao Wang; Tsuyoshi Takagi
    Lead, International Journal of Information Security, Springer Science and Business Media LLC, 20, 2, 257-268, Apr. 2021, Peer-reviwed
    Scientific journal
  • Message-Restriction-Free Commitment Scheme Based on Lattice Assumption
    Hideaki Miyaji; Yuntao Wang; Atsuko Miyaji
    Information Security Practice and Experience, Springer International Publishing, 13107, 90-105, 2021, Peer-reviwed
    In book
  • Homomorphic commitment scheme with constant output locality
    Hideaki Miyaji; Atsuko Miyaji; Yuntao Wang
    Last, 2020 Eighth International Symposium on Computing and Networking (CANDAR), IEEE, 167-173, Nov. 2020, Peer-reviwed
    International conference proceedings
  • Cryptanalysis of GiophantusTM Schemes against Hybrid Attack
    Yuntao Wang; Yasuhiko Ikematsu; Koichiro Akiyama; Tsuyoshi Takagi
    Lead, Proceedings of the 7th ACM Workshop on ASIA Public-Key Cryptography, ACM, 28-35, 05 Oct. 2020, Peer-reviwed
    International conference proceedings
  • Multi-user search on the encrypted multimedia database: lattice-based searchable encryption scheme with time-controlled proxy re-encryption
    Xiaoling Yu; Chungen Xu; Bennian Dou; Yuntao Wang
    Last, Multimedia Tools and Applications, Springer Science and Business Media LLC, 80, 2, 3193-3211, 19 Sep. 2020, Peer-reviwed
    Scientific journal
  • Improving Key Mismatch Attack on NewHope with Fewer Queries
    Satoshi Okada; Yuntao Wang; Tsuyoshi Takagi
    ACISP 2020: Information Security and Privacy, Springer International Publishing, 12248, 505-524, 06 Aug. 2020, Peer-reviwed
    International conference proceedings
  • Lattice-based searchable encryption scheme against inside keywords guessing attack
    Yu, X.; Xu, C.; Xu, L.; Wang, Y.
    Last, Computers, Materials and Continua, 64, 2, 1107-1125, Jun. 2020, Peer-reviwed
    Scientific journal, English
  • A Stochastic Variant of the Abelian Sandpile Model
    Seungki Kim; Yuntao Wang
    Last, Journal of Statistical Physics, Springer Science and Business Media LLC, 178, 3, 711-724, 02 Dec. 2019, Peer-reviwed
    Scientific journal
  • LLL and stochastic sandpile models.
    Jintai Ding; Seungki Kim; Tsuyoshi Takagi; Yuntao Wang 0002
    Last, IACR Cryptol. ePrint Arch., 2019, 1009-1009, 2019
    Scientific journal
  • One Sample Ring-LWE with Rounding and Its Application to Key Exchange.
    Jintai Ding; Xinwei Gao; Tsuyoshi Takagi; Yuntao Wang 0002
    Last, ACNS’19, Springer, 11464, 323-343, 2019, Peer-reviwed
    International conference proceedings
  • Revisiting the Sparsification Technique in Kannan’s Embedding Attack on LWE
    Yuntao Wang; Thomas Wunderer
    Lead, Information Security Practice and Experience, Springer International Publishing, 11125 LNCS, 440-452, 06 Sep. 2018, Peer-reviwed
    In book
  • Studying the Bounds on Required Samples Numbers for Solving the General Approximate Common Divisors Problem
    Xiaoling Yu; Yuntao Wang; Chungen Xu; Tsuyoshi Takagi
