Publication List (International)

Last updated 2024/01/26
Table of Contents

Books

  1. International Symposium on Mathematics, Quantum Theory, and Cryptography - Poceedings of MQC 2019 -, Tsuyoshi Takagi, Masato Wakayama, Keisuke Tanaka, Noboru Kunihiro, Kazufumi Kimoto, and Yasuhiko Ikematsu, Springer, October, 2020. [Link]

  2. Mathematical Modelling for Next-Generation Cryptography, Editor: Tsuyoshi Takagi, Masato Wakayama, Keisuke Tanaka, Noboru Kunihiro, Kazufumi Kimoto, and Dung Hoang Duong, Springer, July, 2017. [Link]

Review Article

  1. Quantum Factoring Algorithm: Resource Estimation and Survey of Experiments, by Noboru Kunihiro, International Symposium on Mathematics, Quantum Theory, and Cryptography - Proceedings of MQC 2019 -, pp. 39-55, Springer, 2020. [DOI]

  2. Mathematical Approach for Recovering Secret Key from Its Noisy Version, by Noboru Kunihiro, Mathematical Modelling for Next-Generation Cryptography, pp. 199-217, Springer, 2017. [DOI]

  3. Recent Progress on Coppersmith’s Lattice-Based Method: A Survey, by Yao Lu, Liqiang Peng and Noboru Kunihiro, Mathematical Modelling for Next-Generation Cryptography, pp. 297-312, Springer, 2017. [DOI]

Journal Paper

  1. Linear Algebraic Approach to Strongly Secure Ramp Secret Sharing for General Access Structures with Application to Symmetric PIR, by Reo Eriguchi, Noboru Kunihiro and Koji Nuida, IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, Vol. E106-A, No.3, pp. 263-271, 2023. [DOI]

  2. Multiplicative and Verifiably Multiplicative Secret Sharing for Multipartite Adversary Structures, by Reo Eriguchi, Noboru Kunihiro and Koji Nuida, Designs, Codes and Cryptography, Published online at 10 January 2023. [DOI]

  3. Efficient Noise Generation Protocols for Differentially Private Multiparty Computation, by Reo Eriguchi, Atsunori Ichikawa, Noboru Kunihiro, Koji Nuida, IEEE Transactions on Dependable and Secure Computing, Dec. 2022. [DOI]

  4. Efficient Construction of a Control Modular Adder on a Carry-Lookahead Adder Using Relative-phase Toffoli Gates, by Kento Oonishi, Tomoki Tanaka, Shumpei Uno, Takahiko Satoh, Rodney Van Meter, and Noboru Kunihiro, IEEE Transactions on Quantum Engineering, vol. 3, pp. 1-18, 2022. (Available online 19 December, 2021.) [DOI]

  5. Cryptanalysis of the RSA variant based on cubic Pell equation, by Mengce Zheng, Noboru Kunihiro and Yuanzhi Yao, Theoretical Computer Science, Volume 889, pp. 135-144, 2021. (Available online 5 August 2021.) [DOI]

  6. Strong Security of Linear Ramp Secret Sharing Schemes with General Access Structures, by Reo Eriguchi and Noboru Kunihiro, Information Processing Letters, Vol. 164, Article 106018, December 2020. [DOI]

  7. Lattice-Based Cryptanalysis of RSA with Implicitly Related Keys, by Mengce Zheng, Noboru Kunihiro and Honggang Hu, IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, Vol. E103-A, No.8, pp. 959-968, 2020. [Link]

  8. Extended partial key exposure attacks on RSA: Improvement up to full size decryption exponents, by Kaichi Suzuki, Atsushi Takayasu, Noboru Kunihiro, Theoretical Computer Science, Volume 841, pp. 62-83, 2020. [DOI]

  9. Generic hardness of inversion on ring and its relation to self-bilinear map, by Takashi Yamakawa, Shota Yamada, Goichiro Hanaoka, Noboru Kunihiro, Theoretical Computer Science, Volume 820, pp. 60-84, 2020. [DOI]

  10. Worst case short lattice vector enumeration on block reduced bases of arbitrary blocksizes, by Noboru Kunihiro and Atsushi Takayasu, Discrete Applied Mathematics, Volume 277, pp. 198-220, 2020. [DOI]

  11. Partial Key Exposure Attacks on RSA: Achieving Boneh-Durfee’s Bound, by Atsushi Takayasu and Noboru Kunihiro, Theoretical Computer Science, Vol. 761, pp. 51-77, 2019. [DOI]

  12. Constructing Subspace Membership Encryption through Inner Product Encryption, by Shuichi Katsumata and Noboru Kunihiro, IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, Vol. E100-A, No.9, pp. 1804-1815, 2017. [DOI]

  13. Self-bilinear Map on Unknown Order Groups from Indistinguishability Obfuscation and Its Applications, by Takashi Yamakawa, Shota Yamada, Goichiro Hanaoka, and Noboru Kunihiro, Algorithmica, 79 (4), pp. 1286-1317, 2017. [DOI]

  14. General Bounds for Small Inverse Problems and Its Applications to Multi-Prime RSA, by Atsushi Takayasu and Noboru Kunihiro, IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, Vol. E100-A, No.1, pp. 50-61, 2017. [DOI]

  15. Searchable symmetric encryption capable of searching for an arbitrary string, by Y. Uchide and Noboru Kunihiro, Security and Communication Networks, vol. 9, issue 12, pp. 1726-1736, 2016. [DOI]

  16. A limitation on security evaluation of cryptographic primitives with fixed keys, by Yutaka Kawai, Goichiro Hanaoka, Kazuo Ohta and Noboru Kunihiro, Security and Communication Networks, vol. 9, issue 12, pp. 1663-1675, 2016. [DOI]

  17. Security Analysis on AUTH Protocol and Its Variant against the Man-in-the-Middle Attack, by Kosei Endo and Noboru Kunihiro, IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, Vol. E98-A, No.1, pp. 153-161, 2015. [DOI]

  18. Better Lattice Constructions for Solving Multivariate Linear Equations Modulo Unknown Divisors, by Atsushi Takayasu and Nobru Kunihiro, IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, Vol. E97-A, No.6, pp. 1259-1272, 2014. [DOI]

