default search action
Noboru Kunihiro
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [j52]Reo Eriguchi, Noboru Kunihiro, Koji Nuida:
Multiplicative and verifiably multiplicative secret sharing for multipartite adversary structures. Des. Codes Cryptogr. 91(5): 1751-1778 (2023) - [j51]Reo Eriguchi, Noboru Kunihiro, Koji Nuida:
Linear Algebraic Approach to Strongly Secure Ramp Secret Sharing for General Access Structures with Application to Symmetric PIR. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 106(3): 263-271 (2023) - [j50]Reo Eriguchi, Atsunori Ichikawa, Noboru Kunihiro, Koji Nuida:
Efficient Noise Generation Protocols for Differentially Private Multiparty Computation. IEEE Trans. Dependable Secur. Comput. 20(6): 4486-4501 (2023) - [c94]Kenta Tani, Noboru Kunihiro:
HS-Based Error Correction Algorithm for Noisy Binary GCD Side-Channel Sequences. ACNS (1) 2023: 59-88 - [c93]Junpei Yamaguchi, Masafumi Yamazaki, Akihiro Tabuchi, Takumi Honda, Tetsuya Izu, Noboru Kunihiro:
Experiments and Resource Analysis of Shor's Factorization Using a Quantum Simulator. ICISC (1) 2023: 119-139 - [c92]Shunsuke Osaki, Noboru Kunihiro:
Extended Attacks on ECDSA with Noisy Multiple Bit Nonce Leakages. ICISC (1) 2023: 163-184 - [i20]Junpei Yamaguchi, Masafumi Yamazaki, Akihiro Tabuchi, Takumi Honda, Tetsuya Izu, Noboru Kunihiro:
Estimation of Shor's Circuit for 2048-bit Integers based on Quantum Simulator. IACR Cryptol. ePrint Arch. 2023: 92 (2023) - 2022
- [j49]Noboru Kunihiro:
Editor's Message to Special Issue of Computer Security Technologies for Quantum-Safe World. J. Inf. Process. 30: 562 (2022) - [i19]Reo Eriguchi, Noboru Kunihiro, Koji Nuida:
Multiplicative and Verifiably Multiplicative Secret Sharing for Multipartite Adversary Structures. IACR Cryptol. ePrint Arch. 2022: 1390 (2022) - [i18]Reo Eriguchi, Atsunori Ichikawa, Noboru Kunihiro, Koji Nuida:
Efficient Noise Generation Protocols for Differentially Private Multiparty Computation. IACR Cryptol. ePrint Arch. 2022: 1391 (2022) - 2021
- [j48]Mengce Zheng, Noboru Kunihiro, Yuanzhi Yao:
Cryptanalysis of the RSA variant based on cubic Pell equation. Theor. Comput. Sci. 889: 135-144 (2021) - [c91]Reo Eriguchi, Atsunori Ichikawa, Noboru Kunihiro, Koji Nuida:
Efficient Noise Generation to Achieve Differential Privacy with Applications to Secure Multiparty Computation. Financial Cryptography (1) 2021: 271-290 - 2020
- [j47]Noboru Kunihiro, Atsushi Takayasu:
Worst case short lattice vector enumeration on block reduced bases of arbitrary blocksizes. Discret. Appl. Math. 277: 198-220 (2020) - [j46]Mengce Zheng, Noboru Kunihiro, Honggang Hu:
Lattice-Based Cryptanalysis of RSA with Implicitly Related Keys. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 103-A(8): 959-968 (2020) - [j45]Reo Eriguchi, Noboru Kunihiro:
Strong security of linear ramp secret sharing schemes with general access structures. Inf. Process. Lett. 164: 106018 (2020) - [j44]Takashi Yamakawa, Shota Yamada, Goichiro Hanaoka, Noboru Kunihiro:
Generic hardness of inversion on ring and its relation to self-bilinear map. Theor. Comput. Sci. 820: 60-84 (2020) - [j43]Kaichi Suzuki, Atsushi Takayasu, Noboru Kunihiro:
Extended partial key exposure attacks on RSA: Improvement up to full size decryption exponents. Theor. Comput. Sci. 841: 62-83 (2020) - [c90]Kento Oonishi, Noboru Kunihiro:
Recovering CRT-RSA Secret Keys from Noisy Square-and-Multiply Sequences in the Sliding Window Method. ACISP 2020: 642-652 - [c89]Masayuki Yoshino, Ken Naganuma, Noboru Kunihiro, Hisayoshi Sato:
Practical Query-based Order Revealing Encryption from Symmetric Searchable Encryption. AsiaJCIS 2020: 16-23 - [c88]Ken Naganuma, Masayuki Yoshino, Atsuo Inoue, Yukinori Matsuoka, Mineaki Okazaki, Noboru Kunihiro:
Post-Quantum zk-SNARK for Arithmetic Circuits using QAPs. AsiaJCIS 2020: 32-39 - [c87]Ken Naganuma, Takayuki Suzuki, Masayuki Yoshino, Kenta Takahashi, Yosuke Kaga, Noboru Kunihiro:
New Secret Key Management Technology for Blockchains from Biometrics Fuzzy Signature. AsiaJCIS 2020: 54-58 - [c86]Reo Eriguchi, Noboru Kunihiro:
d-Multiplicative Secret Sharing for Multipartite Adversary Structures. ITC 2020: 2:1-2:16 - [c85]Reo Eriguchi, Noboru Kunihiro, Koji Nuida:
A Linear Algebraic Approach to Strongly Secure Ramp Secret Sharing for General Access Structures. ISITA 2020: 427-431
2010 – 2019
- 2019
- [j42]Noboru Kunihiro, Yasutada Oohama:
Foreword. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 102-A(12): 1590 (2019) - [j41]Atsushi Takayasu, Noboru Kunihiro:
Partial key exposure attacks on RSA: Achieving the Boneh-Durfee bound. Theor. Comput. Sci. 761: 51-77 (2019) - [c84]Kento Oonishi, Xiaoxuan Huang, Noboru Kunihiro:
Improved CRT-RSA Secret Key Recovery Method from Sliding Window Leakage. ICISC 2019: 278-296 - [c83]Reo Eriguchi, Noboru Kunihiro, Mitsugu Iwamoto:
Optimal Multiple Assignment Schemes Using Ideal Multipartite Secret Sharing Schemes. ISIT 2019: 3047-3051 - [c82]Reo Eriguchi, Noboru Kunihiro:
Strongly Secure Ramp Secret Sharing Schemes from Any Linear Secret Sharing Schemes. ITW 2019: 1-5 - 2018
- [c81]Liqiang Peng, Yao Lu, Noboru Kunihiro, Rui Zhang, Lei Hu:
A Deterministic Algorithm for Computing Divisors in an Interval. ACISP 2018: 3-12 - [c80]Mengce Zheng, Noboru Kunihiro, Honggang Hu:
Cryptanalysis of RSA Variants with Modified Euler Quotient. AFRICACRYPT 2018: 266-281 - [c79]Yao Lu, Noboru Kunihiro, Rui Zhang, Liqiang Peng, Hui Ma:
Certifying Variant of RSA with Generalized Moduli. ICICS 2018: 598-608 - [c78]Kento Oonishi, Noboru Kunihiro:
Attacking Noisy Secret CRT-RSA Exponents in Binary Method. ICISC 2018: 37-54 - [c77]Ken Naganuma, Masayuki Yoshino, Hisayoshi Sato, Nishio Yamada, Takayuki Suzuki, Noboru Kunihiro:
Decentralized Netting Protocol over Consortium Blockchain. ISITA 2018: 174-177 - [c76]Satoshi Furukawa, Noboru Kunihiro, Katsuyuki Takashima:
Multi-party Key Exchange Protocols from Supersingular Isogenies. ISITA 2018: 208-212 - [c75]Sota Onozawa, Noboru Kunihiro, Masayuki Yoshino, Ken Naganuma:
Inference Attacks on Encrypted Databases Based on Order Preserving Assignment Problem. IWSEC 2018: 35-47 - [c74]Noboru Kunihiro, Wenjie Lu, Takashi Nishide, Jun Sakuma:
Outsourced Private Function Evaluation with Privacy Policy Enforcement. TrustCom/BigDataSE 2018: 412-423 - [i17]Takashi Yamakawa, Shota Yamada, Goichiro Hanaoka, Noboru Kunihiro:
Generic Hardness of Inversion on Ring and Its Relation to Self-Bilinear Map. IACR Cryptol. ePrint Arch. 2018: 463 (2018) - [i16]Atsushi Takayasu, Noboru Kunihiro:
Partial Key Exposure Attacks on RSA: Achieving the Boneh-Durfee Bound. IACR Cryptol. ePrint Arch. 2018: 516 (2018) - 2017
- [j40]Takashi Yamakawa, Shota Yamada, Goichiro Hanaoka, Noboru Kunihiro:
Self-Bilinear Map on Unknown Order Groups from Indistinguishability Obfuscation and Its Applications. Algorithmica 79(4): 1286-1317 (2017) - [j39]Atsushi Takayasu, Noboru Kunihiro:
General Bounds for Small Inverse Problems and Its Applications to Multi-Prime RSA. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 100-A(1): 50-61 (2017) - [j38]Shuichi Katsumata, Noboru Kunihiro:
Constructing Subspace Membership Encryption through Inner Product Encryption. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 100-A(9): 1804-1815 (2017) - [c73]Mengce Zheng, Noboru Kunihiro, Honggang Hu:
