Noboru Kunihiro

From MaRDI portal
Person:776376

Available identifiers

zbMath Open kunihiro.noboruMaRDI QIDQ776376

List of research outcomes





PublicationDate of PublicationType
Experiments and resource analysis of Shor's factorization using a quantum simulator2024-05-31Paper
Extended attacks on ECDSA with noisy multiple bit nonce leakages2024-05-31Paper
HS-based error correction algorithm for noisy binary GCD side-channel sequences2023-11-09Paper
d-Multiplicative Secret Sharing for Multipartite Adversary Structures2023-11-02Paper
Multiplicative and verifiably multiplicative secret sharing for multipartite adversary structures2023-04-28Paper
Bounds in Various Generalized Settings of the Discrete Logarithm Problem2022-07-01Paper
Efficient noise generation to achieve differential privacy with applications to secure multiparty computation2022-06-17Paper
Cryptanalysis of the RSA variant based on cubic Pell equation2021-10-06Paper
Recovering CRT-RSA secret keys from noisy square-and-multiply sequences in the sliding window method2021-06-08Paper
Quantum Factoring Algorithm: Resource Estimation and Survey of Experiments2021-02-25Paper
Certifying variant of RSA with generalized moduli2021-01-18Paper
Strong security of linear ramp secret sharing schemes with general access structures2020-10-07Paper
Extended partial key exposure attacks on RSA: improvement up to full size decryption exponents2020-09-17Paper
Improved CRT-RSA secret key recovery method from sliding window leakage2020-07-08Paper
Generic hardness of inversion on ring and its relation to self-bilinear map2020-04-21Paper
Worst case short lattice vector enumeration on block reduced bases of arbitrary blocksizes2020-03-23Paper
Improved Differential Fault Analysis on Camellia-1282019-12-05Paper
Attacking noisy secret CRT-RSA exponents in binary method2019-03-29Paper
Partial key exposure attacks on RSA: achieving the Boneh-Durfee bound2019-02-20Paper
Partial key exposure attacks on CRT-RSA: general improvement for the exposed least significant bits2018-10-18Paper
A Deterministic Algorithm for Computing Divisors in an Interval2018-09-26Paper
Cryptanalysis of RSA variants with modified Euler quotient2018-07-17Paper
Self-bilinear map on unknown order groups from indistinguishability obfuscation and its applications2018-01-05Paper
Improved factoring attacks on multi-prime RSA with small prime difference2017-08-25Paper
Solving the DLP with low Hamming weight product exponents and improved attacks on the GPS identification scheme2017-08-25Paper
A Tool Kit for Partial Key Exposure Attacks on RSA2017-04-12Paper
Improved Key Recovery Algorithms from Noisy RSA Secret Keys with Analog Noise2017-04-12Paper
Adversary-dependent lossy trapdoor function from hardness of factoring semi-smooth RSA subgroup moduli2016-10-27Paper
Partial key exposure attacks on RSA with multiple exponent pairs2016-09-02Paper
Generalized hardness assumption for self-bilinear map with auxiliary information2016-09-02Paper
Private information retrieval with preprocessing based on the approximate GCD problem2016-05-19Paper
Partial key exposure attacks on RSA: achieving the Boneh-Durfee bound2016-04-13Paper
How to generalize RSA cryptanalyses2016-04-13Paper
Partial key exposure attacks on CRT-RSA: better cryptanalysis to full size encryption exponents2016-03-10Paper
An improved attack for recovering noisy RSA secret keys and its countermeasure2016-01-27Paper
Constructing subspace membership encryption through inner product encryption2015-09-29Paper
General bounds for small inverse problems and its applications to multi-prime RSA2015-09-11Paper
RSA meets DPA: recovering RSA secret keys from noisy analog data2015-07-21Paper
On the security proof of an authentication protocol from Eurocrypt 20112015-05-27Paper
Chosen ciphertext security on hard membership decision groups: the case of semi-smooth subgroups of quadratic residues2014-10-14Paper
Factorization of Square-Free Integers with High Bits Known2014-08-21Paper
How to construct sufficient conditions for hash functions2014-08-21Paper
Self-bilinear map on unknown order groups from indistinguishability obfuscation and its applications2014-08-07Paper
Cryptanalysis of RSA with multiple small secret exponents2014-07-24Paper
A framework and compact constructions for non-monotonic attribute-based encryption2014-03-25Paper
Better lattice constructions for solving multivariate linear equations modulo unknown divisors2013-06-28Paper
Multi-differential Cryptanalysis on Reduced DM-PRESENT-80: Collisions and Other Differential Properties2013-06-04Paper
Recovering RSA secret keys from noisy key bits with erasures and errors2013-04-19Paper
Secret handshake scheme with request-based-revealing2013-03-28Paper
On optimal bounds of small inverse problems and approximate GCD problems with higher degree2012-11-09Paper
Symmetric inner-product predicate encryption based on three groups2012-11-06Paper
Optimal bounds for multi-prime \(\Phi \)-hiding assumption2012-09-07Paper
Faster algorithm for solving hard knapsacks for moderate message length2012-09-07Paper
Verifiable predicate encryption and applications to CCA security and anonymous predicate authentication2012-07-20Paper
Space efficient signature schemes from the RSA assumption2012-07-20Paper
Generic Construction of Chosen Ciphertext Secure Proxy Re-Encryption2012-06-08Paper
Two-dimensional representation of cover free families and its applications: short signatures and more2012-06-08Paper
A unified framework for small secret exponent attack on RSA2012-06-08Paper
Quantum addition circuits and unbounded fan-out2011-10-05Paper
Generic constructions for chosen-ciphertext secure attribute based encryption2011-03-15Paper
Toward an easy-to-understand structure for achieving chosen ciphertext security from the decisional Diffie-Hellman assumption2010-10-12Paper
A New Strategy for Finding a Differential Path of SHA-12009-03-06Paper
Sanitizable and Deletable Signature2009-02-24Paper
A fast quantum circuit for addition with few qubits2008-11-24Paper
New Message Difference for MD42008-09-16Paper
Provably Secure Electronic Cash Based on Blind Multisignature Schemes2008-09-09Paper
New Definition of Density on Knapsack Cryptosystems2008-06-13Paper
Password Recovery on Challenge and Response: Impossible Differential Attack on Hash Function2008-06-13Paper
Small Secret Key Attack on a Variant of RSA (Due to Takagi)2008-04-24Paper
Improved Collision Search for SHA-02008-04-24Paper
Security of MD5 Challenge and Response: Extension of APOP Password Recovery Attack2008-04-24Paper
New Key-Recovery Attacks on HMAC/NMAC-MD4 and NMAC-MD52008-04-15Paper
Deterministic Polynomial Time Equivalence Between Factoring and Key-Recovery Attack on Takagi’s RSA2007-09-04Paper
Information Security and Cryptology - ICISC 20052007-05-02Paper
Efficient algorithms for NMR quantum computers with small qubits2004-09-22Paper
https://portal.mardi4nfdi.de/entity/Q45024782000-09-12Paper
Equivalence of counting the number of points on elliptic curve over the ring Zn and factoring n1999-09-12Paper
https://portal.mardi4nfdi.de/entity/Q48606161996-01-16Paper

Research outcomes over time

This page was built for person: Noboru Kunihiro