    Corresponding, 2018 5th International Conference on Information Science and Control Engineering (ICISCE) (ICISCE), IEEE, 533-537, Jul. 2018, Peer-reviwed
    International conference proceedings
  • Improving the BKZ Reduction Algorithm by Quick Reordering Technique
    Yuntao Wang; Tsuyoshi Takagi
    Lead, ACISP2018, Springer International Publishing, 787-795, 13 Jun. 2018, Peer-reviwed
    International conference proceedings
  • An Experimental Study of Kannan’s Embedding Technique for the Search LWE Problem
    Yuntao Wang; Yoshinori Aono; Tsuyoshi Takagi
    Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), Springer International Publishing, 10631 LNCS, 541-553, 2018, Peer-reviwed
    Scientific journal
  • Why 1.02? The root Hermite factor of LLL and stochastic sandpile models.
    Jintai Ding; Seungki Kim; Tsuyoshi Takagi; Yuntao Wang 0002
    Last, CoRR, abs/1804.03285, 2018
  • Estimated Cost for Solving Generalized Learning with Errors Problem via Embedding Techniques.
    Weiyao Wang; Yuntao Wang 0002; Atsushi Takayasu; Tsuyoshi Takagi
    IWSEC2018, Springer, 11049, 87-103, 2018, Peer-reviwed
    International conference proceedings
  • Hardness Evaluation for Search LWE Problem Using Progressive BKZ Simulator.
    Yuntao Wang; Yoshinori Aono; Tsuyoshi Takagi
    Lead, IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 101-A, 12, 2162-2170, 2018, Peer-reviwed
    Scientific journal
  • The beauty and the beasts—The hard cases in LLL reduction
    Alsayigh, S.; Ding, J.; Takagi, T.; Wang, Y.
    Last, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 10418 LNCS, 19-35, 2017, Peer-reviwed
    Scientific journal
  • Improved Progressive BKZ Algorithms and Their Precise Cost Estimation by Sharp Simulator.
    Yoshinori Aono; Yuntao Wang 0002; Takuya Hayashi 0001; Tsuyoshi Takagi
    Advances in Cryptology - EUROCRYPT 2016 - 35th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Springer, 789-819, 2016, Peer-reviwed
    International conference proceedings
  • Heuristic counting of Kachisa-Schaefer-Scott curves
    Yutaro Kiyomura; Noriyasu Iwamoto; Shun'ichi Yokoyama; Kenichiro Hayasaka; Yuntao Wang; Takanori Yasuda; Katsuyuki Takashima; Tsuyoshi Takagi
    JSIAM Letters, The Japan Society for Industrial and Applied Mathematics, 6, 73-76, 2014, Peer-reviwed, Estimating the number of pairing-friendly elliptic curves is important for obtaining such a curve with a suitable security level and high efficiency. For 128-bit security level, M. Naehrig and J. Boxall estimated the number of Barreto-Naehrig (BN) curves. For future use, we extend their results to higher security levels, that is, to count Kachisa-Schaefer-Scott (KSS) curves with 192- and 224-bit security levels. Our efficient counting is based on a number-theoretic conjecture, called the Bateman-Horn conjecture. We verify the validity of using the conjecture and confirm that an enough amount of KSS curves can be obtained for practical use.
    Scientific journal, English

