Noboru Kunihiro
Last update 2009/12/15
Japanese version is here.
Affiliation/Position::
Associate Professor, The University of Tokyo
Department of Complexity Science and Engineering, Graduate School of Frontier Sciences
Department of Mathematical Informatics, Graduate School of Information Science and Technology
Department of Mathematical Engineering and Information Physics, Faculty of Engineering
Employment:
 Mar. 2008  now Associate Professor, University of Tokyo, Japan
 Apr. 2006  Feb. 2008 Associate Professor, University of ElectroCommunications, Japan
 Jul.2002  Mar.2006 Assistant Professor, University of ElectroCommunications, Japan
 Apr.1996  Jun.2002 Researcher, NTT Laboratories, Japan
Education:
 Jan. 2002 Ph.D. from University of Tokyo
 Apr.1994  Mar.1996, The University of Tokyo, Japan
 Master of Engineering (M.E. in Mathematical Engineering)
 Apr.1990 Mar.1994 The University of Tokyo, Japan
 Bachelor of Engineering (B.E.in Mathematical Engineering)
Prizes & Awards:
Apr.2000, NTT Communication Science Laboratories, Young Researcher Award
Jan.1997, SCIS paper Award
Dissertation
Title: Security and Efficiency Analyses of Public Key Cryptosystems
Ph.D. from University of Tokyo
Selected Publications:
See also DBLP.
 IACR Conference

New Key Recovery Attack on HMAC/NMACMD4 and NMACMD5,
by Lei Wang and Kazuo Ohta and Noboru Kunihiro
in Proc. of Eurocrypt2008, LNCS4965, pp. 237253, 2008.

Improved Collision Search for SHA0,
by Yusuke Naito, Yu Sasaki, Takeshi Shimoyama, Jun Yajima, Noboru Kunihiro and Kazuo Ohta,
in Proc. of Asiacrypt2006, LNCS 4284, pp. 2136, December 37, 2006, Shanghai, China.

Modulus Search for Elliptic Curve Cryptosystems,
by Koyama K., Tsuruoka Y. and Kunihiro, N.
In Advances in Cryptology  Asiacrypt'99, LNCS 1716, pp. 17 (1999).

Equivalence of Counting the Number of Points
on Elliptic Curve over the ring $Z_n$ and Factoring $n$,
by Noboru Kunihiro and Kenji Koyama
In Proceeding of Advances in Cryptology  EUROCRYPT'98, LNCS 1403,
pp. 4758 (1998).
 IACR Workshop

Deterministic Polynomial Time Equivalence
between Factoring and KeyRecovery Attack on
Takagi's RSA, by Noboru Kunihiro and Kaoru Kurosawa
in Proc. of PKC2007, LNCS4450, pp. 412425, April 1620,
Beijing, China.

New Message Difference for MD4,
by Y. Sasaki, L. Wang, K. Ohta and N. Kunihiro
in Proc. of FSE 2007, LNCS4593, pp. 329348, March 2628, 2007, Luxembourg.
 Other Crypto Conference (Refereed)
 2008
 Sanitizable and Deletable Signature,
by Tetsuya Izu, Noboru Kunihiro,
Kazuo Ohta, Makoto Sano and Masahiko Takenaka,
in Proc. WISA2008, LNCS5379, pp. 130144, 2008.

Extension of Secret Handshake Protocols with Multiple Groups in Monotone
Condition, by Yutaka Kawai, Shotaro Tanno, Takahiro Kondo, Kazuki Yoneyama, Noboru Kunihiro and Kazuo Ohta,
in Proc. WISA2008, LNCS5379, pp. 160173, 2008.

New Definition of Density on Knapsack Cryptosystems, by Noboru Kunihiro
in Proc. of AfricaCrypt2008, LNCS5023, pp. 156173, 2008.

Password Recovery on Challenge and Response:
Impossible Differential Attack on Hash Function,
by Yu Sasaki, Lei Wang, Kazuo Ohta, Noboru Kunihiro
in Proc. of AfricaCrypt2008, LNCS5023, pp. 290307, 2008.

Security of MD5 Challenge and Response: Extension of APOP Password Recovery Attack,
by Yu Sasaki, Lei Wang, Kazuo Ohta and Noboru Kunihiro
in Proc. of CTRSA2008, LNCS4964, pp. 118, 2008.

Small Secret Key Attack on a variant of RSA (due to Takagi),
by Kouichi Itoh and Noboru Kunihiro and Kaoru Kurosawa
in Proc. of CTRSA2008, LNCS4964, pp. 387406, 2008.

Password Recovery Attack on Authentication Protocol
MD4(PasswordChallenge),
by Lei Wang and Kazuo Ohta and Noboru Kunihiro
in Proc. of ASIACCS2008, pp. 39, 2008.

