• Source: Scopus
  • Calculated based on no. of publications stored in Pure and citations from Scopus
20052021

Research activity per year

If you made any changes in Pure these will be visible here soon.
Filter
Conference contribution

Search results

  • 2020

    A Linear Algebraic Approach to Strongly Secure Ramp Secret Sharing for General Access Structures

    Eriguchi, R., Kunihiro, N. & Nuida, K., Oct 24 2020, Proceedings of 2020 International Symposium on Information Theory and its Applications, ISITA 2020. Institute of Electrical and Electronics Engineers Inc., p. 427-431 5 p. 9366169. (Proceedings of 2020 International Symposium on Information Theory and its Applications, ISITA 2020).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • An Efficient Secure Division Protocol Using Approximate Multi-bit Product and New Constant-Round Building Blocks

    Hiwatashi, K., Ohata, S. & Nuida, K., 2020, Applied Cryptography and Network Security - 18th International Conference, ACNS 2020, Proceedings. Conti, M., Zhou, J., Casalicchio, E. & Spognardi, A. (eds.). Springer Science and Business Media Deutschland GmbH, p. 357-376 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 12146 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Communication-Efficient (Client-Aided) Secure Two-Party Protocols and Its Application

    Ohata, S. & Nuida, K., 2020, Financial Cryptography and Data Security - 24th International Conference, FC 2020, Revised Selected Papers. Bonneau, J. & Heninger, N. (eds.). Springer, p. 369-385 17 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 12059 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    2 Citations (Scopus)
  • Efficiency and accuracy improvements of secure floating-point addition over secret sharing

    Sasaki, K. & Nuida, K., 2020, Advances in Information and Computer Security - 15th International Workshop on Security, IWSEC 2020, Proceedings. Aoki, K. & Kanaoka, A. (eds.). Springer Science and Business Media Deutschland GmbH, p. 77-94 18 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 12231 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Identity-Based Outsider Anonymous Broadcast Encryption with Simultaneous Individual Messaging

    Mandal, M. & Nuida, K., 2020, Network and System Security - 14th International Conference, NSS 2020, Proceedings. Kutyłowski, M., Zhang, J. & Chen, C. (eds.). Springer Science and Business Media Deutschland GmbH, p. 167-186 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 12570 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Short Lattice Signatures in the Standard Model with Efficient Tag Generation

    Kajita, K., Ogawa, K., Nuida, K. & Takagi, T., 2020, Provable and Practical Security - 14th International Conference, ProvSec 2020, Proceedings. Nguyen, K., Wu, W., Lam, K. Y. & Wang, H. (eds.). Springer Science and Business Media Deutschland GmbH, p. 85-102 18 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 12505 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • 2019

    An efficient private evaluation of a decision graph

    Sudo, H., Nuida, K. & Shimizu, K., 2019, Information Security and Cryptology – ICISC 2018 - 21st International Conference, Revised Selected Papers. Lee, K. (ed.). Springer Verlag, p. 143-160 18 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11396 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    1 Citation (Scopus)
  • Privacy Preservation for Versatile Pay-TV Services

    Ogawa, K. & Nuida, K., 2019, HCI for Cybersecurity, Privacy and Trust - 1st International Conference, HCI-CPT 2019, Held as Part of the 21st HCI International Conference, HCII 2019, Proceedings. Moallem, A. (ed.). Springer Verlag, p. 417-428 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11594 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Secure Division Protocol and Applications to Privacy-preserving Chi-squared Tests

    Morita, H., Attrapadung, N., Ohata, S., Nuida, K., Yamada, S., Shimizu, K., Hanaoka, G. & Asai, K., Mar 8 2019, Proceedings of 2018 International Symposium on Information Theory and Its Applications, ISITA 2018. Institute of Electrical and Electronics Engineers Inc., p. 530-534 5 p. 8664337. (Proceedings of 2018 International Symposium on Information Theory and Its Applications, ISITA 2018).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    3 Citations (Scopus)
  • Tree-based Secure Comparison of Secret Shared Data

    Morita, H., Attrapadung, N., Ohata, S., Yamada, S., Nuida, K. & Hanaoka, G., Mar 8 2019, Proceedings of 2018 International Symposium on Information Theory and Its Applications, ISITA 2018. Institute of Electrical and Electronics Engineers Inc., p. 525-529 5 p. 8664390. (Proceedings of 2018 International Symposium on Information Theory and Its Applications, ISITA 2018).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    2 Citations (Scopus)
  • 2018

