Japanese version

Works of Koji NUIDA

Ascending order in date.
If more than one authors exist,
Writings   Talks   Grants   Committee Members, etc.
To index page

Writings

Refereed Journal Papers

  1. Koji Nuida, On the direct indecomposability of infinite irreducible Coxeter groups and the Isomorphism Problem of Coxeter groups, Communications in Algebra vol.34, no.7 (2006) 2559--2595
    (online version DOI: 10.1080/00927870600651281) (preprint on arXiv) (preprint backup)
  2. Koji Nuida, Almost central involutions in split extensions of Coxeter groups by graph automorphisms, Journal of Group Theory vol.10, no.2, (2007) 139--166
    (online version DOI: 10.1515/JGT.2007.011) (preprint on arXiv) (preprint backup)
  3. *Koji Nuida, Satoshi Fujitsu, Manabu Hagiwara, Hideki Imai, Takashi Kitagawa, Kazuto Ogawa, Hajime Watanabe, An efficient 2-secure and short random fingerprint code and its security evaluation, IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences vol.E92-A, no.1, Special Section on Cryptography and Information Security (2009) 197--206
    (online version)
  4. *Koji Nuida, Satoshi Fujitsu, Manabu Hagiwara, Takashi Kitagawa, Hajime Watanabe, Kazuto Ogawa, Hideki Imai, An improvement of discrete Tardos fingerprinting codes, Designs, Codes and Cryptography vol.52, no.3 (2009) 339--362
    (online version DOI: 10.1007/s10623-009-9285-z) (preprint on IACR Archive) (preprint backup)
  5. *Takuro Abe, Koji Nuida, Yasuhide Numata, Signed-eliminable graphs and free multiplicities on the braid arrangement, Journal of the London Mathematical Society (2) vol.80, no.1 (2009) 121--134
    (online version DOI: 10.1112/jlms/jdp019) (preprint on arXiv) (preprint backup)
  6. Koji Nuida, A characterization of signed graphs with generalized perfect elimination orderings, Discrete Mathematics vol.310, no.4 (2010) 819--831
    (online version DOI: 10.1016/j.disc.2009.09.019) (preprint on arXiv) (preprint backup)
  7. Koji Nuida, Pattern occurrence in the dyadic expansion of square root of two and an analysis of pseudorandom number generators, Electronic Journal of Combinatorial Number Theory vol.10 (2010) 111--127
    (online version) (preprint on arXiv) (preprint backup)
  8. *Koji Nuida, Gen Kimura, Takayuki Miyadera, Optimal observables for minimum-error state discrimination in general probabilistic theories, Journal of Mathematical Physics, vol.51 (2010) 093505
    (online version DOI: 10.1063/1.3479008) (preprint on arXiv) (preprint backup)
  9. *Gen Kimura, Koji Nuida, Hideki Imai, Distinguishability measures and entropies for general probabilistic theories, Reports on Mathematical Physics, vol.66 (2010) 175--206
    (online version DOI: 10.1016/S0034-4877(10)00025-X) (preprint on arXiv) (preprint backup)
  10. Koji Nuida, On centralizers of parabolic subgroups in Coxeter groups, Journal of Group Theory, vol.14, no.6 (2011) 891--930
    (online version DOI: 10.1515/jgt.2010.088) (preprint on arXiv) (preprint backup)
