國廣 昇(クニヒロ ノボル)
- 論文
- Space Efficient Signature Schemes from the RSA Assumption
Yamada Shota; Hanaoka Goichiro; Kunihiro Noboru
Proc. of PKC2012/LNCS7178/pp.260-277, 2012-05 - On the Hardness of Subset Sum Problem from Different Intervals
KOGURE Jun; Kunihiro Noboru; YAMAMOTO Hirosuke
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences/E95-A(5)/pp.903-908, 2012-05 - Generic Construction of Chosen Ciphertext Secure Proxy Re-Encryption
Hanaoka Goichiro; Kawai Yutaka; Kunihiro Noboru; Matsuda ...
Proc. of CT-RSA2012/LNCS 7178/pp.349-364, 2012-02 - Two-Dimensional Representation of Cover Free Families and its Applications: Short Signatures and More
Yamada Shota; Hanaoka Goichiro; Kunihiro Noboru
Proc. of CT-RSA2012/LNCS 7178/pp.260-277, 2012-02 - Secret Handshake Scheme with Request-Based-Revealing
Kawai Yutaka; Kunihiro Noboru
Proc. of EuroPKI'11/LNCS7163/pp.1-16, 2011-09 - A Unified Framework for Small Secret Exponent Attack on RSA
Kunihiro Noboru; Shinohara Naoyuki; Izu Tetsuya
Proc. of SAC2011/LNCS7118/pp.260-277, 2011-08 - 格子理論を用いた暗号解読の最近の研究動向
國廣 昇
電子情報通信学会 基礎・境界ソサイエティ Fundamentals Review/5(1)/pp.42-55, 2011-07 - Solving Generalized Small Inverse Problems
Kunihiro Noboru
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences/E94-A(6)/pp.1274-1284, 2011-6 - Generic Constructions for Chosen-Ciphertext Secure Attribute Based Encryption
Yamada Shota; Attrapadung Nuttapong; Hanaoka Goichiro; Ku...
Proc. of PKC2011/LNCS6571/pp.71-89, 2011-03 - 暗号理論
國廣 昇
「数学教育」/pp.64-69, 2011-02 - Small Secret CRT-Exponent Attacks on Takagi's RSA
Shinohara Naoyuki; Izu Tetsuya; Kunihiro Noboru
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences/p.19, 2011-1 - On the (Im)possibility Results for Strong Attack Models for Public Key Cryptsystems
Kawai Yutaka; Sakai Yusuke; Kunihiro Noboru
Special issue in the Journal of Internet Services and Information Security/1(2/3)/p.125, 2011-01 - Public Key Encryption Schemes from the (B)CDH Assumption with Better Efficiency
YAMADA Shota; KAWAI Yutaka; HANAOKA Goichiro; Kunihiro N...
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences/E93-A(11)/pp.1984-1993, 2010-11 - Toward an Easy-to-Understand Structure for Achieving Chosen Ciphertext Security from the Decisional Diffie-Hellman Assumption
Yamada Shota; Hanaoka Goichiro; Kunihiro Noboru
Proc. of ProvSec2010/LNCS6402/pp.229-243, 2010-10 - Solving Generalized Small Inverse Problems
Kunihiro Noboru
Proc. of ACISP2010/LNCS6168/pp.248-263, 2010-07 - Quantum addition circuits and unbounded fan-out
Takahashi Yasuhiro; Tani Seiichiro; Kunihiro Noboru
Quantum Information and Computation/10(9/10)/pp.872-890, 2010-07 - Extension of Secret Handshake Protocols with Multiple Groups in Monotone Condition
Kawai Yutaka; Tanno S.; Kondo T.; Yoeneyama Kazuki; Ohta ...
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences/E93-A(6)/pp.1122-1131, 2010-06 - New Conditions for Secure Knapsack Schemes against Lattice Attack
Kunihiro Noboru
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences/E93-A(6)/pp.1058-1065, 2010-6 - Cryptanalysis of Two MD5-Based Authentication Protocols: APOP and NMAC
Wang Lei; Ohta Kazuo; Sasaki Yu; Sakiyama Kazuo; Kunihiro...
IEICE TRANSACTIONS on Information and Systems/E93-D(5)/pp.1087-1095, 2010-05 - Practical Password Recovery Attacks on MD4 Based Prefix and Hybrid Authentication Protocols
Sasaki Yu; Wang Lei; Ohta Kazuo; Aoki Kazumaro; Kunihiro ...
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences/E93-A(1)/pp.84-92, 2010-01 - Near-Collision Attacks on MD4: Applied to MD4-Based Protocols
Wang Lei; Ohta Kazuo; Kunihiro Noboru
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences/E92-A(1)/pp.76-86, 2009-01 - 安全性を証明可能なハッシュ関数の設計論
太田和夫 國廣昇 王磊
電子情報通信学会誌/92(3)/pp.218-223, 2009-01 - Yet Another Sanitizable Signature from Bilinear Maps
Tetsuya Izu Noboru Kunihiro Kazuo Ohta Makoto Sano Ma...
Proc. of ARES 2009/IEEE CS/pp.941-946, 2009-01 - Small Secret Key Attack on a Takagis Variant of RSA
ITOH Kouichi; KUNIHIRO Noboru; KUROSAWA Kaoru
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences/92(1)/pp.33-41, 2009-01 - A Strict Evaluation on the Number of Conditions for SHA-1 Collision Search
YAJIMA Jun; IWASAKI Terutoshi; NAITO Yusuke; SASAKI Yu; S...
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences/E92-A(1)/pp.87-95, 2009-01 - さらに表示...
- Space Efficient Signature Schemes from the RSA Assumption