Name
Affiliation
Papers
TAKASHI NISHIDE
Kyushu University, Fukuoka, Japan
53
Collaborators
Citations 
PageRank 
67
357
27.86
Referers 
Referees 
References 
777
781
594
Search Limit
100781
Title
Citations
PageRank
Year
Private Decision Tree Evaluation with Constant Rounds via (Only) Fair SS-4PC00.342021
Private Decision Tree Evaluation with Constant Rounds via (Only) SS-3PC over Ring.00.342020
Expressive Ciphertext-Policy Attribute-Based Encryption with Fast Decryption.00.342018
Outsourced Private Function Evaluation with Privacy Policy Enforcement.00.342018
Provably Secure Gateway Threshold Password-Based Authenticated Key Exchange Secure Against Undetectable On-Line Dictionary Attack00.342017
One-time Programs with Cloud Storage and Its Application to Electronic Money.00.342017
Card-Based Protocols Using Regular Polygon Cards20.372017
Improved proxy re-encryption scheme for symmetric key cryptography10.382017
Identity-Based Key-Insulated Aggregate Signatures, Revisited.00.342017
Character‐based symmetric searchable encryption and its implementation and experiment on mobile devices00.342016
Committed And Protocol Using Three Cards With More Handy Shuffle00.342016
Software Library for Ciphertext/Key-Policy Functional Encryption with Simple Usability.00.342016
Searchable Symmetric Encryption Supporting Queries with Multiple-Character Wildcards.00.342016
Software Implementation Of Ciphertext-Policy Functional Encryption With Simple Usability10.362015
Another Look at Aggregate Signatures: Their Capability and Security on Network Graphs.00.342015
Software Implementation Of A Pairing Function For Public Key Cryptosystems00.342015
Anonymous encryption with partial-order subset delegation and its application in privacy email systems10.362014
Fine-Grained Access Control Aware Multi-User Data Sharing With Secure Keyword Search30.412014
Secure (M+1) st-Price Auction with Automatic Tie-Break.10.352014
Supporting secure provenance update by keeping "provenance" of the provenance00.342013
Upper bound of the length of information embedd in RSA public key efficiently20.382013
Efficient implementation for QUAD stream cipher with GPUs.30.422013
Secure keyword search using bloom filter with specified character positions90.562012
Efficient Implementation of Evaluating Multivariate Quadratic System with GPUs20.412012
Batch Logical Protocols For Efficient Multi-Party Computation00.342012
Security Analysis of Offline E-cash Systems with Malicious Insider.30.402012
Differential fault analysis of full LBlock50.502012
Elliptic curve ElGamal Threshold-based Key Management Scheme against Compromise of Distributed RSUs for VANETs.30.412012
A Method for Embedding Secret Key Information in RSA Public Key and Its Application30.572012
Analysis of Methods for Detecting Compromised Nodes and its Countermeasures.00.342012
Securing Provenance Of Distributed Processes In An Untrusted Environment20.372012
Reducing Communication Complexity of Random Number Bitwise-Sharing for Efficient Multi-party Computation.00.342012
Towards Countermeasure of Insider Threat in Network Security20.432011
Accelerating multiparty computation by efficient random number bitwise-sharing protocols00.342011
Batching multiple protocols to improve efficiency of multi-party computation10.372011
Realizing fine-grained and flexible access control to outsourced data with attribute-based cryptosystems291.132011
Security of Offline Anonymous Electronic Cash Systems against Insider Attacks by Untrusted Authorities Revisited20.362011
Multi-user keyword search scheme for secure data sharing with fine-grained access control170.772011
Cryptanalysis of randomized arithmetic codes based on markov model00.342011
Design and Implementation of a Forced Encryption Kernel Module00.342011
Integrity for the In-flight web page based on a fragile watermarking chain scheme10.372011
Anonymous encryption with partial-order subset delegation functionality30.392011
Securing location-aware services based on online/offline signatures in VANETs00.342011
Model-Based Intrusion Detection by Abstract Interpretation00.342010
Universally Composable Non-committing Encryptions in the Presence of Adaptive Adversaries.30.372010
Adaptive and Composable Non-interactive String-commitment Protocols.00.342010
Distributed paillier cryptosystem without trusted dealer180.722010
Adaptive and composable non-committing encryptions50.432010
Preserving integrity and confidentiality of a directed acyclic graph model of provenance90.542010
Attribute-Based Encryption With Partially Hidden Ciphertext Policies110.582009
  • 1
  • 2