Deprecated: $wgMWOAuthSharedUserIDs=false is deprecated, set $wgMWOAuthSharedUserIDs=true, $wgMWOAuthSharedUserSource='local' instead [Called from MediaWiki\HookContainer\HookContainer::run in /var/www/html/w/includes/HookContainer/HookContainer.php at line 135] in /var/www/html/w/includes/Debug/MWDebug.php on line 372
Koji Nuida - MaRDI portal

Koji Nuida

From MaRDI portal
Person:420722

Available identifiers

zbMath Open nuida.kojiWikidataQ58151108 ScholiaQ58151108MaRDI QIDQ420722

List of research outcomes

PublicationDate of PublicationType
Uniform cyclic group factorizations of finite groups2024-04-18Paper
Private simultaneous messages based on quadratic residues2023-11-20Paper
On the optimal communication complexity of error-correcting multi-server PIR2023-08-14Paper
Chosen ciphertext secure keyed two-level homomorphic encryption2023-07-26Paper
A Simple and Elementary Proof of Zorn's Lemma2023-05-17Paper
Homomorphic secret sharing for multipartite and general adversary structures supporting parallel evaluation of low-degree polynomials2023-05-12Paper
Multiplicative and verifiably multiplicative secret sharing for multipartite adversary structures2023-04-28Paper
Short lattice signatures in the standard model with efficient tag generation2023-03-21Paper
A Note on Centralizers of Involutions in Coxeter Groups2022-12-30Paper
An elementary linear-algebraic proof without computer-aided arguments for the group law on elliptic curves2022-10-20Paper
An improvement of a key exchange protocol relying on polynomial maps2022-10-20Paper
Constant-round client-aided secure comparison protocol2022-08-25Paper
Efficient Fully Anonymous Public-Key Trace and Revoke with Adaptive IND-CCA Security2022-08-11Paper
On Compression Functions over Small Groups with Applications to Cryptography2022-08-04Paper
Efficient noise generation to achieve differential privacy with applications to secure multiparty computation2022-06-17Paper
Non-interactive secure multiparty computation for symmetric functions, revisited: more efficient constructions and extensions2022-04-22Paper
Improved supersingularity testing of elliptic curves using Legendre form2022-03-24Paper
Cryptographic pseudorandom generators can make cryptosystems problematic2021-12-21Paper
Towards Constructing Fully Homomorphic Encryption without Ciphertext Noise from Group Theory2021-02-25Paper
Efficiency and accuracy improvements of secure floating-point addition over secret sharing2021-02-23Paper
An efficient secure division protocol using approximate multi-bit product and new constant-round building blocks2021-02-23Paper
Communication-efficient (client-aided) secure two-party protocols and its application2021-02-08Paper
A single shuffle is enough for secure card-based computation of any Boolean circuit2020-12-29Paper
Locally finite continuations and Coxeter groups of infinite ranks2020-08-28Paper
Polynomial expressions of \(p\)-ary auction functions2019-07-08Paper
An efficient private evaluation of a decision graph2019-03-29Paper
On limitations and alternatives of privacy-preserving cryptographic protocols for genomic data2018-10-24Paper
Secure multi-party computation using polarizing cards2018-10-24Paper
https://portal.mardi4nfdi.de/entity/Q31765512018-07-23Paper
https://portal.mardi4nfdi.de/entity/Q31766102018-07-23Paper
Chosen ciphertext secure keyed-homomorphic public-key cryptosystems2018-07-03Paper
A public-key encryption scheme based on non-linear indeterminate equations2018-04-26Paper
Intrinsic reflections and strongly rigid Coxeter groups2018-04-10Paper
Secure grouping protocol using a deck of cards2018-03-16Paper
On the Security of Pseudorandomized Information-Theoretically Secure Schemes2017-06-08Paper
Size-Hiding Computation for Multiple Parties2017-01-06Paper
Intrinsic reflections in Coxeter systems2016-08-18Paper
On the Isomorphism Problem for Coxeter Groups and Related Topics2016-05-19Paper
A Simple and Improved Algorithm for Integer Factorization with Implicit Hints2016-03-02Paper
Multi-party Computation with Small Shuffle Complexity Using Regular Polygon Cards2016-01-27Paper
(Batch) Fully Homomorphic Encryption over Integers for Non-Binary Message Spaces2015-09-30Paper
How to Use Pseudorandom Generators in Unconditional Security Settings2015-09-29Paper
A Mathematical Problem for Security Analysis of Hash Functions and Pseudorandom Generators2015-07-06Paper
Polynomial Expressions of Carries in p-ary Arithmetics2015-06-08Paper
Optimal observables for minimum-error state discrimination in general probabilistic theories2015-04-15Paper
On affine maps on non-compact convex sets and some characterizations of finite-dimensional solid ellipsoids2014-12-04Paper
Chosen Ciphertext Security on Hard Membership Decision Groups: The Case of Semi-smooth Subgroups of Quadratic Residues2014-10-14Paper
On finite factors of centralizers of parabolic subgroups in Coxeter groups.2013-02-21Paper
Locally parabolic subgroups in Coxeter groups of arbitrary ranks.2012-05-23Paper
On centralizers of parabolic subgroups in Coxeter groups2012-05-07Paper
A Mathematical Problem for Security Analysis of Hash Functions and Pseudorandom Generators2011-11-10Paper
Distinguishability measures and entropies for general probabilistic theories2011-06-03Paper
Physical Equivalence of Pure States and Derivation of Qubit in General Probabilistic Theories2010-12-24Paper
On the Security of Pseudorandomized Information-Theoretically Secure Schemes2010-09-29Paper
A General Conversion Method of Fingerprint Codes to (More) Robust Fingerprint Codes against Bit Erasure2010-09-29Paper
An Improvement of Pseudorandomization against Unbounded Attack Algorithms – The Case of Fingerprint Codes2010-09-29Paper
Pattern Occurrence in the Dyadic Expansion of Square Root of Two and an Analysis of Pseudorandom Number Generators2010-05-19Paper
A characterization of signed graphs with generalized perfect elimination orderings2010-04-27Paper
An improvement of discrete Tardos fingerprinting codes2009-10-14Paper
Signed-eliminable graphs and free multiplicities on the braid arrangement2009-07-31Paper
An Improvement of Tardos’s Collusion-Secure Fingerprinting Codes with Very Short Lengths2008-04-17Paper
Almost central involutions in split extensions of Coxeter groups by graph automorphisms2007-04-02Paper
On the Direct Indecomposability of Infinite Irreducible Coxeter Groups and the Isomorphism Problem of Coxeter Groups2006-09-25Paper
A characterization of finitely generated reflection subgroups of Coxeter groups orthogonal to a reflection2006-03-28Paper
Centralizers of reflections and reflection-independence of Coxeter groups2006-02-08Paper

Research outcomes over time


Doctoral students

No records found.


Known relations from the MaRDI Knowledge Graph

PropertyValue
MaRDI profile typeMaRDI person profile
instance ofhuman


This page was built for person: Koji Nuida