KUNIHIRO Noboru

Researcher's full information

Conference, etc.
  • Better Lattice Constructions for Solving Multivariate Linear Equations Modulo Unknown Divisors
    Takayasu Atsushi; Kunihiro Noboru
    ACISP2013/2013-07-01--2013-07-03
  • Efficient variants of the Naor-Yung and Dolev-Dwork-Naor transforms for CCA secure key encapsulation mechanism
    Yamakawa Takashi; Yamada Shota; Matsuda Takahiro; Hanaoka...
    AsiaPKC2013/2013-05-07--2013-05-07
  • Recovering RSA Secret Keys from Noisy Key Bits with Erasures and Errors
    Kunihiro Noboru; Shinohara Naoyuki; Izu Tetsuya
    PKC2013/2013-02-26--2013-03-01
  • Multi-Differential Cryptanalysis on Reduced DM-PRESENT-80: Collisions and Other Differential Properties
    Koyama Takuma; Sasaki Yu; Kunihiro Noboru
    ISISC2012/2012-11
  • On Optimal Bounds of Small Inverse Problems and Approximate GCD Problems with Higher Degree
    Kunihiro Noboru
    ISC2012/2012-10
  • Symmetric Inner-Product Predicate Encryption Based on Three Groups
    Yoshino Masayuki; Kunihiro Noboru; Naganuma Ken; Sato Hi...
    ProvSec2012/2012-10--2012-10
  • Faster Algorithm for Solving Hard knapsacks for Moderate Message Length
    Nagashima Yuji; Kunihiro Noboru
    ACISP2012/2012-07
  • Optimal Bounds for Multi-Prime Phi-Hiding Assumption
    Tosu Kaori; Kunihiro Noboru
    ACISP2012/2012-07--2012-07
  • Verifiable Predicate Encryption and Application to CCA Security and Anonymous Predicate Authentication
    Yamada Shota; Attrapadung Nuttapong; Santoso Bagus; Hanao...
    PKC2012/2012-05--2012-05
  • Space Efficient Signature Schemes from the RSA Assumption
    Yamada Shota; Hanaoka Goichiro; Kunihiro Noboru
    PKC2012/2012-05
  • Generic Construction of Chosen Ciphertext Secure Proxy Re-Encryption
    Hanaoka Goichiro; Kawai Yutaka; Kunihiro Noboru; Matsuda ...
    CT-RSA2012/2012-02
  • Two-Dimensional Representation of Cover Free Families and its Applications: Short Signatures and More
    Yamada Shota; Hanaoka Goichiro; Kunihiro Noboru
    CT-RSA2012/2012-02
  • Secret Handshake Scheme with Request-Based-Revealing
    Kawai Yutaka; Kunihiro Noboru
    EuroPKI'11/2011-11--2011-11
  • A Unified Framework for Small Secret Exponent Attack on RSA
    Kunihiro Noboru; Shinohara Naoyuki; Izu Tetsuya
    SAC2011/2011-08
  • Generic Constructions for Chosen-Ciphertext Secure Attribute Based Encryption
    Yamada Shota; Attrapadung Nuttapong; Hanaoka Goichiro; Ku...
    PKC2011/2011-03
  • Toward an Easy-to-Understand Structure for Achieving Chosen Ciphertext Security from the Decisional Diffie-Hellman Assumption
    Yamada Shota; Hanaoka Goichiro; Kunihiro Noboru
    ProvSec2010/2010-10
  • Solving Generalized Small Inverse Problems
    Kunihiro Noboru
    ACISP2010/2010-07
  • RSA暗号に対する格子攻撃
    國廣昇
    第8回代数学と計算研究集会/2009-12-01
  • ナップザック暗号に対する格子攻撃の再考
    國廣昇
    計算世界観ワークショップ「暗号理論/2007-12-01
  • A New Strategy for Finding a Differential Path of SHA-1
    Yajima Jun; Sasaki Yu; Naito Yusuke; Iwasaki Terutoshi; S...
    ACISP 2007/2007-7
  • 素因数分解とRSA暗号における復号鍵計算の等価性
    國廣昇
    第2回 公開鍵暗号の安全な構成とその応用ワークショップ/2007-06-01
  • Sanitizable Signature with Aggregation
    Izu Tetsuya; Kunihiro Noboru; Kazuo; Takashi Takenaka; Yos...
    ISPEC2007/2007-05
  • Deterministic Polynomial Time Equivalence between Factoring and Key-Recovery Attack on Takagi's RSA
    Kunihiro Noboru; Kurosawa Kaoru
    PKC2007/2007-04-16--2007-04-20
  • New Message Difference for MD4
    Sasaki Yu; Wang Lei; Ohta Kazuo; Kunihiro Noboru
    FSE 2007/2007-03-26--2007-03-28
  • Improved Collision Search for SHA-0
    Naito Yusuke; Sasaki Yu; Shimoyama Takeshi; Yajima Jun; K...
    Asiacrypt2006/2006-12-03--2006-12-07
  • more...