Improved Factoring Attacks on Multi-prime RSA with Small Prime Difference. ACISP (1) 2017: 324-342 - [c72]Jason H. M. Ying, Noboru Kunihiro:
Solving the DLP with Low Hamming Weight Product Exponents and Improved Attacks on the GPS Identification Scheme. ACISP (2) 2017: 460-467 - [c71]Jason H. M. Ying, Noboru Kunihiro:
Bounds in Various Generalized Settings of the Discrete Logarithm Problem. ACNS 2017: 498-517 - [c70]Keita Emura, Takuya Hayashi, Noboru Kunihiro, Jun Sakuma:
Mis-operation Resistant Searchable Homomorphic Encryption. AsiaCCS 2017: 215-229 - [c69]Atsushi Takayasu, Noboru Kunihiro:
A Tool Kit for Partial Key Exposure Attacks on RSA. CT-RSA 2017: 58-73 - [c68]Noboru Kunihiro, Yuki Takahashi:
Improved Key Recovery Algorithms from Noisy RSA Secret Keys with Analog Noise. CT-RSA 2017: 328-343 - [p2]Noboru Kunihiro:
Mathematical Approach for Recovering Secret Key from Its Noisy Version. CREST Crypto-Math Project 2017: 199-217 - [p1]Yao Lu, Liqiang Peng, Noboru Kunihiro:
Recent Progress on Coppersmith's Lattice-Based Method: A Survey. CREST Crypto-Math Project 2017: 297-312 - [e3]Tsuyoshi Takagi, Masato Wakayama, Keisuke Tanaka, Noboru Kunihiro, Kazufumi Kimoto, Dung Hoang Duong:
Mathematical Modelling for Next-Generation Cryptography: CREST Crypto-Math Project. Mathematics for Industry, Springer Singapore 2017, ISBN 978-981-10-5064-0 [contents] - 2016
- [j37]Yutaka Kawai, Goichiro Hanaoka, Kazuo Ohta, Noboru Kunihiro:
A limitation on security evaluation of cryptographic primitives with fixed keys. Secur. Commun. Networks 9(12): 1663-1675 (2016) - [j36]Yoshinao Uchide, Noboru Kunihiro:
Searchable symmetric encryption capable of searching for an arbitrary string. Secur. Commun. Networks 9(12): 1726-1736 (2016) - [c67]Atsushi Takayasu, Noboru Kunihiro:
Partial Key Exposure Attacks on RSA with Multiple Exponent Pairs. ACISP (2) 2016: 243-257 - [c66]Takashi Yamakawa, Goichiro Hanaoka, Noboru Kunihiro:
Generalized Hardness Assumption for Self-bilinear Map with Auxiliary Information. ACISP (2) 2016: 269-284 - [c65]Thomas Vannet, Noboru Kunihiro:
Partial Server Side Parameter Selection in Private Information Retrieval. AsiaJCIS 2016: 31-38 - [c64]Toru Akishita, Noboru Kunihiro:
Improved Differential Fault Analysis on Camellia-128. COSADE 2016: 130-143 - [c63]Takashi Yamakawa, Shota Yamada, Goichiro Hanaoka, Noboru Kunihiro:
Adversary-Dependent Lossy Trapdoor Function from Hardness of Factoring Semi-smooth RSA Subgroup Moduli. CRYPTO (2) 2016: 3-32 - [c62]Hwei-Ming Ying, Noboru Kunihiro:
Cold Boot Attack Methods for the Discrete Logarithm Problem. CANDAR 2016: 154-160 - [c61]Hwei-Ming Ying, Noboru Kunihiro:
Decryption of Frequent Password Hashes in Rainbow Tables. CANDAR 2016: 655-661 - [c60]Atsushi Takayasu, Noboru Kunihiro:
Small secret exponent attacks on RSA with unbalanced prime factors. ISITA 2016: 236-240 - [c59]Atsushi Takayasu, Noboru Kunihiro:
Partial Key Exposure Attacks on CRT-RSA: General Improvement for the Exposed Least Significant Bits. ISC 2016: 35-47 - [c58]Atsushi Takayasu, Noboru Kunihiro:
How to Generalize RSA Cryptanalyses. Public Key Cryptography (2) 2016: 67-97 - [i15]Atsushi Takayasu, Noboru Kunihiro:
How to Generalize RSA Cryptanalyses. IACR Cryptol. ePrint Arch. 2016: 195 (2016) - [i14]Atsushi Takayasu, Noboru Kunihiro:
General Bounds for Small Inverse Problems and Its Applications to Multi-Prime RSA. IACR Cryptol. ePrint Arch. 2016: 353 (2016) - [i13]Takashi Yamakawa, Shota Yamada, Goichiro Hanaoka, Noboru Kunihiro:
Adversary-dependent Lossy Trapdoor Function from Hardness of Factoring Semi-smooth RSA Subgroup Moduli. IACR Cryptol. ePrint Arch. 2016: 567 (2016) - [i12]Atsushi Takayasu, Noboru Kunihiro:
A Tool Kit for Partial Key Exposure Attacks on RSA. IACR Cryptol. ePrint Arch. 2016: 1056 (2016) - [i11]Noboru Kunihiro, Yuki Takahashi:
Improved Key Recovery Algorithms from Noisy RSA Secret Keys with Analog Noise. IACR Cryptol. ePrint Arch. 2016: 1095 (2016) - 2015
- [j35]Kosei Endo, Noboru Kunihiro:
Security Analysis on AUTH Protocol and Its Variant against the Man-in-the-Middle Attack. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 98-A(1): 153-161 (2015) - [c57]Atsushi Takayasu, Noboru Kunihiro:
Partial Key Exposure Attacks on CRT-RSA: Better Cryptanalysis to Full Size Encryption Exponents. ACNS 2015: 518-537 - [c56]Tomoyuki Tanigaki, Noboru Kunihiro:
Maximum Likelihood-Based Key Recovery Algorithm from Decayed Key Schedules. ICISC 2015: 314-328 - [c55]Noboru Kunihiro:
An Improved Attack for Recovering Noisy RSA Secret Keys and Its Countermeasure. ProvSec 2015: 61-81 - [c54]Thomas Vannet, Noboru Kunihiro:
Private Information Retrieval with Preprocessing Based on the Approximate GCD Problem. SAC 2015: 227-240 - [i10]Takashi Yamakawa, Shota Yamada, Goichiro Hanaoka, Noboru Kunihiro:
Self-bilinear Map on Unknown Order Groups from Indistinguishability Obfuscation and Its Applications. IACR Cryptol. ePrint Arch. 2015: 128 (2015) - 2014
- [j34]Atsushi Takayasu, Noboru Kunihiro:
Better Lattice Constructions for Solving Multivariate Linear Equations Modulo Unknown Divisors. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 97-A(6): 1259-1272 (2014) - [j33]Noboru Kunihiro, Naoyuki Shinohara, Tetsuya Izu:
Recovering RSA Secret Keys from Noisy Key Bits with Erasures and Errors. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 97-A(6): 1273-1284 (2014) - [j32]Noboru Kunihiro, Naoyuki Shinohara, Tetsuya Izu:
A Unified Framework for Small Secret Exponent Attack on RSA. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 97-A(6): 1285-1295 (2014) - [c53]Atsushi Takayasu, Noboru Kunihiro:
Cryptanalysis of RSA with Multiple Small Secret Exponents. ACISP 2014: 176-191 - [c52]Noboru Kunihiro, Junya Honda:
RSA Meets DPA: Recovering RSA Secret Keys from Noisy Analog Data. CHES 2014: 261-278 - [c51]Takashi Yamakawa, Shota Yamada, Goichiro Hanaoka, Noboru Kunihiro:
Self-bilinear Map on Unknown Order Groups from Indistinguishability Obfuscation and Its Applications. CRYPTO (2) 2014: 90-107 - [c50]Atsushi Takayasu, Noboru Kunihiro:
General Bounds for Small Inverse Problems and Its Applications to Multi-Prime RSA. ICISC 2014: 3-17 - [c49]Kosei Endo, Noboru Kunihiro:
On the Security Proof of an Authentication Protocol from Eurocrypt 2011. IWSEC 2014: 187-203 - [c48]Shota Yamada, Nuttapong Attrapadung, Goichiro Hanaoka, Noboru Kunihiro:
A Framework and Compact Constructions for Non-monotonic Attribute-Based Encryption. Public Key Cryptography 2014: 275-292 - [c47]Shuichi Katsumata, Noboru Kunihiro:
Constructing Subspace Membership Encryption through Inner Product Encryption. ProvSec 2014: 223-242 - [c46]Atsushi Takayasu, Noboru Kunihiro:
Partial Key Exposure Attacks on RSA: Achieving the Boneh-Durfee Bound. Selected Areas in Cryptography 2014: 345-362 - [c45]Takashi Yamakawa, Shota Yamada, Koji Nuida, Goichiro Hanaoka, Noboru Kunihiro:
Chosen Ciphertext Security on Hard Membership Decision Groups: The Case of Semi-smooth Subgroups of Quadratic Residues. SCN 2014: 558-577 - [i9]Shota Yamada, Nuttapong Attrapadung, Goichiro Hanaoka, Noboru Kunihiro:
A Framework and Compact Constructions for Non-monotonic Attribute-Based Encryption. IACR Cryptol. ePrint Arch. 2014: 181 (2014) - [i8]Noboru Kunihiro, Junya Honda:
RSA meets DPA: Recovering RSA Secret Keys from Noisy Analog Data. IACR Cryptol. ePrint Arch. 2014: 513 (2014) - 2013
- [j31]Yutaka Kawai, Noboru Kunihiro:
