Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: Keita Xagawa
@inproceedings{DBLP:conf/pkc/KosugeX24, author = {Haruhisa Kosuge and Keita Xagawa}, editor = {Qiang Tang and Vanessa Teague}, title = {Probabilistic Hash-and-Sign with Retry in the Quantum Random Oracle Model}, booktitle = {Public-Key Cryptography - {PKC} 2024 - 27th {IACR} International Conference on Practice and Theory of Public-Key Cryptography, Sydney, NSW, Australia, April 15-17, 2024, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {14601}, pages = {259--288}, publisher = {Springer}, year = {2024}, url = {https://doi.org/10.1007/978-3-031-57718-5\_9}, doi = {10.1007/978-3-031-57718-5\_9}, timestamp = {Sat, 04 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/KosugeX24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tches/TanakaUXITH23, author = {Yutaro Tanaka and Rei Ueno and Keita Xagawa and Akira Ito and Junko Takahashi and Naofumi Homma}, title = {Multiple-Valued Plaintext-Checking Side-Channel Attacks on Post-Quantum KEMs}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2023}, number = {3}, pages = {473--503}, year = {2023}, url = {https://doi.org/10.46586/tches.v2023.i3.473-503}, doi = {10.46586/TCHES.V2023.I3.473-503}, timestamp = {Tue, 12 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tches/TanakaUXITH23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/latincrypt/NakagawaFNTXY23, author = {Kohei Nakagawa and Atsushi Fujioka and Akira Nagai and Junichi Tomida and Keita Xagawa and Kan Yasuda}, editor = {Abdelrahaman Aly and Mehdi Tibouchi}, title = {Making the Identity-Based Diffie-Hellman Key Exchange Efficiently Revocable}, booktitle = {Progress in Cryptology - {LATINCRYPT} 2023 - 8th International Conference on Cryptology and Information Security in Latin America, {LATINCRYPT} 2023, Quito, Ecuador, October 3-6, 2023, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {14168}, pages = {171--191}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-44469-2\_9}, doi = {10.1007/978-3-031-44469-2\_9}, timestamp = {Fri, 06 Oct 2023 18:13:29 +0200}, biburl = {https://dblp.org/rec/conf/latincrypt/NakagawaFNTXY23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/MaramX23, author = {Varun Maram and Keita Xagawa}, editor = {Alexandra Boldyreva and Vladimir Kolesnikov}, title = {Post-quantum Anonymity of Kyber}, booktitle = {Public-Key Cryptography - {PKC} 2023 - 26th {IACR} International Conference on Practice and Theory of Public-Key Cryptography, Atlanta, GA, USA, May 7-10, 2023, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {13940}, pages = {3--35}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-3-031-31368-4\_1}, doi = {10.1007/978-3-031-31368-4\_1}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/pkc/MaramX23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Xagawa23, author = {Keita Xagawa}, title = {On the Efficiency of Generic, Quantum Cryptographic Constructions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1142}, year = {2023}, url = {https://eprint.iacr.org/2023/1142}, timestamp = {Fri, 04 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Xagawa23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Xagawa23a, author = {Keita Xagawa}, title = {Signatures with Memory-Tight Security in the Quantum Random Oracle Model}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1734}, year = {2023}, url = {https://eprint.iacr.org/2023/1734}, timestamp = {Fri, 08 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/Xagawa23a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/AgrawalBNXXY22, author = {Shweta Agrawal and Rajarshi Biswas and Ryo Nishimaki and Keita Xagawa and Xiang Xie and Shota Yamada}, title = {Cryptanalysis of Boyen's attribute-based encryption scheme in {TCC} 2013}, journal = {Des. Codes Cryptogr.}, volume = {90}, number = {10}, pages = {2301--2318}, year = {2022}, url = {https://doi.org/10.1007/s10623-022-01076-6}, doi = {10.1007/S10623-022-01076-6}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/AgrawalBNXXY22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tches/UenoXTITH22, author = {Rei Ueno and Keita Xagawa and Yutaro Tanaka and Akira Ito and Junko Takahashi and Naofumi Homma}, title = {Curse of Re-encryption: {A} Generic Power/EM Analysis on Post-Quantum KEMs}, journal = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.}, volume = {2022}, number = {1}, pages = {296--322}, year = {2022}, url = {https://doi.org/10.46586/tches.v2022.i1.296-322}, doi = {10.46586/TCHES.V2022.I1.296-322}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tches/UenoXTITH22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/Xagawa22, author = {Keita Xagawa}, editor = {Orr Dunkelman and Stefan Dziembowski}, title = {Anonymity of {NIST} {PQC} Round 3 KEMs}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2022 - 41st Annual International Conference on the Theory and Applications of Cryptographic Techniques, Trondheim, Norway, May 30 - June 3, 2022, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {13277}, pages = {551--581}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-07082-2\_20}, doi = {10.1007/978-3-031-07082-2\_20}, timestamp = {Thu, 02 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/Xagawa22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/TanakaUXITH22, author = {Yutaro Tanaka and Rei Ueno and Keita Xagawa and Akira Ito and Junko Takahashi and Naofumi Homma}, title = {Multiple-Valued Plaintext-Checking