KUNIHIRO Noboru
- Articles
- Cryptanalysis of RSA Variants with Modified Euler Quotient
Zheng Mengce; Kunihiro Noboru; Hu Honggang
Proc. of Africacrypt2018/LNCS 10831/p.266-281, 2018-06 - Self-bilinear Map on Unknown Order Groups from Indistinguishability Obfuscation and Its Applications
Yamakawa Takashi; Yamada Shota; Hanaoka Goichiro; Kunihir...
Algorithmica/79(4)/pp.1286-1317, 2017-12 - Constructing Subspace Membership Encryption through Inner Product Encryption
Katsumata Shuichi; Kunihiro Noboru
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences/E100-A(9)/pp.1804-1815, 2017-09 - Solving the DLP with Low Hamming Weight Product Exponents and Improved Attacks on the GPS Identification Scheme
Ying Jason H.M.; Kunihiro Noboru
Proc. of ACISP2017/LNCS 10343/pp.460-467, 2017-07 - Improved Factoring Attacks on Multi-Prime RSA with Small Prime Difference
Zheng Mengce; Kunihiro Noboru; Hu Honggang
Proc. of ACISP2017/LNCS 10342/pp.324-342, 2017-07 - Recent Progress on Coppersmith’s Lattice-Based Method: A Survey
Lu Yao; Peng Liqiang; Kunihiro Noboru
Mathematical Modelling for Next-Generation Cryptography/pp.297-312, 2017-07 - Mathematical Approach for Recovering Secret Key from Its Noisy Version
Kunihiro Noboru
Mathematical Modelling for Next-Generation Cryptography/29/pp.199-217, 2017-07 - Mis-operation Resistant Searchable Homomorphic Encryption
Emura Keita; Hayashi Takuya; Kunihiro Noboru; Sakuma Jun
Proc. of ASIA CCS'17/pp.215-229, 2017-04 - A Tool Kit for Partial Key Exposure Attacks on RSA
Takayasu Atsushi; Kunihiro Noboru
Proc. of CT-RSA2017/LNCS 10159/pp.58-73, 2017-02 - Improved Key Recovery Algorithms from Noisy RSA Secret Keys with Analog Noise
Kunihiro Noboru; Takahashi Yuki
Proc. of CT-RSA2017/LNCS 10159/pp.328-343, 2017-02 - General Bounds for Small Inverse Problems and Its Applications to Multi-Prime RSA
Takayasu Atsushi; Kunihiro Noboru
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences/E100-A(1)/pp.50-61, 2017-01 - Partial Key Exposure Attacks on CRT-RSA: General Improvement for the Exposed Least Significant Bits
Takayasu Atsushi; Kunihiro Noboru
Proc. of ISC2016/LNCS 9866/pp.35-47, 2016-10 - Adversary-dependent Lossy Trapdoor Function from Hardness of Factoring Semi-smooth RSA Subgroup Moduli
Yamakawa Takashi; Yamada Shota; Hanaoka Goichiro; Kunihir...
Proc. of CRYPTO/LNCS 9815/pp.3-32, 2016-08 - Generalized Hardness Assumption for Self-bilinear Map with Auxiliary Information
Yamakawa Takashi; Hanaoka Goichiro; Kunihiro Noboru
Proc. of ACISP2016/LNCS 9723/pp.269-284, 2016-07 - Partial Key Exposure Attacks on RSA with Multiple Exponent Pairs
Takayasu Atsushi; Kunihiro Noboru
Proc. of ACISP2016/LNCS 9723/pp.243-257, 2016-07 - Improved Differential Fault Analysis on Camellia-128
Akishita Toru; Kunihiro Noboru
Proc. of COSADE2016/LNCS 9689/pp.130-143, 2016-04 - How to Generalize RSA Cryptanalyses
Takayasu Atsushi; Kunihiro Noboru
Proc. of PKC2016/LNCS9615/pp.67-97, 2016-03 - Searchable symmetric encryption capable of searching for an arbitrary string
Yoshinao Uchide; Kunihiro Noboru
Security and Communication Networks/9(12)/pp.1726-1736, 2016-03 - A limitation on security evaluation of cryptographic primitives with fixed keys
Kawai Yutaka; Hanaoka Goichiro; Ohta Kazuo; Kunihiro Noboru
Security and Communication Networks/9(12)/pp.1663-1675, 2016-02 - Maximum Likelihood-based Key Recovery Algorithm from Decayed Key Schedules
Tanigaki Tomoyuki; Kunihiro Noboru
Proc. of ICISC2015/LNCS9558/pp.314-328, 2015-12 - An Improved Attack for Recovering Noisy RSA Secret Keys and its Countermeasure
Kunihiro Noboru
Proc. of ProvSec2015/LNCS9451/pp.61-81, 2015-11 - Private Information Retrieval with Preprocessing Based on the Approximate GCD Problem
Vannet Thomas; Kunihiro Noboru
Proc. of SAC2015/LNCS 9566/pp.227-240, 2015-08 - Partial Key Exposure Attacks on CRT-RSA: Better Cryptanalysis to Full Size Encryption Exponents
Takayasu Atsushi; Kunihiro Noboru
Proc. of ACNS2015/LNCS 9092/pp.518-537, 2015-07 - サイドチャネル攻撃の数理 (特集 暗号と数学)
國廣 昇
数学セミナー/pp.34-39, 2015-07 - Security Analysis on AUTH Protocol and Its Variant against the Man-in-the-Middle Attack
Endo Kosei; Kunihiro Noboru
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences/E98-A(1)/pp.153-161, 2015-01 - more...
- Cryptanalysis of RSA Variants with Modified Euler Quotient