Follow
Koji Nuida
Koji Nuida
Verified email at imi.kyushu-u.ac.jp
Title
Cited by
Cited by
Year
An improvement of discrete Tardos fingerprinting codes
K Nuida, S Fujitsu, M Hagiwara, T Kitagawa, H Watanabe, K Ogawa, ...
Designs, Codes and Cryptography 52, 339-362, 2009
1002009
Efficient privacy-preserving string search and an application in genomics
K Shimizu, K Nuida, G Rätsch
Bioinformatics 32 (11), 1652-1661, 2016
922016
Distinguishability measures and entropies for general probabilistic theories
G Kimura, K Nuida, H Imai
Reports on Mathematical Physics 66 (2), 175-206, 2010
752010
(Batch) fully homomorphic encryption over integers for non-binary message spaces
K Nuida, K Kurosawa
Annual International Conference on the Theory and Applications of …, 2015
512015
A single shuffle is enough for secure card-based computation of any Boolean circuit
K Shinagawa, K Nuida
Discrete Applied Mathematics 289, 248-261, 2021
39*2021
Secure grouping protocol using a deck of cards
Y Hashimoto, K Shinagawa, K Nuida, M Inamura, G Hanaoka
IEICE Transactions on Fundamentals of Electronics, Communications and …, 2018
392018
Optimization of Tardos’s fingerprinting codes in a viewpoint of memory amount
K Nuida, M Hagiwara, H Watanabe, H Imai
Information Hiding: 9th International Workshop, IH 2007, Saint Malo, France …, 2007
392007
Card-based protocols using regular polygon cards
K Shinagawa, T Mizuki, JCN Schuldt, K Nuida, N Kanayama, T Nishide, ...
IEICE Transactions on Fundamentals of Electronics, Communications and …, 2017
372017
Search system, search method, and program
K Iwamura, T Hirokawa, K Tsuda, H Arai, J Sakuma, K Asai, M Hamada, ...
US Patent 9,215,068, 2015
372015
Communication-efficient (client-aided) secure two-party protocols and its application
S Ohata, K Nuida
International Conference on Financial Cryptography and Data Security, 369-385, 2020
332020
Short collusion-secure fingerprint codes against three pirates
K Nuida
International Journal of Information Security 11, 85-102, 2012
302012
An improvement of Tardos’s collusion-secure fingerprinting codes with very short lengths
K Nuida, S Fujitsu, M Hagiwara, T Kitagawa, H Watanabe, K Ogawa, ...
International Symposium on Applied Algebra, Algebraic Algorithms, and Error …, 2007
292007
Multi-party computation with small shuffle complexity using regular polygon cards
K Shinagawa, T Mizuki, JCN Schuldt, K Nuida, N Kanayama, T Nishide, ...
Provable Security: 9th International Conference, ProvSec 2015, Kanazawa …, 2015
282015
Constant-round client-aided secure comparison protocol
H Morita, N Attrapadung, T Teruya, S Ohata, K Nuida, G Hanaoka
Computer Security: 23rd European Symposium on Research in Computer Security …, 2018
262018
Signed-eliminable graphs and free multiplicities on the braid arrangement
T Abe, K Nuida, Y Numata
Journal of the London Mathematical Society 80 (1), 121-134, 2009
232009
Privacy-preserving search for chemical compound databases
K Shimizu, K Nuida, H Arai, S Mitsunari, N Attrapadung, M Hamada, ...
BMC bioinformatics 16, 1-14, 2015
212015
Optimal observables for minimum-error state discrimination in general probabilistic theories
K Nuida, G Kimura, T Miyadera
Journal of mathematical physics 51 (9), 2010
202010
A general conversion method of fingerprint codes to (more) robust fingerprint codes against bit erasure
K Nuida
Information Theoretic Security: 4th International Conference, ICITS 2009 …, 2010
192010
On centralizers of parabolic subgroups in Coxeter groups
K Nuida
Walter de Gruyter GmbH & Co. KG 14 (6), 891-930, 2011
182011
A Simple Framework for Noise-Free Construction of Fully Homomorphic Encryption from a Special Class of Non-Commutative Groups.
K Nuida
IACR Cryptol. ePrint Arch. 2014, 97, 2014
172014
The system can't perform the operation now. Try again later.
Articles 1–20