Publications

International Conference Proceedings
  1. Genki Osada, Tsubasa Takahashi, and Takashi Nishide, Understanding Likelihood of Normalizing Flow and Image Complexity through the Lens of Out-of-Distribution Detection, Annual AAAI Conference on Artificial Intelligence, Special Track on Safe, Robust and Responsible AI, 2024.
  2. Shintaro Narisada, Hiroki Okada, Kazuhide Fukushima, Shinsaku Kiyomoto, and Takashi Nishide, GPU Acceleration of High-Precision Homomorphic Computation Utilizing Redundant Representation, Workshop on Encrypted Computing & Applied Homomorphic Cryptography (WAHC), pp.1--9, ACM, 2023.
  3. Genki Osada, Tsubasa Takahashi, Budrul Ahsan, and Takashi Nishide, Out-of-Distribution Detection with Reconstruction Error and Typicality-based Penalty, IEEE/CVF Winter Conference on Applications of Computer Vision (WACV), pp.5540--5552, IEEE, 2023.
  4. Daisuke Maeda, Koki Morimura, and Takashi Nishide, Efficient Homomorphic Evaluation of Arbitrary Bivariate Integer Functions, Workshop on Encrypted Computing & Applied Homomorphic Cryptography (WAHC), pp.13--22, ACM, 2022.
  5. Zhongqi Wang, Keita Fuse, and Takashi Nishide, Square Table Lookup Multiparty Computation Protocol, International Symposium on Computing and Networking Workshops (CANDARW), pp.392--395, IEEE, 2022.
  6. Koki Morimura, Daisuke Maeda, and Takashi Nishide, Improved Integer-wise Homomorphic Comparison and Division based on Polynomial Evaluation, International Conference on Availability, Reliability and Security (ARES), No. 33, pp.1--10, ACM, 2022.
  7. Seiya Nuta, Jacob C.N. Schuldt, and Takashi Nishide, Forward-Secure Public Key Encryption without Key Update from Proof-of-Stake Blockchain, Indocrypt, LNCS 13143, pp.436--461, Springer-Verlag, 2021.
  8. Hikaru Tsuchida, and Takashi Nishide, Private Decision Tree Evaluation with Constant Rounds via (Only) Fair SS-4PC, ACISP, LNCS 13083, pp.309--329, Springer-Verlag, 2021.
  9. Takashi Nishide, One-Time Delegation of Unlinkable Signing Rights and Its Application, ProvSec, LNCS 12505, pp.103--123, Springer-Verlag, 2020.
  10. Hikaru Tsuchida, Takashi Nishide, and Yusaku Maeda, Private Decision Tree Evaluation with Constant Rounds via (Only) SS-3PC over Ring, ProvSec, LNCS 12505, pp.298--317, Springer-Verlag, 2020.
  11. Genki Osada, Budrul Ahsan, Revoti Prasad Bora, Takashi Nishide, Regularization with Latent Space Virtual Adversarial Training, ECCV, LNCS 12346, pp.565--581, Springer-Verlag, 2020.
  12. Hikaru Tsuchida, and Takashi Nishide, Client-Aided Bit-Composition Protocol with Guaranteed Output Delivery, International Symposium on Information Theory and its Application (ISITA), pp.387--391, IEEE, 2020.
  13. Naoya Okanami, Ryuya Nakamura, and Takashi Nishide, Load Balancing in Sharded Blockchains, Workshop on Trusted Smart Contracts (in Financial Cryptography), LNCS 12063, pp.512--524, Springer-Verlag, 2020.
  14. Noboru Kunihiro, Wen-jie Lu, Takashi Nishide, and Jun Sakuma, Outsourced Private Function Evaluation with Privacy Policy Enforcement, IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), pp.412--423, 2018.
  15. Nobuaki Kitajima, Naoto Yanai, and Takashi Nishide, Identity-Based Key-Insulated Aggregate Signatures, Revisited, Inscrypt, LNCS 10726, pp.141--156, Springer-Verlag, 2017.
  16. Genki Osada, Kazumasa Omote, and Takashi Nishide, Network Intrusion Detection based on Semi-Supervised Variational Auto-Encoder, ESORICS, LNCS 10493, pp.344--361, Springer-Verlag, 2017.
  17. Kouichi Sakurai, Takashi Nishide, and Syalim Amril, Improved proxy re-encryption scheme for symmetric key cryptography, International Workshop on Big Data and Information Security (IWBIS), pp.105--111, IEEE, 2017.
  18. Takuya Kitamura, Kazumasa Shinagawa, Takashi Nishide and Eiji Okamoto, One-time Programs with Cloud Storage and Its Application to Electronic Money, ACM International Workshop on ASIA Public-Key Cryptography (APKC), pp.25--30, ACM, 2017.
  19. Hikaru Tsuchida, Takashi Nishide, Eiji Okamoto, and Kwangjo Kim, Revocable Decentralized Multi-Authority Functional Encryption, Indocrypt, LNCS 10095, pp.248--265, Springer-Verlag, 2016.
  20. Kazumasa Shinagawa, Koji Nuida, Takashi Nishide, Goichiro Hanaoka, and Eiji Okamoto, Size-Hiding Computation for Multiple Parties, Asiacrypt, LNCS 10032, pp.248--265, Springer-Verlag, 2016.
  21. Fangming Zhao and Takashi Nishide, Searchable Symmetric Encryption Supporting Queries with Multiple-Character Wildcards, International Conference on Network and System Security (NSS), LNCS 9955, pp.266--282, Springer-Verlag, 2016.
  22. Kazumasa Shinagawa, Koji Nuida, Takashi Nishide, Goichiro Hanaoka, and Eiji Okamoto, Committed AND Protocol Using Three Cards with More Handy Shuffle, International Symposium on Information Theory and its Application (ISITA), pp.700--702, IEEE, 2016.
  23. Naoto Yanai, Masahiro Mambo, Kazuma Tanaka, Takashi Nishide, and Eiji Okamoto, Another Look at Aggregate Signatures: Their Capability and Security on Network Graphs, 7th International Conference on Trustworthy Systems (Intrust), LNCS 9565, pp.32--48, Springer-Verlag, 2016.
  24. Kazumasa Shinagawa, Takaaki Mizuki, Jacob C.N. Schuldt, Koji Nuida, Naoki Kanayama, Takashi Nishide, Goichiro Hanaoka, and Eiji Okamoto, Multi-Party Computation with Small Shuffle Complexity Using Regular Polygon Cards, 9th International Conference on Provable Security (ProvSec), LNCS 9451, pp.127--146, Springer-Veralag, 2015.
  25. Yusuke Kanbara, Tadanori Teruya, Naoki Kanayama, Takashi Nishide, and Eiji Okamoto, Software Implementation of a Pairing Function for Public Key Cryptosystems, 5th International Conference on IT Convergence and Security (ICITCS’15), pp.1--5, IEEE, 2015.