Secret handshake scheme with request-based-revealing. Comput. Math. Appl. 65(5): 786-798 (2013) - [j30]Masayuki Yoshino, Noboru Kunihiro:
Random Sampling Reduction with Precomputation. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 96-A(1): 150-157 (2013) - [c44]Atsushi Takayasu, Noboru Kunihiro:
Better Lattice Constructions for Solving Multivariate Linear Equations Modulo Unknown Divisors. ACISP 2013: 118-135 - [c43]Takashi Yamakawa, Shota Yamada, Takahiro Matsuda, Goichiro Hanaoka, Noboru Kunihiro:
Efficient variants of the Naor-Yung and Dolev-Dwork-Naor transforms for CCA secure key encapsulation mechanism. AsiaPKC@AsiaCCS 2013: 23-32 - [c42]Takashi Yamakawa, Shota Yamada, Takahiro Matsuda, Goichiro Hanaoka, Noboru Kunihiro:
Reducing Public Key Sizes in Bounded CCA-Secure KEMs with Optimal Ciphertext Length. ISC 2013: 100-109 - [c41]Noboru Kunihiro, Naoyuki Shinohara, Tetsuya Izu:
Recovering RSA Secret Keys from Noisy Key Bits with Erasures and Errors. Public Key Cryptography 2013: 180-197 - 2012
- [j29]Jun Kogure, Noboru Kunihiro, Hirosuke Yamamoto:
On the Hardness of Subset Sum Problem from Different Intervals. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 95-A(5): 903-908 (2012) - [c40]Kaori Tosu, Noboru Kunihiro:
Optimal Bounds for Multi-Prime Φ-Hiding Assumption. ACISP 2012: 1-14 - [c39]Yuji Nagashima, Noboru Kunihiro:
Faster Algorithm for Solving Hard Knapsacks for Moderate Message Length. ACISP 2012: 43-56 - [c38]Shota Yamada, Goichiro Hanaoka, Noboru Kunihiro:
Two-Dimensional Representation of Cover Free Families and Its Applications: Short Signatures and More. CT-RSA 2012: 260-277 - [c37]Goichiro Hanaoka, Yutaka Kawai, Noboru Kunihiro, Takahiro Matsuda, Jian Weng, Rui Zhang, Yunlei Zhao:
Generic Construction of Chosen Ciphertext Secure Proxy Re-Encryption. CT-RSA 2012: 349-364 - [c36]Takuma Koyama, Yu Sasaki, Noboru Kunihiro:
Multi-differential Cryptanalysis on Reduced DM-PRESENT-80: Collisions and Other Differential Properties. ICISC 2012: 352-367 - [c35]Masayuki Yoshino, Noboru Kunihiro:
Improving GGH cryptosystem for large error vector. ISITA 2012: 416-420 - [c34]Noboru Kunihiro:
On Optimal Bounds of Small Inverse Problems and Approximate GCD Problems with Higher Degree. ISC 2012: 55-69 - [c33]Shota Yamada, Goichiro Hanaoka, Noboru Kunihiro:
Space Efficient Signature Schemes from the RSA Assumption. Public Key Cryptography 2012: 102-119 - [c32]Shota Yamada, Nuttapong Attrapadung, Bagus Santoso, Jacob C. N. Schuldt, Goichiro Hanaoka, Noboru Kunihiro:
Verifiable Predicate Encryption and Applications to CCA Security and Anonymous Predicate Authentication. Public Key Cryptography 2012: 243-261 - [c31]Masayuki Yoshino, Noboru Kunihiro, Ken Naganuma, Hisayoshi Sato:
Symmetric Inner-Product Predicate Encryption Based on Three Groups. ProvSec 2012: 215-234 - [i7]Noboru Kunihiro, Naoyuki Shinohara, Tetsuya Izu:
Recovering RSA Secret Keys from Noisy Key Bits with Erasures and Errors. IACR Cryptol. ePrint Arch. 2012: 701 (2012) - 2011
- [j28]Naoyuki Shinohara, Tetsuya Izu, Noboru Kunihiro:
Small Secret CRT-Exponent Attacks on Takagi's RSA. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 94-A(1): 19-27 (2011) - [j27]Noboru Kunihiro:
Solving Generalized Small Inverse Problems. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 94-A(6): 1274-1284 (2011) - [j26]Yutaka Kawai, Yusuke Sakai, Noboru Kunihiro:
On the (Im)possibility Results for Strong Attack Models for Public Key Cryptsystems. J. Internet Serv. Inf. Secur. 1(2/3): 125-139 (2011) - [c30]Tetsuya Izu, Masami Izumi, Noboru Kunihiro, Kazuo Ohta:
Yet Another Sanitizable and Deletable Signatures. AINA Workshops 2011: 574-579 - [c29]Yutaka Kawai, Noboru Kunihiro:
Secret Handshake Scheme with Request-Based-Revealing. EuroPKI 2011: 1-16 - [c28]Shota Yamada, Nuttapong Attrapadung, Goichiro Hanaoka, Noboru Kunihiro:
Generic Constructions for Chosen-Ciphertext Secure Attribute Based Encryption. Public Key Cryptography 2011: 71-89 - [c27]Noboru Kunihiro, Naoyuki Shinohara, Tetsuya Izu:
A Unified Framework for Small Secret Exponent Attack on RSA. Selected Areas in Cryptography 2011: 260-277 - [c26]Jun Kogure, Noboru Kunihiro, Hirosuke Yamamoto:
Generalized Security Analysis of the Random Key Bits Leakage Attack. WISA 2011: 13-27 - [i6]Noboru Kunihiro, Naoyuki Shinohara, Tetsuya Izu:
A Unified Framework for Small Secret Exponent Attack on RSA. IACR Cryptol. ePrint Arch. 2011: 591 (2011) - 2010
- [j25]Yu Sasaki, Lei Wang, Kazuo Ohta, Kazumaro Aoki, Noboru Kunihiro:
Practical Password Recovery Attacks on MD4 Based Prefix and Hybrid Authentication Protocols. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 93-A(1): 84-92 (2010) - [j24]Lei Wang, Kazuo Ohta, Yu Sasaki, Kazuo Sakiyama, Noboru Kunihiro:
Cryptanalysis of Two MD5-Based Authentication Protocols: APOP and NMAC. IEICE Trans. Inf. Syst. 93-D(5): 1087-1095 (2010) - [j23]Noboru Kunihiro:
New Conditions for Secure Knapsack Schemes against Lattice Attack. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 93-A(6): 1058-1065 (2010) - [j22]Yutaka Kawai, Shotaro Tanno, Takahiro Kondo, Kazuki Yoneyama, Kazuo Ohta, Noboru Kunihiro:
Extension of Secret Handshake Protocols with Multiple Groups in Monotone Condition. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 93-A(6): 1122-1131 (2010) - [j21]Shota Yamada, Yutaka Kawai, Goichiro Hanaoka, Noboru Kunihiro:
Public Key Encryption Schemes from the (B)CDH Assumption with Better Efficiency. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 93-A(11): 1984-1993 (2010) - [j20]Yasuhiro Takahashi, Seiichiro Tani, Noboru Kunihiro:
Quantum addition circuits and unbounded fan-out. Quantum Inf. Comput. 10(9&10): 872-890 (2010) - [c25]Noboru Kunihiro:
Solving Generalized Small Inverse Problems. ACISP 2010: 248-263 - [c24]Naoyuki Hirota, Tetsuya Izu, Noboru Kunihiro, Kazuo Ohta:
An Evaluation of the Sieving Device YASD for 1024-Bit Integers. NBiS 2010: 546-551 - [c23]Shota Yamada, Goichiro Hanaoka, Noboru Kunihiro:
Toward an Easy-to-Understand Structure for Achieving Chosen Ciphertext Security from the Decisional Diffie-Hellman Assumption. ProvSec 2010: 229-243 - [e2]Isao Echizen, Noboru Kunihiro, Ryôichi Sasaki:
Advances in Information and Computer Security - 5th International Workshop on Security, IWSEC 2010, Kobe, Japan, November 22-24, 2010. Proceedings. Lecture Notes in Computer Science 6434, Springer 2010, ISBN 978-3-642-16824-6 [contents] - [e1]Isao Echizen, Noboru Kunihiro, Ryôichi Sasaki:
Advances in Information and Computer Security - 5th International Workshop on Security, IWSEC 2010, Kobe, Japan, November 22-24, 2010. Short Paper Proceedings. Information Processing Society of Japan (IPSJ) 2010, ISBN 978-4-915256-78-3 [contents] - [i5]Noboru Kunihiro:
Solving Generalized Small Inverse Problems. IACR Cryptol. ePrint Arch. 2010: 221 (2010)
2000 – 2009
- 2009
- [j19]Kouichi Itoh, Noboru Kunihiro, Kaoru Kurosawa:
Small Secret Key Attack on a Takagi's Variant of RSA. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 92-A(1): 33-41 (2009) - [j18]Lei Wang, Kazuo Ohta, Noboru Kunihiro:
Near-Collision Attacks on MD4: Applied to MD4-Based Protocols. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 92-A(1): 76-86 (2009) - [j17]Jun Yajima, Terutoshi Iwasaki, Yusuke Naito, Yu Sasaki, Takeshi Shimoyama, Thomas Peyrin, Noboru Kunihiro, Kazuo Ohta:
A Strict Evaluation on the Number of Conditions for SHA-1 Collision Search. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 92-A(1): 87-95 (2009) - [j16]Yu Sasaki, Lei Wang, Kazuo Ohta, Noboru Kunihiro:
Extended Password Recovery Attacks against APOP, SIP, and Digest Authentication. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 92-A(1): 96-104 (2009) - [c22]Tetsuya Izu, Noboru Kunihiro, Kazuo Ohta, Makoto Sano, Masahiko Takenaka:
Yet Another Sanitizable Signature from Bilinear Maps. ARES 2009: 941-946 - 2008
- [j15]Yusuke Naito, Kazuo Ohta, Noboru Kunihiro:
Improved Collision Search for Hash Functions: New Advanced Message Modification. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 91-A(1): 46-54 (2008) - [j14]Yu Sasaki, Lei Wang, Noboru Kunihiro, Kazuo Ohta:
New Message Differences for Collision Attacks on MD4 and MD5. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 91-A(1): 55-63 (2008) - [j13]Bagus Santoso, Noboru Kunihiro, Naoki Kanayama, Kazuo Ohta:
Factorization of Square-Free Integers with High Bits Known. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 91-A(1): 306-315 (2008) - [j12]Noboru Kunihiro, Kaoru Kurosawa:
Deterministic Polynomial Time Equivalence between Factoring and Key-Recovery Attack on Takagi's RSA. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 91-A(9): 2356-2364 (2008) - [j11]Yasuhiro Takahashi, Noboru Kunihiro:
A fast quantum circuit for addition with few qubits. Quantum Inf. Comput. 8(6): 636-649 (2008) - [c21]Noboru Kunihiro:
New Definition of Density on Knapsack Cryptosystems. AFRICACRYPT 2008: 156-173 - [c20]Yu Sasaki, Lei Wang, Kazuo Ohta, Noboru Kunihiro:
Password Recovery on Challenge and Response: Impossible Differential Attack on Hash Function. AFRICACRYPT 2008: 290-307 - [c19]Jun Yajima, Terutoshi Iwasaki, Yusuke Naito, Yu Sasaki, Takeshi Shimoyama, Noboru Kunihiro, Kazuo Ohta:
A strict evaluation method on the number of conditions for the SHA-1 collision search. AsiaCCS 2008: 10-20 - [c18]Yu Sasaki, Lei Wang, Kazuo Ohta, Noboru Kunihiro:
Security of MD5 Challenge and Response: Extension of APOP Password Recovery Attack. CT-RSA 2008: 1-18 - [c17]Kouichi Itoh, Noboru Kunihiro, Kaoru Kurosawa:
Small Secret Key Attack on a Variant of RSA (Due to Takagi). CT-RSA 2008: 387-406 - [c16]Lei Wang, Kazuo Ohta, Noboru Kunihiro:
New Key-Recovery Attacks on HMAC/NMAC-MD4 and NMAC-MD5. EUROCRYPT 2008: 237-253 - [c15]Tetsuya Izu, Noboru Kunihiro, Kazuo Ohta, Makoto Sano, Masahiko Takenaka:
Sanitizable and Deletable Signature. WISA 2008: 130-144 - [c14]Yutaka Kawai, Shotaro Tanno, Takahiro Kondo, Kazuki Yoneyama, Noboru Kunihiro, Kazuo Ohta:
Extension of Secret Handshake Protocols with Multiple Groups in Monotone Condition. WISA 2008: 160-173 - 2007
- [j10]Yu Sasaki, Yusuke Naito, Noboru Kunihiro, Kazuo Ohta:
Improved Collision Attacks on MD4 and MD5. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 90-A(1): 36-47 (2007) - [j9]Yoshikazu Hanatani, Yuichi Komano, Kazuo Ohta, Noboru Kunihiro:
Provably Secure Untraceable Electronic Cash against Insider Attacks. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 90-A(5): 980-991 (2007) - [j8]Yasuhiro Takahashi, Noboru Kunihiro, Kazuo Ohta:
The quantum fourier transform on a linear nearest neighbor architecture. Quantum Inf. Comput. 7(4): 383-391 (2007) - [c13]Jun Yajima, Yu Sasaki, Yusuke Naito, Terutoshi Iwasaki, Takeshi Shimoyama, Noboru Kunihiro, Kazuo Ohta:
A New Strategy for Finding a Differential Path of SHA-1. ACISP 2007: 45-58 - [c12]Yu Sasaki, Lei Wang, Kazuo Ohta, Noboru Kunihiro:
New Message Difference for MD4. FSE 2007: 329-348 - [c11]Tetsuya Izu, Noboru Kunihiro, Kazuo Ohta, Masahiko Takenaka, Takashi Yoshioka:
A Sanitizable Signature Scheme with Aggregation. ISPEC 2007: 51-64 - [c10]Noboru Kunihiro, Kaoru Kurosawa:
Deterministic Polynomial Time Equivalence Between Factoring and Key-Recovery Attack on Takagi's RSA. Public Key Cryptography 2007: 412-425 - 2006
- [j7]Mitsugu Iwamoto, Lei Wang, Kazuki Yoneyama, Noboru Kunihiro, Kazuo Ohta:
Visual Secret Sharing Schemes for Multiple Secret Images Allowing the Rotation of Shares. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 89-A(5): 1382-1395 (2006) - [j6]Noboru Kunihiro, Wataru Abe, Kazuo Ohta:
Maurer-Yacobi ID-Based Key Distribution Revisited. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 89-A(5): 1421-1424 (2006) - [j5]Yasuhiro Takahashi, Noboru Kunihiro:
A quantum circuit for shor's factoring algorithm using 2n + 2 qubits. Quantum Inf. Comput. 6(2): 184-192 (2006) - [c9]Yusuke Naito, Yu Sasaki, Takeshi Shimoyama, Jun Yajima, Noboru Kunihiro, Kazuo Ohta:
Improved Collision Search for SHA-0. ASIACRYPT 2006: 21-36 - [c8]Masahiro Mambo, Moisés Salinas-Rosales, Kazuo Ohta, Noboru Kunihiro:
Problems on the MR micropayment schemes. AsiaCCS 2006: 363 - [c7]Yoshikazu Hanatani, Yuichi Komano, Kazuo Ohta, Noboru Kunihiro:
Provably Secure Electronic Cash Based on Blind Multisignature Schemes. Financial Cryptography 2006: 236-250 - [c6]Bagus Santoso, Noboru Kunihiro, Naoki Kanayama, Kazuo Ohta:
Factorization of Square-Free Integers with High Bits Known. VIETCRYPT 2006: 115-130 - [c5]Yu Sasaki, Yusuke Naito, Jun Yajima, Takeshi Shimoyama, Noboru Kunihiro, Kazuo Ohta:
How to Construct Sufficient Conditions for Hash Functions. VIETCRYPT 2006: 243-259 - [i4]Yusuke Naito, Yu Sasaki, Takeshi Shimoyama, Jun Yajima, Noboru Kunihiro, Kazuo Ohta:
Message Modification for Step 21-23 on SHA-0. IACR Cryptol. ePrint Arch. 2006: 16 (2006) - [i3]Yu Sasaki, Yusuke Naito, Jun Yajima, Takeshi Shimoyama, Noboru Kunihiro, Kazuo Ohta:
How to Construct Sufficient Condition in Searching Collisions of MD5. IACR Cryptol. ePrint Arch. 2006: 74 (2006) - 2005
- [j4]Noboru Kunihiro:
Exact Analyses of Computational Time for Factoring in Quantum Computers. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 88-A(1): 105-111 (2005) - [j3]Yasuhiro Takahashi, Noboru Kunihiro:
A linear-size quantum circuit for addition with no ancillary qubits. Quantum Inf. Comput. 5(6): 440-448 (2005) - [c4]Yusuke Naito, Yu Sasaki, Noboru Kunihiro, Kazuo Ohta:
Improved Collision Attack on MD4 with Probability Almost 1. ICISC 2005: 129-145 - [c3]Tetsuya Izu, Noboru Kunihiro, Kazuo Ohta, Takeshi Shimoyama:
Analysis on the Clockwise Transposition Routing for Dedicated Factoring Devices. WISA 2005: 232-242 - [i2]Yusuke Naito, Yu Sasaki, Noboru Kunihiro, Kazuo Ohta:
Improved Collision Attack on MD4. IACR Cryptol. ePrint Arch. 2005: 151 (2005) - [i1]Yu Sasaki, Yusuke Naito, Noboru Kunihiro, Kazuo Ohta:
Improved Collision Attack on MD5. IACR Cryptol. ePrint Arch. 2005: 400 (2005) - 2003
- [j2]Noboru Kunihiro, Shigeru Yamashita:
Efficient Algorithms for NMR Quantum Computers with Small Qubits. New Gener. Comput. 21(4): 329-337 (2003) - [j1]Kazuo Ohta, Tetsuo Nishino, Seiya Okubo, Noboru Kunihiro:
A Quantum Algorithm Using NMR Computers to Break Secret-Key Cryptosystems. New Gener. Comput. 21(4): 347-361 (2003)
1990 – 1999
- 1999
- [c2]Kenji Koyama, Yukio Tsuruoka, Noboru Kunihiro:
Modulus Search for Elliptic Curve Cryptosystems. ASIACRYPT 1999: 1-7 - 1998
- [c1]Noboru Kunihiro, Kenji Koyama:
Equivalence of Counting the Number of Points on Elliptic Curve over the Ring Zn and Factoring n. EUROCRYPT 1998: 47-58
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-08-05 20:15 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint