Keita Xagawa
Orcid: 0000-0002-6832-9940
According to our database1,
Keita Xagawa
authored at least 52 papers
between 2007 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
-
on xagawa.net
On csauthors.net:
Bibliography
2024
IACR Cryptol. ePrint Arch., 2024
IACR Commun. Cryptol., 2024
2023
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2023
IACR Cryptol. ePrint Arch., 2023
Proceedings of the Progress in Cryptology - LATINCRYPT 2023, 2023
2022
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2022
IACR Cryptol. ePrint Arch., 2022
Des. Codes Cryptogr., 2022
2021
Fault-Injection Attacks against NIST's Post-Quantum Cryptography Round 3 KEM Candidates.
IACR Cryptol. ePrint Arch., 2021
The Boneh-Katz Transformation, Revisited: Pseudorandom/Obliviously-Samplable PKE from Lattices and Codes and Its Application.
IACR Cryptol. ePrint Arch., 2021
2020
Non-Committing Encryption with Constant Ciphertext Expansion from Standard Assumptions.
IACR Cryptol. ePrint Arch., 2020
Des. Codes Cryptogr., 2020
2019
Cryptanalysis of a New Code-based Signature Scheme with Shorter Public Key in PKC 2019.
IACR Cryptol. ePrint Arch., 2019
IACR Cryptol. ePrint Arch., 2019
IACR Cryptol. ePrint Arch., 2019
2018
Accumulable optimistic fair exchange from verifiably encrypted homomorphic signatures.
Int. J. Inf. Sec., 2018
(Tightly) QCCA-Secure Key-Encapsulation Mechanism in the Quantum Random Oracle Model.
IACR Cryptol. ePrint Arch., 2018
Proceedings of the Topics in Cryptology - CT-RSA 2018, 2018
2017
Practical Cryptanalysis of a Public-key Encryption Scheme Based on Non-linear Indeterminate Equations at SAC 2017.
IACR Cryptol. ePrint Arch., 2017
IACR Cryptol. ePrint Arch., 2017
Proceedings of the 2017 ACM International Conference on Management of Data, 2017
2016
IACR Cryptol. ePrint Arch., 2016
Public-Key Cryptosystems Resilient to Continuous Tampering and Leakage of Arbitrary Functions.
Proceedings of the Advances in Cryptology - ASIACRYPT 2016, 2016
2015
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2015
IACR Cryptol. ePrint Arch., 2015
Note on the RKA security of Continuously Non-Malleable Key-Derivation Function from PKC 2015.
IACR Cryptol. ePrint Arch., 2015
Re-encryption, functional re-encryption, and multi-hop re-encryption: A framework for achieving obfuscation-based security and instantiations from lattices.
IACR Cryptol. ePrint Arch., 2015
Verifiably encrypted signatures with short keys based on the decisional linear problem and obfuscation for encrypted VES.
Des. Codes Cryptogr., 2015
Des. Codes Cryptogr., 2015
Proceedings of the Progress in Cryptology - LATINCRYPT 2015, 2015
2014
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2014
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2014
Practical Cryptanalysis of a Public-Key Encryption Scheme Based on New Multivariate Quadratic Assumptions.
Proceedings of the Public-Key Cryptography - PKC 2014, 2014
2013
IACR Cryptol. ePrint Arch., 2013
IACR Cryptol. ePrint Arch., 2013
Practical and post-quantum authenticated key exchange from one-way secure key encapsulation mechanism.
Proceedings of the 8th ACM Symposium on Information, Computer and Communications Security, 2013
2012
Proceedings of the Information and Communications Security - 14th International Conference, 2012
Proceedings of the Cryptology and Network Security, 11th International Conference, 2012
Proceedings of the Applied Cryptography and Network Security, 2012
2010
IACR Cryptol. ePrint Arch., 2010
2009
IACR Cryptol. ePrint Arch., 2009
Zero-Knowledge Protocols for NTRU: Application to Identification and Proof of Plaintext Knowledge.
Proceedings of the Provable Security, Third International Conference, 2009
2008
Concurrently Secure Identification Schemes Based on the Worst-Case Hardness of Lattice Problems.
Proceedings of the Advances in Cryptology, 2008
2007
Proceedings of the Public Key Cryptography, 2007