Kunihiro Noboru

Researcher's full information

Conference, etc.
  • Partial Key Exposure Attacks on RSA with Multiple Exponent Pairs
    Takayasu Atsushi; Kunihiro Noboru
    ACISP2016/2016-07
  • Improved Differential Fault Analysis on Camellia-128
    Akishita Toru; Kunihiro Noboru
    COSADE2016/2016-04
  • How to Generalize RSA Cryptanalyses
    Takayasu Atsushi; Kunihiro Noboru
    PKC2016/2016-03
  • Maximum Likelihood-based Key Recovery Algorithm from Decayed Key Schedules
    Tanigaki Tomoyuki; Kunihiro Noboru
    ICISC2015/2015-12
  • An Improved Attack for Recovering Noisy RSA Secret Keys and its Countermeasure
    Kunihiro Noboru
    ProvSec2015/2015-11
  • Private Information Retrieval with Preprocessing Based on the Approximate GCD Problem
    Vannet Thomas; Kunihiro Noboru
    SAC2015/2015-08
  • Partial Key Exposure Attacks on CRT-RSA: Better Cryptanalysis to Full Size Encryption Exponents
    Takayasu Atsushi; Kunihiro Noboru
    CNS2015/2015-07
  • Chosen Ciphertext Security on Hard Membership Decision Groups: The Case of Semi-smooth Subgroups of Quadratic Residues
    Yamakawa Takashi; Yamada Shoya; Nuida Koji; Hanaoka Goic...
    SCN2014/2014-09
  • RSA meets DPA: Recovering RSA Secret Keys from Noisy Analog data
    Kunihiro Noboru; Honda Junya
    CHES2014/2014-09
  • Partial Key Exposure Attacks on RSA: Achieving Boneh-Durfee's Bound
    Takayasu Atsushi; Kunihiro Noboru
    SAC2014/2014-08--2014-08
  • Self-bilinear Map on Unknown Order Groups from Indistinguishability Obfuscation and Its Applications
    Yamakawa Takashi; Yamada Shota; Hanaoka Goichiro; Kunihir...
    CRYPTO2014/2014-08--2014-08
  • Cryptanalysis of RSA with Multiple Small Secret Exponents
    Takayasu Atsushi; Kunihiro Noboru
    ACISP2014/2014-07
  • A Framework and Compact Constructions for Non-monotonic Attribute-Based Encryption
    Yamada Shota; Attrapadung Nuttapong; Hanaoka Goichiro; Ku...
    PKC2014/2014-03
  • Better Lattice Constructions for Solving Multivariate Linear Equations Modulo Unknown Divisors
    Takayasu Atsushi; Kunihiro Noboru
    ACISP2013/2013-07-01--2013-07-03
  • Efficient variants of the Naor-Yung and Dolev-Dwork-Naor transforms for CCA secure key encapsulation mechanism
    Yamakawa Takashi; Yamada Shota; Matsuda Takahiro; Hanaoka...
    AsiaPKC2013/2013-05-07--2013-05-07
  • Recovering RSA Secret Keys from Noisy Key Bits with Erasures and Errors
    Kunihiro Noboru; Shinohara Naoyuki; Izu Tetsuya
    PKC2013/2013-02-26--2013-03-01
  • Multi-Differential Cryptanalysis on Reduced DM-PRESENT-80: Collisions and Other Differential Properties
    Koyama Takuma; Sasaki Yu; Kunihiro Noboru
    ISISC2012/2012-11
  • On Optimal Bounds of Small Inverse Problems and Approximate GCD Problems with Higher Degree
    Kunihiro Noboru
    ISC2012/2012-10
  • Symmetric Inner-Product Predicate Encryption Based on Three Groups
    Yoshino Masayuki; Kunihiro Noboru; Naganuma Ken; Sato Hi...
    ProvSec2012/2012-10--2012-10
  • Faster Algorithm for Solving Hard knapsacks for Moderate Message Length
    Nagashima Yuji; Kunihiro Noboru
    ACISP2012/2012-07
  • Optimal Bounds for Multi-Prime Phi-Hiding Assumption
    Tosu Kaori; Kunihiro Noboru
    ACISP2012/2012-07--2012-07
  • Verifiable Predicate Encryption and Application to CCA Security and Anonymous Predicate Authentication
    Yamada Shota; Attrapadung Nuttapong; Santoso Bagus; Hanao...
    PKC2012/2012-05--2012-05
  • Space Efficient Signature Schemes from the RSA Assumption
    Yamada Shota; Hanaoka Goichiro; Kunihiro Noboru
    PKC2012/2012-05
  • Generic Construction of Chosen Ciphertext Secure Proxy Re-Encryption
    Hanaoka Goichiro; Kawai Yutaka; Kunihiro Noboru; Matsuda ...
    CT-RSA2012/2012-02
  • Two-Dimensional Representation of Cover Free Families and its Applications: Short Signatures and More
    Yamada Shota; Hanaoka Goichiro; Kunihiro Noboru
    CT-RSA2012/2012-02
  • more...