國廣 昇(クニヒロ ノボル)
- 論文
- Extended Password Recovery Attacks against APOP, SIP, and Digest Authentication
SASAKI Yu; WANG Lei; OHTA Kazuo; KUNIHIRO Noboru
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences/92(1)/pp.96-104, 2009-01 - Deterministic Polynomial Time Equivalence between Factoring and Key-Recovery Attack on Takagi's RSA
Kunihiro Noboru
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences/E91-A(9)/pp.2356-2364, 2008-09 - Extension of Secret Handshake Protocols with Multiple Groups in Monotone Condition
Yutaka Kawai Shotaro Tanno Takahiro Kondo Kazuki Yoney...
Proc. of WISA2008/LNCS5379/pp.160-173, 2008-08 - Sanitizable and Deletable Signature
Tetsuya Izu Noboru Kunihiro Kazuo Ohta Makoto Sano and...
Proc. of WISA2008/LNCS5379/pp.130-144, 2008-08 - A Fast Quantum Circuit for Addition with Few Qubits
Takahashi Yasuhiro; Kunihiro Noboru
Quantum Information and Computation/8(6/7)/pp.636-649, 2008-07 - Password Recovery on Challenge and Response: Impossible Differential Attack on Hash Function
Yu Sasaki Lei Wang Kazuo Ohta Noboru Kunihiro
Proc. of AfricaCrypt2008/5023/pp.290-307, 2008-06 - New Definition of Density on Knapsack Cryptosystems
Noboru Kunihiro
Proc. of Africacrypt2008/5023/pp.156-173, 2008-06 - New Key Recovery Attack on HMAC/NMAC-MD4 and NMAC-MD5
Lei Wang and Kazuo Ohta and Noboru Kunihiro
Proc. of Eurocrypt2008/4965/pp.237-253, 2008-05 - Small Secret Key Attack on a variant of RSA (due to Takagi)
Itoh Kouichi; Kunihiro Noboru; Kurosawa Kaoru
Proc. of CT-RSA2008/4964/pp.387-406, 2008-04 - Security of MD5 Challenge and Response: Extension of APOP Password Recovery Attack
Yu Sasaki Lei Wang Kazuo Ohta and Noboru Kunihiro
Proc. of CT-RSA2008/4964/pp.1-18, 2008-04 - A Strict Evaluation Method on the Number of Conditions for the SHA-1 Collision Search
Jun Yajima Terutoshi Iwasaki Yusuke Naito Yu Sasaki T...
Proc. of ASIACCS2008/pp.10-20, 2008-03 - Password Recovery Attack on Authentication Protocol MD4(Password||Challenge)
Wang Lei; Ohta Kazuo; Kunihiro Noboru
Proc. of ASIACCS2008/pp.3-9, 2008-03 - Factorization of Square-Free Integers with High Bits Known
SANTOSO Bagus; Kunihiro Noboru; KANAYAMA Naoki; OHTA Kazuo
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences/E91-A(1)/pp.306-315, 2008-01 - New Message Differences for Collision Attacks on MD4 and MD5,
SASAKI Yu; WANG Lei; Kunihiro Noboru; OHTA Kazuo
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences/E91-A(1)/pp.55-63, 2008-01 - Improved Collision Search for Hash Functions: New Advanced Message Modification
NAITO Yusuke; OHTA Kazuo; Kunihiro Noboru
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences/E91-A(1)/pp.46-54, 2008-01 - New Message Differences for Collision Attacks on MD4 and MD5
Yu SASAKI; Lei WANG; Kunihiro Noboru; Kazuo OHTA
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences,/E91-A(1)/pp.55-63, 2008-01 - Improved Collision Search for Hash Functions: New Advanced Message Modification
Yusuke NAITO; Kazuo OHTA; 國廣 昇
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences/E91-A(1)/pp.46-54, 2008-01 - 暗号における理論と実装のギャップ : 置き換えアプローチの二面性(暗号理論入門(4))
太田和夫 國廣昇 バグスサントソ
応用数理/18(4)/pp.308-319, 2008-01 - 暗号学における双対性 : ゴールとシナリオの間には(チュートリアル)
太田和夫 國廣昇
応用数理/18(2)/pp.145-152, 2008-01 - APOPが破られた(オピニオン)
國廣昇 太田和夫
電子情報通信学会誌/91(9)/pp.822-825, 2008-01 - 素因数分解は,RSA暗号解読より真に難しいか?(<小特集>素数)
國廣昇
電子情報通信学会誌/91(6)/pp.474-477, 2008-01 - RSA暗号に対する格子理論に基づく攻撃(その2)
國廣昇; 太田和夫
応用数理/18(3)/pp.218-225, 2008-01 - RSA暗号に対する格子理論に基づく攻撃
國廣昇 太田和夫
応用数理/18(1)/pp.23-29, 2008-01 - The quantum Fourier transform on a linear nearest neighbor architecture
Takahashi Yasuhiro; Kunihiro Noboru; Ohta Kazuo
Quantum Information and Computation/7(4)/pp.383-391, 2007-08 - A New Strategy for Finding a Differential Path of SHA-1
Yajima Jun; Sasaki Yu; Naito Yusuke; Iwasaki Terutoshi; S...
Proc. of ACISP2007, 2007-07 - さらに表示...
- Extended Password Recovery Attacks against APOP, SIP, and Digest Authentication