Noboru KUNIHIRO


Constructing Subspace Membership Encryption through Inner Product Encryption
Shuichi KATSUMATA Noboru KUNIHIRO 
Publication:   
Publication Date: 2017/09/01
Vol. E100-A  No. 9  pp. 1804-1815
Type of Manuscript:  Special Section PAPER (Special Section on Discrete Mathematics and Its Applications)
Category: 
Keyword: 
predicate encryptionsubspace membership encryptionfunction privacy
 Summary | Full Text:PDF(732.9KB)

General Bounds for Small Inverse Problems and Its Applications to Multi-Prime RSA
Atsushi TAKAYASU Noboru KUNIHIRO 
Publication:   
Publication Date: 2017/01/01
Vol. E100-A  No. 1  pp. 50-61
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: 
Keyword: 
LLL algorithmCoppersmith's methodthe small inverse problemcryptanalysismulti-prime RSA
 Summary | Full Text:PDF(401.5KB)

Security Analysis on AUTH Protocol and Its Variant against the Man-in-the-Middle Attack
Kosei ENDO Noboru KUNIHIRO 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2015/01/01
Vol. E98-A  No. 1  pp. 153-161
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: Foundation
Keyword: 
RFIDauthentication protocolHB protocolman-in-the-middle attack
 Summary | Full Text:PDF(658.7KB)

Recovering RSA Secret Keys from Noisy Key Bits with Erasures and Errors
Noboru KUNIHIRO Naoyuki SHINOHARA Tetsuya IZU 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2014/06/01
Vol. E97-A  No. 6  pp. 1273-1284
Type of Manuscript:  Special Section PAPER (Special Section on Discrete Mathematics and Its Applications)
Category: 
Keyword: 
RSAkey-recoverycold boot attackside-channel attackmaximal likelihood
 Summary | Full Text:PDF(570.9KB)

A Unified Framework for Small Secret Exponent Attack on RSA
Noboru KUNIHIRO Naoyuki SHINOHARA Tetsuya IZU 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2014/06/01
Vol. E97-A  No. 6  pp. 1285-1295
Type of Manuscript:  Special Section PAPER (Special Section on Discrete Mathematics and Its Applications)
Category: 
Keyword: 
LLL algorithmsmall inverse problemRSAlattice-based cryptanalysis
 Summary | Full Text:PDF(521.9KB)

Better Lattice Constructions for Solving Multivariate Linear Equations Modulo Unknown Divisors
Atsushi TAKAYASU Noboru KUNIHIRO 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2014/06/01
Vol. E97-A  No. 6  pp. 1259-1272
Type of Manuscript:  Special Section PAPER (Special Section on Discrete Mathematics and Its Applications)
Category: 
Keyword: 
latticesCoppersmith's methodsmall rootsimplicit factorizationMulti-Prime Φ-Hiding Assumptionfault attacksdigital signaturesRSA
 Summary | Full Text:PDF(664.5KB)

Random Sampling Reduction with Precomputation
Masayuki YOSHINO Noboru KUNIHIRO 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2013/01/01
Vol. E96-A  No. 1  pp. 150-157
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: Foundations
Keyword: 
random sampling reductionprecomputationlattice reductionsize reductionlattice-based cryptography
 Summary | Full Text:PDF(734.4KB)

On the Hardness of Subset Sum Problem from Different Intervals
Jun KOGURE Noboru KUNIHIRO Hirosuke YAMAMOTO 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2012/05/01
Vol. E95-A  No. 5  pp. 903-908
Type of Manuscript:  PAPER
Category: Cryptography and Information Security
Keyword: 
subset sum problemknapsack problemlow-density attacklattice reduction
 Summary | Full Text:PDF(701.5KB)

Solving Generalized Small Inverse Problems
Noboru KUNIHIRO 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2011/06/01
Vol. E94-A  No. 6  pp. 1274-1284
Type of Manuscript:  Special Section PAPER (Special Section on Discrete Mathematics and Its Applications)
Category: 
Keyword: 
LLL algorithmsmall inverse problemRSAlattice-based cryptanalysis
 Summary | Full Text:PDF(231.2KB)

Small Secret CRT-Exponent Attacks on Takagi's RSA
Naoyuki SHINOHARA Tetsuya IZU Noboru KUNIHIRO 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2011/01/01
Vol. E94-A  No. 1  pp. 19-27
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: Public Key Cryptography
Keyword: 
CRT-exponentlatticeLLLTakagi's RSA
 Summary | Full Text:PDF(485.9KB)

Public Key Encryption Schemes from the (B)CDH Assumption with Better Efficiency
Shota YAMADA Yutaka KAWAI Goichiro HANAOKA Noboru KUNIHIRO 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2010/11/01
Vol. E93-A  No. 11  pp. 1984-1993
Type of Manuscript:  Special Section PAPER (Special Section on Information Theory and Its Applications)
Category: Cryptography and Information Security
Keyword: 
public key encryptionchosen-ciphertext securitycomputational Diffie-Hellman assumptionbilinear computational Diffie-Hellman assumption
 Summary | Full Text:PDF(397.8KB)

Extension of Secret Handshake Protocols with Multiple Groups in Monotone Condition
Yutaka KAWAI Shotaro TANNO Takahiro KONDO Kazuki YONEYAMA Kazuo OHTA Noboru KUNIHIRO 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2010/06/01
Vol. E93-A  No. 6  pp. 1122-1131
Type of Manuscript:  Special Section PAPER (Special Section on Discrete Mathematics and Its Applications)
Category: Cryptography and Information Security
Keyword: 
secret handshake with multiple groupsprivacy preserving authenticationanonymitymonotone condition
 Summary | Full Text:PDF(1.3MB)

New Conditions for Secure Knapsack Schemes against Lattice Attack
Noboru KUNIHIRO 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2010/06/01
Vol. E93-A  No. 6  pp. 1058-1065
Type of Manuscript:  Special Section PAPER (Special Section on Discrete Mathematics and Its Applications)
Category: Cryptography and Information Security
Keyword: 
low-weight knapsack cryptosystemslattice attack(pseudo-)densityShannon entropy
 Summary | Full Text:PDF(241.4KB)

Cryptanalysis of Two MD5-Based Authentication Protocols: APOP and NMAC
Lei WANG Kazuo OHTA Yu SASAKI Kazuo SAKIYAMA Noboru KUNIHIRO 
Publication:   IEICE TRANSACTIONS on Information and Systems
Publication Date: 2010/05/01
Vol. E93-D  No. 5  pp. 1087-1095
Type of Manuscript:  Special Section PAPER (Special Section on Information and Communication System Security)
Category: 
Keyword: 
authentication protocolAPOPNMACMD5
 Summary | Full Text:PDF(317.2KB)

Practical Password Recovery Attacks on MD4 Based Prefix and Hybrid Authentication Protocols
Yu SASAKI Lei WANG Kazuo OHTA Kazumaro AOKI Noboru KUNIHIRO 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2010/01/01
Vol. E93-A  No. 1  pp. 84-92
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: Hash Function
Keyword: 
challenge and responseprefixhybridpassword recovery attacklocal collisionhash functionMD4
 Summary | Full Text:PDF(339.7KB)

Extended Password Recovery Attacks against APOP, SIP, and Digest Authentication
Yu SASAKI Lei WANG Kazuo OHTA Noboru KUNIHIRO 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2009/01/01
Vol. E92-A  No. 1  pp. 96-104
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: Hash Function
Keyword: 
APOPSIPdigest authenticationIV bridgecollision attackhash functionMD5
 Summary | Full Text:PDF(230.4KB)

A Strict Evaluation on the Number of Conditions for SHA-1 Collision Search
Jun YAJIMA Terutoshi IWASAKI Yusuke NAITO Yu SASAKI Takeshi SHIMOYAMA Thomas PEYRIN Noboru KUNIHIRO Kazuo OHTA 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2009/01/01
Vol. E92-A  No. 1  pp. 87-95
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: Hash Function
Keyword: 
hash functioncollision searchSHA-1disturbance vector
 Summary | Full Text:PDF(330.1KB)

Small Secret Key Attack on a Takagi's Variant of RSA
Kouichi ITOH Noboru KUNIHIRO Kaoru KUROSAWA 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2009/01/01
Vol. E92-A  No. 1  pp. 33-41
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: Public Key Cryptography
Keyword: 
latticeLLLtrivariate polynomialRSA
 Summary | Full Text:PDF(294KB)

Near-Collision Attacks on MD4: Applied to MD4-Based Protocols
Lei WANG Kazuo OHTA Noboru KUNIHIRO 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2009/01/01
Vol. E92-A  No. 1  pp. 76-86
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: Hash Function
Keyword: 
near-collisionMD4HMAC/NMACchallenge and responseHash(Password||Challenge)
 Summary | Full Text:PDF(287.3KB)

Deterministic Polynomial Time Equivalence between Factoring and Key-Recovery Attack on Takagi's RSA
Noboru KUNIHIRO Kaoru KUROSAWA 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2008/09/01
Vol. E91-A  No. 9  pp. 2356-2364
Type of Manuscript:  Special Section PAPER (Special Section on Discrete Mathematics and Its Applications)
Category: 
Keyword: 
RSAfactoringLLL algorithm
 Summary | Full Text:PDF(215.6KB)

New Message Differences for Collision Attacks on MD4 and MD5
Yu SASAKI Lei WANG Noboru KUNIHIRO Kazuo OHTA 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2008/01/01
Vol. E91-A  No. 1  pp. 55-63
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: Hash Functions
Keyword: 
collision attackmessage differenceMD4MD5hash function
 Summary | Full Text:PDF(265KB)

Factorization of Square-Free Integers with High Bits Known
Bagus SANTOSO Noboru KUNIHIRO Naoki KANAYAMA Kazuo OHTA 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2008/01/01
Vol. E91-A  No. 1  pp. 306-315
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: Cryptanalysis
Keyword: 
factorizationlatticeCoppersmith's method
 Summary | Full Text:PDF(332.9KB)

Improved Collision Search for Hash Functions: New Advanced Message Modification
Yusuke NAITO Kazuo OHTA Noboru KUNIHIRO 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2008/01/01
Vol. E91-A  No. 1  pp. 46-54
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: Hash Functions
Keyword: 
hash functioncollision attackcollision searchadvanced message modification
 Summary | Full Text:PDF(302.9KB)

Provably Secure Untraceable Electronic Cash against Insider Attacks
Yoshikazu HANATANI Yuichi KOMANO Kazuo OHTA Noboru KUNIHIRO 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2007/05/01
Vol. E90-A  No. 5  pp. 980-991
Type of Manuscript:  Special Section PAPER (Special Section on Discrete Mathematics and Its Applications)
Category: 
Keyword: 
blind multisignatureelectronic cashprovable securityrandom oracle modelinsider attacks
 Summary | Full Text:PDF(279.5KB)

Improved Collision Attacks on MD4 and MD5
Yu SASAKI Yusuke NAITO Noboru KUNIHIRO Kazuo OHTA 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2007/01/01
Vol. E90-A  No. 1  pp. 36-47
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: Hash Functions
Keyword: 
message modificationcollision attackMD5MD4hash function
 Summary | Full Text:PDF(260.9KB)

Visual Secret Sharing Schemes for Multiple Secret Images Allowing the Rotation of Shares
Mitsugu IWAMOTO Lei WANG Kazuki YONEYAMA Noboru KUNIHIRO Kazuo OHTA 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2006/05/01
Vol. E89-A  No. 5  pp. 1382-1395
Type of Manuscript:  Special Section PAPER (Special Section on Discrete Mathematics and Its Applications)
Category: 
Keyword: 
visual secret sharing schemesvisual cryptographysecret sharing schemesmultiple secret imagesrotation of shares
 Summary | Full Text:PDF(527.7KB)

Maurer-Yacobi ID-Based Key Distribution Revisited
Noboru KUNIHIRO Wataru ABE Kazuo OHTA 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2006/05/01
Vol. E89-A  No. 5  pp. 1421-1424
Type of Manuscript:  Special Section LETTER (Special Section on Discrete Mathematics and Its Applications)
Category: 
Keyword: 
ID-based key distributionbaby step/giant step algorithmPohlig-Hellman algorithm
 Summary | Full Text:PDF(75.5KB)

Exact Analyses of Computational Time for Factoring in Quantum Computers
Noboru KUNIHIRO 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2005/01/01
Vol. E88-A  No. 1  pp. 105-111
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: Public Key Cryptography
Keyword: 
Shor's factoring algorithmquantum circuitpractical running time
 Summary | Full Text:PDF(115.7KB)

Cryptographic Works of Dr. Kenji Koyama: In Memoria
Noboru KUNIHIRO Kazuo OHTA Tatsuaki OKAMOTO Routo TERADA Yukio TSURUOKA 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2001/01/01
Vol. E84-A  No. 1  pp. 108-113
Type of Manuscript:  INVITED PAPER (Special Section on Cryptography and Information Security)
Category: 
Keyword: 
modern cryptographykey managementzero-knowledge proofelliptic curve applications
 Summary | Full Text:PDF(216.8KB)

New Methods for Generating Short Addition Chains
Noboru KUNIHIRO Hirosuke YAMAMOTO 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2000/01/25
Vol. E83-A  No. 1  pp. 60-67
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: 
Keyword: 
addition chainhamming weightextended window methodrun-length methodhybrid method
 Summary | Full Text:PDF(430.7KB)

Two Discrete Log Algorithms for Super-Anomalous Elliptic Curves and Their Applications
Noboru KUNIHIRO Kenji KOYAMA 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2000/01/25
Vol. E83-A  No. 1  pp. 10-16
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: 
Keyword: 
elliptic curve discrete logarithm problemsuper-anomalous elliptic curvesdeterministic polynomial time algorithm
 Summary | Full Text:PDF(361.7KB)

Window and Extended Window Methods for Addition Chain and Addition-Subtraction Chain
Noboru KUNIHIRO Hirosuke YAMAMOTO 
Publication:   IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 1998/01/25
Vol. E81-A  No. 1  pp. 72-81
Type of Manuscript:  Special Section PAPER (Special Section on Cryptography and Information Security)
Category: 
Keyword: 
addition-subtraction chainTunstall codecanonical signed binary representationwindow method
 Summary | Full Text:PDF(798.7KB)