Works of Koji NUIDA

Ascending order in date.
If more than one authors exist,


Writings

Refereed Journal Papers

  1. Koji Nuida, On the direct indecomposability of infinite irreducible Coxeter groups and the Isomorphism Problem of Coxeter groups, Communications in Algebra, vol.34, no.7 (2006) 2559--2595
    (online version DOI: 10.1080/00927870600651281) (preprint on arXiv) (preprint backup)
  2. Koji Nuida, Almost central involutions in split extensions of Coxeter groups by graph automorphisms, Journal of Group Theory, vol.10, no.2 (2007) 139--166
    (online version DOI: 10.1515/JGT.2007.011) (preprint on arXiv) (preprint backup)
  3. *Koji Nuida, Satoshi Fujitsu, Manabu Hagiwara, Hideki Imai, Takashi Kitagawa, Kazuto Ogawa, Hajime Watanabe, An efficient 2-secure and short random fingerprint code and its security evaluation, IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, vol.E92-A, no.1 (2009) 197--206
    (online version DOI: 10.1587/transfun.E92.A.197)
  4. *Koji Nuida, Satoshi Fujitsu, Manabu Hagiwara, Takashi Kitagawa, Hajime Watanabe, Kazuto Ogawa, Hideki Imai, An improvement of discrete Tardos fingerprinting codes, Designs, Codes and Cryptography, vol.52, no.3 (2009) 339--362
    (online version DOI: 10.1007/s10623-009-9285-z) (preprint on IACR Archive) (preprint backup)
  5. *Takuro Abe, Koji Nuida, Yasuhide Numata, Signed-eliminable graphs and free multiplicities on the braid arrangement, Journal of the London Mathematical Society (2), vol.80, no.1 (2009) 121--134
    (online version DOI: 10.1112/jlms/jdp019) (preprint on arXiv) (preprint backup)
  6. Koji Nuida, A characterization of signed graphs with generalized perfect elimination orderings, Discrete Mathematics, vol.310, no.4 (2010) 819--831
    (online version DOI: 10.1016/j.disc.2009.09.019) (preprint on arXiv) (preprint backup)
  7. Koji Nuida, Pattern occurrence in the dyadic expansion of square root of two and an analysis of pseudorandom number generators, INTEGERS: Electronic Journal of Combinatorial Number Theory, vol.10 (2010) 111--127
    (online version) (preprint on arXiv) (preprint backup)
  8. *Koji Nuida, Gen Kimura, Takayuki Miyadera, Optimal observables for minimum-error state discrimination in general probabilistic theories, Journal of Mathematical Physics, vol.51 (2010) 093505 (27 pages)
    (online version DOI: 10.1063/1.3479008) (preprint on arXiv) (preprint backup)
  9. *Gen Kimura, Koji Nuida, Hideki Imai, Distinguishability measures and entropies for general probabilistic theories, Reports on Mathematical Physics, vol.66, no.2 (2010) 175--206
    (online version DOI: 10.1016/S0034-4877(10)00025-X) (preprint on arXiv) (preprint backup)
  10. Koji Nuida, On centralizers of parabolic subgroups in Coxeter groups, Journal of Group Theory, vol.14, no.6 (2011) 891--930
    (online version DOI: 10.1515/jgt.2010.088) (preprint on arXiv) (preprint backup)
  11. Koji Nuida, Locally parabolic subgroups in Coxeter groups of arbitrary ranks, Journal of Algebra, vol.350, no.1 (2012) 207--217
    (online version DOI: 10.1016/j.jalgebra.2011.11.005) (preprint on arXiv) (preprint backup)
  12. Koji Nuida, Short collusion-secure fingerprint codes against three pirates, International Journal of Information Security, vol.11, no.2 (2012) 85--102
    (online version DOI: 10.1007/s10207-012-0155-8) (preprint on arXiv) (preprint on IACR Archive) (preprint backup)
  13. *Koji Nuida, Goichiro Hanaoka, On the security of pseudorandomized information-theoretically secure schemes, IEEE Transactions on Information Theory, vol.59, no.1 (2013) 635--652
    (online version DOI: 10.1109/TIT.2012.2216978) (preprint on IACR Archive) (preprint backup)
  14. Koji Nuida, On finite factors of centralizers of parabolic subgroups in Coxeter groups, Tsukuba Journal of Mathematics, vol.36, no.2 (2013) 235--294
    (online version) (preprint on arXiv) (preprint backup)
  15. Gen Kimura, *Koji Nuida, On affine maps on non-compact convex sets and some characterizations of finite-dimensional solid ellipsoids, Journal of Geometry and Physics, vol.86 (2014) 1--18
    (online version DOI: 10.1016/j.geomphys.2014.06.004) (preprint on arXiv) (preprint backup)
  16. *Koji Nuida, Takuro Abe, Shizuo Kaji, Toshiaki Maeno, Yasuhide Numata, A mathematical problem for security analysis of hash functions and pseudorandom generators, International Journal of Foundations of Computer Science, vol.26, no.2 (2015) 169--194
    (online version DOI: 10.1142/S0129054115500100) (preprint on arXiv) (preprint on IACR Archive) (preprint backup)
  17. *Kana Shimizu, Koji Nuida, Hiromi Arai, Shigeo Mitsunari, Nuttapong Attrapadung, Michiaki Hamada, Koji Tsuda, Takatsugu Hirokawa, Jun Sakuma, Goichiro Hanaoka, Kiyoshi Asai, Privacy-Preserving Search for Chemical Compound Databases, BMC Bioinformatics, vol.16(Suppl 18) (2015) S6 (14 pages)
    (online version DOI: 10.1186/1471-2105-16-S18-S6) (preprint on bioRxiv)
  18. *Kazumasa Shinagawa, Takaaki Mizuki, Jacob C. N. Schuldt, Koji Nuida, Naoki Kanayama, Takashi Nishide, Goichiro Hanaoka, Eiji Okamoto, Secure Computation Protocols Using Polarizing Cards, IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, vol.E99-A, no.6 (2016) 1122--1131
    (online version DOI: 10.1587/transfun.E99.A.1122)
  19. *Kana Shimizu, Koji Nuida, Gunnar Rätsch, Efficient Privacy-Preserving String Search and an Application in Genomics, Bioinformatics, vol.32, no.11 (2016) 1652--1661
    (online version DOI: 10.1093/bioinformatics/btw050) (preprint on bioRxiv)
  20. *Bernhard Mühlherr, Koji Nuida, Intrinsic Reflections in Coxeter Systems, Journal of Combinatorial Theory, Series A, vol.144 (2016) 326--360
    (online version DOI: 10.1016/j.jcta.2016.06.009) (preprint on arXiv) (preprint backup)
  21. *Kazumasa Shinagawa, Takaaki Mizuki, Jacob C. N. Schuldt, Koji Nuida, Naoki Kanayama, Takashi Nishide, Goichiro Hanaoka, Eiji Okamoto, Card-Based Protocols Using Regular Polygon Cards, IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, vol.E100-A, no.9 (2017) 1900--1909
    (online version DOI: 10.1587/transfun.E100.A.1900)
  22. *Robert B. Howlett, Bernhard Mühlherr, Koji Nuida, Intrinsic Reflections and Strongly Rigid Coxeter Groups, Proceedings of the London Mathematical Society, vol.116, no.3 (2018) 534--574
    (online version DOI: 10.1112/plms.12090) (preprint backup)
  23. *Keita Emura, Goichiro Hanaoka, Koji Nuida, Go Ohtake, Takahiro Matsuda, Shota Yamada, Chosen Ciphertext Secure Keyed-Homomorphic Public-Key Cryptosystems, Designs, Codes and Cryptography, vol.86, no.8 (2018) 1623--1683
    (online version DOI: 10.1007/s10623-017-0417-6) (preprint on IACR Archive)
  24. *Yuji Hashimoto, Koji Nuida, Kazumasa Shinagawa, Masaki Inamura, Goichiro Hanaoka, Toward Finite-runtime Card-based Protocol for Generating a Hidden Random Permutation without Fixed Points, IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, vol.E101-A, no.9 (2018) 1503--1511
    (online version DOI: 10.1587/transfun.E101.A.1503)
  25. *Yuji Hashimoto, Kazumasa Shinagawa, Koji Nuida, Masaki Inamura, Goichiro Hanaoka, Secure Grouping Protocol Using a Deck of Cards, IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, vol.E101-A, no.9 (2018) 1512--1524
    (online version DOI: 10.1587/transfun.E101.A.1512) (preprint on arXiv)
  26. *Yusuke Aikawa, Koji Nuida, Masaaki Shirase, Elliptic Curve Method Using Complex Multiplication Method, IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, vol.E102-A, no.1 (2019) 74--80
    (online version DOI: 10.1587/transfun.E102.A.74)
  27. Shizuo Kaji, Toshiaki Maeno, *Koji Nuida, Yasuhide Numata, Polynomial Expressions of p-ary Auction Functions, Journal of Mathematical Cryptology, vol.13, no.2 (2019) 69--80
    (online version DOI: 10.1515/jmc-2018-0016) (preprint on arXiv)
  28. *Hiroki Sudo, *Masanobu Jimbo, Koji Nuida, Kana Shimizu, Secure Wavelet Matrix: Alphabet-Friendly Privacy-Preserving String Search for Bioinformatics, IEEE/ACM Transactions on Computational Biology and Bioinformatics, vol.16, no.5 (2019) 1675--1684
    (online version DOI: 10.1109/TCBB.2018.2814039) (preprint on bioRxiv)
  29. *Hiraku Morita, Nuttapong Attrapadung, Tadanori Teruya, Satsuya Ohata, Koji Nuida, Goichiro Hanaoka, Constant-Round Client-Aided Two-Server Secure Comparison Protocol and Its Applications, IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, vol.E103-A, no.1 (2020) 21--32
    (online version DOI: 10.1587/transfun.2019CIP0023)
  30. Bernhard Mühlherr, *Koji Nuida, Locally Finite Continuations and Coxeter Groups of Infinite Ranks, Journal of Pure and Applied Algebra, vol.225, no.1 (2021) 106464 (39 pages)
    (online version DOI: 10.1016/j.jpaa.2020.106464) (preprint backup)
  31. *Kazumasa Shinagawa, Koji Nuida, A Single Shuffle Is Enough for Secure Card-Based Computation of Any Boolean Circuit, Discrete Applied Mathematics, vol.289 (2021) 248--261
    (online version DOI: 10.1016/j.dam.2020.10.013) (preprint on IACR Archive)
  32. *Yuji Hashimoto, Koji Nuida, Goichiro Hanaoka, Tight Security of Twin-DH Hashed ElGamal KEM in Multi-User Setting, IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, vol.E105-A, no.3 (2022) 173--181
    (online version DOI: 10.1587/transfun.2021CIP0008)
  33. *Kota Sasaki, Koji Nuida, Efficiency and Accuracy Improvements of Secure Floating-Point Addition over Secret Sharing, IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, vol.E105-A, no.3 (2022) 231--241
    (online version DOI: 10.1587/transfun.2021CIP0013)
  34. *Keitaro Hiwatashi, Satsuya Ohata, Koji Nuida, An Efficient Secure Division Protocol Using Approximate Multi-Bit Product and New Constant-Round Building Blocks, IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, vol.E105-A, no.3 (2022) 404--416
    (online version DOI: 10.1587/transfun.2021TAP0004)
  35. Koji Nuida, An Elementary Linear-Algebraic Proof without Computer-Aided Arguments for the Group Law on Elliptic Curves, International Journal of Mathematics for Industry, vol.13, no.1 (2022) 2150001 (12 pages)
    (online version DOI: 10.1142/S2661335221500015) (preprint on arXiv)
  36. *Keita Suzuki, Koji Nuida, An Improvement of a Key Exchange Protocol Relying on Polynomial Maps, International Journal of Mathematics for Industry, vol.13, no.1 (2022) 2250002 (13 pages)
    (online version DOI: 10.1142/S2661335222500022) (preprint on arXiv)
  37. *Kaisei Kajita, Go Ohtake, Kazuto Ogawa, Koji Nuida, Tsuyoshi Takagi, Short Lattice Signature Scheme with Tighter Reduction under Ring-SIS Assumption, IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, vol.E106-A, no.3 (2023) 228--240
    (online version DOI: 10.1587/transfun.2022CIP0017) (preprint on IACR Archive)
  38. *Reo Eriguchi, Noboru Kunihiro, Koji Nuida, Linear Algebraic Approach to Strongly Secure Ramp Secret Sharing for General Access Structures with Application to Symmetric PIR, IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, vol.E106-A, no.3 (2023) 263--271
    (online version DOI: 10.1587/transfun.2022CIP0001)
  39. *Reo Eriguchi, Noboru Kunihiro, Koji Nuida, Multiplicative and Verifiably Multiplicative Secret Sharing for Multipartite Adversary Structures, Designs, Codes and Cryptography, vol.91 (2023) 1751--1778
    (online version DOI: 10.1007/s10623-022-01177-2) (preprint on IACR Archive)
  40. *Yuji Hashimoto, Koji Nuida, Efficient Supersingularity Testing of Elliptic Curves Using Legendre Curves, IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, vol.E106-A, no.9 (2023) 1119--1130
    (online version DOI: 10.1587/transfun.2022DMP0002)
  41. *Yuji Hashimoto, Koji Nuida, Efficient Construction of CGL Hash Function Using Legendre Curves, IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, vol.E106-A, no.9 (2023) 1131--1140
    (online version DOI: 10.1587/transfun.2022DMP0003)
  42. *Reo Eriguchi, Atsunori Ichikawa, Noboru Kunihiro, Koji Nuida, Efficient Noise Generation Protocols for Differentially Private Multiparty Computation, IEEE Transactions on Dependable and Secure Computing, vol.20, no.6 (2023) 4486--4501
    (online version DOI: 10.1109/TDSC.2022.3227568) (preprint on IACR Archive)
  43. *Kazumasa Shinagawa, Reo Eriguchi, Shohei Satake, Koji Nuida, Private Simultaneous Messages Based on Quadratic Residues, Designs, Codes and Cryptography, vol.91, no.12 (2023) 3915--3932
    (online version DOI: 10.1007/s10623-023-01279-5) (preprint on arXiv)
  44. *Hirotomo Shinoki, Koji Nuida, On Extension of Evaluation Algorithms in Keyed-Homomorphic Encryption, IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, vol.E107-A, no.3 (2024) 218--233
    (online version DOI: 10.1587/transfun.2023CIP0007) (preprint on IACR Archive)
  45. *Keitaro Hiwatashi, Koji Nuida, Correlated Randomness Reduction in Domain-Restricted Secure Two-Party Computation, IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, vol.E107-A, no.3 (2024) 283--290
    (online version DOI: 10.1587/transfun.2023CIP0023)
  46. Kazuki Kanai, Kengo Miyamoto, Koji Nuida, *Kazumasa Shinagawa, Uniform Cyclic Group Factorizations of Finite Groups, Communications in Algebra, vol.52, no.5 (2024) 2174--2184
    (online version DOI: 10.1080/00927872.2023.2285908) (preprint on arXiv)
  47. Koji Nuida, A Simple and Elementary Proof of Zorn’s Lemma, Discrete Mathematics Letters, vol.13 (2024) 108--110
    (online version DOI: 10.47443/dml.2023.143) (preprint on arXiv)
  48. *Koji Nuida, Tomoko Adachi, On Weighted-Sum Orthogonal Latin Squares and Secret Sharing, IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences (Letter), vol.E107-A, no.9 (2024) 1492--1495
    (online version DOI: 10.1587/transfun.2023DML0002) (preprint on IACR Archive)
  49. Anastasiia Doi, Tomoki Ono, Yoshiki Abe, *Takeshi Nakai, Kazumasa Shinagawa, Yohei Watanabe, Koji Nuida, Mitsugu Iwamoto, Card-based Protocols for Private Set Intersection and Union, New Generation Computing, vol.42 (2024) 359--380
    (online version DOI: 10.1007/s00354-024-00268-z)

Refereed Conference Proceedings

  1. *Manabu Hagiwara, Koji Nuida, Takashi Kitagawa, Marc Fossorier, Hideki Imai, On the minimal length of quasi cyclic LDPC codes with girth greater than or equal to 6, in: Proceedings of the 2006 International Symposium on Information Theory and its Applications (ISITA 2006), CD-ROM (5 pages), October 2006
  2. *Koji Nuida, Manabu Hagiwara, Takashi Kitagawa, Hajime Watanabe, Kazuto Ogawa, Satoshi Fujitsu, Hideki Imai, A tracing algorithm for short 2-secure probabilistic fingerprinting codes strongly protecting innocent users, in: Proceedings of 4th IEEE Consumer Communications and Networking Conference (IEEE CCNC 2007), January 2007, pp.1068--1072
    (online version DOI: 10.1109/CCNC.2007.215)
  3. *Koji Nuida, Manabu Hagiwara, Hajime Watanabe, Hideki Imai, Optimization of Tardos's fingerprinting codes in a viewpoint of memory amount, in: T. Furon, F. Cayre, G. Doerr, P. Bas (Eds.), Information Hiding (IH 2007), LNCS 4567, June 2007, pp.279--293
    (online version DOI: 10.1007/978-3-540-77370-2_19) (full-version preprint)
  4. *Koji Nuida, Satoshi Fujitsu, Manabu Hagiwara, Takashi Kitagawa, Hajime Watanabe, Kazuto Ogawa, Hideki Imai, An improvement of Tardos's collusion-secure fingerprinting codes with very short lengths, in: S. Boztas, H.-F. Lu (Eds.), the 17th International Symposium on Applied Algebra, Algebraic Algorithms and Error-Correcting Codes (AAECC-17), LNCS 4851, December 2007, pp.80--89
    (online version DOI: 10.1007/978-3-540-77224-8_12) (full version)
  5. *Takashi Kitagawa, Manabu Hagiwara, Koji Nuida, Hajime Watanabe, Hideki Imai, A group testing based deterministic tracing algorithm for a short random fingerprint code, in: Proceedings of the 2008 International Symposium on Information Theory and its Applications (ISITA 2008), December 2008 (5 pages)
    (online version DOI: 10.1109/ISITA.2008.4895500)
  6. Koji Nuida, Bounds on fixed-length post-processing functions for stationary biased random number generators, in: Proceedings of the 2008 International Symposium on Information Theory and its Applications (ISITA 2008), December 2008 (6 pages)
    (online version DOI: 10.1109/ISITA.2008.4895580)
  7. Koji Nuida, An improvement of short 2-secure fingerprint codes strongly avoiding false-positive, in: S. Katzenbeisser, A.-R. Sadeghi (Eds.), Information Hiding (IH 2009), LNCS 5806, June 2009, pp.161--175
    (online version DOI: 10.1007/978-3-642-04431-1_12)
  8. Takuro Abe, *Koji Nuida, Yasuhide Numata, An edge-signed generalization of chordal graphs, free multiplicities on braid arrangements, and their characterizations, in: Proceedings of 21st International Conference on Formal Power Series and Algebraic Combinatorics (FPSAC 2009), Discrete Mathematics and Theoretical Computer Science, July 2009, pp.1--12
    (online version) (full version)
  9. Koji Nuida, Bounds of asymptotic occurrence rates of some patterns in binary words related to integer-valued logistic maps, in: Proceedings of 21st International Conference on Formal Power Series and Algebraic Combinatorics (FPSAC 2009), Discrete Mathematics and Theoretical Computer Science, July 2009, pp.709--720
    (online version)
  10. Koji Nuida, An error-tolerant variant of a short 2-secure fingerprint code and its security evaluation, in: T. Takagi, M. Mambo (Eds.), IWSEC 2009, LNCS 5824, October 2009, pp.140--157
    (online version DOI: 10.1007/978-3-642-04846-3_10)
  11. *Koji Nuida, Goichiro Hanaoka, On the security of pseudorandomized information-theoretically secure schemes, in: K. Kurosawa (Ed.), ICITS 2009, LNCS 5973, September 2010, pp.56--73
    (online version DOI: 10.1007/978-3-642-14496-7_6) (full version)
  12. Koji Nuida, A general conversion method of fingerprint codes to (more) robust fingerprint codes against bit erasure, in: K. Kurosawa (Ed.), ICITS 2009, LNCS 5973, September 2010, pp.194--212
    (online version DOI: 10.1007/978-3-642-14496-7_16) (full-version preprint)
  13. *Koji Nuida, Goichiro Hanaoka, An improvement of pseudorandomization against unbounded attack algorithms - the case of fingerprint codes, in: K. Kurosawa (Ed.), ICITS 2009, LNCS 5973, September 2010, pp.213--230
    (online version DOI: 10.1007/978-3-642-14496-7_17) (full version)
  14. Koji Nuida, Short collusion-secure fingerprint codes against three pirates, in: R. Böhme, P.W.L. Fong, R. Safavi-Naini (Eds.), Information Hiding (IH 2010), LNCS 6387, October 2010, pp.86--102
    (online version DOI: 10.1007/978-3-642-16435-4_8) (full version)
  15. *Koji Nuida, Takuro Abe, Shizuo Kaji, Toshiaki Maeno, Yasuhide Numata, A mathematical problem for security analysis of hash functions and pseudorandom generators, in: T. Iwata, M. Nishigaki (Eds.), IWSEC 2011, LNCS 7038, November 2011, pp.144--160
    (online version DOI: 10.1007/978-3-642-25141-2_10) (full version)
  16. *Takashi Yamakawa, Shota Yamada, Koji Nuida, Goichiro Hanaoka, Noboru Kunihiro, Chosen ciphertext security on hard membership decision groups: The case of semi-smooth subgroups of quadratic residues, in: M. Abdalla, R. De Prisco (Eds.), SCN 2014, LNCS 8642, September 2014, pp.558--577
    (online version DOI: 10.1007/978-3-319-10879-7_32)
  17. [Short paper] Koji Nuida, How to Use Pseudorandom Generators in Unconditional Security Settings, in: S. S. M. Chow, J. K. Liu, L. C. K. Hui, S. M. Yiu (Eds.), ProvSec 2014, LNCS 8782, October 2014, pp.291--299
    (online version DOI: 10.1007/978-3-319-12475-9_20)
  18. *Koji Nuida, Naoto Itakura, Kaoru Kurosawa, A Simple and Improved Algorithm for Integer Factorization with Implicit Hints, in: K. Nyberg (Ed.), CT-RSA 2015, LNCS 9048, April 2015, pp.258--269
    (online version DOI: 10.1007/978-3-319-16715-2_14) (preprint on IACR Archive)
  19. *Koji Nuida, Kaoru Kurosawa, (Batch) Fully Homomorphic Encryption over Integers for Non-Binary Message Spaces, in: E. Oswald, M. Fischlin (Eds.), EUROCRYPT 2015 (Part I), LNCS 9056, April 2015, pp.537--555
    (online version DOI: 10.1007/978-3-662-46800-5_21) (preprint on IACR Archive)
  20. *Tadanori Teruya, Koji Nuida, Kana Shimizu, Goichiro Hanaoka, On Limitations and Alternatives of Privacy-Preserving Cryptographic Protocols for Genomic Data, in: K. Tanaka, Y. Suga (Eds.), IWSEC 2015, LNCS 9241, August 2015, pp.242--261
    (online version DOI: 10.1007/978-3-319-22425-1_15)
  21. *Kazumasa Shinagawa, Takaaki Mizuki, Jacob C. N. Schuldt, Koji Nuida, Naoki Kanayama, Takashi Nishide, Goichiro Hanaoka, Eiji Okamoto, Secure Multi-Party Computation Using Polarizing Cards, in: K. Tanaka, Y. Suga (Eds.), IWSEC 2015, LNCS 9241, August 2015, pp.281--297
    (online version DOI: 10.1007/978-3-319-22425-1_17) (full version)
  22. *Kazumasa Shinagawa, Takaaki Mizuki, Jacob C. N. Schuldt, Koji Nuida, Naoki Kanayama, Takashi Nishide, Goichiro Hanaoka, Eiji Okamoto, Multi-Party Computation with Small Shuffle Complexity Using Regular Polygon Cards, in: M.-H. Au, A. Miyaji (Eds.), ProvSec 2015, LNCS 9451, November 2015, pp.127--146
    (online version DOI: 10.1007/978-3-319-26059-4_7) (full version)
  23. *Kazumasa Shinagawa, Koji Nuida, Takashi Nishide, Goichiro Hanaoka, Eiji Okamoto, Committed AND Protocol Using Three Cards with More Handy Shuffle, in: Proceedings of the 2016 International Symposium on Information Theory and Its Applications (ISITA 2016), October 2016, pp.700--702
    (online version)
  24. *Kazumasa Shinagawa, Koji Nuida, Takashi Nishide, Goichiro Hanaoka, Eiji Okamoto, Size-Hiding Computation for Multiple Parties, in: J. H. Cheon, T. Takagi (Eds.), ASIACRYPT 2016 (Part II), LNCS 10032, December 2016, pp.937--966
    (online version DOI: 10.1007/978-3-662-53890-6_31)
  25. [Short paper] *Baptiste Vinh Mau, Koji Nuida, Correction of a Secure Comparison Protocol for Encrypted Integers in IEEE WIFS 2012, in: S. Obana, K. Chida (Eds.), IWSEC 2017, LNCS 10418, August 2017, pp.181--191
    (online version DOI: 10.1007/978-3-319-64200-0_11)
  26. *Yuji Hashimoto, Kazumasa Shinagawa, Koji Nuida, Masaki Inamura, Goichiro Hanaoka, Secure Grouping Protocol Using a Deck of Cards, in: J. Shikata (Ed.), ICITS 2017, LNCS 10681, November 2017, pp.135--152
    (online version DOI: 10.1007/978-3-319-72089-0_8) (full version)
  27. *Koichiro Akiyama, Yasuhiro Goto, Shinya Okumura, Tsuyoshi Takagi, Koji Nuida, Goichiro Hanaoka, A Public-key Encryption Scheme based on Non-linear Indeterminate Equations, in: C. Adams, J. Camenisch (Eds.), SAC 2017, LNCS 10719, January 2018, pp.215--234
    (online version DOI: 10.1007/978-3-319-72565-9_11) (preprint on IACR Archive)
  28. *Hiraku Morita, Nuttapong Attrapadung, Tadanori Teruya, Satsuya Ohata, Koji Nuida, Goichiro Hanaoka, Constant-Round Client-Aided Secure Comparison Protocol, in: J. Lopez, J. Zhou, M. Soriano (Eds.), ESORICS 2018 (Part II), LNCS 11099, September 2018, pp.395--415
    (online version DOI: 10.1007/978-3-319-98989-1_20)
  29. *Hiraku Morita, Nuttapong Attrapadung, Satsuya Ohata, Shota Yamada, Koji Nuida, Goichiro Hanaoka, Tree-Based Secure Comparison of Secret Shared Data, in: Proceedings of the 2018 International Symposium on Information Theory and Its Applications (ISITA 2018), October 2018, pp.525--529
    (online version DOI: 10.23919/ISITA.2018.8664390)
  30. *Hiraku Morita, Nuttapong Attrapadung, Satsuya Ohata, Koji Nuida, Shota Yamada, Kana Shimizu, Goichiro Hanaoka, Kiyoshi Asai, Secure Division Protocol and Applications to Privacy-Preserving Chi-Squared Tests, in: Proceedings of the 2018 International Symposium on Information Theory and Its Applications (ISITA 2018), October 2018, pp.530--534
    (online version DOI: 10.23919/ISITA.2018.8664337)
  31. *Hiroki Sudo, Koji Nuida, Kana Shimizu, An Efficient Private Evaluation of a Decision Graph, in: K. Lee (Ed.), ICISC 2018, LNCS 11396, January 2019, pp.143--160
    (online version DOI: 10.1007/978-3-030-12146-4_10) (full-version preprint)
  32. *Kazuto Ogawa, Koji Nuida, Privacy Preservation for Versatile Pay-TV Services, in: A. Moallem (Ed.), HCI for Cybersecurity, Privacy and Trust: HCII 2019, LNCS 11594, July 2019, pp.417--428
    (online version DOI: 10.1007/978-3-030-22351-9_28)
  33. *Satsuya Ohata, Koji Nuida, Communication-Efficient (Client-Aided) Secure Two-Party Protocols and Its Application, in: J. Bonneau, N. Heninger (Eds.), Financial Cryptography and Data Security: FC 2020, LNCS 12059, July 2020, pp.369--385
    (online version DOI: 10.1007/978-3-030-51280-4_20) (full-version preprint)
  34. *Kota Sasaki, Koji Nuida, Efficiency and Accuracy Improvements of Secure Floating-Point Addition over Secret Sharing, in: K. Aoki, A. Kanaoka (Eds.), IWSEC 2020, LNCS 12231, September 2020, pp.77--94
    (online version DOI: 10.1007/978-3-030-58208-1_5) (full version)
  35. *Keitaro Hiwatashi, Satsuya Ohata, Koji Nuida, An Efficient Secure Division Protocol Using Approximate Multi-Bit Product and New Constant-Round Building Blocks, in: M. Conti, J. Zhou, E. Casalicchio, A. Spognardi (Eds.), ACNS 2020, LNCS 12146, October 2020, pp.357--376
    (online version DOI: 10.1007/978-3-030-57808-4_18) (full version)
  36. *Reo Eriguchi, Noboru Kunihiro, Koji Nuida, A Linear Algebraic Approach to Strongly Secure Ramp Secret Sharing for General Access Structures, in: Proceedings of the 2020 International Symposium on Information Theory and Its Applications (ISITA 2020), October 2020, pp.427--431
    (online version DOI: 10.34385/proc.65.C03-2) (full version)
  37. *Kaisei Kajita, Kazuto Ogawa, Koji Nuida, Tsuyoshi Takagi, Short Lattice Signatures in the Standard Model with Efficient Tag Generation, in: K. Nguyen, W. Wu, K. Y. Lam, H. Wang (Eds.), ProvSec 2020, LNCS 12505, November 2020, pp.85--102
    (online version DOI: 10.1007/978-3-030-62576-4_5) (full version)
  38. *Mriganka Mandal, Koji Nuida, Identity-based Outsider Anonymous Broadcast Encryption with Simultaneous Individual Messaging, in: M. Kutyłowski, J. Zhang, C. Chen (Eds.), NSS 2020, LNCS 12570, December 2020, pp.167--186
    (online version DOI: 10.1007/978-3-030-65745-1_10)
  39. Koji Nuida, Cryptographic Pseudorandom Generators Can Make Cryptosystems Problematic, in: J. A. Garay (Ed.), PKC 2021 (Part II), LNCS 12711, May 2021, pp.441--468
    (online version DOI: 10.1007/978-3-030-75248-4_16) (preprint on IACR Archive)
  40. *Keitaro Hiwatashi, Ken Ogura, Satsuya Ohata, Koji Nuida, Accelerating Secure (2+1)-Party Computation by Insecure but Efficient Building Blocks, in: Proceedings of ACM ASIACCS 2021, June 2021, pp.616--627
    (online version DOI: 10.1145/3433210.3453109)
  41. *Reo Eriguchi, Kazuma Ohara, Shota Yamada, Koji Nuida, Non-Interactive Secure Multiparty Computation for Symmetric Functions, Revisited: More Efficient Constructions and Extensions, in: Proceedings of CRYPTO 2021 (Part II), LNCS 12826, August 2021, pp.305--334
    (online version DOI: 10.1007/978-3-030-84245-1_11)
  42. *Yuji Hashimoto, Koji Nuida, Improved Supersingularity Testing of Elliptic Curves Using Legendre Form, in: Proceedings of Computer Algebra in Scientific Computing 2021 (CASC 2021), LNCS 12865, September 2021, pp.121--135
    (online version DOI: 10.1007/978-3-030-85165-1_8)
  43. *Reo Eriguchi, Atsunori Ichikawa, Noboru Kunihiro, Koji Nuida, Efficient Noise Generation to Achieve Differential Privacy with Applications to Secure Multiparty Computation, in: Proceedings of Financial Cryptography and Data Security: FC 2021 (Part I), LNCS 12674, October 2021, pp.271--290
    (online version DOI: 10.1007/978-3-662-64322-8_13) (full version)
  44. *Reo Eriguchi, Koji Nuida, Homomorphic Secret Sharing for Multipartite and General Adversary Structures Supporting Parallel Evaluation of Low-Degree Polynomials, in: Proceedings of ASIACRYPT 2021 (Part II), LNCS 13091, December 2021, pp.191--221
    (online version DOI: 10.1007/978-3-030-92075-3_7) (full-version preprint)
  45. *Mriganka Mandal, Ramprasad Sarkar, Junbeom Hur, Koji Nuida, Efficient Fully Anonymous Public-Key Trace and Revoke with Adaptive IND-CCA Security, in: Proceedings of ISPEC 2021, LNCS 13107, December 2021, pp.168--189
    (online version DOI: 10.1007/978-3-030-93206-0_11)
  46. Koji Nuida, How to Handle Invalid Queries for Malicious-Private Protocols Based on Homomorphic Encryption, in: Proceedings of APKC 2022 (The 9th ACM ASIA Public-Key Cryptography Workshop), May 2022, pp.15--25
    (online version DOI: 10.1145/3494105.3526238) (preprint on IACR Archive)
  47. *Reo Eriguchi, Kaoru Kurosawa, Koji Nuida, Multi-Server PIR with Full Error Detection and Limited Error Correction, in: Proceedings of ITC 2022, July 2022, pp.1:1--1:20
    (online version DOI: 10.4230/LIPIcs.ITC.2022.1) (full-version preprint)
  48. *Hirotomo Shinoki, Koji Nuida, On Extension of Evaluation Algorithms in Keyed-Homomorphic Encryption, in: Proceedings of IWSEC 2022, LNCS 13504, August 2022, pp.189--207
    (online version DOI: 10.1007/978-3-031-15255-9_10) (full version) (full-version preprint)
  49. *Nariyasu Heseri, Koji Nuida, Computational Irrelevancy: Bridging the Gap between Pseudo- and Real Randomness in MPC Protocols, in: Proceedings of IWSEC 2022, LNCS 13504, August 2022, pp.208--223
    (online version DOI: 10.1007/978-3-031-15255-9_11) (full-version preprint)
  50. *Anastasiia Doi, Tomoki Ono, Takeshi Nakai, Kazumasa Shinagawa, Yohei Watanabe, Koji Nuida, Mitsugu Iwamoto, Card-based Cryptographic Protocols for Private Set Intersection, in: Proceedings of ISITA 2022, pp.261--265, October 2022
    (full version)
  51. *Yusaku Maeda, Koji Nuida, Chosen Ciphertext Secure Keyed Two-Level Homomorphic Encryption, in: Proceedings of ACISP 2022, LNCS 13494, November 2022, pp.209--228
    (online version DOI: 10.1007/978-3-031-22301-3_11) (full-version preprint)
  52. *Reo Eriguchi, Kaoru Kurosawa, Koji Nuida, On the Optimal Communication Complexity of Error-Correcting Multi-Server PIR, in: Proceedings of TCC 2022 (Part III), LNCS 13749, December 2022, pp.60--88
    (online version DOI: 10.1007/978-3-031-22368-6_3) (full-version preprint)
  53. *Keitaro Hiwatashi, Koji Nuida, Explicit and Nearly Tight Lower Bound for 2-party Perfectly Secure FSS, in: Proceedings of ACNS 2023 (Part II), LNCS 13906, June 2023, pp.541--554
    (online version DOI: 10.1007/978-3-031-33491-7_20)
  54. *Keitaro Hiwatashi, Koji Nuida, Exponential Correlated Randomness is Necessary in Communication-Optimal Perfectly Secure Two-Party Computation, in: Proceedings of ITC 2023, July 2023, Article No.18 (16 pages)
    (online version DOI: 10.4230/LIPIcs.ITC.2023.18)
  55. Koji Nuida, Efficient Card-Based Millionaires' Protocols via Non-Binary Input Encoding, in: Proceedings of IWSEC 2023, LNCS 14128, August 2023, pp.237--254
    (online version DOI: 10.1007/978-3-031-41326-1_13) (preprint on IACR Archive)
  56. *Yukimasa Sugizaki, Hikaru Tsuchida, Takuya Hayashi, Koji Nuida, Akira Nakashima, Toshiyuki Isshiki, Kengo Mori, Threshold Fully Homomorphic Encryption over the Torus, in: Proceedings of ESORICS 2023 (Part I), LNCS 14344, January 2024, pp.45--65
    (online version DOI: 10.1007/978-3-031-50594-2_3)
  57. *Kazumasa Shinagawa, Koji Nuida, Explicit Lower Bounds for Communication Complexity of PSM for Concrete Functions, in: Proceedings of INDOCRYPT 2023 (Part II), LNCS 14460, March 2024, pp.45--61
    (online version DOI: 10.1007/978-3-031-56235-8_3) (preprint on IACR Archive)
  58. *Reo Eriguchi, Kaoru Kurosawa, Koji Nuida, Efficient and Generic Methods to Achieve Active Security in Private Information Retrieval and More Advanced Database Search, in: Proceedings of EUROCRYPT 2024 (Part V), LNCS 14655, May 2024, pp.92--121
    (online version DOI: 10.1007/978-3-031-58740-5_4) (preprint on IACR Archive)
  59. *Kazumasa Shinagawa, Kazuki Kanai, Kengo Miyamoto, Koji Nuida, How to Covertly and Uniformly Scramble the 15 Puzzle and Rubik's Cube, in: Proceedings of FUN 2024 (12th International Conference on Fun with Algorithms), LIPIcs 291, May 2024, pp.30:1--30:15
    (online version DOI: 10.4230/LIPIcs.FUN.2024.30)
  60. [To Appear] *Akira Nakashima, Yukimasa Sugizaki, Hikaru Tsuchida, Takuya Hayashi, Koji Nuida, Kengo Mori, Toshiyuki Isshiki, Multi-Key Homomorphic Encryption with Threshold Re-Encryption, to appear in: Proceedings of SAC 2024

Books and Book Chapters

  1. Koji Nuida, On the Isomorphism Problem for Coxeter Groups and Related Topics, in: N.S. Narasimha Sastry (Ed.), Groups of Exceptional Type, Coxeter Groups and Related Geometries, Springer Proceedings in Mathematics & Statistics vol.82, April 2014, pp.217--238
    (online version DOI: 10.1007/978-81-322-1814-2_12)
  2. Koji Nuida, Towards Constructing Fully Homomorphic Encryption without Ciphertext Noise from Group Theory, in: T. Takagi, M. Wakayama, K. Tanaka, N. Kunihiro, K. Kimoto, Y. Ikematsu (Eds.), International Symposium on Mathematics, Quantum Theory, and Cryptography, Mathematics for Industry book series vol.33, Springer, January 2021, pp.57--78
    (online version DOI: 10.1007/978-981-15-5191-8_8) (preprint on IACR Archive)
  3. [To Appear] *Reo Eriguchi, Koji Nuida, A Survey on Private Information Retrieval: Information-Theoretic Constructions and Error-Correction Techniques, to appear in: M. Kudo et al. (Eds.), Mathematical Foundations for Post-Quantum Cryptography

Preprints

  1. Koji Nuida, Centralizers of reflections and reflection-independence of Coxeter groups, e-print arXiv:math.GR/0602165, February 2006
    (DOI: 10.48550/arXiv.math/0602165)
  2. Koji Nuida, A characterization of finitely generated reflection subgroups of Coxeter groups orthogonal to a reflection, e-print arXiv:math.GR/0603667, March 2006
    (DOI: 10.48550/arXiv.math/0603667)
  3. *Koji Nuida, Manabu Hagiwara, Hajime Watanabe, Hideki Imai, Optimization of memory usage in Tardos's fingerprinting codes, e-print arXiv:cs.CR/0610036, October 2006
    (DOI: 10.48550/arXiv.cs/0610036)
  4. Koji Nuida, Pattern occurrence in the dyadic expansion of square root of two and an analysis of pseudorandom number generators, e-print arXiv:0909.3388, September 2009
    (DOI: 10.48550/arXiv.0909.3388) (full version)
  5. Koji Nuida, Making collusion-secure codes (more) robust against bit erasure, Cryptology ePrint Archive 2009/549, November 2009
  6. *Gen Kimura, Koji Nuida, Hideki Imai, Physical equivalence of pure states and derivation of qubit in general probabilistic theories, e-print arXiv:1012.5361, December 2010
    (DOI: 10.48550/arXiv.1012.5361)
  7. Koji Nuida, On pseudorandomization of information-theoretically secure schemes without hardness assumptions, Cryptology ePrint Archive 2012/505, September 2012
  8. *Koji Nuida, Goichiro Hanaoka, Takahiro Matsuda, Tree-Structured Composition of Homomorphic Encryption: How to Weaken Underlying Assumptions, Cryptology ePrint Archive 2014/950, November 2014
  9. Shizuo Kaji, Toshiaki Maeno, *Koji Nuida, Yasuhide Numata, Polynomial Expressions of Carries in p-ary Arithmetics, e-print arXiv:1506.02742, June 2015
    (DOI: 10.48550/arXiv.1506.02742)
  10. *Koji Nuida, Satsuya Ohata, Shigeo Mitsunari, Nuttapong Attrapadung, Arbitrary Univariate Function Evaluation and Re-Encryption Protocols over Lifted-ElGamal Type Ciphertexts, Cryptology ePrint Archive 2019/1233, October 2019
  11. *Takuto Odagawa, Koji Nuida, Halt Properties and Complexity Evaluations for Optimal DeepLLL Algorithm Families, e-print arXiv:2105.14695, June 2021
    (DOI: 10.48550/arXiv.2105.14695)
  12. Koji Nuida, On Compression Functions over Small Groups with Applications to Cryptography, e-print arXiv:2208.02468, August 2022
    (DOI: 10.48550/arXiv.2208.02468)
  13. *Kazumasa Shinagawa, Koji Nuida, Single-Shuffle Full-Open Card-Based Protocols Imply Private Simultaneous Messages Protocols, Cryptology ePrint Archive 2022/1306, October 2022
  14. Koji Nuida, A Note on Centralizers of Involutions in Coxeter Groups, e-print arXiv:2212.14767, January 2023
    (DOI: 10.48550/arXiv.2212.14767)
  15. *Reo Eriguchi, Kaoru Kurosawa, Koji Nuida, New Generic Constructions of Error-Correcting PIR and Efficient Instantiations, Cryptology ePrint Archive 2023/210, February 2023
  16. *Ryo Ohashi, Hiroshi Onuki, Momonari Kudo, Ryo Yoshizumi, Koji Nuida, Computing Richelot Isogeny Graph of Superspecial Abelian Threefolds, e-print arXiv:2401.10500, January 2024
    (DOI: 10.48550/arXiv.2401.10500)
  17. *Yuji Hashimoto, Koji Nuida, Bounds on Heights of 2-isogeny Graphs in Ordinary Curves over F_p and F_{p^2} and Its Application, e-print arXiv:2409.00505, September 2024
    (DOI: 10.48550/arXiv.2409.00505)
  18. *Ryo Yoshizumi, Hiroshi Onuki, Ryo Ohashi, Momonari Kudo, Koji Nuida, Efficient Theta-based Algorithms for Computing (\ell,\ell)-isogenies on Kummer Surfaces for Arbitrary Odd \ell, Cryptology ePrint Archive 2024/1519, September 2024

Theses

Master's thesis
On centralizers of parabolic subgroups in Coxeter groups, Graduate School of Mathematical Sciences, Univ. Tokyo, March 2003.
Ph.D. thesis
On the isomorphism problem of Coxeter groups and related topics, Graduate School of Mathematical Sciences, Univ. Tokyo, March 2006.
(dvi file) (PDF file)

Miscellaneous

  1. *Takuro Abe, Koji Nuida, Yasuhide Numata, Bicolor-eliminable graphs and free multiplicities on the braid arrangement, Hokkaido University Preprint Series in Mathematics, No.893, February 2008

Talks

Invited Talks at International Conferences

  1. Koji Nuida, On the isomorphism problem for Coxeter groups and related topics, I, Workshop and Conference on Groups and Geometries, Indian Statistical Institute, Bangalore, India, December 18, 2012
  2. Koji Nuida, On the isomorphism problem for Coxeter groups and related topics, II, Workshop and Conference on Groups and Geometries, Indian Statistical Institute, Bangalore, India, December 20, 2012
  3. Koji Nuida, A Simple Framework for Noise-Free Construction of Fully Homomorphic Encryption from a Special Class of Non-Commutative Groups, Conference on Mathematics of Cryptography, University of California, Irvine, California, USA, September 1, 2015
  4. Koji Nuida, Towards Fully Homomorphic Encryption on Finite Simple Groups without Ciphertext Noise, Colloquium Coding Theory and Cryptography, Brussels, Belgium, November 21, 2016
  5. Koji Nuida, Towards Constructing Fully Homomorphic Encryption without Ciphertext Noise from Group Theory, International Symposium on Mathematics, Quantum Theory, and Cryptography (MQC 2019), Kyushu University, Japan, September 25, 2019
  6. Koji Nuida, Towards Constructing Fully Homomorphic Encryption without Ciphertext Noise from Group Theory, 63rd La Trobe Kyushu Joint Seminar on Mathematics for Industry, Online, August 9, 2022

