Kunihiro Noboru
- Articles
- Improved Differential Fault Analysis on Camellia-128
Akishita Toru; Kunihiro Noboru
Proc. of COSADE2016/LNCS 9689/pp.130-143, 2016-04 - How to Generalize RSA Cryptanalyses
Takayasu Atsushi; Kunihiro Noboru
Proc. of PKC2016/LNCS9615/pp.67-97, 2016-03 - Searchable symmetric encryption capable of searching for an arbitrary string
Yoshinao Uchide; Kunihiro Noboru
Security and Communication Networks/9(12)/pp.1726-1736, 2016-03 - A limitation on security evaluation of cryptographic primitives with fixed keys
Kawai Yutaka; Hanaoka Goichiro; Ohta Kazuo; Kunihiro Noboru
Security and Communication Networks/9(12)/pp.1663-1675, 2016-02 - Maximum Likelihood-based Key Recovery Algorithm from Decayed Key Schedules
Tanigaki Tomoyuki; Kunihiro Noboru
Proc. of ICISC2015/LNCS9558/pp.314-328, 2015-12 - An Improved Attack for Recovering Noisy RSA Secret Keys and its Countermeasure
Kunihiro Noboru
Proc. of ProvSec2015/LNCS9451/pp.61-81, 2015-11 - Private Information Retrieval with Preprocessing Based on the Approximate GCD Problem
Vannet Thomas; Kunihiro Noboru
Proc. of SAC2015/LNCS 9566/pp.227-240, 2015-08 - Partial Key Exposure Attacks on CRT-RSA: Better Cryptanalysis to Full Size Encryption Exponents
Takayasu Atsushi; Kunihiro Noboru
Proc. of ACNS2015/LNCS 9092/pp.518-537, 2015-07 - サイドチャネル攻撃の数理 (特集 暗号と数学)
國廣 昇
数学セミナー/pp.34-39, 2015-07 - Security Analysis on AUTH Protocol and Its Variant against the Man-in-the-Middle Attack
Endo Kosei; Kunihiro Noboru
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences/E98-A(1)/pp.153-161, 2015-01 - Chosen Ciphertext Security on Hard Membership Decision Groups: The Case of Semi-smooth Subgroups of Quadratic Residues
Yamakawa Takashi; Yamada Shoya; Nuida Koji; Hanaoka Goic...
Proc. of SCN2014/LNCS 8642/pp.558-577, 2014-09 - RSA meets DPA: Recovering RSA Secret Keys from Noisy Analog data
Kunihiro Noboru; Honda Junya
Proc. of CHES2014/LNCS 8731/pp.261-278, 2014-09 - Partial Key Exposure Attacks on RSA: Achieving Boneh-Durfee's Bound
Takayasu Atsushi; Kunihiro Noboru
Proc. of SAC2014/LNCS 8781/pp.345-362, 2014-08 - Self-bilinear Map on Unknown Order Groups from Indistinguishability Obfuscation and Its Applications
Yamakawa Takashi; Yamada Shota; Hanaoka Goichiro; Kunihir...
Proc. of CRYPTO2014 (2)/LNCS 8617/pp.90-107, 2014-08 - Cryptanalysis of RSA with Multiple Small Secret Exponents
Takayasu Atsushi; Kunihiro Noboru
Proc. of ACISP2014/LNCS 8544/pp.176-191, 2014-07 - A Unified Framework for Small Secret Exponent Attack on RSA
Kunihiro Noboru; Shinohara Naoyuki; Izu Tetsuya
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences/E97-A(6)/pp.1285-1295, 2014-06 - Recovering RSA Secret Keys from Noisy Key Bits with Erasures and Errors
Kunihiro Noboru; Shinohara Naoyuki; Izu Tetsuya
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences/E97-A(6), 2014-06 - A Framework and Compact Constructions for Non-monotonic Attribute-Based Encryption
Yamada Shota; Attrapadung Nuttapong; Hanaoka Goichiro; Ku...
Proc. of PKC2014/LNCS 8383/pp.275-292, 2014-03 - Better Lattice Constructions for Solving Multivariate Linear Equations Modulo Unknown Divisors
Takayasu Atsushi; Kunihiro Noboru
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences/E97-A(6)/pp.1259-1272, 2014-01 - Better Lattice Constructions for Solving Multivariate Linear Equations Modulo Unknown Divisors
Takayasu Atsushi; Kunihiro Noboru
Proc. of ACISP2013/LNCS 7959/pp.118-135, 2013-07 - Efficient variants of the Naor-Yung and Dolev-Dwork-Naor transforms for CCA secure key encapsulation mechanism
Yamakawa Takashi; Yamada Shota; Matsuda Takahiro; Hanaoka...
Proc. of AsiaPKC2013/pp.23-32, 2013-05 - Secret handshake scheme with request-based-revealing
Kawai Yutaka; Kunihiro Noboru
Computers & Mathematics with Applications/65(5)/pp.786-798, 2013-03 - Recovering RSA Secret Keys from Noisy Key Bits with Erasures and Errors
Kunihiro Noboru; Shinohara Naoyuki; Izu Tetsuya
Proc. of PKC2013/LNCS 7778/pp.180-197, 2013-02 - Random Sampling Reduction with Precomputation
YOSHINO Masayuki; Kunihiro Noboru
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences/E96-A(1)/pp.150-157, 2013-01 - Symmetric Inner-Product Predicate Encryption Based on Three Groups
Yoshino Masayuki; Kunihiro Noboru; Naganuma Ken; Sato Hi...
Proc. of ProvSec 2012,/LNCS 7496/pp.215-234, 2012-11 - more...
- Improved Differential Fault Analysis on Camellia-128