KUNIHIRO Noboru

Researcher's full information

Articles
  • Chosen Ciphertext Security on Hard Membership Decision Groups: The Case of Semi-smooth Subgroups of Quadratic Residues
    Yamakawa Takashi; Yamada Shoya; Nuida Koji; Hanaoka Goic...
    Proc. of SCN2014/LNCS 8642/pp.558-577, 2014-09
  • RSA meets DPA: Recovering RSA Secret Keys from Noisy Analog data
    Kunihiro Noboru; Honda Junya
    Proc. of CHES2014/LNCS 8731/pp.261-278, 2014-09
  • Partial Key Exposure Attacks on RSA: Achieving Boneh-Durfee's Bound
    Takayasu Atsushi; Kunihiro Noboru
    Proc. of SAC2014/LNCS 8781/pp.345-362, 2014-08
  • Self-bilinear Map on Unknown Order Groups from Indistinguishability Obfuscation and Its Applications
    Yamakawa Takashi; Yamada Shota; Hanaoka Goichiro; Kunihir...
    Proc. of CRYPTO2014 (2)/LNCS 8617/pp.90-107, 2014-08
  • Cryptanalysis of RSA with Multiple Small Secret Exponents
    Takayasu Atsushi; Kunihiro Noboru
    Proc. of ACISP2014/LNCS 8544/pp.176-191, 2014-07
  • A Unified Framework for Small Secret Exponent Attack on RSA
    Kunihiro Noboru; Shinohara Naoyuki; Izu Tetsuya
    IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences/E97-A(6)/pp.1285-1295, 2014-06
  • Recovering RSA Secret Keys from Noisy Key Bits with Erasures and Errors
    Kunihiro Noboru; Shinohara Naoyuki; Izu Tetsuya
    IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences/E97-A(6), 2014-06
  • A Framework and Compact Constructions for Non-monotonic Attribute-Based Encryption
    Yamada Shota; Attrapadung Nuttapong; Hanaoka Goichiro; Ku...
    Proc. of PKC2014/LNCS 8383/pp.275-292, 2014-03
  • Better Lattice Constructions for Solving Multivariate Linear Equations Modulo Unknown Divisors
    Takayasu Atsushi; Kunihiro Noboru
    IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences/E97-A(6)/pp.1259-1272, 2014-01
  • Better Lattice Constructions for Solving Multivariate Linear Equations Modulo Unknown Divisors
    Takayasu Atsushi; Kunihiro Noboru
    Proc. of ACISP2013/LNCS 7959/pp.118-135, 2013-07
  • Efficient variants of the Naor-Yung and Dolev-Dwork-Naor transforms for CCA secure key encapsulation mechanism
    Yamakawa Takashi; Yamada Shota; Matsuda Takahiro; Hanaoka...
    Proc. of AsiaPKC2013/pp.23-32, 2013-05
  • Secret handshake scheme with request-based-revealing
    Kawai Yutaka; Kunihiro Noboru
    Computers & Mathematics with Applications/65(5)/pp.786-798, 2013-03
  • Recovering RSA Secret Keys from Noisy Key Bits with Erasures and Errors
    Kunihiro Noboru; Shinohara Naoyuki; Izu Tetsuya
    Proc. of PKC2013/LNCS 7778/pp.180-197, 2013-02
  • Random Sampling Reduction with Precomputation
    YOSHINO Masayuki; Kunihiro Noboru
    IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences/E96-A(1)/pp.150-157, 2013-01
  • Symmetric Inner-Product Predicate Encryption Based on Three Groups
    Yoshino Masayuki; Kunihiro Noboru; Naganuma Ken; Sato Hi...
    Proc. of ProvSec 2012,/LNCS 7496/pp.215-234, 2012-11
  • Multi-Differential Cryptanalysis on Reduced DM-PRESENT-80: Collisions and Other Differential Properties
    Koyama Takuma; Sasaki Yu; Kunihiro Noboru
    Proc. of ISISC2012/LNCS 7839/pp.352-367, 2012-11
  • On Optimal Bounds of Small Inverse Problems and Approximate GCD Problems with Higher Degree
    Kunihiro Noboru
    Proc. of ISC2012/LNCS 7483/pp.55-69, 2012-10
  • Faster Algorithm for Solving Hard knapsacks for Moderate Message Length
    Nagashima Yuji; Kunihiro Noboru
    Proc. of ACISP2012/LNCS7372/pp.43-56, 2012-07
  • Optimal Bounds for Multi-Prime Phi-Hiding Assumption
    Tosu Kaori; Kunihiro Noboru
    Proc. of ACISP2012,/LNCS7372/pp.1-14, 2012-07
  • Verifiable Predicate Encryption and Application to CCA Security and Anonymous Predicate Authentication
    Yamada Shota; Attrapadung Nuttapong; Santoso Bagus; Hanao...
    Proc. of PKC2012/LNCS7178/pp.349-364, 2012-05
  • Space Efficient Signature Schemes from the RSA Assumption
    Yamada Shota; Hanaoka Goichiro; Kunihiro Noboru
    Proc. of PKC2012/LNCS7178/pp.260-277, 2012-05
  • On the Hardness of Subset Sum Problem from Different Intervals
    KOGURE Jun; Kunihiro Noboru; YAMAMOTO Hirosuke
    IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences/E95-A(5)/pp.903-908, 2012-05
  • Generic Construction of Chosen Ciphertext Secure Proxy Re-Encryption
    Hanaoka Goichiro; Kawai Yutaka; Kunihiro Noboru; Matsuda ...
    Proc. of CT-RSA2012/LNCS 7178/pp.349-364, 2012-02
  • Two-Dimensional Representation of Cover Free Families and its Applications: Short Signatures and More
    Yamada Shota; Hanaoka Goichiro; Kunihiro Noboru
    Proc. of CT-RSA2012/LNCS 7178/pp.260-277, 2012-02
  • Secret Handshake Scheme with Request-Based-Revealing
    Kawai Yutaka; Kunihiro Noboru
    Proc. of EuroPKI'11/LNCS7163/pp.1-16, 2011-09
  • more...