[go: up one dir, main page]

Follow
Noboru Kunihiro
Noboru Kunihiro
Verified email at cs.tsukuba.ac.jp
Title
Cited by
Cited by
Year
Quantum addition circuits and unbounded fan-out
Y Takahashi, S Tani, N Kunihiro
arXiv preprint arXiv:0910.2530, 2009
2212009
A framework and compact constructions for non-monotonic attribute-based encryption
S Yamada, N Attrapadung, G Hanaoka, N Kunihiro
International Workshop on Public Key Cryptography, 275-292, 2014
1102014
A linear-size quantum circuit for addition with no ancillary qubits.
Y Takahashi, N Kunihiro
Quantum Inf. Comput. 5 (6), 440-448, 2005
1042005
Generic constructions for chosen-ciphertext secure attribute based encryption
S Yamada, N Attrapadung, G Hanaoka, N Kunihiro
International Workshop on Public Key Cryptography, 71-89, 2011
1012011
A quantum circuit for Shor's factoring algorithm using 2n+ 2 qubits
Y Takahashi, N Kunihiro
Quantum Information & Computation 6 (2), 184-192, 2006
892006
Generic construction of chosen ciphertext secure proxy re-encryption
G Hanaoka, Y Kawai, N Kunihiro, T Matsuda, J Weng, R Zhang, Y Zhao
Cryptographers’ Track at the RSA Conference, 349-364, 2012
862012
A fast quantum circuit for addition with few qubits.
Y Takahashi, N Kunihiro
Quantum Inf. Comput. 8 (6), 636-649, 2008
732008
Partial key exposure attacks on RSA: Achieving the Boneh–Durfee bound
A Takayasu, N Kunihiro
Theoretical Computer Science 761, 51-77, 2019
672019
Improved collision attack on MD5
Y Sasaki, Y Naito, N Kunihiro, K Ohta
Cryptology ePrint Archive, 2005
552005
The quantum fourier transform on a linear nearest neighbor architecture.
Y Takahashi, N Kunihiro, K Ohta
Quantum Inf. Comput. 7 (4), 383-391, 2007
542007
New message difference for MD4
Y Sasaki, L Wang, K Ohta, N Kunihiro
International Workshop on Fast Software Encryption, 329-348, 2007
492007
Better lattice constructions for solving multivariate linear equations modulo unknown divisors
A Takayasu, N Kunihiro
IEICE Transactions on Fundamentals of Electronics, Communications and …, 2014
482014
New key-recovery attacks on HMAC/NMAC-MD4 and NMAC-MD5
L Wang, K Ohta, N Kunihiro
Annual International Conference on the Theory and Applications of …, 2008
472008
Improved collision attack on MD4 with probability almost 1
Y Naito, Y Sasaki, N Kunihiro, K Ohta
International Conference on Information Security and Cryptology, 129-145, 2005
462005
Verifiable predicate encryption and applications to CCA security and anonymous predicate authentication
S Yamada, N Attrapadung, B Santoso, JCN Schuldt, G Hanaoka, ...
International Workshop on Public Key Cryptography, 243-261, 2012
432012
New methods for generating short addition chains
N Kunihiro, H Yamamoto
IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and …, 2000
422000
Window and extended window methods for addition chain and addition-subtraction chain
N Kunihiro, H Yamamoto
IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and …, 1998
381998
Self-bilinear map on unknown order groups from indistinguishability obfuscation and its applications
T Yamakawa, S Yamada, G Hanaoka, N Kunihiro
Algorithmica 79 (4), 1286-1317, 2017
372017
Security of MD5 challenge and response: Extension of APOP password recovery attack
Y Sasaki, L Wang, K Ohta, N Kunihiro
Cryptographers’ Track at the RSA Conference, 1-18, 2008
372008
Small secret key attack on a variant of RSA (due to Takagi)
K Itoh, N Kunihiro, K Kurosawa
Cryptographers’ Track at the RSA Conference, 387-406, 2008
362008
The system can't perform the operation now. Try again later.
Articles 1–20