Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: Noboru Kunihiro
@article{DBLP:journals/dcc/EriguchiKN23, author = {Reo Eriguchi and Noboru Kunihiro and Koji Nuida}, title = {Multiplicative and verifiably multiplicative secret sharing for multipartite adversary structures}, journal = {Des. Codes Cryptogr.}, volume = {91}, number = {5}, pages = {1751--1778}, year = {2023}, url = {https://doi.org/10.1007/s10623-022-01177-2}, doi = {10.1007/S10623-022-01177-2}, timestamp = {Sat, 29 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/EriguchiKN23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieiceta/EriguchiKN23, author = {Reo Eriguchi and Noboru Kunihiro and Koji Nuida}, title = {Linear Algebraic Approach to Strongly Secure Ramp Secret Sharing for General Access Structures with Application to Symmetric {PIR}}, journal = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.}, volume = {106}, number = {3}, pages = {263--271}, year = {2023}, url = {https://doi.org/10.1587/transfun.2022cip0001}, doi = {10.1587/TRANSFUN.2022CIP0001}, timestamp = {Thu, 09 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieiceta/EriguchiKN23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/EriguchiIKN23, author = {Reo Eriguchi and Atsunori Ichikawa and Noboru Kunihiro and Koji Nuida}, title = {Efficient Noise Generation Protocols for Differentially Private Multiparty Computation}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {20}, number = {6}, pages = {4486--4501}, year = {2023}, url = {https://doi.org/10.1109/TDSC.2022.3227568}, doi = {10.1109/TDSC.2022.3227568}, timestamp = {Tue, 28 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tdsc/EriguchiIKN23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acns/TaniK23, author = {Kenta Tani and Noboru Kunihiro}, editor = {Mehdi Tibouchi and Xiaofeng Wang}, title = {HS-Based Error Correction Algorithm for Noisy Binary {GCD} Side-Channel Sequences}, booktitle = {Applied Cryptography and Network Security - 21st International Conference, {ACNS} 2023, Kyoto, Japan, June 19-22, 2023, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {13905}, pages = {59--88}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-33488-7\_3}, doi = {10.1007/978-3-031-33488-7\_3}, timestamp = {Thu, 15 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acns/TaniK23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icisc/YamaguchiYTHIK23, author = {Junpei Yamaguchi and Masafumi Yamazaki and Akihiro Tabuchi and Takumi Honda and Tetsuya Izu and Noboru Kunihiro}, editor = {Hwajeong Seo and Suhri Kim}, title = {Experiments and Resource Analysis of Shor's Factorization Using a Quantum Simulator}, booktitle = {Information Security and Cryptology - {ICISC} 2023 - 26th International Conference on Information Security and Cryptology, {ICISC} 2023, Seoul, South Korea, November 29 - December 1, 2023, Revised Selected Papers, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {14561}, pages = {119--139}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-981-97-1235-9\_7}, doi = {10.1007/978-981-97-1235-9\_7}, timestamp = {Wed, 13 Mar 2024 19:10:54 +0100}, biburl = {https://dblp.org/rec/conf/icisc/YamaguchiYTHIK23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icisc/OsakiK23, author = {Shunsuke Osaki and Noboru Kunihiro}, editor = {Hwajeong Seo and Suhri Kim}, title = {Extended Attacks on {ECDSA} with Noisy Multiple Bit Nonce Leakages}, booktitle = {Information Security and Cryptology - {ICISC} 2023 - 26th International Conference on Information Security and Cryptology, {ICISC} 2023, Seoul, South Korea, November 29 - December 1, 2023, Revised Selected Papers, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {14561}, pages = {163--184}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-981-97-1235-9\_9}, doi = {10.1007/978-981-97-1235-9\_9}, timestamp = {Sat, 16 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icisc/OsakiK23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/YamaguchiYTHIK23, author = {Junpei Yamaguchi and Masafumi Yamazaki and Akihiro Tabuchi and Takumi Honda and Tetsuya Izu and Noboru Kunihiro}, title = {Estimation of Shor's Circuit for 2048-bit Integers based on Quantum Simulator}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {92}, year = {2023}, url = {https://eprint.iacr.org/2023/092}, timestamp = {Tue, 28 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/YamaguchiYTHIK23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jip/Kunihiro22, author = {Noboru Kunihiro}, title = {Editor's Message to Special Issue of Computer Security Technologies for Quantum-Safe World}, journal = {J. Inf. Process.}, volume = {30}, pages = {562}, year = {2022}, url = {https://doi.org/10.2197/ipsjjip.30.562}, doi = {10.2197/IPSJJIP.30.562}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jip/Kunihiro22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/EriguchiKN22b, author = {Reo Eriguchi and Noboru Kunihiro and Koji Nuida}, title = {Multiplicative and Verifiably Multiplicative Secret Sharing for Multipartite Adversary Structures}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1390}, year = {2022}, url = {https://eprint.iacr.org/2022/1390}, timestamp = {Sat, 22 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/EriguchiKN22b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/EriguchiIKN22, author = {Reo Eriguchi and Atsunori Ichikawa and Noboru Kunihiro and Koji Nuida}, title = {Efficient Noise Generation Protocols for Differentially Private Multiparty Computation}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1391}, year = {2022}, url = {https://eprint.iacr.org/2022/1391}, timestamp = {Sat, 22 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/EriguchiIKN22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcs/ZhengKY21, author = {Mengce Zheng and Noboru Kunihiro and Yuanzhi Yao}, title = {Cryptanalysis of the {RSA} variant based on cubic Pell equation}, journal = {Theor. Comput. Sci.}, volume = {889}, pages = {135--144}, year = {2021}, url = {https://doi.org/10.1016/j.tcs.2021.08.001}, doi = {10.1016/J.TCS.2021.08.001}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tcs/ZhengKY21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/EriguchiIKN21, author = {Reo Eriguchi and Atsunori Ichikawa and Noboru Kunihiro and Koji Nuida}, editor = {Nikita Borisov and Claudia D{\'{\i}}az}, title = {Efficient Noise Generation to Achieve Differential Privacy with Applications to Secure Multiparty Computation}, booktitle = {Financial Cryptography and Data Security - 25th International Conference, {FC} 2021, Virtual Event, March 1-5, 2021, Revised Selected Papers, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {12674}, pages = {271--290}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-662-64322-8\_13}, doi = {10.1007/978-3-662-64322-8\_13}, timestamp = {Wed, 27 Oct 2021 09:25:38 +0200}, biburl = {https://dblp.org/rec/conf/fc/EriguchiIKN21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dam/KunihiroT20, author = {Noboru Kunihiro and Atsushi Takayasu}, title = {Worst case short lattice vector enumeration on block reduced bases of arbitrary blocksizes}, journal = {Discret. Appl. Math.}, volume = {277}, pages = {198--220}, year = {2020}, url = {https://doi.org/10.1016/j.dam.2019.09.017}, doi = {10.1016/J.DAM.2019.09.017}, timestamp = {Mon, 04 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dam/KunihiroT20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieiceta/ZhengKH20, author = {Mengce Zheng and Noboru Kunihiro and Honggang Hu}, title = {Lattice-Based Cryptanalysis of {RSA} with Implicitly Related Keys}, journal = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.}, volume = {103-A}, number = {8}, pages = {959--968}, year = {2020}, url = {https://doi.org/10.1587/transfun.2019EAP1170}, doi = {10.1587/TRANSFUN.2019EAP1170}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieiceta/ZhengKH20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ipl/EriguchiK20, author = {Reo Eriguchi and Noboru Kunihiro}, title = {Strong security of linear ramp secret sharing schemes with general access structures}, journal = {Inf. Process. Lett.}, volume = {164}, pages = {106018}, year = {2020}, url = {https://doi.org/10.1016/j.ipl.2020.106018}, doi = {10.1016/J.IPL.2020.106018}, timestamp = {Tue, 23 Mar 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ipl/EriguchiK20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcs/YamakawaYHK20, author = {Takashi Yamakawa and Shota Yamada and Goichiro Hanaoka and Noboru Kunihiro}, title = {Generic hardness of inversion on ring and its relation to self-bilinear map}, journal = {Theor. Comput. Sci.}, volume = {820}, pages = {60--84}, year = {2020}, url = {https://doi.org/10.1016/j.tcs.2020.03.009}, doi = {10.1016/J.TCS.2020.03.009}, timestamp = {Tue, 21 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tcs/YamakawaYHK20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcs/SuzukiTK20, author = {Kaichi Suzuki and Atsushi Takayasu and Noboru Kunihiro}, title = {Extended partial key exposure attacks on {RSA:} Improvement up to full size decryption exponents}, journal = {Theor. Comput. Sci.}, volume = {841}, pages = {62--83}, year = {2020}, url = {https://doi.org/10.1016/j.tcs.2020.07.004}, doi = {10.1016/J.TCS.2020.07.004}, timestamp = {Mon, 26 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tcs/SuzukiTK20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/OonishiK20, author = {Kento Oonishi and Noboru Kunihiro}, editor = {Joseph K. Liu and Hui Cui}, title = {Recovering {CRT-RSA} Secret Keys from Noisy Square-and-Multiply Sequences in the Sliding Window Method}, booktitle = {Information Security and Privacy - 25th Australasian Conference, {ACISP} 2020, Perth, WA, Australia, November 30 - December 2, 2020, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {12248}, pages = {642--652}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-55304-3\_34}, doi = {10.1007/978-3-030-55304-3\_34}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/OonishiK20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiajcis/YoshinoNKS20, author = {Masayuki Yoshino and Ken Naganuma and Noboru Kunihiro and Hisayoshi Sato}, title = {Practical Query-based Order Revealing Encryption from Symmetric Searchable Encryption}, booktitle = {15th Asia Joint Conference on Information Security, AsiaJCIS 2020, Taipei, Taiwan, August 20-21, 2020}, pages = {16--23}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/AsiaJCIS50894.2020.00015}, doi = {10.1109/ASIAJCIS50894.2020.00015}, timestamp = {Tue, 22 Sep 2020 10:17:08 +0200}, biburl = {https://dblp.org/rec/conf/asiajcis/YoshinoNKS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiajcis/NaganumaYIMOK20, author = {Ken Naganuma and Masayuki Yoshino and Atsuo Inoue and Yukinori Matsuoka and Mineaki Okazaki and Noboru Kunihiro}, title = {Post-Quantum zk-SNARK for Arithmetic Circuits using QAPs}, booktitle = {15th Asia Joint Conference on Information Security, AsiaJCIS 2020, Taipei, Taiwan, August 20-21, 2020}, pages = {32--39}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/AsiaJCIS50894.2020.00017}, doi = {10.1109/ASIAJCIS50894.2020.00017}, timestamp = {Tue, 22 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/asiajcis/NaganumaYIMOK20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiajcis/NaganumaSYTKK20, author = {Ken Naganuma and Takayuki Suzuki and Masayuki Yoshino and Kenta Takahashi and Yosuke Kaga and Noboru Kunihiro}, title = {New Secret Key Management Technology for Blockchains from Biometrics Fuzzy Signature}, booktitle = {15th Asia Joint Conference on Information Security, AsiaJCIS 2020, Taipei, Taiwan, August 20-21, 2020}, pages = {54--58}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/AsiaJCIS50894.2020.00020}, doi = {10.1109/ASIAJCIS50894.2020.00020}, timestamp = {Tue, 22 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/asiajcis/NaganumaSYTKK20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icits/EriguchiK20, author = {Reo Eriguchi and Noboru Kunihiro}, editor = {Yael Tauman Kalai and Adam D. Smith and Daniel Wichs}, title = {d-Multiplicative Secret Sharing for Multipartite Adversary Structures}, booktitle = {1st Conference on Information-Theoretic Cryptography, {ITC} 2020, June 17-19, 2020, Boston, MA, {USA}}, series = {LIPIcs}, volume = {163}, pages = {2:1--2:16}, publisher = {Schloss Dagstuhl - Leibniz-Zentrum f{\"{u}}r Informatik}, year = {2020}, url = {https://doi.org/10.4230/LIPIcs.ITC.2020.2}, doi = {10.4230/LIPICS.ITC.2020.2}, timestamp = {Thu, 04 Jun 2020 17:19:53 +0200}, biburl = {https://dblp.org/rec/conf/icits/EriguchiK20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isita/EriguchiKN20, author = {Reo Eriguchi and Noboru Kunihiro and Koji Nuida}, title = {A Linear Algebraic Approach to Strongly Secure Ramp Secret Sharing for General Access Structures}, booktitle = {International Symposium on Information Theory and Its Applications, {ISITA} 2020, Kapolei, HI, USA, October 24-27, 2020}, pages = {427--431}, publisher = {{IEEE}}, year = {2020}, url = {https://ieeexplore.ieee.org/document/9366169}, timestamp = {Mon, 22 Mar 2021 15:48:59 +0100}, biburl = {https://dblp.org/rec/conf/isita/EriguchiKN20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/KunihiroO19, author = {Noboru Kunihiro and Yasutada Oohama}, title = {Foreword}, journal = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.