A Strict Evaluation Method on the Number of Conditions for the SHA1 Collision Search,
by Jun Yajima, Terutoshi Iwasaki, Yusuke Naito, Yu Sasaki, Takeshi Shimoyama, Noboru Kunihiro, Kazuo Ohta
in Proc. of ASIACCS2008, pp. 1020, 2008.
 2007

A New Strategy for Finding a Differential Path,
by Jun Yajima, Yu Sasaki, Yusuke Naito, Terutoshi Iwasaki, Takeshi
Shimoyama, Noboru Kunihiro, Kazuo Ohta
in Proc. of ACISP 2007, LNCS4586, pp. 4558, July, 2007.

Sanitizable Signature with Aggregation,
by Tetsuya Izu, Noboru Kunihiro, Kazuo Ohta,
Masahiko Takenaka and Takashi Yoshioka
in Proc. of ISPEC 2007, LNCS4464, pp.5164,
May 79, 2007, Hong Kong, China.
 2006

Factoring Squarefree Composite Integer by solving Multivariate Integer
Polynomial Equations, by Bagus Santoso, Noboru Kunihiro, Naoki Kanayama and Kazuo Ohta,
in Proc. of Vietcrypt2006, LNCS4341, pp. 243259,September 2528, 2006, Hanoi, Vietnam.

How to Construct Sufficient Conditions for Hash Functions,
by Yu Sasaki, Yusuke Naito, Jun Yajima, Takeshi Shimoyama, Noboru Kunihiro,
and Kazuo Ohta,
in Proc. of Vietcrypt2006, LNCS4341, pp. 115130,September 2528, 2006, Hanoi, Vietnam.

Provable Secure Electronic Cash based on Blind Multisignature schemes,
by Y. Hanatani, Y. Komano, K. Ohta and N. Kunihiro,
in Financial Cryptography'06, LNCS 4107, pp. 236250, Feb.27March 2, 2006, Anguilla.
 2005

Improved Collision Attack on MD4 with Probability Almost 1,
by
Y. Naito, Y. Sasaki, N. Kunihiro and K. Ohta
In 8th ICISC, LNCS 3935, pp. 129145, Dec. 12, 2005, Seoul, Korea.

Analysis on the Clockwise Transposition Routing for Dedicated Factoring Devices,
by T. Izu, N. Kunihiro, K. Ohta and T. Shimoyama
In WISA2005, August 2224, pp. 232242,
2005 Jeju Island, Korea.
Journal Papers (in English)
 2009

Small Secret Key Attack on a Takagi's Variant of RSA,
by Kouichi Itoh, Noboru Kunihiro and Kaoru Kurosawa,
IEICE Transactions on Fundamentals of Electronics, Communications
and Computer Sciences, Vol. E92A, No.1,
pp. 3341, 2009.

NearCollision Attacks on MD4: Applied to MD4Based Protocols,
by Lei Wang, Kazuo Ohta and Noboru Kunihiro,
IEICE Transactions on Fundamentals of Electronics, Communications
and Computer Sciences, Vol. E92A, No.1,
pp. 7686, 2009.

A Strict Evaluation on the Number of Conditions for SHA1 Collision Search,
by Jun Yajima, Terutoshi Iwasaki, Yusuke Naito, Yu Sasaki, Takeshi Shimoyama, Thomas Peyrin, Noboru Kunihiro and Kazuo Ohta,
IEICE Transactions on Fundamentals of Electronics, Communications
and Computer Sciences, Vol. E92A, No.1,
pp. 8795, 2009.

Extended Password Recovery Attacks against APOP, SIP, and Digest Authentication,
by Yu Sasaki, Lei Wang, Kazuo Ohta and Noboru Kunihiro,
IEICE Transactions on Fundamentals of Electronics, Communications
and Computer Sciences, Vol. E92A, No.1,
pp. 96104, 2009.
 2008

Deterministic Polynomial Time Equivalence between Factoring and
KeyRecovery Attack on Takagi's RSA,
by Noboru Kunihiro and Kaoru Kurosawa,
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, Vol. E91A, No.9, pp. 23562364, 2008.

A Fast Quantum Circuit for Addition with Few Qubits,
by Yasuhiro Takahashi and Noboru Kunihiro,
Quantum Information and Computation, Vol.8 No.6/7, pp.636649, 2008.

Improved Collision Search for Hash Functions: New Advanced Message Modification,
by Yusuke NAITO Kazuo OHTA Noboru KUNIHIRO,
IEICE Transactions on Fundamentals of Electronics, Communications
and Computer Sciences, Vol. E91A, No.1,
pp. 4654, 2008.

New Message Differences for Collision Attacks on MD4 and MD5,
by Yu SASAKI Lei WANG Noboru KUNIHIRO Kazuo OHTA,
IEICE Transactions on Fundamentals of Electronics, Communications
and Computer Sciences, Vol. E91A, No.1,
pp. 5563, 2008.

