國廣 昇(クニヒロ ノボル)
- 論文
- Strong security of linear ramp secret sharing schemes with general access structures
Eriguchi Reo; Kunihiro Noboru
Information Processing Letters/164, 2020-08 - Extended partial key exposure attacks on RSA: Improvement up to full size decryption exponents
Suzuki Kaichi; Takayasu Atsushi; Kunihiro Noboru
Theoretical Computer Science/841/pp.62-83, 2020-07 - d-Multiplicative Secret Sharing for Multipartite Adversary Structures
Eriguchi Reo; Kunihiro Noboru
Proc. of 1st Conference on Information-Theoretic Cryptography (ITC 2020)/vol. 163/pp.2:1-2:16, 2020-06 - Generic hardness of inversion on ring and its relation to self-bilinear map
Yamakawa Takashi; Yamada Shota; Hanaoka Goichiro; Kuni...
THEORETICAL COMPUTER SCIENCE/820/pp.60-84, 2020-06 - Improved CRT-RSA Secret Key Recovery Method from Sliding Window Leakage
Oonishi Kento; Huang Xiaoxuan; Kunihiro Noboru
Proc. of ICISC2019/LNCS 11975/pp.278-296, 2019-12 - Special Section on Information Theory and Its Applications FOREWORD
Kunihiro Noboru; Oohama Yasutada
IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES/E102A(12)/pp.1590-1590, 2019-12 - Worst case short lattice vector enumeration on block reduced bases of arbitrary blocksizes
Kunihiro Noboru; Takayasu Atsushi
Discrete Applied Mathematics/277/pp.198-220, 2019-10 - Strongly Secure Ramp Secret Sharing Schemes from Any Linear Secret Sharing Schemes
Eriguchi Reo; Kunihiro Noboru
2019 IEEE Information Theory Workshop (ITW)/pp.1-5, 2019-08 - Optimal Multiple Assignment Schemes Using Ideal Multipartite Secret Sharing Schemes
Eriguchi Reo; Kunihiro Noboru; Iwamoto Mitsugu
2019 IEEE International Symposium on Information Theory (ISIT)/pp.3047-3051, 2019-07 - Partial Key Exposure Attacks on RSA: Achieving Boneh-Durfee's Bound
Takayasu Atsushi; Kunihiro Noboru
Theoretical Computer Science/761/pp.51-77, 2019-02 - Attacking Noisy Secret CRT-RSA Exponents in Binary Method
Oonishi Kento; Kunihiro Noboru
Proc. of ICISC2018/LNCS 11396/pp.37-54, 2018-11 - Decentralized Netting Protocol over Consortium Blockchain
Naganuma Ken; Yoshino Masayuki; Sato Hisayoshi; Yamada N...
Proc. of ISITA2018/pp.174-177, 2018-10 - Multi-party Key Exchange Protocols from Supersingular Isogenies
Furukawa Satoshi; Kunihiro Noboru; Takashima Katsuyuki
Proc. of ISITA 2018/pp.208-212, 2018-10 - Certifying Variant of RSA with Generalized Moduli
Lu Yao; Kunihiro Noboru; Zhang Rui; Peng Liqiang; Ma Hui
Proc. of ICICS2018, 2018-10 - Inference Attacks on Encrypted Databases based on Order Preserving Assignment Problem
Onozawa Sota; Kunihiro Noboru; Yoshino Masayuki; Naganuma...
Proc. of IWSEC2018/LNCS11049/pp.35-47, 2018-09 - Outsourced Private Function Evaluation with Privacy Policy Enforcement
Kunihiro Noboru; Lu Wen-Jie; Nishide Takashi; Sakuma Jun
Proc. of IEEE TrustCom2018/pp.412-423, 2018-8 - Bounds in Various Generalized Settings of the Discrete Logarithm Problem
Ying Jason; Kunihiro Noboru
Proc. of ACNS2017/LNCS 10355/pp.498-517, 2018-07 - A Deterministic Algorithm for Computing Divisors in an Interval
Peng Liqiang; Lu Yao; Kunihiro Noboru; Zhang Rui; Hu Lei
Proc. of ACISP2018/LNCS10946/pp.3-12, 2018-07 - Cryptanalysis of RSA Variants with Modified Euler Quotient
Zheng Mengce; Kunihiro Noboru; Hu Honggang
Proc. of Africacrypt2018/LNCS 10831/p.266-281, 2018-06 - Self-bilinear Map on Unknown Order Groups from Indistinguishability Obfuscation and Its Applications
Yamakawa Takashi; Yamada Shota; Hanaoka Goichiro; Kunihir...
Algorithmica/79(4)/pp.1286-1317, 2017-12 - Constructing Subspace Membership Encryption through Inner Product Encryption
Katsumata Shuichi; Kunihiro Noboru
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences/E100-A(9)/pp.1804-1815, 2017-09 - Solving the DLP with Low Hamming Weight Product Exponents and Improved Attacks on the GPS Identification Scheme
Ying Jason H.M.; Kunihiro Noboru
Proc. of ACISP2017/LNCS 10343/pp.460-467, 2017-07 - Improved Factoring Attacks on Multi-Prime RSA with Small Prime Difference
Zheng Mengce; Kunihiro Noboru; Hu Honggang
Proc. of ACISP2017/LNCS 10342/pp.324-342, 2017-07 - Recent Progress on Coppersmith’s Lattice-Based Method: A Survey
Lu Yao; Peng Liqiang; Kunihiro Noboru
Mathematical Modelling for Next-Generation Cryptography/pp.297-312, 2017-07 - Mathematical Approach for Recovering Secret Key from Its Noisy Version
Kunihiro Noboru
Mathematical Modelling for Next-Generation Cryptography/29/pp.199-217, 2017-07 - さらに表示...
- Strong security of linear ramp secret sharing schemes with general access structures