Noboru Kunihiro
Orcid: 0000-0003-1822-7476
According to our database1,
Noboru Kunihiro
authored at least 141 papers
between 1998 and 2023.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2023
Multiplicative and verifiably multiplicative secret sharing for multipartite adversary structures.
Des. Codes Cryptogr., May, 2023
Linear Algebraic Approach to Strongly Secure Ramp Secret Sharing for General Access Structures with Application to Symmetric PIR.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., March, 2023
Efficient Noise Generation Protocols for Differentially Private Multiparty Computation.
IEEE Trans. Dependable Secur. Comput., 2023
IACR Cryptol. ePrint Arch., 2023
Proceedings of the Information Security and Cryptology - ICISC 2023, 2023
Proceedings of the Information Security and Cryptology - ICISC 2023, 2023
Proceedings of the Applied Cryptography and Network Security, 2023
2022
Editor's Message to Special Issue of Computer Security Technologies for Quantum-Safe World.
J. Inf. Process., 2022
2021
Theor. Comput. Sci., 2021
Efficient Noise Generation to Achieve Differential Privacy with Applications to Secure Multiparty Computation.
Proceedings of the Financial Cryptography and Data Security, 2021
2020
Theor. Comput. Sci., 2020
Extended partial key exposure attacks on RSA: Improvement up to full size decryption exponents.
Theor. Comput. Sci., 2020
Strong security of linear ramp secret sharing schemes with general access structures.
Inf. Process. Lett., 2020
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2020
Worst case short lattice vector enumeration on block reduced bases of arbitrary blocksizes.
Discret. Appl. Math., 2020
A Linear Algebraic Approach to Strongly Secure Ramp Secret Sharing for General Access Structures.
Proceedings of the International Symposium on Information Theory and Its Applications, 2020
Proceedings of the 1st Conference on Information-Theoretic Cryptography, 2020
Practical Query-based Order Revealing Encryption from Symmetric Searchable Encryption.
Proceedings of the 15th Asia Joint Conference on Information Security, 2020
Proceedings of the 15th Asia Joint Conference on Information Security, 2020
New Secret Key Management Technology for Blockchains from Biometrics Fuzzy Signature.
Proceedings of the 15th Asia Joint Conference on Information Security, 2020
Recovering CRT-RSA Secret Keys from Noisy Square-and-Multiply Sequences in the Sliding Window Method.
Proceedings of the Information Security and Privacy - 25th Australasian Conference, 2020
2019
Theor. Comput. Sci., 2019
Proceedings of the 2019 IEEE Information Theory Workshop, 2019
Proceedings of the IEEE International Symposium on Information Theory, 2019
Proceedings of the Information Security and Cryptology - ICISC 2019, 2019
2018
Proceedings of the 17th IEEE International Conference On Trust, 2018
Inference Attacks on Encrypted Databases Based on Order Preserving Assignment Problem.
Proceedings of the Advances in Information and Computer Security, 2018
Proceedings of the International Symposium on Information Theory and Its Applications, 2018
Proceedings of the International Symposium on Information Theory and Its Applications, 2018
Proceedings of the Information Security and Cryptology - ICISC 2018, 2018
Proceedings of the Information and Communications Security - 20th International Conference, 2018
Proceedings of the Progress in Cryptology - AFRICACRYPT 2018, 2018
Proceedings of the Information Security and Privacy - 23rd Australasian Conference, 2018
2017
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2017
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2017
Self-Bilinear Map on Unknown Order Groups from Indistinguishability Obfuscation and Its Applications.
Algorithmica, 2017
Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security, 2017
Proceedings of the Applied Cryptography and Network Security, 2017
Proceedings of the Information Security and Privacy - 22nd Australasian Conference, 2017
Solving the DLP with Low Hamming Weight Product Exponents and Improved Attacks on the GPS Identification Scheme.
Proceedings of the Information Security and Privacy - 22nd Australasian Conference, 2017
Proceedings of the Mathematical Modelling for Next-Generation Cryptography: CREST Crypto-Math Project, 2017
Proceedings of the Mathematical Modelling for Next-Generation Cryptography: CREST Crypto-Math Project, 2017
2016
Secur. Commun. Networks, 2016
Secur. Commun. Networks, 2016
Adversary-dependent Lossy Trapdoor Function from Hardness of Factoring Semi-smooth RSA Subgroup Moduli.
IACR Cryptol. ePrint Arch., 2016
IACR Cryptol. ePrint Arch., 2016
Partial Key Exposure Attacks on CRT-RSA: General Improvement for the Exposed Least Significant Bits.
Proceedings of the Information Security - 19th International Conference, 2016
Proceedings of the 2016 International Symposium on Information Theory and Its Applications, 2016
Proceedings of the Fourth International Symposium on Computing and Networking, 2016
Proceedings of the Fourth International Symposium on Computing and Networking, 2016
Proceedings of the Constructive Side-Channel Analysis and Secure Design, 2016
Proceedings of the 11th Asia Joint Conference on Information Security, 2016
Proceedings of the Information Security and Privacy - 21st Australasian Conference, 2016
Proceedings of the Information Security and Privacy - 21st Australasian Conference, 2016
2015
Security Analysis on AUTH Protocol and Its Variant against the Man-in-the-Middle Attack.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2015
Private Information Retrieval with Preprocessing Based on the Approximate GCD Problem.
Proceedings of the Selected Areas in Cryptography - SAC 2015, 2015
Proceedings of the Provable Security, 2015
Proceedings of the Information Security and Cryptology - ICISC 2015, 2015
Partial Key Exposure Attacks on CRT-RSA: Better Cryptanalysis to Full Size Encryption Exponents.
Proceedings of the Applied Cryptography and Network Security, 2015
2014
Better Lattice Constructions for Solving Multivariate Linear Equations Modulo Unknown Divisors.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2014
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2014
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2014
IACR Cryptol. ePrint Arch., 2014
IACR Cryptol. ePrint Arch., 2014
Chosen Ciphertext Security on Hard Membership Decision Groups: The Case of Semi-smooth Subgroups of Quadratic Residues.
Proceedings of the Security and Cryptography for Networks - 9th International Conference, 2014
Proceedings of the Advances in Information and Computer Security, 2014
Proceedings of the Information Security and Privacy - 19th Australasian Conference, 2014
2013
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2013
Proceedings of the Information Security, 16th International Conference, 2013
Efficient variants of the Naor-Yung and Dolev-Dwork-Naor transforms for CCA secure key encapsulation mechanism.
Proceedings of the first ACM workshop on Asia public-key cryptography, 2013
2012
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2012
Proceedings of the Provable Security - 6th International Conference, 2012
Proceedings of the Public Key Cryptography - PKC 2012, 2012
Verifiable Predicate Encryption and Applications to CCA Security and Anonymous Predicate Authentication.
Proceedings of the Public Key Cryptography - PKC 2012, 2012
On Optimal Bounds of Small Inverse Problems and Approximate GCD Problems with Higher Degree.
Proceedings of the Information Security - 15th International Conference, 2012
Proceedings of the International Symposium on Information Theory and its Applications, 2012
Multi-differential Cryptanalysis on Reduced DM-PRESENT-80: Collisions and Other Differential Properties.
Proceedings of the Information Security and Cryptology - ICISC 2012, 2012
Two-Dimensional Representation of Cover Free Families and Its Applications: Short Signatures and More.
Proceedings of the Topics in Cryptology - CT-RSA 2012 - The Cryptographers' Track at the RSA Conference 2012, San Francisco, CA, USA, February 27, 2012
Proceedings of the Topics in Cryptology - CT-RSA 2012 - The Cryptographers' Track at the RSA Conference 2012, San Francisco, CA, USA, February 27, 2012
Proceedings of the Information Security and Privacy - 17th Australasian Conference, 2012
Proceedings of the Information Security and Privacy - 17th Australasian Conference, 2012
2011
J. Internet Serv. Inf. Secur., 2011
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2011
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2011
Proceedings of the Information Security Applications - 12th International Workshop, 2011
Proceedings of the Public Key Cryptography - PKC 2011, 2011
Proceedings of the 25th IEEE International Conference on Advanced Information Networking and Applications Workshops, 2011
2010
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2010
IEICE Trans. Inf. Syst., 2010
Practical Password Recovery Attacks on MD4 Based Prefix and Hybrid Authentication Protocols.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2010
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2010
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2010
Toward an Easy-to-Understand Structure for Achieving Chosen Ciphertext Security from the Decisional Diffie-Hellman Assumption.
Proceedings of the Provable Security - 4th International Conference, 2010
Proceedings of the 13th International Conference on Network-Based Information Systems, 2010
2009
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2009
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2009
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2009
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2009
Proceedings of the The Forth International Conference on Availability, 2009
2008
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2008
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2008
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2008
Deterministic Polynomial Time Equivalence between Factoring and Key-Recovery Attack on Takagi's RSA.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2008
Proceedings of the Information Security Applications, 9th International Workshop, 2008
Proceedings of the Advances in Cryptology, 2008
Proceedings of the Topics in Cryptology, 2008
Proceedings of the Topics in Cryptology, 2008
A strict evaluation method on the number of conditions for the SHA-1 collision search.
Proceedings of the 2008 ACM Symposium on Information, Computer and Communications Security, 2008
Password Recovery on Challenge and Response: Impossible Differential Attack on Hash Function.
Proceedings of the Progress in Cryptology, 2008
Proceedings of the Progress in Cryptology, 2008
2007
Quantum Inf. Comput., 2007
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2007
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2007
Proceedings of the Information Security Practice and Experience, 2007
Proceedings of the Fast Software Encryption, 14th International Workshop, 2007
Proceedings of the Information Security and Privacy, 12th Australasian Conference, 2007
2006
Quantum Inf. Comput., 2006
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2006
Visual Secret Sharing Schemes for Multiple Secret Images Allowing the Rotation of Shares.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2006
IACR Cryptol. ePrint Arch., 2006
Proceedings of the Progressin Cryptology, 2006
Proceedings of the Financial Cryptography and Data Security, 2006
Proceedings of the 2006 ACM Symposium on Information, Computer and Communications Security, 2006
2005
Quantum Inf. Comput., 2005
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2005
Proceedings of the Information Security Applications, 6th International Workshop, 2005
Proceedings of the Information Security and Cryptology, 2005
2003
New Gener. Comput., 2003
New Gener. Comput., 2003
1999
Proceedings of the Advances in Cryptology, 1999
1998
Equivalence of Counting the Number of Points on Elliptic Curve over the Ring Z<sub>n</sub> and Factoring n.
Proceedings of the Advances in Cryptology - EUROCRYPT '98, International Conference on the Theory and Application of Cryptographic Techniques, Espoo, Finland, May 31, 1998