Volgen
Noboru Kunihiro
Noboru Kunihiro
Geverifieerd e-mailadres voor cs.tsukuba.ac.jp
Titel
Geciteerd door
Geciteerd door
Jaar
Quantum addition circuits and unbounded fan-out
Y Takahashi, S Tani, N Kunihiro
arXiv preprint arXiv:0910.2530, 2009
1122009
Generic constructions for chosen-ciphertext secure attribute based encryption
S Yamada, N Attrapadung, G Hanaoka, N Kunihiro
International Workshop on Public Key Cryptography, 71-89, 2011
932011
A framework and compact constructions for non-monotonic attribute-based encryption
S Yamada, N Attrapadung, G Hanaoka, N Kunihiro
International Workshop on Public Key Cryptography, 275-292, 2014
882014
Generic construction of chosen ciphertext secure proxy re-encryption
G Hanaoka, Y Kawai, N Kunihiro, T Matsuda, J Weng, R Zhang, Y Zhao
Cryptographers’ Track at the RSA Conference, 349-364, 2012
782012
A linear-size quantum circuit for addition with no ancillary qubits
Y Takahashi, N Kunihiro
Quantum Information & Computation 5 (6), 440-448, 2005
742005
Improved collision attack on MD5
Y Sasaki, Y Naito, N Kunihiro, K Ohta
Cryptology ePrint Archive, 2005
552005
A quantum circuit for Shor's factoring algorithm using 2n+ 2 qubits
Y Takahashi, N Kunihiro
Quantum Information & Computation 6 (2), 184-192, 2006
502006
Verifiable predicate encryption and applications to CCA security and anonymous predicate authentication
S Yamada, N Attrapadung, B Santoso, JCN Schuldt, G Hanaoka, ...
International Workshop on Public Key Cryptography, 243-261, 2012
452012
New key-recovery attacks on HMAC/NMAC-MD4 and NMAC-MD5
L Wang, K Ohta, N Kunihiro
Annual International Conference on the Theory and Applications of …, 2008
442008
Partial key exposure attacks on RSA: achieving the boneh-durfee bound
A Takayasu, N Kunihiro
International Conference on Selected Areas in Cryptography, 345-362, 2014
40*2014
The quantum Fourier transform on a linear nearest neighbor architecture
Y Takahashi, N Kunihiro, K Ohta
Quantum Information & Computation 7 (4), 383-391, 2007
402007
New message difference for MD4
Y Sasaki, L Wang, K Ohta, N Kunihiro
International Workshop on Fast Software Encryption, 329-348, 2007
402007
New methods for generating short addition chains
N Kunihiro, H Yamamoto
IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and …, 2000
402000
A fast quantum circuit for addition with few qubits
Y Takahashi, N Kunihiro
Quantum Information & Computation 8 (6), 636-649, 2008
392008
Security of MD5 challenge and response: Extension of APOP password recovery attack
Y Sasaki, L Wang, K Ohta, N Kunihiro
Cryptographers’ Track at the RSA Conference, 1-18, 2008
382008
Window and extended window methods for addition chain and addition-subtraction chain
N Kunihiro, H Yamamoto
IEICE transactions on fundamentals of electronics, communications and …, 1998
351998
Small secret key attack on a variant of RSA (due to Takagi)
K Itoh, N Kunihiro, K Kurosawa
Cryptographers’ Track at the RSA Conference, 387-406, 2008
332008
Better lattice constructions for solving multivariate linear equations modulo unknown divisors
A Takayasu, N Kunihiro
IEICE Transactions on Fundamentals of Electronics, Communications and …, 2014
322014
Self-bilinear map on unknown order groups from indistinguishability obfuscation and its applications
T Yamakawa, S Yamada, G Hanaoka, N Kunihiro
Algorithmica 79 (4), 1286-1317, 2017
292017
A sanitizable signature scheme with aggregation
T Izu, N Kunihiro, K Ohta, M Takenaka, T Yoshioka
International Conference on Information Security Practice and Experience, 51-64, 2007
292007
Het systeem kan de bewerking nu niet uitvoeren. Probeer het later opnieuw.
Artikelen 1–20