Side-Channel Attacks on Post-Quantum KEMs}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {940}, year = {2022}, url = {https://eprint.iacr.org/2022/940}, timestamp = {Tue, 27 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/TanakaUXITH22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KosugeX22, author = {Haruhisa Kosuge and Keita Xagawa}, title = {Probabilistic Hash-and-Sign with Retry in the Quantum Random Oracle Model}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1359}, year = {2022}, url = {https://eprint.iacr.org/2022/1359}, timestamp = {Sat, 22 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KosugeX22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/MaramX22, author = {Varun Maram and Keita Xagawa}, title = {Post-Quantum Anonymity of Kyber}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1696}, year = {2022}, url = {https://eprint.iacr.org/2022/1696}, timestamp = {Thu, 05 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/MaramX22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/XagawaIUTH21, author = {Keita Xagawa and Akira Ito and Rei Ueno and Junko Takahashi and Naofumi Homma}, editor = {Mehdi Tibouchi and Huaxiong Wang}, title = {Fault-Injection Attacks Against NIST's Post-Quantum Cryptography Round 3 {KEM} Candidates}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2021 - 27th International Conference on the Theory and Application of Cryptology and Information Security, Singapore, December 6-10, 2021, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {13091}, pages = {33--61}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-92075-3\_2}, doi = {10.1007/978-3-030-92075-3\_2}, timestamp = {Fri, 03 Dec 2021 17:36:49 +0100}, biburl = {https://dblp.org/rec/conf/asiacrypt/XagawaIUTH21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sacrypt/Xagawa21, author = {Keita Xagawa}, editor = {Riham AlTawy and Andreas H{\"{u}}lsing}, title = {The Boneh-Katz Transformation, Revisited: Pseudorandom/Obliviously-Samplable {PKE} from Lattices and Codes and Its Application}, booktitle = {Selected Areas in Cryptography - 28th International Conference, {SAC} 2021, Virtual Event, September 29 - October 1, 2021, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {13203}, pages = {47--67}, publisher = {Springer}, year = {2021}, url = {https://doi.org/10.1007/978-3-030-99277-4\_3}, doi = {10.1007/978-3-030-99277-4\_3}, timestamp = {Fri, 01 Apr 2022 15:49:26 +0200}, biburl = {https://dblp.org/rec/conf/sacrypt/Xagawa21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/AgrawalBNXXY21, author = {Shweta Agrawal and Rajarshi Biswas and Ryo Nishimaki and Keita Xagawa and Xiang Xie and Shota Yamada}, title = {Cryptanalysis of Boyen's Attribute-Based Encryption Scheme in {TCC} 2013}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {505}, year = {2021}, url = {https://eprint.iacr.org/2021/505}, timestamp = {Thu, 22 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/AgrawalBNXXY21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Xagawa21, author = {Keita Xagawa}, title = {The Boneh-Katz Transformation, Revisited: Pseudorandom/Obliviously-Samplable {PKE} from Lattices and Codes and Its Application}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {740}, year = {2021}, url = {https://eprint.iacr.org/2021/740}, timestamp = {Mon, 07 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Xagawa21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/XagawaIUTH21, author = {Keita Xagawa and Akira Ito and Rei Ueno and Junko Takahashi and Naofumi Homma}, title = {Fault-Injection Attacks against NIST's Post-Quantum Cryptography Round 3 {KEM} Candidates}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {840}, year = {2021}, url = {https://eprint.iacr.org/2021/840}, timestamp = {Wed, 07 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/XagawaIUTH21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/UenoXTITH21, author = {Rei Ueno and Keita Xagawa and Yutaro Tanaka and Akira Ito and Junko Takahashi and Naofumi Homma}, title = {Curse of Re-encryption: {A} Generic Power/EM Analysis on Post-Quantum KEMs}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {849}, year = {2021}, url = {https://eprint.iacr.org/2021/849}, timestamp = {Wed, 07 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/UenoXTITH21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Xagawa21b, author = {Keita Xagawa}, title = {Anonymity of {NIST} {PQC} Round-3 KEMs}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1323}, year = {2021}, url = {https://eprint.iacr.org/2021/1323}, timestamp = {Fri, 12 Nov 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/Xagawa21b.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/AragonBDGLTX20, author = {Nicolas Aragon and Olivier Blazy and Jean{-}Christophe Deneuville and Philippe Gaborit and Terry Shue Chien Lau and Chik How Tan and Keita Xagawa}, title = {Cryptanalysis of a rank-based signature with short public keys}, journal = {Des. Codes Cryptogr.}, volume = {88}, number = {4}, pages = {643--653}, year = {2020}, url = {https://doi.org/10.1007/s10623-019-00702-0}, doi = {10.1007/S10623-019-00702-0}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/AragonBDGLTX20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcs/HosoyamadaSTX20, author = {Akinori Hosoyamada and Yu Sasaki and Seiichiro Tani and Keita Xagawa}, title = {Quantum algorithm for the multicollision problem}, journal = {Theor. Comput. Sci.