Factorization of SquareFree Integers with High Bits Known,
by Bagus SANTOSO Noboru KUNIHIRO Naoki KANAYAMA Kazuo OHTA,
IEICE Transactions on Fundamentals of Electronics, Communications
and Computer Sciences, Vol. E91A, No.1,
pp. 306315, 2008.
 2007

Provably Secure Untraceable Electronic Cash against Insider Attacks,
by Y. Hanatani, Y. Komano, K. Ohta and N. Kunihiro,
IEICE Transactions on Fundamentals of Electronics, Communications
and Computer Sciences, Vol. E90A, No.5,
pp. 980991, 2007.

The quantum Fourier transform on a linear nearest neighbor architecture,
by Yasuhiro Takahashi, Noboru Kunihiro and Kazuo Ohta,
Quantum Information and Computation, Vol.7 No.4, pp.383391, 2007.

Improved Collision Attacks on MD4 and MD5,
by Y. SASAKI, Y. NAITO, N. KUNIHIRO and Kazuo OHTA
IEICE Transactions on Fundamentals of Electronics, Communications
and Computer Sciences, Vol. E90A, No.1, pp. 3647, 2007.
 2006

MaurerYacobi ID based Key Distribution Revisited,
by N. Kunihiro W. Abe and K. Ohta,
IEICE Transactions on Fundamentals of Electronics, Communications
and Computer Sciences, Vol. E89A, No.5,
pp. 14211424, 2006.

Visual Secret Sharing Schemes for Multiple Secret Images Allowing
the Rotation of Shares,
by M. Iwamoto, L. Wang, K. Yoneyama, N. Kunihiro and K. Ohta,
IEICE Transactions on Fundamentals of Electronics, Communications
and Computer Sciences, Vol. E89A, No.5,
pp. 13821395, 2006.

A quantum circuit for Shor's factoring algorithm using 2n+2 qubits,
by Yasuhiro Takahashi and Noboru Kunihiro,
Quantum Information and
Computation, Vol.6 No.2, pp.184192, 2006.
 2005

A LINEARSIZE QUANTUM CIRCUIT FOR ADDITION WITH NO ANCILLARY QUBITS,
by Yasuhiro Takahashi and Noboru Kunihiro,
Quantum Information and
Computation, Vol.5 No.6, pp.440448, 2005.

Exact Analyses of Computational Time for Factoring in Quantum Computers,
by N. Kunihiro
IEICE Transactions on Fundamentals of Electronics, Communications
and Computer Sciences, Vol. E88A, No.1, pp. 105111, 2005.
 2004

Efficient Algorithms for NMR Quantum Computers with Small Qubits,
by Noboru KUNIHIRO and Shigeru YAMASHITA
New Generation Computing Vol. 21, No. 4, pp.329337, 2003.

A Quantum Algorithm using NMR Computers to Break SecretKey Cryptosystems,
by Kazuo OHTA, Tetsuro NISHINO, Seiya OKUBO and Noboru KUNIHIRO
New Generation Computing Vol. 21, No. 4, pp.347361, 2003.

Cryptographic Works of Dr. Kenji Koyama: In Memoria,
by Kunihiro, N., Ohta K., Okamoto T., Terada R., and Tsuruoka Y.
IEICE Transactions on Fundamentals of Electronics, Communications
and Computer Sciences, Vol. E84A, No.1, pp. 108113, 2001.

Two Discrete Log Algorithms for SuperAnomalous Elliptic Curves and
Their Applications, by Kunihiro, N. and Koyama, K.
IEICE Transactions on Fundamentals of Electronics, Communications
and Computer Sciences, Vol. E83A, No.1, pp. 1016, 2000.

New methods for generating short addition chains, by Kunihiro,
N. and Yamamoto, H
IEICE Transactions on Fundamentals of Electronics, Communications
and Computer Sciences, Vol. E83A, No.1, pp. 6067, 2000.

Window and Extended Window methods for Additon chain and
AdditionSubtraction chain, by Kunihiro, N. and Yamamoto, H.
IEICE Transactions on Fundamentals of Electronics, Communications
and Computer Sciences, Vol. E81A, No.1, pp. 7281, 1998.
Program Committee:
 IWSEC2010 Program coChair (2010.11)
 ProvSec2010 Program Committee (2010.10)
 IWSEC2009 Program Committee (2009.10)
 ISITA2008 Technical Program Committee (2008.12)
 IWSEC2008 Program Committee (2008.11)
 IWSEC2007 Program Committee (2007.10)
 TQC2007 Program Committee (2007.01)
 IWSEC2006 Program Committee (2006.10)
 ISITA2006 Technical Program Committee (2006.10)
 TQC2006 Program Committee (2006.02)
 3rd International IEEE Security in Storage Workshop Program
Committee (2005.12)
 ISITA2004 Technical Program Committee (2004.10)
Address:
Bldg. of Transdisciplinary Sciences
Department of Complexity Science and Engineering
School of Frontier Sciences, University of Tokyo
515 Kashiwanoha, Kashiwashi, Chiba 2778561, Japan
email: kunihiro (at) k.utokyo.ac.jp