KUNIHIRO Noboru
- Articles
- Public Key Encryption Schemes from the (B)CDH Assumption with Better Efficiency
YAMADA Shota; KAWAI Yutaka; HANAOKA Goichiro; Kunihiro N...
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences/E93-A(11)/pp.1984-1993, 2010-11 - Toward an Easy-to-Understand Structure for Achieving Chosen Ciphertext Security from the Decisional Diffie-Hellman Assumption
Yamada Shota; Hanaoka Goichiro; Kunihiro Noboru
Proc. of ProvSec2010/LNCS6402/pp.229-243, 2010-10 - Solving Generalized Small Inverse Problems
Kunihiro Noboru
Proc. of ACISP2010/LNCS6168/pp.248-263, 2010-07 - Quantum addition circuits and unbounded fan-out
Takahashi Yasuhiro; Tani Seiichiro; Kunihiro Noboru
Quantum Information and Computation/10(9/10)/pp.872-890, 2010-07 - Extension of Secret Handshake Protocols with Multiple Groups in Monotone Condition
Kawai Yutaka; Tanno S.; Kondo T.; Yoeneyama Kazuki; Ohta ...
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences/E93-A(6)/pp.1122-1131, 2010-06 - New Conditions for Secure Knapsack Schemes against Lattice Attack
Kunihiro Noboru
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences/E93-A(6)/pp.1058-1065, 2010-6 - Cryptanalysis of Two MD5-Based Authentication Protocols: APOP and NMAC
Wang Lei; Ohta Kazuo; Sasaki Yu; Sakiyama Kazuo; Kunihiro...
IEICE TRANSACTIONS on Information and Systems/E93-D(5)/pp.1087-1095, 2010-05 - Practical Password Recovery Attacks on MD4 Based Prefix and Hybrid Authentication Protocols
Sasaki Yu; Wang Lei; Ohta Kazuo; Aoki Kazumaro; Kunihiro ...
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences/E93-A(1)/pp.84-92, 2010-01 - Near-Collision Attacks on MD4: Applied to MD4-Based Protocols
Wang Lei; Ohta Kazuo; Kunihiro Noboru
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences/E92-A(1)/pp.76-86, 2009-01 - 安全性を証明可能なハッシュ関数の設計論
太田和夫 國廣昇 王磊
電子情報通信学会誌/92(3)/pp.218-223, 2009-01 - Yet Another Sanitizable Signature from Bilinear Maps
Tetsuya Izu Noboru Kunihiro Kazuo Ohta Makoto Sano Ma...
Proc. of ARES 2009/IEEE CS/pp.941-946, 2009-01 - Small Secret Key Attack on a Takagis Variant of RSA
ITOH Kouichi; KUNIHIRO Noboru; KUROSAWA Kaoru
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences/92(1)/pp.33-41, 2009-01 - A Strict Evaluation on the Number of Conditions for SHA-1 Collision Search
YAJIMA Jun; IWASAKI Terutoshi; NAITO Yusuke; SASAKI Yu; S...
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences/E92-A(1)/pp.87-95, 2009-01 - Extended Password Recovery Attacks against APOP, SIP, and Digest Authentication
SASAKI Yu; WANG Lei; OHTA Kazuo; KUNIHIRO Noboru
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences/92(1)/pp.96-104, 2009-01 - Deterministic Polynomial Time Equivalence between Factoring and Key-Recovery Attack on Takagi's RSA
Kunihiro Noboru
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences/E91-A(9)/pp.2356-2364, 2008-09 - Extension of Secret Handshake Protocols with Multiple Groups in Monotone Condition
Yutaka Kawai Shotaro Tanno Takahiro Kondo Kazuki Yoney...
Proc. of WISA2008/LNCS5379/pp.160-173, 2008-08 - Sanitizable and Deletable Signature
Tetsuya Izu Noboru Kunihiro Kazuo Ohta Makoto Sano and...
Proc. of WISA2008/LNCS5379/pp.130-144, 2008-08 - A Fast Quantum Circuit for Addition with Few Qubits
Takahashi Yasuhiro; Kunihiro Noboru
Quantum Information and Computation/8(6/7)/pp.636-649, 2008-07 - Password Recovery on Challenge and Response: Impossible Differential Attack on Hash Function
Yu Sasaki Lei Wang Kazuo Ohta Noboru Kunihiro
Proc. of AfricaCrypt2008/5023/pp.290-307, 2008-06 - New Definition of Density on Knapsack Cryptosystems
Noboru Kunihiro
Proc. of Africacrypt2008/5023/pp.156-173, 2008-06 - New Key Recovery Attack on HMAC/NMAC-MD4 and NMAC-MD5
Lei Wang and Kazuo Ohta and Noboru Kunihiro
Proc. of Eurocrypt2008/4965/pp.237-253, 2008-05 - Small Secret Key Attack on a variant of RSA (due to Takagi)
Itoh Kouichi; Kunihiro Noboru; Kurosawa Kaoru
Proc. of CT-RSA2008/4964/pp.387-406, 2008-04 - Security of MD5 Challenge and Response: Extension of APOP Password Recovery Attack
Yu Sasaki Lei Wang Kazuo Ohta and Noboru Kunihiro
Proc. of CT-RSA2008/4964/pp.1-18, 2008-04 - A Strict Evaluation Method on the Number of Conditions for the SHA-1 Collision Search
Jun Yajima Terutoshi Iwasaki Yusuke Naito Yu Sasaki T...
Proc. of ASIACCS2008/pp.10-20, 2008-03 - Password Recovery Attack on Authentication Protocol MD4(Password||Challenge)
Wang Lei; Ohta Kazuo; Kunihiro Noboru
Proc. of ASIACCS2008/pp.3-9, 2008-03 - more...
- Public Key Encryption Schemes from the (B)CDH Assumption with Better Efficiency