BibTeX records: Noboru Kunihiro

download as .bib file

@article{DBLP:journals/dcc/EriguchiKN23,
  author       = {Reo Eriguchi and
                  Noboru Kunihiro and
                  Koji Nuida},
  title        = {Multiplicative and verifiably multiplicative secret sharing for multipartite
                  adversary structures},
  journal      = {Des. Codes Cryptogr.},
  volume       = {91},
  number       = {5},
  pages        = {1751--1778},
  year         = {2023},
  url          = {https://doi.org/10.1007/s10623-022-01177-2},
  doi          = {10.1007/S10623-022-01177-2},
  timestamp    = {Sat, 29 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/EriguchiKN23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieiceta/EriguchiKN23,
  author       = {Reo Eriguchi and
                  Noboru Kunihiro and
                  Koji Nuida},
  title        = {Linear Algebraic Approach to Strongly Secure Ramp Secret Sharing for
                  General Access Structures with Application to Symmetric {PIR}},
  journal      = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.},
  volume       = {106},
  number       = {3},
  pages        = {263--271},
  year         = {2023},
  url          = {https://doi.org/10.1587/transfun.2022cip0001},
  doi          = {10.1587/TRANSFUN.2022CIP0001},
  timestamp    = {Thu, 09 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieiceta/EriguchiKN23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/EriguchiIKN23,
  author       = {Reo Eriguchi and
                  Atsunori Ichikawa and
                  Noboru Kunihiro and
                  Koji Nuida},
  title        = {Efficient Noise Generation Protocols for Differentially Private Multiparty
                  Computation},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {20},
  number       = {6},
  pages        = {4486--4501},
  year         = {2023},
  url          = {https://doi.org/10.1109/TDSC.2022.3227568},
  doi          = {10.1109/TDSC.2022.3227568},
  timestamp    = {Tue, 28 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tdsc/EriguchiIKN23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/TaniK23,
  author       = {Kenta Tani and
                  Noboru Kunihiro},
  editor       = {Mehdi Tibouchi and
                  Xiaofeng Wang},
  title        = {HS-Based Error Correction Algorithm for Noisy Binary {GCD} Side-Channel
                  Sequences},
  booktitle    = {Applied Cryptography and Network Security - 21st International Conference,
                  {ACNS} 2023, Kyoto, Japan, June 19-22, 2023, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {13905},
  pages        = {59--88},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-33488-7\_3},
  doi          = {10.1007/978-3-031-33488-7\_3},
  timestamp    = {Thu, 15 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acns/TaniK23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icisc/YamaguchiYTHIK23,
  author       = {Junpei Yamaguchi and
                  Masafumi Yamazaki and
                  Akihiro Tabuchi and
                  Takumi Honda and
                  Tetsuya Izu and
                  Noboru Kunihiro},
  editor       = {Hwajeong Seo and
                  Suhri Kim},
  title        = {Experiments and Resource Analysis of Shor's Factorization Using a
                  Quantum Simulator},
  booktitle    = {Information Security and Cryptology - {ICISC} 2023 - 26th International
                  Conference on Information Security and Cryptology, {ICISC} 2023, Seoul,
                  South Korea, November 29 - December 1, 2023, Revised Selected Papers,
                  Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {14561},
  pages        = {119--139},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-981-97-1235-9\_7},
  doi          = {10.1007/978-981-97-1235-9\_7},
  timestamp    = {Wed, 13 Mar 2024 19:10:54 +0100},
  biburl       = {https://dblp.org/rec/conf/icisc/YamaguchiYTHIK23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icisc/OsakiK23,
  author       = {Shunsuke Osaki and
                  Noboru Kunihiro},
  editor       = {Hwajeong Seo and
                  Suhri Kim},
  title        = {Extended Attacks on {ECDSA} with Noisy Multiple Bit Nonce Leakages},
  booktitle    = {Information Security and Cryptology - {ICISC} 2023 - 26th International
                  Conference on Information Security and Cryptology, {ICISC} 2023, Seoul,
                  South Korea, November 29 - December 1, 2023, Revised Selected Papers,
                  Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {14561},
  pages        = {163--184},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-981-97-1235-9\_9},
  doi          = {10.1007/978-981-97-1235-9\_9},
  timestamp    = {Sat, 16 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icisc/OsakiK23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/YamaguchiYTHIK23,
  author       = {Junpei Yamaguchi and
                  Masafumi Yamazaki and
                  Akihiro Tabuchi and
                  Takumi Honda and
                  Tetsuya Izu and
                  Noboru Kunihiro},
  title        = {Estimation of Shor's Circuit for 2048-bit Integers based on Quantum
                  Simulator},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {92},
  year         = {2023},
  url          = {https://eprint.iacr.org/2023/092},
  timestamp    = {Tue, 28 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/YamaguchiYTHIK23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jip/Kunihiro22,
  author       = {Noboru Kunihiro},
  title        = {Editor's Message to Special Issue of Computer Security Technologies
                  for Quantum-Safe World},
  journal      = {J. Inf. Process.},
  volume       = {30},
  pages        = {562},
  year         = {2022},
  url          = {https://doi.org/10.2197/ipsjjip.30.562},
  doi          = {10.2197/IPSJJIP.30.562},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jip/Kunihiro22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/EriguchiKN22b,
  author       = {Reo Eriguchi and
                  Noboru Kunihiro and
                  Koji Nuida},
  title        = {Multiplicative and Verifiably Multiplicative Secret Sharing for Multipartite
                  Adversary Structures},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1390},
  year         = {2022},
  url          = {https://eprint.iacr.org/2022/1390},
  timestamp    = {Sat, 22 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/EriguchiKN22b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/EriguchiIKN22,
  author       = {Reo Eriguchi and
                  Atsunori Ichikawa and
                  Noboru Kunihiro and
                  Koji Nuida},
  title        = {Efficient Noise Generation Protocols for Differentially Private Multiparty
                  Computation},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1391},
  year         = {2022},
  url          = {https://eprint.iacr.org/2022/1391},
  timestamp    = {Sat, 22 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/EriguchiIKN22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcs/ZhengKY21,
  author       = {Mengce Zheng and
                  Noboru Kunihiro and
                  Yuanzhi Yao},
  title        = {Cryptanalysis of the {RSA} variant based on cubic Pell equation},
  journal      = {Theor. Comput. Sci.},
  volume       = {889},
  pages        = {135--144},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.tcs.2021.08.001},
  doi          = {10.1016/J.TCS.2021.08.001},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tcs/ZhengKY21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/EriguchiIKN21,
  author       = {Reo Eriguchi and
                  Atsunori Ichikawa and
                  Noboru Kunihiro and
                  Koji Nuida},
  editor       = {Nikita Borisov and
                  Claudia D{\'{\i}}az},
  title        = {Efficient Noise Generation to Achieve Differential Privacy with Applications
                  to Secure Multiparty Computation},
  booktitle    = {Financial Cryptography and Data Security - 25th International Conference,
                  {FC} 2021, Virtual Event, March 1-5, 2021, Revised Selected Papers,
                  Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12674},
  pages        = {271--290},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-662-64322-8\_13},
  doi          = {10.1007/978-3-662-64322-8\_13},
  timestamp    = {Wed, 27 Oct 2021 09:25:38 +0200},
  biburl       = {https://dblp.org/rec/conf/fc/EriguchiIKN21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dam/KunihiroT20,
  author       = {Noboru Kunihiro and
                  Atsushi Takayasu},
  title        = {Worst case short lattice vector enumeration on block reduced bases
                  of arbitrary blocksizes},
  journal      = {Discret. Appl. Math.},
  volume       = {277},
  pages        = {198--220},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.dam.2019.09.017},
  doi          = {10.1016/J.DAM.2019.09.017},
  timestamp    = {Mon, 04 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dam/KunihiroT20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieiceta/ZhengKH20,
  author       = {Mengce Zheng and
                  Noboru Kunihiro and
                  Honggang Hu},
  title        = {Lattice-Based Cryptanalysis of {RSA} with Implicitly Related Keys},
  journal      = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.},
  volume       = {103-A},
  number       = {8},
  pages        = {959--968},
  year         = {2020},
  url          = {https://doi.org/10.1587/transfun.2019EAP1170},
  doi          = {10.1587/TRANSFUN.2019EAP1170},
  timestamp    = {Sat, 09 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieiceta/ZhengKH20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ipl/EriguchiK20,
  author       = {Reo Eriguchi and
                  Noboru Kunihiro},
  title        = {Strong security of linear ramp secret sharing schemes with general
                  access structures},
  journal      = {Inf. Process. Lett.},
  volume       = {164},
  pages        = {106018},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.ipl.2020.106018},
  doi          = {10.1016/J.IPL.2020.106018},
  timestamp    = {Tue, 23 Mar 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ipl/EriguchiK20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcs/YamakawaYHK20,
  author       = {Takashi Yamakawa and
                  Shota Yamada and
                  Goichiro Hanaoka and
                  Noboru Kunihiro},
  title        = {Generic hardness of inversion on ring and its relation to self-bilinear
                  map},
  journal      = {Theor. Comput. Sci.},
  volume       = {820},
  pages        = {60--84},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.tcs.2020.03.009},
  doi          = {10.1016/J.TCS.2020.03.009},
  timestamp    = {Tue, 21 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tcs/YamakawaYHK20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcs/SuzukiTK20,
  author       = {Kaichi Suzuki and
                  Atsushi Takayasu and
                  Noboru Kunihiro},
  title        = {Extended partial key exposure attacks on {RSA:} Improvement up to
                  full size decryption exponents},
  journal      = {Theor. Comput. Sci.},
  volume       = {841},
  pages        = {62--83},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.tcs.2020.07.004},
  doi          = {10.1016/J.TCS.2020.07.004},
  timestamp    = {Mon, 26 Oct 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tcs/SuzukiTK20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/OonishiK20,
  author       = {Kento Oonishi and
                  Noboru Kunihiro},
  editor       = {Joseph K. Liu and
                  Hui Cui},
  title        = {Recovering {CRT-RSA} Secret Keys from Noisy Square-and-Multiply Sequences
                  in the Sliding Window Method},
  booktitle    = {Information Security and Privacy - 25th Australasian Conference, {ACISP}
                  2020, Perth, WA, Australia, November 30 - December 2, 2020, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {12248},
  pages        = {642--652},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-55304-3\_34},
  doi          = {10.1007/978-3-030-55304-3\_34},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/OonishiK20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiajcis/YoshinoNKS20,
  author       = {Masayuki Yoshino and
                  Ken Naganuma and
                  Noboru Kunihiro and
                  Hisayoshi Sato},
  title        = {Practical Query-based Order Revealing Encryption from Symmetric Searchable
                  Encryption},
  booktitle    = {15th Asia Joint Conference on Information Security, AsiaJCIS 2020,
                  Taipei, Taiwan, August 20-21, 2020},
  pages        = {16--23},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/AsiaJCIS50894.2020.00015},
  doi          = {10.1109/ASIAJCIS50894.2020.00015},
  timestamp    = {Tue, 22 Sep 2020 10:17:08 +0200},
  biburl       = {https://dblp.org/rec/conf/asiajcis/YoshinoNKS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiajcis/NaganumaYIMOK20,
  author       = {Ken Naganuma and
                  Masayuki Yoshino and
                  Atsuo Inoue and
                  Yukinori Matsuoka and
                  Mineaki Okazaki and
                  Noboru Kunihiro},
  title        = {Post-Quantum zk-SNARK for Arithmetic Circuits using QAPs},
  booktitle    = {15th Asia Joint Conference on Information Security, AsiaJCIS 2020,
                  Taipei, Taiwan, August 20-21, 2020},
  pages        = {32--39},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/AsiaJCIS50894.2020.00017},
  doi          = {10.1109/ASIAJCIS50894.2020.00017},
  timestamp    = {Tue, 22 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/asiajcis/NaganumaYIMOK20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiajcis/NaganumaSYTKK20,
  author       = {Ken Naganuma and
                  Takayuki Suzuki and
                  Masayuki Yoshino and
                  Kenta Takahashi and
                  Yosuke Kaga and
                  Noboru Kunihiro},
  title        = {New Secret Key Management Technology for Blockchains from Biometrics
                  Fuzzy Signature},
  booktitle    = {15th Asia Joint Conference on Information Security, AsiaJCIS 2020,
                  Taipei, Taiwan, August 20-21, 2020},
  pages        = {54--58},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/AsiaJCIS50894.2020.00020},
  doi          = {10.1109/ASIAJCIS50894.2020.00020},
  timestamp    = {Tue, 22 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/asiajcis/NaganumaSYTKK20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icits/EriguchiK20,
  author       = {Reo Eriguchi and
                  Noboru Kunihiro},
  editor       = {Yael Tauman Kalai and
                  Adam D. Smith and
                  Daniel Wichs},