MISC

  • 素数円分多項式環上のイデアル格子におけるSVPソルバーの提案
    戸田 和孝; 王 イントウ
    18 Mar. 2025, 第108回CSEC発表会, Japanese
  • Revisiting the Meet-LWE Attack
    Yuntao Wang; Eunmin Lee; Joohee Lee
    23 Oct. 2024, Computer Security Symposium 2024 (CSS 2024), Japanese
  • 機械学習へのバックドア攻撃に対する防御手法の改良
    Akira Fujimoto; Yuntao Wang; Atsuko Miyaji
    Mar. 2024, Information and Communication System Security 2024 (ICSS 2024)
  • 格子ベース署名3方式の性能比較 ~ Squirrels, Raccoon 128, HAWK 512 の性能比較 ~
    Ryoto Morizono; Yuntao Wang; Atsuko Miyaji
    Mar. 2024, IEICE, ISEC2024-03
  • 格子基底ベクトルの並び替えによるBKZの考察
    Katsuya Nakashima; Yuntao Wang; Atsuko Miyaji
    Mar. 2024, IEICE, ISEC2024-03
  • イデアルの性質を用いたTriple Sieveアルゴリズムの計算量について
    Seishiro Terada; Yuntao Wang; Atsuko Miyaji
    Mar. 2024, IEICE, ISEC2024-03
  • 署名技術を用いた機械学習におけるバックドア攻撃の検知
    Shintaro Yamashita; Yuntao Wang; Atsuko Miyaji
    Mar. 2024, IEICE, ISEC2024-03
  • 格子基底ベクトルの並び替えによる ENUM のコスト削減
    Katsuya Nakashima; Yuntao Wang; Atsuko Miyaji
    Mar. 2024, 電子情報通信学会2024年総合大会
  • Toward Practical Application of Cancer Screening Study Using a Privacy-Preserving Distributed Data Integration System
    Atsuko Miyaji; Yuntao Wang; Kazuhisa Nakasho; KanameWatanabe; Hiroto Narimatsu
    Nov. 2023, 第43回医療情報学連合大会(第24回日本医療情報学会学術大会),公募シンポジウム 医療情報の安全な二次利用とセキュリティ基盤技術, Japanese
  • イデアル格子におけるTriple Sieveアルゴリズムの改良
    Seishiro Terada; Yuntao Wang; Atsuko Miyaji
    Nov. 2023, ISEC2023-65
  • グラムシュミットベクトルの順序変更によるProgressive BKZの考察
    Katsuya Nakashima; Yuntao Wang; Atsuko Miyaji
    Nov. 2023, ISEC2023-65
  • 準同型暗号を用いたプライバシー保護連合学習
    Kenta Okada; Yuntao Wang; Atsuko Miyaji
    Mar. 2023, 第100回CSEC発表会
  • pqeベース暗号方式における安全性の証明
    Katsuhiro Sato; Yuntao Wang; Atsuko Miyaji
    Mar. 2023, 第100回CSEC発表会
  • Digital Watermarks in Text-to-Image Generation Models
    Paul Kunal; Yuntao Wang; Atsuko Miyaji
    Mar. 2023, 第100回CSEC発表会
  • Proposing a Trade-off SVP-solving Strategy by Improving pnj-BKZ Simulator
    Leizhang Wang; Yuntao Wang; Baocang Wang
    Jan. 2023, The 40th Symposium on Cryptography and Information Security (SCIS2023)
  • A Lattice-based Ring Signature Scheme Secure against Key Exposure
    Yuntao Wang; Xiaoling Yu
    Jan. 2023, The 40th Symposium on Cryptography and Information Security (SCIS2023)
  • A Proposal of Embedding Signature Technique on Detecting Backdoor Attacks against DNN Models
    Shintaro Yamashita; Yuntao Wang; Atsuko Miyaji
    Nov. 2022, 人工知能学会合同研究会2022,第3回 安全性とセキュリティ研究会
  • Privacy-preserving Distributed Medical Data Integration Security System
    Atsuko Miyaji; Yuntao Wang; Kazuhisa Nakasho; KanameWatanabe; Hiroto Narimatsu
    Nov. 2022, 第42回医療情報学連合大会(第23回日本医療情報学会学術大会),公募シンポジウム 医療情報の安全な二次利用とセキュリティ基盤技術
  • メッセージ長を拡張する耐量子コミットメント方式
    Hideaki Miyaji; Yuntao Wang; Atsuko Miyaji
    Jan. 2022, The 39th Symposium on Cryptography and Information Security (SCIS2022)
  • Tuple Sieve Algorithmの並列化の提案
    Keiichi Imai; Yuntao Wang; Eiichiro Fujisaki
    Jan. 2022, The 39th Symposium on Cryptography and Information Security (SCIS2022)
  • A Practical Lattice-based Threshold Signature
    Yi Xu; Yuntao Wang; Eiichiro Fujisaki
    Jan. 2022, The 39th Symposium on Cryptography and Information Security (SCIS2022)
  • One Sample Ring-LWE with Rounding and Its Application to Key Exchange
    Yuntao Wang; Jintai Ding; Xinwei Gao; Tsuyoshi Takagi
    Lead, Nov. 2021, JSSM, 35, 2, 44-46, Peer-reviwed, Introduction scientific journal
  • メッセージ長を拡張する耐量子コミットメント方式
    Hideaki Miyaji; Yuntao Wang; Atsuko Miyaji
    Jun. 2021, Information and Communication System Security 2021 (ICSS 2021)
  • TLS への Bleichenbacher’s CAT 攻撃の考察および実装
    Shuto Yamanami; Yuntao Wang; Eiichiro Fujisaki
    Mar. 2021, 第92回CSEC発表会
  • General Sieve Kernelの考察および改良
    Sho Hasegawa; Yuntao Wang; Eiichiro Fujisaki
    Mar. 2021, 第92回CSEC発表会
  • 格子暗号CRYSTALS-KYBERとSABERに対する鍵再利用攻撃の提案
    Satoshi Okada; Yuntao Wang
    Jan. 2021, The 38th Symposium on Cryptography and Information Security (SCIS2021)
  • 格子基底の順序変更によるENUMの計算量削減の考察
    Kazuki Yamamura; Yuntao Wang; Eiichiro Fujisaki
    Jan. 2021, The 38th Symposium on Cryptography and Information Security (SCIS2021)
  • Public Key Cryptosystems Combining Lattice and Multivariate Polynomial
    Yuntao Wang; Yasuhiko Ikematsu; Takanori Yasuda
    Jan. 2021, The 38th Symposium on Cryptography and Information Security (SCIS2021)
  • Study Signature Embedding Method against Backdoor Attack on DNN Model
    Wenbo Liu; Rui Wen; Yuntao Wang
    Jan. 2021, The 38th Symposium on Cryptography and Information Security (SCIS2021)
  • Estimated Cost for Solving Generalized Learning with Errors Problem via Embedding Techniques
    Weiyao Wang; Yuntao Wang; Atsushi Takayasu; Tsuyoshi Takagi
    Aug. 2020, JSSM, 34, 1, 43-44, Peer-reviwed, Introduction scientific journal
  • 一方向性を仮定した不定方程式暗号のバリエーションに関する考察
    Koichiro Akiyama; Yuntao Wang; Yasuhiko Ikematsu; Tsuyoshi Takagi
    Jan. 2020, The 37th Symposium on Cryptography and Information Security (SCIS2020)
  • 格子暗号NewHopeに対する鍵不一致攻撃の改良
    Satoshi Okada; Yuntao Wang; Tsuyoshi Takagi
    Jan. 2020, The 37th Symposium on Cryptography and Information Security (SCIS2020)
  • 少ないサンプル数のLWE問題に対するKannanの埋め込み法の挙動評価
    Akito Inoue; Yuntao Wang; Atsushi Takayasu; Tsuyoshi Takagi
    Jan. 2019, The 36th Symposium on Cryptography and Information Security (SCIS2019)
  • 不定方程式暗号のバリエーションに対する鍵復元攻撃に関する考察
    Koichiro Akiyama; Yasuhiko Ikematsu; Yuntao Wang; Tsuyoshi Takagi
    Jan. 2019, The 36th Symposium on Cryptography and Information Security (SCIS2019)
  • Experimental Analysis for Linear Algebraic Attack on a Variant of Indeterminate Equation Public-Key Cryptosystems
    Yasuhiko Ikematsu; Yuntao Wang; Koichiro Akiyama; Tsuyoshi Takagi
    Jan. 2019, The 36th Symposium on Cryptography and Information Security (SCIS2019)
