KUNIHIRO Noboru
- Conference, etc.
- Partial Key Exposure Attacks on RSA with Multiple Exponent Pairs
Takayasu Atsushi; Kunihiro Noboru
ACISP2016/2016-07 - Improved Differential Fault Analysis on Camellia-128
Akishita Toru; Kunihiro Noboru
COSADE2016/2016-04 - How to Generalize RSA Cryptanalyses
Takayasu Atsushi; Kunihiro Noboru
PKC2016/2016-03 - Maximum Likelihood-based Key Recovery Algorithm from Decayed Key Schedules
Tanigaki Tomoyuki; Kunihiro Noboru
ICISC2015/2015-12 - An Improved Attack for Recovering Noisy RSA Secret Keys and its Countermeasure
Kunihiro Noboru
ProvSec2015/2015-11 - Private Information Retrieval with Preprocessing Based on the Approximate GCD Problem
Vannet Thomas; Kunihiro Noboru
SAC2015/2015-08 - Partial Key Exposure Attacks on CRT-RSA: Better Cryptanalysis to Full Size Encryption Exponents
Takayasu Atsushi; Kunihiro Noboru
CNS2015/2015-07 - Chosen Ciphertext Security on Hard Membership Decision Groups: The Case of Semi-smooth Subgroups of Quadratic Residues
Yamakawa Takashi; Yamada Shoya; Nuida Koji; Hanaoka Goic...
SCN2014/2014-09 - RSA meets DPA: Recovering RSA Secret Keys from Noisy Analog data
Kunihiro Noboru; Honda Junya
CHES2014/2014-09 - Partial Key Exposure Attacks on RSA: Achieving Boneh-Durfee's Bound
Takayasu Atsushi; Kunihiro Noboru
SAC2014/2014-08--2014-08 - Self-bilinear Map on Unknown Order Groups from Indistinguishability Obfuscation and Its Applications
Yamakawa Takashi; Yamada Shota; Hanaoka Goichiro; Kunihir...
CRYPTO2014/2014-08--2014-08 - Cryptanalysis of RSA with Multiple Small Secret Exponents
Takayasu Atsushi; Kunihiro Noboru
ACISP2014/2014-07 - A Framework and Compact Constructions for Non-monotonic Attribute-Based Encryption
Yamada Shota; Attrapadung Nuttapong; Hanaoka Goichiro; Ku...
PKC2014/2014-03 - Better Lattice Constructions for Solving Multivariate Linear Equations Modulo Unknown Divisors
Takayasu Atsushi; Kunihiro Noboru
ACISP2013/2013-07-01--2013-07-03 - Efficient variants of the Naor-Yung and Dolev-Dwork-Naor transforms for CCA secure key encapsulation mechanism
Yamakawa Takashi; Yamada Shota; Matsuda Takahiro; Hanaoka...
AsiaPKC2013/2013-05-07--2013-05-07 - Recovering RSA Secret Keys from Noisy Key Bits with Erasures and Errors
Kunihiro Noboru; Shinohara Naoyuki; Izu Tetsuya
PKC2013/2013-02-26--2013-03-01 - Multi-Differential Cryptanalysis on Reduced DM-PRESENT-80: Collisions and Other Differential Properties
Koyama Takuma; Sasaki Yu; Kunihiro Noboru
ISISC2012/2012-11 - On Optimal Bounds of Small Inverse Problems and Approximate GCD Problems with Higher Degree
Kunihiro Noboru
ISC2012/2012-10 - Symmetric Inner-Product Predicate Encryption Based on Three Groups
Yoshino Masayuki; Kunihiro Noboru; Naganuma Ken; Sato Hi...
ProvSec2012/2012-10--2012-10 - Faster Algorithm for Solving Hard knapsacks for Moderate Message Length
Nagashima Yuji; Kunihiro Noboru
ACISP2012/2012-07 - Optimal Bounds for Multi-Prime Phi-Hiding Assumption
Tosu Kaori; Kunihiro Noboru
ACISP2012/2012-07--2012-07 - Verifiable Predicate Encryption and Application to CCA Security and Anonymous Predicate Authentication
Yamada Shota; Attrapadung Nuttapong; Santoso Bagus; Hanao...
PKC2012/2012-05--2012-05 - Space Efficient Signature Schemes from the RSA Assumption
Yamada Shota; Hanaoka Goichiro; Kunihiro Noboru
PKC2012/2012-05 - Generic Construction of Chosen Ciphertext Secure Proxy Re-Encryption
Hanaoka Goichiro; Kawai Yutaka; Kunihiro Noboru; Matsuda ...
CT-RSA2012/2012-02 - Two-Dimensional Representation of Cover Free Families and its Applications: Short Signatures and More
Yamada Shota; Hanaoka Goichiro; Kunihiro Noboru
CT-RSA2012/2012-02 - more...
- Partial Key Exposure Attacks on RSA with Multiple Exponent Pairs