KUNIHIRO Noboru
- Articles
- Password Recovery on Challenge and Response: Impossible Differential Attack on Hash Function
Yu Sasaki Lei Wang Kazuo Ohta Noboru Kunihiro
Proc. of AfricaCrypt2008/5023/pp.290-307, 2008-06 - New Definition of Density on Knapsack Cryptosystems
Noboru Kunihiro
Proc. of Africacrypt2008/5023/pp.156-173, 2008-06 - New Key Recovery Attack on HMAC/NMAC-MD4 and NMAC-MD5
Lei Wang and Kazuo Ohta and Noboru Kunihiro
Proc. of Eurocrypt2008/4965/pp.237-253, 2008-05 - Small Secret Key Attack on a variant of RSA (due to Takagi)
Itoh Kouichi; Kunihiro Noboru; Kurosawa Kaoru
Proc. of CT-RSA2008/4964/pp.387-406, 2008-04 - Security of MD5 Challenge and Response: Extension of APOP Password Recovery Attack
Yu Sasaki Lei Wang Kazuo Ohta and Noboru Kunihiro
Proc. of CT-RSA2008/4964/pp.1-18, 2008-04 - A Strict Evaluation Method on the Number of Conditions for the SHA-1 Collision Search
Jun Yajima Terutoshi Iwasaki Yusuke Naito Yu Sasaki T...
Proc. of ASIACCS2008/pp.10-20, 2008-03 - Password Recovery Attack on Authentication Protocol MD4(Password||Challenge)
Wang Lei; Ohta Kazuo; Kunihiro Noboru
Proc. of ASIACCS2008/pp.3-9, 2008-03 - Factorization of Square-Free Integers with High Bits Known
SANTOSO Bagus; Kunihiro Noboru; KANAYAMA Naoki; OHTA Kazuo
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences/E91-A(1)/pp.306-315, 2008-01 - New Message Differences for Collision Attacks on MD4 and MD5,
SASAKI Yu; WANG Lei; Kunihiro Noboru; OHTA Kazuo
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences/E91-A(1)/pp.55-63, 2008-01 - Improved Collision Search for Hash Functions: New Advanced Message Modification
NAITO Yusuke; OHTA Kazuo; Kunihiro Noboru
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences/E91-A(1)/pp.46-54, 2008-01 - New Message Differences for Collision Attacks on MD4 and MD5
Yu SASAKI; Lei WANG; Kunihiro Noboru; Kazuo OHTA
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences,/E91-A(1)/pp.55-63, 2008-01 - Improved Collision Search for Hash Functions: New Advanced Message Modification
Yusuke NAITO; Kazuo OHTA; 國廣 昇
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences/E91-A(1)/pp.46-54, 2008-01 - 暗号における理論と実装のギャップ : 置き換えアプローチの二面性(暗号理論入門(4))
太田和夫 國廣昇 バグスサントソ
応用数理/18(4)/pp.308-319, 2008-01 - 暗号学における双対性 : ゴールとシナリオの間には(チュートリアル)
太田和夫 國廣昇
応用数理/18(2)/pp.145-152, 2008-01 - APOPが破られた(オピニオン)
國廣昇 太田和夫
電子情報通信学会誌/91(9)/pp.822-825, 2008-01 - 素因数分解は,RSA暗号解読より真に難しいか?(<小特集>素数)
國廣昇
電子情報通信学会誌/91(6)/pp.474-477, 2008-01 - RSA暗号に対する格子理論に基づく攻撃(その2)
國廣昇; 太田和夫
応用数理/18(3)/pp.218-225, 2008-01 - RSA暗号に対する格子理論に基づく攻撃
國廣昇 太田和夫
応用数理/18(1)/pp.23-29, 2008-01 - The quantum Fourier transform on a linear nearest neighbor architecture
Takahashi Yasuhiro; Kunihiro Noboru; Ohta Kazuo
Quantum Information and Computation/7(4)/pp.383-391, 2007-08 - A New Strategy for Finding a Differential Path of SHA-1
Yajima Jun; Sasaki Yu; Naito Yusuke; Iwasaki Terutoshi; S...
Proc. of ACISP2007, 2007-07 - Sanitizable Signature with Aggregation
Izu Tetsuya; Kunihiro Noboru; Kazuo; Takashi Takenaka; Yos...
Proc. of ISPEC 2007/LNCS4464/pp.51-64, 2007-05 - Provably Secure Untraceable Electronic Cash against Insider Attack
Hanatani Yoshikazu; Komano Yuichi; OHTA Kazuo; Kunihiro ...
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences/E90-A(5), 2007-05 - Deterministic Polynomial Time Equivalence between Factoring and Key-Recovery Attack on Takagi's RSA
Kunihiro Noboru; Kurosawa Kaoru
Proc. of PKC2007/LNCS4450/pp.412-425, 2007-04 - New Message Difference for MD4
Sasaki Yu; Wang Lei; Ohta Kazuo; Kunihiro Noboru
Proc. of FSE2007/LNCS4593/pp.329-348, 2007-03 - Improved Collision Attacks on MD4 and MD5
Yu SASAKI; Yusuke NAITO; 國廣 昇; Kazuo OHTA
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences/E90-A(1)/pp.36-47, 2007-01 - more...
- Password Recovery on Challenge and Response: Impossible Differential Attack on Hash Function