ホーム > 國廣 昇/ Kunihiro, Noboru
國廣 昇
Kunihiro, Noboru
システム情報系 , 教授 Institute of Systems and Information Engineering , Professor
関連記事はまだありません。
オープンアクセス版の論文は「つくばリポジトリ」で読むことができます。
-
1.
Bias from Uniform Nonce: Revised Fourier Analysis-based Attack on ECDSA
Osaki, Shunsuke; KUNIHIRO, Noboru
Selected Areas in Cryptography 2024 205 (2025)
-
2.
Post-quantum zk-SNARKs from QAPs
Naganuma, Ken; Yoshino, Masayuki; Kunihiro, Noboru; Inoue, Atsuo (+1 著者) Okazaki, Mineaki
INTERNATIONAL JOURNAL OF INFORMATION AND COMPUTER SECURITY 25: (2025)
-
3.
量子が紡ぐ新たな世界:4.耐量子計算機暗号って安全なの?
國廣, 昇
情報処理学会会誌 21 (2024)
-
4.
Experimental Analysis of the Optimization-based Factorization Algorithm
Yamaguchi, Junpei; Izu, Tetsuya; KUNIHIRO, Noboru
Proc. of ICISC2024 (2024)
-
5.
Experiments and Resource Analysis of Shor’s Factorization Using a Quantum Simulator
Yamaguchi, Junpei; Yamazaki, Masafumi; Tabuchi, Akihiro; Honda, Takumi (+1 著者) Kunihiro, Noboru
Proc. of ICISC2023 14561: 119 (2024)
-
6.
Extended Attacks on ECDSA with Noisy Multiple Bit Nonce Leakages
Osaki, Shunsuke; Kunihiro, Noboru
Proc. of ICISC2023 14561: 163 (2024)
-
7.
耐量子計算機暗号――標準化動向とアイデア
國廣, 昇
科学 210 (2024)
-
8.
Efficient Noise Generation Protocols for Differentially Private Multiparty Computation
Eriguchi, Reo; Ichikawa, Atsunori; Kunihiro, Noboru; Nuida, Koji
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING 20: 4486 (2023)
-
9.
現行の公開鍵暗号方式に対するShorのアルゴリズムの脅威
國廣, 昇; 高安敦
The Journal of the Institute of Elecctronics, Information and Communication Engineers 105: 977 (2023)
-
10.
Shor’s Algorithm Using Efficient Approximate Quantum Fourier Transform
Oonishi, Kento; Kunihiro, Noboru
IEEE Transactions on Quantum Engineering 4: (2023) Semantic Scholar
-
11.
暗号と数理~ 代数学,安全性,耐量子計算機暗号 ~
國廣, 昇
数理科学 22 (2023)
-
12.
HS-Based Error Correction Algorithm for Noisy Binary GCD Side-Channel Sequences
Tani, Kenta; Kunihiro, Noboru
Proc. of Applied Cryptography and Network Security 2023 (ACNS2023) 13905: 59 (2023)
-
13.
Linear Algebraic Approach to Strongly Secure Ramp Secret Sharing for General Access Structures with Application to Symmetric PIR
Eriguchi, Reo; Kunihiro, Noboru; Nuida, Koji
IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES E106A: 263 (2023) Semantic Scholar
-
14.
Multiplicative and Verifiably Multiplicative Secret Sharing for Multipartite Adversary Structures
Eriguchi, Reo; Kunihiro, Noboru; Nuida, Koji
DESIGNS CODES AND CRYPTOGRAPHY 91: 1751 (2023) Semantic Scholar
-
15.
量子計算機に対する暗号の安全性解析
國廣, 昇
The Journal of the Institute of Elecctronics, Information and Communication Engineers 105: 516 (2022)
-
16.
量子計算機と暗号:耐量子計算機暗号への移行
國廣, 昇
Security management 35: 18 (2022)
-
17.
耐量子計算機暗号
國廣,昇
数学セミナー 38 (2021)
-
18.
Efficient Construction of a Control Modular Adder on a Carry-Lookahead Adder Using Relative-phase Toffoli Gates
Oonishi, Kento; Tanaka, Tomoki; Uno, Shumpei; Satoh, Takahiko (+1 著者) Kunihiro, Noboru
IEEE Transactions on Quantum Engineering (2021)
-
19.
Cryptanalysis of the RSA variant based on cubic Pell equation
Zheng, Mengce; Kunihiro, Noboru; Yao, Yuanzhi
THEORETICAL COMPUTER SCIENCE 889: 135 (2021) Semantic Scholar
-
20.
Efficient Noise Generation to Achieve Differential Privacy with Applications to Secure Multiparty Computation
Eriguchi, Reo; Atsunori, Ichikawa; Kunihiro, Noboru; Koji, Nuida
Financial Cryptography and Data Security 2021 (FC2021) 271 (2021)
-
1.
データサイエンスはじめの一歩
國廣, 昇
2024年8月 (ISBN: 9784065366721)
-
2.
暗号の理論と技術 量子時代のセキュリティ理解のために
國廣, 昇; 安田, 雅哉; 水木, 敬明; 高安, 敦; 高島, 克幸; 米山, 一樹; 大原, 一真; 江村, 恵太
講談社 2024年5月
-
3.
岩波書店 科学
國廣, 昇
2022年8月
-
4.
理論計算機科学事典
國廣,昇
(担当:分担執筆, 範囲:4.4章 数論と暗号)
2022年1月 (ISBN: 9784254122633)
-
5.
