| Noboru KUNIHIRO
|
|
|
FOREWORD Noboru KUNIHIRO Yasutada OOHAMA | Publication:
Publication Date: 2019/12/01
Vol. E102-A
No. 12
pp. 1590-1590
Type of Manuscript:
FOREWORD Category: Keyword:
| | Summary | Full Text:PDF(584.3KB) | |
|
|
|
|
|
Security Analysis on AUTH Protocol and Its Variant against the Man-in-the-Middle Attack Kosei ENDO Noboru KUNIHIRO | Publication: IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2015/01/01
Vol. E98-A
No. 1
pp. 153-161
Type of Manuscript:
Special Section PAPER (Special Section on Cryptography and Information Security) Category: Foundation Keyword: RFID, authentication protocol, HB protocol, man-in-the-middle attack, | | Summary | Full Text:PDF(658.7KB) | |
|
|
|
|
|
|
|
|
|
|
|
Solving Generalized Small Inverse Problems Noboru KUNIHIRO | Publication: IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2011/06/01
Vol. E94-A
No. 6
pp. 1274-1284
Type of Manuscript:
Special Section PAPER (Special Section on Discrete Mathematics and Its Applications) Category: Keyword: LLL algorithm, small inverse problem, RSA, lattice-based cryptanalysis, | | Summary | Full Text:PDF(231.2KB) | |
|
Small Secret CRT-Exponent Attacks on Takagi's RSA Naoyuki SHINOHARA Tetsuya IZU Noboru KUNIHIRO | Publication: IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2011/01/01
Vol. E94-A
No. 1
pp. 19-27
Type of Manuscript:
Special Section PAPER (Special Section on Cryptography and Information Security) Category: Public Key Cryptography Keyword: CRT-exponent, lattice, LLL, Takagi's RSA, | | Summary | Full Text:PDF(485.9KB) | |
|
|
|
New Conditions for Secure Knapsack Schemes against Lattice Attack Noboru KUNIHIRO | Publication: IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2010/06/01
Vol. E93-A
No. 6
pp. 1058-1065
Type of Manuscript:
Special Section PAPER (Special Section on Discrete Mathematics and Its Applications) Category: Cryptography and Information Security Keyword: low-weight knapsack cryptosystems, lattice attack, (pseudo-)density, Shannon entropy, | | Summary | Full Text:PDF(241.4KB) | |
|
|
|
|
|
|
|
Extended Password Recovery Attacks against APOP, SIP, and Digest Authentication Yu SASAKI Lei WANG Kazuo OHTA Noboru KUNIHIRO | Publication: IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2009/01/01
Vol. E92-A
No. 1
pp. 96-104
Type of Manuscript:
Special Section PAPER (Special Section on Cryptography and Information Security) Category: Hash Function Keyword: APOP, SIP, digest authentication, IV bridge, collision attack, hash function, MD5, | | Summary | Full Text:PDF(230.4KB) | |
|
|
|
|
|
Small Secret Key Attack on a Takagi's Variant of RSA Kouichi ITOH Noboru KUNIHIRO Kaoru KUROSAWA | Publication: IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2009/01/01
Vol. E92-A
No. 1
pp. 33-41
Type of Manuscript:
Special Section PAPER (Special Section on Cryptography and Information Security) Category: Public Key Cryptography Keyword: lattice, LLL, trivariate polynomial, RSA, | | Summary | Full Text:PDF(294KB) | |
|
Deterministic Polynomial Time Equivalence between Factoring and Key-Recovery Attack on Takagi's RSA Noboru KUNIHIRO Kaoru KUROSAWA | Publication: IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2008/09/01
Vol. E91-A
No. 9
pp. 2356-2364
Type of Manuscript:
Special Section PAPER (Special Section on Discrete Mathematics and Its Applications) Category: Keyword: RSA, factoring, LLL algorithm, | | Summary | Full Text:PDF(215.6KB) | |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Exact Analyses of Computational Time for Factoring in Quantum Computers Noboru KUNIHIRO | Publication: IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences
Publication Date: 2005/01/01
Vol. E88-A
No. 1
pp. 105-111
Type of Manuscript:
Special Section PAPER (Special Section on Cryptography and Information Security) Category: Public Key Cryptography Keyword: Shor's factoring algorithm, quantum circuit, practical running time, | | Summary | Full Text:PDF(115.7KB) | |
|
|
|
|
|
|
|
|
|
|