  19. Recovering RSA Secret Keys from Noisy Key Bits with Erasures and Errors, by Noboru Kunihiro, Naoyuki Shinohara and Tetsuya Izu, IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, Vol. E97-A, No.6, pp. 1273-1284, 2014. [DOI]

  20. A Unified Framework for Small Secret Exponent Attack on RSA, by Noboru Kunihiro, Naoyuki Shinohara and Tetsuya Izu, IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, Vol. E97-A, No.6, pp. 1285-1295, 2014. [DOI]

  21. Secret handshake scheme with request-based-revealing, by Yutaka Kawai, Noboru Kunihiro, Computers & Mathematics with Applications 65(5), pp. 786-798, 2013. [DOI]

  22. Random Sampling Reduction with Precomputation, by Masayuki Yoshino and Noboru Kunihiro, IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, Vol. E96-A, No.1, pp. 150-157, 2013. [DOI]

  23. On the Hardness of Subset Sum Problem from Different Intervals, by Jun Kogure, Noboru Kunihiro Hirosuke Yamamoto, IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, Vol. E95-A, No.5, pp. 903-908, 2012. [DOI]

  24. On the (Im)possibility Results for Strong Attack Models for Public Key Cryptsystems, by Yutaka Kawai, Yusuke Sakai, Noboru Kunihiro, Special issue in the Journal of Internet Services and Information Security, Vol. 1, No. 2/3, pp. 125-139, 2011.

  25. Solving Generalized Small Inverse Problems, by Noboru Kunihiro, IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, Vol. E94-A, No.6, pp. 1274-1284, 2011. [DOI]

  26. Small Secret CRT-Exponent Attacks on Takagi’s RSA, by Naoyuki SHINOHARA, Tetsuya IZU and Noboru KUNIHIRO, IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, Vol. E94-A, No.1, pp. 19-27, 2011. [DOI]

  27. Public Key Encryption Schemes from the (B)CDH Assumption with Better Efficiency, by Shota YAMADA Yutaka KAWAI Goichiro HANAOKA Noboru KUNIHIRO, IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, Vol. E93-A, No.11, pp. 1984-1993, 2010. [DOI]

  28. Quantum addition circuits and unbounded fan-out, by Yasuhiro Takahashi, Seiichiro Tani, and Noboru Kunihiro, Quantum Information and Computation, Vol.10 No.9/10, pp.872-890, 2010.

  29. New Conditions for Secure Knapsack Schemes against Lattice Attack, by Noboru Kunihiro, IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, Vol. E93-A, No.6, pp. 1058-1065, 2010. [DOI]

  30. Extension of Secret Handshake Protocols with Multiple Groups in Monotone Condition, by Yutaka Kawai, S. Tanno, T. Kondo, Kazuki Yoeneyama, Kazuo Ohat and Noboru Kunihiro, IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, Vol. E93-A, No.6, pp. 1122-1131, 2010. [DOI]

  31. Cryptanalysis of Two MD5-Based Authentication Protocols: APOP and NMAC, by Lei Wang, Kazuo Ohta, Yu Sasaki, Kazuo Sakiyama and Noboru Kunihiro, IEICE TRANSACTIONS on Information and Systems, Vol. E93-D, No. 5, pp. 1087-1095, 2010. [DOI]

  32. Practical Password Recovery Attacks on MD4 Based Prefix and Hybrid Authentication Protocols, by Yu Sasaki, Lei Wang, Kazuo Ohta, Kazumaro Aoki and Noboru Kunihiro, IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, Vol. E93-A, No.1, pp. 84-92, 2010. [DOI]

  33. Small Secret Key Attack on a Takagi’s Variant of RSA, by Kouichi Itoh, Noboru Kunihiro and Kaoru Kurosawa, IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, Vol. E92-A, No.1, pp. 33-41, 2009. [DOI]

  34. Near-Collision Attacks on MD4: Applied to MD4-Based Protocols, by Lei Wang, Kazuo Ohta and Noboru Kunihiro, IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, Vol. E92-A, No.1, pp. 76-86, 2009. [DOI]

  35. A Strict Evaluation on the Number of Conditions for SHA-1 Collision Search, by Jun Yajima, Terutoshi Iwasaki, Yusuke Naito, Yu Sasaki, Takeshi Shimoyama, Thomas Peyrin, Noboru Kunihiro and Kazuo Ohta, IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, Vol. E92-A, No.1, pp. 87-95, 2009. [DOI]

  36. Extended Password Recovery Attacks against APOP, SIP, and Digest Authentication, by Yu Sasaki, Lei Wang, Kazuo Ohta and Noboru Kunihiro, IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, Vol. E92-A, No.1, pp. 96-104, 2009. [DOI]

  37. Deterministic Polynomial Time Equivalence between Factoring and Key-Recovery Attack on Takagi’s RSA, by Noboru Kunihiro and Kaoru Kurosawa, IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, Vol. E91-A, No.9, pp. 2356-2364, 2008. [DOI]

  38. A Fast Quantum Circuit for Addition with Few Qubits, by Yasuhiro Takahashi and Noboru Kunihiro, Quantum Information and Computation, Vol.8 No.6/7, pp.636-649, 2008.

  39. Improved Collision Search for Hash Functions: New Advanced Message Modification, by Yusuke NAITO Kazuo OHTA Noboru KUNIHIRO, IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, Vol. E91-A, No.1, pp. 46-54, 2008. [DOI]

  40. New Message Differences for Collision Attacks on MD4 and MD5, by Yu SASAKI Lei WANG Noboru KUNIHIRO Kazuo OHTA, IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, Vol. E91-A, No.1, pp. 55-63, 2008. [DOI]

  41. Factorization of Square-Free Integers with High Bits Known, by Bagus SANTOSO Noboru KUNIHIRO Naoki KANAYAMA Kazuo OHTA, IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, Vol. E91-A, No.1, pp. 306-315, 2008. [DOI]

  42. Provably Secure Untraceable Electronic Cash against Insider Attacks, by Yoshikazu Hanatani, Yuichi Komano, Kazuo Ohta and Noboru Kunihiro, IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, Vol. E90-A, No.5, pp. 980-991, 2007. [DOI]

  43. The quantum Fourier transform on a linear nearest neighbor architecture, by Yasuhiro Takahashi, Noboru Kunihiro and Kazuo Ohta, Quantum Information and Computation, Vol.7 No.4, pp.383-391, 2007.

  44. Improved Collision Attacks on MD4 and MD5, by Yu Sasaki, Yusuke Naito Noboru Kunihiro and Kazuo Ohta, IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, Vol. E90-A, No.1, pp. 36-47 (2007). [DOI]

  45. Maurer-Yacobi ID based Key Distribution Revisited, by Noboru Kunihiro Wataru Abe and Kazuo Ohta, IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, Vol. E89-A, No.5, pp. 1421-1424, 2006. [DOI]

  46. Visual Secret Sharing Schemes for Multiple Secret Images Allowing the Rotation of Shares, by Mitsugu Iwamoto, Lei Wang, Kazuki Yoneyama, Noboru Kunihiro and Kazuo Ohta, IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, Vol. E89-A, No.5, pp. 1382-1395 (2006). [DOI]

  47. A quantum circuit for Shor’s factoring algorithm using $2n+2$ qubits, by Yasuhiro Takahashi and Noboru Kunihiro, Quantum Information and Computation, Vol.6 No.2, pp.184-192, 2006.

  48. A LINEAR-SIZE QUANTUM CIRCUIT FOR ADDITION WITH NO ANCILLARY QUBITS, by Yasuhiro Takahashi and Noboru Kunihiro, Quantum Information and Computation, Vol.5 No.6, pp.440-448, 2005.

  49. Exact Analyses of Computational Time for Factoring in Quantum Computers, by Noboru Kunihiro IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, Vol. E88-A, No.1, pp. 105-111 (2005). [DOI]

  50. Efficient Algorithms for NMR Quantum Computers with Small Qubits, by Noboru Kunihiro and Shigeru Yamashita, New Generation Computing Vol. 21, No. 4, pp.329-337, 2003. [DOI]

  51. A Quantum Algorithm using NMR Computers to Break Secret-Key Cryptosystems, by Kazuo Ohta, Tetsuro Nishino, Seiya Okubo and Noboru Kunihiro, New Generation Computing Vol. 21, No. 4, pp.347-361, 2003. [DOI]

  52. Two Discrete Log Algorithms for Super-Anomalous Elliptic Curves and Their Applications, by Noboru Kunihiro and Kenji Koyama, IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, Vol. E83-A, No.1, pp. 10-16, 2000.

  53. New methods for generating short addition chains, by Noboru Kunihiro and Hirosuke Yamamoto, IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, Vol. E83-A, No.1, pp. 60-67, 2000.

  54. Window and Extended Window methods for Addition chain and Addition-Subtraction chain, by Noboru Kunihiro and Hirosuke Yamamoto, IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, Vol. E81-A, No.1, pp. 72-81, 1998.

Invited Talks

  1. Activities on Security Analysis toward Quantum-Safe Society in Japan, ETSI Quantum Safe Cryptography Technical Event, 2021/02/18.[Link]
  2. Quantum Factoring Algorithm: Resource Estimation and Survey of Experiments, MQC2019, 2019/09/25. [Link]
  3. Recovering RSA Secret Keys from Noisy Keys, WICS, Aomori, (Keynote Speaker), 2017/11/22
  4. Recovering RSA Secret Keys from Noisy Keys, UTokyo-IIT Madras Worksop on Theoretical Computer Science, IIT Madras, Chennai, Inidia, 2017/3/14

International Conference

  1. Extended Attacks on ECDSA with Noisy Multiple Bit Nonce Leakages, by Shunsuke Osaki and Noboru Kunihiro, ICISC2023, 2023.

  2. Experiments and Resource Analysis of Shor’s Factorization Using a Quantum Simulator, by Junpei Yamaguchi, Masafumi Yamazaki, Akihiro Tabuchi, Takumi Honda, Noboru Kunihiro and Tetsuya Izu, ICISC2023, 2023.

  3. HS-Based Error Correction Algorithm for Noisy Binary GCD Side-Channel Sequences, by Kenta Tani and Noboru Kunihiro, in Proc. of Applied Cryptography and Network Security 2023 (ACNS2023), LNCS 13905,pp. 59-88, 2023. [DOI]

  4. Efficient Noise Generation to Achieve Differential Privacy with Applications to Secure Multiparty Computation, by Reo Eriguchi, Atsunori Ichikawa, Noboru Kunihiro and Koji Nuida, in Proc. of Financial Cryptography and Data Security 2021 (FC2021), 2021. [pdf]

  5. A Linear Algebraic Approach to Strongly Secure Ramp Secret Sharing for General Access Structures, by Reo Eriguchi, Noboru Kunihiro, and Koji Nuida, in Proc. of ISITA2020, 2020. [Link]

  6. Recovering CRT-RSA Secret Keys from Noisy Square-and-Multiply Sequences in the Sliding Window Method, by Kento Oonishi, Noboru Kunihiro, in Proc. of ACISP2020, pp. 642-652, 2020. [DOI]

  7. New Secret Key Management Technology for Blockchains from Biometrics Fuzzy Signature, by Ken Naganuma, Takayuki Suzuki, Masayuki Yoshino, Kenta Takahashi, Yosuke Kaga and Noboru Kunihiro, in Proc. of ASIAJCIS2020, pp. 54-58, 2020.[DOI]

  8. Practical Query-Based Order Revealing Encryption from Symmetric Searchable Encryption, by Masayuki Yoshino, Ken Naganuma, Noboru Kunihiro and Hisayoshi Sato, in Proc. of ASIAJCIS2020, pp.16-23, 2020.[DOI]

  9. Post-Quantum zk-SNARK for Arithmetic Circuits using QAPs, by Ken Naganuma, Masayuki Yoshino, Atsuo Inoue, Yukinori Matsuoka, Mineaki Okazaki and Noboru Kunihiro, in Proc. of ASIAJCIS2020, pp. 32-39, 2020.[DOI]

  10. d-Multiplicative Secret Sharing for Multipartite Adversary Structures, by Reo Eriguchi and Noboru Kunihiro, in Proc. of 1st Conference on Information-Theoretic Cryptography (ITC 2020), pp. 2:1-2:16, vol. 163, 2020. [DOI]

  11. Improved CRT-RSA Secret Key Recovery Method from Sliding Window Leakage, by Kento Oonishi, Xiaoxuan Huang, and Noboru Kunihiro, in Proc. of ICISC2019, pp 278-296, LNCS 11975, 2019. [DOI]

  12. Strongly Secure Ramp Secret Sharing Schemes from Any Linear Secret Sharing Schemes, by Reo Eriguchi and Noboru Kunihiro, 2019 IEEE Information Theory Workshop (ITW), pp. 1-5, 2019. [DOI]

  13. Optimal Multiple Assignment Schemes Using Ideal Multipartite Secret Sharing Schemes, by Reo Eriguchi, Noboru Kunihiro and Mitsugu Iwamoto, 2019 IEEE International Symposium on Information Theory (ISIT), pp. 3047-3051, 2019. [DOI]

  14. Attacking Noisy Secret CRT-RSA Exponents in Binary Method, by Kento Oonishi and Noboru Kunihiro, in Proc. of ICISC2018, LNCS 11396, pp. 37-54, 2018. [DOI]

  15. Certifying Variant of RSA with Generalized Moduli, by Yao Lu, Noboru Kunihiro, Rui Zhang, Liqiang Peng and Hui Ma, in Proc. of ICICS2018, LNCS 11149, pp. 598-608, 2018. [DOI]

  16. Multi-party Key Exchange Protocols from Supersingular Isogenies, by Satoshi Furukawa, Noboru Kunihiro and Katsuyuki Takashima, In Proc. of ISITA 2018, pp. 208-212, 2018. [Link]

  17. Decentralized Netting Protocol over Consortium Blockchain, by Ken Naganuma, Masayuki Yoshino, Hisayoshi Sato, Nishio Yamada, Takayuki Suzuki, Noboru Kunihiro, In Proc. of ISITA 2018, pp. 174-177, 2018. [Link]

  18. Inference Attacks on Encrypted Databases based on Order Preserving Assignment Problem, by Sota Onozawa, Noboru Kunihiro, Masayuki Yoshino and Ken Naganuma, in Proc. of IWSEC2018, LNCS 11049, pp. 35-47, 2018. [DOI]

  19. Outsourced Private Function Evaluation with Privacy Policy Enforcement, by Noboru Kunihiro, Wen-Jie Lu, Takashi Nishide and Jun Sakuma, in Proc. of IEEE TrustCom2018, pp. 412-423, 2018. [Link]

  20. A Deterministic Algorithm for Computing Divisors in an Interval, by Liqiang Peng, Yao Lu, Noboru Kunihiro, Rui Zhang and Lei Hu, in Proc. of ACISP2018, LNCS 10946, pp. 3-12, 2018. [DOI]

  21. Cryptanalysis of RSA Variants with Modified Euler Quotient, Mengce Zheng, Noboru Kunihiro and Honggang Hu, in Proc. of Africacrypt2018, LNCS 10831, pp. 266-281, 2018. [DOI]

  22. Bounds in Various Generalized Settings of the Discrete Logarithm Problem, by Jason Ying and Noboru Kunihiro, in Proc. of ACNS2017, LNCS 10355, pp. 498-517, 2017. [DOI]

  23. Improved Factoring Attacks on Multi-Prime RSA with Small Prime Difference, by Mengce Zheng, Noboru Kunihiro and Honggang Hu, in Proc. of ACISP2017, LNCS 10342, pp. 324-342, 2017. [LDOI]

  24. Solving the DLP with Low Hamming Weight Product Exponents and Improved Attacks on the GPS Identification Scheme, Jason H.M. Ying and Noboru Kunihiro, in Proc. of ACISP2017, LNCS 10343, pp. 460-467, 2017. [DOI]

  25. Mis-operation Resistant Searchable Homomorphic Encryption, by Keita Emura, Takuya Hayashi, Noboru Kunihiro and Jun Sakuma, in Proc. of ASIA CCS'17, pp. 215-229, 2017. [DOI]

  26. Improved Key Recovery Algorithms from Noisy RSA Secret Keys with Analog Noise, by Noboru Kunihiro and Yuki Takahashi, in Proc. of CT-RSA2017, LNCS 10159, pp. 328-343, 2017. [DOI]

  27. A Tool Kit for Partial Key Exposure Attacks on RSA, by Atsushi Takayasu and Noboru Kunihiro, in Proc. of CT-RSA2017, LNCS 10159, pp. 58-73, 2017. [DOI]

  28. Cold Boot Attack Methods for the Discrete Logarithm Problem, by Hwei-Ming Ying and Noboru Kunihiro, in Proc. of CANDAR2016, pp. 154-160, 2016. [DOI]

  29. Decryption of Frequent Password Hashes in Rainbow Tables, by Hwei-Ming Ying and Noboru Kunihiro, in Proc. of CANDAR2016, pp. 655-661, 2016. [DOI]

  30. Small Secret Exponent Attacks on RSA with Unbalanced Prime Factors, by Atsushi Takayasu and Noboru Kunihiro, in Proc. of ISITA2016, IEEEExpore, pp. 236-240, 2016.

  31. Partial Key Exposure Attacks on CRT-RSA: General Improvement for the Exposed Least Significant Bits, by Atsushi Takayasu and Noboru Kunihiro, in Proc. of ISC2016, LNCS 9866, pp. 35-47, 2016. [DOI]

  32. Adversary-dependent Lossy Trapdoor Function from Hardness of Factoring Semi-smooth RSA Subgroup Moduli, by Takashi Yamakawa, Shota Yamada, Goichiro Hanaoka, and Noboru Kunihiro, in Proc. of CRYPTO2016, LNCS 9815, pp. 3-32, 2016. [DOI]

  33. Partial Server Side Parameter Selection in Private Information Retrieval, by Thomas Vannet and Noboru Kunihiro, in Proc. of ASIAJCIS2016, pp. 31-38, 2016.

  34. Partial Key Exposure Attacks on RSA with Multiple Exponent Pairs, by Atsushi Takayasu and Noboru Kunihiro, in Proc. of ACISP2016, LNCS 9723, pp. 243-257, 2016. [DOI]

  35. Generalized Hardness Assumption for Self-bilinear Map with Auxiliary Information by Takashi Yamakawa, Goichiro Hanaoka and Noboru Kunihiro, in Proc. of ACISP2016, LNCS 9723, pp. 269-284, 2016. [DOI]

  36. Improved Differential Fault Analysis on Camellia-128 by Toru Akishita and Noboru Kunihiro, in Proc. of COSADE2016, LNCS 9689, pp. 130-143, 2016. [DOI]

  37. How to Generalize RSA Cryptanalyses, by Atsushi Takayasu and Noboru Kunihiro, in Proc. of PKC2016, LNCS9615, pp. 67-97, 2016. [DOI]

  38. Maximum Likelihood-based Key Recovery Algorithm from Decayed Key Schedules, by Tomoyuki Tanigaki and Noboru Kunihiro, in Proc. of ICISC2015, LNCS9558, pp. 314-328, 2015. [DOI]

  39. An Improved Attack for Recovering Noisy RSA Secret Keys and its Countermeasure, by Noboru Kunihiro, in Proc. of ProvSec2015, LNCS9451, pp. 61-81, 2015. [DOI]

  40. Private Information Retrieval with Preprocessing Based on the Approximate GCD Problem, by Thomas Vannet and Noboru Kunihiro, in Proc. of SAC2015, LNCS 9566, pp. 227-240, 2015. [DOI]

  41. Partial Key Exposure Attacks on CRT-RSA: Better Cryptanalysis to Full Size Encryption Exponents, by Atsushi Takayasu and Noboru Kunihiro, in Proc. of ACNS2015, LNCS 9092, pp. 518-537, 2015. [DOI]

  42. General Bounds for Small Inverse Problems and Its Applications to Multi-Prime RSA, by Atsushi Takayasu, and Noboru Kunihiro, in Proc. of ICISC2014, LNCS 8949, pp. 3-17, 2014. [DOI]

  43. Constructing Subspace Membership Encryption through Inner Product Encryption, by Shuichi Katsumata and Noboru Kunihiro, in Proc. of ProvSec 2014, LNCS 8782, pp 223-242, 2014. [DOI]

  44. RSA meets DPA: Recovering RSA Secret Keys from Noisy Analog data, by Noboru Kunihiro and Junya Honda, in Proc. of CHES2014, LNCS 8731, pp. 261-278, 2014. [DOI]

  45. Chosen Ciphertext Security on Hard Membership Decision Groups: The Case of Semi-smooth Subgroups of Quadratic Residues, by Takashi Yamakawa, Shota Yamada, Koji Nuida, Goichiro Hanaoka and Noboru Kunihiro, in Proc. of SCN2014, LNCS 8642, pp. 558-577, 2014. [DOI]

  46. On the Security Proof of an Authentication Protocol from Eurocrypt 2011, by Kosei Endo and Noboru Kunihiro, in Proc. of IWSEC2014 LNCS 8639, pp. 187-203, 2014. [DOI]

  47. Self-bilinear Map on Unknown Order Groups from Indistinguishability Obfuscation and Its Applications, by Takashi Yamakawa; Shota Yamada; Goichiro Hanaoka; Noboru Kunihiro, in Proc. of CRYPTO2014 (2) LNCS 8617, pp. 90-107, 2014. [DOI]

  48. Partial Key Exposure Attacks on RSA: Achieving Boneh-Durfee’s Bound, by Atsushi Takayasu and Noboru Kunihiro, in Proc. of SAC2014, LNCS 8781, pp. 345-362, 2014. [DOI]

  49. Cryptanalysis of RSA with Multiple Small Secret Exponents, by Atsushi Takayasu and Noboru Kunihiro, in Proc. of ACISP2014, LNCS 8544, pp. 176-191, 2014. [DOI]

  50. A Framework and Compact Constructions for Non-monotonic Attribute-Based Encryption, by Shota Yamada, Nuttapong Attrapadung, Goichiro Hanaoka, Noboru Kunihiro, in Proc. of PKC2014, LNCS 8383, pp. 275-292, 2014. [DOI]

  51. Efficient variants of the Naor-Yung and Dolev-Dwork-Naor transforms for CCA secure key encapsulation mechanism, by Takashi Yamakawa, Shota Yamada, Takahiro Matsuda, Goichiro Hanaoka, Noboru Kunihiro, in Proc. of AsiaPKC2013, pp. 23–32, 2013. [DOI]

  52. Better Lattice Constructions for Solving Multivariate Linear Equations Modulo Unknown Divisors, by Atsushi Takayasu and Noboru Kunihiro, in Proc. of ACISP2013, LNCS 7959, pp. 118-135, 2013. [DOI]

  53. Recovering RSA Secret Keys from Noisy Key Bits with Erasures and Errors, by Noboru Kunihiro, Naoyuki Shinohara and Tetsuya Izu, in Proc. of PKC2013, LNCS 7778, pp. 180-197, 2013. [eprint][DOI]

  54. Multi-Differential Cryptanalysis on Reduced DM-PRESENT-80: Collisions and Other Differential Properties, by Takuma Koyama, Yu Sasaki, Noboru Kunihiro, in Proc. of ISISC2012, LNCS 7839, pp. 352-367, 2012. [DOI]

  55. Improving GGH Cryptosystem for Large Error Vector, by Masayuki Yoshino, Noboru Kunihiro, in Proc. of ISITA2012, pp. 416-420, 2012.

