KUNIHIRO Noboru

Researcher's full information

Articles
  • Factorization of Square-Free Integers with High Bits Known
    SANTOSO Bagus; Kunihiro Noboru; KANAYAMA Naoki; OHTA Kazuo
    IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences/E91-A(1)/pp.306-315, 2008-01
  • New Message Differences for Collision Attacks on MD4 and MD5,
    SASAKI Yu; WANG Lei; Kunihiro Noboru; OHTA Kazuo
    IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences/E91-A(1)/pp.55-63, 2008-01
  • Improved Collision Search for Hash Functions: New Advanced Message Modification
    NAITO Yusuke; OHTA Kazuo; Kunihiro Noboru
    IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences/E91-A(1)/pp.46-54, 2008-01
  • New Message Differences for Collision Attacks on MD4 and MD5
    Yu SASAKI; Lei WANG; Kunihiro Noboru; Kazuo OHTA
    IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences,/E91-A(1)/pp.55-63, 2008-01
  • Improved Collision Search for Hash Functions: New Advanced Message Modification
    Yusuke NAITO; Kazuo OHTA; 國廣 昇
    IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences/E91-A(1)/pp.46-54, 2008-01
  • 暗号における理論と実装のギャップ : 置き換えアプローチの二面性(暗号理論入門(4))
    太田和夫 國廣昇 バグスサントソ
    応用数理/18(4)/pp.308-319, 2008-01
  • 暗号学における双対性 : ゴールとシナリオの間には(チュートリアル)
    太田和夫 國廣昇
    応用数理/18(2)/pp.145-152, 2008-01
  • APOPが破られた(オピニオン)
    國廣昇 太田和夫
    電子情報通信学会誌/91(9)/pp.822-825, 2008-01
  • 素因数分解は,RSA暗号解読より真に難しいか?(<小特集>素数)
    國廣昇
    電子情報通信学会誌/91(6)/pp.474-477, 2008-01
  • RSA暗号に対する格子理論に基づく攻撃(その2)
    國廣昇; 太田和夫
    応用数理/18(3)/pp.218-225, 2008-01
  • RSA暗号に対する格子理論に基づく攻撃
    國廣昇 太田和夫
    応用数理/18(1)/pp.23-29, 2008-01
  • The quantum Fourier transform on a linear nearest neighbor architecture
    Takahashi Yasuhiro; Kunihiro Noboru; Ohta Kazuo
    Quantum Information and Computation/7(4)/pp.383-391, 2007-08
  • A New Strategy for Finding a Differential Path of SHA-1
    Yajima Jun; Sasaki Yu; Naito Yusuke; Iwasaki Terutoshi; S...
    Proc. of ACISP2007, 2007-07
  • Sanitizable Signature with Aggregation
    Izu Tetsuya; Kunihiro Noboru; Kazuo; Takashi Takenaka; Yos...
    Proc. of ISPEC 2007/LNCS4464/pp.51-64, 2007-05
  • Provably Secure Untraceable Electronic Cash against Insider Attack
    Hanatani Yoshikazu; Komano Yuichi; OHTA Kazuo; Kunihiro ...
    IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences/E90-A(5), 2007-05
  • Deterministic Polynomial Time Equivalence between Factoring and Key-Recovery Attack on Takagi's RSA
    Kunihiro Noboru; Kurosawa Kaoru
    Proc. of PKC2007/LNCS4450/pp.412-425, 2007-04
  • New Message Difference for MD4
    Sasaki Yu; Wang Lei; Ohta Kazuo; Kunihiro Noboru
    Proc. of FSE2007/LNCS4593/pp.329-348, 2007-03
  • Improved Collision Attacks on MD4 and MD5
    Yu SASAKI; Yusuke NAITO; 國廣 昇; Kazuo OHTA
    IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences/E90-A(1)/pp.36-47, 2007-01
  • Improved Collision Search for SHA-0
    Naito Yusuke; Sasaki Yu; Shimoyama Takeshi; Yajima Jun; K...
    Proc. of Asiacrypt2006/LNCS 4284/pp.21-36, 2006-12
  • How to Construct Sufficient Conditions for Hash Functions
    Sasaki Yu; Naito Yusuke; Yajima Jun; Shimoyama Takeshi; K...
    Proc. of Vietcrypt2006/LNCS4341/pp.115-130, 2006-09
  • Factoring Square-free Composite Integer by solving Multivariate Integer Polynomial Equations
    Santoso Bagus; Kunihiro Noboru; Kanayama Naoki; Ohta Kazuo
    Proc. of Vietcrypt2006/LNCS4341/pp.243-259, 2006-09
  • 双線形写像を用いた墨塗り署名方式の安全性について
    伊豆 哲也; 國廣 昇; 太田和夫; 武仲正彦
    情報処理学会論文誌/47(7)/pp.2409-2416, 2006-07
  • 素因数分解ハードウェアの研究・開発動向
    伊豆 哲也; 國廣 昇; 下山 武司
    情報処理学会論文誌/48(9)/pp.2956-2965, 2006-07
  • Problems on the MR Micropayment Schemes
    Mambo M.; Salinas M. R.; Ohta Kazuo; Kunihiro Noboru
    Proc. of ASIACCS'06/pp.363-363, 2006-03
  • Provable Secure Electronic Cash based on Blind Multisignature schemes
    Hanatani Y.; Komano Yuichi; Kunihiro Noboru; Ohta Kazuo
    Proc. of Financial Cryptography'06/LNCS 4107/pp.236-250, 2006-02
  • more...