  26. Keisuke Hasegawa, Naoki Kanayama, Takashi Nishide, and Eiji Okamoto, Software Implementation of Ciphertext-Policy Functional Encryption with Simple Usability, 5th International Conference on IT Convergence and Security (ICITCS’15), pp.1--4, IEEE, 2015.
  27. Kazumasa Shinagawa, Takaaki Mizuki, Jacob C.N. Schuldt, Koji Nuida, Naoki Kanayama, Takashi Nishide, Goichiro Hanaoka, and Eiji Okamoto, Secure Multi-Party Computation Using Polarizing Cards, 10th International Workshop on Security (IWSEC), LNCS 9241, pp.281--297, Springer-Veralag, 2015.
  28. Yukou Kobayashi, Naoto Yanai, Kazuki Yoneyama, Takashi Nishide, Goichiro Hanaoka, Kwangjo Kim, and Eiji Okamoto, Gateway Threshold Password-based Authenticated Key Exchange Secure against Undetectable On-line Dictionary Attack, International Conference on Security and Cryptography (SECRYPT), pp.39--52, SciTePress, 2015, DOI:10.5220/0005539300390052.
    (there was a flaw in the protocol, and it was fixed in the journal version)
  29. Nobuaki Kitajima, Naoto Yanai, Takashi Nishide, Goichiro Hanaoka, and Eiji Okamoto, Constructions of Fail-Stop Signatures for Multi-signer Setting, 10th Asia Joint Conference on Information Security (AsiaJCIS), pp.112--123, IEEE, 2015, DOI:10.1109/AsiaJCIS.2015.26.
  30. Takashi Nishide, Mitsugu Iwamoto,Atsushi Iwasaki,and Kazuo Ohta, Secure (M+1)st-Price Auction with Automatic Tie-Break, 6th International Conference on Trustworthy Systems (Intrust) 2014, LNCS 9473, pp.422--437, Springer-Veralag, 2015.
  31. Sanami Nakagawa, Keita Emura, Goichiro Hanaoka, Akihisa Kodate, Takashi Nishide, Eiji Okamoto, and Yusuke Sakai, A Privacy-enhanced Access Log Management Mechanism in SSO Systems from Nominative Signatures, 13th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), pp.565--574, 2014, DOI:10.1109/TrustCom.2014.72.
  32. Takashi Yamakawa, Nobuaki Kitajima, Takashi Nishide, Goichiro Hanaoka, and Eiji Okamoto, A Short Fail-Stop Signature Scheme from Factoring, Provable Security (ProvSec), LNCS 8782, pp.309--316, Springer-Veralag, 2014(short paper).
  33. Motoki Kitahara, Takanori Yasuda, Takashi Nishide, and Kouichi Sakurai, Upper Bound of the Length of Efficiently Embeddable Information in RSA Modulus, ACM Asia Public-Key Cryptography (AsiaPKC), pp.33--38, 2013 (short paper).
  34. Amril Syalim, Takashi Nishide, and Kouichi Sakurai, Supporting Secure Provenance Update by Keeping Provenance of the Provenance, Information and Communicatiaon Technology - International Conference (ICT-EurAsia), LNCS 7804, pp.363--372, Springer-Verlag, 2013.
  35. Takanori Suga, Takashi Nishide, and Kouichi Sakurai, Weakness of Provably Secure Searchable Encryption Against Frequency Analysis, 5th Mosharaka International Conference on Communications, Computers and Applications (MIC-CCA), ISSN: 2227-331X, pp.142--147, 2012.
  36. Fangming Zhao, Takashi Nishide, Yoshiaki Hori, and Kouichi Sakurai, Analysis of Methods for Detecting Compromised Nodes and Its Countermeasures, International Conference on IT Convergence and Security (ICITCS), LNEE 215, pp.53--60, Springer-Verlag, 2013.
  37. Takanori Suga, Takashi Nishide, and Kouichi Sakurai, Secure Keyword Search Using Bloom Filter with Specified Character Positions, 6th International Conference on Provable Security (ProvSec), LNCS 7496, pp.235--252, Springer-Verlag, 2012.
  38. Motoki Kitahara, Takashi Nishide, and Kouichi Sakurai, A Method for Embedding Secret Key Information in RSA Public Key and Its Application, 6th International Workshop on Advances in Information Security (WAIS), pp.665--670, 2012, doi.ieeecomputersociety.org/10.1109/IMIS.2012.123.
  39. Satoshi Tanaka, Takashi Nishide, and Kouichi Sakurai, Efficient Implementation of Evaluating Multivariate Quadratic System with GPUs, 6th International Workshop on Advances in Information Security (WAIS), pp.660--664, 2012, doi.ieeecomputersociety.org/10.1109/IMIS.2012.139.
  40. Liang Zhao, Takashi Nishide, and Kouichi Sakurai, Differential Fault Analysis of Full LBlock, 3rd International Workshop on Constructive Side-Channel Analysis and Secure Design (COSADE'12), LNCS 7275, pp.135--150, 2012.
  41. Fangming Zhao, Takashi Nishide, and Kouichi Sakurai, Multi-User Keyword Search Scheme for Secure Data Sharing with Fine-Grained Access Control, 14th Annual International Conference on Information Security and Cryptology (ICISC'11), LNCS 7259, pp.406--418, Springer-Verlag, 2012.
  42. Liang Zhao, Takashi Nishide, Avishek Adhikari, Kyung-Hyune Rhee, and Kouichi Sakurai, Cryptanalysis of Randomized Arithmetic Codes Based on Markov Model, 7th International Conference on Information Security and Cryptology (Inscrypt'11), LNCS 7537, pp.341--362, Springer-Verlag, 2012.
  43. Naoto Kiribuchi, Ryo Kato, Takashi Nishide, and Hiroshi Yoshiura, Batching Multiple Protocols to Improve Efficiency of Multi-party Computation, 7th International Conference on Information Security and Cryptology (Inscrypt'11), LNCS 7537, pp.289--308, Springer-Verlag, 2012.
  44. Satoshi Tanaka, Takashi Nishide, and Kouichi Sakurai, Fast Implementation and Experimentation of Multivariate Cryptosystems on GPU, 6th Joint Workshop on Information Security (JWIS), 2011.
  45. Yoshiaki Hori, Takashi Nishide, and Kouichi Sakurai, Towards Countermeasure Against Insider Threat on Network Security, 3rd International Workshop on Managing Insider Security Threats (MIST), IEEE Computer Society, pp.634--636, 2011.
