2008 |
32 | EE | Noboru Kunihiro:
New Definition of Density on Knapsack Cryptosystems.
AFRICACRYPT 2008: 156-173 |
31 | EE | Yu Sasaki,
Lei Wang,
Kazuo Ohta,
Noboru Kunihiro:
Password Recovery on Challenge and Response: Impossible Differential Attack on Hash Function.
AFRICACRYPT 2008: 290-307 |
30 | EE | Jun Yajima,
Terutoshi Iwasaki,
Yusuke Naito,
Yu Sasaki,
Takeshi Shimoyama,
Noboru Kunihiro,
Kazuo Ohta:
A strict evaluation method on the number of conditions for the SHA-1 collision search.
ASIACCS 2008: 10-20 |
29 | EE | Yu Sasaki,
Lei Wang,
Kazuo Ohta,
Noboru Kunihiro:
Security of MD5 Challenge and Response: Extension of APOP Password Recovery Attack.
CT-RSA 2008: 1-18 |
28 | EE | Kouichi Itoh,
Noboru Kunihiro,
Kaoru Kurosawa:
Small Secret Key Attack on a Variant of RSA (Due to Takagi).
CT-RSA 2008: 387-406 |
27 | EE | Lei Wang,
Kazuo Ohta,
Noboru Kunihiro:
New Key-Recovery Attacks on HMAC/NMAC-MD4 and NMAC-MD5.
EUROCRYPT 2008: 237-253 |
26 | EE | Tetsuya Izu,
Noboru Kunihiro,
Kazuo Ohta,
Makoto Sano,
Masahiko Takenaka:
Sanitizable and Deletable Signature.
WISA 2008: 130-144 |
25 | EE | Yutaka Kawai,
Shotaro Tanno,
Takahiro Kondo,
Kazuki Yoneyama,
Noboru Kunihiro,
Kazuo Ohta:
Extension of Secret Handshake Protocols with Multiple Groups in Monotone Condition.
WISA 2008: 160-173 |
24 | EE | Bagus Santoso,
Noboru Kunihiro,
Naoki Kanayama,
Kazuo Ohta:
Factorization of Square-Free Integers with High Bits Known.
IEICE Transactions 91-A(1): 306-315 (2008) |
23 | EE | Yusuke Naito,
Kazuo Ohta,
Noboru Kunihiro:
Improved Collision Search for Hash Functions: New Advanced Message Modification.
IEICE Transactions 91-A(1): 46-54 (2008) |
22 | EE | Yu Sasaki,
Lei Wang,
Noboru Kunihiro,
Kazuo Ohta:
New Message Differences for Collision Attacks on MD4 and MD5.
IEICE Transactions 91-A(1): 55-63 (2008) |
21 | EE | Noboru Kunihiro,
Kaoru Kurosawa:
Deterministic Polynomial Time Equivalence between Factoring and Key-Recovery Attack on Takagi's RSA.
IEICE Transactions 91-A(9): 2356-2364 (2008) |
2007 |
20 | EE | Jun Yajima,
Yu Sasaki,
Yusuke Naito,
Terutoshi Iwasaki,
Takeshi Shimoyama,
Noboru Kunihiro,
Kazuo Ohta:
A New Strategy for Finding a Differential Path of SHA-1.
ACISP 2007: 45-58 |
19 | EE | Yu Sasaki,
Lei Wang,
Kazuo Ohta,
Noboru Kunihiro:
New Message Difference for MD4.
FSE 2007: 329-348 |
18 | EE | Tetsuya Izu,
Noboru Kunihiro,
Kazuo Ohta,
Masahiko Takenaka,
Takashi Yoshioka:
A Sanitizable Signature Scheme with Aggregation.
ISPEC 2007: 51-64 |
17 | EE | Noboru Kunihiro,
Kaoru Kurosawa:
Deterministic Polynomial Time Equivalence Between Factoring and Key-Recovery Attack on Takagi's RSA.
Public Key Cryptography 2007: 412-425 |
16 | EE | Yu Sasaki,
Yusuke Naito,
Noboru Kunihiro,
Kazuo Ohta:
Improved Collision Attacks on MD4 and MD5.
IEICE Transactions 90-A(1): 36-47 (2007) |
15 | EE | Yoshikazu Hanatani,
Yuichi Komano,
Kazuo Ohta,
Noboru Kunihiro:
Provably Secure Untraceable Electronic Cash against Insider Attacks.
IEICE Transactions 90-A(5): 980-991 (2007) |
2006 |
14 | EE | Masahiro Mambo,
Moises Rosales Salinas,
Kazuo Ohta,
Noboru Kunihiro:
Problems on the MR micropayment schemes.
ASIACCS 2006: 363 |
13 | EE | Yusuke Naito,
Yu Sasaki,
Takeshi Shimoyama,
Jun Yajima,
Noboru Kunihiro,
Kazuo Ohta:
Improved Collision Search for SHA-0.
ASIACRYPT 2006: 21-36 |
12 | EE | Yoshikazu Hanatani,
Yuichi Komano,
Kazuo Ohta,
Noboru Kunihiro:
Provably Secure Electronic Cash Based on Blind Multisignature Schemes.
Financial Cryptography 2006: 236-250 |
11 | EE | Bagus Santoso,
Noboru Kunihiro,
Naoki Kanayama,
Kazuo Ohta:
Factorization of Square-Free Integers with High Bits Known.
VIETCRYPT 2006: 115-130 |
10 | EE | Yu Sasaki,
Yusuke Naito,
Jun Yajima,
Takeshi Shimoyama,
Noboru Kunihiro,
Kazuo Ohta:
How to Construct Sufficient Conditions for Hash Functions.
VIETCRYPT 2006: 243-259 |
9 | EE | Mitsugu Iwamoto,
Lei Wang,
Kazuki Yoneyama,
Noboru Kunihiro,
Kazuo Ohta:
Visual Secret Sharing Schemes for Multiple Secret Images Allowing the Rotation of Shares.
IEICE Transactions 89-A(5): 1382-1395 (2006) |
8 | EE | Noboru Kunihiro,
Wataru Abe,
Kazuo Ohta:
Maurer-Yacobi ID-Based Key Distribution Revisited.
IEICE Transactions 89-A(5): 1421-1424 (2006) |
2005 |
7 | EE | Yusuke Naito,
Yu Sasaki,
Noboru Kunihiro,
Kazuo Ohta:
Improved Collision Attack on MD4 with Probability Almost 1.
ICISC 2005: 129-145 |
6 | EE | Tetsuya Izu,
Noboru Kunihiro,
Kazuo Ohta,
Takeshi Shimoyama:
Analysis on the Clockwise Transposition Routing for Dedicated Factoring Devices.
WISA 2005: 232-242 |
5 | EE | Noboru Kunihiro:
Exact Analyses of Computational Time for Factoring in Quantum Computers.
IEICE Transactions 88-A(1): 105-111 (2005) |
2003 |
4 | EE | Kazuo Ohta,
Tetsuo Nishino,
Seiya Okubo,
Noboru Kunihiro:
A Quantum Algorithm Using NMR Computers to Break Secret-Key Cryptosystems.
New Generation Comput. 21(4): (2003) |
3 | EE | Noboru Kunihiro,
Shigeru Yamashita:
Efficient Algorithms for NMR Quantum Computers with Small Qubits.
New Generation Comput. 21(4): (2003) |
1999 |
2 | | Kenji Koyama,
Yukio Tsuruoka,
Noboru Kunihiro:
Modulus Search for Elliptic Curve Cryptosystems.
ASIACRYPT 1999: 1-7 |
1998 |
1 | EE | Noboru Kunihiro,
Kenji Koyama:
Equivalence of Counting the Number of Points on Elliptic Curve over the Ring Zn and Factoring n.
EUROCRYPT 1998: 47-58 |