Noboru Kunihiro

From MaRDI portal
Person:776376

Available identifiers

zbMath Open kunihiro.noboruMaRDI QIDQ776376

List of research outcomes

PublicationDate of PublicationType
d-Multiplicative Secret Sharing for Multipartite Adversary Structures2023-11-02Paper
Multiplicative and verifiably multiplicative secret sharing for multipartite adversary structures2023-04-28Paper
Bounds in Various Generalized Settings of the Discrete Logarithm Problem2022-07-01Paper
Efficient noise generation to achieve differential privacy with applications to secure multiparty computation2022-06-17Paper
Cryptanalysis of the RSA variant based on cubic Pell equation2021-10-06Paper
Recovering CRT-RSA secret keys from noisy square-and-multiply sequences in the sliding window method2021-06-08Paper
Quantum Factoring Algorithm: Resource Estimation and Survey of Experiments2021-02-25Paper
Certifying variant of RSA with generalized moduli2021-01-18Paper
Strong security of linear ramp secret sharing schemes with general access structures2020-10-07Paper
Extended partial key exposure attacks on RSA: improvement up to full size decryption exponents2020-09-17Paper
Improved CRT-RSA secret key recovery method from sliding window leakage2020-07-08Paper
Generic hardness of inversion on ring and its relation to self-bilinear map2020-04-21Paper
Worst case short lattice vector enumeration on block reduced bases of arbitrary blocksizes2020-03-23Paper
Improved Differential Fault Analysis on Camellia-1282019-12-05Paper
Attacking noisy secret CRT-RSA exponents in binary method2019-03-29Paper
Partial key exposure attacks on RSA: achieving the Boneh-Durfee bound2019-02-20Paper
Partial key exposure attacks on CRT-RSA: general improvement for the exposed least significant bits2018-10-18Paper
A Deterministic Algorithm for Computing Divisors in an Interval2018-09-26Paper
Cryptanalysis of RSA variants with modified Euler quotient2018-07-17Paper
Self-bilinear map on unknown order groups from indistinguishability obfuscation and its applications2018-01-05Paper
Solving the DLP with low Hamming weight product exponents and improved attacks on the GPS identification scheme2017-08-25Paper
Improved factoring attacks on multi-prime RSA with small prime difference2017-08-25Paper
A Tool Kit for Partial Key Exposure Attacks on RSA2017-04-12Paper
Improved Key Recovery Algorithms from Noisy RSA Secret Keys with Analog Noise2017-04-12Paper
Adversary-Dependent Lossy Trapdoor Function from Hardness of Factoring Semi-smooth RSA Subgroup Moduli2016-10-27Paper
Partial Key Exposure Attacks on RSA with Multiple Exponent Pairs2016-09-02Paper
Generalized Hardness Assumption for Self-bilinear Map with Auxiliary Information2016-09-02Paper
Private Information Retrieval with Preprocessing Based on the Approximate GCD Problem2016-05-19Paper
Partial Key Exposure Attacks on RSA: Achieving the Boneh-Durfee Bound2016-04-13Paper
How to Generalize RSA Cryptanalyses2016-04-13Paper
Partial Key Exposure Attacks on CRT-RSA: Better Cryptanalysis to Full Size Encryption Exponents2016-03-10Paper
An Improved Attack for Recovering Noisy RSA Secret Keys and Its Countermeasure2016-01-27Paper
Constructing Subspace Membership Encryption through Inner Product Encryption2015-09-29Paper
General Bounds for Small Inverse Problems and Its Applications to Multi-Prime RSA2015-09-11Paper
RSA Meets DPA: Recovering RSA Secret Keys from Noisy Analog Data2015-07-21Paper
On the Security Proof of an Authentication Protocol from Eurocrypt 20112015-05-27Paper