  title        = {d-Multiplicative Secret Sharing for Multipartite Adversary Structures},
  booktitle    = {1st Conference on Information-Theoretic Cryptography, {ITC} 2020,
                  June 17-19, 2020, Boston, MA, {USA}},
  series       = {LIPIcs},
  volume       = {163},
  pages        = {2:1--2:16},
  publisher    = {Schloss Dagstuhl - Leibniz-Zentrum f{\"{u}}r Informatik},
  year         = {2020},
  url          = {https://doi.org/10.4230/LIPIcs.ITC.2020.2},
  doi          = {10.4230/LIPICS.ITC.2020.2},
  timestamp    = {Thu, 04 Jun 2020 17:19:53 +0200},
  biburl       = {https://dblp.org/rec/conf/icits/EriguchiK20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isita/EriguchiKN20,
  author       = {Reo Eriguchi and
                  Noboru Kunihiro and
                  Koji Nuida},
  title        = {A Linear Algebraic Approach to Strongly Secure Ramp Secret Sharing
                  for General Access Structures},
  booktitle    = {International Symposium on Information Theory and Its Applications,
                  {ISITA} 2020, Kapolei, HI, USA, October 24-27, 2020},
  pages        = {427--431},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://ieeexplore.ieee.org/document/9366169},
  timestamp    = {Mon, 22 Mar 2021 15:48:59 +0100},
  biburl       = {https://dblp.org/rec/conf/isita/EriguchiKN20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/KunihiroO19,
  author       = {Noboru Kunihiro and
                  Yasutada Oohama},
  title        = {Foreword},
  journal      = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.},
  volume       = {102-A},
  number       = {12},
  pages        = {1590},
  year         = {2019},
  url          = {https://doi.org/10.1587/transfun.E102.A.1590},
  doi          = {10.1587/TRANSFUN.E102.A.1590},
  timestamp    = {Mon, 18 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieicet/KunihiroO19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcs/TakayasuK19,
  author       = {Atsushi Takayasu and
                  Noboru Kunihiro},
  title        = {Partial key exposure attacks on {RSA:} Achieving the Boneh-Durfee
                  bound},
  journal      = {Theor. Comput. Sci.},
  volume       = {761},
  pages        = {51--77},
  year         = {2019},
  url          = {https://doi.org/10.1016/j.tcs.2018.08.021},
  doi          = {10.1016/J.TCS.2018.08.021},
  timestamp    = {Mon, 15 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tcs/TakayasuK19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icisc/OonishiHK19,
  author       = {Kento Oonishi and
                  Xiaoxuan Huang and
                  Noboru Kunihiro},
  editor       = {Jae Hong Seo},
  title        = {Improved {CRT-RSA} Secret Key Recovery Method from Sliding Window
                  Leakage},
  booktitle    = {Information Security and Cryptology - {ICISC} 2019 - 22nd International
                  Conference, Seoul, South Korea, December 4-6, 2019, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {11975},
  pages        = {278--296},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-40921-0\_17},
  doi          = {10.1007/978-3-030-40921-0\_17},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icisc/OonishiHK19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isit/EriguchiKI19,
  author       = {Reo Eriguchi and
                  Noboru Kunihiro and
                  Mitsugu Iwamoto},
  title        = {Optimal Multiple Assignment Schemes Using Ideal Multipartite Secret
                  Sharing Schemes},
  booktitle    = {{IEEE} International Symposium on Information Theory, {ISIT} 2019,
                  Paris, France, July 7-12, 2019},
  pages        = {3047--3051},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/ISIT.2019.8849591},
  doi          = {10.1109/ISIT.2019.8849591},
  timestamp    = {Mon, 15 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isit/EriguchiKI19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/itw/EriguchiK19,
  author       = {Reo Eriguchi and
                  Noboru Kunihiro},
  title        = {Strongly Secure Ramp Secret Sharing Schemes from Any Linear Secret
                  Sharing Schemes},
  booktitle    = {2019 {IEEE} Information Theory Workshop, {ITW} 2019, Visby, Sweden,
                  August 25-28, 2019},
  pages        = {1--5},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/ITW44776.2019.8989107},
  doi          = {10.1109/ITW44776.2019.8989107},
  timestamp    = {Tue, 18 Feb 2020 15:54:58 +0100},
  biburl       = {https://dblp.org/rec/conf/itw/EriguchiK19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/PengLKZH18,
  author       = {Liqiang Peng and
                  Yao Lu and
                  Noboru Kunihiro and
                  Rui Zhang and
                  Lei Hu},
  editor       = {Willy Susilo and
                  Guomin Yang},
  title        = {A Deterministic Algorithm for Computing Divisors in an Interval},
  booktitle    = {Information Security and Privacy - 23rd Australasian Conference, {ACISP}
                  2018, Wollongong, NSW, Australia, July 11-13, 2018, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10946},
  pages        = {3--12},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-93638-3\_1},
  doi          = {10.1007/978-3-319-93638-3\_1},
  timestamp    = {Mon, 15 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/PengLKZH18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/africacrypt/ZhengKH18,
  author       = {Mengce Zheng and
                  Noboru Kunihiro and
                  Honggang Hu},
  editor       = {Antoine Joux and
                  Abderrahmane Nitaj and
                  Tajjeeddine Rachidi},
  title        = {Cryptanalysis of {RSA} Variants with Modified Euler Quotient},
  booktitle    = {Progress in Cryptology - {AFRICACRYPT} 2018 - 10th International Conference
                  on Cryptology in Africa, Marrakesh, Morocco, May 7-9, 2018, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10831},
  pages        = {266--281},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-89339-6\_15},
  doi          = {10.1007/978-3-319-89339-6\_15},
  timestamp    = {Mon, 15 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/africacrypt/ZhengKH18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icics/LuKZPM18,
  author       = {Yao Lu and
                  Noboru Kunihiro and
                  Rui Zhang and
                  Liqiang Peng and
                  Hui Ma},
  editor       = {David Naccache and
                  Shouhuai Xu and
                  Sihan Qing and
                  Pierangela Samarati and
                  Gregory Blanc and
                  Rongxing Lu and
                  Zonghua Zhang and
                  Ahmed Meddahi},
  title        = {Certifying Variant of {RSA} with Generalized Moduli},
  booktitle    = {Information and Communications Security - 20th International Conference,
                  {ICICS} 2018, Lille, France, October 29-31, 2018, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11149},
  pages        = {598--608},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-01950-1\_35},
  doi          = {10.1007/978-3-030-01950-1\_35},
  timestamp    = {Sat, 05 Sep 2020 18:01:07 +0200},
  biburl       = {https://dblp.org/rec/conf/icics/LuKZPM18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icisc/OonishiK18,
  author       = {Kento Oonishi and
                  Noboru Kunihiro},
  editor       = {Kwangsu Lee},
  title        = {Attacking Noisy Secret {CRT-RSA} Exponents in Binary Method},
  booktitle    = {Information Security and Cryptology - {ICISC} 2018 - 21st International
                  Conference, Seoul, South Korea, November 28-30, 2018, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {11396},
  pages        = {37--54},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-12146-4\_3},
  doi          = {10.1007/978-3-030-12146-4\_3},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icisc/OonishiK18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isita/NaganumaYSYSK18,
  author       = {Ken Naganuma and
                  Masayuki Yoshino and
                  Hisayoshi Sato and
                  Nishio Yamada and
                  Takayuki Suzuki and
                  Noboru Kunihiro},
  title        = {Decentralized Netting Protocol over Consortium Blockchain},
  booktitle    = {International Symposium on Information Theory and Its Applications,
                  {ISITA} 2018, Singapore, October 28-31, 2018},
  pages        = {174--177},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.23919/ISITA.2018.8664259},
  doi          = {10.23919/ISITA.2018.8664259},
  timestamp    = {Wed, 11 Aug 2021 11:51:25 +0200},
  biburl       = {https://dblp.org/rec/conf/isita/NaganumaYSYSK18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isita/FurukawaKT18,
  author       = {Satoshi Furukawa and
                  Noboru Kunihiro and
                  Katsuyuki Takashima},
  title        = {Multi-party Key Exchange Protocols from Supersingular Isogenies},
  booktitle    = {International Symposium on Information Theory and Its Applications,
                  {ISITA} 2018, Singapore, October 28-31, 2018},
  pages        = {208--212},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.23919/ISITA.2018.8664316},
  doi          = {10.23919/ISITA.2018.8664316},
  timestamp    = {Mon, 15 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isita/FurukawaKT18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/OnozawaKYN18,
  author       = {Sota Onozawa and
                  Noboru Kunihiro and
                  Masayuki Yoshino and
                  Ken Naganuma},
  editor       = {Atsuo Inomata and
                  Kan Yasuda},
  title        = {Inference Attacks on Encrypted Databases Based on Order Preserving
                  Assignment Problem},
  booktitle    = {Advances in Information and Computer Security - 13th International
                  Workshop on Security, {IWSEC} 2018, Sendai, Japan, September 3-5,
                  2018, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11049},
  pages        = {35--47},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-97916-8\_3},
  doi          = {10.1007/978-3-319-97916-8\_3},
  timestamp    = {Mon, 15 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwsec/OnozawaKYN18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/KunihiroLNS18,
  author       = {Noboru Kunihiro and
                  Wenjie Lu and
                  Takashi Nishide and
                  Jun Sakuma},
  title        = {Outsourced Private Function Evaluation with Privacy Policy Enforcement},
  booktitle    = {17th {IEEE} International Conference On Trust, Security And Privacy
                  In Computing And Communications / 12th {IEEE} International Conference
                  On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New
                  York, NY, USA, August 1-3, 2018},
  pages        = {412--423},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00068},
  doi          = {10.1109/TRUSTCOM/BIGDATASE.2018.00068},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/KunihiroLNS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/YamakawaYHK18,
  author       = {Takashi Yamakawa and
                  Shota Yamada and
                  Goichiro Hanaoka and
                  Noboru Kunihiro},
  title        = {Generic Hardness of Inversion on Ring and Its Relation to Self-Bilinear
                  Map},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {463},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/463},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/YamakawaYHK18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/TakayasuK18,
  author       = {Atsushi Takayasu and
                  Noboru Kunihiro},
  title        = {Partial Key Exposure Attacks on {RSA:} Achieving the Boneh-Durfee
                  Bound},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {516},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/516},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/TakayasuK18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/algorithmica/YamakawaYHK17,
  author       = {Takashi Yamakawa and
                  Shota Yamada and
                  Goichiro Hanaoka and
                  Noboru Kunihiro},
  title        = {Self-Bilinear Map on Unknown Order Groups from Indistinguishability
                  Obfuscation and Its Applications},
  journal      = {Algorithmica},
  volume       = {79},
  number       = {4},
  pages        = {1286--1317},
  year         = {2017},
  url          = {https://doi.org/10.1007/s00453-016-0250-8},
  doi          = {10.1007/S00453-016-0250-8},
  timestamp    = {Mon, 15 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/algorithmica/YamakawaYHK17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/TakayasuK17,
  author       = {Atsushi Takayasu and
                  Noboru Kunihiro},
  title        = {General Bounds for Small Inverse Problems and Its Applications to
                  Multi-Prime {RSA}},
  journal      = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.},
  volume       = {100-A},
  number       = {1},
  pages        = {50--61},
  year         = {2017},
  url          = {https://doi.org/10.1587/transfun.E100.A.50},
  doi          = {10.1587/TRANSFUN.E100.A.50},
  timestamp    = {Mon, 15 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieicet/TakayasuK17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/KatsumataK17,
  author       = {Shuichi Katsumata and
                  Noboru Kunihiro},
  title        = {Constructing Subspace Membership Encryption through Inner Product
                  Encryption},
  journal      = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.},
  volume       = {100-A},
  number       = {9},
  pages        = {1804--1815},
  year         = {2017},
  url          = {https://doi.org/10.1587/transfun.E100.A.1804},
  doi          = {10.1587/TRANSFUN.E100.A.1804},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieicet/KatsumataK17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/ZhengKH17,
  author       = {Mengce Zheng and
                  Noboru Kunihiro and
                  Honggang Hu},
  editor       = {Josef Pieprzyk and
                  Suriadi Suriadi},
  title        = {Improved Factoring Attacks on Multi-prime {RSA} with Small Prime Difference},
  booktitle    = {Information Security and Privacy - 22nd Australasian Conference, {ACISP}
                  2017, Auckland, New Zealand, July 3-5, 2017, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10342},
  pages        = {324--342},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-60055-0\_17},
  doi          = {10.1007/978-3-319-60055-0\_17},
  timestamp    = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/ZhengKH17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/YingK17,
  author       = {Jason H. M. Ying and
                  Noboru Kunihiro},
  editor       = {Josef Pieprzyk and
                  Suriadi Suriadi},