}, volume = {842}, pages = {100--117}, year = {2020}, url = {https://doi.org/10.1016/j.tcs.2020.07.039}, doi = {10.1016/J.TCS.2020.07.039}, timestamp = {Mon, 26 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tcs/HosoyamadaSTX20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/YoshidaKXT20, author = {Yusuke Yoshida and Fuyuki Kitagawa and Keita Xagawa and Keisuke Tanaka}, editor = {Shiho Moriai and Huaxiong Wang}, title = {Non-committing Encryption with Constant Ciphertext Expansion from Standard Assumptions}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2020 - 26th International Conference on the Theory and Application of Cryptology and Information Security, Daejeon, South Korea, December 7-11, 2020, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {12492}, pages = {36--65}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-64834-3\_2}, doi = {10.1007/978-3-030-64834-3\_2}, timestamp = {Thu, 10 Dec 2020 10:09:50 +0100}, biburl = {https://dblp.org/rec/conf/asiacrypt/YoshidaKXT20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/Chuengsatiansup20, author = {Chitchanok Chuengsatiansup and Thomas Prest and Damien Stehl{\'{e}} and Alexandre Wallet and Keita Xagawa}, editor = {Hung{-}Min Sun and Shiuh{-}Pyng Shieh and Guofei Gu and Giuseppe Ateniese}, title = {ModFalcon: Compact Signatures Based On Module-NTRU Lattices}, booktitle = {{ASIA} {CCS} '20: The 15th {ACM} Asia Conference on Computer and Communications Security, Taipei, Taiwan, October 5-9, 2020}, pages = {853--866}, publisher = {{ACM}}, year = {2020}, url = {https://doi.org/10.1145/3320269.3384758}, doi = {10.1145/3320269.3384758}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/Chuengsatiansup20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ctrsa/FerradiX20, author = {Houda Ferradi and Keita Xagawa}, editor = {Stanislaw Jarecki}, title = {Post-quantum Provably-Secure Authentication and {MAC} from Mersenne Primes}, booktitle = {Topics in Cryptology - {CT-RSA} 2020 - The Cryptographers' Track at the {RSA} Conference 2020, San Francisco, CA, USA, February 24-28, 2020, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {12006}, pages = {469--495}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-40186-3\_20}, doi = {10.1007/978-3-030-40186-3\_20}, timestamp = {Tue, 03 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ctrsa/FerradiX20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/YoshidaKXT20, author = {Yusuke Yoshida and Fuyuki Kitagawa and Keita Xagawa and Keisuke Tanaka}, title = {Non-Committing Encryption with Constant Ciphertext Expansion from Standard Assumptions}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1210}, year = {2020}, url = {https://eprint.iacr.org/2020/1210}, timestamp = {Fri, 30 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/YoshidaKXT20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/HhanXY19, author = {Minki Hhan and Keita Xagawa and Takashi Yamakawa}, editor = {Steven D. Galbraith and Shiho Moriai}, title = {Quantum Random Oracle Model with Auxiliary Input}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2019 - 25th International Conference on the Theory and Application of Cryptology and Information Security, Kobe, Japan, December 8-12, 2019, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {11921}, pages = {584--614}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-34578-5\_21}, doi = {10.1007/978-3-030-34578-5\_21}, timestamp = {Tue, 26 Nov 2019 14:11:51 +0100}, biburl = {https://dblp.org/rec/conf/asiacrypt/HhanXY19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pqcrypto/XagawaY19, author = {Keita Xagawa and Takashi Yamakawa}, editor = {Jintai Ding and Rainer Steinwandt}, title = {(Tightly) QCCA-Secure Key-Encapsulation Mechanism in the Quantum Random Oracle Model}, booktitle = {Post-Quantum Cryptography - 10th International Conference, PQCrypto 2019, Chongqing, China, May 8-10, 2019 Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {11505}, pages = {249--268}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-25510-7\_14}, doi = {10.1007/978-3-030-25510-7\_14}, timestamp = {Wed, 25 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pqcrypto/XagawaY19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pqcrypto/HosoyamadaSTX19, author = {Akinori Hosoyamada and Yu Sasaki and Seiichiro Tani and Keita Xagawa}, editor = {Jintai Ding and Rainer Steinwandt}, title = {Improved Quantum Multicollision-Finding Algorithm}, booktitle = {Post-Quantum Cryptography - 10th International Conference, PQCrypto 2019, Chongqing, China, May 8-10, 2019 Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {11505}, pages = {350--367}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-25510-7\_19}, doi = {10.1007/978-3-030-25510-7\_19}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pqcrypto/HosoyamadaSTX19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1911-02822, author = {Akinori Hosoyamada and Yu Sasaki and Seiichiro Tani and Keita Xagawa}, title = {Quantum Algorithm for the Multicollision Problem}, journal = {CoRR}, volume = {abs/1911.02822}, year = {2019}, url = {http://arxiv.org/abs/1911.02822}, eprinttype = {arXiv}, eprint = {1911.02822}, timestamp = {Mon, 11 Nov 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-1911-02822.