  56. Symmetric Inner-Product Predicate Encryption Based on Three Groups, by Masayuki Yoshino, Noboru Kunihiro, Ken Naganuma, Hisayoshi Sato, in Proc. of ProvSec 2012, LNCS 7496, pp, 215-234, 2012. [DOI]

  57. On Optimal Bounds of Small Inverse Problems and Approximate GCD Problems with Higher Degree, by Noboru Kunihiro, in Proc. of ISC2012, LNCS 7483, pp. 55-69, 2012. [DOI]

  58. Optimal Bounds for Multi-Prime Phi-Hiding Assumption, by Kaori Tosu, Noboru Kunihiro, in Proc. of ACISP2012, LNCS7372, pp. 1-14, 2012. [DOI]

  59. Faster Algorithm for Solving Hard knapsacks for Moderate Message Length, by Yuji Nagashima, Noboru Kunihiro, in Proc. of ACISP2012, LNCS7372, pp. 43-56, 2012. [DOI]

  60. Space Efficient Signature Schemes from the RSA Assumption, by Shota Yamada and Goichiro Hanaoka and Noboru Kunihiro, in Proc. of PKC2012, LNCS7178, pp. 260-277, 2012. [DOI]

  61. Verifiable Predicate Encryption and Application to CCA Security and Anonymous Predicate Authentication, by Shota Yamada and Nuttapong Attrapadung and Bagus Santoso and Goichiro Hanaoka and Jacob C.N. Schuldt and Noboru Kunihiro, in Proc. of PKC2012, LNCS7178, pp. 349-364, 2012. [DOI]

  62. Two-Dimensional Representation of Cover Free Families and its Applications: Short Signatures and More, by Shota Yamada, Goichiro Hanaoka, and Noboru Kunihiro, in Proc. of CT-RSA2012, 7178, pp. 260-277, 2012. [DOI]

  63. Generic Construction of Chosen Ciphertext Secure Proxy Re-Encryption, by Goichiro Hanaoka, Yutaka Kawai, Noboru Kunihiro, Takahiro Matsuda, Jian Weng, Rui Zhang, Yunlei Zhao in Proc. of CT-RSA2012, 7178, pp. 349-364, 2012. [DOI]

  64. Secret Handshake Scheme with Request-Based-Revealing, by Yutaka Kawai and Noboru Kunihiro, in Proc. of EuroPKI'11, LNCS7163, pp. 1-16, 2011. [DOI]

  65. Generalized Security Analysis of the Random Key Bits Leakage Attack, by Jun Kogure, Noboru Kunihiro, Hirosuke Yamamoto, in Proc. of WISA2011, LNCS7115, pp. 13-27, 2011. [DOI]

  66. A Unified Framework for Small Secret Exponent Attack on RSA, by Noboru Kunihiro, Naoyuki Shinohara and Tetsuya Izu, in Proc. of SAC2011, LNCS7118, pp. 260-277, 2011. [DOI]

  67. Yet Another Sanitizable and Deletable Signatures, by Tetsuya Izu, Masami Izumi, Noboru Kunihiro, Kazuo Ohta, AINA Workshops, pp. 574-579, 2011. [DOI]

  68. Generic Constructions for Chosen-Ciphertext Secure Attribute Based Encryption, by Shota Yamada, Nuttapong Attrapadung, Goichiro Hanaoka and Noboru Kunihiro, in Proc. of PKC2011, LNCS6571, pp. 71-89, 2011. [DOI]

  69. Toward an Easy-to-Understand Structure for Achieving Chosen Ciphertext Security from the Decisional Diffie-Hellman Assumption, by Shota Yamada, Goichiro Hanaoka, Noboru Kunihiro, in Proc. of ProvSec2010, LNCS6402, pp. 229-243, 2010. [DOI]

  70. Solving Generalized Small Inverse Problems, by Noboru Kunihiro, in Proc. of ACISP2010, LNCS6168, pp. 248-263, 2010. [DOI]

  71. Yet Another Sanitizable Signature from Bilinear Maps, by Tetsuya Izu, Noboru Kunihiro, Kazuo Ohta, Makoto Sano, Masahiko Takenaka, in Proc. of ARES 2009, pp.941-946, IEEE CS, 2009. [DOI]

  72. Sanitizable and Deletable Signature, by Tetsuya Izu, Noboru Kunihiro, Kazuo Ohta, Makoto Sano and Masahiko Takenaka, In Proc. of WISA2008, LNCS5379, pp. 130-144, 2008. [DOI]

  73. Extension of Secret Handshake Protocols with Multiple Groups in Monotone Condition, by Yutaka Kawai, Shotaro Tanno, Takahiro Kondo, Kazuki Yoneyama, Noboru Kunihiro and Kazuo Ohta, In Proc. of WISA2008, LNCS5379, pp. 160-173, 2008. [DOI]

  74. New Definition of Density on Knapsack Cryptosystems, by Noboru Kunihiro, in Proc. of AfricaCrypt2008, LNCS5023, pp. 156-173, 2008. [DOI]

  75. Password Recovery on Challenge and Response: Impossible Differential Attack on Hash Function, by Yu Sasaki, Lei Wang, Kazuo Ohta, Noboru Kunihiro, in Proc. of AfricaCrypt2008, LNCS5023, pp. 290-307, 2008. [DOI]

  76. New Key Recovery Attack on HMAC/NMAC-MD4 and NMAC-MD5, by Lei Wang and Kazuo Ohta and Noboru Kunihiro in Proc. of Eurocrypt2008, LNCS4965, pp. 237-253, 2008. [DOI]

  77. Security of MD5 Challenge and Response: Extension of APOP Password Recovery Attack, by Yu Sasaki, Lei Wang, Kazuo Ohta and Noboru Kunihiro, in Proc. of CT-RSA2008, LNCS4964, pp. 1-18, 2008. [DOI]

  78. Small Secret Key Attack on a variant of RSA (due to Takagi), by Kouichi Itoh and Noboru Kunihiro and Kaoru Kurosawa, in Proc. of CT-RSA2008, LNCS4964, pp. 387-406, 2008. [DOI]

  79. Password Recovery Attack on Authentication Protocol MD4(Password||Challenge), by Lei Wang and Kazuo Ohta and Noboru Kunihiro, in Proc. of ASIACCS2008, pp. 3-9, 2008. [DOI]

  80. A Strict Evaluation Method on the Number of Conditions for the SHA-1 Collision Search, by Jun Yajima, Terutoshi Iwasaki, Yusuke Naito, Yu Sasaki, Takeshi Shimoyama, Noboru Kunihiro, Kazuo Ohta, in Proc. of ASIACCS2008, pp. 10-20, 2008. [DOI]

  81. The Quantum Fourier Transform on a Linear Nearest Neighbor Architecture, by Yasuhiro Takahashi, Noboru Kunihiro, and Kazuo Ohta, in Proc. of AQIS2007, Semptermber, 2007.

  82. Yet Another Sanitizable Signature from Bilinear Maps, by Tetsuya Izu, Noboru Kunihiro, Kazuo Ohta, Makoto Sano, Masahiko Takenaka, Proc. of JWIS2007, Aug. 2007. [DOI]

  83. A New Strategy for Finding a Differential Path of SHA-1, by Jun Yajima, Yu Sasaki, Yusuke Naito, Terutoshi Iwasaki, Takeshi Shimoyama, Noboru Kunihiro, Kazuo Ohta, in Proc. of ACISP 2007, LNCS4586, pp. 45-58, July, 2007. [DOI]

  84. Sanitizable Signature with Aggregation, byTetsuya Izu, Noboru Kunihiro, Kazuo Ohta, Masahiko Takenaka and Takashi Yoshioka, in Proc. of ISPEC 2007, LNCS4464, pp.51-64, May 7-9, 2007, Hong Kong, China.

  85. Deterministic Polynomial Time Equivalence between Factoring and Key-Recovery Attack on Takagi’s RSA, by Noboru Kunihiro and Kaoru Kurosawa, in Proc. of PKC2007, LNCS4450, pp. 412-425, April 16-20, Beijing, China. [DOI]

  86. New Message Difference for MD4, by Yu Sasaki, Lei Wang, Kazuo Ohta and Noboru Kunihiro, in Proc. of FSE 2007, LNCS4593, pp. 329-348, March 26-28, 2007, Luxembourg. [DOI]

  87. Improved Collision Search for SHA-0, by Yusuke Naito, Yu Sasaki, Takeshi Shimoyama, Jun Yajima, Noboru Kunihiro and Kazuo Ohta, in Proc. of Asiacrypt2006, LNCS 4284, pp. 21-36, December 3-7, 2006, Shanghai, China. [DOI]

  88. Factoring Square-free Composite Integer by solving Multivariate Integer Polynomial Equations, by Bagus Santoso, Noboru Kunihiro, Naoki Kanayama and Kazuo Ohta, in Proc. of Vietcrypt2006, LNCS4341, pp. 243-259,September 25-28, 2006, Hanoi, Vietnam.

  89. How to Construct Sufficient Conditions for Hash Functions, by Yu Sasaki, Yusuke Naito, Jun Yajima, Takeshi Shimoyama, Noboru Kunihiro, and Kazuo Ohta, in Proc. of Vietcrypt2006, LNCS4341, pp. 115-130,September 25-28, 2006, Hanoi, Vietnam. [DOI]

  90. Problems on the MR Micropayment Schemes, by M. Mambo, M. R. Salinas, Kazuo Ohta and Noboru Kunihiro, In ASIACSS'06, pp. 363, March 20-24, 2006, Taiwan. [DOI]

  91. Untraceable Off-Line Verifiable Quantum Cash, by Y. Esaki, Noboru Kunihiro and Kazuo Ohta, in TQC2006, pp.21-22, 2006.

  92. Provable Secure Electronic Cash based on Blind Multisignature schemes, by Yoshikazu Hanatani, Yuichi Komano, Kazuo Ohta and Noboru Kunihiro, in Financial Cryptography'06, LNCS 4107, pp. 236-250, Feb.27-March 2, 2006, Anguilla. [DOI]

  93. Improved Collision Attack on MD4 with Probability Almost $1$, by Yusuke Naito, Yu Sasaki, Noboru Kunihiro and Kazuo Ohta In 8th ICISC, LNCS 3935, pp. 129-145, Dec. 1-2, 2005, Seoul, Korea. [DOI]

  94. Analysis on the Clockwise Transposition Routing for Dedicated Factoring Devices, by Tetsuya Izu, Noboru Kunihiro, Kazuo Ohta and Takeshi Shimoyama, In WISA2005, August 22-24, pp. 232-242, 2005 Jeju Island, Korea. [DOI]

  95. Non-linear Function Ramp Scheme, by Kazuki Yoneyama, Noboru Kunihiro, Santoso Bagus and Kazuo Ohta, In Proceeding of ISITA2004 , Oct. 10-13, pp. 788-793, 2004 Parma, Italy.

  96. Modulus Search for Elliptic Curve Cryptosystems, by Kenji Koyama, Yukio Tsuruoka and Noboru Kunihiro, In Advances in Cryptology - Asiacrypt'99, LNCS 1716, pp. 1-7 (1999). [DOI]

  97. Equivalence of Counting the Number of Points on Elliptic Curve over the ring $Z_n$ and Factoring $n$, by Noboru Kunihiro and Kenji Koyama, In Proceeding of Advances in Cryptology - EUROCRYPT'98, LNCS 1403, pp. 47-58 (1998). [DOI]

  98. Extended Window Method for Addition-Subtraction Chain, by Noboru Kunihiro and Hirosuke Yamamoto, In Proc. of the 7th Japan-Benelux Workshop on Information Theory, 1997.

  99. Automatic numerical integration of nearly singular boundary element integrals in the Boundary Element Method, by Noboru Kunihiro, Ken Hayami, and Masaaki Sugihara, In Proc. of International Conference on Computational Engineering Science, pp. 2481–2846, 1995. [DOI]

  100. Automatic numerical integration of nearly singular boundary element integrals, by Noboru Kunihiro, Ken Hayami, and Masaaki Sugihara, In Proc. of the second Japan-China Seminar on Numerical Mathematics, pp. 249-252, 1995.

