Keita Xagawa
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
showing all ?? records
2010 – today
- 2018
- [j6]Jae Hong Seo, Keita Emura, Keita Xagawa, Kazuki Yoneyama:
Accumulable optimistic fair exchange from verifiably encrypted homomorphic signatures. Int. J. Inf. Sec. 17(2): 193-220 (2018) - [c23]
- [c22]Tsunekazu Saito, Keita Xagawa, Takashi Yamakawa:
Tightly-Secure Key-Encapsulation Mechanism in the Quantum Random Oracle Model. EUROCRYPT (3) 2018: 520-551 - [c21]Keita Xagawa:
Practical Cryptanalysis of a Public-Key Encryption Scheme Based on Non-linear Indeterminate Equations at SAC 2017. PQCrypto 2018: 142-161 - 2017
- [c20]Akinori Hosoyamada, Yu Sasaki, Keita Xagawa:
Quantum Multicollision-Finding Algorithm. ASIACRYPT (2) 2017: 179-210 - [c19]Caleb Horst, Ryo Kikuchi, Keita Xagawa:
Cryptanalysis of Comparable Encryption in SIGMOD'16. SIGMOD Conference 2017: 1069-1084 - [i13]Akinori Hosoyamada, Yu Sasaki, Keita Xagawa:
Quantum Multicollision-Finding Algorithm. IACR Cryptology ePrint Archive 2017: 864 (2017) - [i12]Tsunekazu Saito, Keita Xagawa, Takashi Yamakawa:
Tightly-Secure Key-Encapsulation Mechanism in the Quantum Random Oracle Model. IACR Cryptology ePrint Archive 2017: 1005 (2017) - [i11]Keita Xagawa:
Practical Cryptanalysis of a Public-key Encryption Scheme Based on Non-linear Indeterminate Equations at SAC 2017. IACR Cryptology ePrint Archive 2017: 1224 (2017) - 2016
- [c18]Eiichiro Fujisaki, Keita Xagawa:
Public-Key Cryptosystems Resilient to Continuous Tampering and Leakage of Arbitrary Functions. ASIACRYPT (1) 2016: 908-938 - [i10]Keita Xagawa:
Groth-Sahai Proofs Revisited Again: A Bug in "Optimized" Randomization. IACR Cryptology ePrint Archive 2016: 476 (2016) - 2015
- [j5]Atsushi Fujioka, Koutarou Suzuki, Keita Xagawa, Kazuki Yoneyama:
Strongly secure authenticated key exchange from factoring, codes, and lattices. Des. Codes Cryptography 76(3): 469-504 (2015) - [j4]Ryo Nishimaki, Keita Xagawa:
Verifiably encrypted signatures with short keys based on the decisional linear problem and obfuscation for encrypted VES. Des. Codes Cryptography 77(1): 61-98 (2015) - [j3]Ryo Nishimaki, Keita Xagawa:
Key-Private Proxy Re-Encryption from Lattices, Revisited. IEICE Transactions 98-A(1): 100-116 (2015) - [c17]Jae Hong Seo, Keita Emura, Keita Xagawa, Kazuki Yoneyama:
Accumulable Optimistic Fair Exchange from Verifiably Encrypted Homomorphic Signatures. ACNS 2015: 192-214 - [c16]Eiichiro Fujisaki, Keita Xagawa:
Efficient RKA-Secure KEM and IBE Schemes Against Invertible Functions. LATINCRYPT 2015: 3-20 - [i9]Ryo Nishimaki, Keita Xagawa:
Verifiably Encrypted Signatures with Short Keys based on the Decisional Linear Problem and Obfuscation for Encrypted VES. IACR Cryptology ePrint Archive 2015: 248 (2015) - [i8]Keita Xagawa:
Improved (Hierarchical) Inner-Product Encryption from Lattices. IACR Cryptology ePrint Archive 2015: 249 (2015) - [i7]Nishanth Chandran, Melissa Chase, Feng-Hao Liu, Ryo Nishimaki, Keita Xagawa:
Re-encryption, functional re-encryption, and multi-hop re-encryption: A framework for achieving obfuscation-based security and instantiations from lattices. IACR Cryptology ePrint Archive 2015: 491 (2015) - [i6]Eiichiro Fujisaki, Keita Xagawa:
Note on the RKA security of Continuously Non-Malleable Key-Derivation Function from PKC 2015. IACR Cryptology ePrint Archive 2015: 1088 (2015) - 2014
- [j2]Atsushi Fujioka, Taiichi Saito, Keita Xagawa:
Secure Hierarchical Identity-Based Identification without Random Oracles. IEICE Transactions 97-A(6): 1307-1317 (2014) - [j1]Atsushi Fujioka, Eiichiro Fujisaki, Keita Xagawa:
Non-malleable Multiple Public-Key Encryption. IEICE Transactions 97-A(6): 1318-1334 (2014) - [c15]Nishanth Chandran, Melissa Chase, Feng-Hao Liu, Ryo Nishimaki, Keita Xagawa:
Re-encryption, Functional Re-encryption, and Multi-hop Re-encryption: A Framework for Achieving Obfuscation-Based Security and Instantiations from Lattices. Public Key Cryptography 2014: 95-112 - [c14]Martin R. Albrecht, Jean-Charles Faugère, Robert Fitzpatrick, Ludovic Perret, Yosuke Todo, Keita Xagawa:
Practical Cryptanalysis of a Public-Key Encryption Scheme Based on New Multivariate Quadratic Assumptions. Public Key Cryptography 2014: 446-464 - 2013
- [c13]Atsushi Fujioka, Koutarou Suzuki, Keita Xagawa, Kazuki Yoneyama:
Practical and post-quantum authenticated key exchange from one-way secure key encapsulation mechanism. AsiaCCS 2013: 83-94 - [c12]Keita Xagawa:
Improved (Hierarchical) Inner-Product Encryption from Lattices. Public Key Cryptography 2013: 235-252 - [c11]Ryo Nishimaki, Keita Xagawa:
Verifiably Encrypted Signatures with Short Keys Based on the Decisional Linear Problem and Obfuscation for Encrypted VES. Public Key Cryptography 2013: 405-422 - [i5]Keita Xagawa:
Message Authentication Codes Secure against Additively Related-Key Attacks. IACR Cryptology ePrint Archive 2013: 111 (2013) - [i4]Yosuke Todo, Keita Xagawa:
Cryptanalysis of the Huang-Liu-Yang Cryptosystem from PKC 2012. IACR Cryptology ePrint Archive 2013: 481 (2013) - 2012
- [c10]Atsushi Fujioka, Taiichi Saito, Keita Xagawa:
Security Enhancements by OR-Proof in Identity-Based Identification. ACNS 2012: 135-152 - [c9]Atsushi Fujioka, Taiichi Saito, Keita Xagawa:
Applicability of OR-Proof Techniques to Hierarchical Identity-Based Identification. CANS 2012: 169-184 - [c8]Atsushi Fujioka, Taiichi Saito, Keita Xagawa:
Security Enhancement of Identity-Based Identification with Reversibility. ICICS 2012: 202-213 - [c7]Atsushi Fujioka, Taiichi Saito, Keita Xagawa:
Secure Hierarchical Identity-Based Identification without Random Oracles. ISC 2012: 258-273 - [c6]Atsushi Fujioka, Koutarou Suzuki, Keita Xagawa, Kazuki Yoneyama:
Strongly Secure Authenticated Key Exchange from Factoring, Codes, and Lattices. Public Key Cryptography 2012: 467-484 - [i3]Atsushi Fujioka, Koutarou Suzuki, Keita Xagawa, Kazuki Yoneyama:
Strongly Secure Authenticated Key Exchange from Factoring, Codes, and Lattices. IACR Cryptology ePrint Archive 2012: 211 (2012) - 2010
- [c5]Akinori Kawachi, Akira Numayama, Keisuke Tanaka, Keita Xagawa:
Security of Encryption Schemes in Weakened Random Oracle Models. Public Key Cryptography 2010: 403-419 - [i2]Akinori Kawachi, Akira Numayama, Keisuke Tanaka, Keita Xagawa:
Security of Encryption Schemes in Weakened Random Oracle Models. IACR Cryptology ePrint Archive 2010: 122 (2010)
2000 – 2009
- 2009
- [c4]Damien Stehlé, Ron Steinfeld, Keisuke Tanaka, Keita Xagawa:
Efficient Public Key Encryption Based on Ideal Lattices. ASIACRYPT 2009: 617-635 - [c3]Keita Xagawa, Keisuke Tanaka:
Zero-Knowledge Protocols for NTRU: Application to Identification and Proof of Plaintext Knowledge. ProvSec 2009: 198-213 - [i1]Damien Stehlé, Ron Steinfeld, Keisuke Tanaka, Keita Xagawa:
Efficient Public Key Encryption Based on Ideal Lattices. IACR Cryptology ePrint Archive 2009: 285 (2009) - 2008
- [c2]Akinori Kawachi, Keisuke Tanaka, Keita Xagawa:
Concurrently Secure Identification Schemes Based on the Worst-Case Hardness of Lattice Problems. ASIACRYPT 2008: 372-389 - 2007
- [c1]Akinori Kawachi, Keisuke Tanaka, Keita Xagawa:
Multi-bit Cryptosystems Based on Lattice Problems. Public Key Cryptography 2007: 315-329
Coauthor Index
data released under the ODC-BY 1.0 license; see also our legal information page
last updated on 2018-04-26 15:38 CEST by the dblp team