What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Noboru Kunihiro
Google Scholar
76
publications in security and cryptology related venues
Year
Venue
Title
2025
conf/acisp
Solving Generalized Approximate Divisor Multiples Problems.
Naoki Shimoe
Noboru Kunihiro
2025
conf/acns
Key Recovery Attacks on Unpatched MEGA from Four Queries: Solving Approximate Divisor Problem with Help of Approximation of Squared Divisor.
Naoki Shimoe
Noboru Kunihiro
2025
conf/icbc2
Converting Fuzzy Signatures into Anonymizable Signatures using Zero-Knowledge Proof.
Ken Naganuma
Shingo Akata
Masayuki Yoshino
Noboru Kunihiro
Non Kawana
Wataru Nakamura
Kenta Takahashi
Takayuki Suzuki
2024
conf/icisc
Experimental Analysis of the Optimization-Based Factorization Algorithm.
Junpei Yamaguchi
Tetsuya Izu
Noboru Kunihiro
2024
conf/sacrypt
Bias from Uniform Nonce: Revised Fourier Analysis-Based Attack on ECDSA.
Shunsuke Osaki
Noboru Kunihiro
2023
conf/acns
HS-Based Error Correction Algorithm for Noisy Binary GCD Side-Channel Sequences.
Kenta Tani
Noboru Kunihiro
2023
conf/icisc
Extended Attacks on ECDSA with Noisy Multiple Bit Nonce Leakages.
Shunsuke Osaki
Noboru Kunihiro
2023
conf/icisc
Experiments and Resource Analysis of Shor's Factorization Using a Quantum Simulator.
Junpei Yamaguchi
Masafumi Yamazaki
Akihiro Tabuchi
Takumi Honda
Tetsuya Izu
Noboru Kunihiro
2021
conf/fc
Efficient Noise Generation to Achieve Differential Privacy with Applications to Secure Multiparty Computation.
Reo Eriguchi
Atsunori Ichikawa
Noboru Kunihiro
Koji Nuida
2020
conf/acisp
Recovering CRT-RSA Secret Keys from Noisy Square-and-Multiply Sequences in the Sliding Window Method.
Kento Oonishi
Noboru Kunihiro
2020
conf/asiajcis
New Secret Key Management Technology for Blockchains from Biometrics Fuzzy Signature.
Ken Naganuma
Takayuki Suzuki
Masayuki Yoshino
Kenta Takahashi
Yosuke Kaga
Noboru Kunihiro
2020
conf/asiajcis
Post-Quantum zk-SNARK for Arithmetic Circuits using QAPs.
Ken Naganuma
Masayuki Yoshino
Atsuo Inoue
Yukinori Matsuoka
Mineaki Okazaki
Noboru Kunihiro
2020
conf/asiajcis
Practical Query-based Order Revealing Encryption from Symmetric Searchable Encryption.
Masayuki Yoshino
Ken Naganuma
Noboru Kunihiro
Hisayoshi Sato
2019
conf/icisc
Improved CRT-RSA Secret Key Recovery Method from Sliding Window Leakage.
Kento Oonishi
Xiaoxuan Huang
Noboru Kunihiro
2018
conf/acisp
A Deterministic Algorithm for Computing Divisors in an Interval.
Liqiang Peng
Yao Lu
Noboru Kunihiro
Rui Zhang
Lei Hu
2018
conf/icisc
Attacking Noisy Secret CRT-RSA Exponents in Binary Method.
Kento Oonishi
Noboru Kunihiro
2018
conf/icics
Certifying Variant of RSA with Generalized Moduli.
Yao Lu
Noboru Kunihiro
Rui Zhang
Liqiang Peng
Hui Ma
2018
conf/iwsec
Inference Attacks on Encrypted Databases Based on Order Preserving Assignment Problem.
Sota Onozawa
Noboru Kunihiro
Masayuki Yoshino
Ken Naganuma
2018
conf/africacrypt
Cryptanalysis of RSA Variants with Modified Euler Quotient.
Mengce Zheng
Noboru Kunihiro
Honggang Hu
2017
conf/ccs
Mis-operation Resistant Searchable Homomorphic Encryption.
Keita Emura
Takuya Hayashi
Noboru Kunihiro
Jun Sakuma
2017
conf/acisp
Improved Factoring Attacks on Multi-prime RSA with Small Prime Difference.
Mengce Zheng
Noboru Kunihiro
Honggang Hu
2017
conf/acisp
Solving the DLP with Low Hamming Weight Product Exponents and Improved Attacks on the GPS Identification Scheme.
