Get my own profile

Public access

View all2 articles

0 articles

available

not available

Based on funding mandates

### Co-authors

- Ken-ichi KawarabayashiVerified email at nii.ac.jp
- Takuro FukunagaChuo UniversityVerified email at g.chuo-u.ac.jp
- Shinji ItoNEC CorporationVerified email at nec.com
- Yoshio OkamotoUniversity of Electro-CommunicationsVerified email at uec.ac.jp
- Yuichi YoshidaNational Institute of InformaticsVerified email at nii.ac.jp
- Tasuku SomaMassachusetts Institute of TechnologyVerified email at mit.edu
- Kazuhiro InabaGoogleVerified email at google.com
- Satoru IwataUniversity of TokyoVerified email at mist.i.u-tokyo.ac.jp
- Vorapong SuppakitpaisarnThe University of TokyoVerified email at is.s.u-tokyo.ac.jp
- Dániel MarxCISPA Helmholtz Center for Information SecurityVerified email at cispa.saarland
- Atsushi MiyauchiUniversity of TokyoVerified email at mist.i.u-tokyo.ac.jp
- Yutaro YamaguchiKyushu UniversityVerified email at inf.kyushu-u.ac.jp
- Yuni IwamasaKyoto UniversityVerified email at i.kyoto-u.ac.jp
- Charalampos E. TsourakakisBoston University, ISI Foundation, Harvard UniversityVerified email at seas.harvard.edu
- Tianyi ChenPhD, Boston UniversityVerified email at bu.edu
- Laura SanitàAssociate Professor, C&O Department - University of WaterlooVerified email at uwaterloo.ca
- Friedrich EisenbrandEPFLVerified email at epfl.ch
- Thomas RothvossUniversity of WashingtonVerified email at math.mit.edu
- Kenjiro TakazawaHosei UniversityVerified email at hosei.ac.jp
- Simon MaurasIRIF, ParisVerified email at irif.fr

Naonori Kakimura

Verified email at math.keio.ac.jp - Homepage