Follow
Noboru Kunihiro
Noboru Kunihiro
Verified email at cs.tsukuba.ac.jp
Title
Cited by
Cited by
Year
Quantum addition circuits and unbounded fan-out
Y Takahashi, S Tani, N Kunihiro
arXiv preprint arXiv:0910.2530, 2009
1592009
A framework and compact constructions for non-monotonic attribute-based encryption
S Yamada, N Attrapadung, G Hanaoka, N Kunihiro
Public-Key Cryptography–PKC 2014: 17th International Conference on Practice …, 2014
1002014
Generic constructions for chosen-ciphertext secure attribute based encryption
S Yamada, N Attrapadung, G Hanaoka, N Kunihiro
Public Key Cryptography–PKC 2011: 14th International Conference on Practice …, 2011
992011
A linear-size quantum circuit for addition with no ancillary qubits
Y Takahashi, N Kunihiro
Quantum Information & Computation 5 (6), 440-448, 2005
922005
Generic construction of chosen ciphertext secure proxy re-encryption
G Hanaoka, Y Kawai, N Kunihiro, T Matsuda, J Weng, R Zhang, Y Zhao
Topics in Cryptology–CT-RSA 2012: The Cryptographers’ Track at the RSA …, 2012
822012
A quantum circuit for Shor's factoring algorithm using 2n+ 2 qubits
Y Takahashi, N Kunihiro
Quantum Information & Computation 6 (2), 184-192, 2006
622006
A fast quantum circuit for addition with few qubits
Y Takahashi, N Kunihiro
Quantum Information & Computation 8 (6), 636-649, 2008
572008
Improved collision attack on MD5
Y Sasaki, Y Naito, N Kunihiro, K Ohta
Cryptology ePrint Archive, 2005
552005
Partial key exposure attacks on RSA: achieving the Boneh-Durfee bound
A Takayasu, N Kunihiro
International Conference on Selected Areas in Cryptography, 345-362, 2014
52*2014
The quantum Fourier transform on a linear nearest neighbor architecture
Y Takahashi, N Kunihiro, K Ohta
Quantum Information & Computation 7 (4), 383-391, 2007
472007
New message difference for MD4
Y Sasaki, L Wang, K Ohta, N Kunihiro
Fast Software Encryption: 14th International Workshop, FSE 2007, Luxembourg …, 2007
472007
Verifiable predicate encryption and applications to CCA security and anonymous predicate authentication
S Yamada, N Attrapadung, B Santoso, JCN Schuldt, G Hanaoka, ...
Public Key Cryptography–PKC 2012: 15th International Conference on Practice …, 2012
462012
New key-recovery attacks on HMAC/NMAC-MD4 and NMAC-MD5
L Wang, K Ohta, N Kunihiro
Advances in Cryptology–EUROCRYPT 2008: 27th Annual International Conference …, 2008
452008
Improved collision attack on MD4 with probability almost 1
Y Naito, Y Sasaki, N Kunihiro, K Ohta
Information Security and Cryptology-ICISC 2005: 8th International Conference …, 2006
452006
New methods for generating short addition chains
N Kunihiro, H Yamamoto
IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and …, 2000
422000
Better lattice constructions for solving multivariate linear equations modulo unknown divisors
A Takayasu, N Kunihiro
IEICE Transactions on Fundamentals of Electronics, Communications and …, 2014
412014
Security of MD5 challenge and response: Extension of APOP password recovery attack
Y Sasaki, L Wang, K Ohta, N Kunihiro
Topics in Cryptology–CT-RSA 2008: The Cryptographers’ Track at the RSA …, 2008
372008
Window and extended window methods for addition chain and addition-subtraction chain
N Kunihiro, H Yamamoto
IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and …, 1998
371998
Self-bilinear map on unknown order groups from indistinguishability obfuscation and its applications
T Yamakawa, S Yamada, G Hanaoka, N Kunihiro
Algorithmica 79 (4), 1286-1317, 2017
362017
Small secret key attack on a variant of RSA (due to Takagi)
K Itoh, N Kunihiro, K Kurosawa
Cryptographers’ Track at the RSA Conference, 387-406, 2008
342008
The system can't perform the operation now. Try again later.
Articles 1–20