KUNIHIRO Noboru
- Articles
- Visual Secret Sharing Schemes for Multiple Secret Images Allowing the Rotation of Shares
Mitsugu IWAMOTO; Lei WANG; Kazuki YONEYAMA; Noboru KUNIH...
IEICE transactions on fundamentals of electronics, communications and computer sciences/E89-A(5)/pp.1382-1395, 2006-01 - Maurer-Yacobi ID-Based Key Distribution Revisited
Noboru KUNIHIRO; Wataru ABE; Kazuo OHTA
IEICE transactions on fundamentals of electronics, communications and computer sciences/E89-A(5)/pp.1421-1424, 2006-01 - A quantum circuit for Shor's factoring algorithm using 2n+2 qubits
Takahashi Yasuhiro; Kunihiro Noboru
Quantum Information and Computation/6(2)/pp.184-192, 2006-01 - Improved Collision Attack on MD4 with Probability Almost 1
Naito Yusuke; Sasaki Yu; Kunihiro Noboru; Ohta Kazuo
Proc. of ICISC2005/LNCS 3935/pp.129-145, 2005-12 - A LINEAR-SIZE QUANTUM CIRCUIT FOR ADDITION WITH NO ANCILLARY QUBITS
Takahashi Yasuhiro; Kunihiro Noboru
Quantum Information and Computation/5(6)/pp.440-448, 2005-12 - 暗号の米政府標準方式が危機に
國廣 昇
「科学」/pp.1235-1237, 2005-11 - Exact Analyses of Computational Time for Factoring in Quantum Computers
KUNIHIRO Noboru
IEICE transactions on fundamentals of electronics, communications and computer sciences/E88-A(1)/pp.105-111, 2005-10 - 物理的実現可能性に優れたNMR量子探索アルゴリズム(計算理論)
大久保誠也; 西野哲朗; 太田和夫; 國廣昇
情報処理学会論文誌/46(6)/pp.1416-1425, 2005-01 - Bulk量子計算モデル上におけるGroverのアルゴリズムの繰返し回数について
大久保誠也; 西野哲朗; 太田和夫; 國廣昇
情報処理学会論文誌. 数理モデル化と応用/46(17)/pp.10-19, 2005-01 - A Quantum Algorithm using NMR Computers to Break Secret-Key Cryptosystems
OHTA Kazuo; NISHINO Tetsuro; OKUBO Seiya; Kunihiro Noboru
New Generation Computing/21(4)/pp.347-361, 2003-08 - Efficient Algorithms for NMR Quantum Computers with Small Qubits
Kunihiro Noboru; YAMASHITA Shigeru
New Generation Computing/21(4)/pp.329-337, 2003-08 - Cryptographic Works of Dr. Kenji Koyama: In Memoria : Special Section on Cryptography and Information Security
KUNIHIRO Noboru; OHTA Kazuo; OKAMOTO Tatsuaki; TERADA Ro...
IEICE transactions on fundamentals of electronics, communications and computer sciences/84(1)/pp.108-113, 2001-10 - Two Discrete Log Algorithms for Super-Anomalous Elliptic Curves and Their Applications(Special Section on Cryptography and Information Security)
KUNIHIRO Noboru; KOYAMA Kenji
IEICE transactions on fundamentals of electronics, communications and computer sciences/83(1)/pp.10-16, 2000-12 - New Methods for Generating Short Addition Chains
Noboru KUNIHIRO; Hirosuke YAMAMOTO
IEICE transactions on fundamentals of electronics, communications and computer sciences/83(1)/pp.60-67, 2000-12 - Modulus Search for Elliptic Curve Cryptosystems
Koyama Kenji; Tsuruoka Yukio; Kunihiro Noboru
Proc. of Asiacrypt'99/LNCS1716/pp.1-7, 1999-11 - Window and Extended Window Methods for Addition Chain and Addition-Subtraction Chain (Special Section on Cryptography and Information Security)
KUNIHIRO Noboru; YAMAMOTO Hirosuke
IEICE transactions on fundamentals of electronics, communications and computer sciences/81(1)/pp.72-81, 1998-12 - Equivalence of Counting the Number of Points on Elliptic Curve over the ring
and Factoring
Kunihiro Noboru; Koyama Kenji
Proc. of EUROCRYPT'98/LNCS1403/pp.47-58, 1998-05 - Equivalence of Counting the Number of Points on Elliptic Curve over the ring
and Factoring
Kunihiro N.; K. Koyama
Proc. of EUROCRYPT'98/LNCS 1403/pp.47-58, 1998-05 - Automatic numerical integration of nearly singular boundary element integrals in the Boundary Element Method
Kunihiro Noboru; Hayami Ken; Sugihara Masaaki
Proc. of International Conference on Computational Engineering Science/pp.2481-2486, 1995-10 - Automatic numerical integration of nearly singular boundary element integrals
Kunihiro Noboru; Hayami Ken; Sugihara Masaaki
Proc. of the second Japan-China Seminar on Numerical Mathematics/pp.249-252, 1995-08 - 境界要素法の変数変換型の自動数値積分法とその誤差解析
國廣 昇; 速水 謙; 杉原 正顯
日本応用数理学会論文誌/5(1)/pp.101-119, 1995-03
- Visual Secret Sharing Schemes for Multiple Secret Images Allowing the Rotation of Shares