  46. Takashi Nishide, and Kouichi Sakurai, Security of Offline Anonymous Electronic Cash Systems Against Insider Attacks By Untrusted Authorities Revisited, 3rd International Workshop on Managing Insider Security Threats (MIST), IEEE Computer Society, pp.656--661, 2011.
  47. Ruan Na, Takashi Nishide, and Yoshiaki Hori, ElGamal-based Key Management scheme for distributed RSUs in VANET, IEEE International Conference on Selected Topics in Mobile & Wireless Networking (iCOST), pp.128--133, 2011.
  48. Amril Syalim, Takashi Nishide, and Kouichi Sakurai, Realizing Proxy Re-encryption in the Symmetric World, The International Conference on Informatics Engineering & Information Science (ICIEIS), CCIS 251, pp.259--274, Springer-Verlag, 2011.
  49. Naoto Kiribuchi, Ryo Kato, Takashi Nishide, Tsukasa Endo, and Hiroshi Yoshiura, Accelerating Multiparty Computation by Efficient Random Number Bitwise-Sharing Protocols, 12th International Workshop on Information Security Applications (WISA'11), LNCS 7115, pp.187--202, Springer-Verlag, 2011.
  50. Takashi Nishide, Shinichi Yoshinaga, Rishiraj Bhattacharyya, Mridul Nandi, Bimal Roy, and Kouichi Sakurai, New Multiple Encryption for Making Double Encryption Secure against Meet-in-the-Middle and Related-Key Attacks, 12th International Workshop on Information Security Applications (WISA'11), 2011(short paper)pdf.
  51. Mingwu Zhang, Takashi Nishide, Bo Yang, and Tsuyoshi Takagi, Anonymous Encryption with Partial-Order Subset Delegation Functionality, International Conference on Provable Security (ProvSec), LNCS 6980, pp.154--169, Springer-Verlag, 2011.
  52. Chul Sur, Youngho Park, Takashi Nishide, Kouichi Sakurai, and Kyung Hyune Rhee, Securing Location-Aware Services Based on Online/Offline Signatures in VANETs, International Workshop on Security and Cognitive Informatics for Homeland Defense (SeCIHD'11), LNCS 6908, pp.271--285, Springer-Verlag, 2011.
  53. Fangming Zhao, Takashi Nishide, and Kouichi Sakurai, Realizing Fine-grained and Flexible Access Control to Outsourced Data with Attribute-based Cryptosystems, 7th Information Security Practice and Experience Conference (ISPEC), LNCS 6672, pp.83--97, Springer-Verlag, 2011.
  54. Jun Furukawa, Akihiro Sakai, Takashi Nishide, Yoshiaki Hori, and Kouichi Sakurai, Design and Implementation of a Forced Encryption Kernel Module, 5th International Workshop on Advances in Information Security (WAIS), pp.663--667, 2011, doi:10.1109/IMIS.2011.68.
  55. Peng Gao, Takashi Nishide, Yoshiaki Hori, and Kouichi Sakurai, Integrity for the In-flight Web Page Based on A Fragile Watermarking Chain Scheme, 5th ACM International Conference on Ubiquitous Information Management and Communication (ICUIMC), 2011, doi:10.1145/1968613.1968715.
  56. Takashi Nishide and Kouichi Sakurai, Distributed Paillier Cryptosystem without Trusted Dealer, 11th International Workshop on Information Security Applications (WISA2010), LNCS 6513, pp.44--60, 2011.
  57. Huafei Zhu, Tadashi Araragi, Takashi Nishide, and Kouichi Sakurai, Adaptive and Composable Non-committing Encryptions, 15th Australasian Conference on Information Security and Privacy (ACISP), LNCS 6168, pp.135--144, 2010.
  58. Huafei Zhu, Tadashi Araragi, Takashi Nishide, and Kouichi Sakurai, Adaptive and Composable Non-interactive String-Commitment Protocols,, International Conference on Security and Cryptography (SECRYPT), pp.354--361, SciTePress, 2010.
  59. Huafei Zhu, Tadashi Araragi, Takashi Nishide, and Kouichi Sakurai, Universally Composable Non-committing Encryptions in the Presence of Adaptive Adversaries, International Conference on Security and Cryptography (SECRYPT), pp.389--398, SciTePress, 2010.
  60. Jingyu Hua, Takashi Nishide, and Kouichi Sakurai, Model-Based Intrusion Detection by Abstract Interpretation, 10th IEEE/IPSJ Annual International Symposium on Applications and the Internet, Workshop on Convergence Security and Privacy (SAINT/CSnP), pp.359--362, 2010.
  61. Amril Syalim, Takashi Nishide, and Kouichi Sakurai, Preserving Integrity and Confidentiality of a Directed Acyclic Graph Model of Provenance, 24th IFIP WG11.3 Working Conference, Data and Applications Security and Privacy (DBSec), LNCS 6166, pp.311--318, 2010.
  62. Takashi Nishide, Kazuki Yoneyama, Kazuo Ohta, Attribute-based encryption with partially hidden encryptor-specified access structures, Proc. 6th International Conference on Applied Cryptography and Network Security (ACNS), LNCS 5037, pp.111--129, 2008.
  63. Takashi Nishide, Kazuo Ohta, Multiparty computation for interval, equality, and comparison without bit-decomposition protocol, Proc. 10th International Conference on Theory and Practice of Public-Key Cryptography (PKC), LNCS 4450, pp.343--360, 2007.
Journals
  1. Daisuke Maeda, Koki Morimura, Shintaro Narisada, Kazuhide Fukushima, and Takashi Nishide, Efficient Homomorphic Evaluation of Arbitrary Uni/Bivariate Integer Functions and Their Applications, IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, Vol. E107--A, No. 3, pp.234--247, 2024.
  2. Koki Morimura, Daisuke Maeda, and Takashi Nishide, Accelerating Polynomial Evaluation for Integer-wise Homomorphic Comparison and Division, Journal of Information Processing, Information Processing Society of Japan, Vol.31, pp.288--298, 2023.
  3. Seiya Nuta, Jacob C.N. Schuldt, and Takashi Nishide, PoS Blockchain-Based Forward-Secure Public Key Encryption with Immutable Keys and Post-Compromise Security Guarantees, IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, Vol. E106--A, No. 3, pp.212--227, 2023.
  4. Hikaru Tsuchida, and Takashi Nishide, Constant-Round Fair SS-4PC for Private Decision Tree Evaluation, IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, Vol. E105--A, No. 9, pp.1270--1288, 2022.
  5. Genki Osada, Budrul Ahsan, Revoti Prasad Bora, Takashi Nishide, Latent Space Virtual Adversarial Training for Supervised and Semi-supervised Learning, IEICE Transactions on Information and Systems, Vol. E105--D, No. 3, pp.667--678, 2022.
