University of Tsukuba/ Professor
See the full list of international publications and see also DBLP.
Multiplicative and Verifiably Multiplicative Secret Sharing for Multipartite Adversary Structures, by Reo Eriguchi, Noboru Kunihiro and Koji Nuida, Designs, Codes and Cryptography, Published online at 10 January 2023. [DOI]
Efficient Noise Generation Protocols for Differentially Private Multiparty Computation, by Reo Eriguchi, Atsunori Ichikawa, Noboru Kunihiro, Koji Nuida, IEEE Transactions on Dependable and Secure Computing, Dec. 2022. [DOI]
Efficient Construction of a Control Modular Adder on a Carry-Lookahead Adder Using Relative-phase Toffoli Gates, by Kento Oonishi, Tomoki Tanaka, Shumpei Uno, Takahiko Satoh, Rodney Van Meter, and Noboru Kunihiro, IEEE Transactions on Quantum Engineering, vol. 3, pp. 1-18, 2022. (Available online 19 December, 2021.) [DOI]
Cryptanalysis of the RSA variant based on cubic Pell equation, by Mengce Zheng, Noboru Kunihiro and Yuanzhi Yao, Theoretical Computer Science, Volume 889, pp. 135-144, 2021. (Available online 5 August 2021.) [DOI]
Strong Security of Linear Ramp Secret Sharing Schemes with General Access Structures, by Reo Eriguchi and Noboru Kunihiro, Information Processing Letters, Vol. 164, Article 106018, December 2020. [DOI]
Extended partial key exposure attacks on RSA: Improvement up to full size decryption exponents, by Kaichi Suzuki, Atsushi Takayasu, Noboru Kunihiro, Theoretical Computer Science, Volume 841, pp. 62-83, 2020. [DOI]
Generic hardness of inversion on ring and its relation to self-bilinear map, by Takashi Yamakawa, Shota Yamada, Goichiro Hanaoka, Noboru Kunihiro, Theoretical Computer Science, Volume 820, pp. 60-84, 2020. [DOI]
Worst case short lattice vector enumeration on block reduced bases of arbitrary blocksizes, by Noboru Kunihiro and Atsushi Takayasu, Discrete Applied Mathematics, Volume 277, pp. 198-220, 2020. [DOI]
Partial Key Exposure Attacks on RSA: Achieving Boneh-Durfee’s Bound, by Atsushi Takayasu and Noboru Kunihiro, Theoretical Computer Science, Vol. 761, pp. 51-77, 2019. [DOI]
Self-bilinear Map on Unknown Order Groups from Indistinguishability Obfuscation and Its Applications, by Takashi Yamakawa, Shota Yamada, Goichiro Hanaoka, and Noboru Kunihiro, Algorithmica, 79 (4), pp. 1286-1317, 2017. [DOI]
Bias from Uniform Nonce: Revised Fourier Analysis-based Attack on ECDSA, by Shunsuke Osaki and Noboru Kunihiro, in Proc. of SAC2024.
HS-Based Error Correction Algorithm for Noisy Binary GCD Side-Channel Sequences, by Kenta Tani and Noboru Kunihiro, in Proc. of Applied Cryptography and Network Security 2023 (ACNS2023), LNCS 13905,pp. 59-88, 2023. [DOI]
Efficient Noise Generation to Achieve Differential Privacy with Applications to Secure Multiparty Computation, by Reo Eriguchi, Atsunori Ichikawa, Noboru Kunihiro and Koji Nuida, in Proc. of Financial Cryptography and Data Security 2021 (FC2021), 2021. [pdf]
Recovering CRT-RSA Secret Keys from Noisy Square-and-Multiply Sequences in the Sliding Window Method, by Kento Oonishi, Noboru Kunihiro, in Proc. of ACISP2020, pp. 642-652, 2020. [Link]
d-Multiplicative Secret Sharing for Multipartite Adversary Structures, by Reo Eriguchi and Noboru Kunihiro, in Proc. of 1st Conference on Information-Theoretic Cryptography (ITC 2020), pp. 2:1-2:16, vol. 163, 2020. [Link]
A Deterministic Algorithm for Computing Divisors in an Interval, by Liqiang Peng, Yao Lu, Noboru Kunihiro, Rui Zhang and Lei Hu, in Proc. of ACISP2018, LNCS 10946, pp. 3-12, 2018. [Link]
Bounds in Various Generalized Settings of the Discrete Logarithm Problem, by Jason Ying and Noboru Kunihiro, in Proc. of ACNS2017, LNCS 10355, pp. 498-517, 2017. [Link]
Improved Factoring Attacks on Multi-Prime RSA with Small Prime Difference, by Mengce Zheng, Noboru Kunihiro and Honggang Hu, in Proc. of ACISP2017, LNCS 10342, pp. 324-342, 2017. [Link]
Mis-operation Resistant Searchable Homomorphic Encryption, by Keita Emura, Takuya Hayashi, Noboru Kunihiro and Jun Sakuma, in Proc. of ASIA CCS'17, pp. 215–229, 2017. [Link]
