Stop the war!
Остановите войну!
for scientists:
default search action
Noboru Kunihiro
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
showing all ?? records
2020 – today
- 2023
- [j52]Reo Eriguchi, Noboru Kunihiro, Koji Nuida:
Multiplicative and verifiably multiplicative secret sharing for multipartite adversary structures. Des. Codes Cryptogr. 91(5): 1751-1778 (2023) - [j51]Reo Eriguchi, Noboru Kunihiro, Koji Nuida:
Linear Algebraic Approach to Strongly Secure Ramp Secret Sharing for General Access Structures with Application to Symmetric PIR. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 106(3): 263-271 (2023) - [j50]Reo Eriguchi, Atsunori Ichikawa, Noboru Kunihiro, Koji Nuida:
Efficient Noise Generation Protocols for Differentially Private Multiparty Computation. IEEE Trans. Dependable Secur. Comput. 20(6): 4486-4501 (2023) - [c94]Kenta Tani, Noboru Kunihiro:
HS-Based Error Correction Algorithm for Noisy Binary GCD Side-Channel Sequences. ACNS (1) 2023: 59-88 - [c93]Junpei Yamaguchi, Masafumi Yamazaki, Akihiro Tabuchi, Takumi Honda, Tetsuya Izu, Noboru Kunihiro:
Experiments and Resource Analysis of Shor's Factorization Using a Quantum Simulator. ICISC (1) 2023: 119-139 - [c92]Shunsuke Osaki, Noboru Kunihiro:
Extended Attacks on ECDSA with Noisy Multiple Bit Nonce Leakages. ICISC (1) 2023: 163-184 - [i20]Junpei Yamaguchi, Masafumi Yamazaki, Akihiro Tabuchi, Takumi Honda, Tetsuya Izu, Noboru Kunihiro:
Estimation of Shor's Circuit for 2048-bit Integers based on Quantum Simulator. IACR Cryptol. ePrint Arch. 2023: 92 (2023) - 2022
- [j49]Noboru Kunihiro:
Editor's Message to Special Issue of Computer Security Technologies for Quantum-Safe World. J. Inf. Process. 30: 562 (2022) - [i19]Reo Eriguchi, Noboru Kunihiro, Koji Nuida:
Multiplicative and Verifiably Multiplicative Secret Sharing for Multipartite Adversary Structures. IACR Cryptol. ePrint Arch. 2022: 1390 (2022) - [i18]Reo Eriguchi, Atsunori Ichikawa, Noboru Kunihiro, Koji Nuida:
Efficient Noise Generation Protocols for Differentially Private Multiparty Computation. IACR Cryptol. ePrint Arch. 2022: 1391 (2022) - 2021
- [j48]Mengce Zheng, Noboru Kunihiro, Yuanzhi Yao:
Cryptanalysis of the RSA variant based on cubic Pell equation. Theor. Comput. Sci. 889: 135-144 (2021) - [c91]Reo Eriguchi, Atsunori Ichikawa, Noboru Kunihiro, Koji Nuida:
Efficient Noise Generation to Achieve Differential Privacy with Applications to Secure Multiparty Computation. Financial Cryptography (1) 2021: 271-290 - 2020
- [j47]Noboru Kunihiro, Atsushi Takayasu:
Worst case short lattice vector enumeration on block reduced bases of arbitrary blocksizes. Discret. Appl. Math. 277: 198-220 (2020) - [j46]Mengce Zheng, Noboru Kunihiro, Honggang Hu:
Lattice-Based Cryptanalysis of RSA with Implicitly Related Keys. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 103-A(8): 959-968 (2020) - [j45]Reo Eriguchi, Noboru Kunihiro:
Strong security of linear ramp secret sharing schemes with general access structures. Inf. Process. Lett. 164: 106018 (2020) - [j44]Takashi Yamakawa, Shota Yamada, Goichiro Hanaoka, Noboru Kunihiro:
Generic hardness of inversion on ring and its relation to self-bilinear map. Theor. Comput. Sci. 820: 60-84 (2020) - [j43]Kaichi Suzuki, Atsushi Takayasu, Noboru Kunihiro:
Extended partial key exposure attacks on RSA: Improvement up to full size decryption exponents. Theor. Comput. Sci. 841: 62-83 (2020) - [c90]Kento Oonishi, Noboru Kunihiro:
Recovering CRT-RSA Secret Keys from Noisy Square-and-Multiply Sequences in the Sliding Window Method. ACISP 2020: 642-652 - [c89]Masayuki Yoshino, Ken Naganuma, Noboru Kunihiro, Hisayoshi Sato:
Practical Query-based Order Revealing Encryption from Symmetric Searchable Encryption. AsiaJCIS 2020: 16-23 - [c88]Ken Naganuma, Masayuki Yoshino, Atsuo Inoue, Yukinori Matsuoka, Mineaki Okazaki, Noboru Kunihiro:
Post-Quantum zk-SNARK for Arithmetic Circuits using QAPs. AsiaJCIS 2020: 32-39 - [c87]Ken Naganuma, Takayuki Suzuki, Masayuki Yoshino, Kenta Takahashi, Yosuke Kaga, Noboru Kunihiro:
New Secret Key Management Technology for Blockchains from Biometrics Fuzzy Signature. AsiaJCIS 2020: 54-58 - [c86]Reo Eriguchi, Noboru Kunihiro:
d-Multiplicative Secret Sharing for Multipartite Adversary Structures. ITC 2020: 2:1-2:16 - [c85]Reo Eriguchi, Noboru Kunihiro, Koji Nuida:
A Linear Algebraic Approach to Strongly Secure Ramp Secret Sharing for General Access Structures. ISITA 2020: 427-431
2010 – 2019
- 2019
- [j42]Noboru Kunihiro, Yasutada Oohama:
Foreword. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 102-A(12): 1590 (2019) - [j41]Atsushi Takayasu, Noboru Kunihiro:
Partial key exposure attacks on RSA: Achieving the Boneh-Durfee bound. Theor. Comput. Sci. 761: 51-77 (2019) - [c84]Kento Oonishi, Xiaoxuan Huang, Noboru Kunihiro:
Improved CRT-RSA Secret Key Recovery Method from Sliding Window Leakage. ICISC 2019: 278-296 - [c83]Reo Eriguchi, Noboru Kunihiro, Mitsugu Iwamoto:
Optimal Multiple Assignment Schemes Using Ideal Multipartite Secret Sharing Schemes. ISIT 2019: 3047-3051 - [c82]Reo Eriguchi, Noboru Kunihiro:
Strongly Secure Ramp Secret Sharing Schemes from Any Linear Secret Sharing Schemes. ITW 2019: 1-5 - 2018
- [c81]Liqiang Peng, Yao Lu, Noboru Kunihiro, Rui Zhang, Lei Hu:
A Deterministic Algorithm for Computing Divisors in an Interval. ACISP 2018: 3-12 - [c80]Mengce Zheng, Noboru Kunihiro, Honggang Hu:
Cryptanalysis of RSA Variants with Modified Euler Quotient. AFRICACRYPT 2018: 266-281 - [c79]Yao Lu, Noboru Kunihiro, Rui Zhang, Liqiang Peng, Hui Ma:
Certifying Variant of RSA with Generalized Moduli. ICICS 2018: 598-608 - [c78]Kento Oonishi, Noboru Kunihiro:
Attacking Noisy Secret CRT-RSA Exponents in Binary Method. ICISC 2018: 37-54 - [c77]Ken Naganuma, Masayuki Yoshino, Hisayoshi Sato, Nishio Yamada, Takayuki Suzuki, Noboru Kunihiro:
Decentralized Netting Protocol over Consortium Blockchain. ISITA 2018: 174-177 - [c76]Satoshi Furukawa, Noboru Kunihiro, Katsuyuki Takashima:
Multi-party Key Exchange Protocols from Supersingular Isogenies. ISITA 2018: 208-212 - [c75]Sota Onozawa, Noboru Kunihiro, Masayuki Yoshino, Ken Naganuma:
Inference Attacks on Encrypted Databases Based on Order Preserving Assignment Problem. IWSEC 2018: 35-47 - [c74]Noboru Kunihiro, Wenjie Lu, Takashi Nishide, Jun Sakuma:
Outsourced Private Function Evaluation with Privacy Policy Enforcement. TrustCom/BigDataSE 2018: 412-423 - [i17]Takashi Yamakawa, Shota Yamada, Goichiro Hanaoka, Noboru Kunihiro:
Generic Hardness of Inversion on Ring and Its Relation to Self-Bilinear Map. IACR Cryptol. ePrint Arch. 2018: 463 (2018) - [i16]Atsushi Takayasu, Noboru Kunihiro:
Partial Key Exposure Attacks on RSA: Achieving the Boneh-Durfee Bound. IACR Cryptol. ePrint Arch. 2018: 516 (2018) - 2017
- [j40]Takashi Yamakawa, Shota Yamada, Goichiro Hanaoka, Noboru Kunihiro:
Self-Bilinear Map on Unknown Order Groups from Indistinguishability Obfuscation and Its Applications. Algorithmica 79(4): 1286-1317 (2017) - [j39]Atsushi Takayasu, Noboru Kunihiro:
General Bounds for Small Inverse Problems and Its Applications to Multi-Prime RSA. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 100-A(1): 50-61 (2017) - [j38]Shuichi Katsumata, Noboru Kunihiro:
Constructing Subspace Membership Encryption through Inner Product Encryption. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 100-A(9): 1804-1815 (2017) - [c73]Mengce Zheng, Noboru Kunihiro, Honggang Hu:
Improved Factoring Attacks on Multi-prime RSA with Small Prime Difference. ACISP (1) 2017: 324-342 - [c72]Jason H. M. Ying, Noboru Kunihiro:
Solving the DLP with Low Hamming Weight Product Exponents and Improved Attacks on the GPS Identification Scheme. ACISP (2) 2017: 460-467 - [c71]Jason H. M. Ying, Noboru Kunihiro:
Bounds in Various Generalized Settings of the Discrete Logarithm Problem. ACNS 2017: 498-517 - [c70]Keita Emura, Takuya Hayashi, Noboru Kunihiro, Jun Sakuma:
Mis-operation Resistant Searchable Homomorphic Encryption. AsiaCCS 2017: 215-229 - [c69]Atsushi Takayasu, Noboru Kunihiro:
A Tool Kit for Partial Key Exposure Attacks on RSA. CT-RSA 2017: 58-73 - [c68]Noboru Kunihiro, Yuki Takahashi:
Improved Key Recovery Algorithms from Noisy RSA Secret Keys with Analog Noise. CT-RSA 2017: 328-343 - [p2]Noboru Kunihiro:
Mathematical Approach for Recovering Secret Key from Its Noisy Version. CREST Crypto-Math Project 2017: 199-217 - [p1]Yao Lu, Liqiang Peng, Noboru Kunihiro:
Recent Progress on Coppersmith's Lattice-Based Method: A Survey. CREST Crypto-Math Project 2017: 297-312 - [e3]Tsuyoshi Takagi, Masato Wakayama, Keisuke Tanaka, Noboru Kunihiro, Kazufumi Kimoto, Dung Hoang Duong:
Mathematical Modelling for Next-Generation Cryptography: CREST Crypto-Math Project. Mathematics for Industry, Springer Singapore 2017, ISBN 978-981-10-5064-0 [contents] - 2016
- [j37]Yutaka Kawai, Goichiro Hanaoka, Kazuo Ohta, Noboru Kunihiro:
A limitation on security evaluation of cryptographic primitives with fixed keys. Secur. Commun. Networks 9(12): 1663-1675 (2016) - [j36]Yoshinao Uchide, Noboru Kunihiro:
Searchable symmetric encryption capable of searching for an arbitrary string. Secur. Commun. Networks 9(12): 1726-1736 (2016) - [c67]Atsushi Takayasu, Noboru Kunihiro:
Partial Key Exposure Attacks on RSA with Multiple Exponent Pairs. ACISP (2) 2016: 243-257 - [c66]Takashi Yamakawa, Goichiro Hanaoka, Noboru Kunihiro:
Generalized Hardness Assumption for Self-bilinear Map with Auxiliary Information. ACISP (2) 2016: 269-284 - [c65]Thomas Vannet, Noboru Kunihiro:
Partial Server Side Parameter Selection in Private Information Retrieval. AsiaJCIS 2016: 31-38 - [c64]Toru Akishita, Noboru Kunihiro:
Improved Differential Fault Analysis on Camellia-128. COSADE 2016: 130-143 - [c63]Takashi Yamakawa, Shota Yamada, Goichiro Hanaoka, Noboru Kunihiro:
Adversary-Dependent Lossy Trapdoor Function from Hardness of Factoring Semi-smooth RSA Subgroup Moduli. CRYPTO (2) 2016: 3-32 - [c62]Hwei-Ming Ying, Noboru Kunihiro:
Cold Boot Attack Methods for the Discrete Logarithm Problem. CANDAR 2016: 154-160 - [c61]Hwei-Ming Ying, Noboru Kunihiro:
Decryption of Frequent Password Hashes in Rainbow Tables. CANDAR 2016: 655-661 - [c60]Atsushi Takayasu, Noboru Kunihiro:
Small secret exponent attacks on RSA with unbalanced prime factors. ISITA 2016: 236-240 - [c59]Atsushi Takayasu, Noboru Kunihiro:
Partial Key Exposure Attacks on CRT-RSA: General Improvement for the Exposed Least Significant Bits. ISC 2016: 35-47 - [c58]Atsushi Takayasu, Noboru Kunihiro:
How to Generalize RSA Cryptanalyses. Public Key Cryptography (2) 2016: 67-97 - [i15]Atsushi Takayasu, Noboru Kunihiro:
How to Generalize RSA Cryptanalyses. IACR Cryptol. ePrint Arch. 2016: 195 (2016) - [i14]Atsushi Takayasu, Noboru Kunihiro:
General Bounds for Small Inverse Problems and Its Applications to Multi-Prime RSA. IACR Cryptol. ePrint Arch. 2016: 353 (2016) - [i13]Takashi Yamakawa, Shota Yamada, Goichiro Hanaoka, Noboru Kunihiro:
Adversary-dependent Lossy Trapdoor Function from Hardness of Factoring Semi-smooth RSA Subgroup Moduli. IACR Cryptol. ePrint Arch. 2016: 567 (2016) - [i12]Atsushi Takayasu, Noboru Kunihiro:
A Tool Kit for Partial Key Exposure Attacks on RSA. IACR Cryptol. ePrint Arch. 2016: 1056 (2016) - [i11]Noboru Kunihiro, Yuki Takahashi:
Improved Key Recovery Algorithms from Noisy RSA Secret Keys with Analog Noise. IACR Cryptol. ePrint Arch. 2016: 1095 (2016) - 2015
- [j35]Kosei Endo, Noboru Kunihiro:
Security Analysis on AUTH Protocol and Its Variant against the Man-in-the-Middle Attack. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 98-A(1): 153-161 (2015) - [c57]Atsushi Takayasu, Noboru Kunihiro:
Partial Key Exposure Attacks on CRT-RSA: Better Cryptanalysis to Full Size Encryption Exponents. ACNS 2015: 518-537 - [c56]Tomoyuki Tanigaki, Noboru Kunihiro:
Maximum Likelihood-Based Key Recovery Algorithm from Decayed Key Schedules. ICISC 2015: 314-328 - [c55]Noboru Kunihiro:
An Improved Attack for Recovering Noisy RSA Secret Keys and Its Countermeasure. ProvSec 2015: 61-81 - [c54]Thomas Vannet, Noboru Kunihiro:
Private Information Retrieval with Preprocessing Based on the Approximate GCD Problem. SAC 2015: 227-240 - [i10]Takashi Yamakawa, Shota Yamada, Goichiro Hanaoka, Noboru Kunihiro:
Self-bilinear Map on Unknown Order Groups from Indistinguishability Obfuscation and Its Applications. IACR Cryptol. ePrint Arch. 2015: 128 (2015) - 2014
- [j34]Atsushi Takayasu, Noboru Kunihiro:
Better Lattice Constructions for Solving Multivariate Linear Equations Modulo Unknown Divisors. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 97-A(6): 1259-1272 (2014) - [j33]Noboru Kunihiro, Naoyuki Shinohara, Tetsuya Izu:
Recovering RSA Secret Keys from Noisy Key Bits with Erasures and Errors. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 97-A(6): 1273-1284 (2014) - [j32]Noboru Kunihiro, Naoyuki Shinohara, Tetsuya Izu:
A Unified Framework for Small Secret Exponent Attack on RSA. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 97-A(6): 1285-1295 (2014) - [c53]Atsushi Takayasu, Noboru Kunihiro:
Cryptanalysis of RSA with Multiple Small Secret Exponents. ACISP 2014: 176-191 - [c52]Noboru Kunihiro, Junya Honda:
RSA Meets DPA: Recovering RSA Secret Keys from Noisy Analog Data. CHES 2014: 261-278 - [c51]Takashi Yamakawa, Shota Yamada, Goichiro Hanaoka, Noboru Kunihiro:
Self-bilinear Map on Unknown Order Groups from Indistinguishability Obfuscation and Its Applications. CRYPTO (2) 2014: 90-107 - [c50]Atsushi Takayasu, Noboru Kunihiro:
General Bounds for Small Inverse Problems and Its Applications to Multi-Prime RSA. ICISC 2014: 3-17 - [c49]Kosei Endo, Noboru Kunihiro:
On the Security Proof of an Authentication Protocol from Eurocrypt 2011. IWSEC 2014: 187-203 - [c48]Shota Yamada, Nuttapong Attrapadung, Goichiro Hanaoka, Noboru Kunihiro:
A Framework and Compact Constructions for Non-monotonic Attribute-Based Encryption. Public Key Cryptography 2014: 275-292 - [c47]Shuichi Katsumata, Noboru Kunihiro:
Constructing Subspace Membership Encryption through Inner Product Encryption. ProvSec 2014: 223-242 - [c46]Atsushi Takayasu, Noboru Kunihiro:
Partial Key Exposure Attacks on RSA: Achieving the Boneh-Durfee Bound. Selected Areas in Cryptography 2014: 345-362 - [c45]Takashi Yamakawa, Shota Yamada, Koji Nuida, Goichiro Hanaoka, Noboru Kunihiro:
Chosen Ciphertext Security on Hard Membership Decision Groups: The Case of Semi-smooth Subgroups of Quadratic Residues. SCN 2014: 558-577 - [i9]Shota Yamada, Nuttapong Attrapadung, Goichiro Hanaoka, Noboru Kunihiro:
A Framework and Compact Constructions for Non-monotonic Attribute-Based Encryption. IACR Cryptol. ePrint Arch. 2014: 181 (2014) - [i8]Noboru Kunihiro, Junya Honda:
RSA meets DPA: Recovering RSA Secret Keys from Noisy Analog Data. IACR Cryptol. ePrint Arch. 2014: 513 (2014) - 2013
- [j31]Yutaka Kawai, Noboru Kunihiro:
Secret handshake scheme with request-based-revealing. Comput. Math. Appl. 65(5): 786-798 (2013) - [j30]Masayuki Yoshino, Noboru Kunihiro:
Random Sampling Reduction with Precomputation. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 96-A(1): 150-157 (2013) - [c44]Atsushi Takayasu, Noboru Kunihiro:
Better Lattice Constructions for Solving Multivariate Linear Equations Modulo Unknown Divisors. ACISP 2013: 118-135 - [c43]Takashi Yamakawa, Shota Yamada, Takahiro Matsuda, Goichiro Hanaoka, Noboru Kunihiro:
Efficient variants of the Naor-Yung and Dolev-Dwork-Naor transforms for CCA secure key encapsulation mechanism. AsiaPKC@AsiaCCS 2013: 23-32 - [c42]Takashi Yamakawa, Shota Yamada, Takahiro Matsuda, Goichiro Hanaoka, Noboru Kunihiro:
Reducing Public Key Sizes in Bounded CCA-Secure KEMs with Optimal Ciphertext Length. ISC 2013: 100-109 - [c41]Noboru Kunihiro, Naoyuki Shinohara, Tetsuya Izu:
Recovering RSA Secret Keys from Noisy Key Bits with Erasures and Errors. Public Key Cryptography 2013: 180-197 - 2012
- [j29]Jun Kogure, Noboru Kunihiro, Hirosuke Yamamoto:
On the Hardness of Subset Sum Problem from Different Intervals. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 95-A(5): 903-908 (2012) - [c40]Kaori Tosu, Noboru Kunihiro:
Optimal Bounds for Multi-Prime Φ-Hiding Assumption. ACISP 2012: 1-14 - [c39]Yuji Nagashima, Noboru Kunihiro:
Faster Algorithm for Solving Hard Knapsacks for Moderate Message Length. ACISP 2012: 43-56 - [c38]Shota Yamada, Goichiro Hanaoka, Noboru Kunihiro:
Two-Dimensional Representation of Cover Free Families and Its Applications: Short Signatures and More. CT-RSA 2012: 260-277 - [c37]Goichiro Hanaoka, Yutaka Kawai, Noboru Kunihiro, Takahiro Matsuda, Jian Weng, Rui Zhang, Yunlei Zhao:
Generic Construction of Chosen Ciphertext Secure Proxy Re-Encryption. CT-RSA 2012: 349-364 - [c36]Takuma Koyama, Yu Sasaki, Noboru Kunihiro:
Multi-differential Cryptanalysis on Reduced DM-PRESENT-80: Collisions and Other Differential Properties. ICISC 2012: 352-367 - [c35]Masayuki Yoshino, Noboru Kunihiro:
Improving GGH cryptosystem for large error vector. ISITA 2012: 416-420 - [c34]Noboru Kunihiro:
On Optimal Bounds of Small Inverse Problems and Approximate GCD Problems with Higher Degree. ISC 2012: 55-69 - [c33]Shota Yamada, Goichiro Hanaoka, Noboru Kunihiro:
Space Efficient Signature Schemes from the RSA Assumption. Public Key Cryptography 2012: 102-119 - [c32]Shota Yamada, Nuttapong Attrapadung, Bagus Santoso, Jacob C. N. Schuldt, Goichiro Hanaoka, Noboru Kunihiro:
Verifiable Predicate Encryption and Applications to CCA Security and Anonymous Predicate Authentication. Public Key Cryptography 2012: 243-261 - [c31]Masayuki Yoshino, Noboru Kunihiro, Ken Naganuma, Hisayoshi Sato:
Symmetric Inner-Product Predicate Encryption Based on Three Groups. ProvSec 2012: 215-234 - [i7]Noboru Kunihiro, Naoyuki Shinohara, Tetsuya Izu:
Recovering RSA Secret Keys from Noisy Key Bits with Erasures and Errors. IACR Cryptol. ePrint Arch. 2012: 701 (2012) - 2011
- [j28]Naoyuki Shinohara, Tetsuya Izu, Noboru Kunihiro:
Small Secret CRT-Exponent Attacks on Takagi's RSA. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 94-A(1): 19-27 (2011) - [j27]Noboru Kunihiro:
Solving Generalized Small Inverse Problems. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 94-A(6): 1274-1284 (2011) - [j26]Yutaka Kawai, Yusuke Sakai, Noboru Kunihiro:
On the (Im)possibility Results for Strong Attack Models for Public Key Cryptsystems. J. Internet Serv. Inf. Secur. 1(2/3): 125-139 (2011) - [c30]Tetsuya Izu, Masami Izumi, Noboru Kunihiro, Kazuo Ohta:
Yet Another Sanitizable and Deletable Signatures. AINA Workshops 2011: 574-579 - [c29]Yutaka Kawai, Noboru Kunihiro:
Secret Handshake Scheme with Request-Based-Revealing. EuroPKI 2011: 1-16 - [c28]Shota Yamada, Nuttapong Attrapadung, Goichiro Hanaoka, Noboru Kunihiro:
Generic Constructions for Chosen-Ciphertext Secure Attribute Based Encryption. Public Key Cryptography 2011: 71-89 - [c27]Noboru Kunihiro, Naoyuki Shinohara, Tetsuya Izu:
A Unified Framework for Small Secret Exponent Attack on RSA. Selected Areas in Cryptography 2011: 260-277 - [c26]Jun Kogure, Noboru Kunihiro, Hirosuke Yamamoto:
Generalized Security Analysis of the Random Key Bits Leakage Attack. WISA 2011: 13-27 - [i6]Noboru Kunihiro, Naoyuki Shinohara, Tetsuya Izu:
A Unified Framework for Small Secret Exponent Attack on RSA. IACR Cryptol. ePrint Arch. 2011: 591 (2011) - 2010
- [j25]Yu Sasaki, Lei Wang, Kazuo Ohta, Kazumaro Aoki, Noboru Kunihiro:
Practical Password Recovery Attacks on MD4 Based Prefix and Hybrid Authentication Protocols. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 93-A(1): 84-92 (2010) - [j24]Lei Wang, Kazuo Ohta, Yu Sasaki, Kazuo Sakiyama, Noboru Kunihiro:
Cryptanalysis of Two MD5-Based Authentication Protocols: APOP and NMAC. IEICE Trans. Inf. Syst. 93-D(5): 1087-1095 (2010) - [j23]Noboru Kunihiro:
New Conditions for Secure Knapsack Schemes against Lattice Attack. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 93-A(6): 1058-1065 (2010) - [j22]Yutaka Kawai, Shotaro Tanno, Takahiro Kondo, Kazuki Yoneyama, Kazuo Ohta, Noboru Kunihiro:
Extension of Secret Handshake Protocols with Multiple Groups in Monotone Condition. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 93-A(6): 1122-1131 (2010) - [j21]Shota Yamada, Yutaka Kawai, Goichiro Hanaoka, Noboru Kunihiro:
Public Key Encryption Schemes from the (B)CDH Assumption with Better Efficiency. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 93-A(11): 1984-1993 (2010) - [j20]Yasuhiro Takahashi, Seiichiro Tani, Noboru Kunihiro:
Quantum addition circuits and unbounded fan-out. Quantum Inf. Comput. 10(9&10): 872-890 (2010) - [c25]Noboru Kunihiro:
Solving Generalized Small Inverse Problems. ACISP 2010: 248-263 - [c24]