  6. Naoya Okanami, Ryuya Nakamura, and Takashi Nishide, Load Balancing with In-protocol/Wallet-level Account Assignment in Sharded Blockchains, IEICE Transactions on Information and Systems, Vol. E105--D, No. 2, pp.205--214, 2022.
  7. Hikaru Tsuchida, Takashi Nishide, and Yusaku Maeda, Private Decision Tree Evaluation with Constant Rounds via (only) SS-3PC over Ring and Field, IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, Vol. E105--A, No. 3, pp.214--230, 2022.
  8. Hikaru Tsuchida, and Takashi Nishide, Client-aided Robust Bit-composition Protocol with Deterministic Cheater Identification in Standard Model, Journal of Information Processing, Information Processing Society of Japan, Vol.29, pp.515--524, 2021.
  9. 天田拓磨,奈良成泰,西出隆志,吉浦裕, 通信量を削減した浮動小数演算のためのマルチパーティ計算, 情報処理学会論文誌, Vol.60, No.9, pp.1433--1447, 2019.
  10. Yukou Kobayashi, Naoto Yanai, Kazuki Yoneyama, Takashi Nishide, Goichiro Hanaoka, Kwangjo Kim, and Eiji Okamoto, Provably Secure Gateway Threshold Password-based Authenticated Key Exchange Secure against Undetectable On-line Dictionary Attack, IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, Vol. E100--A, No. 12, pp.2991--3006, 2017.
  11. Sanami Nakagawa, Keita Emura, Goichiro Hanaoka, Akihisa Kodate, Takashi Nishide, Eiji Okamoto, and Yusuke Sakai, A Privacy-enhanced Access Log Management Mechanism in SSO Systems from Nominative Signatures, International Journal of Applied Cryptography, Vol. 3, No. 4, pp.394--406, 2017.
  12. 奈良成泰, 天田拓磨, 西出隆志, 土井洋, 吉浦裕, 秘密計算を用いた時系列情報の安全な集計方法, 情報処理学会論文誌, Vol.58, No.9, pp.1464--1482, 2017.
  13. Kazumasa Shinagawa, Mizuki Takaaki, Jacob C.N. Schuldt, Koji Nuida, Naoki Kanayama, Takashi Nishide, Goichiro Hanaoka, and Eiji Okamoto, Card-Based Protocols Using Regular Polygon Cards, IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, Vol. E100-A, No. 9, pp.1900--1909, 2017.
  14. 田中和磨, 矢内直人, 岡田雅之, 西出隆志, 岡本栄司, APAT: BGPSEC におけるアグリゲート署名の導入, 情報処理学会論文誌, Vol.58, No.2, pp.544--556, 2月, 2017.
  15. Keisuke Hasegawa, Naoki Kanayama, Takashi Nishide, and Eiji Okamoto, Software Library for Ciphertext/Key-Policy Functional Encryption with Simple Usability, Journal of Information Processing, Information Processing Society of Japan, Vol.24, No.5, pp.764--771, 2016.
  16. Kazumasa Shinagawa, Mizuki Takaaki, Jacob C.N. Schuldt, Koji Nuida, Naoki Kanayama, Takashi Nishide, Goichiro Hanaoka, and Eiji Okamoto, Secure Computation Protocols Using Polarizing Cards, IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, Vol. E99-A, No. 6, pp.1122--1131, 2016.
  17. Nobuaki Kitajima, Naoto Yanai, Takashi Nishide, Goichiro Hanaoka, and Eiji Okamoto, Fail-Stop Signatures for Multiple-Signers: Definitions, Constructions, and Their Extensions, Journal of Information Processing, Information Processing Society of Japan, Vol.24, No.2, pp.275--291, March, 2016.
  18. Takanori Suga, Takashi Nishide, and Kouichi Sakurai, Character-based Symmetric Searchable Encryption and Its Implementation and Experiment on Mobile Devices, Wiley Security and Communication Networks, vol. 9(12), pp.1717--1725, DOI:10.1002/sec.876, 2016.
  19. Fangming Zhao, Takashi Nishide, and Kouichi Sakurai, Fine-Grained Access Control Aware Multi-User Data Sharing with Secure Keyword Search, IEICE Transactions on Information and Systems, Vol.E97-D, No.7, pp.1790--1803, 2014.
  20. Mingwu Zhang, Takashi Nishide, Bo Yang, and Tsuyoshi Takagi, Anonymous Encryption with Partial-order Subset Delegation and Its Application in Privacy Email Systems, IET Information Security, Vol. 8, No. 4, pp.240--249, Jul. 2014.
  21. 加藤遼, 西出隆志, 吉浦裕, 部分的に小さな法を用いたマルチパーティ計算のビット演算効率化, 情報処理学会論文誌, Vol.55, No.9, pp.1971--1991, 9月, 2014.
  22. Satoshi Tanaka, Takashi Nishide, and Kouichi Sakurai, Efficient Implementation for QUAD Stream Cipher with GPUs, Computer Science and Information Systems Journal (ComSIS), Vol.10(2), pp.897--911, 2013.
  23. Naoto Kiribuchi, Ryo Kato, Tsukasa Endo, Takashi Nishide, and Hiroshi Yoshiura, Batch Logical Protocols for Efficient Multi-party Computation, IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, Vol. E95-A, No.10, pp.1718--1728, Oct., 2012.
  24. Ruan Na, Takashi Nishide, and Yoshiaki Hori, Elliptic Curve ElGamal Threshold-based Key Management Scheme against Compromise of Distributed RSUs for VANETs, Journal of Information Processing, Information Processing Society of Japan, Vol.20, No.4, pp.846--853, 2012.
  25. Naoto Kiribuchi, Ryo Kato, Takashi Nishide, Tsukasa Endo, and Hiroshi Yoshiura, Reducing Communication Complexity of Random Number Bitwise-Sharing for Efficient Multi-party Computation, Journal of Information Processing, Information Processing Society of Japan, Vol.20, No.4, pp.861--870, 2012.
  26. Amril Syalim, Takashi Nishide, and Kouichi Sakurai, Securing Provenance of Distributed Processes in an Untrusted Environment, IEICE Transactions on Information and Systems, Vol.E95-D, No.7, pp.1894--1907, 2012.
  27. Takashi Nishide, Shingo Miyazaki, and Kouichi Sakurai, Security Analysis of Offline E-Cash Systems with Malicious Insider, Journal of Wireless Mobile Networks, Ubiquitous Computing and Dependable Applications (JoWUA), Vol. 3, No. 1/2, pp.55--71, 2012.
  28. 志村正法, 宮崎邦彦, 西出隆志, 吉浦裕, 秘密分散データベースの構造演算を可能にするマルチパーティプロトコルを用いた関係代数演算(Relational Algebra in Multi-party Protocol to Enable Structural Operation in Secret Shared Databases), 情報処理学会論文誌, Vol.51, No.9, pp.1563--1578, 2010.
