KUNIHIRO Noboru

Researcher's full information

Articles
  • Visual Secret Sharing Schemes for Multiple Secret Images Allowing the Rotation of Shares
    Mitsugu IWAMOTO; Lei WANG; Kazuki YONEYAMA; Noboru KUNIH...
    IEICE transactions on fundamentals of electronics, communications and computer sciences/E89-A(5)/pp.1382-1395, 2006-01
  • Maurer-Yacobi ID-Based Key Distribution Revisited
    Noboru KUNIHIRO; Wataru ABE; Kazuo OHTA
    IEICE transactions on fundamentals of electronics, communications and computer sciences/E89-A(5)/pp.1421-1424, 2006-01
  • A quantum circuit for Shor's factoring algorithm using 2n+2 qubits
    Takahashi Yasuhiro; Kunihiro Noboru
    Quantum Information and Computation/6(2)/pp.184-192, 2006-01
  • Improved Collision Attack on MD4 with Probability Almost 1
    Naito Yusuke; Sasaki Yu; Kunihiro Noboru; Ohta Kazuo
    Proc. of ICISC2005/LNCS 3935/pp.129-145, 2005-12
  • A LINEAR-SIZE QUANTUM CIRCUIT FOR ADDITION WITH NO ANCILLARY QUBITS
    Takahashi Yasuhiro; Kunihiro Noboru
    Quantum Information and Computation/5(6)/pp.440-448, 2005-12
  • 暗号の米政府標準方式が危機に
    國廣 昇
    「科学」/pp.1235-1237, 2005-11
  • Exact Analyses of Computational Time for Factoring in Quantum Computers
    KUNIHIRO Noboru
    IEICE transactions on fundamentals of electronics, communications and computer sciences/E88-A(1)/pp.105-111, 2005-10
  • 物理的実現可能性に優れたNMR量子探索アルゴリズム(計算理論)
    大久保誠也; 西野哲朗; 太田和夫; 國廣昇
    情報処理学会論文誌/46(6)/pp.1416-1425, 2005-01
  • Bulk量子計算モデル上におけるGroverのアルゴリズムの繰返し回数について
    大久保誠也; 西野哲朗; 太田和夫; 國廣昇
    情報処理学会論文誌. 数理モデル化と応用/46(17)/pp.10-19, 2005-01
  • A Quantum Algorithm using NMR Computers to Break Secret-Key Cryptosystems
    OHTA Kazuo; NISHINO Tetsuro; OKUBO Seiya; Kunihiro Noboru
    New Generation Computing/21(4)/pp.347-361, 2003-08
  • Efficient Algorithms for NMR Quantum Computers with Small Qubits
    Kunihiro Noboru; YAMASHITA Shigeru
    New Generation Computing/21(4)/pp.329-337, 2003-08
  • Cryptographic Works of Dr. Kenji Koyama: In Memoria : Special Section on Cryptography and Information Security
    KUNIHIRO Noboru; OHTA Kazuo; OKAMOTO Tatsuaki; TERADA Ro...
    IEICE transactions on fundamentals of electronics, communications and computer sciences/84(1)/pp.108-113, 2001-10
  • Two Discrete Log Algorithms for Super-Anomalous Elliptic Curves and Their Applications(Special Section on Cryptography and Information Security)
    KUNIHIRO Noboru; KOYAMA Kenji
    IEICE transactions on fundamentals of electronics, communications and computer sciences/83(1)/pp.10-16, 2000-12
  • New Methods for Generating Short Addition Chains
    Noboru KUNIHIRO; Hirosuke YAMAMOTO
    IEICE transactions on fundamentals of electronics, communications and computer sciences/83(1)/pp.60-67, 2000-12
  • Modulus Search for Elliptic Curve Cryptosystems
    Koyama Kenji; Tsuruoka Yukio; Kunihiro Noboru
    Proc. of Asiacrypt'99/LNCS1716/pp.1-7, 1999-11
  • Window and Extended Window Methods for Addition Chain and Addition-Subtraction Chain (Special Section on Cryptography and Information Security)
    KUNIHIRO Noboru; YAMAMOTO Hirosuke
    IEICE transactions on fundamentals of electronics, communications and computer sciences/81(1)/pp.72-81, 1998-12
  • Equivalence of Counting the Number of Points on Elliptic Curve over the ring and Factoring
    Kunihiro Noboru; Koyama Kenji
    Proc. of EUROCRYPT'98/LNCS1403/pp.47-58, 1998-05
  • Equivalence of Counting the Number of Points on Elliptic Curve over the ring and Factoring
    Kunihiro N.; K. Koyama
    Proc. of EUROCRYPT'98/LNCS 1403/pp.47-58, 1998-05
  • Automatic numerical integration of nearly singular boundary element integrals in the Boundary Element Method
    Kunihiro Noboru; Hayami Ken; Sugihara Masaaki
    Proc. of International Conference on Computational Engineering Science/pp.2481-2486, 1995-10
  • Automatic numerical integration of nearly singular boundary element integrals
    Kunihiro Noboru; Hayami Ken; Sugihara Masaaki
    Proc. of the second Japan-China Seminar on Numerical Mathematics/pp.249-252, 1995-08
  • 境界要素法の変数変換型の自動数値積分法とその誤差解析
    國廣 昇; 速水 謙; 杉原 正顯
    日本応用数理学会論文誌/5(1)/pp.101-119, 1995-03