    A public-key encryption scheme based on non-linear indeterminate equations

    Akiyama, K., Goto, Y., Okumura, S., Takagi, T., Nuida, K. & Hanaoka, G., Jan 1 2018, Selected Areas in Cryptography – SAC 2017 - 24th International Conference, Revised Selected Papers. Adams, C. & Camenisch, J. (eds.). Springer Verlag, p. 215-234 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10719 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    4 Citations (Scopus)
  • Constant-round client-aided secure comparison protocol

    Morita, H., Attrapadung, N., Teruya, T., Ohata, S., Nuida, K. & Hanaoka, G., 2018, Computer Security - 23rd European Symposium on Research in Computer Security, ESORICS 2018, Proceedings. Zhou, J., Soriano, M. & Lopez, J. (eds.). Springer Verlag, p. 395-415 21 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11099 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    7 Citations (Scopus)
  • 2017

    Committed and protocol using three cards with more handy shuffle

    Shinagawa, K., Nuida, K., Nishide, T., Hanaoka, G. & Okamoto, E., Feb 2 2017, Proceedings of 2016 International Symposium on Information Theory and Its Applications, ISITA 2016. Institute of Electrical and Electronics Engineers Inc., p. 700-702 3 p. 7840515. (Proceedings of 2016 International Symposium on Information Theory and Its Applications, ISITA 2016).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    3 Citations (Scopus)
  • Correction of a secure comparison protocol for encrypted integers in IEEE WIFS 2012

    Vinh Mau, B. & Nuida, K., 2017, Advances in Information and Computer Security - 12th International Workshop on Security, IWSEC 2017, Proceedings. Obana, S. & Chida, K. (eds.). Springer Verlag, p. 181-191 11 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10418 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    1 Citation (Scopus)
  • Secure Grouping Protocol Using a Deck of Cards

    Hashimoto, Y., Shinagawa, K., Nuida, K., Inamura, M. & Hanaoka, G., 2017, Information Theoretic Security - 10th International Conference, ICITS 2017, Proceedings. Shikata, J. (ed.). Springer Verlag, p. 135-152 18 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10681 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    16 Citations (Scopus)
  • 2016

    Size-hiding computation for multiple parties

    Shinagawa, K., Nuida, K., Nishide, T., Hanaoka, G. & Okamoto, E., 2016, Advances in Cryptology - ASIACRYPT 2016 - 22nd International Conference on the Theory and Application of Cryptology and Information Security, Proceedings. Cheon, J. H. & Takagi, T. (eds.). Springer Verlag, p. 937-966 30 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10032 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    2 Citations (Scopus)
  • 2015

    (Batch) fully homomorphic encryption over integers for non-binary message spaces

    Nuida, K. & Kurosawa, K., 2015, Advances in Cryptology – EUROCRYPT 2015 - 34th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Proceedings. Fischlin, M. & Oswald, E. (eds.). Springer Verlag, p. 537-555 19 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9056).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    32 Citations (Scopus)
  • A simple and improved algorithm for integer factorization with implicit hints

    Nuida, K., Itakura, N. & Kurosawa, K., 2015, Topics in Cryptology - CT-RSA 2015 - The Cryptographers’ Track at the RSA Conference 2015, Proceedings. Nyberg, K. (ed.). Springer Verlag, p. 258-269 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9048).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    2 Citations (Scopus)
  • On limitations and alternatives of privacy-preserving cryptographic protocols for genomic data

    Teruya, T., Nuida, K., Shimizu, K. & Hanaoka, G., 2015, Advances in Information and Computer Security - 10th International Workshop on Security, IWSEC 2015, Proceedings. Tanaka, K. & Suga, Y. (eds.). Springer Verlag, p. 242-261 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9241).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Secure multi-party computation using polarizing cards

    Shinagawa, K., Mizuki, T., Schuldt, J., Nuida, K., Kanayama, N., Nishide, T., Hanaoka, G. & Okamoto, E., 2015, Advances in Information and Computer Security - 10th International Workshop on Security, IWSEC 2015, Proceedings. Tanaka, K. & Suga, Y. (eds.). Springer Verlag, p. 281-297 17 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9241).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    9 Citations (Scopus)
  • 2014

    Chosen ciphertext security on hard membership decision groups: The case of semi-smooth subgroups of quadratic residues

