The SCEAS System
| |||||||

## Search the dblp DataBase
Noboru Kunihiro:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
## Publications of Author- Kenji Koyama, Yukio Tsuruoka, Noboru Kunihiro
**Modulus Search for Elliptic Curve Cryptosystems.**[Citation Graph (0, 0)][DBLP] ASIACRYPT, 1999, pp:1-7 [Conf] - Yusuke Naito, Yu Sasaki, Takeshi Shimoyama, Jun Yajima, Noboru Kunihiro, Kazuo Ohta
**Improved Collision Search for SHA-0.**[Citation Graph (0, 0)][DBLP] ASIACRYPT, 2006, pp:21-36 [Conf] - Masahiro Mambo, Moises Rosales Salinas, Kazuo Ohta, Noboru Kunihiro
**Problems on the MR micropayment schemes.**[Citation Graph (0, 0)][DBLP] ASIACCS, 2006, pp:363- [Conf] - Noboru Kunihiro, Kenji Koyama
**Equivalence of Counting the Number of Points on Elliptic Curve over the Ring Z**[Citation Graph (0, 0)][DBLP]_{n}and Factoring n. EUROCRYPT, 1998, pp:47-58 [Conf] - Yoshikazu Hanatani, Yuichi Komano, Kazuo Ohta, Noboru Kunihiro
**Provably Secure Electronic Cash Based on Blind Multisignature Schemes.**[Citation Graph (0, 0)][DBLP] Financial Cryptography, 2006, pp:236-250 [Conf] - Yusuke Naito, Yu Sasaki, Noboru Kunihiro, Kazuo Ohta
**Improved Collision Attack on MD4 with Probability Almost 1.**[Citation Graph (0, 0)][DBLP] ICISC, 2005, pp:129-145 [Conf] - Tetsuya Izu, Noboru Kunihiro, Kazuo Ohta, Masahiko Takenaka, Takashi Yoshioka
**A Sanitizable Signature Scheme with Aggregation.**[Citation Graph (0, 0)][DBLP] ISPEC, 2007, pp:51-64 [Conf] - Tetsuya Izu, Noboru Kunihiro, Kazuo Ohta, Takeshi Shimoyama
**Analysis on the Clockwise Transposition Routing for Dedicated Factoring Devices.**[Citation Graph (0, 0)][DBLP] WISA, 2005, pp:232-242 [Conf] - Bagus Santoso, Noboru Kunihiro, Naoki Kanayama, Kazuo Ohta
**Factorization of Square-Free Integers with High Bits Known.**[Citation Graph (0, 0)][DBLP] VIETCRYPT, 2006, pp:115-130 [Conf] - Yu Sasaki, Yusuke Naito, Jun Yajima, Takeshi Shimoyama, Noboru Kunihiro, Kazuo Ohta
**How to Construct Sufficient Conditions for Hash Functions.**[Citation Graph (0, 0)][DBLP] VIETCRYPT, 2006, pp:243-259 [Conf] - Noboru Kunihiro
**Exact Analyses of Computational Time for Factoring in Quantum Computers.**[Citation Graph (0, 0)][DBLP] IEICE Transactions, 2005, v:88, n:1, pp:105-111 [Journal] - Noboru Kunihiro, Shigeru Yamashita
**Efficient Algorithms for NMR Quantum Computers with Small Qubits.**[Citation Graph (0, 0)][DBLP] New Generation Comput., 2003, v:21, n:2, pp:- [Journal] - Kazuo Ohta, Tetsuo Nishino, Seiya Okubo, Noboru Kunihiro
**A Quantum Algorithm Using NMR Computers to Break Secret-Key Cryptosystems.**[Citation Graph (0, 0)][DBLP] New Generation Comput., 2003, v:21, n:2, pp:- [Journal] - Jun Yajima, Yu Sasaki, Yusuke Naito, Terutoshi Iwasaki, Takeshi Shimoyama, Noboru Kunihiro, Kazuo Ohta
**A New Strategy for Finding a Differential Path of SHA-1.**[Citation Graph (0, 0)][DBLP] ACISP, 2007, pp:45-58 [Conf] - Yu Sasaki, Lei Wang, Kazuo Ohta, Noboru Kunihiro
**New Message Difference for MD4.**[Citation Graph (0, 0)][DBLP] FSE, 2007, pp:329-348 [Conf] - Noboru Kunihiro, Kaoru Kurosawa
**Deterministic Polynomial Time Equivalence Between Factoring and Key-Recovery Attack on Takagi's RSA.**[Citation Graph (0, 0)][DBLP] Public Key Cryptography, 2007, pp:412-425 [Conf] **Yet Another Sanitizable Signature from Bilinear Maps.**[Citation Graph (, )][DBLP]**A strict evaluation method on the number of conditions for the SHA-1 collision search.**[Citation Graph (, )][DBLP]**Security of MD5 Challenge and Response: Extension of APOP Password Recovery Attack.**[Citation Graph (, )][DBLP]**Small Secret Key Attack on a Variant of RSA (Due to Takagi).**[Citation Graph (, )][DBLP]**New Key-Recovery Attacks on HMAC/NMAC-MD4 and NMAC-MD5.**[Citation Graph (, )][DBLP]**Sanitizable and Deletable Signature.**[Citation Graph (, )][DBLP]**Extension of Secret Handshake Protocols with Multiple Groups in Monotone Condition.**[Citation Graph (, )][DBLP]**Password Recovery on Challenge and Response: Impossible Differential Attack on Hash Function.**[Citation Graph (, )][DBLP]**New Definition of Density on Knapsack Cryptosystems.**[Citation Graph (, )][DBLP]
Search in 0.002secs, Finished in 0.004secs | |||||||

| |||||||

| |||||||

System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002 for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002 |