  title        = {Solving the {DLP} with Low Hamming Weight Product Exponents and Improved
                  Attacks on the {GPS} Identification Scheme},
  booktitle    = {Information Security and Privacy - 22nd Australasian Conference, {ACISP}
                  2017, Auckland, New Zealand, July 3-5, 2017, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10343},
  pages        = {460--467},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-59870-3\_31},
  doi          = {10.1007/978-3-319-59870-3\_31},
  timestamp    = {Mon, 15 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/YingK17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/YingK17,
  author       = {Jason H. M. Ying and
                  Noboru Kunihiro},
  editor       = {Dieter Gollmann and
                  Atsuko Miyaji and
                  Hiroaki Kikuchi},
  title        = {Bounds in Various Generalized Settings of the Discrete Logarithm Problem},
  booktitle    = {Applied Cryptography and Network Security - 15th International Conference,
                  {ACNS} 2017, Kanazawa, Japan, July 10-12, 2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10355},
  pages        = {498--517},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-61204-1\_25},
  doi          = {10.1007/978-3-319-61204-1\_25},
  timestamp    = {Tue, 07 May 2024 20:12:06 +0200},
  biburl       = {https://dblp.org/rec/conf/acns/YingK17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/Emura0KS17,
  author       = {Keita Emura and
                  Takuya Hayashi and
                  Noboru Kunihiro and
                  Jun Sakuma},
  editor       = {Ramesh Karri and
                  Ozgur Sinanoglu and
                  Ahmad{-}Reza Sadeghi and
                  Xun Yi},
  title        = {Mis-operation Resistant Searchable Homomorphic Encryption},
  booktitle    = {Proceedings of the 2017 {ACM} on Asia Conference on Computer and Communications
                  Security, AsiaCCS 2017, Abu Dhabi, United Arab Emirates, April 2-6,
                  2017},
  pages        = {215--229},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3052973.3053015},
  doi          = {10.1145/3052973.3053015},
  timestamp    = {Sun, 12 Nov 2023 02:11:41 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/Emura0KS17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ctrsa/TakayasuK17,
  author       = {Atsushi Takayasu and
                  Noboru Kunihiro},
  editor       = {Helena Handschuh},
  title        = {A Tool Kit for Partial Key Exposure Attacks on {RSA}},
  booktitle    = {Topics in Cryptology - {CT-RSA} 2017 - The Cryptographers' Track at
                  the {RSA} Conference 2017, San Francisco, CA, USA, February 14-17,
                  2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10159},
  pages        = {58--73},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-52153-4\_4},
  doi          = {10.1007/978-3-319-52153-4\_4},
  timestamp    = {Mon, 15 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ctrsa/TakayasuK17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ctrsa/KunihiroT17,
  author       = {Noboru Kunihiro and
                  Yuki Takahashi},
  editor       = {Helena Handschuh},
  title        = {Improved Key Recovery Algorithms from Noisy {RSA} Secret Keys with
                  Analog Noise},
  booktitle    = {Topics in Cryptology - {CT-RSA} 2017 - The Cryptographers' Track at
                  the {RSA} Conference 2017, San Francisco, CA, USA, February 14-17,
                  2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10159},
  pages        = {328--343},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-52153-4\_19},
  doi          = {10.1007/978-3-319-52153-4\_19},
  timestamp    = {Mon, 15 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ctrsa/KunihiroT17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:books/sp/17/Kunihiro17,
  author       = {Noboru Kunihiro},
  editor       = {Tsuyoshi Takagi and
                  Masato Wakayama and
                  Keisuke Tanaka and
                  Noboru Kunihiro and
                  Kazufumi Kimoto and
                  Dung Hoang Duong},
  title        = {Mathematical Approach for Recovering Secret Key from Its Noisy Version},
  booktitle    = {Mathematical Modelling for Next-Generation Cryptography: {CREST} Crypto-Math
                  Project},
  series       = {Mathematics for Industry},
  pages        = {199--217},
  publisher    = {Springer Singapore},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-981-10-5065-7\_11},
  doi          = {10.1007/978-981-10-5065-7\_11},
  timestamp    = {Tue, 18 Jun 2019 19:22:00 +0200},
  biburl       = {https://dblp.org/rec/books/sp/17/Kunihiro17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@incollection{DBLP:books/sp/17/0002PK17,
  author       = {Yao Lu and
                  Liqiang Peng and
                  Noboru Kunihiro},
  editor       = {Tsuyoshi Takagi and
                  Masato Wakayama and
                  Keisuke Tanaka and
                  Noboru Kunihiro and
                  Kazufumi Kimoto and
                  Dung Hoang Duong},
  title        = {Recent Progress on Coppersmith's Lattice-Based Method: {A} Survey},
  booktitle    = {Mathematical Modelling for Next-Generation Cryptography: {CREST} Crypto-Math
                  Project},
  series       = {Mathematics for Industry},
  pages        = {297--312},
  publisher    = {Springer Singapore},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-981-10-5065-7\_16},
  doi          = {10.1007/978-981-10-5065-7\_16},
  timestamp    = {Tue, 18 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/books/sp/17/0002PK17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@book{DBLP:books/sp/17/TWTK2017,
  editor       = {Tsuyoshi Takagi and
                  Masato Wakayama and
                  Keisuke Tanaka and
                  Noboru Kunihiro and
                  Kazufumi Kimoto and
                  Dung Hoang Duong},
  title        = {Mathematical Modelling for Next-Generation Cryptography: {CREST} Crypto-Math
                  Project},
  series       = {Mathematics for Industry},
  publisher    = {Springer Singapore},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-981-10-5065-7},
  doi          = {10.1007/978-981-10-5065-7},
  isbn         = {978-981-10-5064-0},
  timestamp    = {Tue, 18 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/books/sp/17/TWTK2017.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/KawaiHOK16,
  author       = {Yutaka Kawai and
                  Goichiro Hanaoka and
                  Kazuo Ohta and
                  Noboru Kunihiro},
  title        = {A limitation on security evaluation of cryptographic primitives with
                  fixed keys},
  journal      = {Secur. Commun. Networks},
  volume       = {9},
  number       = {12},
  pages        = {1663--1675},
  year         = {2016},
  url          = {https://doi.org/10.1002/sec.1457},
  doi          = {10.1002/SEC.1457},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/KawaiHOK16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/UchideK16,
  author       = {Yoshinao Uchide and
                  Noboru Kunihiro},
  title        = {Searchable symmetric encryption capable of searching for an arbitrary
                  string},
  journal      = {Secur. Commun. Networks},
  volume       = {9},
  number       = {12},
  pages        = {1726--1736},
  year         = {2016},
  url          = {https://doi.org/10.1002/sec.1437},
  doi          = {10.1002/SEC.1437},
  timestamp    = {Sat, 21 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/UchideK16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/TakayasuK16,
  author       = {Atsushi Takayasu and
                  Noboru Kunihiro},
  editor       = {Joseph K. Liu and
                  Ron Steinfeld},
  title        = {Partial Key Exposure Attacks on {RSA} with Multiple Exponent Pairs},
  booktitle    = {Information Security and Privacy - 21st Australasian Conference, {ACISP}
                  2016, Melbourne, VIC, Australia, July 4-6, 2016, Proceedings, Part
                  {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9723},
  pages        = {243--257},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-40367-0\_15},
  doi          = {10.1007/978-3-319-40367-0\_15},
  timestamp    = {Mon, 15 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/TakayasuK16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/YamakawaHK16,
  author       = {Takashi Yamakawa and
                  Goichiro Hanaoka and
                  Noboru Kunihiro},
  editor       = {Joseph K. Liu and
                  Ron Steinfeld},
  title        = {Generalized Hardness Assumption for Self-bilinear Map with Auxiliary
                  Information},
  booktitle    = {Information Security and Privacy - 21st Australasian Conference, {ACISP}
                  2016, Melbourne, VIC, Australia, July 4-6, 2016, Proceedings, Part
                  {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9723},
  pages        = {269--284},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-40367-0\_17},
  doi          = {10.1007/978-3-319-40367-0\_17},
  timestamp    = {Mon, 15 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/YamakawaHK16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiajcis/VannetK16,
  author       = {Thomas Vannet and
                  Noboru Kunihiro},
  title        = {Partial Server Side Parameter Selection in Private Information Retrieval},
  booktitle    = {11th Asia Joint Conference on Information Security, AsiaJCIS 2016,
                  Fukuoka, Japan, August 4-5, 2016},
  pages        = {31--38},
  publisher    = {{IEEE} Computer Society},
  year         = {2016},
  url          = {https://doi.org/10.1109/AsiaJCIS.2016.27},
  doi          = {10.1109/ASIAJCIS.2016.27},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/asiajcis/VannetK16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cosade/AkishitaK16,
  author       = {Toru Akishita and
                  Noboru Kunihiro},
  editor       = {Fran{\c{c}}ois{-}Xavier Standaert and
                  Elisabeth Oswald},
  title        = {Improved Differential Fault Analysis on Camellia-128},
  booktitle    = {Constructive Side-Channel Analysis and Secure Design - 7th International
                  Workshop, {COSADE} 2016, Graz, Austria, April 14-15, 2016, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {9689},
  pages        = {130--143},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-43283-0\_8},
  doi          = {10.1007/978-3-319-43283-0\_8},
  timestamp    = {Mon, 15 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cosade/AkishitaK16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/Yamakawa0HK16,
  author       = {Takashi Yamakawa and
                  Shota Yamada and
                  Goichiro Hanaoka and
                  Noboru Kunihiro},
  editor       = {Matthew Robshaw and
                  Jonathan Katz},
  title        = {Adversary-Dependent Lossy Trapdoor Function from Hardness of Factoring
                  Semi-smooth {RSA} Subgroup Moduli},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2016 - 36th Annual International
                  Cryptology Conference, Santa Barbara, CA, USA, August 14-18, 2016,
                  Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9815},
  pages        = {3--32},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-662-53008-5\_1},
  doi          = {10.1007/978-3-662-53008-5\_1},
  timestamp    = {Mon, 15 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/Yamakawa0HK16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ic-nc/YingK16,
  author       = {Hwei{-}Ming Ying and
                  Noboru Kunihiro},
  title        = {Cold Boot Attack Methods for the Discrete Logarithm Problem},
  booktitle    = {Fourth International Symposium on Computing and Networking, {CANDAR}
                  2016, Hiroshima, Japan, November 22-25, 2016},
  pages        = {154--160},
  publisher    = {{IEEE} Computer Society},
  year         = {2016},
  url          = {https://doi.org/10.1109/CANDAR.2016.0037},
  doi          = {10.1109/CANDAR.2016.0037},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ic-nc/YingK16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ic-nc/YingK16a,
  author       = {Hwei{-}Ming Ying and
                  Noboru Kunihiro},
  title        = {Decryption of Frequent Password Hashes in Rainbow Tables},
  booktitle    = {Fourth International Symposium on Computing and Networking, {CANDAR}
                  2016, Hiroshima, Japan, November 22-25, 2016},
  pages        = {655--661},
  publisher    = {{IEEE} Computer Society},
  year         = {2016},
  url          = {https://doi.org/10.1109/CANDAR.2016.0117},
  doi          = {10.1109/CANDAR.2016.0117},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ic-nc/YingK16a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isita/TakayasuK16,
  author       = {Atsushi Takayasu and
                  Noboru Kunihiro},
  title        = {Small secret exponent attacks on {RSA} with unbalanced prime factors},
  booktitle    = {2016 International Symposium on Information Theory and Its Applications,
                  {ISITA} 2016, Monterey, CA, USA, October 30 - November 2, 2016},
  pages        = {236--240},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://ieeexplore.ieee.org/document/7840421/},
  timestamp    = {Wed, 11 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isita/TakayasuK16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isw/TakayasuK16,
  author       = {Atsushi Takayasu and
                  Noboru Kunihiro},
  editor       = {Matt Bishop and
                  Anderson C. A. Nascimento},
  title        = {Partial Key Exposure Attacks on {CRT-RSA:} General Improvement for
                  the Exposed Least Significant Bits},
  booktitle    = {Information Security - 19th International Conference, {ISC} 2016,
                  Honolulu, HI, USA, September 3-6, 2016, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9866},
  pages        = {35--47},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-45871-7\_3},
  doi          = {10.1007/978-3-319-45871-7\_3},
  timestamp    = {Mon, 15 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isw/TakayasuK16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/TakayasuK16,
  author       = {Atsushi Takayasu and
                  Noboru Kunihiro},
  editor       = {Chen{-}Mou Cheng and
                  Kai{-}Min Chung and
                  Giuseppe Persiano and
                  Bo{-}Yin Yang},
  title        = {How to Generalize {RSA} Cryptanalyses},
  booktitle    = {Public-Key Cryptography - {PKC} 2016 - 19th {IACR} International Conference
                  on Practice and Theory in Public-Key Cryptography, Taipei, Taiwan,
                  March 6-9, 2016, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {9615},
  pages        = {67--97},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-662-49387-8\_4},
