Kunihiro Noboru

Researcher's full information

Conference, etc.
  • Cryptanalysis of RSA Variants with Modified Euler Quotient
    Zheng Mengce; Kunihiro Noboru; Hu Honggang
    Africacrypt2018/2018-07--2018-07
  • A Deterministic Algorithm for Computing Divisors in an Interval
    Peng Liqiang; Lu Yao; Kunihiro Noboru; Zhang Rui; Hu Lei
    ACISP2018/2018-07--2018-07
  • Solving the DLP with Low Hamming Weight Product Exponents and Improved Attacks on the GPS Identification Scheme
    Ying Jason H.M.; Kunihiro Noboru
    Proc. of ACISP2017/2017-07--2017-07
  • Improved Factoring Attacks on Multi-Prime RSA with Small Prime Difference
    Zheng Mengce; Kunihiro Noboru; Hu Honggang
    ACISP2017/2017-07--2017-07
  • Mis-operation Resistant Searchable Homomorphic Encryption
    Emura Keita; Hayashi Takuya; Kunihiro Noboru; Sakuma Jun
    ASIA CCS'17/2017-04--2017-04
  • A Tool Kit for Partial Key Exposure Attacks on RSA
    Takayasu Atsushi; Kunihiro Noboru
    CT-RSA2017/2017-02
  • Improved Key Recovery Algorithms from Noisy RSA Secret Keys with Analog Noise
    Kunihiro Noboru; Takahashi Yuki
    CT-RSA2017/2017-02
  • Partial Key Exposure Attacks on CRT-RSA: General Improvement for the Exposed Least Significant Bits
    Takayasu Atsushi; Kunihiro Noboru
    ISC2016/2016-10
  • Adversary-dependent Lossy Trapdoor Function from Hardness of Factoring Semi-smooth RSA Subgroup Moduli
    Yamakawa Takashi; Yamada Shota; Hanaoka Goichiro; Kunihir...
    CRYPTO2016/2016-08
  • Generalized Hardness Assumption for Self-bilinear Map with Auxiliary Information
    Yamakawa Takashi; Hanaoka Goichiro; Kunihiro Noboru
    ACISP2016/2016-07
  • Partial Key Exposure Attacks on RSA with Multiple Exponent Pairs
    Takayasu Atsushi; Kunihiro Noboru
    ACISP2016/2016-07
  • Improved Differential Fault Analysis on Camellia-128
    Akishita Toru; Kunihiro Noboru
    COSADE2016/2016-04
  • How to Generalize RSA Cryptanalyses
    Takayasu Atsushi; Kunihiro Noboru
    PKC2016/2016-03
  • Maximum Likelihood-based Key Recovery Algorithm from Decayed Key Schedules
    Tanigaki Tomoyuki; Kunihiro Noboru
    ICISC2015/2015-12
  • An Improved Attack for Recovering Noisy RSA Secret Keys and its Countermeasure
    Kunihiro Noboru
    ProvSec2015/2015-11
  • Private Information Retrieval with Preprocessing Based on the Approximate GCD Problem
    Vannet Thomas; Kunihiro Noboru
    SAC2015/2015-08
  • Partial Key Exposure Attacks on CRT-RSA: Better Cryptanalysis to Full Size Encryption Exponents
    Takayasu Atsushi; Kunihiro Noboru
    CNS2015/2015-07
  • Chosen Ciphertext Security on Hard Membership Decision Groups: The Case of Semi-smooth Subgroups of Quadratic Residues
    Yamakawa Takashi; Yamada Shoya; Nuida Koji; Hanaoka Goic...
    SCN2014/2014-09
  • RSA meets DPA: Recovering RSA Secret Keys from Noisy Analog data
    Kunihiro Noboru; Honda Junya
    CHES2014/2014-09
  • Partial Key Exposure Attacks on RSA: Achieving Boneh-Durfee's Bound
    Takayasu Atsushi; Kunihiro Noboru
    SAC2014/2014-08--2014-08
  • Self-bilinear Map on Unknown Order Groups from Indistinguishability Obfuscation and Its Applications
    Yamakawa Takashi; Yamada Shota; Hanaoka Goichiro; Kunihir...
    CRYPTO2014/2014-08--2014-08
  • Cryptanalysis of RSA with Multiple Small Secret Exponents
    Takayasu Atsushi; Kunihiro Noboru
    ACISP2014/2014-07
  • A Framework and Compact Constructions for Non-monotonic Attribute-Based Encryption
    Yamada Shota; Attrapadung Nuttapong; Hanaoka Goichiro; Ku...
    PKC2014/2014-03
  • Better Lattice Constructions for Solving Multivariate Linear Equations Modulo Unknown Divisors
    Takayasu Atsushi; Kunihiro Noboru
    ACISP2013/2013-07-01--2013-07-03
  • Efficient variants of the Naor-Yung and Dolev-Dwork-Naor transforms for CCA secure key encapsulation mechanism
    Yamakawa Takashi; Yamada Shota; Matsuda Takahiro; Hanaoka...
    AsiaPKC2013/2013-05-07--2013-05-07
  • more...