}, volume = {102-A}, number = {12}, pages = {1590}, year = {2019}, url = {https://doi.org/10.1587/transfun.E102.A.1590}, doi = {10.1587/TRANSFUN.E102.A.1590}, timestamp = {Mon, 18 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieicet/KunihiroO19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcs/TakayasuK19, author = {Atsushi Takayasu and Noboru Kunihiro}, title = {Partial key exposure attacks on {RSA:} Achieving the Boneh-Durfee bound}, journal = {Theor. Comput. Sci.}, volume = {761}, pages = {51--77}, year = {2019}, url = {https://doi.org/10.1016/j.tcs.2018.08.021}, doi = {10.1016/J.TCS.2018.08.021}, timestamp = {Mon, 15 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tcs/TakayasuK19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icisc/OonishiHK19, author = {Kento Oonishi and Xiaoxuan Huang and Noboru Kunihiro}, editor = {Jae Hong Seo}, title = {Improved {CRT-RSA} Secret Key Recovery Method from Sliding Window Leakage}, booktitle = {Information Security and Cryptology - {ICISC} 2019 - 22nd International Conference, Seoul, South Korea, December 4-6, 2019, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {11975}, pages = {278--296}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-40921-0\_17}, doi = {10.1007/978-3-030-40921-0\_17}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icisc/OonishiHK19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isit/EriguchiKI19, author = {Reo Eriguchi and Noboru Kunihiro and Mitsugu Iwamoto}, title = {Optimal Multiple Assignment Schemes Using Ideal Multipartite Secret Sharing Schemes}, booktitle = {{IEEE} International Symposium on Information Theory, {ISIT} 2019, Paris, France, July 7-12, 2019}, pages = {3047--3051}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/ISIT.2019.8849591}, doi = {10.1109/ISIT.2019.8849591}, timestamp = {Mon, 15 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isit/EriguchiKI19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/itw/EriguchiK19, author = {Reo Eriguchi and Noboru Kunihiro}, title = {Strongly Secure Ramp Secret Sharing Schemes from Any Linear Secret Sharing Schemes}, booktitle = {2019 {IEEE} Information Theory Workshop, {ITW} 2019, Visby, Sweden, August 25-28, 2019}, pages = {1--5}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/ITW44776.2019.8989107}, doi = {10.1109/ITW44776.2019.8989107}, timestamp = {Tue, 18 Feb 2020 15:54:58 +0100}, biburl = {https://dblp.org/rec/conf/itw/EriguchiK19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/PengLKZH18, author = {Liqiang Peng and Yao Lu and Noboru Kunihiro and Rui Zhang and Lei Hu}, editor = {Willy Susilo and Guomin Yang}, title = {A Deterministic Algorithm for Computing Divisors in an Interval}, booktitle = {Information Security and Privacy - 23rd Australasian Conference, {ACISP} 2018, Wollongong, NSW, Australia, July 11-13, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10946}, pages = {3--12}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-93638-3\_1}, doi = {10.1007/978-3-319-93638-3\_1}, timestamp = {Mon, 15 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/PengLKZH18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/africacrypt/ZhengKH18, author = {Mengce Zheng and Noboru Kunihiro and Honggang Hu}, editor = {Antoine Joux and Abderrahmane Nitaj and Tajjeeddine Rachidi}, title = {Cryptanalysis of {RSA} Variants with Modified Euler Quotient}, booktitle = {Progress in Cryptology - {AFRICACRYPT} 2018 - 10th International Conference on Cryptology in Africa, Marrakesh, Morocco, May 7-9, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10831}, pages = {266--281}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-89339-6\_15}, doi = {10.1007/978-3-319-89339-6\_15}, timestamp = {Mon, 15 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/africacrypt/ZhengKH18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icics/LuKZPM18, author = {Yao Lu and Noboru Kunihiro and Rui Zhang and Liqiang Peng and Hui Ma}, editor = {David Naccache and Shouhuai Xu and Sihan Qing and Pierangela Samarati and Gregory Blanc and Rongxing Lu and Zonghua Zhang and Ahmed Meddahi}, title = {Certifying Variant of {RSA} with Generalized Moduli}, booktitle = {Information and Communications Security - 20th International Conference, {ICICS} 2018, Lille, France, October 29-31, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11149}, pages = {598--608}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-01950-1\_35}, doi = {10.1007/978-3-030-01950-1\_35}, timestamp = {Sat, 05 Sep 2020 18:01:07 +0200}, biburl = {https://dblp.org/rec/conf/icics/LuKZPM18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icisc/OonishiK18, author = {Kento Oonishi and Noboru Kunihiro}, editor = {Kwangsu Lee}, title = {Attacking Noisy Secret {CRT-RSA} Exponents in Binary Method}, booktitle = {Information Security and Cryptology - {ICISC} 2018 - 21st International Conference, Seoul, South Korea, November 28-30, 2018, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {11396}, pages = {37--54}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-12146-4\_3}, doi = {10.1007/978-3-030-12146-4\_3}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icisc/OonishiK18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isita/NaganumaYSYSK18, author = {Ken Naganuma and Masayuki Yoshino and Hisayoshi Sato and Nishio Yamada and Takayuki Suzuki and Noboru Kunihiro}, title = {Decentralized Netting Protocol over Consortium Blockchain}, booktitle = {International Symposium on Information Theory and Its Applications, {ISITA} 2018, Singapore, October 28-31, 2018}, pages = {174--177}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.23919/ISITA.2018.8664259}, doi = {10.23919/ISITA.2018.8664259}, timestamp = {Wed, 11 Aug 2021 11:51:25 +0200}, biburl = {https://dblp.org/rec/conf/isita/NaganumaYSYSK18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isita/FurukawaKT18, author = {Satoshi Furukawa and Noboru Kunihiro and Katsuyuki Takashima}, title = {Multi-party Key Exchange Protocols from Supersingular Isogenies}, booktitle = {International Symposium on Information Theory and Its Applications, {ISITA} 2018, Singapore, October 28-31, 2018}, pages = {208--212}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.23919/ISITA.2018.8664316}, doi = {10.23919/ISITA.2018.8664316}, timestamp = {Mon, 15 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isita/FurukawaKT18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/OnozawaKYN18, author = {Sota Onozawa and Noboru Kunihiro and Masayuki Yoshino and Ken Naganuma}, editor = {Atsuo Inomata and Kan Yasuda}, title = {Inference Attacks on Encrypted Databases Based on Order Preserving Assignment Problem}, booktitle = {Advances in Information and Computer Security - 13th International Workshop on Security, {IWSEC} 2018, Sendai, Japan, September 3-5, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11049}, pages = {35--47}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-97916-8\_3}, doi = {10.1007/978-3-319-97916-8\_3}, timestamp = {Mon, 15 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iwsec/OnozawaKYN18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/KunihiroLNS18, author = {Noboru Kunihiro and Wenjie Lu and Takashi Nishide and Jun Sakuma}, title = {Outsourced Private Function Evaluation with Privacy Policy Enforcement}, booktitle = {17th {IEEE} International Conference On Trust, Security And Privacy In Computing And Communications / 12th {IEEE} International Conference On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New York, NY, USA, August 1-3, 2018}, pages = {412--423}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00068}, doi = {10.1109/TRUSTCOM/BIGDATASE.2018.00068}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/KunihiroLNS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/YamakawaYHK18, author = {Takashi Yamakawa and Shota Yamada and Goichiro Hanaoka and Noboru Kunihiro}, title = {Generic Hardness of Inversion on Ring and Its Relation to Self-Bilinear Map}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {463}, year = {2018}, url = {https://eprint.iacr.org/2018/463}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/YamakawaYHK18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/TakayasuK18, author = {Atsushi Takayasu and Noboru Kunihiro}, title = {Partial Key Exposure Attacks on {RSA:} Achieving the Boneh-Durfee Bound}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {516}, year = {2018}, url = {https://eprint.iacr.org/2018/516}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/TakayasuK18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/algorithmica/YamakawaYHK17, author = {Takashi Yamakawa and Shota Yamada and Goichiro Hanaoka and Noboru Kunihiro}, title = {Self-Bilinear Map on Unknown Order Groups from Indistinguishability Obfuscation and Its Applications}, journal = {Algorithmica}, volume = {79}, number = {4}, pages = {1286--1317}, year = {2017}, url = {https://doi.org/10.1007/s00453-016-0250-8}, doi = {10.1007/S00453-016-0250-8}, timestamp = {Mon, 15 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/algorithmica/YamakawaYHK17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/TakayasuK17, author = {Atsushi Takayasu and Noboru Kunihiro}, title = {General Bounds for Small Inverse Problems and Its Applications to Multi-Prime {RSA}}, journal = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.}, volume = {100-A}, number = {1}, pages = {50--61}, year = {2017}, url = {https://doi.org/10.1587/transfun.E100.A.50}, doi = {10.1587/TRANSFUN.E100.A.50}, timestamp = {Mon, 15 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieicet/TakayasuK17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/KatsumataK17, author = {Shuichi Katsumata and Noboru Kunihiro}, title = {Constructing Subspace Membership Encryption through Inner Product Encryption}, journal = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.}, volume = {100-A}, number = {9}, pages = {1804--1815}, year = {2017}, url = {https://doi.org/10.1587/transfun.E100.A.1804}, doi = {10.1587/TRANSFUN.E100.A.1804}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieicet/KatsumataK17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/ZhengKH17, author = {Mengce Zheng and Noboru Kunihiro and Honggang Hu}, editor = {Josef Pieprzyk and Suriadi Suriadi}, title = {Improved Factoring Attacks on Multi-prime {RSA} with Small Prime Difference}, booktitle = {Information Security and Privacy - 22nd Australasian Conference, {ACISP} 2017, Auckland, New Zealand, July 3-5, 2017, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {10342}, pages = {324--342}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-60055-0\_17}, doi = {10.1007/978-3-319-60055-0\_17}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/ZhengKH17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/YingK17, author = {Jason H. M. Ying and Noboru Kunihiro}, editor = {Josef Pieprzyk and Suriadi Suriadi}, title = {Solving the {DLP} with Low Hamming Weight Product Exponents and Improved Attacks on the {GPS} Identification Scheme}, booktitle = {Information Security and Privacy - 22nd Australasian Conference, {ACISP} 2017, Auckland, New Zealand, July 3-5, 2017, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {10343}, pages = {460--467}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-59870-3\_31}, doi = {10.1007/978-3-319-59870-3\_31}, timestamp = {Mon, 15 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/YingK17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acns/YingK17, author = {Jason H. M. Ying and Noboru Kunihiro}, editor = {Dieter Gollmann and Atsuko Miyaji and Hiroaki Kikuchi}, title = {Bounds in Various Generalized Settings of the Discrete Logarithm Problem}, booktitle = {Applied Cryptography and Network Security - 15th International Conference, {ACNS} 2017, Kanazawa, Japan, July 10-12, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10355}, pages = {498--517}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-61204-1\_25}, doi = {10.1007/978-3-319-61204-1\_25}, timestamp = {Tue, 07 May 2024 20:12:06 +0200}, biburl = {https://dblp.org/rec/conf/acns/YingK17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/Emura0KS17, author = {Keita Emura and Takuya Hayashi and Noboru Kunihiro and Jun Sakuma}, editor = {Ramesh Karri and Ozgur Sinanoglu and Ahmad{-}Reza Sadeghi and Xun Yi}, title = {Mis-operation Resistant Searchable Homomorphic Encryption}, booktitle = {Proceedings of the 2017 {ACM} on Asia Conference on Computer and Communications Security, AsiaCCS 2017, Abu Dhabi, United Arab Emirates, April 2-6, 2017}, pages = {215--229}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3052973.3053015}, doi = {10.1145/3052973.3053015}, timestamp = {Sun, 12 Nov 2023 02:11:41 +0100}, biburl = {https://dblp.org/rec/conf/ccs/Emura0KS17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ctrsa/TakayasuK17, author = {Atsushi Takayasu and Noboru Kunihiro}, editor = {Helena Handschuh}, title = {A Tool Kit for Partial Key Exposure Attacks on {RSA}}, booktitle = {Topics in Cryptology - {CT-RSA} 2017 - The Cryptographers' Track at the {RSA} Conference 2017, San Francisco, CA, USA, February 14-17, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10159}, pages = {58--73}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-52153-4\_4}, doi = {10.1007/978-3-319-52153-4\_4}, timestamp = {Mon, 15 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ctrsa/TakayasuK17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ctrsa/KunihiroT17, author = {Noboru Kunihiro and Yuki Takahashi}, editor = {Helena Handschuh}, title = {Improved Key Recovery Algorithms from Noisy {RSA} Secret Keys with Analog Noise}, booktitle = {Topics in Cryptology - {CT-RSA} 2017 - The Cryptographers' Track at the {RSA} Conference 2017, San Francisco, CA, USA, February 14-17, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10159}, pages = {328--343}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-52153-4\_19}, doi = {10.1007/978-3-319-52153-4\_19}, timestamp = {Mon, 15 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ctrsa/KunihiroT17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:books/sp/17/Kunihiro17, author = {Noboru Kunihiro}, editor = {Tsuyoshi Takagi and Masato Wakayama and Keisuke Tanaka and Noboru Kunihiro and Kazufumi Kimoto and Dung Hoang Duong}, title = {Mathematical Approach for Recovering Secret Key from Its Noisy Version}, booktitle = {Mathematical Modelling for Next-Generation Cryptography: {CREST} Crypto-Math Project}, series = {Mathematics for Industry}, pages = {199--217}, publisher = {Springer Singapore}, year = {2017}, url = {https://doi.org/10.1007/978-981-10-5065-7\_11}, doi = {10.1007/978-981-10-5065-7\_11}, timestamp = {Tue, 18 Jun 2019 19:22:00 +0200}, biburl = {https://dblp.org/rec/books/sp/17/Kunihiro17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:books/sp/17/0002PK17, author = {Yao Lu and Liqiang Peng and Noboru Kunihiro}, editor = {Tsuyoshi Takagi and Masato Wakayama and Keisuke Tanaka and Noboru Kunihiro and Kazufumi Kimoto and Dung Hoang Duong}, title = {Recent Progress on Coppersmith's Lattice-Based Method: {A} Survey}, booktitle = {Mathematical Modelling for Next-Generation Cryptography: {CREST} Crypto-Math Project}, series = {Mathematics for Industry}, pages = {297--312}, publisher = {Springer Singapore}, year = {2017}, url = {https://doi.org/10.1007/978-981-10-5065-7\_16}, doi = {10.1007/978-981-10-5065-7\_16}, timestamp = {Tue, 18 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/books/sp/17/0002PK17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@book{DBLP:books/sp/17/TWTK2017, editor = {Tsuyoshi Takagi and Masato Wakayama and Keisuke Tanaka and Noboru Kunihiro and Kazufumi Kimoto and Dung Hoang Duong}, title = {Mathematical Modelling for Next-Generation Cryptography: {CREST} Crypto-Math Project}, series = {Mathematics for Industry}, publisher = {Springer Singapore}, year = {2017}, url = {https://doi.org/10.1007/978-981-10-5065-7}, doi = {10.1007/978-981-10-5065-7}, isbn = {978-981-10-5064-0}, timestamp = {Tue, 18 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/books/sp/17/TWTK2017.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/KawaiHOK16, author = {Yutaka Kawai and Goichiro Hanaoka and Kazuo Ohta and Noboru Kunihiro}, title = {A limitation on security evaluation of cryptographic primitives with fixed keys}, journal = {Secur. Commun. Networks}, volume = {9}, number = {12}, pages = {1663--1675}, year = {2016}, url = {https://doi.org/10.1002/sec.1457}, doi = {10.1002/SEC.1457}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/KawaiHOK16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/UchideK16, author = {Yoshinao Uchide and Noboru Kunihiro}, title = {Searchable symmetric encryption capable of searching for an arbitrary string}, journal = {Secur. Commun. Networks}, volume = {9}, number = {12}, pages = {1726--1736}, year = {2016}, url = {https://doi.org/10.1002/sec.1437}, doi = {10.1002/SEC.1437}, timestamp = {Sat, 21 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/UchideK16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/TakayasuK16, author = {Atsushi Takayasu and Noboru Kunihiro}, editor = {Joseph K. Liu and Ron Steinfeld}, title = {Partial Key Exposure Attacks on {RSA} with Multiple Exponent Pairs}, booktitle = {Information Security and Privacy - 21st Australasian Conference, {ACISP} 2016, Melbourne, VIC, Australia, July 4-6, 2016, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {9723}, pages = {243--257}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-40367-0\_15}, doi = {10.1007/978-3-319-40367-0\_15}, timestamp = {Mon, 15 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/TakayasuK16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/YamakawaHK16, author = {Takashi Yamakawa and Goichiro Hanaoka and Noboru Kunihiro}, editor = {Joseph K. Liu and Ron Steinfeld}, title = {Generalized Hardness Assumption for Self-bilinear Map with Auxiliary Information}, booktitle = {Information Security and Privacy - 21st Australasian Conference, {ACISP} 2016, Melbourne, VIC, Australia, July 4-6, 2016, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {9723}, pages = {269--284}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-40367-0\_17}, doi = {10.1007/978-3-319-40367-0\_17}, timestamp = {Mon, 15 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/YamakawaHK16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiajcis/VannetK16, author = {Thomas Vannet and Noboru Kunihiro}, title = {Partial Server Side Parameter Selection in Private Information Retrieval}, booktitle = {11th Asia Joint Conference on Information Security, AsiaJCIS 2016, Fukuoka, Japan, August 4-5, 2016}, pages = {31--38}, publisher = {{IEEE} Computer Society}, year = {2016}, url = {https://doi.org/10.1109/AsiaJCIS.2016.27}, doi = {10.1109/ASIAJCIS.2016.27}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/asiajcis/VannetK16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cosade/AkishitaK16, author = {Toru Akishita and Noboru Kunihiro}, editor = {Fran{\c{c}}ois{-}Xavier Standaert and Elisabeth Oswald}, title = {Improved Differential Fault Analysis on Camellia-128}, booktitle = {Constructive Side-Channel Analysis and Secure Design - 7th International Workshop, {COSADE} 2016, Graz, Austria, April 14-15, 2016, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9689}, pages = {130--143}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-43283-0\_8}, doi = {10.1007/978-3-319-43283-0\_8}, timestamp = {Mon, 15 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cosade/AkishitaK16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/Yamakawa0HK16, author = {Takashi Yamakawa and Shota Yamada and Goichiro Hanaoka and Noboru Kunihiro}, editor = {Matthew Robshaw and Jonathan Katz}, title = {Adversary-Dependent Lossy Trapdoor Function from Hardness of Factoring Semi-smooth {RSA} Subgroup Moduli}, booktitle = {Advances in Cryptology - {CRYPTO} 2016 - 36th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 14-18, 2016, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {9815}, pages = {3--32}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-53008-5\_1}, doi = {10.1007/978-3-662-53008-5\_1}, timestamp = {Mon, 15 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/Yamakawa0HK16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ic-nc/YingK16, author = {Hwei{-}Ming Ying and Noboru Kunihiro}, title = {Cold Boot Attack Methods for the Discrete Logarithm Problem}, booktitle = {Fourth International Symposium on Computing and Networking, {CANDAR} 2016, Hiroshima, Japan, November 22-25, 2016}, pages = {154--160}, publisher = {{IEEE} Computer Society}, year = {2016}, url = {https://doi.org/10.1109/CANDAR.2016.0037}, doi = {10.1109/CANDAR.2016.0037}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ic-nc/YingK16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ic-nc/YingK16a, author = {Hwei{-}Ming Ying and Noboru Kunihiro}, title = {Decryption of Frequent Password Hashes in Rainbow Tables}, booktitle = {Fourth International Symposium on Computing and Networking, {CANDAR} 2016, Hiroshima, Japan, November 22-25, 2016}, pages = {655--661}, publisher = {{IEEE} Computer Society}, year = {2016}, url = {https://doi.org/10.1109/CANDAR.2016.0117}, doi = {10.1109/CANDAR.2016.0117}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ic-nc/YingK16a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isita/TakayasuK16, author = {Atsushi Takayasu and Noboru Kunihiro}, title = {Small secret exponent attacks on {RSA} with unbalanced prime factors}, booktitle = {2016 International Symposium on Information Theory and Its Applications, {ISITA} 2016, Monterey, CA, USA, October 30 - November 2, 2016}, pages = {236--240}, publisher = {{IEEE}}, year = {2016}, url = {https://ieeexplore.ieee.org/document/7840421/}, timestamp = {Wed, 11 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isita/TakayasuK16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isw/TakayasuK16, author = {Atsushi Takayasu and Noboru Kunihiro}, editor = {Matt Bishop and Anderson C. A. Nascimento}, title = {Partial Key Exposure Attacks on {CRT-RSA:} General Improvement for the Exposed Least Significant Bits}, booktitle = {Information Security - 19th International Conference, {ISC} 2016, Honolulu, HI, USA, September 3-6, 2016, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9866}, pages = {35--47}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-45871-7\_3}, doi = {10.1007/978-3-319-45871-7\_3}, timestamp = {Mon, 15 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isw/TakayasuK16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/TakayasuK16, author = {Atsushi Takayasu and Noboru Kunihiro}, editor = {Chen{-}Mou Cheng and Kai{-}Min Chung and Giuseppe Persiano and Bo{-}Yin Yang}, title = {How to Generalize {RSA} Cryptanalyses}, booktitle = {Public-Key Cryptography - {PKC} 2016 - 19th {IACR} International Conference on Practice and Theory in Public-Key Cryptography, Taipei, Taiwan, March 6-9, 2016, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {9615}, pages = {67--97}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-49387-8\_4}, doi = {10.1007/978-3-662-49387-8\_4}, timestamp = {Mon, 15 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/TakayasuK16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/TakayasuK16, author = {Atsushi Takayasu and Noboru Kunihiro}, title = {How to Generalize {RSA} Cryptanalyses}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {195}, year = {2016}, url = {http://eprint.iacr.org/2016/195}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/TakayasuK16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/TakayasuK16a, author = {Atsushi Takayasu and Noboru Kunihiro}, title = {General Bounds for Small Inverse Problems and Its Applications to Multi-Prime {RSA}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {353}, year = {2016}, url = {http://eprint.iacr.org/2016/353}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/TakayasuK16a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Yamakawa0HK16, author = {Takashi Yamakawa and Shota Yamada and Goichiro Hanaoka and Noboru Kunihiro}, title = {Adversary-dependent Lossy Trapdoor Function from Hardness of Factoring Semi-smooth {RSA} Subgroup Moduli}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {567}, year = {2016}, url = {http://eprint.iacr.org/2016/567}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Yamakawa0HK16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/TakayasuK16b, author = {Atsushi Takayasu and Noboru Kunihiro}, title = {A Tool Kit for Partial Key Exposure Attacks on {RSA}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1056}, year = {2016}, url = {http://eprint.iacr.org/2016/1056}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/TakayasuK16b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KunihiroT16, author = {Noboru Kunihiro and Yuki Takahashi}, title = {Improved Key Recovery Algorithms from Noisy {RSA} Secret Keys with Analog Noise}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1095}, year = {2016}, url = {http://eprint.iacr.org/2016/1095}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KunihiroT16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/EndoK15, author = {Kosei Endo and Noboru Kunihiro}, title = {Security Analysis on {AUTH} Protocol and Its Variant against the Man-in-the-Middle Attack}, journal = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.}, volume = {98-A}, number = {1}, pages = {153--161}, year = {2015}, url = {https://doi.org/10.1587/transfun.E98.A.153}, doi = {10.1587/TRANSFUN.E98.A.153}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieicet/EndoK15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acns/TakayasuK15, author = {Atsushi Takayasu and Noboru Kunihiro}, editor = {Tal Malkin and Vladimir Kolesnikov and Allison Bishop Lewko and Michalis Polychronakis}, title = {Partial Key Exposure Attacks on {CRT-RSA:} Better Cryptanalysis to Full Size Encryption Exponents}, booktitle = {Applied Cryptography and Network Security - 13th International Conference, {ACNS} 2015, New York, NY, USA, June 2-5, 2015, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9092}, pages = {518--537}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-28166-7\_25}, doi = {10.1007/978-3-319-28166-7\_25}, timestamp = {Mon, 15 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acns/TakayasuK15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icisc/TanigakiK15, author = {Tomoyuki Tanigaki and Noboru Kunihiro}, editor = {Soonhak Kwon and Aaram Yun}, title = {Maximum Likelihood-Based Key Recovery Algorithm from Decayed Key Schedules}, booktitle = {Information Security and Cryptology - {ICISC} 2015 - 18th International Conference, Seoul, South Korea, November 25-27, 2015, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9558}, pages = {314--328}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-30840-1\_20}, doi = {10.1007/978-3-319-30840-1\_20}, timestamp = {Mon, 15 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icisc/TanigakiK15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/provsec/Kunihiro15, author = {Noboru Kunihiro}, editor = {Man Ho Au and Atsuko Miyaji}, title = {An Improved Attack for Recovering Noisy {RSA} Secret Keys and Its Countermeasure}, booktitle = {Provable Security - 9th International Conference, ProvSec 2015, Kanazawa, Japan, November 24-26, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9451}, pages = {61--81}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-26059-4\_4}, doi = {10.1007/978-3-319-26059-4\_4}, timestamp = {Mon, 15 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/provsec/Kunihiro15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacrypt/VannetK15, author = {Thomas Vannet and Noboru Kunihiro}, editor = {Orr Dunkelman and Liam Keliher}, title = {Private Information Retrieval with Preprocessing Based on the Approximate {GCD} Problem}, booktitle = {Selected Areas in Cryptography - {SAC} 2015 - 22nd International Conference, Sackville, NB, Canada, August 12-14, 2015, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9566}, pages = {227--240}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-31301-6\_14}, doi = {10.1007/978-3-319-31301-6\_14}, timestamp = {Mon, 15 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sacrypt/VannetK15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Yamakawa0HK15, author = {Takashi Yamakawa and Shota Yamada and Goichiro Hanaoka and Noboru Kunihiro}, title = {Self-bilinear Map on Unknown Order Groups from Indistinguishability Obfuscation and Its Applications}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {128}, year = {2015}, url = {http://eprint.iacr.org/2015/128}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Yamakawa0HK15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/TakayasuK14, author = {Atsushi Takayasu and Noboru Kunihiro}, title = {Better Lattice Constructions for Solving Multivariate Linear Equations Modulo Unknown Divisors}, journal = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.}, volume = {97-A}, number = {6}, pages = {1259--1272}, year = {2014}, url = {https://doi.org/10.1587/transfun.E97.A.1259}, doi = {10.1587/TRANSFUN.E97.A.1259}, timestamp = {Mon, 15 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieicet/TakayasuK14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/KunihiroSI14, author = {Noboru Kunihiro and Naoyuki Shinohara and Tetsuya Izu}, title = {Recovering {RSA} Secret Keys from Noisy Key Bits with Erasures and Errors}, journal = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.}, volume = {97-A}, number = {6}, pages = {1273--1284}, year = {2014}, url = {https://doi.org/10.1587/transfun.E97.A.1273}, doi = {10.1587/TRANSFUN.E97.A.1273}, timestamp = {Mon, 15 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieicet/KunihiroSI14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/KunihiroSI14a, author = {Noboru Kunihiro and Naoyuki Shinohara and Tetsuya Izu}, title = {A Unified Framework for Small Secret Exponent Attack on {RSA}}, journal = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.}, volume = {97-A}, number = {6}, pages = {1285--1295}, year = {2014}, url = {https://doi.org/10.1587/transfun.E97.A.1285}, doi = {10.1587/TRANSFUN.E97.A.1285}, timestamp = {Mon, 15 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieicet/KunihiroSI14a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/TakayasuK14, author = {Atsushi Takayasu and Noboru Kunihiro}, editor = {Willy Susilo and Yi Mu}, title = {Cryptanalysis of {RSA} with Multiple Small Secret Exponents}, booktitle = {Information Security and Privacy - 19th Australasian Conference, {ACISP} 2014, Wollongong, NSW, Australia, July 7-9, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8544}, pages = {176--191}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-08344-5\_12}, doi = {10.1007/978-3-319-08344-5\_12}, timestamp = {Thu, 14 Oct 2021 10:41:30 +0200}, biburl = {https://dblp.org/rec/conf/acisp/TakayasuK14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ches/KunihiroH14, author = {Noboru Kunihiro and Junya Honda}, editor = {Lejla Batina and Matthew Robshaw}, title = {{RSA} Meets {DPA:} Recovering {RSA} Secret Keys from Noisy Analog Data}, booktitle = {Cryptographic Hardware and Embedded Systems - {CHES} 2014 - 16th International Workshop, Busan, South Korea, September 23-26, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8731}, pages = {261--278}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-662-44709-3\_15}, doi = {10.1007/978-3-662-44709-3\_15}, timestamp = {Tue, 14 May 2019 10:00:47 +0200}, biburl = {https://dblp.org/rec/conf/ches/KunihiroH14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crypto/Yamakawa0HK14, author = {Takashi Yamakawa and Shota Yamada and Goichiro Hanaoka and Noboru Kunihiro}, editor = {Juan A. Garay and Rosario Gennaro}, title = {Self-bilinear Map on Unknown Order Groups from Indistinguishability Obfuscation and Its Applications}, booktitle = {Advances in Cryptology - {CRYPTO} 2014 - 34th Annual Cryptology Conference, Santa Barbara, CA, USA, August 17-21, 2014, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {8617}, pages = {90--107}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-662-44381-1\_6}, doi = {10.1007/978-3-662-44381-1\_6}, timestamp = {Mon, 15 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/crypto/Yamakawa0HK14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icisc/TakayasuK14, author = {Atsushi Takayasu and Noboru Kunihiro}, editor = {Jooyoung Lee and Jongsung Kim}, title = {General Bounds for Small Inverse Problems and Its Applications to Multi-Prime {RSA}}, booktitle = {Information Security and Cryptology - {ICISC} 2014 - 17th International Conference, Seoul, Korea, December 3-5, 2014, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8949}, pages = {3--17}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-15943-0\_1}, doi = {10.1007/978-3-319-15943-0\_1}, timestamp = {Mon, 15 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icisc/TakayasuK14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwsec/EndoK14, author = {Kosei Endo and Noboru Kunihiro}, editor = {Maki Yoshida and Koichi Mouri}, title = {On the Security Proof of an Authentication Protocol from Eurocrypt 2011}, booktitle = {Advances in Information and Computer Security - 9th International Workshop on Security, {IWSEC} 2014, Hirosaki, Japan, August 27-29, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8639}, pages = {187--203}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-09843-2\_15}, doi = {10.1007/978-3-319-09843-2\_15}, timestamp = {Mon, 15 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iwsec/EndoK14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/YamadaAHK14, author = {Shota Yamada and Nuttapong Attrapadung and Goichiro Hanaoka and Noboru Kunihiro}, editor = {Hugo Krawczyk}, title = {A Framework and Compact Constructions for Non-monotonic Attribute-Based Encryption}, booktitle = {Public-Key Cryptography - {PKC} 2014 - 17th International Conference on Practice and Theory in Public-Key Cryptography, Buenos Aires, Argentina, March 26-28, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8383}, pages = {275--292}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-642-54631-0\_16}, doi = {10.1007/978-3-642-54631-0\_16}, timestamp = {Mon, 15 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/YamadaAHK14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/provsec/KatsumataK14, author = {Shuichi Katsumata and Noboru Kunihiro}, editor = {Sherman S. M. Chow and Joseph K. Liu and Lucas Chi Kwong Hui and Siu{-}Ming Yiu}, title = {Constructing Subspace Membership Encryption through Inner Product Encryption}, booktitle = {Provable Security - 8th International Conference, ProvSec 2014, Hong Kong, China, October 9-10, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8782}, pages = {223--242}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-12475-9\_16}, doi = {10.1007/978-3-319-12475-9\_16}, timestamp = {Tue, 14 May 2019 10:00:45 +0200}, biburl = {https://dblp.org/rec/conf/provsec/KatsumataK14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacrypt/TakayasuK14, author = {Atsushi Takayasu and Noboru Kunihiro}, editor = {Antoine Joux and Amr M. Youssef}, title = {Partial Key Exposure Attacks on {RSA:} Achieving the Boneh-Durfee Bound}, booktitle = {Selected Areas in Cryptography - {SAC} 2014 - 21st International Conference, Montreal, QC, Canada, August 14-15, 2014, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {8781}, pages = {345--362}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-13051-4\_21}, doi = {10.1007/978-3-319-13051-4\_21}, timestamp = {Mon, 15 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sacrypt/TakayasuK14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/scn/Yamakawa0NHK14, author = {Takashi Yamakawa and Shota Yamada and Koji Nuida and Goichiro Hanaoka and Noboru Kunihiro}, editor = {Michel Abdalla and Roberto De Prisco}, title = {Chosen Ciphertext Security on Hard Membership Decision Groups: The Case of Semi-smooth Subgroups of Quadratic Residues}, booktitle = {Security and Cryptography for Networks - 9th International Conference, {SCN} 2014, Amalfi, Italy, September 3-5, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8642}, pages = {558--577}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-10879-7\_32}, doi = {10.1007/978-3-319-10879-7\_32}, timestamp = {Thu, 23 Jun 2022 19:58:57 +0200}, biburl = {https://dblp.org/rec/conf/scn/Yamakawa0NHK14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/YamadaAHK14, author = {Shota Yamada and Nuttapong Attrapadung and Goichiro Hanaoka and Noboru Kunihiro}, title = {A Framework and Compact Constructions for Non-monotonic Attribute-Based Encryption}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {181}, year = {2014}, url = {http://eprint.iacr.org/2014/181}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/YamadaAHK14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KunihiroH14, author = {Noboru Kunihiro and Junya Honda}, title = {{RSA} meets {DPA:} Recovering {RSA} Secret Keys from Noisy Analog Data}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {513}, year = {2014}, url = {http://eprint.iacr.org/2014/513}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KunihiroH14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cma/KawaiK13, author = {Yutaka Kawai and Noboru Kunihiro}, title = {Secret handshake scheme with request-based-revealing}, journal = {Comput. Math. Appl.