  doi          = {10.1007/978-3-662-49387-8\_4},
  timestamp    = {Mon, 15 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/TakayasuK16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/TakayasuK16,
  author       = {Atsushi Takayasu and
                  Noboru Kunihiro},
  title        = {How to Generalize {RSA} Cryptanalyses},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {195},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/195},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/TakayasuK16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/TakayasuK16a,
  author       = {Atsushi Takayasu and
                  Noboru Kunihiro},
  title        = {General Bounds for Small Inverse Problems and Its Applications to
                  Multi-Prime {RSA}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {353},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/353},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/TakayasuK16a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Yamakawa0HK16,
  author       = {Takashi Yamakawa and
                  Shota Yamada and
                  Goichiro Hanaoka and
                  Noboru Kunihiro},
  title        = {Adversary-dependent Lossy Trapdoor Function from Hardness of Factoring
                  Semi-smooth {RSA} Subgroup Moduli},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {567},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/567},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Yamakawa0HK16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/TakayasuK16b,
  author       = {Atsushi Takayasu and
                  Noboru Kunihiro},
  title        = {A Tool Kit for Partial Key Exposure Attacks on {RSA}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1056},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/1056},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/TakayasuK16b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KunihiroT16,
  author       = {Noboru Kunihiro and
                  Yuki Takahashi},
  title        = {Improved Key Recovery Algorithms from Noisy {RSA} Secret Keys with
                  Analog Noise},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1095},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/1095},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KunihiroT16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/EndoK15,
  author       = {Kosei Endo and
                  Noboru Kunihiro},
  title        = {Security Analysis on {AUTH} Protocol and Its Variant against the Man-in-the-Middle
                  Attack},
  journal      = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.},
  volume       = {98-A},
  number       = {1},
  pages        = {153--161},
  year         = {2015},
  url          = {https://doi.org/10.1587/transfun.E98.A.153},
  doi          = {10.1587/TRANSFUN.E98.A.153},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieicet/EndoK15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/TakayasuK15,
  author       = {Atsushi Takayasu and
                  Noboru Kunihiro},
  editor       = {Tal Malkin and
                  Vladimir Kolesnikov and
                  Allison Bishop Lewko and
                  Michalis Polychronakis},
  title        = {Partial Key Exposure Attacks on {CRT-RSA:} Better Cryptanalysis to
                  Full Size Encryption Exponents},
  booktitle    = {Applied Cryptography and Network Security - 13th International Conference,
                  {ACNS} 2015, New York, NY, USA, June 2-5, 2015, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {9092},
  pages        = {518--537},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-28166-7\_25},
  doi          = {10.1007/978-3-319-28166-7\_25},
  timestamp    = {Mon, 15 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acns/TakayasuK15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icisc/TanigakiK15,
  author       = {Tomoyuki Tanigaki and
                  Noboru Kunihiro},
  editor       = {Soonhak Kwon and
                  Aaram Yun},
  title        = {Maximum Likelihood-Based Key Recovery Algorithm from Decayed Key Schedules},
  booktitle    = {Information Security and Cryptology - {ICISC} 2015 - 18th International
                  Conference, Seoul, South Korea, November 25-27, 2015, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {9558},
  pages        = {314--328},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-30840-1\_20},
  doi          = {10.1007/978-3-319-30840-1\_20},
  timestamp    = {Mon, 15 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icisc/TanigakiK15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/provsec/Kunihiro15,
  author       = {Noboru Kunihiro},
  editor       = {Man Ho Au and
                  Atsuko Miyaji},
  title        = {An Improved Attack for Recovering Noisy {RSA} Secret Keys and Its
                  Countermeasure},
  booktitle    = {Provable Security - 9th International Conference, ProvSec 2015, Kanazawa,
                  Japan, November 24-26, 2015, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9451},
  pages        = {61--81},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-26059-4\_4},
  doi          = {10.1007/978-3-319-26059-4\_4},
  timestamp    = {Mon, 15 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/provsec/Kunihiro15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sacrypt/VannetK15,
  author       = {Thomas Vannet and
                  Noboru Kunihiro},
  editor       = {Orr Dunkelman and
                  Liam Keliher},
  title        = {Private Information Retrieval with Preprocessing Based on the Approximate
                  {GCD} Problem},
  booktitle    = {Selected Areas in Cryptography - {SAC} 2015 - 22nd International Conference,
                  Sackville, NB, Canada, August 12-14, 2015, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {9566},
  pages        = {227--240},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-31301-6\_14},
  doi          = {10.1007/978-3-319-31301-6\_14},
  timestamp    = {Mon, 15 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sacrypt/VannetK15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Yamakawa0HK15,
  author       = {Takashi Yamakawa and
                  Shota Yamada and
                  Goichiro Hanaoka and
                  Noboru Kunihiro},
  title        = {Self-bilinear Map on Unknown Order Groups from Indistinguishability
                  Obfuscation and Its Applications},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {128},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/128},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Yamakawa0HK15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/TakayasuK14,
  author       = {Atsushi Takayasu and
                  Noboru Kunihiro},
  title        = {Better Lattice Constructions for Solving Multivariate Linear Equations
                  Modulo Unknown Divisors},
  journal      = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.},
  volume       = {97-A},
  number       = {6},
  pages        = {1259--1272},
  year         = {2014},
  url          = {https://doi.org/10.1587/transfun.E97.A.1259},
  doi          = {10.1587/TRANSFUN.E97.A.1259},
  timestamp    = {Mon, 15 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieicet/TakayasuK14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/KunihiroSI14,
  author       = {Noboru Kunihiro and
                  Naoyuki Shinohara and
                  Tetsuya Izu},
  title        = {Recovering {RSA} Secret Keys from Noisy Key Bits with Erasures and
                  Errors},
  journal      = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.},
  volume       = {97-A},
  number       = {6},
  pages        = {1273--1284},
  year         = {2014},
  url          = {https://doi.org/10.1587/transfun.E97.A.1273},
  doi          = {10.1587/TRANSFUN.E97.A.1273},
  timestamp    = {Mon, 15 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieicet/KunihiroSI14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/KunihiroSI14a,
  author       = {Noboru Kunihiro and
                  Naoyuki Shinohara and
                  Tetsuya Izu},
  title        = {A Unified Framework for Small Secret Exponent Attack on {RSA}},
  journal      = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.},
  volume       = {97-A},
  number       = {6},
  pages        = {1285--1295},
  year         = {2014},
  url          = {https://doi.org/10.1587/transfun.E97.A.1285},
  doi          = {10.1587/TRANSFUN.E97.A.1285},
  timestamp    = {Mon, 15 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieicet/KunihiroSI14a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/TakayasuK14,
  author       = {Atsushi Takayasu and
                  Noboru Kunihiro},
  editor       = {Willy Susilo and
                  Yi Mu},
  title        = {Cryptanalysis of {RSA} with Multiple Small Secret Exponents},
  booktitle    = {Information Security and Privacy - 19th Australasian Conference, {ACISP}
                  2014, Wollongong, NSW, Australia, July 7-9, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8544},
  pages        = {176--191},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-08344-5\_12},
  doi          = {10.1007/978-3-319-08344-5\_12},
  timestamp    = {Thu, 14 Oct 2021 10:41:30 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/TakayasuK14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ches/KunihiroH14,
  author       = {Noboru Kunihiro and
                  Junya Honda},
  editor       = {Lejla Batina and
                  Matthew Robshaw},
  title        = {{RSA} Meets {DPA:} Recovering {RSA} Secret Keys from Noisy Analog
                  Data},
  booktitle    = {Cryptographic Hardware and Embedded Systems - {CHES} 2014 - 16th International
                  Workshop, Busan, South Korea, September 23-26, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8731},
  pages        = {261--278},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-662-44709-3\_15},
  doi          = {10.1007/978-3-662-44709-3\_15},
  timestamp    = {Tue, 14 May 2019 10:00:47 +0200},
  biburl       = {https://dblp.org/rec/conf/ches/KunihiroH14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crypto/Yamakawa0HK14,
  author       = {Takashi Yamakawa and
                  Shota Yamada and
                  Goichiro Hanaoka and
                  Noboru Kunihiro},
  editor       = {Juan A. Garay and
                  Rosario Gennaro},
  title        = {Self-bilinear Map on Unknown Order Groups from Indistinguishability
                  Obfuscation and Its Applications},
  booktitle    = {Advances in Cryptology - {CRYPTO} 2014 - 34th Annual Cryptology Conference,
                  Santa Barbara, CA, USA, August 17-21, 2014, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {8617},
  pages        = {90--107},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-662-44381-1\_6},
  doi          = {10.1007/978-3-662-44381-1\_6},
  timestamp    = {Mon, 15 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/crypto/Yamakawa0HK14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icisc/TakayasuK14,
  author       = {Atsushi Takayasu and
                  Noboru Kunihiro},
  editor       = {Jooyoung Lee and
                  Jongsung Kim},
  title        = {General Bounds for Small Inverse Problems and Its Applications to
                  Multi-Prime {RSA}},
  booktitle    = {Information Security and Cryptology - {ICISC} 2014 - 17th International
                  Conference, Seoul, Korea, December 3-5, 2014, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8949},
  pages        = {3--17},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-15943-0\_1},
  doi          = {10.1007/978-3-319-15943-0\_1},
  timestamp    = {Mon, 15 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icisc/TakayasuK14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwsec/EndoK14,
  author       = {Kosei Endo and
                  Noboru Kunihiro},
  editor       = {Maki Yoshida and
                  Koichi Mouri},
  title        = {On the Security Proof of an Authentication Protocol from Eurocrypt
                  2011},
  booktitle    = {Advances in Information and Computer Security - 9th International
                  Workshop on Security, {IWSEC} 2014, Hirosaki, Japan, August 27-29,
                  2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8639},
  pages        = {187--203},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-09843-2\_15},
  doi          = {10.1007/978-3-319-09843-2\_15},
  timestamp    = {Mon, 15 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwsec/EndoK14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/YamadaAHK14,
  author       = {Shota Yamada and
                  Nuttapong Attrapadung and
                  Goichiro Hanaoka and
                  Noboru Kunihiro},
  editor       = {Hugo Krawczyk},
  title        = {A Framework and Compact Constructions for Non-monotonic Attribute-Based
                  Encryption},
  booktitle    = {Public-Key Cryptography - {PKC} 2014 - 17th International Conference
                  on Practice and Theory in Public-Key Cryptography, Buenos Aires, Argentina,
                  March 26-28, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8383},
  pages        = {275--292},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-642-54631-0\_16},
  doi          = {10.1007/978-3-642-54631-0\_16},
  timestamp    = {Mon, 15 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/YamadaAHK14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/provsec/KatsumataK14,
  author       = {Shuichi Katsumata and
                  Noboru Kunihiro},
  editor       = {Sherman S. M. Chow and
                  Joseph K. Liu and
                  Lucas Chi Kwong Hui and
                  Siu{-}Ming Yiu},
  title        = {Constructing Subspace Membership Encryption through Inner Product
                  Encryption},
  booktitle    = {Provable Security - 8th International Conference, ProvSec 2014, Hong
                  Kong, China, October 9-10, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8782},
  pages        = {223--242},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-12475-9\_16},
  doi          = {10.1007/978-3-319-12475-9\_16},
  timestamp    = {Tue, 14 May 2019 10:00:45 +0200},
  biburl       = {https://dblp.org/rec/conf/provsec/KatsumataK14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sacrypt/TakayasuK14,
  author       = {Atsushi Takayasu and
                  Noboru Kunihiro},
  editor       = {Antoine Joux and
                  Amr M. Youssef},
  title        = {Partial Key Exposure Attacks on {RSA:} Achieving the Boneh-Durfee
                  Bound},
  booktitle    = {Selected Areas in Cryptography - {SAC} 2014 - 21st International Conference,
                  Montreal, QC, Canada, August 14-15, 2014, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {8781},
  pages        = {345--362},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-13051-4\_21},
  doi          = {10.1007/978-3-319-13051-4\_21},
  timestamp    = {Mon, 15 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sacrypt/TakayasuK14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/scn/Yamakawa0NHK14,
  author       = {Takashi Yamakawa and
                  Shota Yamada and
                  Koji Nuida and
                  Goichiro Hanaoka and
                  Noboru Kunihiro},
  editor       = {Michel Abdalla and
                  Roberto De Prisco},
  title        = {Chosen Ciphertext Security on Hard Membership Decision Groups: The
                  Case of Semi-smooth Subgroups of Quadratic Residues},
  booktitle    = {Security and Cryptography for Networks - 9th International Conference,
                  {SCN} 2014, Amalfi, Italy, September 3-5, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8642},
  pages        = {558--577},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-10879-7\_32},
  doi          = {10.1007/978-3-319-10879-7\_32},
  timestamp    = {Thu, 23 Jun 2022 19:58:57 +0200},
  biburl       = {https://dblp.org/rec/conf/scn/Yamakawa0NHK14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/YamadaAHK14,
  author       = {Shota Yamada and
                  Nuttapong Attrapadung and
                  Goichiro Hanaoka and
                  Noboru Kunihiro},
  title        = {A Framework and Compact Constructions for Non-monotonic Attribute-Based
                  Encryption},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {181},
  year         = {2014},
  url          = {http://eprint.iacr.org/2014/181},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/YamadaAHK14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KunihiroH14,
  author       = {Noboru Kunihiro and
                  Junya Honda},
  title        = {{RSA} meets {DPA:} Recovering {RSA} Secret Keys from Noisy Analog
                  Data},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {513},
  year         = {2014},
  url          = {http://eprint.iacr.org/2014/513},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KunihiroH14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cma/KawaiK13,
  author       = {Yutaka Kawai and
                  Noboru Kunihiro},
  title        = {Secret handshake scheme with request-based-revealing},
  journal      = {Comput. Math. Appl.},
  volume       = {65},
  number       = {5},
  pages        = {786--798},
  year         = {2013},
  url          = {https://doi.org/10.1016/j.camwa.2012.07.007},
  doi          = {10.1016/J.CAMWA.2012.07.007},
  timestamp    = {Thu, 11 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cma/KawaiK13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/YoshinoK13,
  author       = {Masayuki Yoshino and
                  Noboru Kunihiro},
  title        = {Random Sampling Reduction with Precomputation},
  journal      = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.},
  volume       = {96-A},
  number       = {1},
  pages        = {150--157},
  year         = {2013},
  url          = {https://doi.org/10.1587/transfun.E96.A.150},
  doi          = {10.1587/TRANSFUN.E96.A.150},
  timestamp    = {Mon, 15 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieicet/YoshinoK13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/TakayasuK13,
  author       = {Atsushi Takayasu and
                  Noboru Kunihiro},
  editor       = {Colin Boyd and
                  Leonie Simpson},
  title        = {Better Lattice Constructions for Solving Multivariate Linear Equations
                  Modulo Unknown Divisors},
  booktitle    = {Information Security and Privacy - 18th Australasian Conference, {ACISP}
                  2013, Brisbane, Australia, July 1-3, 2013. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7959},
  pages        = {118--135},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-39059-3\_9},
  doi          = {10.1007/978-3-642-39059-3\_9},
  timestamp    = {Mon, 15 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/TakayasuK13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/YamakawaY0HK13,
  author       = {Takashi Yamakawa and
                  Shota Yamada and
                  Takahiro Matsuda and
                  Goichiro Hanaoka and
                  Noboru Kunihiro},
  editor       = {Kefei Chen and
                  Qi Xie and
                  Weidong Qiu and
                  Shouhuai Xu and
                  Yunlei Zhao},
  title        = {Efficient variants of the Naor-Yung and Dolev-Dwork-Naor transforms
                  for {CCA} secure key encapsulation mechanism},
  booktitle    = {Proceedings of the first {ACM} workshop on Asia public-key cryptography,
                  AsiaPKC'13, Hangzhou, China, May 8, 2013},
  pages        = {23--32},
  publisher    = {{ACM}},
  year         = {2013},
  url          = {https://doi.org/10.1145/2484389.2484395},
  doi          = {10.1145/2484389.2484395},
  timestamp    = {Tue, 10 Nov 2020 16:06:16 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/YamakawaY0HK13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isw/Yamakawa00HK13,
  author       = {Takashi Yamakawa and
                  Shota Yamada and
                  Takahiro Matsuda and
                  Goichiro Hanaoka and
                  Noboru Kunihiro},
  editor       = {Yvo Desmedt},
  title        = {Reducing Public Key Sizes in Bounded CCA-Secure KEMs with Optimal
                  Ciphertext Length},
  booktitle    = {Information Security, 16th International Conference, {ISC} 2013, Dallas,
                  Texas, USA, November 13-15, 2013, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7807},
  pages        = {100--109},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-319-27659-5\_7},
  doi          = {10.1007/978-3-319-27659-5\_7},
  timestamp    = {Mon, 15 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isw/Yamakawa00HK13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/KunihiroSI13,
  author       = {Noboru Kunihiro and
                  Naoyuki Shinohara and
                  Tetsuya Izu},
  editor       = {Kaoru Kurosawa and
                  Goichiro Hanaoka},
  title        = {Recovering {RSA} Secret Keys from Noisy Key Bits with Erasures and
                  Errors},
  booktitle    = {Public-Key Cryptography - {PKC} 2013 - 16th International Conference
                  on Practice and Theory in Public-Key Cryptography, Nara, Japan, February
                  26 - March 1, 2013. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7778},
  pages        = {180--197},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-36362-7\_12},
  doi          = {10.1007/978-3-642-36362-7\_12},
  timestamp    = {Mon, 15 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/KunihiroSI13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/KogureKY12,
  author       = {Jun Kogure and
                  Noboru Kunihiro and
                  Hirosuke Yamamoto},
  title        = {On the Hardness of Subset Sum Problem from Different Intervals},
  journal      = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.},
  volume       = {95-A},
  number       = {5},
  pages        = {903--908},
  year         = {2012},
  url          = {https://doi.org/10.1587/transfun.E95.A.903},
  doi          = {10.1587/TRANSFUN.E95.A.903},
  timestamp    = {Mon, 15 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieicet/KogureKY12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/TosuK12,
  author       = {Kaori Tosu and
                  Noboru Kunihiro},
  editor       = {Willy Susilo and
                  Yi Mu and
                  Jennifer Seberry},
  title        = {Optimal Bounds for Multi-Prime {\(\Phi\)}-Hiding Assumption},
  booktitle    = {Information Security and Privacy - 17th Australasian Conference, {ACISP}
                  2012, Wollongong, NSW, Australia, July 9-11, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7372},
  pages        = {1--14},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-31448-3\_1},
  doi          = {10.1007/978-3-642-31448-3\_1},
  timestamp    = {Mon, 15 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/TosuK12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/NagashimaK12,
  author       = {Yuji Nagashima and
                  Noboru Kunihiro},
  editor       = {Willy Susilo and
                  Yi Mu and
                  Jennifer Seberry},
  title        = {Faster Algorithm for Solving Hard Knapsacks for Moderate Message Length},
  booktitle    = {Information Security and Privacy - 17th Australasian Conference, {ACISP}
                  2012, Wollongong, NSW, Australia, July 9-11, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7372},
  pages        = {43--56},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-31448-3\_4},
  doi          = {10.1007/978-3-642-31448-3\_4},
  timestamp    = {Mon, 15 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/NagashimaK12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ctrsa/YamadaHK12,
  author       = {Shota Yamada and
                  Goichiro Hanaoka and
                  Noboru Kunihiro},
  editor       = {Orr Dunkelman},
  title        = {Two-Dimensional Representation of Cover Free Families and Its Applications:
                  Short Signatures and More},
  booktitle    = {Topics in Cryptology - {CT-RSA} 2012 - The Cryptographers' Track at
                  the {RSA} Conference 2012, San Francisco, CA, USA, February 27 - March
                  2, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7178},
  pages        = {260--277},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-27954-6\_17},
  doi          = {10.1007/978-3-642-27954-6\_17},
  timestamp    = {Mon, 15 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ctrsa/YamadaHK12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ctrsa/HanaokaKKMWZZ12,
  author       = {Goichiro Hanaoka and
                  Yutaka Kawai and
                  Noboru Kunihiro and
                  Takahiro Matsuda and
                  Jian Weng and
                  Rui Zhang and
                  Yunlei Zhao},
  editor       = {Orr Dunkelman},
  title        = {Generic Construction of Chosen Ciphertext Secure Proxy Re-Encryption},
  booktitle    = {Topics in Cryptology - {CT-RSA} 2012 - The Cryptographers' Track at
                  the {RSA} Conference 2012, San Francisco, CA, USA, February 27 - March
                  2, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7178},
  pages        = {349--364},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-27954-6\_22},
  doi          = {10.1007/978-3-642-27954-6\_22},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ctrsa/HanaokaKKMWZZ12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icisc/KoyamaSK12,
  author       = {Takuma Koyama and
                  Yu Sasaki and
                  Noboru Kunihiro},
  editor       = {Taekyoung Kwon and
                  Mun{-}Kyu Lee and
                  Daesung Kwon},
  title        = {Multi-differential Cryptanalysis on Reduced {DM-PRESENT-80:} Collisions
                  and Other Differential Properties},
  booktitle    = {Information Security and Cryptology - {ICISC} 2012 - 15th International
                  Conference, Seoul, Korea, November 28-30, 2012, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7839},
  pages        = {352--367},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-37682-5\_25},
  doi          = {10.1007/978-3-642-37682-5\_25},
  timestamp    = {Fri, 22 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icisc/KoyamaSK12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isita/YoshinoK12,
  author       = {Masayuki Yoshino and
                  Noboru Kunihiro},
  title        = {Improving {GGH} cryptosystem for large error vector},
  booktitle    = {Proceedings of the International Symposium on Information Theory and
                  its Applications, {ISITA} 2012, Honolulu, HI, USA, October 28-31,
                  2012},
  pages        = {416--420},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://ieeexplore.ieee.org/document/6400966/},
  timestamp    = {Wed, 11 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isita/YoshinoK12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isw/Kunihiro12,
  author       = {Noboru Kunihiro},
  editor       = {Dieter Gollmann and
                  Felix C. Freiling},
  title        = {On Optimal Bounds of Small Inverse Problems and Approximate {GCD}
                  Problems with Higher Degree},
  booktitle    = {Information Security - 15th International Conference, {ISC} 2012,
                  Passau, Germany, September 19-21, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7483},
  pages        = {55--69},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-33383-5\_4},
  doi          = {10.1007/978-3-642-33383-5\_4},
  timestamp    = {Mon, 15 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isw/Kunihiro12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/YamadaHK12,
  author       = {Shota Yamada and
                  Goichiro Hanaoka and
                  Noboru Kunihiro},
  editor       = {Marc Fischlin and
                  Johannes Buchmann and
                  Mark Manulis},
  title        = {Space Efficient Signature Schemes from the {RSA} Assumption},
  booktitle    = {Public Key Cryptography - {PKC} 2012 - 15th International Conference
                  on Practice and Theory in Public Key Cryptography, Darmstadt, Germany,
                  May 21-23, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7293},
  pages        = {102--119},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-30057-8\_7},
  doi          = {10.1007/978-3-642-30057-8\_7},
  timestamp    = {Mon, 16 Nov 2020 15:55:52 +0100},
  biburl       = {https://dblp.org/rec/conf/pkc/YamadaHK12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/YamadaASSHK12,
  author       = {Shota Yamada and
                  Nuttapong Attrapadung and
                  Bagus Santoso and
                  Jacob C. N. Schuldt and
                  Goichiro Hanaoka and
                  Noboru Kunihiro},
  editor       = {Marc Fischlin and
                  Johannes Buchmann and
                  Mark Manulis},
  title        = {Verifiable Predicate Encryption and Applications to {CCA} Security
                  and Anonymous Predicate Authentication},
  booktitle    = {Public Key Cryptography - {PKC} 2012 - 15th International Conference
                  on Practice and Theory in Public Key Cryptography, Darmstadt, Germany,
                  May 21-23, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7293},
  pages        = {243--261},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-30057-8\_15},
  doi          = {10.1007/978-3-642-30057-8\_15},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/pkc/YamadaASSHK12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/provsec/YoshinoKNS12,
  author       = {Masayuki Yoshino and
