Koji Chida
Orcid: 0000-0002-7705-5996
According to our database1,
Koji Chida
authored at least 40 papers
between 2001 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
2005
2010
2015
2020
0
1
2
3
4
5
6
3
1
1
2
1
2
2
1
2
1
1
1
1
1
3
2
1
1
1
2
1
1
1
1
3
2
1
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
Proceedings of the 21st Annual International Conference on Privacy, Security and Trust, 2024
Proceedings of the Modeling Decisions for Artificial Intelligence, 2024
Proceedings of the Advances in Information and Computer Security, 2024
2023
J. Cryptol., July, 2023
Efficient decision tree training with new data structure for secure multi-party computation.
Proc. Priv. Enhancing Technol., January, 2023
J. Inf. Process., 2023
Proceedings of the 20th Annual International Conference on Privacy, Security and Trust, 2023
Proceedings of the 2023 ACM Asia Conference on Computer and Communications Security, 2023
2022
2019
IACR Cryptol. ePrint Arch., 2019
2018
Password-Based Authentication Protocol for Secret-Sharing-Based Multiparty Computation.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2018
Efficient Bit-Decomposition and Modulus-Conversion Protocols with an Honest Majority.
IACR Cryptol. ePrint Arch., 2018
Proceedings of the 6th Workshop on Encrypted Computing & Applied Homomorphic Cryptography, 2018
2017
IET Inf. Secur., 2017
Evaluation of the Anonymity and Utility of De-Identified Clinical Data Based on Japanese Anonymization Criteria.
Proceedings of the MEDINFO 2017: Precision Healthcare through Informatics, 2017
2016
Proceedings of the Exploring Complexity in Health: An Interdisciplinary Systems Approach - Proceedings of MIE2016 at HEC2016, Munich, Germany, 28 August, 2016
2015
Adaptively and Unconditionally Secure Conversion Protocols between Ramp and Linear Secret Sharing.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2015
Secret Sharing with Share-Conversion: Achieving Small Share-Size and Extendibility to Multiparty Computation.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2015
Proceedings of the Advances in Information and Computer Security, 2015
Practical Password-Based Authentication Protocol for Secret Sharing Based Multiparty Computation.
Proceedings of the Cryptology and Network Security - 14th International Conference, 2015
2014
Actively Private and Correct MPC Scheme in t<n/2 from Passively Secure Schemes with Small Overhead.
IACR Cryptol. ePrint Arch., 2014
Oblivious Radix Sort: An Efficient Sorting Algorithm for Practical Secure Multi-party Computation.
IACR Cryptol. ePrint Arch., 2014
2013
Secret Sharing Schemes with Conversion Protocol to Achieve Short Share-Size and Extendibility to Multiparty Computation.
Proceedings of the Information Security and Privacy - 18th Australasian Conference, 2013
2012
Proceedings of the Information Security and Cryptology - ICISC 2012, 2012
2010
Tag-Based Secure Set-Intersection Protocol and Its Application to Privacy-Enhancing Biometrics.
Proceedings of the 13th International Conference on Network-Based Information Systems, 2010
2009
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2009
2008
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2008
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2008
Proceedings of the Advances in Information and Computer Security, 2008
2007
Non-optimistic Secure Circuit Evaluation Based on ElGamal Encryption and Its Applications.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2007
Proceedings of the Advances in Information and Computer Security, 2007
Proceedings of the Topics in Cryptology, 2007
Proceedings of the The Second International Conference on Availability, 2007
2006
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2006
2005
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2005
Proceedings of the Information Security Applications, 6th International Workshop, 2005
Proceedings of the 2005 Workshop on Digital Identity Management, 2005
2004
An Auction Protocol Preserving Privacy of Losing Bids with a Secure Value Comparison Scheme.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2004
2002
A New Factoring Method of Integers <i>N</i>=<i>p</i><sup>r</sup> ✕ <i>q</i> for Large <i>r</i>.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2002
2001
Proceedings of the Information Security, 4th International Conference, 2001