}, volume = {65}, number = {5}, pages = {786--798}, year = {2013}, url = {https://doi.org/10.1016/j.camwa.2012.07.007}, doi = {10.1016/J.CAMWA.2012.07.007}, timestamp = {Thu, 11 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cma/KawaiK13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/YoshinoK13, author = {Masayuki Yoshino and Noboru Kunihiro}, title = {Random Sampling Reduction with Precomputation}, journal = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.}, volume = {96-A}, number = {1}, pages = {150--157}, year = {2013}, url = {https://doi.org/10.1587/transfun.E96.A.150}, doi = {10.1587/TRANSFUN.E96.A.150}, timestamp = {Mon, 15 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieicet/YoshinoK13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/TakayasuK13, author = {Atsushi Takayasu and Noboru Kunihiro}, editor = {Colin Boyd and Leonie Simpson}, title = {Better Lattice Constructions for Solving Multivariate Linear Equations Modulo Unknown Divisors}, booktitle = {Information Security and Privacy - 18th Australasian Conference, {ACISP} 2013, Brisbane, Australia, July 1-3, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7959}, pages = {118--135}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-39059-3\_9}, doi = {10.1007/978-3-642-39059-3\_9}, timestamp = {Mon, 15 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/TakayasuK13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/YamakawaY0HK13, author = {Takashi Yamakawa and Shota Yamada and Takahiro Matsuda and Goichiro Hanaoka and Noboru Kunihiro}, editor = {Kefei Chen and Qi Xie and Weidong Qiu and Shouhuai Xu and Yunlei Zhao}, title = {Efficient variants of the Naor-Yung and Dolev-Dwork-Naor transforms for {CCA} secure key encapsulation mechanism}, booktitle = {Proceedings of the first {ACM} workshop on Asia public-key cryptography, AsiaPKC'13, Hangzhou, China, May 8, 2013}, pages = {23--32}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2484389.2484395}, doi = {10.1145/2484389.2484395}, timestamp = {Tue, 10 Nov 2020 16:06:16 +0100}, biburl = {https://dblp.org/rec/conf/ccs/YamakawaY0HK13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isw/Yamakawa00HK13, author = {Takashi Yamakawa and Shota Yamada and Takahiro Matsuda and Goichiro Hanaoka and Noboru Kunihiro}, editor = {Yvo Desmedt}, title = {Reducing Public Key Sizes in Bounded CCA-Secure KEMs with Optimal Ciphertext Length}, booktitle = {Information Security, 16th International Conference, {ISC} 2013, Dallas, Texas, USA, November 13-15, 2013, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7807}, pages = {100--109}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-319-27659-5\_7}, doi = {10.1007/978-3-319-27659-5\_7}, timestamp = {Mon, 15 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isw/Yamakawa00HK13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/KunihiroSI13, author = {Noboru Kunihiro and Naoyuki Shinohara and Tetsuya Izu}, editor = {Kaoru Kurosawa and Goichiro Hanaoka}, title = {Recovering {RSA} Secret Keys from Noisy Key Bits with Erasures and Errors}, booktitle = {Public-Key Cryptography - {PKC} 2013 - 16th International Conference on Practice and Theory in Public-Key Cryptography, Nara, Japan, February 26 - March 1, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7778}, pages = {180--197}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-36362-7\_12}, doi = {10.1007/978-3-642-36362-7\_12}, timestamp = {Mon, 15 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/KunihiroSI13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/KogureKY12, author = {Jun Kogure and Noboru Kunihiro and Hirosuke Yamamoto}, title = {On the Hardness of Subset Sum Problem from Different Intervals}, journal = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.}, volume = {95-A}, number = {5}, pages = {903--908}, year = {2012}, url = {https://doi.org/10.1587/transfun.E95.A.903}, doi = {10.1587/TRANSFUN.E95.A.903}, timestamp = {Mon, 15 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieicet/KogureKY12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/TosuK12, author = {Kaori Tosu and Noboru Kunihiro}, editor = {Willy Susilo and Yi Mu and Jennifer Seberry}, title = {Optimal Bounds for Multi-Prime {\(\Phi\)}-Hiding Assumption}, booktitle = {Information Security and Privacy - 17th Australasian Conference, {ACISP} 2012, Wollongong, NSW, Australia, July 9-11, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7372}, pages = {1--14}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-31448-3\_1}, doi = {10.1007/978-3-642-31448-3\_1}, timestamp = {Mon, 15 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/TosuK12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/NagashimaK12, author = {Yuji Nagashima and Noboru Kunihiro}, editor = {Willy Susilo and Yi Mu and Jennifer Seberry}, title = {Faster Algorithm for Solving Hard Knapsacks for Moderate Message Length}, booktitle = {Information Security and Privacy - 17th Australasian Conference, {ACISP} 2012, Wollongong, NSW, Australia, July 9-11, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7372}, pages = {43--56}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-31448-3\_4}, doi = {10.1007/978-3-642-31448-3\_4}, timestamp = {Mon, 15 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/NagashimaK12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ctrsa/YamadaHK12, author = {Shota Yamada and Goichiro Hanaoka and Noboru Kunihiro}, editor = {Orr Dunkelman}, title = {Two-Dimensional Representation of Cover Free Families and Its Applications: Short Signatures and More}, booktitle = {Topics in Cryptology - {CT-RSA} 2012 - The Cryptographers' Track at the {RSA} Conference 2012, San Francisco, CA, USA, February 27 - March 2, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7178}, pages = {260--277}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-27954-6\_17}, doi = {10.1007/978-3-642-27954-6\_17}, timestamp = {Mon, 15 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ctrsa/YamadaHK12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ctrsa/HanaokaKKMWZZ12, author = {Goichiro Hanaoka and Yutaka Kawai and Noboru Kunihiro and Takahiro Matsuda and Jian Weng and Rui Zhang and Yunlei Zhao}, editor = {Orr Dunkelman}, title = {Generic Construction of Chosen Ciphertext Secure Proxy Re-Encryption}, booktitle = {Topics in Cryptology - {CT-RSA} 2012 - The Cryptographers' Track at the {RSA} Conference 2012, San Francisco, CA, USA, February 27 - March 2, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7178}, pages = {349--364}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-27954-6\_22}, doi = {10.1007/978-3-642-27954-6\_22}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ctrsa/HanaokaKKMWZZ12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icisc/KoyamaSK12, author = {Takuma Koyama and Yu Sasaki and Noboru Kunihiro}, editor = {Taekyoung Kwon and Mun{-}Kyu Lee and Daesung Kwon}, title = {Multi-differential Cryptanalysis on Reduced {DM-PRESENT-80:} Collisions and Other Differential Properties}, booktitle = {Information Security and Cryptology - {ICISC} 2012 - 15th International Conference, Seoul, Korea, November 28-30, 2012, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7839}, pages = {352--367}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-37682-5\_25}, doi = {10.1007/978-3-642-37682-5\_25}, timestamp = {Fri, 22 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icisc/KoyamaSK12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isita/YoshinoK12, author = {Masayuki Yoshino and Noboru Kunihiro}, title = {Improving {GGH} cryptosystem for large error vector}, booktitle = {Proceedings of the International Symposium on Information Theory and its Applications, {ISITA} 2012, Honolulu, HI, USA, October 28-31, 2012}, pages = {416--420}, publisher = {{IEEE}}, year = {2012}, url = {https://ieeexplore.ieee.org/document/6400966/}, timestamp = {Wed, 11 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isita/YoshinoK12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isw/Kunihiro12, author = {Noboru Kunihiro}, editor = {Dieter Gollmann and Felix C. Freiling}, title = {On Optimal Bounds of Small Inverse Problems and Approximate {GCD} Problems with Higher Degree}, booktitle = {Information Security - 15th International Conference, {ISC} 2012, Passau, Germany, September 19-21, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7483}, pages = {55--69}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-33383-5\_4}, doi = {10.1007/978-3-642-33383-5\_4}, timestamp = {Mon, 15 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isw/Kunihiro12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/YamadaHK12, author = {Shota Yamada and Goichiro Hanaoka and Noboru Kunihiro}, editor = {Marc Fischlin and Johannes Buchmann and Mark Manulis}, title = {Space Efficient Signature Schemes from the {RSA} Assumption}, booktitle = {Public Key Cryptography - {PKC} 2012 - 15th International Conference on Practice and Theory in Public Key Cryptography, Darmstadt, Germany, May 21-23, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7293}, pages = {102--119}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-30057-8\_7}, doi = {10.1007/978-3-642-30057-8\_7}, timestamp = {Mon, 16 Nov 2020 15:55:52 +0100}, biburl = {https://dblp.org/rec/conf/pkc/YamadaHK12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/YamadaASSHK12, author = {Shota Yamada and Nuttapong Attrapadung and Bagus Santoso and Jacob C. N. Schuldt and Goichiro Hanaoka and Noboru Kunihiro}, editor = {Marc Fischlin and Johannes Buchmann and Mark Manulis}, title = {Verifiable Predicate Encryption and Applications to {CCA} Security and Anonymous Predicate Authentication}, booktitle = {Public Key Cryptography - {PKC} 2012 - 15th International Conference on Practice and Theory in Public Key Cryptography, Darmstadt, Germany, May 21-23, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7293}, pages = {243--261}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-30057-8\_15}, doi = {10.1007/978-3-642-30057-8\_15}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/pkc/YamadaASSHK12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/provsec/YoshinoKNS12, author = {Masayuki Yoshino and Noboru Kunihiro and Ken Naganuma and Hisayoshi Sato}, editor = {Tsuyoshi Takagi and Guilin Wang and Zhiguang Qin and Shaoquan Jiang and Yong Yu}, title = {Symmetric Inner-Product Predicate Encryption Based on Three Groups}, booktitle = {Provable Security - 6th International Conference, ProvSec 2012, Chengdu, China, September 26-28, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7496}, pages = {215--234}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-33272-2\_14}, doi = {10.1007/978-3-642-33272-2\_14}, timestamp = {Mon, 15 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/provsec/YoshinoKNS12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KunihiroSI12, author = {Noboru Kunihiro and Naoyuki Shinohara and Tetsuya Izu}, title = {Recovering {RSA} Secret Keys from Noisy Key Bits with Erasures and Errors}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {701}, year = {2012}, url = {http://eprint.iacr.org/2012/701}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KunihiroSI12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/ShinoharaIK11, author = {Naoyuki Shinohara and Tetsuya Izu and Noboru Kunihiro}, title = {Small Secret CRT-Exponent Attacks on Takagi's {RSA}}, journal = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.}, volume = {94-A}, number = {1}, pages = {19--27}, year = {2011}, url = {https://doi.org/10.1587/transfun.E94.A.19}, doi = {10.1587/TRANSFUN.E94.A.19}, timestamp = {Mon, 15 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieicet/ShinoharaIK11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/Kunihiro11, author = {Noboru Kunihiro}, title = {Solving Generalized Small Inverse Problems}, journal = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.}, volume = {94-A}, number = {6}, pages = {1274--1284}, year = {2011}, url = {https://doi.org/10.1587/transfun.E94.A.1274}, doi = {10.1587/TRANSFUN.E94.A.1274}, timestamp = {Mon, 15 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieicet/Kunihiro11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jisis/KawaiSK11, author = {Yutaka Kawai and Yusuke Sakai and Noboru Kunihiro}, title = {On the (Im)possibility Results for Strong Attack Models for Public Key Cryptsystems}, journal = {J. Internet Serv. Inf. Secur.}, volume = {1}, number = {2/3}, pages = {125--139}, year = {2011}, url = {https://doi.org/10.22667/JISIS.2011.08.31.125}, doi = {10.22667/JISIS.2011.08.31.125}, timestamp = {Thu, 23 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jisis/KawaiSK11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/aina/IzuIKO11, author = {Tetsuya Izu and Masami Izumi and Noboru Kunihiro and Kazuo Ohta}, title = {Yet Another Sanitizable and Deletable Signatures}, booktitle = {25th {IEEE} International Conference on Advanced Information Networking and Applications Workshops, {WAINA} 2011, Biopolis, Singapore, March 22-25, 2011}, pages = {574--579}, publisher = {{IEEE} Computer Society}, year = {2011}, url = {https://doi.org/10.1109/WAINA.2011.117}, doi = {10.1109/WAINA.2011.117}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/aina/IzuIKO11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/europki/KawaiK11, author = {Yutaka Kawai and Noboru Kunihiro}, editor = {Svetla Petkova{-}Nikova and Andreas Pashalidis and G{\"{u}}nther Pernul}, title = {Secret Handshake Scheme with Request-Based-Revealing}, booktitle = {Public Key Infrastructures, Services and Applications - 8th European Workshop, EuroPKI 2011, Leuven, Belgium, September 15-16, 2011, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7163}, pages = {1--16}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-29804-2\_1}, doi = {10.1007/978-3-642-29804-2\_1}, timestamp = {Mon, 15 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/europki/KawaiK11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/YamadaAHK11, author = {Shota Yamada and Nuttapong Attrapadung and Goichiro Hanaoka and Noboru Kunihiro}, editor = {Dario Catalano and Nelly Fazio and Rosario Gennaro and Antonio Nicolosi}, title = {Generic Constructions for Chosen-Ciphertext Secure Attribute Based Encryption}, booktitle = {Public Key Cryptography - {PKC} 2011 - 14th International Conference on Practice and Theory in Public Key Cryptography, Taormina, Italy, March 6-9, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6571}, pages = {71--89}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-19379-8\_5}, doi = {10.1007/978-3-642-19379-8\_5}, timestamp = {Mon, 15 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/YamadaAHK11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacrypt/KunihiroSI11, author = {Noboru Kunihiro and Naoyuki Shinohara and Tetsuya Izu}, editor = {Ali Miri and Serge Vaudenay}, title = {A Unified Framework for Small Secret Exponent Attack on {RSA}}, booktitle = {Selected Areas in Cryptography - 18th International Workshop, {SAC} 2011, Toronto, ON, Canada, August 11-12, 2011, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7118}, pages = {260--277}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-28496-0\_16}, doi = {10.1007/978-3-642-28496-0\_16}, timestamp = {Mon, 15 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sacrypt/KunihiroSI11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/KogureKY11, author = {Jun Kogure and Noboru Kunihiro and Hirosuke Yamamoto}, editor = {Souhwan Jung and Moti Yung}, title = {Generalized Security Analysis of the Random Key Bits Leakage Attack}, booktitle = {Information Security Applications - 12th International Workshop, {WISA} 2011, Jeju Island, Korea, August 22-24, 2011. Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {7115}, pages = {13--27}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-27890-7\_2}, doi = {10.1007/978-3-642-27890-7\_2}, timestamp = {Mon, 15 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisa/KogureKY11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KunihiroSI11, author = {Noboru Kunihiro and Naoyuki Shinohara and Tetsuya Izu}, title = {A Unified Framework for Small Secret Exponent Attack on {RSA}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {591}, year = {2011}, url = {http://eprint.iacr.org/2011/591}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KunihiroSI11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/SasakiWOAK10, author = {Yu Sasaki and Lei Wang and Kazuo Ohta and Kazumaro Aoki and Noboru Kunihiro}, title = {Practical Password Recovery Attacks on {MD4} Based Prefix and Hybrid Authentication Protocols}, journal = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.}, volume = {93-A}, number = {1}, pages = {84--92}, year = {2010}, url = {https://doi.org/10.1587/transfun.E93.A.84}, doi = {10.1587/TRANSFUN.E93.A.84}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieicet/SasakiWOAK10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/WangOSSK10, author = {Lei Wang and Kazuo Ohta and Yu Sasaki and Kazuo Sakiyama and Noboru Kunihiro}, title = {Cryptanalysis of Two MD5-Based Authentication Protocols: {APOP} and {NMAC}}, journal = {{IEICE} Trans. Inf. Syst.}, volume = {93-D}, number = {5}, pages = {1087--1095}, year = {2010}, url = {https://doi.org/10.1587/transinf.E93.D.1087}, doi = {10.1587/TRANSINF.E93.D.1087}, timestamp = {Mon, 15 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieicet/WangOSSK10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/Kunihiro10, author = {Noboru Kunihiro}, title = {New Conditions for Secure Knapsack Schemes against Lattice Attack}, journal = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.}, volume = {93-A}, number = {6}, pages = {1058--1065}, year = {2010}, url = {https://doi.org/10.1587/transfun.E93.A.1058}, doi = {10.1587/TRANSFUN.E93.A.1058}, timestamp = {Mon, 15 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieicet/Kunihiro10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/KawaiTKYOK10, author = {Yutaka Kawai and Shotaro Tanno and Takahiro Kondo and Kazuki Yoneyama and Kazuo Ohta and Noboru Kunihiro}, title = {Extension of Secret Handshake Protocols with Multiple Groups in Monotone Condition}, journal = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.}, volume = {93-A}, number = {6}, pages = {1122--1131}, year = {2010}, url = {https://doi.org/10.1587/transfun.E93.A.1122}, doi = {10.1587/TRANSFUN.E93.A.1122}, timestamp = {Mon, 15 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieicet/KawaiTKYOK10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/YamadaKHK10, author = {Shota Yamada and Yutaka Kawai and Goichiro Hanaoka and Noboru Kunihiro}, title = {Public Key Encryption Schemes from the {(B)CDH} Assumption with Better Efficiency}, journal = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.}, volume = {93-A}, number = {11}, pages = {1984--1993}, year = {2010}, url = {https://doi.org/10.1587/transfun.E93.A.1984}, doi = {10.1587/TRANSFUN.E93.A.1984}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieicet/YamadaKHK10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/qic/TakahashiTK10, author = {Yasuhiro Takahashi and Seiichiro Tani and Noboru Kunihiro}, title = {Quantum addition circuits and unbounded fan-out}, journal = {Quantum Inf. Comput.}, volume = {10}, number = {9{\&}10}, pages = {872--890}, year = {2010}, url = {https://doi.org/10.26421/QIC10.9-10-12}, doi = {10.26421/QIC10.9-10-12}, timestamp = {Thu, 29 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/qic/TakahashiTK10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/Kunihiro10, author = {Noboru Kunihiro}, editor = {Ron Steinfeld and Philip Hawkes}, title = {Solving Generalized Small Inverse Problems}, booktitle = {Information Security and Privacy - 15th Australasian Conference, {ACISP} 2010, Sydney, Australia, July 5-7, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6168}, pages = {248--263}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-14081-5\_16}, doi = {10.1007/978-3-642-14081-5\_16}, timestamp = {Mon, 15 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/Kunihiro10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nbis/HirotaIKO10, author = {Naoyuki Hirota and Tetsuya Izu and Noboru Kunihiro and Kazuo Ohta}, editor = {Tomoya Enokido and Fatos Xhafa and Leonard Barolli and Makoto Takizawa and Minoru Uehara and Arjan Durresi}, title = {An Evaluation of the Sieving Device {YASD} for 1024-Bit Integers}, booktitle = {The 13th International Conference on Network-Based Information Systems, NBiS 2010, Takayama, Gifu, Japan, 14-16 September 2010}, pages = {546--551}, publisher = {{IEEE} Computer Society}, year = {2010}, url = {https://doi.org/10.1109/NBiS.2010.61}, doi = {10.1109/NBIS.2010.61}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nbis/HirotaIKO10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/provsec/YamadaHK10, author = {Shota Yamada and Goichiro Hanaoka and Noboru Kunihiro}, editor = {Swee{-}Huay Heng and Kaoru Kurosawa}, title = {Toward an Easy-to-Understand Structure for Achieving Chosen Ciphertext Security from the Decisional Diffie-Hellman Assumption}, booktitle = {Provable Security - 4th International Conference, ProvSec 2010, Malacca, Malaysia, October 13-15, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6402}, pages = {229--243}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-16280-0\_16}, doi = {10.1007/978-3-642-16280-0\_16}, timestamp = {Mon, 15 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/provsec/YamadaHK10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/iwsec/2010, editor = {Isao Echizen and Noboru Kunihiro and Ry{\^{o}}ichi Sasaki}, title = {Advances in Information and Computer Security - 5th International Workshop on Security, {IWSEC} 2010, Kobe, Japan, November 22-24, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6434}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-16825-3}, doi = {10.1007/978-3-642-16825-3}, isbn = {978-3-642-16824-6}, timestamp = {Mon, 15 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iwsec/2010.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/iwsec/2010s, editor = {Isao Echizen and Noboru Kunihiro and Ry{\^{o}}ichi Sasaki}, title = {Advances in Information and Computer Security - 5th International Workshop on Security, {IWSEC} 2010, Kobe, Japan, November 22-24, 2010. Short Paper Proceedings}, publisher = {Information Processing Society of Japan {(IPSJ)}}, year = {2010}, isbn = {978-4-915256-78-3}, timestamp = {Thu, 15 Sep 2011 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iwsec/2010s.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Kunihiro10, author = {Noboru Kunihiro}, title = {Solving Generalized Small Inverse Problems}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {221}, year = {2010}, url = {http://eprint.iacr.org/2010/221}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Kunihiro10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/ItohKK09, author = {Kouichi Itoh and Noboru Kunihiro and Kaoru Kurosawa}, title = {Small Secret Key Attack on a Takagi's Variant of {RSA}}, journal = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.}, volume = {92-A}, number = {1}, pages = {33--41}, year = {2009}, url = {https://doi.org/10.1587/transfun.E92.A.33}, doi = {10.1587/TRANSFUN.E92.A.33}, timestamp = {Mon, 15 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieicet/ItohKK09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/WangOK09, author = {Lei Wang and Kazuo Ohta and Noboru Kunihiro}, title = {Near-Collision Attacks on {MD4:} Applied to MD4-Based Protocols}, journal = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.}, volume = {92-A}, number = {1}, pages = {76--86}, year = {2009}, url = {https://doi.org/10.1587/transfun.E92.A.76}, doi = {10.1587/TRANSFUN.E92.A.76}, timestamp = {Mon, 15 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieicet/WangOK09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/YajimaINSSPKO09, author = {Jun Yajima and Terutoshi Iwasaki and Yusuke Naito and Yu Sasaki and Takeshi Shimoyama and Thomas Peyrin and Noboru Kunihiro and Kazuo Ohta}, title = {A Strict Evaluation on the Number of Conditions for {SHA-1} Collision Search}, journal = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.}, volume = {92-A}, number = {1}, pages = {87--95}, year = {2009}, url = {https://doi.org/10.1587/transfun.E92.A.87}, doi = {10.1587/TRANSFUN.E92.A.87}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieicet/YajimaINSSPKO09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/SasakiWOK09, author = {Yu Sasaki and Lei Wang and Kazuo Ohta and Noboru Kunihiro}, title = {Extended Password Recovery Attacks against APOP, SIP, and Digest Authentication}, journal = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.}, volume = {92-A}, number = {1}, pages = {96--104}, year = {2009}, url = {https://doi.org/10.1587/transfun.E92.A.96}, doi = {10.1587/TRANSFUN.E92.A.96}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieicet/SasakiWOK09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEares/IzuKOST09, author = {Tetsuya Izu and Noboru Kunihiro and Kazuo Ohta and Makoto Sano and Masahiko Takenaka}, title = {Yet Another Sanitizable Signature from Bilinear Maps}, booktitle = {Proceedings of the The Forth International Conference on Availability, Reliability and Security, {ARES} 2009, March 16-19, 2009, Fukuoka, Japan}, pages = {941--946}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/ARES.2009.14}, doi = {10.1109/ARES.2009.14}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/IEEEares/IzuKOST09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/NaitoOK08, author = {Yusuke Naito and Kazuo Ohta and Noboru Kunihiro}, title = {Improved Collision Search for Hash Functions: New Advanced Message Modification}, journal = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.}, volume = {91-A}, number = {1}, pages = {46--54}, year = {2008}, url = {https://doi.org/10.1093/ietfec/e91-a.1.46}, doi = {10.1093/IETFEC/E91-A.1.46}, timestamp = {Mon, 15 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieicet/NaitoOK08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/SasakiWKO08, author = {Yu Sasaki and Lei Wang and Noboru Kunihiro and Kazuo Ohta}, title = {New Message Differences for Collision Attacks on {MD4} and {MD5}}, journal = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.}, volume = {91-A}, number = {1}, pages = {55--63}, year = {2008}, url = {https://doi.org/10.1093/ietfec/e91-a.1.55}, doi = {10.1093/IETFEC/E91-A.1.55}, timestamp = {Mon, 15 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieicet/SasakiWKO08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/SantosoKKO08, author = {Bagus Santoso and Noboru Kunihiro and Naoki Kanayama and Kazuo Ohta}, title = {Factorization of Square-Free Integers with High Bits Known}, journal = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.}, volume = {91-A}, number = {1}, pages = {306--315}, year = {2008}, url = {https://doi.org/10.1093/ietfec/e91-a.1.306}, doi = {10.1093/IETFEC/E91-A.1.306}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieicet/SantosoKKO08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/KunihiroK08, author = {Noboru Kunihiro and Kaoru Kurosawa}, title = {Deterministic Polynomial Time Equivalence between Factoring and Key-Recovery Attack on Takagi's {RSA}}, journal = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.}, volume = {91-A}, number = {9}, pages = {2356--2364}, year = {2008}, url = {https://doi.org/10.1093/ietfec/e91-a.9.2356}, doi = {10.1093/IETFEC/E91-A.9.2356}, timestamp = {Mon, 15 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieicet/KunihiroK08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/qic/TakahashiK08, author = {Yasuhiro Takahashi and Noboru Kunihiro}, title = {A fast quantum circuit for addition with few qubits}, journal = {Quantum Inf. Comput.}, volume = {8}, number = {6}, pages = {636--649}, year = {2008}, url = {https://doi.org/10.26421/QIC8.6-7-5}, doi = {10.26421/QIC8.6-7-5}, timestamp = {Thu, 29 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/qic/TakahashiK08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/africacrypt/Kunihiro08, author = {Noboru Kunihiro}, editor = {Serge Vaudenay}, title = {New Definition of Density on Knapsack Cryptosystems}, booktitle = {Progress in Cryptology - {AFRICACRYPT} 2008, First International Conference on Cryptology in Africa, Casablanca, Morocco, June 11-14, 2008. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5023}, pages = {156--173}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-68164-9\_11}, doi = {10.1007/978-3-540-68164-9\_11}, timestamp = {Mon, 15 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/africacrypt/Kunihiro08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/africacrypt/SasakiWOK08, author = {Yu Sasaki and Lei Wang and Kazuo Ohta and Noboru Kunihiro}, editor = {Serge Vaudenay}, title = {Password Recovery on Challenge and Response: Impossible Differential Attack on Hash Function}, booktitle = {Progress in Cryptology - {AFRICACRYPT} 2008, First International Conference on Cryptology in Africa, Casablanca, Morocco, June 11-14, 2008. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5023}, pages = {290--307}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-68164-9\_20}, doi = {10.1007/978-3-540-68164-9\_20}, timestamp = {Mon, 15 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/africacrypt/SasakiWOK08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/YajimaINSSKO08, author = {Jun Yajima and Terutoshi Iwasaki and Yusuke Naito and Yu Sasaki and Takeshi Shimoyama and Noboru Kunihiro and Kazuo Ohta}, editor = {Masayuki Abe and Virgil D. Gligor}, title = {A strict evaluation method on the number of conditions for the {SHA-1} collision search}, booktitle = {Proceedings of the 2008 {ACM} Symposium on Information, Computer and Communications Security, {ASIACCS} 2008, Tokyo, Japan, March 18-20, 2008}, pages = {10--20}, publisher = {{ACM}}, year = {2008}, url = {https://doi.org/10.1145/1368310.1368316}, doi = {10.1145/1368310.1368316}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/YajimaINSSKO08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ctrsa/SasakiWOK08, author = {Yu Sasaki and Lei Wang and Kazuo Ohta and Noboru Kunihiro}, editor = {Tal Malkin}, title = {Security of {MD5} Challenge and Response: Extension of {APOP} Password Recovery Attack}, booktitle = {Topics in Cryptology - {CT-RSA} 2008, The Cryptographers' Track at the {RSA} Conference 2008, San Francisco, CA, USA, April 8-11, 2008. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4964}, pages = {1--18}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-79263-5\_1}, doi = {10.1007/978-3-540-79263-5\_1}, timestamp = {Mon, 15 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ctrsa/SasakiWOK08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ctrsa/ItohKK08, author = {Kouichi Itoh and Noboru Kunihiro and Kaoru Kurosawa}, editor = {Tal Malkin}, title = {Small Secret Key Attack on a Variant of {RSA} (Due to Takagi)}, booktitle = {Topics in Cryptology - {CT-RSA} 2008, The Cryptographers' Track at the {RSA} Conference 2008, San Francisco, CA, USA, April 8-11, 2008. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4964}, pages = {387--406}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-79263-5\_25}, doi = {10.1007/978-3-540-79263-5\_25}, timestamp = {Mon, 15 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ctrsa/ItohKK08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/WangOK08, author = {Lei Wang and Kazuo Ohta and Noboru Kunihiro}, editor = {Nigel P. Smart}, title = {New Key-Recovery Attacks on {HMAC/NMAC-MD4} and {NMAC-MD5}}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2008, 27th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Istanbul, Turkey, April 13-17, 2008. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4965}, pages = {237--253}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-78967-3\_14}, doi = {10.1007/978-3-540-78967-3\_14}, timestamp = {Mon, 15 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/WangOK08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/IzuKOST08, author = {Tetsuya Izu and Noboru Kunihiro and Kazuo Ohta and Makoto Sano and Masahiko Takenaka}, editor = {Kyo{-}Il Chung and Kiwook Sohn and Moti Yung}, title = {Sanitizable and Deletable Signature}, booktitle = {Information Security Applications, 9th International Workshop, {WISA} 2008, Jeju Island, Korea, September 23-25, 2008, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {5379}, pages = {130--144}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-642-00306-6\_10}, doi = {10.1007/978-3-642-00306-6\_10}, timestamp = {Mon, 15 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisa/IzuKOST08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/KawaiTKYKO08, author = {Yutaka Kawai and Shotaro Tanno and Takahiro Kondo and Kazuki Yoneyama and Noboru Kunihiro and Kazuo Ohta}, editor = {Kyo{-}Il Chung and Kiwook Sohn and Moti Yung}, title = {Extension of Secret Handshake Protocols with Multiple Groups in Monotone Condition}, booktitle = {Information Security Applications, 9th International Workshop, {WISA} 2008, Jeju Island, Korea, September 23-25, 2008, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {5379}, pages = {160--173}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-642-00306-6\_12}, doi = {10.1007/978-3-642-00306-6\_12}, timestamp = {Mon, 15 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wisa/KawaiTKYKO08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/SasakiNKO07, author = {Yu Sasaki and Yusuke Naito and Noboru Kunihiro and Kazuo Ohta}, title = {Improved Collision Attacks on {MD4} and {MD5}}, journal = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.}, volume = {90-A}, number = {1}, pages = {36--47}, year = {2007}, url = {https://doi.org/10.1093/ietfec/e90-a.1.36}, doi = {10.1093/IETFEC/E90-A.1.36}, timestamp = {Mon, 15 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieicet/SasakiNKO07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/HanataniKOK07, author = {Yoshikazu Hanatani and Yuichi Komano and Kazuo Ohta and Noboru Kunihiro}, title = {Provably Secure Untraceable Electronic Cash against Insider Attacks}, journal = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.}, volume = {90-A}, number = {5}, pages = {980--991}, year = {2007}, url = {https://doi.org/10.1093/ietfec/e90-a.5.980}, doi = {10.1093/IETFEC/E90-A.5.980}, timestamp = {Mon, 15 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieicet/HanataniKOK07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/qic/TakahashiKO07, author = {Yasuhiro Takahashi and Noboru Kunihiro and Kazuo Ohta}, title = {The quantum fourier transform on a linear nearest neighbor architecture}, journal = {Quantum Inf. Comput.}, volume = {7}, number = {4}, pages = {383--391}, year = {2007}, url = {https://doi.org/10.26421/QIC7.4-7}, doi = {10.26421/QIC7.4-7}, timestamp = {Thu, 29 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/qic/TakahashiKO07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acisp/YajimaSNISKO07, author = {Jun Yajima and Yu Sasaki and Yusuke Naito and Terutoshi Iwasaki and Takeshi Shimoyama and Noboru Kunihiro and Kazuo Ohta}, editor = {Josef Pieprzyk and Hossein Ghodosi and Ed Dawson}, title = {A New Strategy for Finding a Differential Path of {SHA-1}}, booktitle = {Information Security and Privacy, 12th Australasian Conference, {ACISP} 2007, Townsville, Australia, July 2-4, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4586}, pages = {45--58}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-73458-1\_4}, doi = {10.1007/978-3-540-73458-1\_4}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acisp/YajimaSNISKO07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fse/SasakiWOK07, author = {Yu Sasaki and Lei Wang and Kazuo Ohta and Noboru Kunihiro}, editor = {Alex Biryukov}, title = {New Message Difference for {MD4}}, booktitle = {Fast Software Encryption, 14th International Workshop, {FSE} 2007, Luxembourg, Luxembourg, March 26-28, 2007, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {4593}, pages = {329--348}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-74619-5\_21}, doi = {10.1007/978-3-540-74619-5\_21}, timestamp = {Sun, 25 Oct 2020 23:06:50 +0100}, biburl = {https://dblp.org/rec/conf/fse/SasakiWOK07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ispec/IzuKOTY07, author = {Tetsuya Izu and Noboru Kunihiro and Kazuo Ohta and Masahiko Takenaka and Takashi Yoshioka}, editor = {Ed Dawson and Duncan S. Wong}, title = {A Sanitizable Signature Scheme with Aggregation}, booktitle = {Information Security Practice and Experience, Third International Conference, {ISPEC} 2007, Hong Kong, China, May 7-9, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4464}, pages = {51--64}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-72163-5\_6}, doi = {10.1007/978-3-540-72163-5\_6}, timestamp = {Tue, 14 May 2019 10:00:40 +0200}, biburl = {https://dblp.org/rec/conf/ispec/IzuKOTY07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/KunihiroK07, author = {Noboru Kunihiro and Kaoru Kurosawa}, editor = {Tatsuaki Okamoto and Xiaoyun Wang}, title = {Deterministic Polynomial Time Equivalence Between Factoring and Key-Recovery Attack on Takagi's {RSA}}, booktitle = {Public Key Cryptography - {PKC} 2007, 10th International Conference on Practice and Theory in Public-Key Cryptography, Beijing, China, April 16-20, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4450}, pages = {412--425}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-71677-8\_27}, doi = {10.1007/978-3-540-71677-8\_27}, timestamp = {Fri, 01 May 2020 18:32:25 +0200}, biburl = {https://dblp.org/rec/conf/pkc/KunihiroK07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/IwamotoWYKO06, author = {Mitsugu Iwamoto and Lei Wang and Kazuki Yoneyama and Noboru Kunihiro and Kazuo Ohta}, title = {Visual Secret Sharing Schemes for Multiple Secret Images Allowing the Rotation of Shares}, journal = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.}, volume = {89-A}, number = {5}, pages = {1382--1395}, year = {2006}, url = {https://doi.org/10.1093/ietfec/e89-a.5.1382}, doi = {10.1093/IETFEC/E89-A.5.1382}, timestamp = {Mon, 15 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieicet/IwamotoWYKO06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/KunihiroAO06, author = {Noboru Kunihiro and Wataru Abe and Kazuo Ohta}, title = {Maurer-Yacobi ID-Based Key Distribution Revisited}, journal = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.}, volume = {89-A}, number = {5}, pages = {1421--1424}, year = {2006}, url = {https://doi.org/10.1093/ietfec/e89-a.5.1421}, doi = {10.1093/IETFEC/E89-A.5.1421}, timestamp = {Mon, 15 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieicet/KunihiroAO06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/qic/TakahashiK06, author = {Yasuhiro Takahashi and Noboru Kunihiro}, title = {A quantum circuit for shor's factoring algorithm using 2n + 2 qubits}, journal = {Quantum Inf. Comput.}, volume = {6}, number = {2}, pages = {184--192}, year = {2006}, url = {https://doi.org/10.26421/QIC6.2-4}, doi = {10.26421/QIC6.2-4}, timestamp = {Fri, 30 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/qic/TakahashiK06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/NaitoSSYKO06, author = {Yusuke Naito and Yu Sasaki and Takeshi Shimoyama and Jun Yajima and Noboru Kunihiro and Kazuo Ohta}, editor = {Xuejia Lai and Kefei Chen}, title = {Improved Collision Search for {SHA-0}}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2006, 12th International Conference on the Theory and Application of Cryptology and Information Security, Shanghai, China, December 3-7, 2006, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4284}, pages = {21--36}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11935230\_2}, doi = {10.1007/11935230\_2}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/asiacrypt/NaitoSSYKO06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/MamboSOK06, author = {Masahiro Mambo and Mois{\'{e}}s Salinas{-}Rosales and Kazuo Ohta and Noboru Kunihiro}, editor = {Ferng{-}Ching Lin and Der{-}Tsai Lee and Bao{-}Shuh Paul Lin and Shiuhpyng Shieh and Sushil Jajodia}, title = {Problems on the {MR} micropayment schemes}, booktitle = {Proceedings of the 2006 {ACM} Symposium on Information, Computer and Communications Security, {ASIACCS} 2006, Taipei, Taiwan, March 21-24, 2006}, pages = {363}, publisher = {{ACM}}, year = {2006}, url = {https://doi.org/10.1145/1128817.1128879}, doi = {10.1145/1128817.1128879}, timestamp = {Thu, 20 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/MamboSOK06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fc/HanataniKOK06, author = {Yoshikazu Hanatani and Yuichi Komano and Kazuo Ohta and Noboru Kunihiro}, editor = {Giovanni Di Crescenzo and Aviel D. Rubin}, title = {Provably Secure Electronic Cash Based on Blind Multisignature Schemes}, booktitle = {Financial Cryptography and Data Security, 10th International Conference, {FC} 2006, Anguilla, British West Indies, February 27-March 2, 2006, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {4107}, pages = {236--250}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11889663\_20}, doi = {10.1007/11889663\_20}, timestamp = {Tue, 14 May 2019 10:00:38 +0200}, biburl = {https://dblp.org/rec/conf/fc/HanataniKOK06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/vietcrypt/SantosoKKO06, author = {Bagus Santoso and Noboru Kunihiro and Naoki Kanayama and Kazuo Ohta}, editor = {Phong Q. Nguyen}, title = {Factorization of Square-Free Integers with High Bits Known}, booktitle = {Progressin Cryptology - {VIETCRYPT} 2006, First International Conference on Cryptology in Vietnam, Hanoi, Vietnam, September 25-28, 2006, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {4341}, pages = {115--130}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11958239\_8}, doi = {10.1007/11958239\_8}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/vietcrypt/SantosoKKO06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/vietcrypt/SasakiNYSKO06, author = {Yu Sasaki and Yusuke Naito and Jun Yajima and Takeshi Shimoyama and Noboru Kunihiro and Kazuo Ohta}, editor = {Phong Q. Nguyen}, title = {How to Construct Sufficient Conditions for Hash Functions}, booktitle = {Progressin Cryptology - {VIETCRYPT} 2006, First International Conference on Cryptology in Vietnam, Hanoi, Vietnam, September 25-28, 2006, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {4341}, pages = {243--259}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11958239\_16}, doi = {10.1007/11958239\_16}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/vietcrypt/SasakiNYSKO06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/NaitoSSYKO06, author = {Yusuke Naito and Yu Sasaki and Takeshi Shimoyama and Jun Yajima and Noboru Kunihiro and Kazuo Ohta}, title = {Message Modification for Step 21-23 on {SHA-0}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {16}, year = {2006}, url = {http://eprint.iacr.org/2006/016}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/NaitoSSYKO06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/SasakiNYSKO06, author = {Yu Sasaki and Yusuke Naito and Jun Yajima and Takeshi Shimoyama and Noboru Kunihiro and Kazuo Ohta}, title = {How to Construct Sufficient Condition in Searching Collisions of {MD5}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {74}, year = {2006}, url = {http://eprint.iacr.org/2006/074}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/SasakiNYSKO06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/Kunihiro05, author = {Noboru Kunihiro}, title = {Exact Analyses of Computational Time for Factoring in Quantum Computers}, journal = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.}, volume = {88-A}, number = {1}, pages = {105--111}, year = {2005}, url = {http://search.ieice.org/bin/summary.php?id=e88-a\_1\_105\&\#38;category=D\&\#38;year=2005\&\#38;lang=E\&\#38;abst=}, timestamp = {Sat, 11 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieicet/Kunihiro05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/qic/TakahashiK05, author = {Yasuhiro Takahashi and Noboru Kunihiro}, title = {A linear-size quantum circuit for addition with no ancillary qubits}, journal = {Quantum Inf. Comput.}, volume = {5}, number = {6}, pages = {440--448}, year = {2005}, url = {https://doi.org/10.26421/QIC5.6-2}, doi = {10.26421/QIC5.6-2}, timestamp = {Fri, 30 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/qic/TakahashiK05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icisc/NaitoSKO05, author = {Yusuke Naito and Yu Sasaki and Noboru Kunihiro and Kazuo Ohta}, editor = {Dongho Won and Seungjoo Kim}, title = {Improved Collision Attack on {MD4} with Probability Almost 1}, booktitle = {Information Security and Cryptology - {ICISC} 2005, 8th International Conference, Seoul, Korea, December 1-2, 2005, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {3935}, pages = {129--145}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11734727\_12}, doi = {10.1007/11734727\_12}, timestamp = {Mon, 15 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icisc/NaitoSKO05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wisa/IzuKOS05, author = {Tetsuya Izu and Noboru Kunihiro and Kazuo Ohta and Takeshi Shimoyama}, editor = {JooSeok Song and Taekyoung Kwon and Moti Yung}, title = {Analysis on the Clockwise Transposition Routing for Dedicated Factoring Devices}, booktitle = {Information Security Applications, 6th International Workshop, {WISA} 2005, Jeju Island, Korea, August 22-24, 2005, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {3786}, pages = {232--242}, publisher = {Springer}, year = {2005}, url = {https://doi.org/10.1007/11604938\_18}, doi = {10.1007/11604938\_18}, timestamp = {Tue, 14 May 2019 10:00:35 +0200}, biburl = {https://dblp.org/rec/conf/wisa/IzuKOS05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/NaitoSKO05, author = {Yusuke Naito and Yu Sasaki and Noboru Kunihiro and Kazuo Ohta}, title = {Improved Collision Attack on {MD4}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {151}, year = {2005}, url = {http://eprint.iacr.org/2005/151}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/NaitoSKO05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/SasakiNKO05, author = {Yu Sasaki and Yusuke Naito and Noboru Kunihiro and Kazuo Ohta}, title = {Improved Collision Attack on {MD5}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {400}, year = {2005}, url = {http://eprint.iacr.org/2005/400}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/SasakiNKO05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ngc/KunihiroY03, author = {Noboru Kunihiro and Shigeru Yamashita}, title = {Efficient Algorithms for {NMR} Quantum Computers with Small Qubits}, journal = {New Gener. Comput.}, volume = {21}, number = {4}, pages = {329--337}, year = {2003}, url = {https://doi.org/10.1007/BF03037307}, doi = {10.1007/BF03037307}, timestamp = {Mon, 15 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ngc/KunihiroY03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ngc/OhtaNOK03, author = {Kazuo Ohta and Tetsuo Nishino and Seiya Okubo and Noboru Kunihiro}, title = {A Quantum Algorithm Using {NMR} Computers to Break Secret-Key Cryptosystems}, journal = {New Gener. Comput.}, volume = {21}, number = {4}, pages = {347--361}, year = {2003}, url = {https://doi.org/10.1007/BF03037309}, doi = {10.1007/BF03037309}, timestamp = {Mon, 15 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ngc/OhtaNOK03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/KoyamaTK99, author = {Kenji Koyama and Yukio Tsuruoka and Noboru Kunihiro}, editor = {Kwok{-}Yan Lam and Eiji Okamoto and Chaoping Xing}, title = {Modulus Search for Elliptic Curve Cryptosystems}, booktitle = {Advances in Cryptology - {ASIACRYPT} '99, International Conference on the Theory and Applications of Cryptology and Information Security, Singapore, November 14-18, 1999, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {1716}, pages = {1--7}, publisher = {Springer}, year = {1999}, url = {https://doi.org/10.1007/978-3-540-48000-6\_1}, doi = {10.1007/978-3-540-48000-6\_1}, timestamp = {Tue, 14 May 2019 10:00:40 +0200}, biburl = {https://dblp.org/rec/conf/asiacrypt/KoyamaTK99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/KunihiroK98, author = {Noboru Kunihiro and Kenji Koyama}, editor = {Kaisa Nyberg}, title = {Equivalence of Counting the Number of Points on Elliptic Curve over the Ring Z\({}_{\mbox{n}}\) and Factoring n}, booktitle = {Advances in Cryptology - {EUROCRYPT} '98, International Conference on the Theory and Application of Cryptographic Techniques, Espoo, Finland, May 31 - June 4, 1998, Proceeding}, series = {Lecture Notes in Computer Science}, volume = {1403}, pages = {47--58}, publisher = {Springer}, year = {1998}, url = {https://doi.org/10.1007/BFb0054116}, doi = {10.1007/BFB0054116}, timestamp = {Mon, 15 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/KunihiroK98.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.