KUNIHIRO Noboru | University of Electro-Communica-tions
スポンサーリンク
概要
関連著者
-
KUNIHIRO Noboru
University of Electro-Communica-tions
-
OHTA Kazuo
University of Electro-Communications
-
Ohta Kazuo
Department Of Informatics The University Of Electro-communications
-
Kunihiro Noboru
Univ. Tokyo Kashiwa‐shi Jpn
-
WANG Lei
University of Electro-Communications
-
SASAKI Yu
University of Electro-Communications
-
SASAKI Yu
NTT Information Sharing Platform Laboratories, NTT Corporation
-
Naito Yusuke
University Of Electro-communications
-
米山 一樹
電気通信大学情報通信工学専攻
-
SAKIYAMA Kazuo
University of Electro-Communications
-
KUROSAWA Kaoru
Ibaraki University
-
SHINOHARA Naoyuki
National Institute of Information and Communications Technology
-
IZU Tetsuya
FUJITSU LABORATORIES Ltd. and FUJITSU Ltd.
-
Kunihiro Noboru
University Of Tokyo
-
Kunihiro Noboru
University Of Electro-communications
-
Yoneyama Kazuki
Ntt Corporation
-
Kondo Takahiro
Mizuho Information And Research Institute Inc.
-
KAWAI Yutaka
University of Tokyo
-
TANNO Shotaro
University of Electro-Communications
-
Izu Tetsuya
Fujitsu Laboratories Ltd.
-
Kurosawa Kaoru
Ibaraki Univ. Hitachi‐shi Jpn
-
Sakiyama Kazuo
Department Of Informatics The University Of Electro-communications
-
Sasaki Yu
Ntt Information Sharing Platform Laboratories Ntt Corporation
-
Shinohara Naoyuki
National Inst. Of Information And Communications Technol. Koganei‐shi Jpn
-
Sasaki Yu
Ntt Information Sharing Platform Laboratories Ntt Corp.
-
Sasaki Yu
Ntt Informating Sharing Platform Laboratories Ntt Corporation
著作論文
- Extended Password Recovery Attacks against APOP, SIP, and Digest Authentication
- Extension of Secret Handshake Protocols with Multiple Groups in Monotone Condition
- Cryptanalysis of Two MD5-Based Authentication Protocols : APOP and NMAC
- Extended Password Recovery Attacks against APOP, SIP, and Digest Authentication
- New Message Differences for Collision Attacks on MD4 and MD5
- Improved Collision Attacks on MD4 and MD5(Hash Functions,Cryptography and Information Security)
- Deterministic Polynomial Time Equivalence between Factoring and Key-Recovery Attack on Takagi's RSA
- Improved Collision Search for Hash Functions : New Advanced Message Modification
- Small Secret CRT-Exponent Attacks on Takagi's RSA
- Near-Collision Attacks on MD4 : Applied to MD4-Based Protocols
- Exact Analyses of Computational Time for Factoring in Quantum Computers(Public Key Cryptography)(Cryptography and Information Security)
- Solving Generalized Small Inverse Problems