An improvement of discrete Tardos fingerprinting codes K Nuida, S Fujitsu, M Hagiwara, T Kitagawa, H Watanabe, K Ogawa, ... Designs, Codes and Cryptography 52 (3), 339-362, 2009 | 96 | 2009 |
Efficient privacy-preserving string search and an application in genomics K Shimizu, K Nuida, G Rätsch Bioinformatics 32 (11), 1652-1661, 2016 | 74 | 2016 |
Distinguishability measures and entropies for general probabilistic theories G Kimura, K Nuida, H Imai Reports on Mathematical Physics 66 (2), 175-206, 2010 | 67 | 2010 |
(Batch) fully homomorphic encryption over integers for non-binary message spaces K Nuida, K Kurosawa Annual International Conference on the Theory and Applications of …, 2015 | 40 | 2015 |
Optimization of Tardos’s fingerprinting codes in a viewpoint of memory amount K Nuida, M Hagiwara, H Watanabe, H Imai International Workshop on Information Hiding, 279-293, 2007 | 37 | 2007 |
Secure grouping protocol using a deck of cards Y Hashimoto, K Shinagawa, K Nuida, M Inamura, G Hanaoka IEICE Transactions on Fundamentals of Electronics, Communications and …, 2018 | 33 | 2018 |
An improvement of Tardos’s collusion-secure fingerprinting codes with very short lengths K Nuida, S Fujitsu, M Hagiwara, T Kitagawa, H Watanabe, K Ogawa, ... International Symposium on Applied Algebra, Algebraic Algorithms, and Error …, 2007 | 31 | 2007 |
Short collusion-secure fingerprint codes against three pirates K Nuida International Journal of Information Security 11 (2), 85-102, 2012 | 29 | 2012 |
Search system, search method, and program K Iwamura, T Hirokawa, K Tsuda, H Arai, J Sakuma, K Asai, M Hamada, ... US Patent 9,215,068, 2015 | 26 | 2015 |
Multi-party computation with small shuffle complexity using regular polygon cards K Shinagawa, T Mizuki, JCN Schuldt, K Nuida, N Kanayama, T Nishide, ... International Conference on Provable Security, 127-146, 2015 | 24 | 2015 |
Communication-efficient (client-aided) secure two-party protocols and its application S Ohata, K Nuida International Conference on Financial Cryptography and Data Security, 369-385, 2020 | 21 | 2020 |
Constant-round client-aided secure comparison protocol H Morita, N Attrapadung, T Teruya, S Ohata, K Nuida, G Hanaoka European Symposium on Research in Computer Security, 395-415, 2018 | 20 | 2018 |
Privacy-preserving search for chemical compound databases K Shimizu, K Nuida, H Arai, S Mitsunari, N Attrapadung, M Hamada, ... BMC bioinformatics 16 (18), 1-14, 2015 | 19 | 2015 |
Optimal observables for minimum-error state discrimination in general probabilistic theories K Nuida, G Kimura, T Miyadera Journal of mathematical physics 51 (9), 093505, 2010 | 18 | 2010 |
A single shuffle is enough for secure card-based computation of any Boolean circuit K Shinagawa, K Nuida Discrete Applied Mathematics 289, 248-261, 2021 | 17* | 2021 |
Card-based protocols using regular polygon cards K Shinagawa, T Mizuki, JCN Schuldt, K Nuida, N Kanayama, T Nishide, ... IEICE Transactions on Fundamentals of Electronics, Communications and …, 2017 | 17 | 2017 |
A Simple Framework for Noise-Free Construction of Fully Homomorphic Encryption from a Special Class of Non-Commutative Groups. K Nuida IACR Cryptol. ePrint Arch. 2014, 97, 2014 | 17 | 2014 |
Optimal probabilistic fingerprinting codes using optimal finite random variables related to numerical quadrature K Nuida, M Hagiwara, H Watanabe, H Imai arXiv preprint cs/0610036 6, 30-31, 2006 | 17 | 2006 |
Signed-eliminable graphs and free multiplicities on the braid arrangement T Abe, K Nuida, Y Numata Journal of the London Mathematical Society 80 (1), 121-134, 2009 | 16 | 2009 |
On centralizers of parabolic subgroups in Coxeter groups K Nuida Walter de Gruyter GmbH & Co. KG 14 (6), 891-930, 2011 | 15 | 2011 |