                  Noboru Kunihiro and
                  Ken Naganuma and
                  Hisayoshi Sato},
  editor       = {Tsuyoshi Takagi and
                  Guilin Wang and
                  Zhiguang Qin and
                  Shaoquan Jiang and
                  Yong Yu},
  title        = {Symmetric Inner-Product Predicate Encryption Based on Three Groups},
  booktitle    = {Provable Security - 6th International Conference, ProvSec 2012, Chengdu,
                  China, September 26-28, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7496},
  pages        = {215--234},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-33272-2\_14},
  doi          = {10.1007/978-3-642-33272-2\_14},
  timestamp    = {Mon, 15 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/provsec/YoshinoKNS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KunihiroSI12,
  author       = {Noboru Kunihiro and
                  Naoyuki Shinohara and
                  Tetsuya Izu},
  title        = {Recovering {RSA} Secret Keys from Noisy Key Bits with Erasures and
                  Errors},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {701},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/701},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KunihiroSI12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/ShinoharaIK11,
  author       = {Naoyuki Shinohara and
                  Tetsuya Izu and
                  Noboru Kunihiro},
  title        = {Small Secret CRT-Exponent Attacks on Takagi's {RSA}},
  journal      = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.},
  volume       = {94-A},
  number       = {1},
  pages        = {19--27},
  year         = {2011},
  url          = {https://doi.org/10.1587/transfun.E94.A.19},
  doi          = {10.1587/TRANSFUN.E94.A.19},
  timestamp    = {Mon, 15 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieicet/ShinoharaIK11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/Kunihiro11,
  author       = {Noboru Kunihiro},
  title        = {Solving Generalized Small Inverse Problems},
  journal      = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.},
  volume       = {94-A},
  number       = {6},
  pages        = {1274--1284},
  year         = {2011},
  url          = {https://doi.org/10.1587/transfun.E94.A.1274},
  doi          = {10.1587/TRANSFUN.E94.A.1274},
  timestamp    = {Mon, 15 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieicet/Kunihiro11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jisis/KawaiSK11,
  author       = {Yutaka Kawai and
                  Yusuke Sakai and
                  Noboru Kunihiro},
  title        = {On the (Im)possibility Results for Strong Attack Models for Public
                  Key Cryptsystems},
  journal      = {J. Internet Serv. Inf. Secur.},
  volume       = {1},
  number       = {2/3},
  pages        = {125--139},
  year         = {2011},
  url          = {https://doi.org/10.22667/JISIS.2011.08.31.125},
  doi          = {10.22667/JISIS.2011.08.31.125},
  timestamp    = {Thu, 23 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jisis/KawaiSK11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/aina/IzuIKO11,
  author       = {Tetsuya Izu and
                  Masami Izumi and
                  Noboru Kunihiro and
                  Kazuo Ohta},
  title        = {Yet Another Sanitizable and Deletable Signatures},
  booktitle    = {25th {IEEE} International Conference on Advanced Information Networking
                  and Applications Workshops, {WAINA} 2011, Biopolis, Singapore, March
                  22-25, 2011},
  pages        = {574--579},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/WAINA.2011.117},
  doi          = {10.1109/WAINA.2011.117},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/aina/IzuIKO11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/europki/KawaiK11,
  author       = {Yutaka Kawai and
                  Noboru Kunihiro},
  editor       = {Svetla Petkova{-}Nikova and
                  Andreas Pashalidis and
                  G{\"{u}}nther Pernul},
  title        = {Secret Handshake Scheme with Request-Based-Revealing},
  booktitle    = {Public Key Infrastructures, Services and Applications - 8th European
                  Workshop, EuroPKI 2011, Leuven, Belgium, September 15-16, 2011, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7163},
  pages        = {1--16},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-29804-2\_1},
  doi          = {10.1007/978-3-642-29804-2\_1},
  timestamp    = {Mon, 15 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/europki/KawaiK11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/YamadaAHK11,
  author       = {Shota Yamada and
                  Nuttapong Attrapadung and
                  Goichiro Hanaoka and
                  Noboru Kunihiro},
  editor       = {Dario Catalano and
                  Nelly Fazio and
                  Rosario Gennaro and
                  Antonio Nicolosi},
  title        = {Generic Constructions for Chosen-Ciphertext Secure Attribute Based
                  Encryption},
  booktitle    = {Public Key Cryptography - {PKC} 2011 - 14th International Conference
                  on Practice and Theory in Public Key Cryptography, Taormina, Italy,
                  March 6-9, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6571},
  pages        = {71--89},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-19379-8\_5},
  doi          = {10.1007/978-3-642-19379-8\_5},
  timestamp    = {Mon, 15 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/YamadaAHK11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sacrypt/KunihiroSI11,
  author       = {Noboru Kunihiro and
                  Naoyuki Shinohara and
                  Tetsuya Izu},
  editor       = {Ali Miri and
                  Serge Vaudenay},
  title        = {A Unified Framework for Small Secret Exponent Attack on {RSA}},
  booktitle    = {Selected Areas in Cryptography - 18th International Workshop, {SAC}
                  2011, Toronto, ON, Canada, August 11-12, 2011, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7118},
  pages        = {260--277},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-28496-0\_16},
  doi          = {10.1007/978-3-642-28496-0\_16},
  timestamp    = {Mon, 15 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sacrypt/KunihiroSI11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/KogureKY11,
  author       = {Jun Kogure and
                  Noboru Kunihiro and
                  Hirosuke Yamamoto},
  editor       = {Souhwan Jung and
                  Moti Yung},
  title        = {Generalized Security Analysis of the Random Key Bits Leakage Attack},
  booktitle    = {Information Security Applications - 12th International Workshop, {WISA}
                  2011, Jeju Island, Korea, August 22-24, 2011. Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {7115},
  pages        = {13--27},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-27890-7\_2},
  doi          = {10.1007/978-3-642-27890-7\_2},
  timestamp    = {Mon, 15 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/KogureKY11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KunihiroSI11,
  author       = {Noboru Kunihiro and
                  Naoyuki Shinohara and
                  Tetsuya Izu},
  title        = {A Unified Framework for Small Secret Exponent Attack on {RSA}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {591},
  year         = {2011},
  url          = {http://eprint.iacr.org/2011/591},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KunihiroSI11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/SasakiWOAK10,
  author       = {Yu Sasaki and
                  Lei Wang and
                  Kazuo Ohta and
                  Kazumaro Aoki and
                  Noboru Kunihiro},
  title        = {Practical Password Recovery Attacks on {MD4} Based Prefix and Hybrid
                  Authentication Protocols},
  journal      = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.},
  volume       = {93-A},
  number       = {1},
  pages        = {84--92},
  year         = {2010},
  url          = {https://doi.org/10.1587/transfun.E93.A.84},
  doi          = {10.1587/TRANSFUN.E93.A.84},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieicet/SasakiWOAK10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/WangOSSK10,
  author       = {Lei Wang and
                  Kazuo Ohta and
                  Yu Sasaki and
                  Kazuo Sakiyama and
                  Noboru Kunihiro},
  title        = {Cryptanalysis of Two MD5-Based Authentication Protocols: {APOP} and
                  {NMAC}},
  journal      = {{IEICE} Trans. Inf. Syst.},
  volume       = {93-D},
  number       = {5},
  pages        = {1087--1095},
  year         = {2010},
  url          = {https://doi.org/10.1587/transinf.E93.D.1087},
  doi          = {10.1587/TRANSINF.E93.D.1087},
  timestamp    = {Mon, 15 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieicet/WangOSSK10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/Kunihiro10,
  author       = {Noboru Kunihiro},
  title        = {New Conditions for Secure Knapsack Schemes against Lattice Attack},
  journal      = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.},
  volume       = {93-A},
  number       = {6},
  pages        = {1058--1065},
  year         = {2010},
  url          = {https://doi.org/10.1587/transfun.E93.A.1058},
  doi          = {10.1587/TRANSFUN.E93.A.1058},
  timestamp    = {Mon, 15 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieicet/Kunihiro10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/KawaiTKYOK10,
  author       = {Yutaka Kawai and
                  Shotaro Tanno and
                  Takahiro Kondo and
                  Kazuki Yoneyama and
                  Kazuo Ohta and
                  Noboru Kunihiro},
  title        = {Extension of Secret Handshake Protocols with Multiple Groups in Monotone
                  Condition},
  journal      = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.},
  volume       = {93-A},
  number       = {6},
  pages        = {1122--1131},
  year         = {2010},
  url          = {https://doi.org/10.1587/transfun.E93.A.1122},
  doi          = {10.1587/TRANSFUN.E93.A.1122},
  timestamp    = {Mon, 15 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieicet/KawaiTKYOK10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/YamadaKHK10,
  author       = {Shota Yamada and
                  Yutaka Kawai and
                  Goichiro Hanaoka and
                  Noboru Kunihiro},
  title        = {Public Key Encryption Schemes from the {(B)CDH} Assumption with Better
                  Efficiency},
  journal      = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.},
  volume       = {93-A},
  number       = {11},
  pages        = {1984--1993},
  year         = {2010},
  url          = {https://doi.org/10.1587/transfun.E93.A.1984},
  doi          = {10.1587/TRANSFUN.E93.A.1984},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieicet/YamadaKHK10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/qic/TakahashiTK10,
  author       = {Yasuhiro Takahashi and
                  Seiichiro Tani and
                  Noboru Kunihiro},
  title        = {Quantum addition circuits and unbounded fan-out},
  journal      = {Quantum Inf. Comput.},
  volume       = {10},
  number       = {9{\&}10},
  pages        = {872--890},
  year         = {2010},
  url          = {https://doi.org/10.26421/QIC10.9-10-12},
  doi          = {10.26421/QIC10.9-10-12},
  timestamp    = {Thu, 29 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/qic/TakahashiTK10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/Kunihiro10,
  author       = {Noboru Kunihiro},
  editor       = {Ron Steinfeld and
                  Philip Hawkes},
  title        = {Solving Generalized Small Inverse Problems},
  booktitle    = {Information Security and Privacy - 15th Australasian Conference, {ACISP}
                  2010, Sydney, Australia, July 5-7, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6168},
  pages        = {248--263},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-14081-5\_16},
  doi          = {10.1007/978-3-642-14081-5\_16},
  timestamp    = {Mon, 15 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/Kunihiro10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nbis/HirotaIKO10,
  author       = {Naoyuki Hirota and
                  Tetsuya Izu and
                  Noboru Kunihiro and
                  Kazuo Ohta},
  editor       = {Tomoya Enokido and
                  Fatos Xhafa and
                  Leonard Barolli and
                  Makoto Takizawa and
                  Minoru Uehara and
                  Arjan Durresi},
  title        = {An Evaluation of the Sieving Device {YASD} for 1024-Bit Integers},
  booktitle    = {The 13th International Conference on Network-Based Information Systems,
                  NBiS 2010, Takayama, Gifu, Japan, 14-16 September 2010},
  pages        = {546--551},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/NBiS.2010.61},
  doi          = {10.1109/NBIS.2010.61},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nbis/HirotaIKO10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/provsec/YamadaHK10,
  author       = {Shota Yamada and
                  Goichiro Hanaoka and
                  Noboru Kunihiro},
  editor       = {Swee{-}Huay Heng and
                  Kaoru Kurosawa},
  title        = {Toward an Easy-to-Understand Structure for Achieving Chosen Ciphertext
                  Security from the Decisional Diffie-Hellman Assumption},
  booktitle    = {Provable Security - 4th International Conference, ProvSec 2010, Malacca,
                  Malaysia, October 13-15, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6402},
  pages        = {229--243},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-16280-0\_16},
  doi          = {10.1007/978-3-642-16280-0\_16},
  timestamp    = {Mon, 15 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/provsec/YamadaHK10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/iwsec/2010,
  editor       = {Isao Echizen and
                  Noboru Kunihiro and
                  Ry{\^{o}}ichi Sasaki},
  title        = {Advances in Information and Computer Security - 5th International
                  Workshop on Security, {IWSEC} 2010, Kobe, Japan, November 22-24, 2010.
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6434},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-16825-3},
  doi          = {10.1007/978-3-642-16825-3},
  isbn         = {978-3-642-16824-6},
  timestamp    = {Mon, 15 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwsec/2010.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/iwsec/2010s,
  editor       = {Isao Echizen and
                  Noboru Kunihiro and
                  Ry{\^{o}}ichi Sasaki},
  title        = {Advances in Information and Computer Security - 5th International
                  Workshop on Security, {IWSEC} 2010, Kobe, Japan, November 22-24, 2010.
