Follow
Koji Nuida
Koji Nuida
Verified email at imi.kyushu-u.ac.jp
Title
Cited by
Cited by
Year
An improvement of discrete Tardos fingerprinting codes
K Nuida, S Fujitsu, M Hagiwara, T Kitagawa, H Watanabe, K Ogawa, ...
Designs, Codes and Cryptography 52 (3), 339-362, 2009
962009
Efficient privacy-preserving string search and an application in genomics
K Shimizu, K Nuida, G Rätsch
Bioinformatics 32 (11), 1652-1661, 2016
682016
Distinguishability measures and entropies for general probabilistic theories
G Kimura, K Nuida, H Imai
Reports on Mathematical Physics 66 (2), 175-206, 2010
642010
(Batch) fully homomorphic encryption over integers for non-binary message spaces
K Nuida, K Kurosawa
Annual International Conference on the Theory and Applications of …, 2015
402015
Optimization of Tardos’s fingerprinting codes in a viewpoint of memory amount
K Nuida, M Hagiwara, H Watanabe, H Imai
International Workshop on Information Hiding, 279-293, 2007
372007
Secure grouping protocol using a deck of cards
Y Hashimoto, K Shinagawa, K Nuida, M Inamura, G Hanaoka
IEICE Transactions on Fundamentals of Electronics, Communications and …, 2018
322018
An improvement of Tardos’s collusion-secure fingerprinting codes with very short lengths
K Nuida, S Fujitsu, M Hagiwara, T Kitagawa, H Watanabe, K Ogawa, ...
International Symposium on Applied Algebra, Algebraic Algorithms, and Error …, 2007
302007
Short collusion-secure fingerprint codes against three pirates
K Nuida
International Journal of Information Security 11 (2), 85-102, 2012
292012
Multi-party computation with small shuffle complexity using regular polygon cards
K Shinagawa, T Mizuki, JCN Schuldt, K Nuida, N Kanayama, T Nishide, ...
International Conference on Provable Security, 127-146, 2015
242015
Constant-round client-aided secure comparison protocol
H Morita, N Attrapadung, T Teruya, S Ohata, K Nuida, G Hanaoka
European Symposium on Research in Computer Security, 395-415, 2018
202018
Communication-efficient (client-aided) secure two-party protocols and its application
S Ohata, K Nuida
International Conference on Financial Cryptography and Data Security, 369-385, 2020
192020
Privacy-preserving search for chemical compound databases
K Shimizu, K Nuida, H Arai, S Mitsunari, N Attrapadung, M Hamada, ...
BMC bioinformatics 16 (18), 1-14, 2015
182015
Optimal observables for minimum-error state discrimination in general probabilistic theories
K Nuida, G Kimura, T Miyadera
Journal of mathematical physics 51 (9), 093505, 2010
182010
Card-based protocols using regular polygon cards
K Shinagawa, T Mizuki, JCN Schuldt, K Nuida, N Kanayama, T Nishide, ...
IEICE Transactions on Fundamentals of Electronics, Communications and …, 2017
172017
A Simple Framework for Noise-Free Construction of Fully Homomorphic Encryption from a Special Class of Non-Commutative Groups.
K Nuida
IACR Cryptol. ePrint Arch. 2014, 97, 2014
172014
Optimal probabilistic fingerprinting codes using optimal finite random variables related to numerical quadrature
K Nuida, M Hagiwara, H Watanabe, H Imai
arXiv preprint cs/0610036 6, 30-31, 2006
172006
A single shuffle is enough for secure card-based computation of any Boolean circuit
K Shinagawa, K Nuida
Discrete Applied Mathematics 289, 248-261, 2021
16*2021
Signed-eliminable graphs and free multiplicities on the braid arrangement
T Abe, K Nuida, Y Numata
Journal of the London Mathematical Society 80 (1), 121-134, 2009
162009
On centralizers of parabolic subgroups in Coxeter groups
K Nuida
Walter de Gruyter GmbH & Co. KG 14 (6), 891-930, 2011
152011
A general conversion method of fingerprint codes to (more) robust fingerprint codes against bit erasure
K Nuida
International Conference on Information Theoretic Security, 194-212, 2009
142009
The system can't perform the operation now. Try again later.
Articles 1–20