    (平成22年度 情報処理学会 論文賞).
  29. Takashi Nishide, Kazuki Yoneyama, Kazuo Ohta, Attribute-based encryption with partially hidden ciphertext policies, IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, Vol.92-A, No.1, pp.22--32, 2009.
  30. Takashi Nishide, Kazuo Ohta, Constant-round multiparty computation for interval test, equality test, and comparison, IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, Vol.90-A, No.5, pp.960--968, 2007.
Unrefereed Papers (ポスター,発表のみ含む)
  1. 関井恭介,西出隆志, NISQを仮定した量子ワンタイムメモリの提案, 暗号と情報セキュリティシンポジウム(SCIS), 7pages, 長崎, 1月, 2024.
  2. 中島明,林卓也,土田光,杉崎行優,森健吾,西出隆志, 整数型準同型暗号におけるHomomorphic Linear Transformationを用いた任意二変数関数計算, 暗号と情報セキュリティシンポジウム(SCIS), 8pages, 長崎, 1月, 2024.
  3. 前田大輔,森村洸生,成定真太郎,福島和英,西出隆志, 完全準同型暗号における整数型平文空間の一拡張手法とその演算, 暗号と情報セキュリティシンポジウム(SCIS), 7pages, 福岡, 1月, 2023.
  4. 成定真太郎,福島和英,清本晋作,西出隆志, 準同型暗号TFHE上の任意精度演算のための冗長表現による多並列化, 暗号と情報セキュリティシンポジウム(SCIS), 8pages, 福岡, 1月, 2023.
  5. Ye Xu,Takashi Nishide, Secure Multi-key Homomorphic Signatures against Insider Corruption, 暗号と情報セキュリティシンポジウム(SCIS), 8pages, 福岡, 1月, 2023.
  6. 王中琦,梨本健斗,西出隆志, How to Compute Multiplication in FHE Encoding Integer Plaintexts into Polynomials, 暗号と情報セキュリティシンポジウム(SCIS), 5pages, 福岡, 1月, 2023.
  7. 伊藤悠椰,西出隆志, 関数型暗号を用いた顔認証方式の鍵分散による安全性向上, 暗号と情報セキュリティシンポジウム(SCIS), 8pages, 福岡, 1月, 2023.
  8. 前田大輔,西出隆志, 整数型平文空間における非線形2変数準同型演算の高速化, 暗号と情報セキュリティシンポジウム(SCIS), 8pages, 大阪, 1月, 2022.
  9. 森村洸生,西出隆志, 多項式補間による整数型準同型大小比較/除算の改良, 暗号と情報セキュリティシンポジウム(SCIS), 8pages, 大阪, 1月, 2022.
  10. 小林正英,西出隆志, TEE 技術に基づく非対話紛失通信プロトコルの構成, 情報通信システムセキュリティ研究会(ICSS), 6pages, online, 11月, 2020.
  11. 南翔,西出隆志, 暗号通貨MoneroへのKleptographic攻撃に関する考察, Technical report of IEICE, ISEC, 8pages, 神戸, 3月, 2020.
  12. 土田光,西出隆志, 効率的なOnlineフェーズを持つビット結合プロトコル, 暗号と情報セキュリティシンポジウム(SCIS), 8pages, 高知, 1月, 2020.
  13. 怒田晟也,Jacob C.N. Schuldt,西出隆志, ブロックチェーンを用いた鍵更新なしフォワード安全公開鍵暗号, 暗号と情報セキュリティシンポジウム(SCIS), 6pages, 高知, 1月, 2020.
  14. Naoya Okanami,Ryuya Nakamura, Takashi Nishide, Load Balancing for Sharded Blockchains, 暗号と情報セキュリティシンポジウム(SCIS), 7pages, 高知, 1月, 2020.
  15. 布施慶太,西出隆志, HSM上での耐量子暗号の実装と評価, 暗号と情報セキュリティシンポジウム(SCIS), 5pages, 高知, 1月, 2020.
  16. 西出隆志, ワンタイムプログラムとそのシュノア署名への応用, Technical report of IEICE, ISEC, 8pages, 東京, 3月, 2019.
  17. 樋口裕二,西出隆志, 複数鍵完全準同型暗号を用いた非対話型大小比較プロトコル, Technical report of IEICE, ISEC, 6pages, 東京, 3月, 2019.
  18. 三島貴務,西出隆志, ノンスベースのハイブリッド暗号, Technical report of IEICE, ISEC, 8pages, 東京, 3月, 2019.
  19. 樋口裕二,西出隆志, 完全準同型暗号に基づく非対話型大小比較の拡張, 暗号と情報セキュリティシンポジウム(SCIS), 5pages, 滋賀, 1月, 2019.
  20. 南翔, 西出隆志, ランサムウェア検知ソフトCryptoDropの耐性評価, 情報通信システムセキュリティ研究会(ICSS), 7pages, 愛媛, 6月, 2018.
  21. 怒田晟也, 西出隆志, マルチパス通信を実現するDatagram TLS拡張, 情報通信システムセキュリティ研究会(ICSS), 6pages, 愛媛, 6月, 2018.
  22. 小嶋陸大, 西出隆志, 準同型演算と暗号文拡張を同時に実行する動的な複数鍵完全準同型暗号, 暗号と情報セキュリティシンポジウム(SCIS), 8pages, 新潟, 1月, 2018.
  23. 北村拓也, 西出隆志, クラウドワンタイムプログラムとその電子現金への応用, 暗号と情報セキュリティシンポジウム(SCIS), 8pages, 新潟, 1月, 2018.
  24. 長田元気, 面和成, 西出隆志, API仕様書の説明文を用いたマルウェア動的解析手法, 暗号と情報セキュリティシンポジウム(SCIS), 7pages, 新潟, 1月, 2018.
  25. 天田拓磨, 奈良成泰, 西出隆志,吉浦裕, 浮動小数点演算のための通信コストを削減したマルチパーティ計算, 暗号と情報セキュリティシンポジウム(SCIS), 8pages, 新潟, 1月, 2018.
  26. 三島貴務, 西出隆志, ブロックチェーンを用いた電子契約プロトコル, 情報通信システムセキュリティ研究会(ICSS), 5pages, 高知, 6月, 2017.
  27. 神原佑輔, 西出隆志, TEPLA上での内積暗号の実装と評価, 暗号と情報セキュリティシンポジウム(SCIS), 7pages, 沖縄, 1月, 2017.
  28. 長田元気, 面和成, 西出隆志, Variational Auto-Encoderを用いた半教師あり学習によるネットワーク侵入検知, 暗号と情報セキュリティシンポジウム(SCIS), 8pages, 沖縄, 1月, 2017.
  29. 品川和雅,縫田光司, 西出隆志,花岡悟一郎, 任意の論理関数を計算するシャッフル2回のカードベースプロトコル, 暗号と情報セキュリティシンポジウム(SCIS), 8pages, 沖縄, 1月, 2017.
  30. 天田拓磨, 奈良成泰, 西出隆志, 吉浦裕, 秘密計算を用いた非負値行列因子分解の効率的な実現に関する一考察, コンピュータセキュリティシンポジウム(CSS), 8pages, 秋田, 10月, 2016.
  31. 奈良成泰, 天田拓磨, 西出隆志, 土井洋, 吉浦裕, 秘密計算を用いた時系列情報の安全な集計方法, コンピュータセキュリティシンポジウム(CSS), 8pages, 秋田, 10月, 2016.
  32. 土田光,金山直樹,西出隆志,岡本栄司, 高速復号可能かつ一般的なアクセス構造を実現した属性ベース暗号, Technical report of IEICE, ISEC, 7pages, 東京, 3月, 2016.
  33. 土田光,金山直樹,西出隆志,岡本栄司, Non-Programmable ランダムオラクルモデルで安全性証明可能かつ複数の鍵発行機関が存在可能な属性ベース暗号, Technical report of IEICE, ISEC, 8pages, 東京, 3月, 2016.
  34. 北村拓也,品川和雅,金山直樹,西出隆志,岡本栄司, クラウドを用いたワンタイムプログラムとその電子現金への応用, 暗号と情報セキュリティシンポジウム(SCIS), 5pages, 熊本, 1月, 2016.
  35. 長谷川佳祐,金山直樹,西出隆志,岡本栄司, TEPLAに基づく暗号文/鍵規定型属性ベース暗号の実装, 暗号と情報セキュリティシンポジウム(SCIS), 6pages, 熊本, 1月, 2016.
  36. 小嶋陸大,品川和雅,金山直樹,西出隆志,岡本栄司, 共通鍵完全準同型暗号を用いた安全なブルームフィルタ, 暗号と情報セキュリティシンポジウム(SCIS), 6pages, 熊本, 1月, 2016.
  37. 長田元気, 西出隆志, Stacked Denoising Auto-Encoders によるネットワーク攻撃の特徴抽出と可視化, 暗号と情報セキュリティシンポジウム(SCIS), 8pages, 熊本, 1月, 2016.
  38. 品川和雅,縫田光司, 金山直樹,西出隆志,花岡悟一郎, 岡本栄司, サイズを隠す多者間プロトコルの実現(不)可能性について, 暗号と情報セキュリティシンポジウム(SCIS), 8pages, 熊本, 1月, 2016.
  39. 佐久間淳,陸文傑,西出隆志,國廣昇, プライバシーポリシー執行を保証する関数評価, コンピュータセキュリティシンポジウム(CSS), 8pages, 長崎, 10月, 2015.
  40. 田中和磨,矢内直人,岡田雅之,金山直樹,西出隆志,岡本栄司, BGPSECにおけるアグリゲート署名の導入, コンピュータセキュリティシンポジウム(CSS), 8pages, 長崎, 10月, 2015.
  41. 品川和雅,縫田光司,金山直樹,西出隆志,花岡悟一郎,岡本栄司, 隠し共有ストレージ機能を用いた入出力のサイズを隠す二者間秘密計算の実現(不)可能性, コンピュータセキュリティシンポジウム(CSS), 8pages, 長崎, 10月, 2015.
  42. 神原佑輔,金山直樹,西出隆志,岡本栄司, BN楕円曲線を用いた高速なペアリングライブラリの実装, 情報通信システムセキュリティ研究会(ICSS), 6pages, 福岡, 6月, 2015.
  43. 土田光,金山直樹,西出隆志,岡本栄司,Kwangjo Kim, 複数の鍵発行機関が存在可能な関数型暗号に対する失効機能の実現, 暗号と情報セキュリティシンポジウム(SCIS), 8pages, 福岡, 1月, 2015.
  44. 品川和雅,水木敬明,縫田光司,金山直樹,西出隆志,岡本栄司, 正多角形カードを用いた秘密計算プロトコル, 暗号と情報セキュリティシンポジウム(SCIS), 8pages, 福岡, 1月, 2015.
  45. 中川紗菜美,江村恵太,花岡悟一郎,金山直樹,西出隆志,岡本栄司, 開示者指定グループ署名, 暗号と情報セキュリティシンポジウム(SCIS), 8pages, 福岡, 1月, 2015.
  46. 三井慧史,金山直樹,西出隆志,岡本栄司, Torを利用したアンケートシステムの効率化, 暗号と情報セキュリティシンポジウム(SCIS), 7pages, 福岡, 1月, 2015.
  47. 田中和磨,照屋唯紀,金山直樹,西出隆志,岡本栄司, Supersingularな楕円曲線における効率的Weilペアリング計算手法とその評価, 情報通信システムセキュリティ研究会(ICSS), 6pages, 宮城, 11月, 2014.
  48. 品川和雅,金山直樹,縫田光司,西出隆志,岡本栄司, 偏光板カードを用いた暗号プロトコル, コンピュータセキュリティシンポジウム(CSS), 8pages, 札幌, 10月, 2014.
  49. 品川和雅,西出隆志,岡本栄司, サイフォンを用いた回路計算, 情報科学技術フォーラム(FIT), 4pages, 茨城, 9月, 2014.
  50. Sanami Nakagawa, Keita Emura, Goichiro Hanaoka, Akihisa Kodate, Takashi Nishide, Eiji Okamoto, Yusuke Sakai, Performance Evaluation of a Privacy-Enhanced Access Log Management Mechanism, 9th ACM Symposium on Information, Computer and Communications Security (ASIACCS), 2014 (Poster Session). Best poster award.
  51. 田中和磨,石井健太,照屋唯紀,金山直樹,西出隆志,岡本栄司, Supersingularな楕円曲線におけるWeilペアリングの効率化, 暗号と情報セキュリティシンポジウム(SCIS), 6pages, 鹿児島, 1月, 2014.
  52. 西出隆志,岩本貢,岩崎敦,太田和夫, 自動タイブレークの仕組みを持つ第M + 1価格暗号オークション方式, 暗号と情報セキュリティシンポジウム(SCIS), 8pages, 鹿児島, 1月, 2014.
  53. 長谷川佳祐,西出隆志,岡本栄司, 関数型暗号の実装仕様に関する考察, 暗号と情報セキュリティシンポジウム(SCIS), 6pages, 鹿児島, 1月, 2014.
  54. 北島暢曜,山川高志,西出隆志,花岡悟一郎,岡本栄司, 素因数分解仮定に基づく署名長が短いFail-Stop署名, 暗号と情報セキュリティシンポジウム(SCIS), 8pages, 鹿児島, 1月, 2014.
  55. 小林佑行,矢内直人,西出隆志,花岡悟一郎,岡本栄司, プロキシ型しきい値パスワード鍵共有, 暗号と情報セキュリティシンポジウム(SCIS), 8pages, 鹿児島, 1月, 2014.
  56. 北島暢曜,矢内直人,西出隆志,岸本渡,花岡悟一郎,岡本栄司, 多人数の署名者によるFail-Stop署名とその応用, Symposium on Information Theory(SITA), 6pages, 静岡, 11月, 2013.
  57. 小林佑行,矢内直人,西出隆志,岡本栄司, ゲートウェイ型しきい値パスワード鍵共有の構成に関する一考察, Technical report of IEICE, ISEC vol.113, no.135, pp.247-254, 札幌, 7月, 2013.
  58. Takashi Nishide, Toward Revocation Mechanism for Multi-Authority CP-ABE, 暗号と情報セキュリティシンポジウム(SCIS), 5pages, 京都, 1月, 2013.
  59. Fangming Zhao, Takashi Nishide, and Kouichi Sakurai, On Some Provable Security of Authenticated Diffie-Hellman Key Exchange Scheme, 暗号と情報セキュリティシンポジウム(SCIS), 2pages, 京都, 1月, 2013.
  60. Motoki Kitahara, Takanori Yasuda, Takashi Nishide, Kouichi Sakurai, Embedding Information in a Public Key Efficiently, 7th International Workshop on Security (IWSEC), 2012 (Poster Session).
  61. Takanori Suga, Takashi Nishide, Kouichi Sakurai, Character-based Symmetric Searchable Encryption, 7th International Workshop on Security (IWSEC), 2012 (Poster Session).
  62. 北原基貴, 安田貴徳, 西出隆志, 櫻井幸一, RSA公開鍵における情報埋め込みサイズの上限に関する考察, コンピュータセキュリティシンポジウム(CSS), 8pages, 島根, 10月, 2012.
  63. Fangming Zhao, Takashi Nishide, Kouich Sakurai, A Note on Detection of Compromised Resource-Constrained Nodes and Its Countermeasure, コンピュータセキュリティシンポジウム(CSS), 7pages, 島根, 10月, 2012.
  64. Motoki Kitahara, Takanori Yasuda, Takashi Nishide, Kouichi Sakurai, Efficiency of Embedding Information in RSA Public Key, Forum ``Math-for-Industry'' 2012 ``Information Recovery and Discovery'', Fukuoka, Oct., 2012 (Poster Session).
  65. Takanori Suga, Takashi Nishide, Kouichi Sakurai, Character-based Keyword Search over Encrypted Data, Forum ``Math-for-Industry'' 2012 ``Information Recovery and Discovery'', Fukuoka, Oct., 2012 (Poster Session).
  66. 北原基貴,安田貴徳, 西出隆志, 櫻井幸一, Lenstraアルゴリズムにおける効率的な埋め込み情報量の限界点の検証, 電気関係学会九州支部第65回連合大会, 1pages, 長崎, 9月, 2012.
  67. 北原基貴,西出隆志,櫻井幸一,署名データを組み込んだRSA公開鍵生成法の提案, 情報処理学会,九州支部,火の国情報シンポジウム, 8pages, 福岡, 3月, 2012(情報処理学会九州支部奨励賞).
  68. 田中哲士, 西出隆志, 櫻井幸一, GPUによる並列化を用いた多変数二次多項式の高速代入計算, 電子情報通信学会 総合大会, 1page, 岡山, 3月, 2012.
  69. 菅孝徳, 西出隆志, 櫻井幸一, ブルームフィルタによる検索可能暗号とその安全性評価, 電子情報通信学会 総合大会, 2pages, 岡山, 3月, 2012.
  70. 北原基貴,西出隆志,櫻井幸一, 既定値埋め込み型RSAの既定値長と鍵生成時間の関係について, 日本応用数理学会 研究部会連合発表会 オーガナイズド・セッション「数論アルゴリズムとその応用」, 福岡, 3月, 2012(発表のみ).
  71. 桐淵直人,加藤遼,西出隆志,吉浦裕, 論理演算の一括化によるマルチパーティ計算の効率化と秘密分散データベース検索への応用, 暗号と情報セキュリティシンポジウム(SCIS), 8pages, 石川, 1月, 2012.
  72. 菅孝徳,西出隆志,櫻井幸一,検索可能暗号に対する頻度分析攻撃実験, 暗号と情報セキュリティシンポジウム(SCIS), 5pages, 石川, 1月, 2012.
  73. 北原基貴,西出隆志,櫻井幸一, 認証機能を埋め込んだ公開鍵暗号の提案, 暗号と情報セキュリティシンポジウム(SCIS), 8pages, 石川, 1月, 2012.
  74. Liang Zhao, Takashi Nishide, and Kouichi Sakurai, Differential Fault Analysis on LBlock with Non-uniform Differential Distribution, 暗号と情報セキュリティシンポジウム(SCIS), 8pages, 石川, 1月, 2012.
  75. Takanori Suga, Takashi Nishide, and Kouichi Sakurai, Frequency Analysis on Searchable Encryption with Provable Security, 6th International Workshop on Security (IWSEC), 2011 (Poster Session).
  76. Liang Zhao, Takashi Nishide, Avishek Adhikari, Kyung-Hyune Rhee, and Kouichi Sakurai, On the Insecurity of Randomized Arithmetic Codes Based on Markov Model, 情報セキュリティ研究会(ISEC), 8pages, 大阪, 11月, 2011.
  77. 田中哲士, 西出隆志, 櫻井幸一, 多変数暗号におけるGPUを用いた高速実装手法の評価, コンピュータセキュリティシンポジウム(CSS), 6pages, 新潟, 10月, 2011.
  78. Fangming Zhao, Takashi Nishide, Kouich Sakurai, Multi-User Keyword Search Scheme for Secure Data Sharing with Fine-Grained Access Control, コンピュータセキュリティシンポジウム(CSS), 6pages, 新潟, 10月, 2011.
  79. 田中敏之, 西出隆志, 櫻井幸一, 安全なクラウドストレージを実現するFADEへの改良の提案, コンピュータセキュリティシンポジウム(CSS), 6pages, 新潟, 10月, 2011.
  80. 菅孝徳, 西出隆志, 櫻井幸一, 検索可能暗号の安全性再考, コンピュータセキュリティシンポジウム(CSS), 6pages, 新潟, 10月, 2011.
  81. 菅孝徳, 西出隆志, 櫻井幸一, ブルームフィルタによる文字毎の比較に基づく安全なキーワード検索, 電気関係学会九州支部第64回連合大会, 1pages, 佐賀, 9月, 2011(情報処理学会九州支部奨励賞).
  82. 田中哲士, 西出隆志, 櫻井幸一, GPUを用いた多変数暗号における高速実装手法, 電気関係学会九州支部第64回連合大会, 1pages, 佐賀, 9月, 2011.
  83. Ruan Na, Takashi Nishide, and Yoshiaki Hori, A Key Management Scheme against Compromised RSU in VANET, 電気関係学会九州支部第64回連合大会, 1pages, 佐賀, 9月, 2011.
  84. 菅孝徳, 西出隆志, 櫻井幸一, ブルームフィルタを用いた検索自由度の高い検索可能暗号の設計と実装評価, 第53回コンピュータセキュリティ研究発表会(CSEC), 6pages, 福岡, 5月, 2011(IOT学生奨励賞).
  85. 西出隆志, 宮本大輔, 須崎有康, 吉岡克成, Network and Distributed System Security Symposium 2011 参加報告, 第53回コンピュータセキュリティ研究発表会(CSEC), 6pages, 福岡, 5月, 2011.
  86. 菅孝徳,西出隆志,堀良彰,櫻井幸一, ブルームフィルタを用いた柔軟な検索が可能な検索可能暗号の提案, 火の国情報シンポジウム, 7pages, 福岡, 3月, 2011.
  87. 丸山高徳,西出隆志,堀良彰,櫻井幸一, ICカードを用いた生体認証におけるテンプレート保護技術の安全性評価, 火の国情報シンポジウム, 7pages, 福岡, 3月, 2011.
  88. Takashi Nishide, Shinichi Yoshinaga, Rishiraj Bhattacharyya, Bimal Roy, and Kouichi Sakurai, How to Make Double DES Robust Against Meet-in-the-middle Attack, 暗号と情報セキュリティシンポジウム(SCIS), 6pages, 福岡, 1月, 2011.
  89. Peng Gao, Seiichiro Mizoguchi, Takashi Nishide, Yoshiaki Hori, and Kouichi Sakurai, Enforcing Integrity Protection in WebPage Based on A Fragile Watermarking Chain Scheme, 暗号と情報セキュリティシンポジウム(SCIS), 8pages, 福岡, 1月, 2011.
  90. Fangming Zhao, Takashi Nishide, and Kouichi Sakurai, Achieving Fine-grained and Flexible Access Control to Outsourced Data with Attribute-based Cryptosystems, 暗号と情報セキュリティシンポジウム(SCIS), 8pages, 福岡, 1月, 2011.
  91. Liangjian Mao, Takashi Nishide, and Kouichi Sakurai, Information Flow Analysis Method for Preventing Document Information Leakage, 暗号と情報セキュリティシンポジウム(SCIS), 8pages, 福岡, 1月, 2011.
  92. 堀良彰, 西出隆志, 櫻井幸一, ネットワークセキュリティにおけるインサイダー脅威対策, 暗号と情報セキュリティシンポジウム(SCIS), 3pages, 福岡, 1月, 2011.
  93. Fangming Zhao, Takashi Nishide, and Kouichi Sakurai, Cryptographic Cloud Storage with Fine-grained and Flexible Access Control, コンピュータセキュリティシンポジウム(CSS), 6pages, 岡山, 10月, 2010.
  94. 西出隆志, Amril Syalim, and 櫻井幸一, IFIP WG 11.3 Working Conference on Data and Applications Security and Privacy 2010 会議参加報告, コンピュータセキュリティシンポジウム(CSS), 6pages, 岡山, 10月, 2010.
  95. 田中哲士,西出隆志, 堀良彰, 櫻井幸一, GPUを用いた暗号の実装手法についての検討, 電気関係学会九州支部連合大会, 1page, 福岡, 9月, 2010.
  96. Amril Syalim, Takashi Nishide, and Kouichi Sakurai, Preserving Integrity and Confidentiality of a Directed Acyclic Graph Model of Provenance, 情報科学技術フォーラム(FIT), 2pages, 福岡, 9月, 2010.
  97. Peng Gao, Takashi Nishide, Yoshiaki Hori, and Kouichi Sakurai, Integrity for the In-flight Web Page Using Fragile Watermarking, 情報科学技術フォーラム(FIT), 4pages, 福岡, 9月, 2010.
  98. 古川潤,境顕宏,西出隆志,堀良彰,櫻井幸一, 強制暗号化カーネルモジュールの設計と実装, 火の国情報シンポジウム, 6pages, 宮崎, 3月, 2010.
  99. Takashi Nishide and Kouichi Sakurai, Distributed Key Generation for Paillier Cryptosystem, 暗号と情報セキュリティシンポジウム(SCIS), 6pages, 香川, 1月, 2010.
  100. Jingyu Hua, Takashi Nishide, Bimal Roy, Mingchu Li, and Kouichi Sakurai, A Theoretical Framework for Program-semantics-based Intrusion Detection by Abstract Interpretation, 暗号と情報セキュリティシンポジウム(SCIS), 6pages, 香川, 1月, 2010.
  101. 志村正法,西出隆志,吉浦裕, (k,n)秘密分散上での関係データベースの構造演算の実現, 暗号と情報セキュリティシンポジウム(SCIS), 6pages, 香川, 1月, 2010.
  102. Chunhua Su, Tadashi Araragi, Takashi Nishide, and Kouichi Sakurai, Efficient Adaptively Secure Oblivious Polynomial Evaluation with Universal Composability: If Homomorphic and Non-committing Encryption Exists, 暗号と情報セキュリティシンポジウム(SCIS), 6pages, 香川, 1月, 2010.
  103. 藤村浩太,西出隆志,堀良彰,櫻井幸一,内容の類似性を用いたトラックバックスパム判別法の評価と考察, コンピュータセキュリティ研究発表会(CSEC), Vol.2009-CSEC-47 No.1,6pages, 東京,12月,2009.
  104. 江藤文治,西出隆志,堀良彰,櫻井幸一,ACM CCS2009会議ならびに併設ワークショップ参加報告,コンピュータセキュリティ研究発表会(CSEC), Vol.2009-CSEC-47 No.5,6pages, 東京,12月,2009.
  105. Takashi Nishide, Kazuki Yoneyama, Kazuo Ohta, Attribute-based encryption with hidden encryptor-specified policies, Symposium on Cryptography and Information Security (SCIS), 6pages, 2008.
  106. Takashi Nishide, Kazuki Yoneyama, Kazuo Ohta, Attribute-based encryption with partially hidden ciphtertext policies, IEICE Technical Report, ISEC2007-125, pp.93--100, 2007.
  107. Takashi Nishide, Kazuo Ohta, How to compare two polynomially shared secrets privately, Symposium on Cryptography and Information Security (SCIS), 5pages, 2006.