High-throughput semi-honest secure three-party computation with an honest majority T Araki, J Furukawa, Y Lindell, A Nof, K Ohara Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications …, 2016 | 438 | 2016 |
Optimized honest-majority MPC for malicious adversaries—breaking the 1 billion-gate per second barrier T Araki, A Barak, J Furukawa, T Lichter, Y Lindell, A Nof, K Ohara, ... 2017 IEEE Symposium on Security and Privacy (SP), 843-862, 2017 | 164 | 2017 |
Tinypeds: Tiny persistent encrypted data storage in asynchronous wireless sensor networks J Girao, D Westhoff, E Mykletun, T Araki Ad Hoc Networks 5 (7), 1073-1089, 2007 | 126 | 2007 |
Database encryption system, method, and program K Mori, S Obana, J Furukawa, I Teranishi, T Isshiki, T Araki US Patent 8,812,877, 2014 | 93 | 2014 |
Generalizing the SPDZ compiler for other protocols T Araki, A Barak, J Furukawa, M Keller, Y Lindell, K Ohara, H Tsuchida Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications …, 2018 | 53 | 2018 |
Almost optimum secret sharing schemes secure against cheating for arbitrary secret distribution S Obana, T Araki International Conference on the Theory and Application of Cryptology and …, 2006 | 48 | 2006 |
Efficient (k,n) Threshold Secret Sharing Schemes Secure Against Cheating from n − 1 Cheaters T Araki Australasian Conference on Information Security and Privacy, 133-142, 2007 | 44 | 2007 |
Secure graph analysis at scale T Araki, J Furukawa, K Ohara, B Pinkas, H Rosemarin, H Tsuchida Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications …, 2021 | 43 | 2021 |
Method of producing pure alumina by spark discharge process and the characteristics thereof W Ishibashi, T Araki, K Kishimoto, H Kuno Ceram. Jpn 6, 461-468, 1971 | 25 | 1971 |
Database apparatus, method, and program K Mori, S Obana, J Furukawa, I Teranishi, T Isshiki, T Araki US Patent 9,600,677, 2017 | 24 | 2017 |
Ionic and atomic absorption in stable spark discharges T Araki, JP Walters Spectrochimica Acta Part B: Atomic Spectroscopy 34 (11-12), 371-383, 1979 | 18 | 1979 |
Secret information distribution system, method, program, and transmission system T Araki US Patent 8,861,734, 2014 | 16 | 2014 |
Flaws in some secret sharing schemes against cheating T Araki, S Obana Australasian Conference on Information Security and Privacy, 122-132, 2007 | 16 | 2007 |
A simple and efficient secret sharing scheme secure against cheating T Araki, W Ogata IEICE transactions on fundamentals of electronics, communications and …, 2011 | 14 | 2011 |
High-throughput secure three-party computation of kerberos ticket generation T Araki, A Barak, J Furukawa, Y Lindell, A Nof, K Ohara Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications …, 2016 | 12 | 2016 |
Database encryption system, method, and program K Mori, S Obana, J Furukawa, I Teranishi, T Isshiki, T Araki US Patent 9,349,023, 2016 | 12 | 2016 |
Information processing apparatus, information processing method, and program T Araki, I Teranishi, J Furukawa US Patent 9,300,471, 2016 | 12 | 2016 |
Cheating detectable secret sharing schemes for random bit strings W Ogata, T Araki IEICE Transactions on Fundamentals of Electronics, Communications and …, 2013 | 12 | 2013 |
Almost secure 1-round message transmission scheme with polynomial-time message decryption T Araki International Conference on Information Theoretic Security, 2-13, 2008 | 12 | 2008 |
Gadolinium enhancement of cauda equina after combined spinal–epidural anaesthesia M Takasu, M Okita, T Araki, N Tanitame, A Tamura, N Suwaki, K Ito The British journal of radiology 83 (993), e192-e194, 2010 | 11 | 2010 |