Experience mining: Building a large-scale database of personal experiences and opinions from web documents K Inui, S Abe, K Hara, H Morita, C Sao, M Eguchi, A Sumida, K Murakami, ... 2008 IEEE/WIC/ACM International Conference on Web Intelligence and …, 2008 | 117 | 2008 |
On the security of the schnorr signature scheme and DSA against related-key attacks H Morita, JCN Schuldt, T Matsuda, G Hanaoka, T Iwata Information Security and Cryptology-ICISC 2015: 18th International …, 2016 | 61 | 2016 |
Constant-round client-aided secure comparison protocol H Morita, N Attrapadung, T Teruya, S Ohata, K Nuida, G Hanaoka Computer Security: 23rd European Symposium on Research in Computer Security …, 2018 | 27 | 2018 |
Attacks and security proofs of EAX-prime K Minematsu, S Lucks, H Morita, T Iwata International Workshop on Fast Software Encryption, 327-347, 2013 | 21 | 2013 |
Mining personal experiences and opinions from Web documents S Abe, K Inui, K Hara, H Morita, C Sao, M Eguchi, A Sumita, K Murakami, ... Web Intelligence and Agent Systems: An International Journal 9 (2), 109-121, 2011 | 18 | 2011 |
Adam in private: Secure and fast training of deep neural networks with adaptive moment estimation N Attrapadung, K Hamada, D Ikarashi, R Kikuchi, T Matsuda, I Mishina, ... arXiv preprint arXiv:2106.02203, 2021 | 17 | 2021 |
Secure division protocol and applications to privacy-preserving chi-squared tests H Morita, N Attrapadung, S Ohata, K Nuida, S Yamada, K Shimizu, ... 2018 International Symposium on Information Theory and Its Applications …, 2018 | 11 | 2018 |
Oblivious linear group actions and applications N Attrapadung, G Hanaoaka, T Matsuda, H Morita, K Ohara, JCN Schuldt, ... Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications …, 2021 | 10 | 2021 |
Single-shuffle card-based protocol with eight cards per gate K Tozawa, H Morita, T Mizuki International Conference on Unconventional Computation and Natural …, 2023 | 4 | 2023 |
Tree-based secure comparison of secret shared data H Morita, N Attrapadung, S Ohata, S Yamada, K Nuida, G Hanaoka 2018 International Symposium on Information Theory and Its Applications …, 2018 | 4 | 2018 |
Cryptanalysis of EAXprime. K Minematsu, H Morita, T Iwata IACR Cryptol. ePrint Arch. 2012, 18, 2012 | 4 | 2012 |
Secure parallel computation on privately partitioned data and applications N Attrapadung, H Morita, K Ohara, JCN Schuldt, T Teruya, K Tozawa Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications …, 2022 | 3 | 2022 |
Accuracy/efficiency trade-off for privacy-preserving division protocol S Ohata, H Morita, G Hanaoka 2018 International Symposium on Information Theory and Its Applications …, 2018 | 3 | 2018 |
On the security of schnorr signatures, dsa, and elgamal signatures against related-key attacks H Morita, JCN Schuldt, T Matsuda, G Hanaoka, T Iwata IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and …, 2017 | 3 | 2017 |
Client-aided two-party secure interval test protocol H Morita, N Attrapadung Cryptology and Network Security: 18th International Conference, CANS 2019 …, 2019 | 2 | 2019 |
On the security of non-interactive key exchange against related-key attacks H Morita, JCN Schuldt, T Matsuda, G Hanaoka, T Iwata IEICE Transactions on Fundamentals of Electronics, Communications and …, 2017 | 2 | 2017 |
Memory and Round-Efficient MPC Primitives in the Pre-Processing Model from Unit Vectorization N Attrapadung, H Morita, K Ohara, JCN Schuldt, K Tozawa Proceedings of the 2022 ACM on Asia Conference on Computer and …, 2022 | 1 | 2022 |
Constant-round client-aided two-server secure comparison protocol and its applications H Morita, N Attrapadung, T Teruya, S Ohata, K Nuida, G Hanaoka IEICE Transactions on Fundamentals of Electronics, Communications and …, 2020 | 1 | 2020 |
Constant-Round Private Decision Tree Evaluation for Secret Shared Data N Cheng, N Gupta, A Mitrokotsa, H Morita, K Tozawa Proceedings on Privacy Enhancing Technologies, 2024 | | 2024 |
Check for updates Client-Aided Two-Party Secure Interval Test Protocol H Morita, N Attrapadung Cryptology and Network Security: 18th International Conference, CANS 2019 …, 2019 | | 2019 |