Koji Nuida

From MaRDI portal
Person:420722

Available identifiers

zbMath Open nuida.kojiWikidataQ58151108 ScholiaQ58151108MaRDI QIDQ420722

List of research outcomes





PublicationDate of PublicationType
Exponential correlated randomness is necessary in communication-optimal perfectly secure two-party computation2024-11-22Paper
Efficient and generic methods to achieve active security in private information retrieval and more advanced database search2024-11-13Paper
A simple and elementary proof of Zorn's lemma2024-11-05Paper
Explicit lower bounds for communication complexity of PSM for concrete functions2024-10-23Paper
Multi-server PIR with full error detection and limited error correction2024-06-25Paper
Threshold fully homomorphic encryption over the torus2024-06-05Paper
Uniform cyclic group factorizations of finite groups2024-04-18Paper
Private simultaneous messages based on quadratic residues2023-11-20Paper
Explicit and nearly tight lower bound for 2-party perfectly secure FSS2023-11-10Paper
On the optimal communication complexity of error-correcting multi-server PIR2023-08-14Paper
Chosen ciphertext secure keyed two-level homomorphic encryption2023-07-26Paper
A Simple and Elementary Proof of Zorn's Lemma2023-05-17Paper
Homomorphic secret sharing for multipartite and general adversary structures supporting parallel evaluation of low-degree polynomials2023-05-12Paper
Multiplicative and verifiably multiplicative secret sharing for multipartite adversary structures2023-04-28Paper
Short lattice signatures in the standard model with efficient tag generation2023-03-21Paper
On Extension of Evaluation Algorithms in Keyed-Homomorphic Encryption2023-01-18Paper
Computational Irrelevancy: Bridging the Gap Between Pseudo- and Real Randomness in MPC Protocols2023-01-18Paper
A Note on Centralizers of Involutions in Coxeter Groups2022-12-30Paper
An improvement of a key exchange protocol relying on polynomial maps2022-10-20Paper
An elementary linear-algebraic proof without computer-aided arguments for the group law on elliptic curves2022-10-20Paper
Constant-round client-aided secure comparison protocol2022-08-25Paper
Efficient Fully Anonymous Public-Key Trace and Revoke with Adaptive IND-CCA Security2022-08-11Paper
On Compression Functions over Small Groups with Applications to Cryptography2022-08-04Paper
Efficient noise generation to achieve differential privacy with applications to secure multiparty computation2022-06-17Paper
Non-interactive secure multiparty computation for symmetric functions, revisited: more efficient constructions and extensions2022-04-22Paper
Improved supersingularity testing of elliptic curves using Legendre form2022-03-24Paper
Cryptographic pseudorandom generators can make cryptosystems problematic2021-12-21Paper
Towards Constructing Fully Homomorphic Encryption without Ciphertext Noise from Group Theory2021-02-25Paper
Efficiency and accuracy improvements of secure floating-point addition over secret sharing2021-02-23Paper
An efficient secure division protocol using approximate multi-bit product and new constant-round building blocks2021-02-23Paper
Communication-efficient (client-aided) secure two-party protocols and its application2021-02-08Paper
A single shuffle is enough for secure card-based computation of any Boolean circuit2020-12-29Paper
Locally finite continuations and Coxeter groups of infinite ranks2020-08-28Paper
Polynomial expressions of \(p\)-ary auction functions2019-07-08Paper
An efficient private evaluation of a decision graph2019-03-29Paper
On limitations and alternatives of privacy-preserving cryptographic protocols for genomic data2018-10-24Paper
Secure multi-party computation using polarizing cards2018-10-24Paper
https://portal.mardi4nfdi.de/entity/Q31765512018-07-23Paper
https://portal.mardi4nfdi.de/entity/Q31766102018-07-23Paper
Chosen ciphertext secure keyed-homomorphic public-key cryptosystems2018-07-03Paper
A public-key encryption scheme based on non-linear indeterminate equations2018-04-26Paper
Intrinsic reflections and strongly rigid Coxeter groups2018-04-10Paper
Secure grouping protocol using a deck of cards2018-03-16Paper
On the Security of Pseudorandomized Information-Theoretically Secure Schemes2017-06-08Paper
Size-Hiding Computation for Multiple Parties2017-01-06Paper
Intrinsic reflections in Coxeter systems2016-08-18Paper
On the Isomorphism Problem for Coxeter Groups and Related Topics2016-05-19Paper
A Simple and Improved Algorithm for Integer Factorization with Implicit Hints2016-03-02Paper
Multi-party Computation with Small Shuffle Complexity Using Regular Polygon Cards2016-01-27Paper
(Batch) Fully Homomorphic Encryption over Integers for Non-Binary Message Spaces2015-09-30Paper
How to Use Pseudorandom Generators in Unconditional Security Settings2015-09-29Paper
A Mathematical Problem for Security Analysis of Hash Functions and Pseudorandom Generators2015-07-06Paper
Polynomial Expressions of Carries in p-ary Arithmetics2015-06-08Paper
Optimal observables for minimum-error state discrimination in general probabilistic theories2015-04-15Paper
On affine maps on non-compact convex sets and some characterizations of finite-dimensional solid ellipsoids2014-12-04Paper
Chosen Ciphertext Security on Hard Membership Decision Groups: The Case of Semi-smooth Subgroups of Quadratic Residues2014-10-14Paper
On finite factors of centralizers of parabolic subgroups in Coxeter groups.2013-02-21Paper
Locally parabolic subgroups in Coxeter groups of arbitrary ranks.2012-05-23Paper
On centralizers of parabolic subgroups in Coxeter groups.2012-05-07Paper
A Mathematical Problem for Security Analysis of Hash Functions and Pseudorandom Generators2011-11-10Paper
Distinguishability measures and entropies for general probabilistic theories2011-06-03Paper
Physical Equivalence of Pure States and Derivation of Qubit in General Probabilistic Theories2010-12-24Paper
On the Security of Pseudorandomized Information-Theoretically Secure Schemes2010-09-29Paper
An Improvement of Pseudorandomization against Unbounded Attack Algorithms – The Case of Fingerprint Codes2010-09-29Paper
A General Conversion Method of Fingerprint Codes to (More) Robust Fingerprint Codes against Bit Erasure2010-09-29Paper
Pattern Occurrence in the Dyadic Expansion of Square Root of Two and an Analysis of Pseudorandom Number Generators2010-05-19Paper
A characterization of signed graphs with generalized perfect elimination orderings2010-04-27Paper
An improvement of discrete Tardos fingerprinting codes2009-10-14Paper
Signed-eliminable graphs and free multiplicities on the braid arrangement2009-07-31Paper
An Improvement of Tardos’s Collusion-Secure Fingerprinting Codes with Very Short Lengths2008-04-17Paper
Almost central involutions in split extensions of Coxeter groups by graph automorphisms2007-04-02Paper
On the Direct Indecomposability of Infinite Irreducible Coxeter Groups and the Isomorphism Problem of Coxeter Groups2006-09-25Paper
A characterization of finitely generated reflection subgroups of Coxeter groups orthogonal to a reflection2006-03-28Paper
Centralizers of reflections and reflection-independence of Coxeter groups2006-02-08Paper
Computing Richelot isogeny graph of superspecial abelian threefoldsN/APaper

Research outcomes over time

This page was built for person: Koji Nuida