Publications
Refereed Conference
See my DBLP or Google Scholar for further publication list.
Kazunari Tozawa, Hiraku Morita, and Takaaki Mizuki: Single-Shuffle Card-based Protocol with Eight Cards per Gate. Unconventional Computation and Natural Computation (UCNC 2023), Lecture Notes in Computer Science, Springer, vol.14003, pp.171-185. [PDF] (This is an Accepted Manuscript.)
Nuttapong Attrapadung, Hiraku Morita, Kazuma Ohara, Jacob Schuldt, Tadanori Teruya, Kazunari Tozawa: Secure Parallel Computation on Privately Partitioned Data and Applications. ACM CCS 2022: 858-872.
N. Attrapadung, H. Morita, K. Ohara, J. Schuldt, K. Tozawa: Memory and Round-Efficient MPC Primitives in the Pre-Processing Model from Unit Vectorization. AsiaCCS 2022: 858-872
N. Attrapadung, G. Hanaoaka, T. Matsuda, H. Morita, K. Ohara, J. Schuldt, T. Teruya, K. Tozawa: Oblivious Linear Group Actions and Applications. CCS 2021: 630-650
Hiraku Morita, Nuttapong Attrapadung: Client-Aided Two-Party Secure Interval Test Protocol. CANS 2019: 328-343
Hiraku Morita, Nuttapong Attrapadung, Tadanori Teruya, Satsuya Ohata, Koji Nuida, Goichiro Hanaoka: Constant-Round Client-Aided Secure Comparison Protocol. ESORICS (2) 2018: 395-415
Hiraku Morita, Nuttapong Attrapadung, Satsuya Ohata, Shota Yamada, Koji Nuida, Goichiro Hanaoka: Tree-based Secure Comparison of Secret Shared Data. ISITA 2018: 525-529
Hiraku Morita, Nuttapong Attrapadung, Satsuya Ohata, Koji Nuida, Shota Yamada, Kana Shimizu, Goichiro Hanaoka, Kiyoshi Asai: Secure Division Protocol and Applications to Privacy-preserving Chi-squared Tests. ISITA 2018: 530-534
Satsuya Ohata, Hiraku Morita, Goichiro Hanaoka: Accuracy/Efficiency Trade-Off for Privacy-Preserving Division Protocol. ISITA 2018: 535-539
Hiraku Morita, Jacob C. N. Schuldt, Takahiro Matsuda, Goichiro Hanaoka, Tetsu Iwata: On the Security of the Schnorr Signature Scheme and DSA Against Related-Key Attacks. ICISC 2015: 20-35
Kazuhiko Minematsu, Stefan Lucks, Hiraku Morita, Tetsu Iwata: Attacks and Security Proofs of EAX-Prime. FSE 2013: 327-347 2012
Kentaro Inui, Shuya Abe, Kazuo Hara, Hiraku Morita, Chitose Sao, Megumi Eguchi, Asuka Sumida, Koji Murakami, Suguru Matsuyoshi: Experience Mining: Building a Large-Scale Database of Personal Experiences and Opinions from Web Documents. Web Intelligence 2008: 314-321
Refereed Journal
Nan Cheng, Naman Gupta, Aikaterini Mitrokotsa, Hiraku Morita and Kazunari Tozawa, "Constant-Round Private Decision Tree Evaluation for Secret Shared Data. Proc. Priv. Enhancing Technol. 2024(1): (To appear) ePrint)
Nuttapong Attrapadung, Koki Hamada, Dai Ikarashi, Ryo Kikuchi, Takahiro Matsuda, Ibuki Mishina, Hiraku Morita, Jacob C. N. Schuldt: Adam in Private: Secure and Fast Training of Deep Neural Networks with Adaptive Moment Estimation. Proc. Priv. Enhancing Technol. 2022(4): 746-767 (2022)
Hiraku Morita, Nuttapong Attrapadung, Tadanori Teruya, Satsuya Ohata, Koji Nuida, Goichiro Hanaoka: Constant-Round Client-Aided Two-Server Secure Comparison Protocol and Its Applications. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 103-A(1): 21-32 (2020)
Hiraku Morita, Jacob C. N. Schuldt, Takahiro Matsuda, Goichiro Hanaoka, Tetsu Iwata: On the Security of Schnorr Signatures, DSA, and ElGamal Signatures against Related-Key Attacks. IEICE Transactions 100-A(1): 73-90 (2017)
Hiraku Morita, Jacob C. N. Schuldt, Takahiro Matsuda, Goichiro Hanaoka, Tetsu Iwata: On the Security of Non-Interactive Key Exchange against Related-Key Attacks. IEICE Transactions 100-A(9): 1910-1923 (2017)
Shuya Abe, Kentaro Inui, Kazuo Hara, Hiraku Morita, Chitose Sao, Megumi Eguchi, Asuka Sumida, Koji Murakami, Suguru Matsuyoshi: Mining personal experiences and opinions from Web documents. Web Intell. Agent Syst. 9(2): 109-121 (2011)