    Yamakawa, T., Yamada, S., Nuida, K., Hanaoka, G. & Kunihiro, N., 2014, Security and Cryptography for Networks - 9th International Conference, SCN 2014, Proceedings. Abdalla, M. & de Prisco, R. (eds.). Springer Verlag, p. 558-577 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 8642).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    1 Citation (Scopus)
  • How to use pseudorandom generators in unconditional security settings

    Nuida, K., 2014, Provable Security - 8th International Conference, ProvSec 2014, Proceedings. Chow, S. S. M., Liu, J. K., Hui, L. C. K. & Yiu, S. M. (eds.). Springer Verlag, p. 291-299 9 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 8782).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • 2011

    A mathematical problem for security analysis of hash functions and pseudorandom generators

    Nuida, K., Abe, T., Kaji, S., Maeno, T. & Numata, Y., 2011, Advances in Information and Computer Security - 6th International Workshop, IWSEC 2011, Proceedings. p. 144-160 17 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 7038 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • 2010

    A general conversion method of fingerprint codes to (more) robust fingerprint codes against bit erasure

    Nuida, K., 2010, Information Theoretic Security - 4th International Conference, ICITS 2009, Revised Selected Papers. p. 194-212 19 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 5973 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    4 Citations (Scopus)
  • An improvement of pseudorandomization against unbounded attack algorithms - The case of fingerprint codes

    Nuida, K. & Hanaoka, G., 2010, Information Theoretic Security - 4th International Conference, ICITS 2009, Revised Selected Papers. p. 213-230 18 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 5973 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    1 Citation (Scopus)
  • On the security of pseudorandomized information-theoretically secure schemes

    Nuida, K. & Hanaoka, G., 2010, Information Theoretic Security - 4th International Conference, ICITS 2009, Revised Selected Papers. p. 56-73 18 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 5973 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    2 Citations (Scopus)
  • Short collusion-secure fingerprint codes against three pirates

    Nuida, K., 2010, Information Hiding - 12th International Conference, IH 2010, Revised Selected Papers. p. 86-102 17 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 6387 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    17 Citations (Scopus)
  • 2009

    An error-tolerant variant of a short 2-secure fingerprint code and its security evaluation

    Nuida, K., 2009, Advances in Information and Computer Security - 4th International Workshop on Security, IWSEC 2009, Proceedings. p. 140-157 18 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 5824 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    2 Citations (Scopus)
  • An improvement of short 2-secure fingerprint codes strongly avoiding false-positive

    Nuida, K., 2009, Information Hiding - 11th International Workshop, IH 2009, Revised Selected Papers. p. 161-175 15 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 5806 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    6 Citations (Scopus)
  • 2008

    A group testing based deterministic tracing algorithm for a short random fingerprint code

    Kitagaway, T., Hagiwaraz, M., Nuiday, K., Watanabey, H. & Imaiy, H., 2008, 2008 International Symposium on Information Theory and its Applications, ISITA2008. 4895500. (2008 International Symposium on Information Theory and its Applications, ISITA2008).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    4 Citations (Scopus)
  • Bounds on fixed-length post-processing functions for stationary biased random number generators

    Nuida, K., 2008, 2008 International Symposium on Information Theory and its Applications, ISITA2008. 4895580. (2008 International Symposium on Information Theory and its Applications, ISITA2008).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • 2007

    An improvement of Tardos's collusion-secure fingerprinting codes with very short lengths

    Nuida, K., Fujitsu, S., Hagiwara, M., Kitagawa, T., Watanabe, H., Ogawa, K. & Imai, H., 2007, Applied Algebra, Algebraic Algorithms and Error-Correcting Codes - 17th International Symposium, AAECC- 17, Proceedings. Springer Verlag, p. 80-89 10 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4851 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    15 Citations (Scopus)
  • A tracing algorithm for short 2-secure probabilistic fingerprinting codes strongly protecting innocent users

    Nuida, K., Hagiwara, M., Kitagawa, T., Watanabe, H., Ogawa, K., Fujitsu, S. & Imai, H., 2007, 2007 4th Annual IEEE Consumer Communications and Networking Conference, CCNC 2007. p. 1068-1072 5 p. 4199303. (2007 4th Annual IEEE Consumer Communications and Networking Conference, CCNC 2007).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    5 Citations (Scopus)
  • Optimization of tardos's fingerprinting codes in a viewpoint of memory amount

    Nuida, K., Hagiwara, M., Watanabe, H. & Imai, H., 2007, Information Hiding - 9th International Workshop, IH 2007, Revised Selected Papers. p. 279-293 15 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 4567 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    21 Citations (Scopus)