Follow
Hiraku Morita
Hiraku Morita
Aarhus University, University of Copenhagen
Verified email at cs.au.dk - Homepage
Title
Cited by
Cited by
Year
Experience mining: Building a large-scale database of personal experiences and opinions from web documents
K Inui, S Abe, K Hara, H Morita, C Sao, M Eguchi, A Sumida, K Murakami, ...
2008 IEEE/WIC/ACM International Conference on Web Intelligence and …, 2008
1182008
On the security of the schnorr signature scheme and DSA against related-key attacks
H Morita, JCN Schuldt, T Matsuda, G Hanaoka, T Iwata
Information Security and Cryptology-ICISC 2015: 18th International …, 2016
612016
Constant-round client-aided secure comparison protocol
H Morita, N Attrapadung, T Teruya, S Ohata, K Nuida, G Hanaoka
Computer Security: 23rd European Symposium on Research in Computer Security …, 2018
262018
Attacks and security proofs of EAX-Prime
K Minematsu, S Lucks, H Morita, T Iwata
International Workshop on Fast Software Encryption, 327-347, 2013
202013
Mining personal experiences and opinions from Web documents
S Abe, K Inui, K Hara, H Morita, C Sao, M Eguchi, A Sumita, K Murakami, ...
Web Intelligence and Agent Systems: An International Journal 9 (2), 109-121, 2011
192011
Adam in private: Secure and fast training of deep neural networks with adaptive moment estimation
N Attrapadung, K Hamada, D Ikarashi, R Kikuchi, T Matsuda, I Mishina, ...
arXiv preprint arXiv:2106.02203, 2021
172021
Secure division protocol and applications to privacy-preserving chi-squared tests
H Morita, N Attrapadung, S Ohata, K Nuida, S Yamada, K Shimizu, ...
2018 International Symposium on Information Theory and Its Applications …, 2018
102018
Oblivious linear group actions and applications
N Attrapadung, G Hanaoaka, T Matsuda, H Morita, K Ohara, JCN Schuldt, ...
Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications …, 2021
92021
Cryptanalysis of EAXprime.
K Minematsu, H Morita, T Iwata
IACR Cryptol. ePrint Arch. 2012, 18, 2012
52012
Tree-based secure comparison of secret shared data
H Morita, N Attrapadung, S Ohata, S Yamada, K Nuida, G Hanaoka
2018 International Symposium on Information Theory and Its Applications …, 2018
42018
Single-shuffle card-based protocol with eight cards per gate
K Tozawa, H Morita, T Mizuki
International Conference on Unconventional Computation and Natural …, 2023
32023
Accuracy/efficiency trade-off for privacy-preserving division protocol
S Ohata, H Morita, G Hanaoka
2018 International Symposium on Information Theory and Its Applications …, 2018
32018
On the security of schnorr signatures, dsa, and elgamal signatures against related-key attacks
H Morita, JCN Schuldt, T Matsuda, G Hanaoka, T Iwata
IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and …, 2017
32017
Secure Parallel Computation on Privately Partitioned Data and Applications
N Attrapadung, H Morita, K Ohara, JCN Schuldt, T Teruya, K Tozawa
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications …, 2022
22022
Client-aided two-party secure interval test protocol
H Morita, N Attrapadung
Cryptology and Network Security: 18th International Conference, CANS 2019 …, 2019
22019
On the security of non-interactive key exchange against related-key attacks
H Morita, JCN Schuldt, T Matsuda, G Hanaoka, T Iwata
IEICE Transactions on Fundamentals of Electronics, Communications and …, 2017
22017
Memory and Round-Efficient MPC Primitives in the Pre-Processing Model from Unit Vectorization
N Attrapadung, H Morita, K Ohara, JCN Schuldt, K Tozawa
Proceedings of the 2022 ACM on Asia Conference on Computer and …, 2022
12022
Constant-round client-aided two-server secure comparison protocol and its applications
H Morita, N Attrapadung, T Teruya, S Ohata, K Nuida, G Hanaoka
IEICE Transactions on Fundamentals of Electronics, Communications and …, 2020
12020
Constant-Round Private Decision Tree Evaluation for Secret Shared Data
N Cheng, N Gupta, A Mitrokotsa, H Morita, K Tozawa
Proceedings on Privacy Enhancing Technologies, 2024
2024
The Security of 3-Round RSA-OAEP against Related-Key Attacks
G Ito, H Morita, T Iwata
IEICE Technical Report; IEICE Tech. Rep. 116 (505), 15-22, 2017
2017
The system can't perform the operation now. Try again later.
Articles 1–20