  • Study the Quantitative Bound of Required Samples in Attacking GACD-based FHE Schemes
    Yuntao Wang
    Oct. 2018, The International Symposium on Information Theory and Its Applications (ISITA)
  • A New Embedding Method for Generalized LWE
    Weiyao Wang; Yuntao Wang; Atsushi Takayasu; Tsuyoshi Takagi
    Jul. 2018, 第82回CSEC発表会
  • Security Evaluation of Lattice-based Cryptography based on Progressive BKZ
    Yuntao Wang; Yoshinori Aono; Takuya Hayashi; Tsuyoshi Takagi
    Jan. 2018, JST CREST・さきがけ 数学関係領域合同シンポジウム
  • Security Evaluation for Ding Key Exchange
    Yuntao Wang; Xinwei Gao; Jintai Ding; Tsuyoshi Takagi
    Jan. 2018, The 35th Symposium on Cryptography and Information Security (SCIS2018)
  • Ding Key Exchange -- A Proposal to NIST PQC Competition
    Jintai Ding; Tsuyoshi Takagi; Xinwei Gao; Yuntao Wang
    Jan. 2018, The 35th Symposium on Cryptography and Information Security (SCIS2018)
  • Ding Key Exchange
    Jintai Ding; Tsuyoshi Takagi; Xinwei Gao; Yuntao Wang
    Last, Dec. 2017, a proposal to NIST PQC standardization project 1st round
  • Using Embedding Technique on Solving Darmstadt LWE Challenges
    Yuntao Wang
    Jan. 2017, The 9th Workshop among Asia Information Security Labs (WAIS2017)
  • Experimental Analysis of LWE Problem
    Yuntao Wang; Yoshinori Aono; Tsuyoshi Takagi
    Jan. 2017, The 34th Symposium on Cryptography and Information Security (SCIS2017)
  • Breaking Lattice Challenges by Progressive BKZ algorithm
    Yuntao Wang; Yoshinori Aono; Tsuyoshi Takagi
    Nov. 2016, Forum "Math-for-Industry" 2016 (FMfI 2016)
  • A New Progressive BKZ Algorithm
    Yuntao Wang; Yoshinori Aono; Takuya Hayashi; Tsuyoshi Takagi
    Jan. 2015, The 8th Workshop among Asia Information Security Labs (WAIS2015)
  • A New Progressive BKZ Algorithm
    Yuntao Wang; Yoshinori Aono; Takuya Hayashi; Tsuyoshi Takagi
    Jan. 2015, The 32th Symposium on Cryptography and Information Security (SCIS2015)
  • An Improved Reordering-BKZ Algorithm for High-dimensional Lattices
    Yuntao Wang; Po-Chun Kuo; Chen-Mou Cheng; Tsuyoshi Takagi
    Oct. 2014, Forum "Math-for-Industry" 2014 (FMfI 2014)
  • An Improved Reordering-BKZ Algorithm for High-dimensional Lattices
    Yuntao Wang; Po-Chun Kuo; Chen-Mou Cheng; Tsuyoshi Takagi
    Oct. 2014, Computer Security Symposium 2014 (CSS2014)
  • An Improved Reordering-BKZ Algorithm for High-dimensional Lattices
    Yuntao Wang; Po-Chun Kuo; Chen-Mou Cheng; Tsuyoshi Takagi
    Aug. 2014, International Workshop on Security 2014 (IWSEC2014)
  • Improving BKZ Algorithm with Reordering Technique
    Yuntao Wang; Hui Zhang; Tsuyoshi Takagi
    Jan. 2014, The 31th Symposium on Cryptography and Information Security (SCIS2014)
  • Improving BKZ Algorithm with Reordering Technique
    Yuntao Wang; Hui Zhang; Tsuyoshi Takagi
    Oct. 2013, International Workshop on Security 2013 (IWSEC2013)

Books and other publications

  • Proceedings of the 8th ACM on ASIA Public-Key Cryptography Workshop (APKC 2021)
    Keita Emura; Yuntao Wang
    ACM, Jun. 2021, 9781450384018

Lectures, oral presentations, etc.

  • An Introduction to Meet-LWE Attacks
    Yuntao Wang
    Public discourse, Lattice Summer School at Shanghai Jiao Tong University, Invited
    24 Jul. 2024
    23 Jul. 2024- 26 Jul. 2024
  • 格子解読アルゴリズムの数理構造および解読記録について
    Yuntao Wang
    Public discourse, 第6回情報数理セミナー, Invited
    Jan. 2024
  • Recent Trends in Post-Quantum Cryptography
    Yuntao Wang
    Keynote oral presentation, The Third International Conference on Emerging Information Security and Application (EISA 2022), Invited
    Oct. 2022
    29 Oct. 2022- 30 Oct. 2022
  • Recent Progress in Post-Quantum Cryptography
    Yuntao Wang
    Invited oral presentation, Hubei University of Technology Intelligent Science and Technology Innovation Demonstration Base – Academic Report, Invited
    Sep. 2022
  • Recent Progress in Post-Quantum Cryptography
    Yuntao Wang
    Oral presentation, JCCA離散数学とその応用研究集会2021ミニシンポジウム 符号・暗号・人工知能, Invited
    Aug. 2021
  • 格子暗号における数学的困難問題の解読
    Yuntao Wang
    Oral presentation, 第4回金沢暗号理論勉強会
    Jun. 2021
  • Lattice Algorithms and Cryptography
    Yuntao Wang
    Public discourse, ANTS 2020 summer school on algorithmic number theory, Invited
    Jun. 2020
  • Cryptanalysis of Giophantus(TM) Schemes against Hybrid Attack
    Yuntao Wang; Yasuhiko Ikematsu; Koichiro Akiyama; Tsuyoshi Takagi
    Oral presentation, The 37th Symposium on Cryptography and Information Security (SCIS2020)
    Jan. 2020
  • An introduction to a lattice-based key exchange protocol and its cryptanalysis
    Yuntao Wang
    Oral presentation, IMI Crypto Seminar, Invited
    Jul. 2019
  • Lattice reduction algorithms, Key exchange protocol, and their implementations.
    Yuntao Wang
    Public discourse, invited lectures in Ewha Womans University, Invited
    Jul. 2019
  • Introduction to Post-Quantum Cryptography
    Yuntao Wang
    Poster presentation, JSPS HOPE MEETINGS with Nobel Laureates
    Mar. 2019
  • Recent Progress in Lattice-based Cryptography
    Yuntao Wang
    Oral presentation, The 11th Workshop among Asian Information Security Labs (WAIS2019)
    Feb. 2019
  • Recent Progress in Lattice-based Cryptography
    Yuntao Wang
    Invited oral presentation, NICT Advanced ICT Research Institute "Seminar on long-term security systems based on secret sharing and post-quantum cryptography", Invited
    Nov. 2018
  • Sandpileモデルを用いるLLLアルゴリズムの評価
    Yuntao Wang
    Oral presentation, CREST暗号数理「未解決問題ワークショップ」
    Sep. 2018
  • Symmetric Structures Derive Hard Cases in Lattice Reduction World
    Yuntao Wang
    Poster presentation, Forum "Math-for-Industry" 2017 (FMfI 2017)
    Oct. 2017
  • The Beauty and the Beasts --The Hard Cases in LLL Reduction
    Jintai Ding; Saed Alsayigh; Yuntao Wang; Tsuyoshi Takagi
    Oral presentation, The 33th Symposium on Cryptography and Information Security (SCIS2016)
    Jan. 2016

Courses

  • Special Lecture on Informatics and Engineering A
    Sep. 2024 - Present
    The University of Electro-Communications
  • Algorithms and Data Structures and Programming Exercises
    Apr. 2024 - Present
    The University of Electro-Communications
  • Innovative Comprehensive Communications Design 1
    Apr. 2024 - Present
    The University of Electro-Communications
  • 情報理論
    Oct. 2023 - Feb. 2024
    大阪大学
  • 情報通信工学基礎演習
    Oct. 2022 - Feb. 2024
    Osaka University
  • Special Course of Secure Data Design
    Oct. 2022 - Feb. 2024
    Osaka University
  • Advanced Information Security and Algorithms
    Oct. 2022 - Feb. 2024
    Osaka University
  • English Seminar in Division of Electrical, Electronic and Information Engineering
    Apr. 2022 - Feb. 2024
    Osaka University
  • Practical Discrete Mathematics and Theory of Computation
    Apr. 2022 - Feb. 2024
    Osaka University
  • サイバーセキュリティ(全学共通科目「学問への扉」)
    Apr. 2023 - Sep. 2023
    大阪大学
  • Practical Course of Modern Security I
    Apr. 2022 - Sep. 2022
    Osaka University
  • Programming Techniques II
    Apr. 2022 - Sep. 2022
    Osaka University
  • Cryptography (English)
    Apr. 2021 - Sep. 2021
    Japan Advanced Institute of Science and Technology
  • Literacy in Information Security Management
    Apr. 2020 - Sep. 2021
    Japan Advanced Institute of Science and Technology
  • Cryptography
    Oct. 2020 - Mar. 2021
    Japan Advanced Institute of Science and Technology

