Koji Nuida

1.0k total citations
43 papers, 251 citations indexed

About

Koji Nuida is a scholar working on Artificial Intelligence, Computational Theory and Mathematics and Discrete Mathematics and Combinatorics. According to data from OpenAlex, Koji Nuida has authored 43 papers receiving a total of 251 indexed citations (citations by other indexed papers that have themselves been cited), including 25 papers in Artificial Intelligence, 15 papers in Computational Theory and Mathematics and 10 papers in Discrete Mathematics and Combinatorics. Recurrent topics in Koji Nuida's work include Cryptography and Data Security (19 papers), Coding theory and cryptography (11 papers) and Advanced Combinatorial Mathematics (10 papers). Koji Nuida is often cited by papers focused on Cryptography and Data Security (19 papers), Coding theory and cryptography (11 papers) and Advanced Combinatorial Mathematics (10 papers). Koji Nuida collaborates with scholars based in Japan, Czechia and Bulgaria. Koji Nuida's co-authors include Hideki Imai, Kana Shimizu, Gen Kimura, Kazumasa Shinagawa, Gunnar Rätsch, Goichiro Hanaoka, Manabu Hagiwara, Takashi Kitagawa, Takashi Nishide and Nuttapong Attrapadung and has published in prestigious journals such as Bioinformatics, IEEE Transactions on Information Theory and BMC Bioinformatics.

In The Last Decade

Koji Nuida

38 papers receiving 241 citations

Peers — A (Enhanced Table)

Peers by citation overlap · career bar shows stage (early→late) cites · hero ref

Name h Career Trend Papers Cites
Koji Nuida Japan 8 169 58 45 43 37 43 251
Blair D. Sullivan United States 10 137 0.8× 31 0.5× 91 2.0× 28 0.7× 16 0.4× 29 280
Serge Fehr Netherlands 9 329 1.9× 49 0.8× 48 1.1× 43 1.0× 179 4.8× 27 390
George Purdy United States 9 84 0.5× 76 1.3× 56 1.2× 42 1.0× 10 0.3× 39 285
Karl-Heinz Zimmermann Germany 9 90 0.5× 22 0.4× 46 1.0× 38 0.9× 13 0.4× 42 262
Zhimin He China 9 225 1.3× 19 0.3× 40 0.9× 23 0.5× 64 1.7× 37 294
Wakaha Ogata Japan 9 286 1.7× 79 1.4× 69 1.5× 91 2.1× 10 0.3× 41 347
Loÿs Thimonier France 2 100 0.6× 15 0.3× 22 0.5× 39 0.9× 4 0.1× 4 277
William J. Zeng United States 9 216 1.3× 29 0.5× 40 0.9× 29 0.7× 70 1.9× 22 359
Anindya De United States 9 177 1.0× 23 0.4× 95 2.1× 32 0.7× 58 1.6× 34 252
Jack D. Hidary United States 5 173 1.0× 30 0.5× 37 0.8× 24 0.6× 50 1.4× 9 251

Countries citing papers authored by Koji Nuida

Since Specialization
Citations

This map shows the geographic impact of Koji Nuida's research. It shows the number of citations coming from papers published by authors working in each country. You can also color the map by specialization and compare the number of citations received by Koji Nuida with the expected number of citations based on a country's size and research output (numbers larger than one mean the country cites Koji Nuida more than expected).

Fields of papers citing papers by Koji Nuida

Since Specialization
Physical SciencesHealth SciencesLife SciencesSocial Sciences

This network shows the impact of papers produced by Koji Nuida. Nodes represent research fields, and links connect fields that are likely to share authors. Colored nodes show fields that tend to cite the papers produced by Koji Nuida. The network helps show where Koji Nuida may publish in the future.

Co-authorship network of co-authors of Koji Nuida

This figure shows the co-authorship network connecting the top 25 collaborators of Koji Nuida. A scholar is included among the top collaborators of Koji Nuida based on the total number of citations received by their joint publications. Widths of edges represent the number of papers authors have co-authored together. Node borders signify the number of papers an author published with Koji Nuida. Koji Nuida is excluded from the visualization to improve readability, since they are connected to all nodes in the network.

All Works

20 of 20 papers shown
1.
Shinagawa, Kazumasa, et al.. (2023). Private simultaneous messages based on quadratic residues. Designs Codes and Cryptography. 91(12). 3915–3932. 1 indexed citations
2.
Hashimoto, Yuji & Koji Nuida. (2023). Efficient Construction of CGL Hash Function Using Legendre Curves. IEICE Transactions on Fundamentals of Electronics Communications and Computer Sciences. E106.A(9). 1131–1140.
3.
Kaji, Shizuo, et al.. (2019). Polynomial expressions of p -ary auction functions. Journal of Mathematical Cryptology. 13(2). 69–80. 3 indexed citations
4.
Hashimoto, Yuji, et al.. (2018). Secure Grouping Protocol Using a Deck of Cards. IEICE Transactions on Fundamentals of Electronics Communications and Computer Sciences. E101.A(9). 1512–1524. 7 indexed citations
5.
Nuida, Koji, et al.. (2018). Secure Wavelet Matrix: Alphabet-Friendly Privacy-Preserving String Search for Bioinformatics. IEEE/ACM Transactions on Computational Biology and Bioinformatics. 16(5). 1675–1684. 8 indexed citations
6.
Shimizu, Kana, Koji Nuida, & Gunnar Rätsch. (2016). Efficient privacy-preserving string search and an application in genomics. Bioinformatics. 32(11). 1652–1661. 40 indexed citations
7.
Nuida, Koji. (2016). Recent research topics on fully homomorphic encryption. The Journal of Institute of Electronics, Information and Communication Engineers. 99(12). 1176–1183. 1 indexed citations
8.
Nuida, Koji. (2016). Digital fingerprinting codes: Constructions and properties. The Journal of Institute of Electronics, Information and Communication Engineers. 99(6). 551–555.
9.
Shinagawa, Kazumasa, Koji Nuida, Takashi Nishide, Goichiro Hanaoka, & Eiji Okamoto. (2016). Committed AND protocol using three cards with more handy shuffle. International Symposium on Information Theory and its Applications. 700–702. 2 indexed citations
10.
Mühlherr, Bernhard & Koji Nuida. (2016). Intrinsic reflections in Coxeter systems. Journal of Combinatorial Theory Series A. 144. 326–360. 2 indexed citations
11.
Shimizu, Kana, Koji Nuida, Hiromi Arai, et al.. (2015). Privacy-preserving search for chemical compound databases. BMC Bioinformatics. 16(S18). S6–S6. 14 indexed citations
12.
Kimura, Gen & Koji Nuida. (2014). On affine maps on non-compact convex sets and some characterizations of finite-dimensional solid ellipsoids. Journal of Geometry and Physics. 86. 1–18. 1 indexed citations
13.
Nuida, Koji & Goichiro Hanaoka. (2012). On the Security of Pseudorandomized Information-Theoretically Secure Schemes. IEEE Transactions on Information Theory. 59(1). 635–652. 1 indexed citations
14.
Nuida, Koji. (2009). A characterization of signed graphs with generalized perfect elimination orderings. Discrete Mathematics. 310(4). 819–831. 3 indexed citations
15.
Nuida, Koji, et al.. (2009). An Efficient 2-Secure and Short Random Fingerprint Code and Its Security Evaluation. IEICE Transactions on Fundamentals of Electronics Communications and Computer Sciences. E92-A(1). 197–206. 2 indexed citations
16.
Abe, Takuro, et al.. (2008). Bicolor-eliminable graphs and free multiplicities on the braid arrangement. EPrints - Department of Mathematics, Hokkaido University. 893. 1–19.
17.
Kitagawa, Takashi, et al.. (2008). A group testing based deterministic tracing algorithm for a short random fingerprint code. 1–5. 2 indexed citations
18.
Nuida, Koji. (2007). A Characterization of Edge-Bicolored Graphs with Generalized Perfect Elimination Orderings. arXiv (Cornell University). 2 indexed citations
19.
Nuida, Koji. (2007). Almost central involutions in split extensions of Coxeter groups by graph automorphisms. Journal of Group Theory. 10(2). 1 indexed citations
20.
Nuida, Koji, et al.. (2006). Optimal probabilistic fingerprinting codes using optimal finite random variables related to numerical quadrature. arXiv (Cornell University). 6 indexed citations

Rankless uses publication and citation data sourced from OpenAlex, an open and comprehensive bibliographic database. While OpenAlex provides broad and valuable coverage of the global research landscape, it—like all bibliographic datasets—has inherent limitations. These include incomplete records, variations in author disambiguation, differences in journal indexing, and delays in data updates. As a result, some metrics and network relationships displayed in Rankless may not fully capture the entirety of a scholar's output or impact.

Explore authors with similar magnitude of impact

Rankless by CCL
2026