default search action
Noboru Kunihiro
- > Home > Persons > Noboru Kunihiro
Publications
- 2016
- [j37]Yutaka Kawai, Goichiro Hanaoka, Kazuo Ohta, Noboru Kunihiro:
A limitation on security evaluation of cryptographic primitives with fixed keys. Secur. Commun. Networks 9(12): 1663-1675 (2016) - 2011
- [c30]Tetsuya Izu, Masami Izumi, Noboru Kunihiro, Kazuo Ohta:
Yet Another Sanitizable and Deletable Signatures. AINA Workshops 2011: 574-579 - 2010
- [j25]Yu Sasaki, Lei Wang, Kazuo Ohta, Kazumaro Aoki, Noboru Kunihiro:
Practical Password Recovery Attacks on MD4 Based Prefix and Hybrid Authentication Protocols. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 93-A(1): 84-92 (2010) - [j24]Lei Wang, Kazuo Ohta, Yu Sasaki, Kazuo Sakiyama, Noboru Kunihiro:
Cryptanalysis of Two MD5-Based Authentication Protocols: APOP and NMAC. IEICE Trans. Inf. Syst. 93-D(5): 1087-1095 (2010) - [j22]Yutaka Kawai, Shotaro Tanno, Takahiro Kondo, Kazuki Yoneyama, Kazuo Ohta, Noboru Kunihiro:
Extension of Secret Handshake Protocols with Multiple Groups in Monotone Condition. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 93-A(6): 1122-1131 (2010) - [c24]Naoyuki Hirota, Tetsuya Izu, Noboru Kunihiro, Kazuo Ohta:
An Evaluation of the Sieving Device YASD for 1024-Bit Integers. NBiS 2010: 546-551 - 2009
- [j18]Lei Wang, Kazuo Ohta, Noboru Kunihiro:
Near-Collision Attacks on MD4: Applied to MD4-Based Protocols. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 92-A(1): 76-86 (2009) - [j17]Jun Yajima, Terutoshi Iwasaki, Yusuke Naito, Yu Sasaki, Takeshi Shimoyama, Thomas Peyrin, Noboru Kunihiro, Kazuo Ohta:
A Strict Evaluation on the Number of Conditions for SHA-1 Collision Search. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 92-A(1): 87-95 (2009) - [j16]Yu Sasaki, Lei Wang, Kazuo Ohta, Noboru Kunihiro:
Extended Password Recovery Attacks against APOP, SIP, and Digest Authentication. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 92-A(1): 96-104 (2009) - [c22]Tetsuya Izu, Noboru Kunihiro, Kazuo Ohta, Makoto Sano, Masahiko Takenaka:
Yet Another Sanitizable Signature from Bilinear Maps. ARES 2009: 941-946 - 2008
- [j15]Yusuke Naito, Kazuo Ohta, Noboru Kunihiro:
Improved Collision Search for Hash Functions: New Advanced Message Modification. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 91-A(1): 46-54 (2008) - [j14]Yu Sasaki, Lei Wang, Noboru Kunihiro, Kazuo Ohta:
New Message Differences for Collision Attacks on MD4 and MD5. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 91-A(1): 55-63 (2008) - [j13]Bagus Santoso, Noboru Kunihiro, Naoki Kanayama, Kazuo Ohta:
Factorization of Square-Free Integers with High Bits Known. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 91-A(1): 306-315 (2008) - [c20]Yu Sasaki, Lei Wang, Kazuo Ohta, Noboru Kunihiro:
Password Recovery on Challenge and Response: Impossible Differential Attack on Hash Function. AFRICACRYPT 2008: 290-307 - [c19]Jun Yajima, Terutoshi Iwasaki, Yusuke Naito, Yu Sasaki, Takeshi Shimoyama, Noboru Kunihiro, Kazuo Ohta:
A strict evaluation method on the number of conditions for the SHA-1 collision search. AsiaCCS 2008: 10-20 - [c18]Yu Sasaki, Lei Wang, Kazuo Ohta, Noboru Kunihiro:
Security of MD5 Challenge and Response: Extension of APOP Password Recovery Attack. CT-RSA 2008: 1-18 - [c16]Lei Wang, Kazuo Ohta, Noboru Kunihiro:
New Key-Recovery Attacks on HMAC/NMAC-MD4 and NMAC-MD5. EUROCRYPT 2008: 237-253 - [c15]Tetsuya Izu, Noboru Kunihiro, Kazuo Ohta, Makoto Sano, Masahiko Takenaka:
Sanitizable and Deletable Signature. WISA 2008: 130-144 - [c14]Yutaka Kawai, Shotaro Tanno, Takahiro Kondo, Kazuki Yoneyama, Noboru Kunihiro, Kazuo Ohta:
Extension of Secret Handshake Protocols with Multiple Groups in Monotone Condition. WISA 2008: 160-173 - 2007
- [j10]Yu Sasaki, Yusuke Naito, Noboru Kunihiro, Kazuo Ohta:
Improved Collision Attacks on MD4 and MD5. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 90-A(1): 36-47 (2007) - [j9]Yoshikazu Hanatani, Yuichi Komano, Kazuo Ohta, Noboru Kunihiro:
Provably Secure Untraceable Electronic Cash against Insider Attacks. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 90-A(5): 980-991 (2007) - [j8]Yasuhiro Takahashi, Noboru Kunihiro, Kazuo Ohta:
The quantum fourier transform on a linear nearest neighbor architecture. Quantum Inf. Comput. 7(4): 383-391 (2007) - [c13]Jun Yajima, Yu Sasaki, Yusuke Naito, Terutoshi Iwasaki, Takeshi Shimoyama, Noboru Kunihiro, Kazuo Ohta:
A New Strategy for Finding a Differential Path of SHA-1. ACISP 2007: 45-58 - [c12]Yu Sasaki, Lei Wang, Kazuo Ohta, Noboru Kunihiro:
New Message Difference for MD4. FSE 2007: 329-348 - [c11]Tetsuya Izu, Noboru Kunihiro, Kazuo Ohta, Masahiko Takenaka, Takashi Yoshioka:
A Sanitizable Signature Scheme with Aggregation. ISPEC 2007: 51-64 - 2006
- [j7]Mitsugu Iwamoto, Lei Wang, Kazuki Yoneyama, Noboru Kunihiro, Kazuo Ohta:
Visual Secret Sharing Schemes for Multiple Secret Images Allowing the Rotation of Shares. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 89-A(5): 1382-1395 (2006) - [j6]Noboru Kunihiro, Wataru Abe, Kazuo Ohta:
Maurer-Yacobi ID-Based Key Distribution Revisited. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 89-A(5): 1421-1424 (2006) - [c9]Yusuke Naito, Yu Sasaki, Takeshi Shimoyama, Jun Yajima, Noboru Kunihiro, Kazuo Ohta:
Improved Collision Search for SHA-0. ASIACRYPT 2006: 21-36 - [c8]Masahiro Mambo, Moisés Salinas-Rosales, Kazuo Ohta, Noboru Kunihiro:
Problems on the MR micropayment schemes. AsiaCCS 2006: 363 - [c7]Yoshikazu Hanatani, Yuichi Komano, Kazuo Ohta, Noboru Kunihiro:
Provably Secure Electronic Cash Based on Blind Multisignature Schemes. Financial Cryptography 2006: 236-250 - [c6]Bagus Santoso, Noboru Kunihiro, Naoki Kanayama, Kazuo Ohta:
Factorization of Square-Free Integers with High Bits Known. VIETCRYPT 2006: 115-130 - [c5]Yu Sasaki, Yusuke Naito, Jun Yajima, Takeshi Shimoyama, Noboru Kunihiro, Kazuo Ohta:
How to Construct Sufficient Conditions for Hash Functions. VIETCRYPT 2006: 243-259 - [i4]Yusuke Naito, Yu Sasaki, Takeshi Shimoyama, Jun Yajima, Noboru Kunihiro, Kazuo Ohta:
Message Modification for Step 21-23 on SHA-0. IACR Cryptol. ePrint Arch. 2006: 16 (2006) - [i3]Yu Sasaki, Yusuke Naito, Jun Yajima, Takeshi Shimoyama, Noboru Kunihiro, Kazuo Ohta:
How to Construct Sufficient Condition in Searching Collisions of MD5. IACR Cryptol. ePrint Arch. 2006: 74 (2006) - 2005
- [c4]Yusuke Naito, Yu Sasaki, Noboru Kunihiro, Kazuo Ohta:
Improved Collision Attack on MD4 with Probability Almost 1. ICISC 2005: 129-145 - [c3]Tetsuya Izu, Noboru Kunihiro, Kazuo Ohta, Takeshi Shimoyama:
Analysis on the Clockwise Transposition Routing for Dedicated Factoring Devices. WISA 2005: 232-242 - [i2]Yusuke Naito, Yu Sasaki, Noboru Kunihiro, Kazuo Ohta:
Improved Collision Attack on MD4. IACR Cryptol. ePrint Arch. 2005: 151 (2005) - [i1]Yu Sasaki, Yusuke Naito, Noboru Kunihiro, Kazuo Ohta:
Improved Collision Attack on MD5. IACR Cryptol. ePrint Arch. 2005: 400 (2005) - 2003
- [j1]Kazuo Ohta, Tetsuo Nishino, Seiya Okubo, Noboru Kunihiro:
A Quantum Algorithm Using NMR Computers to Break Secret-Key Cryptosystems. New Gener. Comput. 21(4): 347-361 (2003)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-08-05 21:11 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint