What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Koji Nuida
Google Scholar
ORCID:
0000-0001-8259-9958
35
publications in security and cryptology related venues
Year
Venue
Title
2024
conf/eurocrypt
Efficient and Generic Methods to Achieve Active Security in Private Information Retrieval and More Advanced Database Search.
Reo Eriguchi
Kaoru Kurosawa
Koji Nuida
2024
conf/sacrypt
Multi-key Homomorphic Encryption with Threshold Re-encryption.
Akira Nakashima
Yukimasa Sugizaki
Hikaru Tsuchida
Takuya Hayashi
Koji Nuida
Kengo Mori
Toshiyuki Isshiki
2023
conf/acns
Explicit and Nearly Tight Lower Bound for 2-Party Perfectly Secure FSS.
Keitaro Hiwatashi
Koji Nuida
2023
conf/esorics
Threshold Fully Homomorphic Encryption Over the Torus.
Yukimasa Sugizaki
Hikaru Tsuchida
Takuya Hayashi
Koji Nuida
Akira Nakashima
Toshiyuki Isshiki
Kengo Mori
2023
conf/iwsec
Efficient Card-Based Millionaires' Protocols via Non-binary Input Encoding.
Koji Nuida
2022
conf/acisp
Chosen Ciphertext Secure Keyed Two-Level Homomorphic Encryption.
Yusaku Maeda
Koji Nuida
2022
conf/asiapkc
How to Handle Invalid Queries for Malicious-Private Protocols Based on Homomorphic Encryption.
Koji Nuida
2022
conf/iwsec
Computational Irrelevancy: Bridging the Gap Between Pseudo- and Real Randomness in MPC Protocols.
Nariyasu Heseri
Koji Nuida
2022
conf/iwsec
On Extension of Evaluation Algorithms in Keyed-Homomorphic Encryption.
Hirotomo Shinoki
Koji Nuida
2022
conf/tcc
On the Optimal Communication Complexity of Error-Correcting Multi-server PIR.
Reo Eriguchi
Kaoru Kurosawa
Koji Nuida
2021
conf/crypto
Non-interactive Secure Multiparty Computation for Symmetric Functions, Revisited: More Efficient Constructions and Extensions.
Reo Eriguchi
Kazuma Ohara
Shota Yamada
Koji Nuida
2021
conf/fc
Efficient Noise Generation to Achieve Differential Privacy with Applications to Secure Multiparty Computation.
Reo Eriguchi
Atsunori Ichikawa
Noboru Kunihiro
Koji Nuida
2021
conf/asiaccs
Accelerating Secure (2+1)-Party Computation by Insecure but Efficient Building Blocks.
Keitaro Hiwatashi
Ken Ogura
Satsuya Ohata
Koji Nuida
2021
conf/pkc
Cryptographic Pseudorandom Generators Can Make Cryptosystems Problematic.
Koji Nuida
2021
conf/asiacrypt
Homomorphic Secret Sharing for Multipartite and General Adversary Structures Supporting Parallel Evaluation of Low-Degree Polynomials.
Reo Eriguchi
Koji Nuida
2020
conf/fc
Communication-Efficient (Client-Aided) Secure Two-Party Protocols and Its Application.
Satsuya Ohata
Koji Nuida
2020
conf/acns
An Efficient Secure Division Protocol Using Approximate Multi-bit Product and New Constant-Round Building Blocks.
Keitaro Hiwatashi
Satsuya Ohata
Koji Nuida
2020
conf/provsec
Short Lattice Signatures in the Standard Model with Efficient Tag Generation.
Kaisei Kajita
Kazuto Ogawa
Koji Nuida
Tsuyoshi Takagi
2020
conf/iwsec
Efficiency and Accuracy Improvements of Secure Floating-Point Addition over Secret Sharing.
Kota Sasaki
Koji Nuida
2018
conf/icisc
An Efficient Private Evaluation of a Decision Graph.
Hiroki Sudo
Koji Nuida
Kana Shimizu
2018
conf/esorics
Constant-Round Client-Aided Secure Comparison Protocol.
Hiraku Morita
Nuttapong Attrapadung
Tadanori Teruya
Satsuya Ohata
Koji Nuida
Goichiro Hanaoka
2017
conf/iwsec
Correction of a Secure Comparison Protocol for Encrypted Integers in IEEE WIFS 2012 (Short Paper).