International Conferences

Refereed

  1. [Poster] Koji Nuida, On the isomorphism problem, indecomposability and the automorphism groups of Coxeter groups, 17th International Conference on Formal Power Series and Algebraic Combinatorics (FPSAC 2005), University of Messina, Italy, June 21, 2005
  2. *Manabu Hagiwara, Koji Nuida, Takashi Kitagawa, Marc Fossorier, Hideki Imai, On the minimal length of quasi cyclic LDPC codes with girth greater than or equal to 6, The 2006 International Symposium on Information Theory and its Applications (ISITA2006), Seoul, Korea, October 31, 2006
  3. *Koji Nuida, Manabu Hagiwara, Takashi Kitagawa, Hajime Watanabe, Kazuto Ogawa, Satoshi Fujitsu, Hideki Imai, A tracing algorithm for short 2-secure probabilistic fingerprinting codes strongly protecting innocent users, 4th Annual IEEE Consumer Communications and Networking Conference (CCNC 2007) DRM Workshop, Nevada, USA, January 11, 2007
  4. *Koji Nuida, Manabu Hagiwara, Hajime Watanabe, Hideki Imai, Optimization of Tardos's fingerprinting codes in a viewpoint of memory amount, 9th Information Hiding (IH 2007), Saint Malo, France, June 13, 2007
  5. *Satoshi Fujitsu, Manabu Hagiwara, Hideki Imai, Takashi Kitagawa, Koji Nuida, Kazuto Ogawa, Hajime Watanabe, An efficient tracing algorithm for a 2-secure and short random fingerprint code, 2007 International Workshop on Information Hiding and Digital Watermarking, IFIPTM 2007 Workshop, Moncton, Canada, July 30, 2007
  6. *Koji Nuida, Satoshi Fujitsu, Manabu Hagiwara, Takashi Kitagawa, Hajime Watanabe, Kazuto Ogawa, Hideki Imai, An improvement of Tardos's collusion-secure fingerprinting codes with very short lengths, Applied Algebra, Algebraic Algorithms and Error-Correcting Codes (AAECC-17), Bangalore, India, December 17, 2007
  7. *Takashi Kitagawa, Manabu Hagiwara, Koji Nuida, Hajime Watanabe, Hideki Imai, A group testing based deterministic tracing algorithm for a short random fingerprint code, 2008 International Symposium on Information Theory and its Applications (ISITA 2008), Auckland, New Zealand, December 9, 2008
  8. *Koji Nuida, Bounds on fixed-length post-processing functions for stationary biased random number generators, 2008 International Symposium on Information Theory and its Applications (ISITA 2008), Auckland, New Zealand, December 10, 2008
  9. [Poster] *Koji Nuida, Gen Kimura, Takayuki Miyadera, Hideki Imai, On minimum-error state discrimination problems in generic probability models, The Twelfth Workshop on Quantum Information Processing (QIP 2009), New Mexico, USA, January 14, 2009
  10. Koji Nuida, An improvement of short 2-secure fingerprint codes strongly avoiding false-positive, 11th Information Hiding (IH 2009), Darmstadt, Germany, June 9, 2009
  11. [Poster] Koji Nuida, Bounds of asymptotic occurrence rates of some patterns in binary words related to integer-valued logistic maps, 21st International Conference on Formal Power Series and Algebraic Combinatorics (FPSAC 2009), Hagenberg, Austria, July 20, 2009
  12. [Poster] Takuro Abe, Koji Nuida, *Yasuhide Numata, An edge-signed generalization of chordal graphs, free multiplicities on braid arrangements, and their characterizations, 21st International Conference on Formal Power Series and Algebraic Combinatorics (FPSAC 2009), Hagenberg, Austria, July 20, 2009
  13. Koji Nuida, An error-tolerant variant of a short 2-secure fingerprint code and its security evaluation, The 4th International Workshop on Security (IWSEC 2009), Toyama, Japan, October 29, 2009
  14. *Koji Nuida, Goichiro Hanaoka, On the security of pseudorandomized information-theoretically secure schemes, The 4th International Conference on Information Theoretic Security (ICITS 2009), Shizuoka, Japan, December 4, 2009
  15. Koji Nuida, A general conversion method of fingerprint codes to (more) robust fingerprint codes against bit erasure, The 4th International Conference on Information Theoretic Security (ICITS 2009), Shizuoka, Japan, December 6, 2009
  16. *Koji Nuida, Goichiro Hanaoka, An improvement of pseudorandomization against unbounded attack algorithms - the case of fingerprint codes, The 4th International Conference on Information Theoretic Security (ICITS 2009), Shizuoka, Japan, December 6, 2009
  17. Koji Nuida, Short collusion-secure fingerprint codes against three pirates, The 12th Information Hiding (IH 2010), Calgary, Canada, June 28, 2010
  18. [Poster] *Koji Nuida, Gen Kimura, Hideki Imai, On derivation of qubit systems from physical principles, 14th Workshop on Quantum Information Processing (QIP 2011), Sentosa, Singapore, January 10, 2011
  19. *Koji Nuida, Takuro Abe, Shizuo Kaji, Toshiaki Maeno, Yasuhide Numata, A mathematical problem for security analysis of hash functions and pseudorandom generators, The 6th International Workshop on Security (IWSEC 2011), Tokyo, Japan, November 9, 2011
  20. *Takashi Yamakawa, Shota Yamada, Koji Nuida, Goichiro Hanaoka, Noboru Kunihiro, Chosen ciphertext security on hard membership decision groups: The case of semi-smooth subgroups of quadratic residues, 9th Conference on Security and Cryptography for Networks (SCN 2014), Amalfi, Italy, September 5, 2014
  21. [Short paper] Koji Nuida, How to Use Pseudorandom Generators in Unconditional Security Settings, The Eighth International Conference on Provable Security (ProvSec 2014), University of Hong Kong, Hong Kong, October 9, 2014
  22. *Koji Nuida, Naoto Itakura, Kaoru Kurosawa, A Simple and Improved Algorithm for Integer Factorization with Implicit Hints, RSA Conference Cryptographers' Track 2015 (CT-RSA 2015), San Francisco, USA, April 23, 2015
  23. *Koji Nuida, Kaoru Kurosawa, (Batch) Fully Homomorphic Encryption over Integers for Non-Binary Message Spaces, EUROCRYPT 2015, Sofia, Bulgaria, April 29, 2015
  24. *Kana Shimizu, Koji Nuida, Gunnar Rätsch, Efficient Privacy-Preserving String Search and an Application in Genomics, Conference on High Throughput Sequencing Algorithms and Applications (HiTSeq 2015), Dublin, Ireland, July 10, 2015
  25. *Tadanori Teruya, Koji Nuida, Kana Shimizu, Goichiro Hanaoka, On Limitations and Alternatives of Privacy-Preserving Cryptographic Protocols for Genomic Data, The 10th International Workshop on Security (IWSEC 2015), Nara, Japan, August 28, 2015
  26. *Kazumasa Shinagawa, Takaaki Mizuki, Jacob C. N. Schuldt, Koji Nuida, Naoki Kanayama, Takashi Nishide, Goichiro Hanaoka, Eiji Okamoto, Secure Multi-Party Computation Using Polarizing Cards, The 10th International Workshop on Security (IWSEC 2015), Nara, Japan, August 28, 2015
  27. *Kana Shimizu, Koji Nuida, Hiromi Arai, Shigeo Mitsunari, Nuttapong Attrapadung, Michiaki Hamada, Koji Tsuda, Takatsugu Hirokawa, Jun Sakuma, Goichiro Hanaoka, Kiyoshi Asai, Privacy-Preserving Search for Chemical Compound Databases, GIW/InCoB 2015 (Joint 26th Genome Informatics Workshop and 14th International Conference on Bioinformatics), Tokyo, Japan, September 9, 2015
  28. *Kazumasa Shinagawa, Takaaki Mizuki, Jacob C. N. Schuldt, Koji Nuida, Naoki Kanayama, Takashi Nishide, Goichiro Hanaoka, Eiji Okamoto, Multi-Party Computation with Small Shuffle Complexity Using Regular Polygon Cards, The Ninth International Copnference on Provable Security (ProvSec 2015), Kanazawa, Japan, November 25, 2015
  29. [Poster] *Yu Ishimaki, Kana Shimizu, Koji Nuida, Hayato Yamana, Privacy-Preserving String Search for Genome Sequences using Fully Homomorphic Encryption, 37th IEEE Symposium on Security and Privacy (IEEE S&P 2016), San Jose, USA, May 23, 2016
  30. *Kazumasa Shinagawa, Koji Nuida, Takashi Nishide, Goichiro Hanaoka, Eiji Okamoto, Committed AND Protocol Using Three Cards with More Handy Shuffle, The 2016 International Symposium on Information Theory and Its Applications (ISITA 2016), Monterey, USA, November 2, 2016
  31. *Kazumasa Shinagawa, Koji Nuida, Takashi Nishide, Goichiro Hanaoka, Eiji Okamoto, Size-Hiding Computation for Multiple Parties, ASIACRYPT 2016, Hanoi, Vietnam, December 8, 2016