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Xagawa19, author = {Keita Xagawa}, title = {Cryptanalysis of a New Code-based Signature Scheme with Shorter Public Key in {PKC} 2019}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {120}, year = {2019}, url = {https://eprint.iacr.org/2019/120}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Xagawa19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/FerradiX19, author = {Houda Ferradi and Keita Xagawa}, title = {Post-Quantum Provably-Secure Authentication and {MAC} from Mersenne Primes}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {409}, year = {2019}, url = {https://eprint.iacr.org/2019/409}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/FerradiX19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/HhanXY19, author = {Minki Hhan and Keita Xagawa and Takashi Yamakawa}, title = {Quantum Random Oracle Model with Auxiliary Input}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1093}, year = {2019}, url = {https://eprint.iacr.org/2019/1093}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/HhanXY19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Chuengsatiansup19, author = {Chitchanok Chuengsatiansup and Thomas Prest and Damien Stehl{\'{e}} and Alexandre Wallet and Keita Xagawa}, title = {ModFalcon: compact signatures based on module {NTRU} lattices}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1456}, year = {2019}, url = {https://eprint.iacr.org/2019/1456}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Chuengsatiansup19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijisec/SeoEXY18, author = {Jae Hong Seo and Keita Emura and Keita Xagawa and Kazuki Yoneyama}, title = {Accumulable optimistic fair exchange from verifiably encrypted homomorphic signatures}, journal = {Int. J. Inf. Sec.}, volume = {17}, number = {2}, pages = {193--220}, year = {2018}, url = {https://doi.org/10.1007/s10207-017-0367-z}, doi = {10.1007/S10207-017-0367-Z}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijisec/SeoEXY18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ctrsa/BootleTX18, author = {Jonathan Bootle and Mehdi Tibouchi and Keita Xagawa}, editor = {Nigel P. Smart}, title = {Cryptanalysis of Compact-LWE}, booktitle = {Topics in Cryptology - {CT-RSA} 2018 - The Cryptographers' Track at the {RSA} Conference 2018, San Francisco, CA, USA, April 16-20, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10808}, pages = {80--97}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-76953-0\_5}, doi = {10.1007/978-3-319-76953-0\_5}, timestamp = {Tue, 14 May 2019 10:00:52 +0200}, biburl = {https://dblp.org/rec/conf/ctrsa/BootleTX18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eurocrypt/SaitoXY18, author = {Tsunekazu Saito and Keita Xagawa and Takashi Yamakawa}, editor = {Jesper Buus Nielsen and Vincent Rijmen}, title = {Tightly-Secure Key-Encapsulation Mechanism in the Quantum Random Oracle Model}, booktitle = {Advances in Cryptology - {EUROCRYPT} 2018 - 37th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Tel Aviv, Israel, April 29 - May 3, 2018 Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {10822}, pages = {520--551}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-78372-7\_17}, doi = {10.1007/978-3-319-78372-7\_17}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/eurocrypt/SaitoXY18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pqcrypto/Xagawa18, author = {Keita Xagawa}, editor = {Tanja Lange and Rainer Steinwandt}, title = {Practical Cryptanalysis of a Public-Key Encryption Scheme Based on Non-linear Indeterminate Equations at {SAC} 2017}, booktitle = {Post-Quantum Cryptography - 9th International Conference, PQCrypto 2018, Fort Lauderdale, FL, USA, April 9-11, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10786}, pages = {142--161}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-79063-3\_7}, doi = {10.1007/978-3-319-79063-3\_7}, timestamp = {Wed, 25 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pqcrypto/Xagawa18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1811-08097, author = {Akinori Hosoyamada and Yu Sasaki and Seiichiro Tani and Keita Xagawa}, title = {Improved Quantum Multicollision-Finding Algorithm}, journal = {CoRR}, volume = {abs/1811.08097}, year = {2018}, url = {http://arxiv.org/abs/1811.08097}, eprinttype = {arXiv}, eprint = {1811.08097}, timestamp = {Mon, 26 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-1811-08097.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Xagawa18, author = {Keita Xagawa}, title = {Practical Attack on RaCoSS-R}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {831}, year = {2018}, url = {https://eprint.iacr.org/2018/831}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Xagawa18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/XagawaY18, author = {Keita Xagawa and Takashi Yamakawa}, title = {(Tightly) QCCA-Secure Key-Encapsulation Mechanism in the Quantum Random Oracle Model}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {838}, year = {2018}, url = {https://eprint.iacr.org/2018/838}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/XagawaY18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/HosoyamadaSTX18, author = {Akinori Hosoyamada and Yu Sasaki and Seiichiro Tani and Keita Xagawa}, title = {Improved Quantum Multicollision-Finding Algorithm}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1122}, year = {2018}, url = {https://eprint.iacr.org/2018/1122}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/HosoyamadaSTX18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/HosoyamadaSX17, author = {Akinori Hosoyamada and Yu Sasaki and Keita