Jason H. M. Ying
Noboru Kunihiro
2017
conf/acns
Bounds in Various Generalized Settings of the Discrete Logarithm Problem.
Jason H. M. Ying
Noboru Kunihiro
2017
conf/ctrsa
A Tool Kit for Partial Key Exposure Attacks on RSA.
Atsushi Takayasu
Noboru Kunihiro
2017
conf/ctrsa
Improved Key Recovery Algorithms from Noisy RSA Secret Keys with Analog Noise.
Noboru Kunihiro
Yuki Takahashi
2016
conf/acisp
Generalized Hardness Assumption for Self-bilinear Map with Auxiliary Information.
Takashi Yamakawa
Goichiro Hanaoka
Noboru Kunihiro
2016
conf/acisp
Partial Key Exposure Attacks on RSA with Multiple Exponent Pairs.
Atsushi Takayasu
Noboru Kunihiro
2016
conf/asiajcis
Partial Server Side Parameter Selection in Private Information Retrieval.
Thomas Vannet
Noboru Kunihiro
2016
conf/crypto
Adversary-Dependent Lossy Trapdoor Function from Hardness of Factoring Semi-smooth RSA Subgroup Moduli.
Takashi Yamakawa
Shota Yamada
Goichiro Hanaoka
Noboru Kunihiro
2016
conf/pkc
How to Generalize RSA Cryptanalyses.
Atsushi Takayasu
Noboru Kunihiro
2015
conf/acns
Partial Key Exposure Attacks on CRT-RSA: Better Cryptanalysis to Full Size Encryption Exponents.
Atsushi Takayasu
Noboru Kunihiro
2015
conf/icisc
Maximum Likelihood-Based Key Recovery Algorithm from Decayed Key Schedules.
Tomoyuki Tanigaki
Noboru Kunihiro
2015
conf/provsec
An Improved Attack for Recovering Noisy RSA Secret Keys and Its Countermeasure.
Noboru Kunihiro
2015
conf/sacrypt
Private Information Retrieval with Preprocessing Based on the Approximate GCD Problem.
Thomas Vannet
Noboru Kunihiro
2014
conf/acisp
Cryptanalysis of RSA with Multiple Small Secret Exponents.
Atsushi Takayasu
Noboru Kunihiro
2014
conf/crypto
Self-bilinear Map on Unknown Order Groups from Indistinguishability Obfuscation and Its Applications.
Takashi Yamakawa
Shota Yamada
Goichiro Hanaoka
Noboru Kunihiro
2014
conf/icisc
General Bounds for Small Inverse Problems and Its Applications to Multi-Prime RSA.
Atsushi Takayasu
Noboru Kunihiro
2014
conf/provsec
Constructing Subspace Membership Encryption through Inner Product Encryption.
Shuichi Katsumata
Noboru Kunihiro
2014
conf/ches
RSA Meets DPA: Recovering RSA Secret Keys from Noisy Analog Data.
Noboru Kunihiro
Junya Honda
2014
conf/pkc
A Framework and Compact Constructions for Non-monotonic Attribute-Based Encryption.
Shota Yamada
Nuttapong Attrapadung
Goichiro Hanaoka
Noboru Kunihiro
2014
conf/iwsec
On the Security Proof of an Authentication Protocol from Eurocrypt 2011.
Kosei Endo
Noboru Kunihiro
2014
conf/sacrypt
Partial Key Exposure Attacks on RSA: Achieving the Boneh-Durfee Bound.
Atsushi Takayasu
Noboru Kunihiro
2013
conf/ccs
Efficient variants of the Naor-Yung and Dolev-Dwork-Naor transforms for CCA secure key encapsulation mechanism.
Takashi Yamakawa
Shota Yamada
Takahiro Matsuda
Goichiro Hanaoka
Noboru Kunihiro
2013
conf/acisp
Better Lattice Constructions for Solving Multivariate Linear Equations Modulo Unknown Divisors.
Atsushi Takayasu
Noboru Kunihiro
2013
conf/pkc
Recovering RSA Secret Keys from Noisy Key Bits with Erasures and Errors.
Noboru Kunihiro
Naoyuki Shinohara
Tetsuya Izu
2012
conf/acisp
Optimal Bounds for Multi-Prime Φ-Hiding Assumption.
Kaori Tosu
Noboru Kunihiro
2012
conf/acisp
Faster Algorithm for Solving Hard Knapsacks for Moderate Message Length.
