The SCEAS System
Navigation Menu

Search the dblp DataBase


Noboru Kunihiro: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Kenji Koyama, Yukio Tsuruoka, Noboru Kunihiro
    Modulus Search for Elliptic Curve Cryptosystems. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 1999, pp:1-7 [Conf]
  2. Yusuke Naito, Yu Sasaki, Takeshi Shimoyama, Jun Yajima, Noboru Kunihiro, Kazuo Ohta
    Improved Collision Search for SHA-0. [Citation Graph (0, 0)][DBLP]
    ASIACRYPT, 2006, pp:21-36 [Conf]
  3. Masahiro Mambo, Moises Rosales Salinas, Kazuo Ohta, Noboru Kunihiro
    Problems on the MR micropayment schemes. [Citation Graph (0, 0)][DBLP]
    ASIACCS, 2006, pp:363- [Conf]
  4. Noboru Kunihiro, Kenji Koyama
    Equivalence of Counting the Number of Points on Elliptic Curve over the Ring Zn and Factoring n. [Citation Graph (0, 0)][DBLP]
    EUROCRYPT, 1998, pp:47-58 [Conf]
  5. Yoshikazu Hanatani, Yuichi Komano, Kazuo Ohta, Noboru Kunihiro
    Provably Secure Electronic Cash Based on Blind Multisignature Schemes. [Citation Graph (0, 0)][DBLP]
    Financial Cryptography, 2006, pp:236-250 [Conf]
  6. Yusuke Naito, Yu Sasaki, Noboru Kunihiro, Kazuo Ohta
    Improved Collision Attack on MD4 with Probability Almost 1. [Citation Graph (0, 0)][DBLP]
    ICISC, 2005, pp:129-145 [Conf]
  7. Tetsuya Izu, Noboru Kunihiro, Kazuo Ohta, Masahiko Takenaka, Takashi Yoshioka
    A Sanitizable Signature Scheme with Aggregation. [Citation Graph (0, 0)][DBLP]
    ISPEC, 2007, pp:51-64 [Conf]
  8. Tetsuya Izu, Noboru Kunihiro, Kazuo Ohta, Takeshi Shimoyama
    Analysis on the Clockwise Transposition Routing for Dedicated Factoring Devices. [Citation Graph (0, 0)][DBLP]
    WISA, 2005, pp:232-242 [Conf]
  9. Bagus Santoso, Noboru Kunihiro, Naoki Kanayama, Kazuo Ohta
    Factorization of Square-Free Integers with High Bits Known. [Citation Graph (0, 0)][DBLP]
    VIETCRYPT, 2006, pp:115-130 [Conf]
  10. Yu Sasaki, Yusuke Naito, Jun Yajima, Takeshi Shimoyama, Noboru Kunihiro, Kazuo Ohta
    How to Construct Sufficient Conditions for Hash Functions. [Citation Graph (0, 0)][DBLP]
    VIETCRYPT, 2006, pp:243-259 [Conf]
  11. Noboru Kunihiro
    Exact Analyses of Computational Time for Factoring in Quantum Computers. [Citation Graph (0, 0)][DBLP]
    IEICE Transactions, 2005, v:88, n:1, pp:105-111 [Journal]
  12. Noboru Kunihiro, Shigeru Yamashita
    Efficient Algorithms for NMR Quantum Computers with Small Qubits. [Citation Graph (0, 0)][DBLP]
    New Generation Comput., 2003, v:21, n:2, pp:- [Journal]
  13. Kazuo Ohta, Tetsuo Nishino, Seiya Okubo, Noboru Kunihiro
    A Quantum Algorithm Using NMR Computers to Break Secret-Key Cryptosystems. [Citation Graph (0, 0)][DBLP]
    New Generation Comput., 2003, v:21, n:2, pp:- [Journal]
  14. Jun Yajima, Yu Sasaki, Yusuke Naito, Terutoshi Iwasaki, Takeshi Shimoyama, Noboru Kunihiro, Kazuo Ohta
    A New Strategy for Finding a Differential Path of SHA-1. [Citation Graph (0, 0)][DBLP]
    ACISP, 2007, pp:45-58 [Conf]
  15. Yu Sasaki, Lei Wang, Kazuo Ohta, Noboru Kunihiro
    New Message Difference for MD4. [Citation Graph (0, 0)][DBLP]
    FSE, 2007, pp:329-348 [Conf]
  16. Noboru Kunihiro, Kaoru Kurosawa
    Deterministic Polynomial Time Equivalence Between Factoring and Key-Recovery Attack on Takagi's RSA. [Citation Graph (0, 0)][DBLP]
    Public Key Cryptography, 2007, pp:412-425 [Conf]

  17. Yet Another Sanitizable Signature from Bilinear Maps. [Citation Graph (, )][DBLP]

  18. A strict evaluation method on the number of conditions for the SHA-1 collision search. [Citation Graph (, )][DBLP]

  19. Security of MD5 Challenge and Response: Extension of APOP Password Recovery Attack. [Citation Graph (, )][DBLP]

  20. Small Secret Key Attack on a Variant of RSA (Due to Takagi). [Citation Graph (, )][DBLP]

  21. New Key-Recovery Attacks on HMAC/NMAC-MD4 and NMAC-MD5. [Citation Graph (, )][DBLP]

  22. Sanitizable and Deletable Signature. [Citation Graph (, )][DBLP]

  23. Extension of Secret Handshake Protocols with Multiple Groups in Monotone Condition. [Citation Graph (, )][DBLP]

  24. Password Recovery on Challenge and Response: Impossible Differential Attack on Hash Function. [Citation Graph (, )][DBLP]

  25. New Definition of Density on Knapsack Cryptosystems. [Citation Graph (, )][DBLP]

Search in 0.002secs, Finished in 0.004secs
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
System created by [] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002