KUNIHIRO Noboru
- Articles
- A Framework and Compact Constructions for Non-monotonic Attribute-Based Encryption
Yamada Shota; Attrapadung Nuttapong; Hanaoka Goichiro; Ku...
Proc. of PKC2014/LNCS 8383/pp.275-292, 2014-03 - Better Lattice Constructions for Solving Multivariate Linear Equations Modulo Unknown Divisors
Takayasu Atsushi; Kunihiro Noboru
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences/E97-A(6)/pp.1259-1272, 2014-01 - Better Lattice Constructions for Solving Multivariate Linear Equations Modulo Unknown Divisors
Takayasu Atsushi; Kunihiro Noboru
Proc. of ACISP2013/LNCS 7959/pp.118-135, 2013-07 - Efficient variants of the Naor-Yung and Dolev-Dwork-Naor transforms for CCA secure key encapsulation mechanism
Yamakawa Takashi; Yamada Shota; Matsuda Takahiro; Hanaoka...
Proc. of AsiaPKC2013/pp.23-32, 2013-05 - Secret handshake scheme with request-based-revealing
Kawai Yutaka; Kunihiro Noboru
Computers & Mathematics with Applications/65(5)/pp.786-798, 2013-03 - Recovering RSA Secret Keys from Noisy Key Bits with Erasures and Errors
Kunihiro Noboru; Shinohara Naoyuki; Izu Tetsuya
Proc. of PKC2013/LNCS 7778/pp.180-197, 2013-02 - Random Sampling Reduction with Precomputation
YOSHINO Masayuki; Kunihiro Noboru
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences/E96-A(1)/pp.150-157, 2013-01 - Symmetric Inner-Product Predicate Encryption Based on Three Groups
Yoshino Masayuki; Kunihiro Noboru; Naganuma Ken; Sato Hi...
Proc. of ProvSec 2012,/LNCS 7496/pp.215-234, 2012-11 - Multi-Differential Cryptanalysis on Reduced DM-PRESENT-80: Collisions and Other Differential Properties
Koyama Takuma; Sasaki Yu; Kunihiro Noboru
Proc. of ISISC2012/LNCS 7839/pp.352-367, 2012-11 - On Optimal Bounds of Small Inverse Problems and Approximate GCD Problems with Higher Degree
Kunihiro Noboru
Proc. of ISC2012/LNCS 7483/pp.55-69, 2012-10 - Faster Algorithm for Solving Hard knapsacks for Moderate Message Length
Nagashima Yuji; Kunihiro Noboru
Proc. of ACISP2012/LNCS7372/pp.43-56, 2012-07 - Optimal Bounds for Multi-Prime Phi-Hiding Assumption
Tosu Kaori; Kunihiro Noboru
Proc. of ACISP2012,/LNCS7372/pp.1-14, 2012-07 - Verifiable Predicate Encryption and Application to CCA Security and Anonymous Predicate Authentication
Yamada Shota; Attrapadung Nuttapong; Santoso Bagus; Hanao...
Proc. of PKC2012/LNCS7178/pp.349-364, 2012-05 - Space Efficient Signature Schemes from the RSA Assumption
Yamada Shota; Hanaoka Goichiro; Kunihiro Noboru
Proc. of PKC2012/LNCS7178/pp.260-277, 2012-05 - On the Hardness of Subset Sum Problem from Different Intervals
KOGURE Jun; Kunihiro Noboru; YAMAMOTO Hirosuke
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences/E95-A(5)/pp.903-908, 2012-05 - Generic Construction of Chosen Ciphertext Secure Proxy Re-Encryption
Hanaoka Goichiro; Kawai Yutaka; Kunihiro Noboru; Matsuda ...
Proc. of CT-RSA2012/LNCS 7178/pp.349-364, 2012-02 - Two-Dimensional Representation of Cover Free Families and its Applications: Short Signatures and More
Yamada Shota; Hanaoka Goichiro; Kunihiro Noboru
Proc. of CT-RSA2012/LNCS 7178/pp.260-277, 2012-02 - Secret Handshake Scheme with Request-Based-Revealing
Kawai Yutaka; Kunihiro Noboru
Proc. of EuroPKI'11/LNCS7163/pp.1-16, 2011-09 - A Unified Framework for Small Secret Exponent Attack on RSA
Kunihiro Noboru; Shinohara Naoyuki; Izu Tetsuya
Proc. of SAC2011/LNCS7118/pp.260-277, 2011-08 - 格子理論を用いた暗号解読の最近の研究動向
國廣 昇
電子情報通信学会 基礎・境界ソサイエティ Fundamentals Review/5(1)/pp.42-55, 2011-07 - Solving Generalized Small Inverse Problems
Kunihiro Noboru
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences/E94-A(6)/pp.1274-1284, 2011-6 - Generic Constructions for Chosen-Ciphertext Secure Attribute Based Encryption
Yamada Shota; Attrapadung Nuttapong; Hanaoka Goichiro; Ku...
Proc. of PKC2011/LNCS6571/pp.71-89, 2011-03 - 暗号理論
國廣 昇
「数学教育」/pp.64-69, 2011-02 - Small Secret CRT-Exponent Attacks on Takagi's RSA
Shinohara Naoyuki; Izu Tetsuya; Kunihiro Noboru
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences/p.19, 2011-1 - On the (Im)possibility Results for Strong Attack Models for Public Key Cryptsystems
Kawai Yutaka; Sakai Yusuke; Kunihiro Noboru
Special issue in the Journal of Internet Services and Information Security/1(2/3)/p.125, 2011-01 - more...
- A Framework and Compact Constructions for Non-monotonic Attribute-Based Encryption