國廣 昇(クニヒロ ノボル)

研究者情報全体を表示

論文
  • Sanitizable Signature with Aggregation
    Izu Tetsuya; Kunihiro Noboru; Kazuo; Takashi Takenaka; Yos...
    Proc. of ISPEC 2007/LNCS4464/pp.51-64, 2007-05
  • Provably Secure Untraceable Electronic Cash against Insider Attack
    Hanatani Yoshikazu; Komano Yuichi; OHTA Kazuo; Kunihiro ...
    IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences/E90-A(5), 2007-05
  • Deterministic Polynomial Time Equivalence between Factoring and Key-Recovery Attack on Takagi's RSA
    Kunihiro Noboru; Kurosawa Kaoru
    Proc. of PKC2007/LNCS4450/pp.412-425, 2007-04
  • New Message Difference for MD4
    Sasaki Yu; Wang Lei; Ohta Kazuo; Kunihiro Noboru
    Proc. of FSE2007/LNCS4593/pp.329-348, 2007-03
  • Improved Collision Attacks on MD4 and MD5
    Yu SASAKI; Yusuke NAITO; 國廣 昇; Kazuo OHTA
    IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences/E90-A(1)/pp.36-47, 2007-01
  • Improved Collision Search for SHA-0
    Naito Yusuke; Sasaki Yu; Shimoyama Takeshi; Yajima Jun; K...
    Proc. of Asiacrypt2006/LNCS 4284/pp.21-36, 2006-12
  • How to Construct Sufficient Conditions for Hash Functions
    Sasaki Yu; Naito Yusuke; Yajima Jun; Shimoyama Takeshi; K...
    Proc. of Vietcrypt2006/LNCS4341/pp.115-130, 2006-09
  • Factoring Square-free Composite Integer by solving Multivariate Integer Polynomial Equations
    Santoso Bagus; Kunihiro Noboru; Kanayama Naoki; Ohta Kazuo
    Proc. of Vietcrypt2006/LNCS4341/pp.243-259, 2006-09
  • 双線形写像を用いた墨塗り署名方式の安全性について
    伊豆 哲也; 國廣 昇; 太田和夫; 武仲正彦
    情報処理学会論文誌/47(7)/pp.2409-2416, 2006-07
  • 素因数分解ハードウェアの研究・開発動向
    伊豆 哲也; 國廣 昇; 下山 武司
    情報処理学会論文誌/48(9)/pp.2956-2965, 2006-07
  • Problems on the MR Micropayment Schemes
    Mambo M.; Salinas M. R.; Ohta Kazuo; Kunihiro Noboru
    Proc. of ASIACCS'06/pp.363-363, 2006-03
  • Provable Secure Electronic Cash based on Blind Multisignature schemes
    Hanatani Y.; Komano Yuichi; Kunihiro Noboru; Ohta Kazuo
    Proc. of Financial Cryptography'06/LNCS 4107/pp.236-250, 2006-02
  • Visual Secret Sharing Schemes for Multiple Secret Images Allowing the Rotation of Shares
    Mitsugu IWAMOTO; Lei WANG; Kazuki YONEYAMA; Noboru KUNIH...
    IEICE transactions on fundamentals of electronics, communications and computer sciences/E89-A(5)/pp.1382-1395, 2006-01
  • Maurer-Yacobi ID-Based Key Distribution Revisited
    Noboru KUNIHIRO; Wataru ABE; Kazuo OHTA
    IEICE transactions on fundamentals of electronics, communications and computer sciences/E89-A(5)/pp.1421-1424, 2006-01
  • A quantum circuit for Shor's factoring algorithm using 2n+2 qubits
    Takahashi Yasuhiro; Kunihiro Noboru
    Quantum Information and Computation/6(2)/pp.184-192, 2006-01
  • Improved Collision Attack on MD4 with Probability Almost 1
    Naito Yusuke; Sasaki Yu; Kunihiro Noboru; Ohta Kazuo
    Proc. of ICISC2005/LNCS 3935/pp.129-145, 2005-12
  • A LINEAR-SIZE QUANTUM CIRCUIT FOR ADDITION WITH NO ANCILLARY QUBITS
    Takahashi Yasuhiro; Kunihiro Noboru
    Quantum Information and Computation/5(6)/pp.440-448, 2005-12
  • 暗号の米政府標準方式が危機に
    國廣 昇
    「科学」/pp.1235-1237, 2005-11
  • Exact Analyses of Computational Time for Factoring in Quantum Computers
    KUNIHIRO Noboru
    IEICE transactions on fundamentals of electronics, communications and computer sciences/E88-A(1)/pp.105-111, 2005-10
  • 物理的実現可能性に優れたNMR量子探索アルゴリズム(計算理論)
    大久保誠也; 西野哲朗; 太田和夫; 國廣昇
    情報処理学会論文誌/46(6)/pp.1416-1425, 2005-01
  • Bulk量子計算モデル上におけるGroverのアルゴリズムの繰返し回数について
    大久保誠也; 西野哲朗; 太田和夫; 國廣昇
    情報処理学会論文誌. 数理モデル化と応用/46(17)/pp.10-19, 2005-01
  • A Quantum Algorithm using NMR Computers to Break Secret-Key Cryptosystems
    OHTA Kazuo; NISHINO Tetsuro; OKUBO Seiya; Kunihiro Noboru
    New Generation Computing/21(4)/pp.347-361, 2003-08
  • Efficient Algorithms for NMR Quantum Computers with Small Qubits
    Kunihiro Noboru; YAMASHITA Shigeru
    New Generation Computing/21(4)/pp.329-337, 2003-08
  • Cryptographic Works of Dr. Kenji Koyama: In Memoria : Special Section on Cryptography and Information Security
    KUNIHIRO Noboru; OHTA Kazuo; OKAMOTO Tatsuaki; TERADA Ro...
    IEICE transactions on fundamentals of electronics, communications and computer sciences/84(1)/pp.108-113, 2001-10
  • Two Discrete Log Algorithms for Super-Anomalous Elliptic Curves and Their Applications(Special Section on Cryptography and Information Security)
    KUNIHIRO Noboru; KOYAMA Kenji
    IEICE transactions on fundamentals of electronics, communications and computer sciences/83(1)/pp.10-16, 2000-12
  • さらに表示...