Kunihiro Noboru

Researcher's full information

Articles
  • Optimal Multiple Assignment Schemes Using Ideal Multipartite Secret Sharing Schemes
    Eriguchi Reo; Kunihiro Noboru; Iwamoto Mitsugu
    2019 IEEE International Symposium on Information Theory (ISIT)/pp.3047-3051, 2019-07
  • Partial Key Exposure Attacks on RSA: Achieving Boneh-Durfee's Bound
    Takayasu Atsushi; Kunihiro Noboru
    Theoretical Computer Science/761/pp.51-77, 2019-02
  • Attacking Noisy Secret CRT-RSA Exponents in Binary Method
    Oonishi Kento; Kunihiro Noboru
    Proc. of ICISC2018/LNCS 11396/pp.37-54, 2018-11
  • Decentralized Netting Protocol over Consortium Blockchain
    Naganuma Ken; Yoshino Masayuki; Sato Hisayoshi; Yamada N...
    Proc. of ISITA2018/pp.174-177, 2018-10
  • Multi-party Key Exchange Protocols from Supersingular Isogenies
    Furukawa Satoshi; Kunihiro Noboru; Takashima Katsuyuki
    Proc. of ISITA 2018/pp.208-212, 2018-10
  • Certifying Variant of RSA with Generalized Moduli
    Lu Yao; Kunihiro Noboru; Zhang Rui; Peng Liqiang; Ma Hui
    Proc. of ICICS2018, 2018-10
  • Inference Attacks on Encrypted Databases based on Order Preserving Assignment Problem
    Onozawa Sota; Kunihiro Noboru; Yoshino Masayuki; Naganuma...
    Proc. of IWSEC2018/LNCS11049/pp.35-47, 2018-09
  • Outsourced Private Function Evaluation with Privacy Policy Enforcement
    Kunihiro Noboru; Lu Wen-Jie; Nishide Takashi; Sakuma Jun
    Proc. of IEEE TrustCom2018/pp.412-423, 2018-8
  • Bounds in Various Generalized Settings of the Discrete Logarithm Problem
    Ying Jason; Kunihiro Noboru
    Proc. of ACNS2017/LNCS 10355/pp.498-517, 2018-07
  • A Deterministic Algorithm for Computing Divisors in an Interval
    Peng Liqiang; Lu Yao; Kunihiro Noboru; Zhang Rui; Hu Lei
    Proc. of ACISP2018/LNCS10946/pp.3-12, 2018-07
  • Cryptanalysis of RSA Variants with Modified Euler Quotient
    Zheng Mengce; Kunihiro Noboru; Hu Honggang
    Proc. of Africacrypt2018/LNCS 10831/p.266-281, 2018-06
  • Self-bilinear Map on Unknown Order Groups from Indistinguishability Obfuscation and Its Applications
    Yamakawa Takashi; Yamada Shota; Hanaoka Goichiro; Kunihir...
    Algorithmica/79(4)/pp.1286-1317, 2017-12
  • Constructing Subspace Membership Encryption through Inner Product Encryption
    Katsumata Shuichi; Kunihiro Noboru
    IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences/E100-A(9)/pp.1804-1815, 2017-09
  • Solving the DLP with Low Hamming Weight Product Exponents and Improved Attacks on the GPS Identification Scheme
    Ying Jason H.M.; Kunihiro Noboru
    Proc. of ACISP2017/LNCS 10343/pp.460-467, 2017-07
  • Improved Factoring Attacks on Multi-Prime RSA with Small Prime Difference
    Zheng Mengce; Kunihiro Noboru; Hu Honggang
    Proc. of ACISP2017/LNCS 10342/pp.324-342, 2017-07
  • Recent Progress on Coppersmith’s Lattice-Based Method: A Survey
    Lu Yao; Peng Liqiang; Kunihiro Noboru
    Mathematical Modelling for Next-Generation Cryptography/pp.297-312, 2017-07
  • Mathematical Approach for Recovering Secret Key from Its Noisy Version
    Kunihiro Noboru
    Mathematical Modelling for Next-Generation Cryptography/29/pp.199-217, 2017-07
  • Mis-operation Resistant Searchable Homomorphic Encryption
    Emura Keita; Hayashi Takuya; Kunihiro Noboru; Sakuma Jun
    Proc. of ASIA CCS'17/pp.215-229, 2017-04
  • A Tool Kit for Partial Key Exposure Attacks on RSA
    Takayasu Atsushi; Kunihiro Noboru
    Proc. of CT-RSA2017/LNCS 10159/pp.58-73, 2017-02
  • Improved Key Recovery Algorithms from Noisy RSA Secret Keys with Analog Noise
    Kunihiro Noboru; Takahashi Yuki
    Proc. of CT-RSA2017/LNCS 10159/pp.328-343, 2017-02
  • General Bounds for Small Inverse Problems and Its Applications to Multi-Prime RSA
    Takayasu Atsushi; Kunihiro Noboru
    IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences/E100-A(1)/pp.50-61, 2017-01
  • Partial Key Exposure Attacks on CRT-RSA: General Improvement for the Exposed Least Significant Bits
    Takayasu Atsushi; Kunihiro Noboru
    Proc. of ISC2016/LNCS 9866/pp.35-47, 2016-10
  • Adversary-dependent Lossy Trapdoor Function from Hardness of Factoring Semi-smooth RSA Subgroup Moduli
    Yamakawa Takashi; Yamada Shota; Hanaoka Goichiro; Kunihir...
    Proc. of CRYPTO/LNCS 9815/pp.3-32, 2016-08
  • Generalized Hardness Assumption for Self-bilinear Map with Auxiliary Information
    Yamakawa Takashi; Hanaoka Goichiro; Kunihiro Noboru
    Proc. of ACISP2016/LNCS 9723/pp.269-284, 2016-07
  • Partial Key Exposure Attacks on RSA with Multiple Exponent Pairs
    Takayasu Atsushi; Kunihiro Noboru
    Proc. of ACISP2016/LNCS 9723/pp.243-257, 2016-07
  • more...