  11. Koji Nuida, Locally parabolic subgroups in Coxeter groups of arbitrary ranks, Journal of Algebra, vol.350, no.1 (2012) 207--217
    (online version DOI: 10.1016/j.jalgebra.2011.11.005) (preprint on arXiv) (preprint backup)
  12. Koji Nuida, Short collusion-secure fingerprint codes against three pirates, International Journal of Information Security, vol.11, no.2 (2012) 85--102
    (online version DOI: 10.1007/s10207-012-0155-8) (preprint on arXiv) (preprint on IACR Archive) (preprint backup)
  13. *Koji Nuida, Goichiro Hanaoka, On the security of pseudorandomized information-theoretically secure schemes, IEEE Transactions on Information Theory, vol.59, no.1 (2013) 635--652
    (online version DOI: 10.1109/TIT.2012.2216978) (preprint on IACR Archive) (preprint backup)
  14. Koji Nuida, On finite factors of centralizers of parabolic subgroups in Coxeter groups, Tsukuba Journal of Mathematics, vol.36, no.2 (2013) 235--294
    (online version) (preprint on arXiv) (preprint backup)
  15. Gen Kimura, *Koji Nuida, On affine maps on non-compact convex sets and some characterizations of finite-dimensional solid ellipsoids, Journal of Geometry and Physics, vol.86 (2014) 1--18
    (online version DOI: 10.1016/j.geomphys.2014.06.004) (preprint on arXiv) (preprint backup)
  16. *Koji Nuida, Takuro Abe, Shizuo Kaji, Toshiaki Maeno, Yasuhide Numata, A mathematical problem for security analysis of hash functions and pseudorandom generators, International Journal of Foundations of Computer Science, vol.26, no.2 (2015) 169--194
    (online version DOI: 10.1142/S0129054115500100) (preprint on arXiv) (preprint on IACR Archive) (preprint backup)
  17. *Kana Shimizu, Koji Nuida, Hiromi Arai, Shigeo Mitsunari, Nuttapong Attrapadung, Michiaki Hamada, Koji Tsuda, Takatsugu Hirokawa, Jun Sakuma, Goichiro Hanaoka, Kiyoshi Asai, Privacy-Preserving Search for Chemical Compound Databases, BMC Bioinformatics, vol.16(Suppl 18) (2015) S6
    (online version DOI: 10.1186/1471-2105-16-S18-S6) (preprint on bioRxiv)
  18. *Kazumasa Shinagawa, Takaaki Mizuki, Jacob C. N. Schuldt, Koji Nuida, Naoki Kanayama, Takashi Nishide, Goichiro Hanaoka, Eiji Okamoto, Secure Computation Protocols Using Polarizing Cards, IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, vol.E99-A, no.6 (2016) 1122--1131
    (online version)
  19. *Kana Shimizu, Koji Nuida, Gunnar Rätsch, Efficient Privacy-Preserving String Search and an Application in Genomics, Bioinformatics, vol.32, no.11 (2016) 1652--1661
    (online version DOI: 10.1093/bioinformatics/btw050) (preprint on bioRxiv)
  20. *Bernhard Mühlherr, Koji Nuida, Intrinsic Reflections in Coxeter Systems, Journal of Combinatorial Theory, Series A, vol.144 (2016) 326--360
    (online version DOI: 10.1016/j.jcta.2016.06.009) (preprint on arXiv) (preprint backup)
  21. [To Appear] *Kazumasa Shinagawa, Takaaki Mizuki, Jacob C. N. Schuldt, Koji Nuida, Naoki Kanayama, Takashi Nishide, Goichiro Hanaoka, Eiji Okamoto, Card-Based Protocols Using Regular Polygon Cards, to appear in: IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences
Top of this page

Refereed Conference Proceedings

  1. *Manabu Hagiwara, Koji Nuida, Takashi Kitagawa, Marc Fossorier, Hideki Imai, On minimal length of quasi cyclic LDPC codes with girth greater than or equal to 6, in: Proceedings of the 2006 International Symposium on Information Theory and its Applications (ISITA2006), CD-ROM, October 2006
  2. *Koji Nuida, Manabu Hagiwara, Takashi Kitagawa, Hajime Watanabe, Kazuto Ogawa, Satoshi Fujitsu, Hideki Imai, A tracing algorithm for short 2-secure probabilistic fingerprinting codes strongly protecting innocent users, in: Proceedings of 4th IEEE Consumer Communications and Networking Conference (IEEE CCNC 2007), January 2007, pp.1068--1072
    (online version DOI: 10.1109/CCNC.2007.215)
  3. *Koji Nuida, Manabu Hagiwara, Hajime Watanabe, Hideki Imai, Optimization of Tardos's fingerprinting codes in a viewpoint of memory amount, in: T. Furon, F. Cayre, G. Doerr, P. Bas (Eds.), Information Hiding (IH 2007), LNCS 4567, June 2007, pp.279--293
    (online version DOI: 10.1007/978-3-540-77370-2_19) (full-version preprint)
  4. *Koji Nuida, Satoshi Fujitsu, Manabu Hagiwara, Takashi Kitagawa, Hajime Watanabe, Kazuto Ogawa, Hideki Imai, An improvement of Tardos's collusion-secure fingerprinting codes with very short lengths, in: S. Boztas, H.-F. Lu (Eds.), Applied Algebra, Algebraic Algorithms and Error-Correcting Codes (AAECC-17), LNCS 4851, December 2007, pp.80--89
    (online version DOI: 10.1007/978-3-540-77224-8_12) (full version)
  5. *Takashi Kitagawa, Manabu Hagiwara, Koji Nuida, Hajime Watanabe, Hideki Imai, A group testing based deterministic tracing algorithm for a short random fingerprint code, in: Proceedings of the 2008 International Symposium on Information Theory and its Applications (ISITA 2008), CD-ROM, December 2008
  6. Koji Nuida, Bounds on fixed-length post-processing functions for stationary biased random number generators, in: Proceedings of the 2008 International Symposium on Information Theory and its Applications (ISITA 2008), CD-ROM, December 2008
  7. Koji Nuida, An improvement of short 2-secure fingerprint codes strongly avoiding false-positive, in: S. Katzenbeisser, A.-R. Sadeghi (Eds.), Information Hiding (IH 2009), LNCS 5806, June 2009, pp.161--175
    (online version DOI: 10.1007/978-3-642-04431-1_12)
  8. Takuro Abe, *Koji Nuida, Yasuhide Numata, An edge-signed generalization of chordal graphs, free multiplicities on braid arrangements, and their characterizations, in: Proceedings of 21st International Conference on Formal Power Series and Algebraic Combinatorics (FPSAC 2009), Discrete Mathematics and Theoretical Computer Science, July 2009, pp.1--12
    (online version) (full version)
  9. Koji Nuida, Bounds of asymptotic occurrence rates of some patterns in binary words related to integer-valued logistic maps, in: Proceedings of 21st International Conference on Formal Power Series and Algebraic Combinatorics (FPSAC 2009), Discrete Mathematics and Theoretical Computer Science, July 2009, pp.709--720
    (online version)
  10. Koji Nuida, An error-tolerant variant of a short 2-secure fingerprint code and its security evaluation, in: T. Takagi, M. Mambo (Eds.), IWSEC 2009, LNCS 5824, October 2009, pp.140--157
    (online version DOI: 10.1007/978-3-642-04846-3_10)
  11. *Koji Nuida, Goichiro Hanaoka, On the security of pseudorandomized information-theoretically secure schemes, in: K. Kurosawa (Ed.), ICITS 2009, LNCS 5973, September 2010, pp.56--73
    (online version DOI: 10.1007/978-3-642-14496-7_6) (full version)
  12. Koji Nuida, A general conversion method of fingerprint codes to (more) robust fingerprint codes against bit erasure, in: K. Kurosawa (Ed.), ICITS 2009, LNCS 5973, September 2010, pp.194--212
    (online version DOI: 10.1007/978-3-642-14496-7_16) (full-version preprint)
  13. *Koji Nuida, Goichiro Hanaoka, An improvement of pseudorandomization against unbounded attack algorithms - the case of fingerprint codes, in: K. Kurosawa (Ed.), ICITS 2009, LNCS 5973, September 2010, pp.213--230
    (online version DOI: 10.1007/978-3-642-14496-7_17) (full version)
  14. Koji Nuida, Short collusion-secure fingerprint codes against three pirates, in: R. Böhme, P.W.L. Fong, R. Safavi-Naini (Eds.), Information Hiding (IH 2010), LNCS 6387, October 2010, pp.86--102
    (online version DOI: 10.1007/978-3-642-16435-4_8) (full version)
  15. *Koji Nuida, Takuro Abe, Shizuo Kaji, Toshiaki Maeno, Yasuhide Numata, A mathematical problem for security analysis of hash functions and pseudorandom generators, in: T. Iwata, M. Nishigaki (Eds.), IWSEC 2011, LNCS 7038, November 2011, pp.144--160
    (online version DOI: 10.1007/978-3-642-25141-2_10 (full version)
  16. *Takashi Yamakawa, Shota Yamada, Koji Nuida, Goichiro Hanaoka, Noboru Kunihiro, Chosen ciphertext security on hard membership decision groups: The case of semi-smooth subgroups of quadratic residues, in: M. Abdalla, R. De Prisco (Eds.), SCN 2014, LNCS 8642, September 2014, pp.558--577
    (online version DOI: 10.1007/978-3-319-10879-7_32)
  17. Koji Nuida, How to Use Pseudorandom Generators in Unconditional Security Settings, in: S. S. M. Chow, J. K. Liu, L. C. K. Hui, S. M. Yiu (Eds.), ProvSec 2014, LNCS 8782, October 2014, pp.291--299 (short paper)
    (online version DOI: 10.1007/978-3-319-12475-9_20)
  18. *Koji Nuida, Naoto Itakura, Kaoru Kurosawa, A Simple and Improved Algorithm for Integer Factorization with Implicit Hints, in: K. Nyberg (Ed.), CT-RSA 2015, LNCS 9048, April 2015, pp.258--269
    (online version DOI: 10.1007/978-3-319-16715-2_14) (preprint on IACR Archive)
  19. *Koji Nuida, Kaoru Kurosawa, (Batch) Fully Homomorphic Encryption over Integers for Non-Binary Message Spaces, in: E. Oswald, M. Fischlin (Eds.), EUROCRYPT 2015 (Part I), LNCS 9056, April 2015, pp.537--555
    (online version DOI: 10.1007/978-3-662-46800-5_21) (preprint on IACR Archive)
  20. *Tadanori Teruya, Koji Nuida, Kana Shimizu, Goichiro Hanaoka, On Limitations and Alternatives of Privacy-Preserving Cryptographic Protocols for Genomic Data, in: K. Tanaka, Y. Suga (Eds.), IWSEC 2015, LNCS 9241, August 2015, pp.242--261
    (online version DOI: 10.1007/978-3-319-22425-1_15)
  21. *Kazumasa Shinagawa, Takaaki Mizuki, Jacob C. N. Schuldt, Koji Nuida, Naoki Kanayama, Takashi Nishide, Goichiro Hanaoka, Eiji Okamoto, Secure Multi-Party Computation Using Polarizing Cards, in: K. Tanaka, Y. Suga (Eds.), IWSEC 2015, LNCS 9241, August 2015, pp.281--297
    (online version DOI: 10.1007/978-3-319-22425-1_17) (full version)
  22. *Kazumasa Shinagawa, Takaaki Mizuki, Jacob C. N. Schuldt, Koji Nuida, Naoki Kanayama, Takashi Nishide, Goichiro Hanaoka, Eiji Okamoto, Multi-Party Computation with Small Shuffle Complexity Using Regular Polygon Cards, in: M.-H. Au, A. Miyaji (Eds.), ProvSec 2015, LNCS 9451, November 2015, pp.127--146
    (online version DOI: 10.1007/978-3-319-26059-4_7)
  23. *Kazumasa Shinagawa, Koji Nuida, Takashi Nishide, Goichiro Hanaoka, Eiji Okamoto, Committed AND Protocol Using Three Cards, in: Proceedings of the 2016 International Symposium on Information Theory and Its Applications (ISITA 2016) (digital media), October 2016
  24. *Kazumasa Shinagawa, Koji Nuida, Takashi Nishide, Goichiro Hanaoka, Eiji Okamoto, Size-Hiding Computation for Multiple Parties, in: J. H. Cheon, T. Takagi (Eds.), ASIACRYPT 2016 (Part II), LNCS 10032, December 2016, pp.937--966
    (online version DOI: 10.1007/978-3-662-53890-6_31)
  25. [To Appear] *Baptiste Vinh Mau, Koji Nuida, Correction of a Secure Comparison Protocol for Encrypted Integers in IEEE WIFS 2012, to appear in: IWSEC 2017 (short paper)
  26. [To Appear] *Koichiro Akiyama, Yasuhiro Goto, Shinya Okumura, Tsuyoshi Takagi, Koji Nuida, Goichiro Hanaoka, A Public-key Encryption Scheme based on Non-linear Indeterminate Equations, to appear in: SAC 2017
Top of this page

Books and Book Chapters

  1. Koji Nuida, On the Isomorphism Problem for Coxeter Groups and Related Topics, in: N.S. Narasimha Sastry (Ed.), Groups of Exceptional Type, Coxeter Groups and Related Geometries, Springer Proceedings in Mathematics & Statistics vol.82, April 2014, pp.217--238
    (online version DOI: 10.1007/978-81-322-1814-2_12)
Top of this page

Preprints

  1. Koji Nuida, Centralizers of reflections and reflection-independence of Coxeter groups, e-print arXiv:math.GR/0602165, February 2006
  2. Koji Nuida, A characterization of finitely generated reflection subgroups of Coxeter groups orthogonal to a reflection, e-print arXiv:math.GR/0603667, March 2006
  3. *Koji Nuida, Manabu Hagiwara, Hajime Watanabe, Hideki Imai, Optimization of memory usage in Tardos's fingerprinting codes, e-print arXiv:cs.CR/0610036, October 2006
  4. Koji Nuida, Pattern occurrence in the dyadic expansion of square root of two and an analysis of pseudorandom number generators, e-print arXiv:0909.3388, September 2009 (full version)
  5. Koji Nuida, Making collusion-secure codes (more) robust against bit erasure, Cryptology ePrint Archive 2009/549, November 2009
  6. *Gen Kimura, Koji Nuida, Hideki Imai, Physical equivalence of pure states and derivation of qubit in general probabilistic theories, e-print arXiv:1012.5361, December 2010
  7. Koji Nuida, On pseudorandomization of information-theoretically secure schemes without hardness assumptions, Cryptology ePrint Archive 2012/505, September 2012
  8. *Keita Emura, Goichiro Hanaoka, Koji Nuida, Go Ohtake, Takahiro Matsuda, Shota Yamada, Chosen Ciphertext Secure Keyed-Homomorphic Public-Key Encryption, Cryptology ePrint Archive 2013/390, June 2013
  9. Koji Nuida, Candidate Constructions of Fully Homomorphic Encryption on Finite Simple Groups without Ciphertext Noise, Cryptology ePrint Archive 2014/097, February 2014
  10. *Koji Nuida, Goichiro Hanaoka, Takahiro Matsuda, Tree-Structured Composition of Homomorphic Encryption: How to Weaken Underlying Assumptions, Cryptology ePrint Archive 2014/950, November 2014
  11. Shizuo Kaji, Toshiaki Maeno, *Koji Nuida, Yasuhide Numata, Polynomial Expressions of Carries in p-ary Arithmetics, e-print arXiv:1506.02742, June 2015
  12. *Hiroki Sudo, Masanobu Jimbo, Koji Nuida, Kana Shimizu, Secure Wavelet Matrix: Alphabet-Friendly Privacy-Preserving String Search bioRxiv 085647, November 2016 (DOI: 10.1101/085647)
  13. Koji Nuida, Semi-Honest Secure Multiparty Computation Can Be Insecure with Use of Even Almost Uniformly Random Number Generators, Cryptology ePrint Archive 2016/1040, November 2016
  14. Shizuo Kaji, Toshiaki Maeno, *Koji Nuida, Yasuhide Numata, Polynomial Expressions of p-ary Auction Functions, e-print arXiv:1703.07930, March 2017
Top of this page

Theses

Master's thesis
On centralizers of parabolic subgroups in Coxeter groups, Graduate School of Mathematical Sciences, Univ. Tokyo, March 2003.
Ph.D. thesis
On the isomorphism problem of Coxeter groups and related topics, Graduate School of Mathematical Sciences, Univ. Tokyo, March 2006. (dvi file)
Top of this page

Miscellaneous

  1. *Takuro Abe, Koji Nuida, Yasuhide Numata, Bicolor-eliminable graphs and free multiplicities on the braid arrangement, Hokkaido University Preprint Series in Mathematics, No.893, February 2008
Top of this page

Talks

Invited Talks at International Conferences

  1. Koji Nuida, On the isomorphism problem for Coxeter groups and related topics, I, Workshop and Conference on Groups and Geometries, Indian Statistical Institute, Bangalore, India, December 18, 2012
  2. Koji Nuida, On the isomorphism problem for Coxeter groups and related topics, II, Workshop and Conference on Groups and Geometries, Indian Statistical Institute, Bangalore, India, December 20, 2012
  3. Koji Nuida, A Simple Framework for Noise-Free Construction of Fully Homomorphic Encryption from a Special Class of Non-Commutative Groups, Conference on Mathematics of Cryptography, University of California, Irvine, California, USA, September 1, 2015
  4. Koji Nuida, Towards Fully Homomorphic Encryption on Finite Simple Groups without Ciphertext Noise, Colloquium Coding Theory and Cryptography, Brussels, Belgium, November 21, 2016

International Conferences

Refereed

  1. [Poster] Koji Nuida, On the isomorphism problem, indecomposability and the automorphism groups of Coxeter groups, 17th International Conference on Formal Power Series and Algebraic Combinatorics (FPSAC 2005), University of Messina, Italy, June 21, 2005
  2. *Manabu Hagiwara, Koji Nuida, Takashi Kitagawa, Marc Fossorier, Hideki Imai, On minimal length of quasi cyclic LDPC codes with girth greater than or equal to 6, The 2006 International Symposium on Information Theory and its Applications (ISITA2006), Seoul, Korea, October 31, 2006
  3. *Koji Nuida, Manabu Hagiwara, Takashi Kitagawa, Hajime Watanabe, Kazuto Ogawa, Satoshi Fujitsu, Hideki Imai, A tracing algorithm for short 2-secure probabilistic fingerprinting codes strongly protecting innocent users, 4th Annual IEEE Consumer Communications and Networking Conference (CCNC 2007) DRM Workshop, Nevada, USA, January 11, 2007
  4. *Koji Nuida, Manabu Hagiwara, Hajime Watanabe, Hideki Imai, Optimization of Tardos's fingerprinting codes in a viewpoint of memory amount, 9th Information Hiding (IH 2007), Saint Malo, France, June 13, 2007
  5. *Satoshi Fujitsu, Manabu Hagiwara, Hideki Imai, Takashi Kitagawa, Koji Nuida, Kazuto Ogawa, Hajime Watanabe, An efficient tracing algorithm for a 2-secure and short random fingerprint code, 2007 International Workshop on Information Hiding and Digital Watermarking, IFIPTM 2007 Workshop, Moncton, Canada, July 30, 2007
  6. *Koji Nuida, Satoshi Fujitsu, Manabu Hagiwara, Takashi Kitagawa, Hajime Watanabe, Kazuto Ogawa, Hideki Imai, An improvement of Tardos's collusion-secure fingerprinting codes with very short lengths, Applied Algebra, Algebraic Algorithms and Error-Correcting Codes (AAECC-17), Bangalore, India, December 17, 2007
  7. *Takashi Kitagawa, Manabu Hagiwara, Koji Nuida, Hajime Watanabe, Hideki Imai, A group testing based deterministic tracing algorithm for a short random fingerprint code, 2008 International Symposium on Information Theory and its Applications (ISITA 2008), Auckland, New Zealand, December 9, 2008
  8. *Koji Nuida, Bounds on fixed-length post-processing functions for stationary biased random number generators, 2008 International Symposium on Information Theory and its Applications (ISITA 2008), Auckland, New Zealand, December 10, 2008
  9. [Poster] *Koji Nuida, Gen Kimura, Takayuki Miyadera, Hideki Imai, On minimum-error state discrimination problems in generic probability models, The Twelfth Workshop on Quantum Information Processing (QIP 2009), New Mexico, USA, January 14, 2009
  10. Koji Nuida, An improvement of short 2-secure fingerprint codes strongly avoiding false-positive, 11th Information Hiding (IH 2009), Darmstadt, Germany, June 9, 2009
  11. [Poster] Koji Nuida, Bounds of asymptotic occurrence rates of some patterns in binary words related to integer-valued logistic maps, 21st International Conference on Formal Power Series and Algebraic Combinatorics (FPSAC 2009), Hagenberg, Austria, July 20, 2009
  12. [Poster] Takuro Abe, Koji Nuida, *Yasuhide Numata, An edge-signed generalization of chordal graphs, free multiplicities on braid arrangements, and their characterizations, 21st International Conference on Formal Power Series and Algebraic Combinatorics (FPSAC 2009), Hagenberg, Austria, July 20, 2009
  13. Koji Nuida, An error-tolerant variant of a short 2-secure fingerprint code and its security evaluation, The 4th International Workshop on Security (IWSEC 2009), Toyama, Japan, October 29, 2009
  14. *Koji Nuida, Goichiro Hanaoka, On the security of pseudorandomized information-theoretically secure schemes, The 4th International Conference on Information Theoretic Security (ICITS 2009), Shizuoka, Japan, December 4, 2009
  15. Koji Nuida, A general conversion method of fingerprint codes to (more) robust fingerprint codes against bit erasure, The 4th International Conference on Information Theoretic Security (ICITS 2009), Shizuoka, Japan, December 6, 2009
  16. *Koji Nuida, Goichiro Hanaoka, An improvement of pseudorandomization against unbounded attack algorithms - the case of fingerprint codes, The 4th International Conference on Information Theoretic Security (ICITS 2009), Shizuoka, Japan, December 6, 2009
  17. Koji Nuida, Short collusion-secure fingerprint codes against three pirates, The 12th Information Hiding (IH 2010), Calgary, Canada, June 28, 2010
  18. [Poster] *Koji Nuida, Gen Kimura, Hideki Imai, On derivation of qubit systems from physical principles, 14th Workshop on Quantum Information Processing (QIP 2011), Sentosa, Singapore, January 10, 2011
  19. *Koji Nuida, Takuro Abe, Shizuo Kaji, Toshiaki Maeno, Yasuhide Numata, A mathematical problem for security analysis of hash functions and pseudorandom generators, The 6th International Workshop on Security (IWSEC 2011), Tokyo, Japan, November 9, 2011
  20. *Takashi Yamakawa, Shota Yamada, Koji Nuida, Goichiro Hanaoka, Noboru Kunihiro, Chosen ciphertext security on hard membership decision groups: The case of semi-smooth subgroups of quadratic residues, 9th Conference on Security and Cryptography for Networks (SCN 2014), Amalfi, Italy, September 5, 2014
  21. [Short paper] Koji Nuida, How to Use Pseudorandom Generators in Unconditional Security Settings, The Eighth International Conference on Provable Security (ProvSec 2014), University of Hong Kong, Hong Kong, October 9, 2014
  22. *Koji Nuida, Naoto Itakura, Kaoru Kurosawa, A Simple and Improved Algorithm for Integer Factorization with Implicit Hints, RSA Conference Cryptographers' Track 2015 (CT-RSA 2015), San Francisco, USA, April 23, 2015
  23. *Koji Nuida, Kaoru Kurosawa, (Batch) Fully Homomorphic Encryption over Integers for Non-Binary Message Spaces, EUROCRYPT 2015, Sofia, Bulgaria, April 29, 2015
  24. *Kana Shimizu, Koji Nuida, Gunnar Rätsch, Efficient Privacy-Preserving String Search and an Application in Genomics, Conference on High Throughput Sequencing Algorithms and Applications (HiTSeq 2015), Dublin, Ireland, July 10, 2015
  25. *Tadanori Teruya, Koji Nuida, Kana Shimizu, Goichiro Hanaoka, On Limitations and Alternatives of Privacy-Preserving Cryptographic Protocols for Genomic Data, The 10th International Workshop on Security (IWSEC 2015), Nara, Japan, August 28, 2015
  26. *Kazumasa Shinagawa, Takaaki Mizuki, Jacob C. N. Schuldt, Koji Nuida, Naoki Kanayama, Takashi Nishide, Goichiro Hanaoka, Eiji Okamoto, Secure Multi-Party Computation Using Polarizing Cards, The 10th International Workshop on Security (IWSEC 2015), Nara, Japan, August 28, 2015
  27. *Kana Shimizu, Koji Nuida, Hiromi Arai, Shigeo Mitsunari, Nuttapong Attrapadung, Michiaki Hamada, Koji Tsuda, Takatsugu Hirokawa, Jun Sakuma, Goichiro Hanaoka, Kiyoshi Asai, Privacy-Preserving Search for Chemical Compound Databases, GIW/InCoB 2015 (Joint 26th Genome Informatics Workshop and 14th International Conference on Bioinformatics), Tokyo, Japan, September 9, 2015
  28. *Kazumasa Shinagawa, Takaaki Mizuki, Jacob C. N. Schuldt, Koji Nuida, Naoki Kanayama, Takashi Nishide, Goichiro Hanaoka, Eiji Okamoto, Multi-Party Computation with Small Shuffle Complexity Using Regular Polygon Cards, The Ninth International Copnference on Provable Security (ProvSec 2015), Kanazawa, Japan, November 25, 2015
  29. [Poster] *Yu Ishimaki, Kana Shimizu, Koji Nuida, Hayato Yamana, Privacy-Preserving String Search for Genome Sequences using Fully Homomorphic Encryption, 37th IEEE Symposium on Security and Privacy (IEEE S&P 2016), San Jose, USA, May 23, 2016
  30. *Kazumasa Shinagawa, Koji Nuida, Takashi Nishide, Goichiro Hanaoka, Eiji Okamoto, Committed AND Protocol Using Three Cards, The 2016 International Symposium on Information Theory and Its Applications (ISITA 2016), Monterey, USA, November 2, 2016
  31. *Kazumasa Shinagawa, Koji Nuida, Takashi Nishide, Goichiro Hanaoka, Eiji Okamoto, Size-Hiding Computation for Multiple Parties, ASIACRYPT 2016, Hanoi, Vietnam, December 8, 2016
  32. [To Appear] *Koichiro Akiyama, Yasuhiro Goto, Shinya Okumura, Tsuyoshi Takagi, Koji Nuida, Goichiro Hanaoka, A Public-key Encryption Scheme based on Non-linear Indeterminate Equations, SAC 2017, to appear
  33. [To Appear] *Baptiste Vinh Mau, Koji Nuida, Correction of a Secure Comparison Protocol for Encrypted Integers in IEEE WIFS 2012, IWSEC 2017 (short paper), to appear

Non-Refereed

  1. Koji Nuida, On the isomorphism problem of Coxeter groups, The Mittag-Leffler Seminar, Institut Mittag-Leffler, Sweden, February 22, 2005
  2. Koji Nuida, Almost central involutions in split extensions of Coxeter groups by graph automorphisms, International Symposium on Finite Groups and Related Topics, Curreac (Hamanako Training Facility), Japan, March 21, 2006
  3. Koji Nuida, Homomorphic encryption, its applications and related mathematical topics, Pure Math Colloquium, University of Southampton, England, August 12, 2014
  4. Koji Nuida, Fully Homomorphic Encryption: A Short Introduction, Japanese-Finnish Seminar on Privacy-Aware Data Analysis and Information Security, Aalto University, Finland, January 7, 2015
Top of this page

Grants

  1. April 1, 2008 -- March 31, 2009: 2007 Research Grants of the Science and Technology Foundation of Japan (JSTF) (Total: 1,000,000 JPY)
  2. April 1, 2008 -- March 31, 2012: Grant-in-Aid for Young Scientists (B), The Ministry of Education, Culture, Sports, Science and Technology (MEXT) (No.20700017) (Total: 4,030,000 JPY)
  3. October 1, 2014 -- March 31, 2018: PRESTO, Japan Science and Technology Agency (JST) (Total: 13,000,000 JPY)
Top of this page

Committee Members, etc.

International Conferences

  1. Updating Quantum Cryptography 2007 (UQC 2007) Local Staff, Tokyo, Japan, October 1--3, 2007
  2. 2008 ACM Symposium on Information, Computer and Communications Security (ASIACCS'08) Local Staff, Tokyo, Japan, March 18--20, 2008
  3. The 4th International Conference on Information Theoretic Security (ICITS 2009) Local Staff, Shizuoka, Japan, December 3--6, 2009
  4. The 5th International Workshop on Security (IWSEC 2010) Publicity co-Chair, Kobe, Japan, November 22--24, 2010
  5. IEEE International Conference on Communications (IEEE ICC 2011) Communications and Information System Security Symposium (CISS) TPC Member, Kyoto, Japan, June 5--9, 2011
  6. The 7th International Wireless Communications and Mobile Computing Conference (IWCMC 2011) Trust, Privacy and Security Symposium (TPS) TPC Member, Istanbul, Turkey, July 5--8, 2011
  7. The 6th International Workshop on Security (IWSEC 2011) Publicity co-Chair, Tokyo, Japan, November 8--10, 2011
  8. International Conference on Security in Computer Networks and Distributed Systems (SNDS 2012) TPC Member, Trivandrum, India, October 11--12, 2012
  9. The 8th International Workshop on Security (IWSEC 2013) Publicity Chair, Okinawa, Japan, November 18--20, 2013
  10. 8th International Conference on Information-Theoretic Security (ICITS 2015) Program Committee, Lugano, Switzerland, May 2--5, 2015
  11. Privacy-Aware Computational Genomics 2015 (PRIVAGEN 2015) Program Committee, Tokyo, Japan, September 8, 2015
  12. 9th International Conference on Information-Theoretic Security (ICITS 2016) Program Committee, Tacoma, USA, August 9--12, 2016
  13. Private and Secure Machine Learning 2017 (PSML 2017) Program Committee, Sydney, Australia, August 11, 2017
Top of this page
To index page

Koji NUIDA (k.nuida[Please insert at-mark here]aist.go.jp)
Last Modified: July 9, 2017
(Counted since Dec. 28, 2015)

(c) Koji NUIDA 2010- All Rights Reserved.