Baptiste Vinh Mau
Koji Nuida
2017
conf/sacrypt
A Public-Key Encryption Scheme Based on Non-linear Indeterminate Equations.
Koichiro Akiyama
Yasuhiro Goto
Shinya Okumura
Tsuyoshi Takagi
Koji Nuida
Goichiro Hanaoka
2016
conf/asiacrypt
Size-Hiding Computation for Multiple Parties.
Kazumasa Shinagawa
Koji Nuida
Takashi Nishide
Goichiro Hanaoka
Eiji Okamoto
2015
conf/provsec
Multi-party Computation with Small Shuffle Complexity Using Regular Polygon Cards.
Kazumasa Shinagawa
Takaaki Mizuki
Jacob C. N. Schuldt
Koji Nuida
Naoki Kanayama
Takashi Nishide
Goichiro Hanaoka
Eiji Okamoto
2015
conf/ctrsa
A Simple and Improved Algorithm for Integer Factorization with Implicit Hints.
Koji Nuida
Naoto Itakura
Kaoru Kurosawa
2015
conf/iwsec
Secure Multi-Party Computation Using Polarizing Cards.
Kazumasa Shinagawa
Takaaki Mizuki
Jacob C. N. Schuldt
Koji Nuida
Naoki Kanayama
Takashi Nishide
Goichiro Hanaoka
Eiji Okamoto
2015
conf/iwsec
On Limitations and Alternatives of Privacy-Preserving Cryptographic Protocols for Genomic Data.
Tadanori Teruya
Koji Nuida
Kana Shimizu
Goichiro Hanaoka
2015
conf/eurocrypt
(Batch) Fully Homomorphic Encryption over Integers for Non-Binary Message Spaces.
Koji Nuida
Kaoru Kurosawa
2014
conf/provsec
How to Use Pseudorandom Generators in Unconditional Security Settings.
Koji Nuida
2011
conf/iwsec
A Mathematical Problem for Security Analysis of Hash Functions and Pseudorandom Generators.
Koji Nuida
Takuro Abe
Shizuo Kaji
Toshiaki Maeno
Yasuhide Numata
2010
conf/ih
Short Collusion-Secure Fingerprint Codes against Three Pirates.
Koji Nuida
2009
conf/ih
An Improvement of Short 2-Secure Fingerprint Codes Strongly Avoiding False-Positive.
Koji Nuida
2009
conf/iwsec
An Error-Tolerant Variant of a Short 2-Secure Fingerprint Code and Its Security Evaluation.
Koji Nuida
2007
conf/ih
Optimization of Tardos's Fingerprinting Codes in a Viewpoint of Memory Amount.
Koji Nuida
Manabu Hagiwara
Hajime Watanabe
Hideki Imai
Coauthors
Akira Nakashima
(2)
Atsunori Ichikawa
(1)
Baptiste Vinh Mau
(1)
Eiji Okamoto
(3)
Goichiro Hanaoka
(6)
Hajime Watanabe
(1)
Hideki Imai
(1)
Hikaru Tsuchida
(2)
Hiraku Morita
(1)
Hiroki Sudo
(1)
Hirotomo Shinoki
(1)
Jacob C. N. Schuldt
(2)
Kaisei Kajita
(1)
Kana Shimizu
(2)
Kaoru Kurosawa
(4)
Kazuma Ohara
(1)
Kazumasa Shinagawa
(3)
Kazuto Ogawa
(1)
Keitaro Hiwatashi
(3)
Ken Ogura
(1)
Kengo Mori
(2)
Koichiro Akiyama
(1)
Koji Nuida
(35)
Kota Sasaki
(1)
Manabu Hagiwara
(1)
Naoki Kanayama
(2)
Naoto Itakura
(1)
Nariyasu Heseri
(1)
Noboru Kunihiro
(1)
Nuttapong Attrapadung
(1)
Reo Eriguchi
(5)
Satsuya Ohata
(4)
Shinya Okumura
(1)
Shizuo Kaji
(1)
Shota Yamada
(1)
Tadanori Teruya
(2)
Takaaki Mizuki
(2)
Takashi Nishide
(3)
Takuro Abe
(1)
Takuya Hayashi
(2)
Toshiaki Maeno
(1)
Toshiyuki Isshiki
(2)
Tsuyoshi Takagi
(2)
Yasuhide Numata
(1)
Yasuhiro Goto
(1)
Yukimasa Sugizaki
(2)
Yusaku Maeda
(1)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to