Get my own profile

Public access

View all6 articles

0 articles

available

not available

Based on funding mandates

### Co-authors

- Ken-ichi KawarabayashiVerified email at nii.ac.jp
- Yusuke KOBAYASHIKyoto UniversityVerified email at kurims.kyoto-u.ac.jp
- Takuro FukunagaChuo UniversityVerified email at g.chuo-u.ac.jp
- Shinji ItoNEC CorporationVerified email at nec.com
- Yoshio OkamotoUniversity of Electro-CommunicationsVerified email at uec.ac.jp
- Yuichi YoshidaNational Institute of InformaticsVerified email at nii.ac.jp
- Tasuku SomaMassachusetts Institute of TechnologyVerified email at mit.edu
- Kazuhiro InabaGoogleVerified email at google.com
- Satoru IwataUniversity of TokyoVerified email at mist.i.u-tokyo.ac.jp
- Vorapong SuppakitpaisarnThe University of TokyoVerified email at is.s.u-tokyo.ac.jp
- Atsushi MiyauchiUniversity of TokyoVerified email at mist.i.u-tokyo.ac.jp
- Dániel MarxCISPA Helmholtz Center for Information SecurityVerified email at cispa.saarland
- Yuni IwamasaKyoto UniversityVerified email at i.kyoto-u.ac.jp
- Kei KimuraKyushu UniversityVerified email at inf.kyushu-u.ac.jp
- Charalampos E. TsourakakisBoston UniversityVerified email at bu.edu
- Tianyi ChenPhD, Boston UniversityVerified email at bu.edu
- Yutaro YamaguchiOsaka UniversityVerified email at ist.osaka-u.ac.jp
- Laura SanitàAssociate Professor, TU EindhovenVerified email at tue.nl
- Friedrich EisenbrandEPFLVerified email at epfl.ch
- Thomas RothvossUniversity of WashingtonVerified email at math.mit.edu

Naonori Kakimura

Verified email at math.keio.ac.jp - Homepage