Chosen Ciphertext Security on Hard Membership Decision Groups: The Case of Semi-smooth Subgroups of Quadratic Residues2014-10-14Paper
Factorization of Square-Free Integers with High Bits Known2014-08-21Paper
How to Construct Sufficient Conditions for Hash Functions2014-08-21Paper
Self-bilinear Map on Unknown Order Groups from Indistinguishability Obfuscation and Its Applications2014-08-07Paper
Cryptanalysis of RSA with Multiple Small Secret Exponents2014-07-24Paper
A Framework and Compact Constructions for Non-monotonic Attribute-Based Encryption2014-03-25Paper
Better Lattice Constructions for Solving Multivariate Linear Equations Modulo Unknown Divisors2013-06-28Paper
Multi-differential Cryptanalysis on Reduced DM-PRESENT-80: Collisions and Other Differential Properties2013-06-04Paper
Recovering RSA Secret Keys from Noisy Key Bits with Erasures and Errors2013-04-19Paper
Secret handshake scheme with request-based-revealing2013-03-28Paper
On Optimal Bounds of Small Inverse Problems and Approximate GCD Problems with Higher Degree2012-11-09Paper
Symmetric Inner-Product Predicate Encryption Based on Three Groups2012-11-06Paper
Optimal Bounds for Multi-Prime Φ-Hiding Assumption2012-09-07Paper
Faster Algorithm for Solving Hard Knapsacks for Moderate Message Length2012-09-07Paper
Space Efficient Signature Schemes from the RSA Assumption2012-07-20Paper
Verifiable Predicate Encryption and Applications to CCA Security and Anonymous Predicate Authentication2012-07-20Paper
A Unified Framework for Small Secret Exponent Attack on RSA2012-06-08Paper
Two-Dimensional Representation of Cover Free Families and Its Applications: Short Signatures and More2012-06-08Paper
Generic Construction of Chosen Ciphertext Secure Proxy Re-Encryption2012-06-08Paper
https://portal.mardi4nfdi.de/entity/Q31716202011-10-05Paper
Generic Constructions for Chosen-Ciphertext Secure Attribute Based Encryption2011-03-15Paper
Toward an Easy-to-Understand Structure for Achieving Chosen Ciphertext Security from the Decisional Diffie-Hellman Assumption2010-10-12Paper
A New Strategy for Finding a Differential Path of SHA-12009-03-06Paper
Sanitizable and Deletable Signature2009-02-24Paper
https://portal.mardi4nfdi.de/entity/Q35408142008-11-24Paper
New Message Difference for MD42008-09-16Paper
Provably Secure Electronic Cash Based on Blind Multisignature Schemes2008-09-09Paper
New Definition of Density on Knapsack Cryptosystems2008-06-13Paper
Password Recovery on Challenge and Response: Impossible Differential Attack on Hash Function2008-06-13Paper
Security of MD5 Challenge and Response: Extension of APOP Password Recovery Attack2008-04-24Paper
Small Secret Key Attack on a Variant of RSA (Due to Takagi)2008-04-24Paper
Improved Collision Search for SHA-02008-04-24Paper
New Key-Recovery Attacks on HMAC/NMAC-MD4 and NMAC-MD52008-04-15Paper
Deterministic Polynomial Time Equivalence Between Factoring and Key-Recovery Attack on Takagi’s RSA2007-09-04Paper
Information Security and Cryptology - ICISC 20052007-05-02Paper
Efficient algorithms for NMR quantum computers with small qubits2004-09-22Paper
https://portal.mardi4nfdi.de/entity/Q45024782000-09-12Paper
Equivalence of counting the number of points on elliptic curve over the ring Zn and factoring n1999-09-12Paper
https://portal.mardi4nfdi.de/entity/Q48606161996-01-16Paper

Research outcomes over time


Doctoral students

No records found.


Known relations from the MaRDI Knowledge Graph

PropertyValue
MaRDI profile typeMaRDI person profile
instance ofhuman


This page was built for person: Noboru Kunihiro