KUNIHIRO Noboru

Researcher's full information

Articles
  • A Unified Framework for Small Secret Exponent Attack on RSA
    Kunihiro Noboru; Shinohara Naoyuki; Izu Tetsuya
    Proc. of SAC2011/LNCS7118/pp.260-277, 2011-08
  • 格子理論を用いた暗号解読の最近の研究動向
    國廣 昇
    電子情報通信学会 基礎・境界ソサイエティ Fundamentals Review/5(1)/pp.42-55, 2011-07
  • Solving Generalized Small Inverse Problems
    Kunihiro Noboru
    IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences/E94-A(6)/pp.1274-1284, 2011-6
  • Generic Constructions for Chosen-Ciphertext Secure Attribute Based Encryption
    Yamada Shota; Attrapadung Nuttapong; Hanaoka Goichiro; Ku...
    Proc. of PKC2011/LNCS6571/pp.71-89, 2011-03
  • 暗号理論
    國廣 昇
    「数学教育」/pp.64-69, 2011-02
  • Small Secret CRT-Exponent Attacks on Takagi's RSA
    Shinohara Naoyuki; Izu Tetsuya; Kunihiro Noboru
    IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences/p.19, 2011-1
  • On the (Im)possibility Results for Strong Attack Models for Public Key Cryptsystems
    Kawai Yutaka; Sakai Yusuke; Kunihiro Noboru
    Special issue in the Journal of Internet Services and Information Security/1(2/3)/p.125, 2011-01
  • Public Key Encryption Schemes from the (B)CDH Assumption with Better Efficiency
    YAMADA Shota; KAWAI Yutaka; HANAOKA Goichiro; Kunihiro N...
    IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences/E93-A(11)/pp.1984-1993, 2010-11
  • Toward an Easy-to-Understand Structure for Achieving Chosen Ciphertext Security from the Decisional Diffie-Hellman Assumption
    Yamada Shota; Hanaoka Goichiro; Kunihiro Noboru
    Proc. of ProvSec2010/LNCS6402/pp.229-243, 2010-10
  • Solving Generalized Small Inverse Problems
    Kunihiro Noboru
    Proc. of ACISP2010/LNCS6168/pp.248-263, 2010-07
  • Quantum addition circuits and unbounded fan-out
    Takahashi Yasuhiro; Tani Seiichiro; Kunihiro Noboru
    Quantum Information and Computation/10(9/10)/pp.872-890, 2010-07
  • Extension of Secret Handshake Protocols with Multiple Groups in Monotone Condition
    Kawai Yutaka; Tanno S.; Kondo T.; Yoeneyama Kazuki; Ohta ...
    IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences/E93-A(6)/pp.1122-1131, 2010-06
  • New Conditions for Secure Knapsack Schemes against Lattice Attack
    Kunihiro Noboru
    IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences/E93-A(6)/pp.1058-1065, 2010-6
  • Cryptanalysis of Two MD5-Based Authentication Protocols: APOP and NMAC
    Wang Lei; Ohta Kazuo; Sasaki Yu; Sakiyama Kazuo; Kunihiro...
    IEICE TRANSACTIONS on Information and Systems/E93-D(5)/pp.1087-1095, 2010-05
  • Practical Password Recovery Attacks on MD4 Based Prefix and Hybrid Authentication Protocols
    Sasaki Yu; Wang Lei; Ohta Kazuo; Aoki Kazumaro; Kunihiro ...
    IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences/E93-A(1)/pp.84-92, 2010-01
  • Near-Collision Attacks on MD4: Applied to MD4-Based Protocols
    Wang Lei; Ohta Kazuo; Kunihiro Noboru
    IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences/E92-A(1)/pp.76-86, 2009-01
  • 安全性を証明可能なハッシュ関数の設計論
    太田和夫 國廣昇 王磊
    電子情報通信学会誌/92(3)/pp.218-223, 2009-01
  • Yet Another Sanitizable Signature from Bilinear Maps
    Tetsuya Izu Noboru Kunihiro Kazuo Ohta Makoto Sano Ma...
    Proc. of ARES 2009/IEEE CS/pp.941-946, 2009-01
  • Small Secret Key Attack on a Takagis Variant of RSA
    ITOH Kouichi; KUNIHIRO Noboru; KUROSAWA Kaoru
    IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences/92(1)/pp.33-41, 2009-01
  • A Strict Evaluation on the Number of Conditions for SHA-1 Collision Search
    YAJIMA Jun; IWASAKI Terutoshi; NAITO Yusuke; SASAKI Yu; S...
    IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences/E92-A(1)/pp.87-95, 2009-01
  • Extended Password Recovery Attacks against APOP, SIP, and Digest Authentication
    SASAKI Yu; WANG Lei; OHTA Kazuo; KUNIHIRO Noboru
    IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences/92(1)/pp.96-104, 2009-01
  • Deterministic Polynomial Time Equivalence between Factoring and Key-Recovery Attack on Takagi's RSA
    Kunihiro Noboru
    IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences/E91-A(9)/pp.2356-2364, 2008-09
  • Extension of Secret Handshake Protocols with Multiple Groups in Monotone Condition
    Yutaka Kawai Shotaro Tanno Takahiro Kondo Kazuki Yoney...
    Proc. of WISA2008/LNCS5379/pp.160-173, 2008-08
  • Sanitizable and Deletable Signature
    Tetsuya Izu Noboru Kunihiro Kazuo Ohta Makoto Sano and...
    Proc. of WISA2008/LNCS5379/pp.130-144, 2008-08
  • A Fast Quantum Circuit for Addition with Few Qubits
    Takahashi Yasuhiro; Kunihiro Noboru
    Quantum Information and Computation/8(6/7)/pp.636-649, 2008-07
  • more...