KUNIHIRO Noboru
- Articles
- A Unified Framework for Small Secret Exponent Attack on RSA
Kunihiro Noboru; Shinohara Naoyuki; Izu Tetsuya
Proc. of SAC2011/LNCS7118/pp.260-277, 2011-08 - 格子理論を用いた暗号解読の最近の研究動向
國廣 昇
電子情報通信学会 基礎・境界ソサイエティ Fundamentals Review/5(1)/pp.42-55, 2011-07 - Solving Generalized Small Inverse Problems
Kunihiro Noboru
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences/E94-A(6)/pp.1274-1284, 2011-6 - Generic Constructions for Chosen-Ciphertext Secure Attribute Based Encryption
Yamada Shota; Attrapadung Nuttapong; Hanaoka Goichiro; Ku...
Proc. of PKC2011/LNCS6571/pp.71-89, 2011-03 - 暗号理論
國廣 昇
「数学教育」/pp.64-69, 2011-02 - Small Secret CRT-Exponent Attacks on Takagi's RSA
Shinohara Naoyuki; Izu Tetsuya; Kunihiro Noboru
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences/p.19, 2011-1 - On the (Im)possibility Results for Strong Attack Models for Public Key Cryptsystems
Kawai Yutaka; Sakai Yusuke; Kunihiro Noboru
Special issue in the Journal of Internet Services and Information Security/1(2/3)/p.125, 2011-01 - Public Key Encryption Schemes from the (B)CDH Assumption with Better Efficiency
YAMADA Shota; KAWAI Yutaka; HANAOKA Goichiro; Kunihiro N...
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences/E93-A(11)/pp.1984-1993, 2010-11 - Toward an Easy-to-Understand Structure for Achieving Chosen Ciphertext Security from the Decisional Diffie-Hellman Assumption
Yamada Shota; Hanaoka Goichiro; Kunihiro Noboru
Proc. of ProvSec2010/LNCS6402/pp.229-243, 2010-10 - Solving Generalized Small Inverse Problems
Kunihiro Noboru
Proc. of ACISP2010/LNCS6168/pp.248-263, 2010-07 - Quantum addition circuits and unbounded fan-out
Takahashi Yasuhiro; Tani Seiichiro; Kunihiro Noboru
Quantum Information and Computation/10(9/10)/pp.872-890, 2010-07 - Extension of Secret Handshake Protocols with Multiple Groups in Monotone Condition
Kawai Yutaka; Tanno S.; Kondo T.; Yoeneyama Kazuki; Ohta ...
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences/E93-A(6)/pp.1122-1131, 2010-06 - New Conditions for Secure Knapsack Schemes against Lattice Attack
Kunihiro Noboru
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences/E93-A(6)/pp.1058-1065, 2010-6 - Cryptanalysis of Two MD5-Based Authentication Protocols: APOP and NMAC
Wang Lei; Ohta Kazuo; Sasaki Yu; Sakiyama Kazuo; Kunihiro...
IEICE TRANSACTIONS on Information and Systems/E93-D(5)/pp.1087-1095, 2010-05 - Practical Password Recovery Attacks on MD4 Based Prefix and Hybrid Authentication Protocols
Sasaki Yu; Wang Lei; Ohta Kazuo; Aoki Kazumaro; Kunihiro ...
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences/E93-A(1)/pp.84-92, 2010-01 - Near-Collision Attacks on MD4: Applied to MD4-Based Protocols
Wang Lei; Ohta Kazuo; Kunihiro Noboru
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences/E92-A(1)/pp.76-86, 2009-01 - 安全性を証明可能なハッシュ関数の設計論
太田和夫 國廣昇 王磊
電子情報通信学会誌/92(3)/pp.218-223, 2009-01 - Yet Another Sanitizable Signature from Bilinear Maps
Tetsuya Izu Noboru Kunihiro Kazuo Ohta Makoto Sano Ma...
Proc. of ARES 2009/IEEE CS/pp.941-946, 2009-01 - Small Secret Key Attack on a Takagis Variant of RSA
ITOH Kouichi; KUNIHIRO Noboru; KUROSAWA Kaoru
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences/92(1)/pp.33-41, 2009-01 - A Strict Evaluation on the Number of Conditions for SHA-1 Collision Search
YAJIMA Jun; IWASAKI Terutoshi; NAITO Yusuke; SASAKI Yu; S...
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences/E92-A(1)/pp.87-95, 2009-01 - Extended Password Recovery Attacks against APOP, SIP, and Digest Authentication
SASAKI Yu; WANG Lei; OHTA Kazuo; KUNIHIRO Noboru
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences/92(1)/pp.96-104, 2009-01 - Deterministic Polynomial Time Equivalence between Factoring and Key-Recovery Attack on Takagi's RSA
Kunihiro Noboru
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences/E91-A(9)/pp.2356-2364, 2008-09 - Extension of Secret Handshake Protocols with Multiple Groups in Monotone Condition
Yutaka Kawai Shotaro Tanno Takahiro Kondo Kazuki Yoney...
Proc. of WISA2008/LNCS5379/pp.160-173, 2008-08 - Sanitizable and Deletable Signature
Tetsuya Izu Noboru Kunihiro Kazuo Ohta Makoto Sano and...
Proc. of WISA2008/LNCS5379/pp.130-144, 2008-08 - A Fast Quantum Circuit for Addition with Few Qubits
Takahashi Yasuhiro; Kunihiro Noboru
Quantum Information and Computation/8(6/7)/pp.636-649, 2008-07 - more...
- A Unified Framework for Small Secret Exponent Attack on RSA