代数学
國廣,昇
丸善出版 2018年1月 (ISBN: 9784621302750)
-
6.
Mathematical Modelling for Next-Generation Cryptography
Takagi, Tsuyoshi; Wakayama, Masato; Tanaka, Keisuke; Kunihiro, Noboru; Kimoto, Kazufumi; Duong, Dung Hoang
(担当:編者(編著者))
2017年7月
-
7.
ほんとうに安全? 現代の暗号 ([新装版] 岩波科学ライブラリー (102))
太田, 和夫; 國廣, 昇
岩波書店 2005年5月 (ISBN: 4000074423)
-
8.
1冊でわかる暗号理論
フレッド, パイパー; ショーン, マーフィ; 翻訳; 太田和夫; 國廣昇
岩波書店 2004年3月 (ISBN: 4000268716)
-
61.
RSA meets DPA: Recovering RSA Secret Keys from Noisy Analog data
Kunihiro, Noboru; Honda, Junya
CHES2014 2014年9月
-
62.
Chosen Ciphertext Security on Hard Membership Decision Groups: The Case of Semi-smooth Subgroups of Quadratic Residues
Yamakawa, Takashi; Yamada, Shoya; Nuida, Koji; Hanaoka, Goichiro; Kunihiro, Noboru
SCN2014 2014年9月
-
63.
Self-bilinear Map on Unknown Order Groups from Indistinguishability Obfuscation and Its Applications
Yamakawa, Takashi; Yamada, Shota; Hanaoka, Goichiro; Kunihiro, Noboru
CRYPTO2014 2014年8月
-
64.
Partial Key Exposure Attacks on RSA: Achieving Boneh-Durfee's Bound
Takayasu, Atsushi; Kunihiro, Noboru
SAC2014 2014年8月
-
65.
Cryptanalysis of RSA with Multiple Small Secret Exponents
Takayasu, Atsushi; Kunihiro, Noboru
ACISP2014 2014年7月
-
66.
A Framework and Compact Constructions for Non-monotonic Attribute-Based Encryption
Yamada, Shota; Attrapadung, Nuttapong; Hanaoka, Goichiro; Kunihiro, Noboru
PKC2014 2014年3月
-
67.
Better Lattice Constructions for Solving Multivariate Linear Equations Modulo Unknown Divisors
Takayasu, Atsushi; Kunihiro, Noboru
ACISP2013 2013年7月1日
-
68.
Efficient variants of the Naor-Yung and Dolev-Dwork-Naor transforms for CCA secure key encapsulation mechanism
Yamakawa, Takashi; Yamada, Shota; Matsuda, Takahiro; Hanaoka, Goichiro; Kunihiro, Noboru
AsiaPKC2013 2013年5月7日
-
69.
Recovering RSA Secret Keys from Noisy Key Bits with Erasures and Errors
Kunihiro, Noboru; Shinohara, Naoyuki; Izu, Tetsuya
PKC2013 2013年2月26日
-
70.
Multi-Differential Cryptanalysis on Reduced DM-PRESENT-80: Collisions and Other Differential Properties
Koyama, Takuma; Sasaki, Yu; Kunihiro, Noboru
ISISC2012 2012年11月
-
71.
On Optimal Bounds of Small Inverse Problems and Approximate GCD Problems with Higher Degree
Kunihiro, Noboru
ISC2012 2012年10月
-
72.
Symmetric Inner-Product Predicate Encryption Based on Three Groups
Yoshino, Masayuki; Kunihiro, Noboru; Naganuma, Ken; Sato, Hisayoshi
ProvSec2012 2012年10月
-
73.
Optimal Bounds for Multi-Prime Phi-Hiding Assumption
Tosu, Kaori; Kunihiro, Noboru
ACISP2012 2012年7月
-
74.
Faster Algorithm for Solving Hard knapsacks for Moderate Message Length
Nagashima, Yuji; Kunihiro, Noboru
ACISP2012 2012年7月
-
75.
Space Efficient Signature Schemes from the RSA Assumption
Yamada, Shota; Hanaoka, Goichiro; Kunihiro, Noboru
PKC2012 2012年5月
-
76.
Verifiable Predicate Encryption and Application to CCA Security and Anonymous Predicate Authentication
Yamada, Shota; Attrapadung, Nuttapong; Santoso, Bagus; Hanaoka, Goichiro; Schuld; Jacob C.N.; Kunihiro, Noboru
PKC2012 2012年5月
-
77.
Two-Dimensional Representation of Cover Free Families and its Applications: Short Signatures and More
Yamada, Shota; Hanaoka, Goichiro; Kunihiro, Noboru
CT-RSA2012 2012年2月
-
78.
Generic Construction of Chosen Ciphertext Secure Proxy Re-Encryption
Hanaoka, Goichiro; Kawai, Yutaka; Kunihiro, Noboru; Matsuda, Takahiro; Weng, Jian; Zhang, Rui; Zhao, Yunlei
CT-RSA2012 2012年2月
-
79.
Secret Handshake Scheme with Request-Based-Revealing
Kawai, Yutaka; Kunihiro, Noboru
EuroPKI'11 2011年11月
-
80.
A Unified Framework for Small Secret Exponent Attack on RSA
Kunihiro, Noboru; Shinohara, Naoyuki; Izu, Tetsuya
SAC2011 2011年8月
知財情報はまだありません。
2,910 total views