國廣 昇(クニヒロ ノボル)

研究者情報全体を表示

論文
  • Extended Password Recovery Attacks against APOP, SIP, and Digest Authentication
    SASAKI Yu; WANG Lei; OHTA Kazuo; KUNIHIRO Noboru
    IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences/92(1)/pp.96-104, 2009-01
  • Deterministic Polynomial Time Equivalence between Factoring and Key-Recovery Attack on Takagi's RSA
    Kunihiro Noboru
    IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences/E91-A(9)/pp.2356-2364, 2008-09
  • Extension of Secret Handshake Protocols with Multiple Groups in Monotone Condition
    Yutaka Kawai Shotaro Tanno Takahiro Kondo Kazuki Yoney...
    Proc. of WISA2008/LNCS5379/pp.160-173, 2008-08
  • Sanitizable and Deletable Signature
    Tetsuya Izu Noboru Kunihiro Kazuo Ohta Makoto Sano and...
    Proc. of WISA2008/LNCS5379/pp.130-144, 2008-08
  • A Fast Quantum Circuit for Addition with Few Qubits
    Takahashi Yasuhiro; Kunihiro Noboru
    Quantum Information and Computation/8(6/7)/pp.636-649, 2008-07
  • Password Recovery on Challenge and Response: Impossible Differential Attack on Hash Function
    Yu Sasaki Lei Wang Kazuo Ohta Noboru Kunihiro
    Proc. of AfricaCrypt2008/5023/pp.290-307, 2008-06
  • New Definition of Density on Knapsack Cryptosystems
    Noboru Kunihiro
    Proc. of Africacrypt2008/5023/pp.156-173, 2008-06
  • New Key Recovery Attack on HMAC/NMAC-MD4 and NMAC-MD5
    Lei Wang and Kazuo Ohta and Noboru Kunihiro
    Proc. of Eurocrypt2008/4965/pp.237-253, 2008-05
  • Small Secret Key Attack on a variant of RSA (due to Takagi)
    Itoh Kouichi; Kunihiro Noboru; Kurosawa Kaoru
    Proc. of CT-RSA2008/4964/pp.387-406, 2008-04
  • Security of MD5 Challenge and Response: Extension of APOP Password Recovery Attack
    Yu Sasaki Lei Wang Kazuo Ohta and Noboru Kunihiro
    Proc. of CT-RSA2008/4964/pp.1-18, 2008-04
  • A Strict Evaluation Method on the Number of Conditions for the SHA-1 Collision Search
    Jun Yajima Terutoshi Iwasaki Yusuke Naito Yu Sasaki T...
    Proc. of ASIACCS2008/pp.10-20, 2008-03
  • Password Recovery Attack on Authentication Protocol MD4(Password||Challenge)
    Wang Lei; Ohta Kazuo; Kunihiro Noboru
    Proc. of ASIACCS2008/pp.3-9, 2008-03
  • Factorization of Square-Free Integers with High Bits Known
    SANTOSO Bagus; Kunihiro Noboru; KANAYAMA Naoki; OHTA Kazuo
    IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences/E91-A(1)/pp.306-315, 2008-01
  • New Message Differences for Collision Attacks on MD4 and MD5,
    SASAKI Yu; WANG Lei; Kunihiro Noboru; OHTA Kazuo
    IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences/E91-A(1)/pp.55-63, 2008-01
  • Improved Collision Search for Hash Functions: New Advanced Message Modification
    NAITO Yusuke; OHTA Kazuo; Kunihiro Noboru
    IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences/E91-A(1)/pp.46-54, 2008-01
  • New Message Differences for Collision Attacks on MD4 and MD5
    Yu SASAKI; Lei WANG; Kunihiro Noboru; Kazuo OHTA
    IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences,/E91-A(1)/pp.55-63, 2008-01
  • Improved Collision Search for Hash Functions: New Advanced Message Modification
    Yusuke NAITO; Kazuo OHTA; 國廣 昇
    IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences/E91-A(1)/pp.46-54, 2008-01
  • 暗号における理論と実装のギャップ : 置き換えアプローチの二面性(暗号理論入門(4))
    太田和夫 國廣昇 バグスサントソ
    応用数理/18(4)/pp.308-319, 2008-01
  • 暗号学における双対性 : ゴールとシナリオの間には(チュートリアル)
    太田和夫 國廣昇
    応用数理/18(2)/pp.145-152, 2008-01
  • APOPが破られた(オピニオン)
    國廣昇 太田和夫
    電子情報通信学会誌/91(9)/pp.822-825, 2008-01
  • 素因数分解は,RSA暗号解読より真に難しいか?(<小特集>素数)
    國廣昇
    電子情報通信学会誌/91(6)/pp.474-477, 2008-01
  • RSA暗号に対する格子理論に基づく攻撃(その2)
    國廣昇; 太田和夫
    応用数理/18(3)/pp.218-225, 2008-01
  • RSA暗号に対する格子理論に基づく攻撃
    國廣昇 太田和夫
    応用数理/18(1)/pp.23-29, 2008-01
  • The quantum Fourier transform on a linear nearest neighbor architecture
    Takahashi Yasuhiro; Kunihiro Noboru; Ohta Kazuo
    Quantum Information and Computation/7(4)/pp.383-391, 2007-08
  • A New Strategy for Finding a Differential Path of SHA-1
    Yajima Jun; Sasaki Yu; Naito Yusuke; Iwasaki Terutoshi; S...
    Proc. of ACISP2007, 2007-07
  • さらに表示...