Xagawa}, editor = {Tsuyoshi Takagi and Thomas Peyrin}, title = {Quantum Multicollision-Finding Algorithm}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2017 - 23rd International Conference on the Theory and Applications of Cryptology and Information Security, Hong Kong, China, December 3-7, 2017, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {10625}, pages = {179--210}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-70697-9\_7}, doi = {10.1007/978-3-319-70697-9\_7}, timestamp = {Wed, 25 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/asiacrypt/HosoyamadaSX17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sigmod/HorstKX17, author = {Caleb Horst and Ryo Kikuchi and Keita Xagawa}, editor = {Semih Salihoglu and Wenchao Zhou and Rada Chirkova and Jun Yang and Dan Suciu}, title = {Cryptanalysis of Comparable Encryption in SIGMOD'16}, booktitle = {Proceedings of the 2017 {ACM} International Conference on Management of Data, {SIGMOD} Conference 2017, Chicago, IL, USA, May 14-19, 2017}, pages = {1069--1084}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3035918.3035948}, doi = {10.1145/3035918.3035948}, timestamp = {Wed, 25 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sigmod/HorstKX17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/HosoyamadaSX17, author = {Akinori Hosoyamada and Yu Sasaki and Keita Xagawa}, title = {Quantum Multicollision-Finding Algorithm}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {864}, year = {2017}, url = {http://eprint.iacr.org/2017/864}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/HosoyamadaSX17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/SaitoXY17, author = {Tsunekazu Saito and Keita Xagawa and Takashi Yamakawa}, title = {Tightly-Secure Key-Encapsulation Mechanism in the Quantum Random Oracle Model}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1005}, year = {2017}, url = {http://eprint.iacr.org/2017/1005}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/SaitoXY17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Xagawa17, author = {Keita Xagawa}, title = {Practical Cryptanalysis of a Public-key Encryption Scheme Based on Non-linear Indeterminate Equations at {SAC} 2017}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1224}, year = {2017}, url = {http://eprint.iacr.org/2017/1224}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Xagawa17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/FujisakiX16, author = {Eiichiro Fujisaki and Keita Xagawa}, editor = {Jung Hee Cheon and Tsuyoshi Takagi}, title = {Public-Key Cryptosystems Resilient to Continuous Tampering and Leakage of Arbitrary Functions}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2016 - 22nd International Conference on the Theory and Application of Cryptology and Information Security, Hanoi, Vietnam, December 4-8, 2016, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {10031}, pages = {908--938}, year = {2016}, url = {https://doi.org/10.1007/978-3-662-53887-6\_33}, doi = {10.1007/978-3-662-53887-6\_33}, timestamp = {Wed, 25 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/asiacrypt/FujisakiX16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Xagawa16, author = {Keita Xagawa}, title = {Groth-Sahai Proofs Revisited Again: {A} Bug in "Optimized" Randomization}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {476}, year = {2016}, url = {http://eprint.iacr.org/2016/476}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Xagawa16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/FujiokaSXY15, author = {Atsushi Fujioka and Koutarou Suzuki and Keita Xagawa and Kazuki Yoneyama}, title = {Strongly secure authenticated key exchange from factoring, codes, and lattices}, journal = {Des. Codes Cryptogr.}, volume = {76}, number = {3}, pages = {469--504}, year = {2015}, url = {https://doi.org/10.1007/s10623-014-9972-2}, doi = {10.1007/S10623-014-9972-2}, timestamp = {Mon, 26 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/dcc/FujiokaSXY15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/dcc/NishimakiX15, author = {Ryo Nishimaki and Keita Xagawa}, title = {Verifiably encrypted signatures with short keys based on the decisional linear problem and obfuscation for encrypted {VES}}, journal = {Des. Codes Cryptogr.}, volume = {77}, number = {1}, pages = {61--98}, year = {2015}, url = {https://doi.org/10.1007/s10623-014-9986-9}, doi = {10.1007/S10623-014-9986-9}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/dcc/NishimakiX15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/NishimakiX15, author = {Ryo Nishimaki and Keita Xagawa}, title = {Key-Private Proxy Re-Encryption from Lattices, Revisited}, journal = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.}, volume = {98-A}, number = {1}, pages = {100--116}, year = {2015}, url = {https://doi.org/10.1587/transfun.E98.A.100}, doi = {10.1587/TRANSFUN.E98.A.100}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieicet/NishimakiX15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acns/SeoEXY15, author = {Jae Hong Seo and Keita Emura and Keita Xagawa and Kazuki Yoneyama}, editor = {Tal Malkin and Vladimir Kolesnikov and Allison Bishop Lewko and Michalis Polychronakis}, title = {Accumulable Optimistic Fair Exchange from Verifiably Encrypted Homomorphic Signatures}, booktitle = {Applied Cryptography and Network Security - 13th International Conference, {ACNS} 2015, New York, NY, USA, June 2-5, 2015, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9092}, pages = {192--214}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-28166-7\_10}, doi = {10.1007/978-3-319-28166-7\_10}, timestamp = {Sun, 25 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acns/SeoEXY15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/latincrypt/FujisakiX15, author = {Eiichiro Fujisaki and Keita Xagawa}, editor = {Kristin E. Lauter and Francisco Rodr{\'{\i}}guez{-}Henr{\'{\i}}quez}, title = {Efficient RKA-Secure {KEM} and {IBE} Schemes Against Invertible Functions}, booktitle = {Progress in Cryptology - {LATINCRYPT} 2015 - 4th International Conference on Cryptology and Information Security in Latin America, Guadalajara, Mexico, August 23-26, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9230}, pages = {3--20}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-22174-8\_1}, doi = {10.1007/978-3-319-22174-8\_1}, timestamp = {Wed, 25 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/latincrypt/FujisakiX15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/NishimakiX15, author = {Ryo Nishimaki and Keita Xagawa}, title = {Verifiably Encrypted Signatures with Short Keys based on the Decisional Linear Problem and Obfuscation for Encrypted {VES}}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {248}, year = {2015}, url = {http://eprint.iacr.org/2015/248}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/NishimakiX15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Xagawa15, author = {Keita Xagawa}, title = {Improved (Hierarchical) Inner-Product Encryption from Lattices}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {249}, year = {2015}, url = {http://eprint.iacr.org/2015/249}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Xagawa15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/ChandranCLNX15, author = {Nishanth Chandran and Melissa Chase and Feng{-}Hao Liu and Ryo Nishimaki and Keita Xagawa}, title = {Re-encryption, functional re-encryption, and multi-hop re-encryption: {A} framework for achieving obfuscation-based security and instantiations from lattices}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {491}, year = {2015}, url = {http://eprint.iacr.org/2015/491}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/ChandranCLNX15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/FujisakiX15, author = {Eiichiro Fujisaki and Keita Xagawa}, title = {Note on the {RKA} security of Continuously Non-Malleable Key-Derivation Function from {PKC} 2015}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {1088}, year = {2015}, url = {http://eprint.iacr.org/2015/1088}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/FujisakiX15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/FujiokaSX14, author = {Atsushi Fujioka and Taiichi Saito and Keita Xagawa}, title = {Secure Hierarchical Identity-Based Identification without Random Oracles}, journal = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.}, volume = {97-A}, number = {6}, pages = {1307--1317}, year = {2014}, url = {https://doi.org/10.1587/transfun.E97.A.1307}, doi = {10.1587/TRANSFUN.E97.A.1307}, timestamp = {Mon, 26 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieicet/FujiokaSX14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/FujiokaFX14, author = {Atsushi Fujioka and Eiichiro Fujisaki and Keita Xagawa}, title = {Non-malleable Multiple Public-Key Encryption}, journal = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.}, volume = {97-A}, number = {6}, pages = {1318--1334}, year = {2014}, url = {https://doi.org/10.1587/transfun.E97.A.1318}, doi = {10.1587/TRANSFUN.E97.A.1318}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieicet/FujiokaFX14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/ChandranCLNX14, author = {Nishanth Chandran and Melissa Chase and Feng{-}Hao Liu and Ryo Nishimaki and Keita Xagawa}, editor = {Hugo Krawczyk}, title = {Re-encryption, Functional Re-encryption, and Multi-hop Re-encryption: {A} Framework for Achieving Obfuscation-Based Security and Instantiations from Lattices}, booktitle = {Public-Key Cryptography - {PKC} 2014 - 17th International Conference on Practice and Theory in Public-Key Cryptography, Buenos Aires, Argentina, March 26-28, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8383}, pages = {95--112}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-642-54631-0\_6}, doi = {10.1007/978-3-642-54631-0\_6}, timestamp = {Fri, 01 May 2020 18:32:25 +0200}, biburl = {https://dblp.org/rec/conf/pkc/ChandranCLNX14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/AlbrechtFFPTX14, author = {Martin R. Albrecht and Jean{-}Charles Faug{\`{e}}re and Robert Fitzpatrick and Ludovic Perret and Yosuke Todo and Keita Xagawa}, editor = {Hugo Krawczyk}, title = {Practical Cryptanalysis of a Public-Key Encryption Scheme Based on New Multivariate Quadratic Assumptions}, booktitle = {Public-Key Cryptography - {PKC} 2014 - 17th International Conference on Practice and Theory in Public-Key Cryptography, Buenos Aires, Argentina, March 26-28, 2014. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8383}, pages = {446--464}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-642-54631-0\_26}, doi = {10.1007/978-3-642-54631-0\_26}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/AlbrechtFFPTX14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/FujiokaSXY13, author = {Atsushi Fujioka and Koutarou Suzuki and Keita Xagawa and Kazuki Yoneyama}, editor = {Kefei Chen and Qi Xie and Weidong Qiu and Ninghui Li and Wen{-}Guey Tzeng}, title = {Practical and post-quantum authenticated key exchange from one-way secure key encapsulation mechanism}, booktitle = {8th {ACM} Symposium on Information, Computer and Communications Security, {ASIA} {CCS} '13, Hangzhou, China - May 08 - 10, 2013}, pages = {83--94}, publisher = {{ACM}}, year = {2013}, url = {https://doi.org/10.1145/2484313.2484323}, doi = {10.1145/2484313.2484323}, timestamp = {Tue, 10 Nov 2020 16:06:16 +0100}, biburl = {https://dblp.org/rec/conf/ccs/FujiokaSXY13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/Xagawa13, author = {Keita Xagawa}, editor = {Kaoru Kurosawa and Goichiro Hanaoka}, title = {Improved (Hierarchical) Inner-Product Encryption from Lattices}, booktitle = {Public-Key Cryptography - {PKC} 2013 - 16th International Conference on Practice and Theory in Public-Key Cryptography, Nara, Japan, February 26 - March 1, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7778}, pages = {235--252}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-36362-7\_15}, doi = {10.1007/978-3-642-36362-7\_15}, timestamp = {Fri, 01 May 2020 18:32:25 +0200}, biburl = {https://dblp.org/rec/conf/pkc/Xagawa13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/NishimakiX13, author = {Ryo Nishimaki and Keita Xagawa}, editor = {Kaoru Kurosawa and Goichiro Hanaoka}, title = {Verifiably Encrypted Signatures with Short Keys Based on the Decisional Linear Problem and Obfuscation for Encrypted {VES}}, booktitle = {Public-Key Cryptography - {PKC} 2013 - 16th International Conference on Practice and Theory in Public-Key Cryptography, Nara, Japan, February 26 - March 1, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7778}, pages = {405--422}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-36362-7\_25}, doi = {10.1007/978-3-642-36362-7\_25}, timestamp = {Wed, 25 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pkc/NishimakiX13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/Xagawa13, author = {Keita Xagawa}, title = {Message Authentication Codes Secure against Additively Related-Key Attacks}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {111}, year = {2013}, url = {http://eprint.iacr.org/2013/111}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/Xagawa13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/TodoX13, author = {Yosuke Todo and Keita Xagawa}, title = {Cryptanalysis of the Huang-Liu-Yang Cryptosystem from {PKC} 2012}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {481}, year = {2013}, url = {http://eprint.iacr.org/2013/481}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/TodoX13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acns/FujiokaSX12, author = {Atsushi Fujioka and Taiichi Saito and Keita Xagawa}, editor = {Feng Bao and Pierangela Samarati and Jianying Zhou}, title = {Security Enhancements by OR-Proof in Identity-Based Identification}, booktitle = {Applied Cryptography and Network Security - 10th International Conference, {ACNS} 2012, Singapore, June 26-29, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7341}, pages = {135--152}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-31284-7\_9}, doi = {10.1007/978-3-642-31284-7\_9}, timestamp = {Fri, 09 Apr 2021 18:46:11 +0200}, biburl = {https://dblp.org/rec/conf/acns/FujiokaSX12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cans/FujiokaSX12, author = {Atsushi Fujioka and Taiichi Saito and Keita Xagawa}, editor = {Josef Pieprzyk and Ahmad{-}Reza Sadeghi and Mark Manulis}, title = {Applicability of OR-Proof Techniques to Hierarchical Identity-Based Identification}, booktitle = {Cryptology and Network Security, 11th International Conference, {CANS} 2012, Darmstadt, Germany, December 12-14, 2012. Proceedings}, volume = {7712}, pages = {169--184}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-35404-5\_14}, doi = {10.1007/978-3-642-35404-5\_14}, timestamp = {Wed, 25 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cans/FujiokaSX12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icics/FujiokaSX12, author = {Atsushi Fujioka and Taiichi Saito and Keita Xagawa}, editor = {Tat Wing Chim and Tsz Hon Yuen}, title = {Security Enhancement of Identity-Based Identification with Reversibility}, booktitle = {Information and Communications Security - 14th International Conference, {ICICS} 2012, Hong Kong, China, October 29-31, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7618}, pages = {202--213}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-34129-8\_18}, doi = {10.1007/978-3-642-34129-8\_18}, timestamp = {Thu, 31 Oct 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icics/FujiokaSX12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isw/FujiokaSX12, author = {Atsushi Fujioka and Taiichi Saito and Keita Xagawa}, editor = {Dieter Gollmann and Felix C. Freiling}, title = {Secure Hierarchical Identity-Based Identification without Random Oracles}, booktitle = {Information Security - 15th International Conference, {ISC} 2012, Passau, Germany, September 19-21, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7483}, pages = {258--273}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-33383-5\_16}, doi = {10.1007/978-3-642-33383-5\_16}, timestamp = {Wed, 25 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isw/FujiokaSX12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/FujiokaSXY12, author = {Atsushi Fujioka and Koutarou Suzuki and Keita Xagawa and Kazuki Yoneyama}, editor = {Marc Fischlin and Johannes Buchmann and Mark Manulis}, title = {Strongly Secure Authenticated Key Exchange from Factoring, Codes, and Lattices}, booktitle = {Public Key Cryptography - {PKC} 2012 - 15th International Conference on Practice and Theory in Public Key Cryptography, Darmstadt, Germany, May 21-23, 2012. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7293}, pages = {467--484}, publisher = {Springer}, year = {2012}, url = {https://doi.org/10.1007/978-3-642-30057-8\_28}, doi = {10.1007/978-3-642-30057-8\_28}, timestamp = {Mon, 16 Nov 2020 15:55:52 +0100}, biburl = {https://dblp.org/rec/conf/pkc/FujiokaSXY12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/FujiokaSXY12, author = {Atsushi Fujioka and Koutarou Suzuki and Keita Xagawa and Kazuki Yoneyama}, title = {Strongly Secure Authenticated Key Exchange from Factoring, Codes, and Lattices}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {211}, year = {2012}, url = {http://eprint.iacr.org/2012/211}, timestamp = {Thu, 21 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iacr/FujiokaSXY12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/KawachiNTX10, author = {Akinori Kawachi and Akira Numayama and Keisuke Tanaka and Keita Xagawa}, editor = {Phong Q. Nguyen and David Pointcheval}, title = {Security of Encryption Schemes in Weakened Random Oracle Models}, booktitle = {Public Key Cryptography - {PKC} 2010, 13th International Conference on Practice and Theory in Public Key Cryptography, Paris, France, May 26-28, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6056}, pages = {403--419}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-13013-7\_24}, doi = {10.1007/978-3-642-13013-7\_24}, timestamp = {Fri, 01 May 2020 18:32:25 +0200}, biburl = {https://dblp.org/rec/conf/pkc/KawachiNTX10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/KawachiNTX10, author = {Akinori Kawachi and Akira Numayama and Keisuke Tanaka and Keita Xagawa}, title = {Security of Encryption Schemes in Weakened Random Oracle Models}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {122}, year = {2010}, url = {http://eprint.iacr.org/2010/122}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/KawachiNTX10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/StehleSTX09, author = {Damien Stehl{\'{e}} and Ron Steinfeld and Keisuke Tanaka and Keita Xagawa}, editor = {Mitsuru Matsui}, title = {Efficient Public Key Encryption Based on Ideal Lattices}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2009, 15th International Conference on the Theory and Application of Cryptology and Information Security, Tokyo, Japan, December 6-10, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5912}, pages = {617--635}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-10366-7\_36}, doi = {10.1007/978-3-642-10366-7\_36}, timestamp = {Wed, 25 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/asiacrypt/StehleSTX09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/provsec/XagawaT09, author = {Keita Xagawa and Keisuke Tanaka}, editor = {Josef Pieprzyk and Fangguo Zhang}, title = {Zero-Knowledge Protocols for {NTRU:} Application to Identification and Proof of Plaintext Knowledge}, booktitle = {Provable Security, Third International Conference, ProvSec 2009, Guangzhou, China, November 11-13, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5848}, pages = {198--213}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-04642-1\_17}, doi = {10.1007/978-3-642-04642-1\_17}, timestamp = {Wed, 25 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/provsec/XagawaT09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iacr/StehleSTX09, author = {Damien Stehl{\'{e}} and Ron Steinfeld and Keisuke Tanaka and Keita Xagawa}, title = {Efficient Public Key Encryption Based on Ideal Lattices}, journal = {{IACR} Cryptol. ePrint Arch.}, pages = {285}, year = {2009}, url = {http://eprint.iacr.org/2009/285}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iacr/StehleSTX09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/asiacrypt/KawachiTX08, author = {Akinori Kawachi and Keisuke Tanaka and Keita Xagawa}, editor = {Josef Pieprzyk}, title = {Concurrently Secure Identification Schemes Based on the Worst-Case Hardness of Lattice Problems}, booktitle = {Advances in Cryptology - {ASIACRYPT} 2008, 14th International Conference on the Theory and Application of Cryptology and Information Security, Melbourne, Australia, December 7-11, 2008. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5350}, pages = {372--389}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-89255-7\_23}, doi = {10.1007/978-3-540-89255-7\_23}, timestamp = {Wed, 25 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/asiacrypt/KawachiTX08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pkc/KawachiTX07, author = {Akinori Kawachi and Keisuke Tanaka and Keita Xagawa}, editor = {Tatsuaki Okamoto and Xiaoyun Wang}, title = {Multi-bit Cryptosystems Based on Lattice Problems}, booktitle = {Public Key Cryptography - {PKC} 2007, 10th International Conference on Practice and Theory in Public-Key Cryptography, Beijing, China, April 16-20, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4450}, pages = {315--329}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-71677-8\_21}, doi = {10.1007/978-3-540-71677-8\_21}, timestamp = {Fri, 01 May 2020 18:32:25 +0200}, biburl = {https://dblp.org/rec/conf/pkc/KawachiTX07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.