フォロー
Koji Nuida
Koji Nuida
確認したメール アドレス: imi.kyushu-u.ac.jp
タイトル
引用先
引用先
An improvement of discrete Tardos fingerprinting codes
K Nuida, S Fujitsu, M Hagiwara, T Kitagawa, H Watanabe, K Ogawa, ...
Designs, Codes and Cryptography 52, 339-362, 2009
1032009
Efficient privacy-preserving string search and an application in genomics
K Shimizu, K Nuida, G Rätsch
Bioinformatics 32 (11), 1652-1661, 2016
972016
Distinguishability measures and entropies for general probabilistic theories
G Kimura, K Nuida, H Imai
Reports on Mathematical Physics 66 (2), 175-206, 2010
782010
(Batch) fully homomorphic encryption over integers for non-binary message spaces
K Nuida, K Kurosawa
Annual International Conference on the Theory and Applications of …, 2015
512015
Card-based protocols using regular polygon cards
K Shinagawa, T Mizuki, JCN Schuldt, K Nuida, N Kanayama, T Nishide, ...
IEICE Transactions on Fundamentals of Electronics, Communications and …, 2017
462017
A single shuffle is enough for secure card-based computation of any Boolean circuit
K Shinagawa, K Nuida
Discrete Applied Mathematics 289, 248-261, 2021
45*2021
Secure grouping protocol using a deck of cards
Y Hashimoto, K Shinagawa, K Nuida, M Inamura, G Hanaoka
IEICE Transactions on Fundamentals of Electronics, Communications and …, 2018
442018
Communication-efficient (client-aided) secure two-party protocols and its application
S Ohata, K Nuida
International Conference on Financial Cryptography and Data Security, 369-385, 2020
412020
Optimization of Tardos’s fingerprinting codes in a viewpoint of memory amount
K Nuida, M Hagiwara, H Watanabe, H Imai
Information Hiding: 9th International Workshop, IH 2007, Saint Malo, France …, 2007
402007
Search system, search method, and program
K Iwamura, T Hirokawa, K Tsuda, H Arai, J Sakuma, K Asai, M Hamada, ...
US Patent 9,215,068, 2015
372015
Multi-party computation with small shuffle complexity using regular polygon cards
K Shinagawa, T Mizuki, JCN Schuldt, K Nuida, N Kanayama, T Nishide, ...
Provable Security: 9th International Conference, ProvSec 2015, Kanazawa …, 2015
312015
Short collusion-secure fingerprint codes against three pirates
K Nuida
International Journal of Information Security 11, 85-102, 2012
312012
An improvement of Tardos’s collusion-secure fingerprinting codes with very short lengths
K Nuida, S Fujitsu, M Hagiwara, T Kitagawa, H Watanabe, K Ogawa, ...
International Symposium on Applied Algebra, Algebraic Algorithms, and Error …, 2007
312007
Constant-round client-aided secure comparison protocol
H Morita, N Attrapadung, T Teruya, S Ohata, K Nuida, G Hanaoka
Computer Security: 23rd European Symposium on Research in Computer Security …, 2018
272018
Signed-eliminable graphs and free multiplicities on the braid arrangement
T Abe, K Nuida, Y Numata
Journal of the London Mathematical Society 80 (1), 121-134, 2009
252009
Privacy-preserving search for chemical compound databases
K Shimizu, K Nuida, H Arai, S Mitsunari, N Attrapadung, M Hamada, ...
BMC bioinformatics 16, 1-14, 2015
232015
Optimal observables for minimum-error state discrimination in general probabilistic theories
K Nuida, G Kimura, T Miyadera
Journal of mathematical physics 51 (9), 2010
212010
Toward finite-runtime card-based protocol for generating a hidden random permutation without fixed points
Y Hashimoto, K Nuida, K Shinagawa, M Inamura, G Hanaoka
IEICE Transactions on Fundamentals of Electronics, Communications and …, 2018
182018
On centralizers of parabolic subgroups in Coxeter groups
K Nuida
Walter de Gruyter GmbH & Co. KG 14 (6), 891-930, 2011
182011
A general conversion method of fingerprint codes to (more) robust fingerprint codes against bit erasure
K Nuida
Information Theoretic Security: 4th International Conference, ICITS 2009 …, 2010
182010
現在システムで処理を実行できません。しばらくしてからもう一度お試しください。
論文 1–20