Improved Key Recovery Algorithms from Noisy RSA Secret Keys with Analog Noise, by Noboru Kunihiro and Yuki Takayasu, in Proc. of CT-RSA2017, LNCS 10159, pp. 328–343, 2017. [Link]
A Tool Kit for Partial Key Exposure Attacks on RSA, by A. Takayasu and N. Kunihiro, in Proc. of CT-RSA2017, LNCS 10159, pp. 58–73, 2017. [Link]
Partial Key Exposure Attacks on RSA with Multiple Exponent Pairs, by A. Takayasu and N. Kunihiro, in Proc. of ACISP2016, LNCS 9723, pp. 243–257, 2016. [Link]
Generalized Hardness Assumption for Self-bilinear Map with Auxiliary Information, by T. Yamakawa, G. Hanaoka and N. Kunihiro, in Proc. of ACISP2016, LNCS 9723, pp. 269–284, 2016. [Link]
Private Information Retrieval with Preprocessing Based on the Approximate GCD Problem, by T. Vannet and N. Kunihiro, in Proc. of SAC2015, LNCS 9566, pp. 227–240, 2015. [Link]
Partial Key Exposure Attacks on CRT-RSA: Better Cryptanalysis to Full Size Encryption Exponents, by A. Takayasu and N. Kunihiro, in Proc. of ACNS2015, LNCS 9092, 2015. [Link]
Chosen Ciphertext Security on Hard Membership Decision Groups: The Case of Semi-smooth Subgroups of Quadratic Residues, by Takashi Yamakawa, Shota Yamada, Koji Nuida, Goichiro Hanaoka and Noboru Kunihiro, in Proc. of SCN2014, LNCS 8642, pp. 558-577, 2014. [Link]
Partial Key Exposure Attacks on RSA: Achieving Boneh-Durfee’s Bound, by A. Takayasu and N. Kunihiro, in Proc. of SAC2014, LNCS 8781, pp. 345-362, 2014. [Link]
Cryptanalysis of RSA with Multiple Small Secret Exponents, by A. Takayasu and N. Kunihiro, in Proc. of ACISP2014, LNCS 8544, pp. 176-191, 2014. [Link]
Better Lattice Constructions for Solving Multivariate Linear Equations Modulo Unknown Divisors, by Atsushi Takayasu and Noboru Kunihiro, in Proc. of ACISP2013, LNCS 7959, pp. 118-135, 2013. [Link]
Optimal Bounds for Multi-Prime Phi-Hiding Assumption, by Kaori Tosu, Noboru Kunihiro, in Proc. of ACISP2012, LNCS7372, pp. 1-14, 2012. [Link]
Faster Algorithm for Solving Hard knapsacks for Moderate Message Length, by Yuji Nagashima, Noboru Kunihiro, in Proc. of ACISP2012, LNCS7372, pp. 43-56, 2012. [Link]
Two-Dimensional Representation of Cover Free Families and its Applications: Short Signatures and More, by Shota Yamada, Goichiro Hanaoka, and Noboru Kunihiro, in Proc. of CT-RSA2012, 7178, pp. 260-277, 2012. [Link]
Generic Construction of Chosen Ciphertext Secure Proxy Re-Encryption, by Goichiro Hanaoka, Yutaka Kawai, Noboru Kunihiro, Takahiro Matsuda, Jian Weng, Rui Zhang, Yunlei Zhao in Proc. of CT-RSA2012, 7178, pp. 349-364, 2012. [Link]
A Unified Framework for Small Secret Exponent Attack on RSA, by Noboru Kunihiro, Naoyuki Shinohara and Tetsuya Izu, in Proc. of SAC2011, LNCS7118, pp. 260-277, 2011. [Link]
Solving Generalized Small Inverse Problems, by N. Kunihiro in Proc. of ACISP2010, LNCS6168, pp. 248-263, 2010. [Link]
Security of MD5 Challenge and Response: Extension of APOP Password Recovery Attack, by Yu Sasaki, Lei Wang, Kazuo Ohta and Noboru Kunihiro, in Proc. of CT-RSA2008, LNCS4964, pp. 1-18, 2008. [Link]
Small Secret Key Attack on a variant of RSA (due to Takagi), by Kouichi Itoh and Noboru Kunihiro and Kaoru Kurosawa, in Proc. of CT-RSA2008, LNCS4964, pp. 387-406, 2008. [Link]
Password Recovery Attack on Authentication Protocol MD4(Password||Challenge), by Lei Wang and Kazuo Ohta and Noboru Kunihiro, in Proc. of ASIACCS2008, pp. 3-9, 2008. [Link]
A Strict Evaluation Method on the Number of Conditions for the SHA-1 Collision Search, by Jun Yajima, Terutoshi Iwasaki, Yusuke Naito, Yu Sasaki, Takeshi Shimoyama, Noboru Kunihiro, Kazuo Ohta, in Proc. of ASIACCS2008, pp. 10-20, 2008. [Link]
A New Strategy for Finding a Differential Path of SHA-1, by Jun Yajima, Yu Sasaki, Yusuke Naito, Terutoshi Iwasaki, Takeshi Shimoyama, Noboru Kunihiro, Kazuo Ohta, in Proc. of ACISP 2007, LNCS4586, pp. 45-58, July, 2007. [Link]
Provable Secure Electronic Cash based on Blind Multisignature schemes, by Y. Hanatani, Y. Komano, K. Ohta and N. Kunihiro, in Financial Cryptography'06, LNCS 4107, pp. 236-250, Feb.27-March 2, 2006. [Link]
e-mail: kunihiro (at) cs.tsukuba.ac.jp