Poster Presentation and Short Paper without Proceeding

  1. New Quantum Algorithms for Modular Inverse and Its Application on the Elliptic Curve Discrete Logarithm Problem, by Ryo Kurama and Noboru Kunihiro, Poster Presentation of AQIS2019.
  2. Secure Key-management Technology for Blockchain using Biometrics Information, by Ken Naganuma, Suzuki Takayuki, Kenta Takahashi, Yousuke Kaga, Masayuki Yoshino, and Noboru Kunihiro, Poster Presentation of IWSEC2019. (Best Poster Awards)
  3. Strongly Secure Ramp Secret Sharing Schemes from Any Linear Secret Sharing Schemes, by Reo Eriguchi and Noboru Kunihiro, Poster Presentation of ITW2019.
  4. Evaluation of Leakage Information on Searchable Encryption Database, by Masayuki Yoshino, Ken Naganuma, Noboru Kunihiro and Sota Onozawa, Poster Presentation of ISITA2018.
  5. Recovering CRT-RSA Secret Keys from Noisy Square-and-Multiply Sequences in Sliding Window Method, by Kento Oonishi and Noboru Kunihiro, Poster Presentation of IWSEC2018.
  6. Extended Partial Key Exposure Attack on RSA, by Kaichi Suzuki, Atsushi Takayasu and Noboru Kunihiro, Poster Presentation of IWSEC2018.
  7. Improving Inference Attacks on Order-Preserving Encrypted Databases, by Sota Onozawa, Noboru Kunihiro, Masayuki Yoshino and Ken Naganuma, Poster Presentation of IWSEC2017.
  8. Recovering CRT-RSA Secret Keys from Noisy Secret Exponents, by Kento Oonishi and Noboru Kunihiro, Poster Presentation of IWSEC2017.
  9. Faster LLL Reduction to Break the Security of Fully Homomorphic Encryption and Multilinear Map over the Integers, by Atsushi Takayasu and Noboru Kunihiro, Poster Presentation of IWSEC2015.
  10. Partial Key Exposure Attacks on RSA: Achieve Boneh-Durfee’s Bound, by Atsushi Takayasu and Noboru Kunihiro, Poster Presentation of IWSEC2013.
  11. On the Security Proof of an Authentication Protocol from Eurocrypt 2011, by Kosei Endo and Noboru Kunihiro, Poster Presentation of IWSEC2013.
  12. New Security Proof for a Variant of the BGW Broadcast Encryption Scheme, by Shota Yamada, Nuttapong Attrapadung, Goichiro Hanaoka, and Noboru Kunihiro, Poster Presentation of IWSEC2013. (Best Poster Award)
  13. Multi-Differential Cryptanalysis on Reduced DM-PRESENT-80: Collisions and Other Differential Properties, by Takuma Koyama, Yu Sasaki, Noboru Kunihiro, Poster Presentation of IWSEC2012.
  14. Bounded CCA Secure KEM from the Computational Bilinear Diffie-Hellman Assumption, by Takashi Yamakawa, Shota Yamada, Goichiro Hanaoka, Noboru Kunihiro, Poster Presentation of IWSEC2012. (Best Poster Award)
  15. Optimizing Bounds against Multi-Prime Phi-Hiding Problems, by Kaori Tosu and Noboru Kunihiro, Poster Presentation of IWSEC2011. (Best Poster Award)
  16. Faster Random Sampling Reduction, by Masayuki Yoshino and Noboru Kunihiro, accepted as Short Paper at WISA2011.
  17. Quantum Addition Circuits and Unbounded Fan-Out, by Yasuhiro Takahashi, Seiichiro Tani, and Noboru Kunihiro, QIP 2010, (Poster Presenntation)
  18. Quantum addition circuits and unbounded fan-out, by Yasuhiro Takahashi, Seiichiro Tani, and Noboru Kunihiro, in Proc. of AQIS2009, 2009.
  19. The quantum Fourier transform on a linear nearest neighbor architecture, by Yasuhiro Takahashi, Noboru Kunihiro, Kazuo Ohta, The Tenth Workshop on Quantum Information Processing 2007 (QIP 2007), Jan. 30-Feb. 3, 2007, Brisbane, Australia (Poster Presentation)
  20. An efficient quantum circuit for addition in $GF(p)$ and Shor’s algorithm, by Yasuhiro Takahashi, Noboru Kunihiro, and Kazuo Ohta, In AQIS2006, September 1-4, pp. 109-110, 2006 Beijin, China
  21. A quantum circuit for Shor’s factoring algorithm using 2n+2 qubits, by Yasuhiro Takahashi and Noboru Kunihiro, in TQC2006, pp.4-5, 2006.
  22. An Evaluation of the Sieving Device YASD for 1024-bit Integers, by N. Hirota, T. Izu, N. Kunihiro, and K. Ohta, In SHARCS'06, April 3-4, 2006, Cologne, Germany.
  23. Shor’s factoring algorithm with approximate modular addition, by N. Kunihiro, H. Suzuki and Y. Takahashi, Poster presentation at QIP2005, Jan. 13-17, 2005, MIT, Cambridge, USA.
  24. Quantum Algorithms for Solving Exact Shortest Vector Problem, by N. Kanayama, M. Kida, N. Kunihiro, T. Nishino, K, Ohta and S. Okubo, In EQIS'05, August 26-30, pp. 179-180, 2005 Tokyo, Japan
  25. A Linear-size Quantum Circuit for Addition with no ancillary qubits, by Y. Takahashi and N. Kunihiro, In EQIS'05, August 26-30, pp. 113-114, 2005 Tokyo, Japan
  26. A Quantum Algorithm for Finding the Minimum on NMR Quantum Computers, by Seiya Okubo, Tetsuro Nishino, Kazuo Ohta and Noboru Kunihiro, In EQIS'04, September 1-5, pp. 152-153, 2004 Tokyo, Japan
  27. Reversibility of Modular Squaring, by Noboru Kunihiro, Yasuhiro Takahashi and Yasuhito Kawano, In Proceeding of MS+S2004, pp. 322-326, Atsugi, Japan, March 1-4, 2004.
  28. NP-completeness of the Initial Arrangement of Qubits, by Yasuhito Kawano, Sei-ichiro Tani, Yasuhiro Takahashi, Noboru Kunihiro, In Proceeding of MS+S2004, pp. 327-332, Atsugi, Japan, March 1-4, 2004.
  29. Practical running time of factoring by quantum circuits, by Noboru KUNIHIRO, In Proceeding of ERATO Workshop on Quantum Information Science 2003 (EQIS2003), Kyoto, Japan, September 4-6, 2003.
  30. Two Efficient Quantum Search Algorithms on NMR Quantum Computers, by Seiya OKUBO, Tetsuro NISHINO, Kazuo OHTA and Noboru KUNIHIRO, In Proceeding of ERATO Workshop on Quantum Information Science 2003 (EQIS2003), Kyoto, Japan, September 4-6, 2003.
  31. New Algorithms for Factoring and Discrete Logarithm with NMR Quantum Computers, by Kunihiro, N. and Yamashita S., In Proceeding of ERATO Workshop on Quantum Information Science 2001 (EQIS2001), Tokyo, Japan, September 6-8, 2001.