                  Short Paper Proceedings},
  publisher    = {Information Processing Society of Japan {(IPSJ)}},
  year         = {2010},
  isbn         = {978-4-915256-78-3},
  timestamp    = {Thu, 15 Sep 2011 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iwsec/2010s.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Kunihiro10,
  author       = {Noboru Kunihiro},
  title        = {Solving Generalized Small Inverse Problems},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {221},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/221},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Kunihiro10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/ItohKK09,
  author       = {Kouichi Itoh and
                  Noboru Kunihiro and
                  Kaoru Kurosawa},
  title        = {Small Secret Key Attack on a Takagi's Variant of {RSA}},
  journal      = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.},
  volume       = {92-A},
  number       = {1},
  pages        = {33--41},
  year         = {2009},
  url          = {https://doi.org/10.1587/transfun.E92.A.33},
  doi          = {10.1587/TRANSFUN.E92.A.33},
  timestamp    = {Mon, 15 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieicet/ItohKK09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/WangOK09,
  author       = {Lei Wang and
                  Kazuo Ohta and
                  Noboru Kunihiro},
  title        = {Near-Collision Attacks on {MD4:} Applied to MD4-Based Protocols},
  journal      = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.},
  volume       = {92-A},
  number       = {1},
  pages        = {76--86},
  year         = {2009},
  url          = {https://doi.org/10.1587/transfun.E92.A.76},
  doi          = {10.1587/TRANSFUN.E92.A.76},
  timestamp    = {Mon, 15 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieicet/WangOK09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/YajimaINSSPKO09,
  author       = {Jun Yajima and
                  Terutoshi Iwasaki and
                  Yusuke Naito and
                  Yu Sasaki and
                  Takeshi Shimoyama and
                  Thomas Peyrin and
                  Noboru Kunihiro and
                  Kazuo Ohta},
  title        = {A Strict Evaluation on the Number of Conditions for {SHA-1} Collision
                  Search},
  journal      = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.},
  volume       = {92-A},
  number       = {1},
  pages        = {87--95},
  year         = {2009},
  url          = {https://doi.org/10.1587/transfun.E92.A.87},
  doi          = {10.1587/TRANSFUN.E92.A.87},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieicet/YajimaINSSPKO09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/SasakiWOK09,
  author       = {Yu Sasaki and
                  Lei Wang and
                  Kazuo Ohta and
                  Noboru Kunihiro},
  title        = {Extended Password Recovery Attacks against APOP, SIP, and Digest Authentication},
  journal      = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.},
  volume       = {92-A},
  number       = {1},
  pages        = {96--104},
  year         = {2009},
  url          = {https://doi.org/10.1587/transfun.E92.A.96},
  doi          = {10.1587/TRANSFUN.E92.A.96},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieicet/SasakiWOK09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/IzuKOST09,
  author       = {Tetsuya Izu and
                  Noboru Kunihiro and
                  Kazuo Ohta and
                  Makoto Sano and
                  Masahiko Takenaka},
  title        = {Yet Another Sanitizable Signature from Bilinear Maps},
  booktitle    = {Proceedings of the The Forth International Conference on Availability,
                  Reliability and Security, {ARES} 2009, March 16-19, 2009, Fukuoka,
                  Japan},
  pages        = {941--946},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/ARES.2009.14},
  doi          = {10.1109/ARES.2009.14},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEares/IzuKOST09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/NaitoOK08,
  author       = {Yusuke Naito and
                  Kazuo Ohta and
                  Noboru Kunihiro},
  title        = {Improved Collision Search for Hash Functions: New Advanced Message
                  Modification},
  journal      = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.},
  volume       = {91-A},
  number       = {1},
  pages        = {46--54},
  year         = {2008},
  url          = {https://doi.org/10.1093/ietfec/e91-a.1.46},
  doi          = {10.1093/IETFEC/E91-A.1.46},
  timestamp    = {Mon, 15 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieicet/NaitoOK08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/SasakiWKO08,
  author       = {Yu Sasaki and
                  Lei Wang and
                  Noboru Kunihiro and
                  Kazuo Ohta},
  title        = {New Message Differences for Collision Attacks on {MD4} and {MD5}},
  journal      = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.},
  volume       = {91-A},
  number       = {1},
  pages        = {55--63},
  year         = {2008},
  url          = {https://doi.org/10.1093/ietfec/e91-a.1.55},
  doi          = {10.1093/IETFEC/E91-A.1.55},
  timestamp    = {Mon, 15 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieicet/SasakiWKO08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/SantosoKKO08,
  author       = {Bagus Santoso and
                  Noboru Kunihiro and
                  Naoki Kanayama and
                  Kazuo Ohta},
  title        = {Factorization of Square-Free Integers with High Bits Known},
  journal      = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.},
  volume       = {91-A},
  number       = {1},
  pages        = {306--315},
  year         = {2008},
  url          = {https://doi.org/10.1093/ietfec/e91-a.1.306},
  doi          = {10.1093/IETFEC/E91-A.1.306},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieicet/SantosoKKO08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/KunihiroK08,
  author       = {Noboru Kunihiro and
                  Kaoru Kurosawa},
  title        = {Deterministic Polynomial Time Equivalence between Factoring and Key-Recovery
                  Attack on Takagi's {RSA}},
  journal      = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.},
  volume       = {91-A},
  number       = {9},
  pages        = {2356--2364},
  year         = {2008},
  url          = {https://doi.org/10.1093/ietfec/e91-a.9.2356},
  doi          = {10.1093/IETFEC/E91-A.9.2356},
  timestamp    = {Mon, 15 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieicet/KunihiroK08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/qic/TakahashiK08,
  author       = {Yasuhiro Takahashi and
                  Noboru Kunihiro},
  title        = {A fast quantum circuit for addition with few qubits},
  journal      = {Quantum Inf. Comput.},
  volume       = {8},
  number       = {6},
  pages        = {636--649},
  year         = {2008},
  url          = {https://doi.org/10.26421/QIC8.6-7-5},
  doi          = {10.26421/QIC8.6-7-5},
  timestamp    = {Thu, 29 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/qic/TakahashiK08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/africacrypt/Kunihiro08,
  author       = {Noboru Kunihiro},
  editor       = {Serge Vaudenay},
  title        = {New Definition of Density on Knapsack Cryptosystems},
  booktitle    = {Progress in Cryptology - {AFRICACRYPT} 2008, First International Conference
                  on Cryptology in Africa, Casablanca, Morocco, June 11-14, 2008. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5023},
  pages        = {156--173},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-68164-9\_11},
  doi          = {10.1007/978-3-540-68164-9\_11},
  timestamp    = {Mon, 15 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/africacrypt/Kunihiro08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/africacrypt/SasakiWOK08,
  author       = {Yu Sasaki and
                  Lei Wang and
                  Kazuo Ohta and
                  Noboru Kunihiro},
  editor       = {Serge Vaudenay},
  title        = {Password Recovery on Challenge and Response: Impossible Differential
                  Attack on Hash Function},
  booktitle    = {Progress in Cryptology - {AFRICACRYPT} 2008, First International Conference
                  on Cryptology in Africa, Casablanca, Morocco, June 11-14, 2008. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5023},
  pages        = {290--307},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-68164-9\_20},
  doi          = {10.1007/978-3-540-68164-9\_20},
  timestamp    = {Mon, 15 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/africacrypt/SasakiWOK08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/YajimaINSSKO08,
  author       = {Jun Yajima and
                  Terutoshi Iwasaki and
                  Yusuke Naito and
                  Yu Sasaki and
                  Takeshi Shimoyama and
                  Noboru Kunihiro and
                  Kazuo Ohta},
  editor       = {Masayuki Abe and
                  Virgil D. Gligor},
  title        = {A strict evaluation method on the number of conditions for the {SHA-1}
                  collision search},
  booktitle    = {Proceedings of the 2008 {ACM} Symposium on Information, Computer and
                  Communications Security, {ASIACCS} 2008, Tokyo, Japan, March 18-20,
                  2008},
  pages        = {10--20},
  publisher    = {{ACM}},
  year         = {2008},
  url          = {https://doi.org/10.1145/1368310.1368316},
  doi          = {10.1145/1368310.1368316},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/YajimaINSSKO08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ctrsa/SasakiWOK08,
  author       = {Yu Sasaki and
                  Lei Wang and
                  Kazuo Ohta and
                  Noboru Kunihiro},
  editor       = {Tal Malkin},
  title        = {Security of {MD5} Challenge and Response: Extension of {APOP} Password
                  Recovery Attack},
  booktitle    = {Topics in Cryptology - {CT-RSA} 2008, The Cryptographers' Track at
                  the {RSA} Conference 2008, San Francisco, CA, USA, April 8-11, 2008.
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4964},
  pages        = {1--18},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-79263-5\_1},
  doi          = {10.1007/978-3-540-79263-5\_1},
  timestamp    = {Mon, 15 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ctrsa/SasakiWOK08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ctrsa/ItohKK08,
  author       = {Kouichi Itoh and
                  Noboru Kunihiro and
                  Kaoru Kurosawa},
  editor       = {Tal Malkin},
  title        = {Small Secret Key Attack on a Variant of {RSA} (Due to Takagi)},
  booktitle    = {Topics in Cryptology - {CT-RSA} 2008, The Cryptographers' Track at
                  the {RSA} Conference 2008, San Francisco, CA, USA, April 8-11, 2008.
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4964},
  pages        = {387--406},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-79263-5\_25},
  doi          = {10.1007/978-3-540-79263-5\_25},
  timestamp    = {Mon, 15 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ctrsa/ItohKK08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/WangOK08,
  author       = {Lei Wang and
                  Kazuo Ohta and
                  Noboru Kunihiro},
  editor       = {Nigel P. Smart},
  title        = {New Key-Recovery Attacks on {HMAC/NMAC-MD4} and {NMAC-MD5}},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2008, 27th Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Istanbul, Turkey, April 13-17, 2008. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4965},
  pages        = {237--253},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-78967-3\_14},
  doi          = {10.1007/978-3-540-78967-3\_14},
  timestamp    = {Mon, 15 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/WangOK08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/IzuKOST08,
  author       = {Tetsuya Izu and
                  Noboru Kunihiro and
                  Kazuo Ohta and
                  Makoto Sano and
                  Masahiko Takenaka},
  editor       = {Kyo{-}Il Chung and
                  Kiwook Sohn and
                  Moti Yung},
  title        = {Sanitizable and Deletable Signature},
  booktitle    = {Information Security Applications, 9th International Workshop, {WISA}
                  2008, Jeju Island, Korea, September 23-25, 2008, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {5379},
  pages        = {130--144},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-642-00306-6\_10},
  doi          = {10.1007/978-3-642-00306-6\_10},
  timestamp    = {Mon, 15 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/IzuKOST08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/KawaiTKYKO08,
  author       = {Yutaka Kawai and
                  Shotaro Tanno and
                  Takahiro Kondo and
                  Kazuki Yoneyama and
                  Noboru Kunihiro and
                  Kazuo Ohta},
  editor       = {Kyo{-}Il Chung and
                  Kiwook Sohn and
                  Moti Yung},
  title        = {Extension of Secret Handshake Protocols with Multiple Groups in Monotone
                  Condition},
  booktitle    = {Information Security Applications, 9th International Workshop, {WISA}
                  2008, Jeju Island, Korea, September 23-25, 2008, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {5379},
  pages        = {160--173},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-642-00306-6\_12},
  doi          = {10.1007/978-3-642-00306-6\_12},
  timestamp    = {Mon, 15 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/KawaiTKYKO08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/SasakiNKO07,
  author       = {Yu Sasaki and
                  Yusuke Naito and
                  Noboru Kunihiro and
                  Kazuo Ohta},
  title        = {Improved Collision Attacks on {MD4} and {MD5}},
  journal      = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.},
  volume       = {90-A},
  number       = {1},
  pages        = {36--47},
  year         = {2007},
  url          = {https://doi.org/10.1093/ietfec/e90-a.1.36},
  doi          = {10.1093/IETFEC/E90-A.1.36},
  timestamp    = {Mon, 15 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieicet/SasakiNKO07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/HanataniKOK07,
  author       = {Yoshikazu Hanatani and
                  Yuichi Komano and
                  Kazuo Ohta and
                  Noboru Kunihiro},
  title        = {Provably Secure Untraceable Electronic Cash against Insider Attacks},
  journal      = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.},
  volume       = {90-A},
  number       = {5},
  pages        = {980--991},
  year         = {2007},
  url          = {https://doi.org/10.1093/ietfec/e90-a.5.980},
  doi          = {10.1093/IETFEC/E90-A.5.980},
  timestamp    = {Mon, 15 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieicet/HanataniKOK07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/qic/TakahashiKO07,
  author       = {Yasuhiro Takahashi and
                  Noboru Kunihiro and
                  Kazuo Ohta},
  title        = {The quantum fourier transform on a linear nearest neighbor architecture},
  journal      = {Quantum Inf. Comput.},
  volume       = {7},
  number       = {4},
  pages        = {383--391},
  year         = {2007},
  url          = {https://doi.org/10.26421/QIC7.4-7},
  doi          = {10.26421/QIC7.4-7},
  timestamp    = {Thu, 29 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/qic/TakahashiKO07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acisp/YajimaSNISKO07,
  author       = {Jun Yajima and
                  Yu Sasaki and
                  Yusuke Naito and
                  Terutoshi Iwasaki and
                  Takeshi Shimoyama and
                  Noboru Kunihiro and
                  Kazuo Ohta},
  editor       = {Josef Pieprzyk and
                  Hossein Ghodosi and
                  Ed Dawson},
  title        = {A New Strategy for Finding a Differential Path of {SHA-1}},
  booktitle    = {Information Security and Privacy, 12th Australasian Conference, {ACISP}
                  2007, Townsville, Australia, July 2-4, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4586},
  pages        = {45--58},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-73458-1\_4},
  doi          = {10.1007/978-3-540-73458-1\_4},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acisp/YajimaSNISKO07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fse/SasakiWOK07,
  author       = {Yu Sasaki and
                  Lei Wang and
                  Kazuo Ohta and
                  Noboru Kunihiro},
  editor       = {Alex Biryukov},
  title        = {New Message Difference for {MD4}},
  booktitle    = {Fast Software Encryption, 14th International Workshop, {FSE} 2007,
                  Luxembourg, Luxembourg, March 26-28, 2007, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {4593},
  pages        = {329--348},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-74619-5\_21},
  doi          = {10.1007/978-3-540-74619-5\_21},
  timestamp    = {Sun, 25 Oct 2020 23:06:50 +0100},
  biburl       = {https://dblp.org/rec/conf/fse/SasakiWOK07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ispec/IzuKOTY07,
  author       = {Tetsuya Izu and
                  Noboru Kunihiro and
                  Kazuo Ohta and
                  Masahiko Takenaka and
                  Takashi Yoshioka},
  editor       = {Ed Dawson and
                  Duncan S. Wong},
  title        = {A Sanitizable Signature Scheme with Aggregation},
  booktitle    = {Information Security Practice and Experience, Third International
                  Conference, {ISPEC} 2007, Hong Kong, China, May 7-9, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4464},
  pages        = {51--64},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-72163-5\_6},
  doi          = {10.1007/978-3-540-72163-5\_6},
  timestamp    = {Tue, 14 May 2019 10:00:40 +0200},
  biburl       = {https://dblp.org/rec/conf/ispec/IzuKOTY07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/KunihiroK07,
  author       = {Noboru Kunihiro and
                  Kaoru Kurosawa},
  editor       = {Tatsuaki Okamoto and
                  Xiaoyun Wang},
  title        = {Deterministic Polynomial Time Equivalence Between Factoring and Key-Recovery
                  Attack on Takagi's {RSA}},
  booktitle    = {Public Key Cryptography - {PKC} 2007, 10th International Conference
                  on Practice and Theory in Public-Key Cryptography, Beijing, China,
                  April 16-20, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4450},
  pages        = {412--425},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-71677-8\_27},
  doi          = {10.1007/978-3-540-71677-8\_27},
  timestamp    = {Fri, 01 May 2020 18:32:25 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/KunihiroK07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/IwamotoWYKO06,
  author       = {Mitsugu Iwamoto and
                  Lei Wang and
                  Kazuki Yoneyama and
                  Noboru Kunihiro and
                  Kazuo Ohta},
  title        = {Visual Secret Sharing Schemes for Multiple Secret Images Allowing
                  the Rotation of Shares},
  journal      = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.},
  volume       = {89-A},
  number       = {5},
  pages        = {1382--1395},
  year         = {2006},
  url          = {https://doi.org/10.1093/ietfec/e89-a.5.1382},
  doi          = {10.1093/IETFEC/E89-A.5.1382},
  timestamp    = {Mon, 15 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieicet/IwamotoWYKO06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/KunihiroAO06,
  author       = {Noboru Kunihiro and
                  Wataru Abe and
                  Kazuo Ohta},
  title        = {Maurer-Yacobi ID-Based Key Distribution Revisited},
  journal      = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.},
  volume       = {89-A},
  number       = {5},
  pages        = {1421--1424},
  year         = {2006},
  url          = {https://doi.org/10.1093/ietfec/e89-a.5.1421},
  doi          = {10.1093/IETFEC/E89-A.5.1421},
  timestamp    = {Mon, 15 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieicet/KunihiroAO06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/qic/TakahashiK06,
  author       = {Yasuhiro Takahashi and
                  Noboru Kunihiro},
  title        = {A quantum circuit for shor's factoring algorithm using 2n + 2 qubits},
  journal      = {Quantum Inf. Comput.},
  volume       = {6},
  number       = {2},
  pages        = {184--192},
  year         = {2006},
  url          = {https://doi.org/10.26421/QIC6.2-4},
  doi          = {10.26421/QIC6.2-4},
  timestamp    = {Fri, 30 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/qic/TakahashiK06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/NaitoSSYKO06,
  author       = {Yusuke Naito and
                  Yu Sasaki and
                  Takeshi Shimoyama and
                  Jun Yajima and
                  Noboru Kunihiro and
                  Kazuo Ohta},
  editor       = {Xuejia Lai and
                  Kefei Chen},
  title        = {Improved Collision Search for {SHA-0}},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2006, 12th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Shanghai, China, December 3-7, 2006, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4284},
  pages        = {21--36},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11935230\_2},
  doi          = {10.1007/11935230\_2},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/NaitoSSYKO06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/MamboSOK06,
  author       = {Masahiro Mambo and
                  Mois{\'{e}}s Salinas{-}Rosales and
                  Kazuo Ohta and
                  Noboru Kunihiro},
  editor       = {Ferng{-}Ching Lin and
                  Der{-}Tsai Lee and
                  Bao{-}Shuh Paul Lin and
                  Shiuhpyng Shieh and
                  Sushil Jajodia},
  title        = {Problems on the {MR} micropayment schemes},
  booktitle    = {Proceedings of the 2006 {ACM} Symposium on Information, Computer and
                  Communications Security, {ASIACCS} 2006, Taipei, Taiwan, March 21-24,
                  2006},
  pages        = {363},
  publisher    = {{ACM}},
  year         = {2006},
  url          = {https://doi.org/10.1145/1128817.1128879},
  doi          = {10.1145/1128817.1128879},
  timestamp    = {Thu, 20 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/MamboSOK06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fc/HanataniKOK06,
  author       = {Yoshikazu Hanatani and
                  Yuichi Komano and
                  Kazuo Ohta and
                  Noboru Kunihiro},
  editor       = {Giovanni Di Crescenzo and
                  Aviel D. Rubin},
  title        = {Provably Secure Electronic Cash Based on Blind Multisignature Schemes},
  booktitle    = {Financial Cryptography and Data Security, 10th International Conference,
                  {FC} 2006, Anguilla, British West Indies, February 27-March 2, 2006,
                  Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {4107},
  pages        = {236--250},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11889663\_20},
  doi          = {10.1007/11889663\_20},
  timestamp    = {Tue, 14 May 2019 10:00:38 +0200},
  biburl       = {https://dblp.org/rec/conf/fc/HanataniKOK06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/vietcrypt/SantosoKKO06,
  author       = {Bagus Santoso and
                  Noboru Kunihiro and
                  Naoki Kanayama and
                  Kazuo Ohta},
  editor       = {Phong Q. Nguyen},
  title        = {Factorization of Square-Free Integers with High Bits Known},
  booktitle    = {Progressin Cryptology - {VIETCRYPT} 2006, First International Conference
                  on Cryptology in Vietnam, Hanoi, Vietnam, September 25-28, 2006, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {4341},
  pages        = {115--130},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11958239\_8},
  doi          = {10.1007/11958239\_8},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/vietcrypt/SantosoKKO06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/vietcrypt/SasakiNYSKO06,
  author       = {Yu Sasaki and
                  Yusuke Naito and
                  Jun Yajima and
                  Takeshi Shimoyama and
                  Noboru Kunihiro and
                  Kazuo Ohta},
  editor       = {Phong Q. Nguyen},
  title        = {How to Construct Sufficient Conditions for Hash Functions},
  booktitle    = {Progressin Cryptology - {VIETCRYPT} 2006, First International Conference
                  on Cryptology in Vietnam, Hanoi, Vietnam, September 25-28, 2006, Revised
                  Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {4341},
  pages        = {243--259},
  publisher    = {Springer},
  year         = {2006},
  url          = {https://doi.org/10.1007/11958239\_16},
  doi          = {10.1007/11958239\_16},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/vietcrypt/SasakiNYSKO06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/NaitoSSYKO06,
  author       = {Yusuke Naito and
                  Yu Sasaki and
                  Takeshi Shimoyama and
                  Jun Yajima and
                  Noboru Kunihiro and
                  Kazuo Ohta},
  title        = {Message Modification for Step 21-23 on {SHA-0}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {16},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/016},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/NaitoSSYKO06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/SasakiNYSKO06,
  author       = {Yu Sasaki and
                  Yusuke Naito and
                  Jun Yajima and
                  Takeshi Shimoyama and
                  Noboru Kunihiro and
                  Kazuo Ohta},
  title        = {How to Construct Sufficient Condition in Searching Collisions of {MD5}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {74},
  year         = {2006},
  url          = {http://eprint.iacr.org/2006/074},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/SasakiNYSKO06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/Kunihiro05,
  author       = {Noboru Kunihiro},
  title        = {Exact Analyses of Computational Time for Factoring in Quantum Computers},
  journal      = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.},
  volume       = {88-A},
  number       = {1},
  pages        = {105--111},
  year         = {2005},
  url          = {http://search.ieice.org/bin/summary.php?id=e88-a\_1\_105\&\#38;category=D\&\#38;year=2005\&\#38;lang=E\&\#38;abst=},
  timestamp    = {Sat, 11 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieicet/Kunihiro05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/qic/TakahashiK05,
  author       = {Yasuhiro Takahashi and
                  Noboru Kunihiro},
  title        = {A linear-size quantum circuit for addition with no ancillary qubits},
  journal      = {Quantum Inf. Comput.},
  volume       = {5},
  number       = {6},
  pages        = {440--448},
  year         = {2005},
  url          = {https://doi.org/10.26421/QIC5.6-2},
  doi          = {10.26421/QIC5.6-2},
  timestamp    = {Fri, 30 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/qic/TakahashiK05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icisc/NaitoSKO05,
  author       = {Yusuke Naito and
                  Yu Sasaki and
                  Noboru Kunihiro and
                  Kazuo Ohta},
  editor       = {Dongho Won and
                  Seungjoo Kim},
  title        = {Improved Collision Attack on {MD4} with Probability Almost 1},
  booktitle    = {Information Security and Cryptology - {ICISC} 2005, 8th International
                  Conference, Seoul, Korea, December 1-2, 2005, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3935},
  pages        = {129--145},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11734727\_12},
  doi          = {10.1007/11734727\_12},
  timestamp    = {Mon, 15 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icisc/NaitoSKO05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wisa/IzuKOS05,
  author       = {Tetsuya Izu and
                  Noboru Kunihiro and
                  Kazuo Ohta and
                  Takeshi Shimoyama},
  editor       = {JooSeok Song and
                  Taekyoung Kwon and
                  Moti Yung},
  title        = {Analysis on the Clockwise Transposition Routing for Dedicated Factoring
                  Devices},
  booktitle    = {Information Security Applications, 6th International Workshop, {WISA}
                  2005, Jeju Island, Korea, August 22-24, 2005, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {3786},
  pages        = {232--242},
  publisher    = {Springer},
  year         = {2005},
  url          = {https://doi.org/10.1007/11604938\_18},
  doi          = {10.1007/11604938\_18},
  timestamp    = {Tue, 14 May 2019 10:00:35 +0200},
  biburl       = {https://dblp.org/rec/conf/wisa/IzuKOS05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/NaitoSKO05,
  author       = {Yusuke Naito and
                  Yu Sasaki and
                  Noboru Kunihiro and
                  Kazuo Ohta},
  title        = {Improved Collision Attack on {MD4}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {151},
  year         = {2005},
  url          = {http://eprint.iacr.org/2005/151},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/NaitoSKO05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/SasakiNKO05,
  author       = {Yu Sasaki and
                  Yusuke Naito and
                  Noboru Kunihiro and
                  Kazuo Ohta},
  title        = {Improved Collision Attack on {MD5}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {400},
  year         = {2005},
  url          = {http://eprint.iacr.org/2005/400},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/SasakiNKO05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ngc/KunihiroY03,
  author       = {Noboru Kunihiro and
                  Shigeru Yamashita},
  title        = {Efficient Algorithms for {NMR} Quantum Computers with Small Qubits},
  journal      = {New Gener. Comput.},
  volume       = {21},
  number       = {4},
  pages        = {329--337},
  year         = {2003},
  url          = {https://doi.org/10.1007/BF03037307},
  doi          = {10.1007/BF03037307},
  timestamp    = {Mon, 15 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ngc/KunihiroY03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ngc/OhtaNOK03,
  author       = {Kazuo Ohta and
                  Tetsuo Nishino and
                  Seiya Okubo and
                  Noboru Kunihiro},
  title        = {A Quantum Algorithm Using {NMR} Computers to Break Secret-Key Cryptosystems},
  journal      = {New Gener. Comput.},
  volume       = {21},
  number       = {4},
  pages        = {347--361},
  year         = {2003},
  url          = {https://doi.org/10.1007/BF03037309},
  doi          = {10.1007/BF03037309},
  timestamp    = {Mon, 15 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ngc/OhtaNOK03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/KoyamaTK99,
  author       = {Kenji Koyama and
                  Yukio Tsuruoka and
                  Noboru Kunihiro},
  editor       = {Kwok{-}Yan Lam and
                  Eiji Okamoto and
                  Chaoping Xing},
  title        = {Modulus Search for Elliptic Curve Cryptosystems},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} '99, International Conference
                  on the Theory and Applications of Cryptology and Information Security,
                  Singapore, November 14-18, 1999, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {1716},
  pages        = {1--7},
  publisher    = {Springer},
  year         = {1999},
  url          = {https://doi.org/10.1007/978-3-540-48000-6\_1},
  doi          = {10.1007/978-3-540-48000-6\_1},
  timestamp    = {Tue, 14 May 2019 10:00:40 +0200},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/KoyamaTK99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/KunihiroK98,
  author       = {Noboru Kunihiro and
                  Kenji Koyama},
  editor       = {Kaisa Nyberg},
  title        = {Equivalence of Counting the Number of Points on Elliptic Curve over
                  the Ring Z\({}_{\mbox{n}}\) and Factoring n},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} '98, International Conference
                  on the Theory and Application of Cryptographic Techniques, Espoo,
                  Finland, May 31 - June 4, 1998, Proceeding},
  series       = {Lecture Notes in Computer Science},
  volume       = {1403},
  pages        = {47--58},
  publisher    = {Springer},
  year         = {1998},
  url          = {https://doi.org/10.1007/BFb0054116},
  doi          = {10.1007/BFB0054116},
  timestamp    = {Mon, 15 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/KunihiroK98.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics