Calculated based on number of publications stored in Pure and citations from Scopus
20052024

Research activity per year

Filter
Conference contribution

Search results

  • 2024

    Efficient and Generic Methods to Achieve Active Security in Private Information Retrieval and More Advanced Database Search

    Eriguchi, R., Kurosawa, K. & Nuida, K., 2024, Advances in Cryptology – EUROCRYPT 2024 - 43rd Annual International Conference on the Theory and Applications of Cryptographic Techniques, 2024, Proceedings. Joye, M. & Leander, G. (eds.). Springer Science and Business Media Deutschland GmbH, p. 92-121 30 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 14655 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Explicit Lower Bounds for Communication Complexity of PSM for Concrete Functions

    Shinagawa, K. & Nuida, K., 2024, Progress in Cryptology – INDOCRYPT 2023 - 24th International Conference on Cryptology in India, 2023, Proceedings. Chattopadhyay, A., Bhasin, S., Picek, S. & Rebeiro, C. (eds.). Springer Science and Business Media Deutschland GmbH, p. 45-61 17 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 14460 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • How to Covertly and Uniformly Scramble the 15 Puzzle and Rubik’s Cube

    Shinagawa, K., Kanai, K., Miyamoto, K. & Nuida, K., Jun 2024, 12th International Conference on Fun with Algorithms, FUN 2024. Broder, A. Z. & Tamir, T. (eds.). Schloss Dagstuhl- Leibniz-Zentrum fur Informatik GmbH, Dagstuhl Publishing, 30. (Leibniz International Proceedings in Informatics, LIPIcs; vol. 291).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Threshold Fully Homomorphic Encryption Over the Torus

    Sugizaki, Y., Tsuchida, H., Hayashi, T., Nuida, K., Nakashima, A., Isshiki, T. & Mori, K., 2024, Computer Security – ESORICS 2023 - 28th European Symposium on Research in Computer Security, 2023, Proceedings. Tsudik, G., Conti, M., Liang, K. & Smaragdakis, G. (eds.). Springer Science and Business Media Deutschland GmbH, p. 45-65 21 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 14344 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • 2023

    Efficient Card-Based Millionaires’ Protocols via Non-binary Input Encoding

    Nuida, K., 2023, Advances in Information and Computer Security - 18th International Workshop on Security, IWSEC 2023, Proceedings. Shikata, J. & Kuzuno, H. (eds.). Springer Science and Business Media Deutschland GmbH, p. 237-254 18 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 14128 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    2 Citations (Scopus)
  • Explicit and Nearly Tight Lower Bound for 2-Party Perfectly Secure FSS

    Hiwatashi, K. & Nuida, K., 2023, Applied Cryptography and Network Security - 21st International Conference, ACNS 2023, Proceedings. Tibouchi, M. & Wang, X. (eds.). Springer Science and Business Media Deutschland GmbH, p. 541-554 14 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 13906 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Exponential Correlated Randomness Is Necessary in Communication-Optimal Perfectly Secure Two-Party Computation

    Hiwatashi, K. & Nuida, K., Jul 2023, 4th Conference on Information-Theoretic Cryptography, ITC 2023. Chung, K.-M. (ed.). Schloss Dagstuhl- Leibniz-Zentrum fur Informatik GmbH, Dagstuhl Publishing, 18. (Leibniz International Proceedings in Informatics, LIPIcs; vol. 267).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • 2022

    Chosen Ciphertext Secure Keyed Two-Level Homomorphic Encryption

    Maeda, Y. & Nuida, K., 2022, Information Security and Privacy - 27th Australasian Conference, ACISP 2022, Proceedings. Nguyen, K., Yang, G., Guo, F. & Susilo, W. (eds.). Springer Science and Business Media Deutschland GmbH, p. 209-228 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 13494 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    1 Citation (Scopus)
  • Computational Irrelevancy: Bridging the Gap Between Pseudo- and Real Randomness in MPC Protocols

    Heseri, N. & Nuida, K., 2022, Advances in Information and Computer Security - 17th International Workshop on Security, IWSEC 2022, Proceedings. Cheng, C.-M. & Akiyama, M. (eds.). Springer Science and Business Media Deutschland GmbH, p. 208-223 16 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 13504 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • How to Handle Invalid Queries for Malicious-Private Protocols Based on Homomorphic Encryption

    Nuida, K., May 30 2022, APKC 2022 - Proceedings of the 9th ACM ASIA Public-Key Cryptography Workshop. Association for Computing Machinery, Inc, p. 15-25 11 p. (APKC 2022 - Proceedings of the 9th ACM ASIA Public-Key Cryptography Workshop).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    1 Citation (Scopus)
  • Multi-Server PIR with Full Error Detection and Limited Error Correction

    Eriguchi, R., Kurosawa, K. & Nuida, K., Jul 1 2022, 3rd Conference on Information-Theoretic Cryptography, ITC 2022. Dachman-Soled, D. (ed.). Schloss Dagstuhl- Leibniz-Zentrum fur Informatik GmbH, Dagstuhl Publishing, 1. (Leibniz International Proceedings in Informatics, LIPIcs; vol. 230).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    4 Citations (Scopus)
  • On Extension of Evaluation Algorithms in Keyed-Homomorphic Encryption

    Shinoki, H. & Nuida, K., 2022, Advances in Information and Computer Security - 17th International Workshop on Security, IWSEC 2022, Proceedings. Cheng, C.-M. & Akiyama, M. (eds.). Springer Science and Business Media Deutschland GmbH, p. 189-207 19 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 13504 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    1 Citation (Scopus)
  • On the Optimal Communication Complexity of Error-Correcting Multi-server PIR

    Eriguchi, R., Kurosawa, K. & Nuida, K., 2022, Theory of Cryptography - 20th International Conference, TCC 2022, Proceedings. Kiltz, E. & Vaikuntanathan, V. (eds.). Springer Science and Business Media Deutschland GmbH, p. 60-88 29 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 13749 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    2 Citations (Scopus)
  • 2021

    Accelerating Secure (2+1)-Party Computation by Insecure but Efficient Building Blocks

    Hiwatashi, K., Ogura, K., Ohata, S. & Nuida, K., May 24 2021, ASIA CCS 2021 - Proceedings of the 2021 ACM Asia Conference on Computer and Communications Security. Association for Computing Machinery, Inc, p. 616-627 12 p. (ASIA CCS 2021 - Proceedings of the 2021 ACM Asia Conference on Computer and Communications Security).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    2 Citations (Scopus)
  • Cryptographic Pseudorandom Generators Can Make Cryptosystems Problematic

    Nuida, K., 2021, Public-Key Cryptography – PKC 2021 - 24th IACR International Conference on Practice and Theory of Public Key Cryptography, 2021, Proceedings. Garay, J. A. (ed.). Springer Science and Business Media Deutschland GmbH, p. 441-468 28 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 12711 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

  • Efficient Fully Anonymous Public-Key Trace and Revoke with Adaptive IND-CCA Security

    Mandal, M., Sarkar, R., Hur, J. & Nuida, K., 2021, Information Security Practice and Experience - 16th International Conference, ISPEC 2021, Proceedings. Deng, R., Bao, F., Wang, G., Shen, J., Ryan, M., Meng, W. & Wang, D. (eds.). Springer Science and Business Media Deutschland GmbH, p. 168-189 22 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 13107 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    1 Citation (Scopus)
  • Efficient Noise Generation to Achieve Differential Privacy with Applications to Secure Multiparty Computation

    Eriguchi, R., Ichikawa, A., Kunihiro, N. & Nuida, K., 2021, Financial Cryptography and Data Security - 25th International Conference, FC 2021, Revised Selected Papers. Borisov, N. & Diaz, C. (eds.). Springer Science and Business Media Deutschland GmbH, p. 271-290 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 12674 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    4 Citations (Scopus)
  • Homomorphic Secret Sharing for Multipartite and General Adversary Structures Supporting Parallel Evaluation of Low-Degree Polynomials

    Eriguchi, R. & Nuida, K., 2021, Advances in Cryptology – ASIACRYPT 2021 - 27th International Conference on the Theory and Application of Cryptology and Information Security, Proceedings, Part 2. Tibouchi, M. & Wang, H. (eds.). Springer Science and Business Media Deutschland GmbH, p. 191-221 31 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 13091 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    3 Citations (Scopus)
  • Improved Supersingularity Testing of Elliptic Curves Using Legendre Form