Research Themes

  • 効率的で安全に利用可能な高機能暗号の数理基盤の構築と展開
    Tsuyoshi Takagi; Mitsugu Iwamoto; Kazuo Sakiyama; Yang Li; Yohei Watanabe; Yuntao Wang; Daiki Miyahara
    Japan Science and Technology Agency, K Program, The University of Electro-Communications, 個別研究型, Coinvestigator not use grants, 25-JPMJKP24U2-03
    Apr. 2025 - Mar. 2030

Social Contribution Activities

  • 大阪大学SEEDSプログラム
    Lecturer

Academic Contribution Activities

  • IEEE Transactions on Information Forensics & Security (IEEE TIFS)
    Peer review etc, Peer review, IEEE, Apr. 2025 - Mar. 2026
  • Advances in Mathematics of Communications (AMC)
    Peer review etc, Peer review, American Institute of Mathematical Sciences, Mar. 2025 - Mar. 2026
  • IEICE Transactions on Information and Systems
    Peer review etc, Peer review, IEICE, Mar. 2025 - Mar. 2026
  • 情報処理学会 論文誌ジャーナル/JIP「AI社会を安全にするコンピュータセキュリティ技術」 特集号
    Peer review etc, Review, Jun. 2024 - Mar. 2026
  • IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences (Special Section on Discrete Mathematics and Its Applications)
    Peer review etc, Peer review, 01 Oct. 2024 - 31 Mar. 2025
  • Japan Journal of Industrial and Applied Mathematics (JIAM)
    Peer review, Apr. 2024 - Mar. 2025
  • Designs, Codes and Cryptography (DCC)
    Peer review etc, Peer review, Apr. 2024 - Mar. 2025
  • 情報処理学会 論文誌ジャーナル/JIP「サプライチェーンを安全にするサイバーセキュリティ技術」 特集号
    Peer review etc, Review, Jun. 2023 - Mar. 2025
  • PQCrypto 2025
    Peer review etc, Peer review, 01 Oct. 2024 - 31 Dec. 2024
  • 書籍「現代暗号理論」
    Peer review etc, Peer review, Apr. 2024 - Aug. 2024
  • IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences
    Peer review, Apr. 2023 - Mar. 2024
  • 情報処理学会 論文誌ジャーナル/JIP「サイバー空間を安全にするコンピュータセキュリティ技術」 特集号
    Peer review etc, Review, Jul. 2022 - Mar. 2024
  • Heliyon Special issue on Security and Privacy in IoT Networks
    Peer review, Apr. 2022 - Mar. 2023
  • 情報処理学会 論文誌ジャーナル/JIP 「量子時代をみすえたコンピュータセキュリティ技術」 特集号
    Peer review etc, Review, Jun. 2021 - Mar. 2023
  • IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences
    Peer review etc, Peer review, Apr. 2021 - Mar. 2022
  • SIAM Journal on Discrete Mathematics (SIDMA)
    Peer review etc, Peer review, Apr. 2020 - Mar. 2021
  • IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences
    Peer review etc, Peer review, Apr. 2020 - Mar. 2021
  • IEEE Transactions on Industrial Informatics
    Peer review etc, Peer review, Apr. 2020 - Mar. 2021
  • Computer Standards & Interfaces
    Peer review etc, Peer review, Apr. 2020 - Mar. 2021
  • Journal of Mathematical Cryptology (JoC)
    Peer review etc, Peer review, Apr. 2019 - Mar. 2020
  • Advances in Mathematics of Communications (AIMS)
    Peer review etc, Peer review, Apr. 2019 - Mar. 2020
  • Designs, Codes and Cryptography (DCC)
    Peer review etc, Peer review, Apr. 2019 - Mar. 2020
  • Advances in Mathematics of Communications (AIMS)
    Peer review etc, Peer review, Mar. 2018 - Apr. 2019
  • Pacific Journal of Mathematics for Industry
    Peer review etc, Peer review, Apr. 2018 - Mar. 2019