  32. *Koichiro Akiyama, Yasuhiro Goto, Shinya Okumura, Tsuyoshi Takagi, Koji Nuida, Goichiro Hanaoka, A Public-key Encryption Scheme based on Non-linear Indeterminate Equations, SAC 2017, Ottawa, Canada, August 17, 2017
  33. [Short paper] *Baptiste Vinh Mau, Koji Nuida, Correction of a Secure Comparison Protocol for Encrypted Integers in IEEE WIFS 2012, IWSEC 2017, Hiroshima, Japan, September 1, 2017
  34. *Hiroki Sudo, Masanobu Jimbo, Koji Nuida, Kana Shimizu, Secure Wavelet Matrix: Alphabet-Friendly Privacy-Preserving String Search for Bioinformatics, GIW / BIOINFO 2017, Seoul, Korea, October 31, 2017
  35. *Yuji Hashimoto, Kazumasa Shinagawa, Koji Nuida, Masaki Inamura, Goichiro Hanaoka, Secure Grouping Protocol Using a Deck of Cards, ICITS 2017, Hong Kong, China, December 2, 2017
  36. *Hiraku Morita, Nuttapong Attrapadung, Tadanori Teruya, Satsuya Ohata, Koji Nuida, Goichiro Hanaoka, Constant-Round Client-Aided Secure Comparison Protocol, ESORICS 2018, Barcelona, Spain, September 5, 2018
  37. *Hiraku Morita, Nuttapong Attrapadung, Satsuya Ohata, Shota Yamada, Koji Nuida, Goichiro Hanaoka, Tree-Based Secure Comparison of Secret Shared Data, The 2018 International Symposium on Information Theory and Its Applications (ISITA 2018), Singapore, October 31, 2018
  38. *Hiraku Morita, Nuttapong Attrapadung, Satsuya Ohata, Koji Nuida, Shota Yamada, Kana Shimizu, Goichiro Hanaoka, Kiyoshi Asai, Secure Division Protocol and Applications to Privacy-Preserving Chi-Squared Tests, The 2018 International Symposium on Information Theory and Its Applications (ISITA 2018), Singapore, October 31, 2018
  39. *Hiroki Sudo, Koji Nuida, Kana Shimizu, An Efficient Private Evaluation of a Decision Graph, ICISC 2018, Seoul, Korea, November 28, 2018
  40. *Kazuto Ogawa, Koji Nuida, Privacy Preservation for Versatile Pay-TV Services, 21st International Conference on Human-Computer Interaction (HCI International 2019), Florida, USA, July 30, 2019
  41. *Satsuya Ohata, Koji Nuida, Communication-Efficient (Client-Aided) Secure Two-Party Protocols and Its Application, Financial Cryptography and Data Security 2020, Sabah, Malaysia, February 12, 2020
  42. *Kota Sasaki, Koji Nuida, Efficiency and Accuracy Improvements of Secure Floating-Point Addition over Secret Sharing, IWSEC 2020, Fukui, Japan, September 2, 2020 (held online due to COVID-19)
  43. *Keitaro Hiwatashi, Satsuya Ohata, Koji Nuida, An Efficient Secure Division Protocol Using Approximate Multi-Bit Product and New Constant-Round Building Blocks, ACNS 2020, Rome, Italy, October 20, 2020 (held online due to COVID-19)
  44. *Reo Eriguchi, Noboru Kunihiro, Koji Nuida, A Linear Algebraic Approach to Strongly Secure Ramp Secret Sharing for General Access Structures, The 2020 International Symposium on Information Theory and Its Applications (ISITA 2020), Hawai'i, USA, October 24, 2020 (held online due to COVID-19)
  45. *Mriganka Mandal, Koji Nuida, Identity-based Outsider Anonymous Broadcast Encryption with Simultaneous Individual Messaging, 14th International Conference on Network and System Security (NSS 2020), Melbourne, Australia, November 26, 2020 (held online due to COVID-19)
  46. *Kaisei Kajita, Kazuto Ogawa, Koji Nuida, Tsuyoshi Takagi, Short Lattice Signatures in the Standard Model with Efficient Tag Generation, ProvSec 2020, Singapore, November 30, 2020 (held online due to COVID-19)
  47. *Reo Eriguchi, Atsunori Ichikawa, Noboru Kunihiro, Koji Nuida, Efficient Noise Generation to Achieve Differential Privacy with Applications to Secure Multiparty Computation, Financial Cryptography and Data Security: FC 2021, Grenada, March 1, 2021 (held online due to COVID-19)
  48. Koji Nuida, Cryptographic Pseudorandom Generators Can Make Cryptosystems Problematic, PKC 2021, Online, May 11, 2021
  49. *Keitaro Hiwatashi, Ken Ogura, Satsuya Ohata, Koji Nuida, Accelerating Secure (2+1)-Party Computation by Insecure but Efficient Building Blocks, ACM ASIACCS 2021, Hong Kong, China, June 9, 2021 (held online due to COVID-19)
  50. *Reo Eriguchi, Kazuma Ohara, Shota Yamada, Koji Nuida, Non-Interactive Secure Multiparty Computation for Symmetric Functions, Revisited: More Efficient Constructions and Extensions, CRYPTO 2021, Online, August 17, 2021
  51. *Yuji Hashimoto, Koji Nuida, Improved Supersingularity Testing of Elliptic Curves Using Legendre Form, Computer Algebra in Scientific Computing 2021 (CASC 2021), Sochi, Russia, September 16, 2021 (online/offline hybrid due to COVID-19)
  52. *Reo Eriguchi, Koji Nuida, Homomorphic Secret Sharing for Multipartite and General Adversary Structures Supporting Parallel Evaluation of Low-Degree Polynomials, ASIACRYPT 2021, Online, December 6, 2021
  53. *Mriganka Mandal, Ramprasad Sarkar, Junbeom Hur, Koji Nuida, Efficient Fully Anonymous Public-Key Trace and Revoke with Adaptive IND-CCA Security, ISPEC 2021, Nanjing, China, December 19, 2021 (held online due to COVID-19)
  54. Koji Nuida, How to Handle Invalid Queries for Malicious-Private Protocols Based on Homomorphic Encryption, APKC 2022 (The 9th ACM ASIA Public-Key Cryptography Workshop), Nagasaki, Japan, May 30, 2022
  55. *Reo Eriguchi, Kaoru Kurosawa, Koji Nuida, Multi-Server PIR with Full Error Detection and Limited Error Correction, ITC 2022, Boston, USA, July 7, 2022
  56. *Hirotomo Shinoki, Koji Nuida, On Extension of Evaluation Algorithms in Keyed-Homomorphic Encryption, IWSEC 2022, Tokyo, Japan, September 2, 2022
  57. *Nariyasu Heseri, Koji Nuida, Computational Irrelevancy: Bridging the Gap between Pseudo- and Real Randomness in MPC Protocols, IWSEC 2022, Tokyo, Japan, September 2, 2022
  58. *Anastasiia Doi, Tomoki Ono, Takeshi Nakai, Kazumasa Shinagawa, Yohei Watanabe, Koji Nuida, Mitsugu Iwamoto, Card-based Cryptographic Protocols for Private Set Intersection, ISITA 2022, Ibaraki, Japan, October 19, 2022
  59. *Reo Eriguchi, Kaoru Kurosawa, Koji Nuida, On the Optimal Communication Complexity of Error-Correcting Multi-Server PIR, TCC 2022, Chicago, USA, November 10, 2022
  60. *Yusaku Maeda, Koji Nuida, Chosen Ciphertext Secure Keyed Two-Level Homomorphic Encryption, ACISP 2022, Wollongong, Australia, November 29, 2022
  61. *Keitaro Hiwatashi, Koji Nuida, Exponential Correlated Randomness is Necessary in Communication-Optimal Perfectly Secure Two-Party Computation, ITC 2023, Aarhus University, Denmark, June 6, 2023
  62. *Keitaro Hiwatashi, Koji Nuida, Explicit and Nearly Tight Lower Bound for 2-party Perfectly Secure FSS, ACNS 2023, Kyoto, Japan, June 22, 2023
  63. Koji Nuida, Efficient Card-Based Millionaires' Protocols via Non-Binary Input Encoding, IWSEC 2023, Institute of Information Security, Japan, August 29, 2023
  64. *Yukimasa Sugizaki, Hikaru Tsuchida, Takuya Hayashi, Koji Nuida, Akira Nakashima, Toshiyuki Isshiki, Kengo Mori, Threshold Fully Homomorphic Encryption over the Torus, ESORICS 2023, Hague, The Netherlands, September 25, 2023
  65. *Kazumasa Shinagawa, Koji Nuida, Explicit Lower Bounds for Communication Complexity of PSM for Concrete Functions, INDOCRYPT 2023, Birla Institute of Technology & Science (BITS) Pilani, India, December 11, 2023
  66. *Reo Eriguchi, Kaoru Kurosawa, Koji Nuida, Efficient and Generic Methods to Achieve Active Security in Private Information Retrieval and More Advanced Database Search, EUROCRYPT 2024, Zurich, Switzerland, May 29, 2024
  67. *Kazumasa Shinagawa, Kazuki Kanai, Kengo Miyamoto, Koji Nuida, How to Covertly and Uniformly Scramble the 15 Puzzle and Rubik's Cube, FUN 2024 (12th International Conference on Fun with Algorithms), Sardinia, Italy, June 5, 2024
  68. *Akira Nakashima, Yukimasa Sugizaki, Hikaru Tsuchida, Takuya Hayashi, Koji Nuida, Kengo Mori, Toshiyuki Isshiki, Multi-Key Homomorphic Encryption with Threshold Re-Encryption, SAC 2024, Université de Québec à Montréal, Canada, August 29, 2024

