Hiraku Morita

Orcid: 0000-0003-3547-7725

Affiliations:
  • University of St. Gallen (HSG), School of Computer Science, Switzerland
  • National Institute of Advanced Industrial Science and Technology (AIST), Information Technology Research Institute (ITRI), Tsukuba, Japan (former)
  • Nagoya University, Department of Computational Science and Engineering, Nagoya, Japan (former, PhD 2017)
  • Nara Institute of Science and Technology (NAIST), Ikoma, Japan (former)


According to our database1, Hiraku Morita authored at least 19 papers between 2008 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Constant-Round Private Decision Tree Evaluation for Secret Shared Data.
Proc. Priv. Enhancing Technol., January, 2024

2023
Single-Shuffle Card-Based Protocol with Eight Cards per Gate.
Proceedings of the Unconventional Computation and Natural Computation, 2023

2022
Adam in Private: Secure and Fast Training of Deep Neural Networks with Adaptive Moment Estimation.
Proc. Priv. Enhancing Technol., 2022

Secure Parallel Computation on Privately Partitioned Data and Applications.
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022

Memory and Round-Efficient MPC Primitives in the Pre-Processing Model from Unit Vectorization.
Proceedings of the ASIA CCS '22: ACM Asia Conference on Computer and Communications Security, Nagasaki, Japan, 30 May 2022, 2022

2021
Oblivious Linear Group Actions and Applications.
Proceedings of the CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15, 2021

2020
Constant-Round Client-Aided Two-Server Secure Comparison Protocol and Its Applications.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2020

2019
Client-Aided Two-Party Secure Interval Test Protocol.
Proceedings of the Cryptology and Network Security - 18th International Conference, 2019

2018
Accuracy/Efficiency Trade-Off for Privacy-Preserving Division Protocol.
Proceedings of the International Symposium on Information Theory and Its Applications, 2018

Secure Division Protocol and Applications to Privacy-preserving Chi-squared Tests.
Proceedings of the International Symposium on Information Theory and Its Applications, 2018

Tree-based Secure Comparison of Secret Shared Data.
Proceedings of the International Symposium on Information Theory and Its Applications, 2018

Constant-Round Client-Aided Secure Comparison Protocol.
Proceedings of the Computer Security, 2018

2017
On the Security of Schnorr Signatures, DSA, and ElGamal Signatures against Related-Key Attacks.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2017

On the Security of Non-Interactive Key Exchange against Related-Key Attacks.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2017

2015
On the Security of the Schnorr Signature Scheme and DSA against Related-Key Attacks.
IACR Cryptol. ePrint Arch., 2015

2013
Attacks and Security Proofs of EAX-Prime.
Proceedings of the Fast Software Encryption - 20th International Workshop, 2013

2012
Cryptanalysis of EAXprime.
IACR Cryptol. ePrint Arch., 2012

2011
Mining personal experiences and opinions from Web documents.
Web Intell. Agent Syst., 2011

2008
Experience Mining: Building a Large-Scale Database of Personal Experiences and Opinions from Web Documents.
Proceedings of the 2008 IEEE / WIC / ACM International Conference on Web Intelligence, 2008


  Loading...