An improvement of discrete Tardos fingerprinting codes K Nuida, S Fujitsu, M Hagiwara, T Kitagawa, H Watanabe, K Ogawa, ... Designs, Codes and Cryptography 52, 339-362, 2009 | 101 | 2009 |
Efficient privacy-preserving string search and an application in genomics K Shimizu, K Nuida, G Rätsch Bioinformatics 32 (11), 1652-1661, 2016 | 92 | 2016 |
Distinguishability measures and entropies for general probabilistic theories G Kimura, K Nuida, H Imai Reports on Mathematical Physics 66 (2), 175-206, 2010 | 78 | 2010 |
(Batch) fully homomorphic encryption over integers for non-binary message spaces K Nuida, K Kurosawa Annual International Conference on the Theory and Applications of …, 2015 | 51 | 2015 |
A single shuffle is enough for secure card-based computation of any Boolean circuit K Shinagawa, K Nuida Discrete Applied Mathematics 289, 248-261, 2021 | 42* | 2021 |
Secure grouping protocol using a deck of cards Y Hashimoto, K Shinagawa, K Nuida, M Inamura, G Hanaoka IEICE Transactions on Fundamentals of Electronics, Communications and …, 2018 | 42 | 2018 |
Card-based protocols using regular polygon cards K Shinagawa, T Mizuki, JCN Schuldt, K Nuida, N Kanayama, T Nishide, ... IEICE Transactions on Fundamentals of Electronics, Communications and …, 2017 | 40 | 2017 |
Optimization of Tardos’s fingerprinting codes in a viewpoint of memory amount K Nuida, M Hagiwara, H Watanabe, H Imai Information Hiding: 9th International Workshop, IH 2007, Saint Malo, France …, 2007 | 39 | 2007 |
Search system, search method, and program K Iwamura, T Hirokawa, K Tsuda, H Arai, J Sakuma, K Asai, M Hamada, ... US Patent 9,215,068, 2015 | 37 | 2015 |
Communication-efficient (client-aided) secure two-party protocols and its application S Ohata, K Nuida International Conference on Financial Cryptography and Data Security, 369-385, 2020 | 35 | 2020 |
Short collusion-secure fingerprint codes against three pirates K Nuida International Journal of Information Security 11, 85-102, 2012 | 31 | 2012 |
Multi-party computation with small shuffle complexity using regular polygon cards K Shinagawa, T Mizuki, JCN Schuldt, K Nuida, N Kanayama, T Nishide, ... Provable Security: 9th International Conference, ProvSec 2015, Kanazawa …, 2015 | 30 | 2015 |
An improvement of Tardos’s collusion-secure fingerprinting codes with very short lengths K Nuida, S Fujitsu, M Hagiwara, T Kitagawa, H Watanabe, K Ogawa, ... International Symposium on Applied Algebra, Algebraic Algorithms, and Error …, 2007 | 30 | 2007 |
Constant-round client-aided secure comparison protocol H Morita, N Attrapadung, T Teruya, S Ohata, K Nuida, G Hanaoka Computer Security: 23rd European Symposium on Research in Computer Security …, 2018 | 27 | 2018 |
Signed-eliminable graphs and free multiplicities on the braid arrangement T Abe, K Nuida, Y Numata Journal of the London Mathematical Society 80 (1), 121-134, 2009 | 24 | 2009 |
Privacy-preserving search for chemical compound databases K Shimizu, K Nuida, H Arai, S Mitsunari, N Attrapadung, M Hamada, ... BMC bioinformatics 16, 1-14, 2015 | 21 | 2015 |
Optimal observables for minimum-error state discrimination in general probabilistic theories K Nuida, G Kimura, T Miyadera Journal of mathematical physics 51 (9), 2010 | 21 | 2010 |
On centralizers of parabolic subgroups in Coxeter groups K Nuida Walter de Gruyter GmbH & Co. KG 14 (6), 891-930, 2011 | 18 | 2011 |
A general conversion method of fingerprint codes to (more) robust fingerprint codes against bit erasure K Nuida Information Theoretic Security: 4th International Conference, ICITS 2009 …, 2010 | 18 | 2010 |
Toward finite-runtime card-based protocol for generating a hidden random permutation without fixed points Y Hashimoto, K Nuida, K Shinagawa, M Inamura, G Hanaoka IEICE Transactions on Fundamentals of Electronics, Communications and …, 2018 | 17 | 2018 |