Non-Refereed

  1. Koji Nuida, On the isomorphism problem of Coxeter groups, The Mittag-Leffler Seminar, Institut Mittag-Leffler, Sweden, February 22, 2005
  2. Koji Nuida, Almost central involutions in split extensions of Coxeter groups by graph automorphisms, International Symposium on Finite Groups and Related Topics, Curreac (Hamanako Training Facility), Japan, March 21, 2006
  3. Koji Nuida, Homomorphic encryption, its applications and related mathematical topics, Pure Math Colloquium, University of Southampton, England, August 12, 2014
  4. Koji Nuida, Fully Homomorphic Encryption: A Short Introduction, Japanese-Finnish Seminar on Privacy-Aware Data Analysis and Information Security, Aalto University, Finland, January 7, 2015
  5. Koji Nuida, Semi-Honest Secure Multiparty Computation Can Be Insecure with Use of Even Almost Uniformly Random Number Generators, IWSEC 2017 Poster Session, Hiroshima, Japan, August 30, 2017
  6. Koji Nuida, Towards Constructing Fully Homomorphic Encryption from Combinatorial Group Theory, Algebra Seminar, University of Giessen, Germany, March 23, 2018
  7. *Yuan Mei, Koji Nuida, Improvement of Integer Factorization with Elliptic Curve and Complex Multiplication Method, IWSEC 2019 Poster Session, Tokyo Institute of Technology, Japan, August 28, 2019

Awards

  1. Prize for Science and Technology (Research Category) in the Commendation for Science and Technology by the Minister of Education, Culture, Sports, Science and Technology in 2018, "Research on advanced cryptosystems and their applications to secure database search", Goichiro Hanaoka, Kana Shimizu, Koji Nuida, awarded by Ministry of Education, Culture, Sports, Science and Technology, Japan, April 17, 2018
  2. IWSEC 2020 Best Paper Award, "Efficiency and Accuracy Improvements of Secure Floating-Point Addition over Secret Sharing", Kota Sasaki, Koji Nuida, September 2, 2020
  3. IWSEC 2020 Best Student Paper Award, "Efficiency and Accuracy Improvements of Secure Floating-Point Addition over Secret Sharing", Kota Sasaki, Koji Nuida, September 2, 2020
  4. The Okawa Publications Prize, 30th, "Post-Quantum Cryptography" (in Japanese), Koji Nuida, March 2, 2022 (Web Page (in Japanese)) (Photo)
  5. IWSEC 2022 Best Student Paper Award ("On Extension of Evaluation Algorithms in Keyed-Homomorphic Encryption"), Hirotomo Shinoki, Koji Nuida, September 2, 2022 (award certificate)

(Related Information)

Grants

  1. April 1, 2008 -- March 31, 2009: 2007 Research Grants of the Science and Technology Foundation of Japan (JSTF) (Total: 1,000,000 JPY)
  2. April 1, 2008 -- March 31, 2012: Grant-in-Aid for Young Scientists (B), The Ministry of Education, Culture, Sports, Science and Technology (MEXT) (No.20700017) (Total: 3,100,000 JPY)
  3. October 1, 2014 -- March 31, 2018: PRESTO, Japan Science and Technology Agency (JST) (Total: 10,000,000 JPY)
  4. February 1, 2019 -- March 31, 2022: SCOPE, Ministry of Internal Affairs and Communications (MIC) (Total: 21,470,000 JPY)
  5. April 1, 2019 -- March 31, 2022: Grant-in-Aid for Scientific Research (B), Japan Society for the Promotion of Science (JSPS) (No.19H01804) (Total: 13,300,000 JPY)
  6. April 1, 2022 -- March 31, 2025: Grant-in-Aid for Scientific Research (C), Japan Society for the Promotion of Science (JSPS) (No.22K11906) (Total: 3,100,000 JPY)

Committee Members, etc.

International Conferences

  1. Updating Quantum Cryptography 2007 (UQC 2007) Local Staff, Tokyo, Japan, October 1--3, 2007
  2. 2008 ACM Symposium on Information, Computer and Communications Security (ASIACCS'08) Local Staff, Tokyo, Japan, March 18--20, 2008
  3. The 4th International Conference on Information Theoretic Security (ICITS 2009) Local Staff, Shizuoka, Japan, December 3--6, 2009
  4. The 5th International Workshop on Security (IWSEC 2010) Publicity co-Chair, Kobe, Japan, November 22--24, 2010
  5. IEEE International Conference on Communications (IEEE ICC 2011) Communications and Information System Security Symposium (CISS) TPC Member, Kyoto, Japan, June 5--9, 2011
  6. The 7th International Wireless Communications and Mobile Computing Conference (IWCMC 2011) Trust, Privacy and Security Symposium (TPS) TPC Member, Istanbul, Turkey, July 5--8, 2011
  7. The 6th International Workshop on Security (IWSEC 2011) Publicity co-Chair, Tokyo, Japan, November 8--10, 2011
  8. International Conference on Security in Computer Networks and Distributed Systems (SNDS 2012) TPC Member, Trivandrum, India, October 11--12, 2012
  9. The 8th International Workshop on Security (IWSEC 2013) Publicity Chair, Okinawa, Japan, November 18--20, 2013
  10. 8th International Conference on Information-Theoretic Security (ICITS 2015) Program Committee, Lugano, Switzerland, May 2--5, 2015
  11. Privacy-Aware Computational Genomics 2015 (PRIVAGEN 2015) Program Committee, Tokyo, Japan, September 8, 2015
  12. 9th International Conference on Information-Theoretic Security (ICITS 2016) Program Committee, Tacoma, USA, August 9--12, 2016
  13. Private and Secure Machine Learning 2017 (PSML 2017) Program Committee, Sydney, Australia, August 11, 2017
  14. The 21th Annual International Conference on Information Security and Cryptology (ICISC 2018) Program Committee, Seoul, Korea, November 28--30, 2018
  15. The International Symposium on Information Theory and Its Applications 2020 (ISITA 2020) Technical Program Committee, Hawai'i, USA, October 24--27, 2020
  16. International Conference on Security & Privacy 2020 (ICSP 2020) Technical Program Committee, Jamshedpur, India, November 5--6, 2020
  17. ACM ASIACCS 2021 Program Committee, Hong Kong, China, June 7--11, 2021
  18. IWSEC 2021 Program Committee, Tokyo, Japan, September 8--10, 2021
  19. ACISP 2021 Program Committee, Perth, Australia, December 1--3, 2021
  20. IWSEC 2022 Program Committee, Tokyo, Japan, August 31--September 2, 2022
  21. FHE.org Conference 2023 Program Committee, Tokyo, Japan, March 26, 2023
  22. ACISP 2025 Program Committee, Wollongong, Australia, July 14--16, 2025

International Journals

  1. IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences Guest Associate Editor (Special Section on Discrete Mathematics and Its Applications, September 2019)
  2. IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences Guest Editor (Special Section on Discrete Mathematics and Its Applications, October 2020)
  3. IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences Associate Editor, June 2020 -- June 2024
  4. Journal of Information Processing Editorial Committee (Special issue of Computer Security Technologies for Realizing Society 5.0, September 2021)
  5. IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences Guest Associate Editor (Special Section on Discrete Mathematics and Its Applications, September 2021)
  6. IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences Guest Associate Editor (Special Section on Information Theory and Its Applications, March 2022)
  7. International Journal of Mathematics for Industry Editor, June 2023 --
  8. IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences Guest Associate Editor (Special Section on Discrete Mathematics and Its Applications, September 2024)
  9. IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences Guest Associate Editor (Special Section on Discrete Mathematics and Its Applications, September 2025)