    Hashimoto, Y. & Nuida, K., 2021, Computer Algebra in Scientific Computing - 23rd International Workshop, CASC 2021, Proceedings. Boulier, F., England, M., Sadykov, T. M. & Vorozhtsov, E. V. (eds.). Springer Science and Business Media Deutschland GmbH, p. 121-135 15 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 12865 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    2 Citations (Scopus)
  • Non-interactive Secure Multiparty Computation for Symmetric Functions, Revisited: More Efficient Constructions and Extensions

    Eriguchi, R., Ohara, K., Yamada, S. & Nuida, K., 2021, Advances in Cryptology – CRYPTO 2021 - 41st Annual International Cryptology Conference, CRYPTO 2021, Proceedings. Malkin, T. & Peikert, C. (eds.). Springer Science and Business Media Deutschland GmbH, p. 305-334 30 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 12826 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    1 Citation (Scopus)
  • 2020

    A Linear Algebraic Approach to Strongly Secure Ramp Secret Sharing for General Access Structures

    Eriguchi, R., Kunihiro, N. & Nuida, K., Oct 24 2020, Proceedings of 2020 International Symposium on Information Theory and its Applications, ISITA 2020. Institute of Electrical and Electronics Engineers Inc., p. 427-431 5 p. 9366169. (Proceedings of 2020 International Symposium on Information Theory and its Applications, ISITA 2020).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    1 Citation (Scopus)
  • An Efficient Secure Division Protocol Using Approximate Multi-bit Product and New Constant-Round Building Blocks

    Hiwatashi, K., Ohata, S. & Nuida, K., 2020, Applied Cryptography and Network Security - 18th International Conference, ACNS 2020, Proceedings. Conti, M., Zhou, J., Casalicchio, E. & Spognardi, A. (eds.). Springer Science and Business Media Deutschland GmbH, p. 357-376 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 12146 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    4 Citations (Scopus)
  • Communication-Efficient (Client-Aided) Secure Two-Party Protocols and Its Application

    Ohata, S. & Nuida, K., 2020, Financial Cryptography and Data Security - 24th International Conference, FC 2020, Revised Selected Papers. Bonneau, J. & Heninger, N. (eds.). Springer, p. 369-385 17 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 12059 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    24 Citations (Scopus)
  • Efficiency and accuracy improvements of secure floating-point addition over secret sharing

    Sasaki, K. & Nuida, K., 2020, Advances in Information and Computer Security - 15th International Workshop on Security, IWSEC 2020, Proceedings. Aoki, K. & Kanaoka, A. (eds.). Springer Science and Business Media Deutschland GmbH, p. 77-94 18 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 12231 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    2 Citations (Scopus)
  • Identity-Based Outsider Anonymous Broadcast Encryption with Simultaneous Individual Messaging

    Mandal, M. & Nuida, K., 2020, Network and System Security - 14th International Conference, NSS 2020, Proceedings. Kutyłowski, M., Zhang, J. & Chen, C. (eds.). Springer Science and Business Media Deutschland GmbH, p. 167-186 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 12570 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    8 Citations (Scopus)
  • Short Lattice Signatures in the Standard Model with Efficient Tag Generation

    Kajita, K., Ogawa, K., Nuida, K. & Takagi, T., 2020, Provable and Practical Security - 14th International Conference, ProvSec 2020, Proceedings. Nguyen, K., Wu, W., Lam, K. Y. & Wang, H. (eds.). Springer Science and Business Media Deutschland GmbH, p. 85-102 18 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 12505 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    3 Citations (Scopus)
  • 2019

    An efficient private evaluation of a decision graph

    Sudo, H., Nuida, K. & Shimizu, K., 2019, Information Security and Cryptology – ICISC 2018 - 21st International Conference, Revised Selected Papers. Lee, K. (ed.). Springer Verlag, p. 143-160 18 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11396 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    6 Citations (Scopus)
  • Privacy Preservation for Versatile Pay-TV Services

    Ogawa, K. & Nuida, K., 2019, HCI for Cybersecurity, Privacy and Trust - 1st International Conference, HCI-CPT 2019, Held as Part of the 21st HCI International Conference, HCII 2019, Proceedings. Moallem, A. (ed.). Springer Verlag, p. 417-428 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11594 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    1 Citation (Scopus)
  • 2018

    A public-key encryption scheme based on non-linear indeterminate equations

    Akiyama, K., Goto, Y., Okumura, S., Takagi, T., Nuida, K. & Hanaoka, G., 2018, Selected Areas in Cryptography – SAC 2017 - 24th International Conference, Revised Selected Papers. Adams, C. & Camenisch, J. (eds.). Springer Verlag, p. 215-234 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10719 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    6 Citations (Scopus)
  • Constant-round client-aided secure comparison protocol

    Morita, H., Attrapadung, N., Teruya, T., Ohata, S., Nuida, K. & Hanaoka, G., 2018, Computer Security - 23rd European Symposium on Research in Computer Security, ESORICS 2018, Proceedings. Zhou, J., Soriano, M. & Lopez, J. (eds.). Springer Verlag, p. 395-415 21 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11099 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    16 Citations (Scopus)
  • Secure Division Protocol and Applications to Privacy-preserving Chi-squared Tests

    Morita, H., Attrapadung, N., Ohata, S., Nuida, K., Yamada, S., Shimizu, K., Hanaoka, G. & Asai, K., Jul 2 2018, Proceedings of 2018 International Symposium on Information Theory and Its Applications, ISITA 2018. Institute of Electrical and Electronics Engineers Inc., p. 530-534 5 p. 8664337. (Proceedings of 2018 International Symposium on Information Theory and Its Applications, ISITA 2018).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    9 Citations (Scopus)
  • Tree-based Secure Comparison of Secret Shared Data

    Morita, H., Attrapadung, N., Ohata, S., Yamada, S., Nuida, K. & Hanaoka, G., Jul 2 2018, Proceedings of 2018 International Symposium on Information Theory and Its Applications, ISITA 2018. Institute of Electrical and Electronics Engineers Inc., p. 525-529 5 p. 8664390. (Proceedings of 2018 International Symposium on Information Theory and Its Applications, ISITA 2018).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    3 Citations (Scopus)
  • 2017

    Committed and protocol using three cards with more handy shuffle

    Shinagawa, K., Nuida, K., Nishide, T., Hanaoka, G. & Okamoto, E., Feb 2 2017, Proceedings of 2016 International Symposium on Information Theory and Its Applications, ISITA 2016. Institute of Electrical and Electronics Engineers Inc., p. 700-702 3 p. 7840515. (Proceedings of 2016 International Symposium on Information Theory and Its Applications, ISITA 2016).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    6 Citations (Scopus)
  • Correction of a secure comparison protocol for encrypted integers in IEEE WIFS 2012

    Vinh Mau, B. & Nuida, K., 2017, Advances in Information and Computer Security - 12th International Workshop on Security, IWSEC 2017, Proceedings. Obana, S. & Chida, K. (eds.). Springer Verlag, p. 181-191 11 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10418 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    1 Citation (Scopus)
  • Secure Grouping Protocol Using a Deck of Cards

    Hashimoto, Y., Shinagawa, K., Nuida, K., Inamura, M. & Hanaoka, G., 2017, Information Theoretic Security - 10th International Conference, ICITS 2017, Proceedings. Shikata, J. (ed.). Springer Verlag, p. 135-152 18 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10681 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    26 Citations (Scopus)
  • 2016

    Size-hiding computation for multiple parties

    Shinagawa, K., Nuida, K., Nishide, T., Hanaoka, G. & Okamoto, E., 2016, Advances in Cryptology - ASIACRYPT 2016 - 22nd International Conference on the Theory and Application of Cryptology and Information Security, Proceedings. Cheon, J. H. & Takagi, T. (eds.). Springer Verlag, p. 937-966 30 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10032 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    5 Citations (Scopus)
  • 2015

    (Batch) fully homomorphic encryption over integers for non-binary message spaces

    Nuida, K. & Kurosawa, K., 2015, Advances in Cryptology – EUROCRYPT 2015 - 34th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Proceedings. Fischlin, M. & Oswald, E. (eds.). Springer Verlag, p. 537-555 19 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9056).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    46 Citations (Scopus)
  • A simple and improved algorithm for integer factorization with implicit hints

    Nuida, K., Itakura, N. & Kurosawa, K., 2015, Topics in Cryptology - CT-RSA 2015 - The Cryptographers’ Track at the RSA Conference 2015, Proceedings. Nyberg, K. (ed.). Springer Verlag, p. 258-269 12 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9048).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    2 Citations (Scopus)
  • On limitations and alternatives of privacy-preserving cryptographic protocols for genomic data

    Teruya, T., Nuida, K., Shimizu, K. & Hanaoka, G., 2015, Advances in Information and Computer Security - 10th International Workshop on Security, IWSEC 2015, Proceedings. Tanaka, K. & Suga, Y. (eds.). Springer Verlag, p. 242-261 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9241).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    1 Citation (Scopus)
  • Secure multi-party computation using polarizing cards

    Shinagawa, K., Mizuki, T., Schuldt, J., Nuida, K., Kanayama, N., Nishide, T., Hanaoka, G. & Okamoto, E., 2015, Advances in Information and Computer Security - 10th International Workshop on Security, IWSEC 2015, Proceedings. Tanaka, K. & Suga, Y. (eds.). Springer Verlag, p. 281-297 17 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 9241).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    12 Citations (Scopus)
  • 2014

    Chosen ciphertext security on hard membership decision groups: The case of semi-smooth subgroups of quadratic residues

    Yamakawa, T., Yamada, S., Nuida, K., Hanaoka, G. & Kunihiro, N., 2014, Security and Cryptography for Networks - 9th International Conference, SCN 2014, Proceedings. Abdalla, M. & de Prisco, R. (eds.). Springer Verlag, p. 558-577 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 8642).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    1 Citation (Scopus)
  • How to use pseudorandom generators in unconditional security settings

    Nuida, K., 2014, Provable Security - 8th International Conference, ProvSec 2014, Proceedings. Chow, S. S. M., Liu, J. K., Hui, L. C. K. & Yiu, S. M. (eds.). Springer Verlag, p. 291-299 9 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 8782).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    1 Citation (Scopus)
  • 2011

    A mathematical problem for security analysis of hash functions and pseudorandom generators

    Nuida, K., Abe, T., Kaji, S., Maeno, T. & Numata, Y., 2011, Advances in Information and Computer Security - 6th International Workshop, IWSEC 2011, Proceedings. p. 144-160 17 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 7038 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
  • 2010

    A general conversion method of fingerprint codes to (more) robust fingerprint codes against bit erasure

    Nuida, K., 2010, Information Theoretic Security - 4th International Conference, ICITS 2009, Revised Selected Papers. p. 194-212 19 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 5973 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    6 Citations (Scopus)
  • An improvement of pseudorandomization against unbounded attack algorithms - The case of fingerprint codes

    Nuida, K. & Hanaoka, G., 2010, Information Theoretic Security - 4th International Conference, ICITS 2009, Revised Selected Papers. p. 213-230 18 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 5973 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    1 Citation (Scopus)
  • On the security of pseudorandomized information-theoretically secure schemes

    Nuida, K. & Hanaoka, G., 2010, Information Theoretic Security - 4th International Conference, ICITS 2009, Revised Selected Papers. p. 56-73 18 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 5973 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    Open Access
    2 Citations (Scopus)
  • Short collusion-secure fingerprint codes against three pirates

    Nuida, K., 2010, Information Hiding - 12th International Conference, IH 2010, Revised Selected Papers. p. 86-102 17 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 6387 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    18 Citations (Scopus)
  • 2009

    An error-tolerant variant of a short 2-secure fingerprint code and its security evaluation

    Nuida, K., 2009, Advances in Information and Computer Security - 4th International Workshop on Security, IWSEC 2009, Proceedings. p. 140-157 18 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 5824 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    2 Citations (Scopus)
  • An improvement of short 2-secure fingerprint codes strongly avoiding false-positive

    Nuida, K., 2009, Information Hiding - 11th International Workshop, IH 2009, Revised Selected Papers. p. 161-175 15 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 5806 LNCS).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    6 Citations (Scopus)
  • 2008

    A group testing based deterministic tracing algorithm for a short random fingerprint code

    Kitagaway, T., Hagiwaraz, M., Nuiday, K., Watanabey, H. & Imaiy, H., 2008, 2008 International Symposium on Information Theory and its Applications, ISITA2008. 4895500. (2008 International Symposium on Information Theory and its Applications, ISITA2008).

    Research output: Chapter in Book/Report/Conference proceedingConference contribution

    4 Citations (Scopus)