Noboru Kunihiro

From MaRDI portal
Person:776376

Available identifiers

zbMath Open kunihiro.noboruMaRDI QIDQ776376

List of research outcomes





PublicationDate of PublicationType
Experiments and resource analysis of Shor's factorization using a quantum simulator2024-05-31Paper
Extended attacks on ECDSA with noisy multiple bit nonce leakages2024-05-31Paper
HS-based error correction algorithm for noisy binary GCD side-channel sequences2023-11-09Paper
d-Multiplicative Secret Sharing for Multipartite Adversary Structures2023-11-02Paper
Multiplicative and verifiably multiplicative secret sharing for multipartite adversary structures2023-04-28Paper
Bounds in Various Generalized Settings of the Discrete Logarithm Problem2022-07-01Paper
Efficient noise generation to achieve differential privacy with applications to secure multiparty computation2022-06-17Paper
Cryptanalysis of the RSA variant based on cubic Pell equation2021-10-06Paper
Recovering CRT-RSA secret keys from noisy square-and-multiply sequences in the sliding window method2021-06-08Paper
Quantum Factoring Algorithm: Resource Estimation and Survey of Experiments2021-02-25Paper
Certifying variant of RSA with generalized moduli2021-01-18Paper
Strong security of linear ramp secret sharing schemes with general access structures2020-10-07Paper
Extended partial key exposure attacks on RSA: improvement up to full size decryption exponents2020-09-17Paper
Improved CRT-RSA secret key recovery method from sliding window leakage2020-07-08Paper
Generic hardness of inversion on ring and its relation to self-bilinear map2020-04-21Paper
Worst case short lattice vector enumeration on block reduced bases of arbitrary blocksizes2020-03-23Paper
Improved Differential Fault Analysis on Camellia-1282019-12-05Paper
Attacking noisy secret CRT-RSA exponents in binary method2019-03-29Paper
Partial key exposure attacks on RSA: achieving the Boneh-Durfee bound2019-02-20Paper
Partial key exposure attacks on CRT-RSA: general improvement for the exposed least significant bits2018-10-18Paper
A Deterministic Algorithm for Computing Divisors in an Interval2018-09-26Paper
Cryptanalysis of RSA variants with modified Euler quotient2018-07-17Paper
Self-bilinear map on unknown order groups from indistinguishability obfuscation and its applications2018-01-05Paper
Improved factoring attacks on multi-prime RSA with small prime difference2017-08-25Paper
Solving the DLP with low Hamming weight product exponents and improved attacks on the GPS identification scheme2017-08-25Paper
A Tool Kit for Partial Key Exposure Attacks on RSA2017-04-12Paper
Improved Key Recovery Algorithms from Noisy RSA Secret Keys with Analog Noise2017-04-12Paper
Adversary-Dependent Lossy Trapdoor Function from Hardness of Factoring Semi-smooth RSA Subgroup Moduli2016-10-27Paper
Partial Key Exposure Attacks on RSA with Multiple Exponent Pairs2016-09-02Paper
Generalized Hardness Assumption for Self-bilinear Map with Auxiliary Information2016-09-02Paper
Private Information Retrieval with Preprocessing Based on the Approximate GCD Problem2016-05-19Paper
Partial Key Exposure Attacks on RSA: Achieving the Boneh-Durfee Bound2016-04-13Paper
How to Generalize RSA Cryptanalyses2016-04-13Paper
Partial Key Exposure Attacks on CRT-RSA: Better Cryptanalysis to Full Size Encryption Exponents2016-03-10Paper
An Improved Attack for Recovering Noisy RSA Secret Keys and Its Countermeasure2016-01-27Paper
Constructing Subspace Membership Encryption through Inner Product Encryption2015-09-29Paper
General Bounds for Small Inverse Problems and Its Applications to Multi-Prime RSA2015-09-11Paper
RSA Meets DPA: Recovering RSA Secret Keys from Noisy Analog Data2015-07-21Paper
On the Security Proof of an Authentication Protocol from Eurocrypt 20112015-05-27Paper
Chosen Ciphertext Security on Hard Membership Decision Groups: The Case of Semi-smooth Subgroups of Quadratic Residues2014-10-14Paper
Factorization of Square-Free Integers with High Bits Known2014-08-21Paper
How to Construct Sufficient Conditions for Hash Functions2014-08-21Paper
Self-bilinear Map on Unknown Order Groups from Indistinguishability Obfuscation and Its Applications2014-08-07Paper
Cryptanalysis of RSA with Multiple Small Secret Exponents2014-07-24Paper
A Framework and Compact Constructions for Non-monotonic Attribute-Based Encryption2014-03-25Paper
Better Lattice Constructions for Solving Multivariate Linear Equations Modulo Unknown Divisors2013-06-28Paper
Multi-differential Cryptanalysis on Reduced DM-PRESENT-80: Collisions and Other Differential Properties2013-06-04Paper
Recovering RSA Secret Keys from Noisy Key Bits with Erasures and Errors2013-04-19Paper
Secret handshake scheme with request-based-revealing2013-03-28Paper
On Optimal Bounds of Small Inverse Problems and Approximate GCD Problems with Higher Degree2012-11-09Paper
Symmetric Inner-Product Predicate Encryption Based on Three Groups2012-11-06Paper
Optimal Bounds for Multi-Prime Φ-Hiding Assumption2012-09-07Paper
Faster Algorithm for Solving Hard Knapsacks for Moderate Message Length2012-09-07Paper
Verifiable Predicate Encryption and Applications to CCA Security and Anonymous Predicate Authentication2012-07-20Paper
Space Efficient Signature Schemes from the RSA Assumption2012-07-20Paper
Generic Construction of Chosen Ciphertext Secure Proxy Re-Encryption2012-06-08Paper
Two-Dimensional Representation of Cover Free Families and Its Applications: Short Signatures and More2012-06-08Paper
A Unified Framework for Small Secret Exponent Attack on RSA2012-06-08Paper
https://portal.mardi4nfdi.de/entity/Q31716202011-10-05Paper
Generic Constructions for Chosen-Ciphertext Secure Attribute Based Encryption2011-03-15Paper
Toward an Easy-to-Understand Structure for Achieving Chosen Ciphertext Security from the Decisional Diffie-Hellman Assumption2010-10-12Paper
A New Strategy for Finding a Differential Path of SHA-12009-03-06Paper
Sanitizable and Deletable Signature2009-02-24Paper
https://portal.mardi4nfdi.de/entity/Q35408142008-11-24Paper
New Message Difference for MD42008-09-16Paper
Provably Secure Electronic Cash Based on Blind Multisignature Schemes2008-09-09Paper
New Definition of Density on Knapsack Cryptosystems2008-06-13Paper
Password Recovery on Challenge and Response: Impossible Differential Attack on Hash Function2008-06-13Paper
Small Secret Key Attack on a Variant of RSA (Due to Takagi)2008-04-24Paper
Improved Collision Search for SHA-02008-04-24Paper
Security of MD5 Challenge and Response: Extension of APOP Password Recovery Attack2008-04-24Paper
New Key-Recovery Attacks on HMAC/NMAC-MD4 and NMAC-MD52008-04-15Paper
Deterministic Polynomial Time Equivalence Between Factoring and Key-Recovery Attack on Takagi’s RSA2007-09-04Paper
Information Security and Cryptology - ICISC 20052007-05-02Paper
Efficient algorithms for NMR quantum computers with small qubits2004-09-22Paper
https://portal.mardi4nfdi.de/entity/Q45024782000-09-12Paper
Equivalence of counting the number of points on elliptic curve over the ring Zn and factoring n1999-09-12Paper
https://portal.mardi4nfdi.de/entity/Q48606161996-01-16Paper

Research outcomes over time

This page was built for person: Noboru Kunihiro