Yuji Nagashima
Noboru Kunihiro
2012
conf/icisc
Multi-differential Cryptanalysis on Reduced DM-PRESENT-80: Collisions and Other Differential Properties.
Takuma Koyama
Yu Sasaki
Noboru Kunihiro
2012
conf/provsec
Symmetric Inner-Product Predicate Encryption Based on Three Groups.
Masayuki Yoshino
Noboru Kunihiro
Ken Naganuma
Hisayoshi Sato
2012
conf/pkc
Verifiable Predicate Encryption and Applications to CCA Security and Anonymous Predicate Authentication.
Shota Yamada
Nuttapong Attrapadung
Bagus Santoso
Jacob C. N. Schuldt
Goichiro Hanaoka
Noboru Kunihiro
2012
conf/pkc
Space Efficient Signature Schemes from the RSA Assumption.
Shota Yamada
Goichiro Hanaoka
Noboru Kunihiro
2012
conf/ctrsa
Generic Construction of Chosen Ciphertext Secure Proxy Re-Encryption.
Goichiro Hanaoka
Yutaka Kawai
Noboru Kunihiro
Takahiro Matsuda
Jian Weng
Rui Zhang
Yunlei Zhao
2012
conf/ctrsa
Two-Dimensional Representation of Cover Free Families and Its Applications: Short Signatures and More.
Shota Yamada
Goichiro Hanaoka
Noboru Kunihiro
2011
conf/wisa
Generalized Security Analysis of the Random Key Bits Leakage Attack.
Jun Kogure
Noboru Kunihiro
Hirosuke Yamamoto
2011
conf/pkc
Generic Constructions for Chosen-Ciphertext Secure Attribute Based Encryption.
Shota Yamada
Nuttapong Attrapadung
Goichiro Hanaoka
Noboru Kunihiro
2011
conf/sacrypt
A Unified Framework for Small Secret Exponent Attack on RSA.
Noboru Kunihiro
Naoyuki Shinohara
Tetsuya Izu
2010
conf/acisp
Solving Generalized Small Inverse Problems.
Noboru Kunihiro
2010
conf/provsec
Toward an Easy-to-Understand Structure for Achieving Chosen Ciphertext Security from the Decisional Diffie-Hellman Assumption.
Shota Yamada
Goichiro Hanaoka
Noboru Kunihiro
2008
conf/ccs
A strict evaluation method on the number of conditions for the SHA-1 collision search.
Jun Yajima
Terutoshi Iwasaki
Yusuke Naito
Yu Sasaki
Takeshi Shimoyama
Noboru Kunihiro
Kazuo Ohta
2008
conf/wisa
Sanitizable and Deletable Signature.
Tetsuya Izu
Noboru Kunihiro
Kazuo Ohta
Makoto Sano
Masahiko Takenaka
2008
conf/wisa
Extension of Secret Handshake Protocols with Multiple Groups in Monotone Condition.
Yutaka Kawai
Shotaro Tanno
Takahiro Kondo
Kazuki Yoneyama
Noboru Kunihiro
Kazuo Ohta
2008
conf/ctrsa
Small Secret Key Attack on a Variant of RSA (Due to Takagi).
Kouichi Itoh
Noboru Kunihiro
Kaoru Kurosawa
2008
conf/ctrsa
Security of MD5 Challenge and Response: Extension of APOP Password Recovery Attack.
Yu Sasaki
Lei Wang
Kazuo Ohta
Noboru Kunihiro
2008
conf/eurocrypt
New Key-Recovery Attacks on HMAC/NMAC-MD4 and NMAC-MD5.
Lei Wang
Kazuo Ohta
Noboru Kunihiro
2008
conf/africacrypt
Password Recovery on Challenge and Response: Impossible Differential Attack on Hash Function.
Yu Sasaki
Lei Wang
Kazuo Ohta
Noboru Kunihiro
2008
conf/africacrypt
New Definition of Density on Knapsack Cryptosystems.
Noboru Kunihiro
2007
conf/fse
New Message Difference for MD4.
Yu Sasaki
Lei Wang
Kazuo Ohta
Noboru Kunihiro
2007
conf/acisp
A New Strategy for Finding a Differential Path of SHA-1.
Jun Yajima
Yu Sasaki
Yusuke Naito
Terutoshi Iwasaki
Takeshi Shimoyama
Noboru Kunihiro
Kazuo Ohta
2007
conf/pkc
Deterministic Polynomial Time Equivalence Between Factoring and Key-Recovery Attack on Takagi's RSA.
Noboru Kunihiro
Kaoru Kurosawa
2006
conf/ccs
Problems on the MR micropayment schemes.
Masahiro Mambo
Moisés Salinas-Rosales
Kazuo Ohta
Noboru Kunihiro
2006
conf/fc
Provably Secure Electronic Cash Based on Blind Multisignature Schemes.
Yoshikazu Hanatani
Yuichi Komano
Kazuo Ohta
Noboru Kunihiro
2006
conf/asiacrypt
Improved Collision Search for SHA-0.
Yusuke Naito
Yu Sasaki
Takeshi Shimoyama
Jun Yajima
Noboru Kunihiro
Kazuo Ohta
2005
conf/icisc
Improved Collision Attack on MD4 with Probability Almost 1.
Yusuke Naito
Yu Sasaki
Noboru Kunihiro
Kazuo Ohta
2005
conf/wisa
Analysis on the Clockwise Transposition Routing for Dedicated Factoring Devices.
Tetsuya Izu
Noboru Kunihiro
Kazuo Ohta
Takeshi Shimoyama
1999
conf/asiacrypt
Modulus Search for Elliptic Curve Cryptosystems.
Kenji Koyama
Yukio Tsuruoka
Noboru Kunihiro
1998
conf/eurocrypt
Equivalence of Counting the Number of Points on Elliptic Curve over the Ring Z<sub>n</sub> and Factoring n.
Noboru Kunihiro
Kenji Koyama
Coauthors
Akihiro Tabuchi
(1)
Atsunori Ichikawa
(1)
Atsuo Inoue
(1)
Atsushi Takayasu
(8)
Bagus Santoso
(1)
Goichiro Hanaoka
(11)
Hirosuke Yamamoto
(1)
Hisayoshi Sato
(2)
Honggang Hu
(2)
Hui Ma
(1)
Jacob C. N. Schuldt
(1)
Jason H. M. Ying
(2)
Jian Weng
(1)
Jun Kogure
(1)
Jun Sakuma
(1)
Jun Yajima
(3)
Junpei Yamaguchi
(2)
Junya Honda
(1)
Kaori Tosu
(1)
Kaoru Kurosawa
(2)
Kazuki Yoneyama
(1)
Kazuo Ohta
(13)
Keita Emura
(1)
Ken Naganuma
(6)
Kenji Koyama
(2)
Kenta Takahashi
(2)
Kenta Tani
(1)
Kento Oonishi
(3)
Koji Nuida
(1)
Kosei Endo
(1)
Kouichi Itoh
(1)
Lei Hu
(1)
Lei Wang
(4)
Liqiang Peng
(2)
Makoto Sano
(1)
Masafumi Yamazaki
(1)
Masahiko Takenaka
(1)
Masahiro Mambo
(1)
Masayuki Yoshino
(6)
Mengce Zheng
(2)
Mineaki Okazaki
(1)
Moisés Salinas-Rosales
(1)
Naoki Shimoe
(2)
Naoyuki Shinohara
(2)
Noboru Kunihiro
(76)
Non Kawana
(1)
Nuttapong Attrapadung
(3)
Reo Eriguchi
(1)
Rui Zhang
(3)
Shingo Akata
(1)
Shota Yamada
(9)
Shotaro Tanno
(1)
Shuichi Katsumata
(1)
Shunsuke Osaki
(2)
Sota Onozawa
(1)
Takahiro Kondo
(1)
Takahiro Matsuda
(2)
Takashi Yamakawa
(4)
Takayuki Suzuki
(2)
Takeshi Shimoyama
(4)
Takuma Koyama
(1)
Takumi Honda
(1)
Takuya Hayashi
(1)
Terutoshi Iwasaki
(2)
Tetsuya Izu
(6)
Thomas Vannet
(2)
Tomoyuki Tanigaki
(1)
Wataru Nakamura
(1)
Xiaoxuan Huang
(1)
Yao Lu
(2)
Yoshikazu Hanatani
(1)
Yosuke Kaga
(1)
Yu Sasaki
(8)
Yuichi Komano
(1)
Yuji Nagashima
(1)
Yuki Takahashi
(1)
Yukinori Matsuoka
(1)
Yukio Tsuruoka
(1)
Yunlei Zhao
(1)
Yusuke Naito
(4)
Yutaka Kawai
(2)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to