BibTeX records: Keita Xagawa

download as .bib file

@inproceedings{DBLP:conf/pkc/KosugeX24,
  author       = {Haruhisa Kosuge and
                  Keita Xagawa},
  editor       = {Qiang Tang and
                  Vanessa Teague},
  title        = {Probabilistic Hash-and-Sign with Retry in the Quantum Random Oracle
                  Model},
  booktitle    = {Public-Key Cryptography - {PKC} 2024 - 27th {IACR} International Conference
                  on Practice and Theory of Public-Key Cryptography, Sydney, NSW, Australia,
                  April 15-17, 2024, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {14601},
  pages        = {259--288},
  publisher    = {Springer},
  year         = {2024},
  url          = {https://doi.org/10.1007/978-3-031-57718-5\_9},
  doi          = {10.1007/978-3-031-57718-5\_9},
  timestamp    = {Sat, 04 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/KosugeX24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/TanakaUXITH23,
  author       = {Yutaro Tanaka and
                  Rei Ueno and
                  Keita Xagawa and
                  Akira Ito and
                  Junko Takahashi and
                  Naofumi Homma},
  title        = {Multiple-Valued Plaintext-Checking Side-Channel Attacks on Post-Quantum
                  KEMs},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2023},
  number       = {3},
  pages        = {473--503},
  year         = {2023},
  url          = {https://doi.org/10.46586/tches.v2023.i3.473-503},
  doi          = {10.46586/TCHES.V2023.I3.473-503},
  timestamp    = {Tue, 12 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tches/TanakaUXITH23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/latincrypt/NakagawaFNTXY23,
  author       = {Kohei Nakagawa and
                  Atsushi Fujioka and
                  Akira Nagai and
                  Junichi Tomida and
                  Keita Xagawa and
                  Kan Yasuda},
  editor       = {Abdelrahaman Aly and
                  Mehdi Tibouchi},
  title        = {Making the Identity-Based Diffie-Hellman Key Exchange Efficiently
                  Revocable},
  booktitle    = {Progress in Cryptology - {LATINCRYPT} 2023 - 8th International Conference
                  on Cryptology and Information Security in Latin America, {LATINCRYPT}
                  2023, Quito, Ecuador, October 3-6, 2023, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {14168},
  pages        = {171--191},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-44469-2\_9},
  doi          = {10.1007/978-3-031-44469-2\_9},
  timestamp    = {Fri, 06 Oct 2023 18:13:29 +0200},
  biburl       = {https://dblp.org/rec/conf/latincrypt/NakagawaFNTXY23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/MaramX23,
  author       = {Varun Maram and
                  Keita Xagawa},
  editor       = {Alexandra Boldyreva and
                  Vladimir Kolesnikov},
  title        = {Post-quantum Anonymity of Kyber},
  booktitle    = {Public-Key Cryptography - {PKC} 2023 - 26th {IACR} International Conference
                  on Practice and Theory of Public-Key Cryptography, Atlanta, GA, USA,
                  May 7-10, 2023, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {13940},
  pages        = {3--35},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-31368-4\_1},
  doi          = {10.1007/978-3-031-31368-4\_1},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/pkc/MaramX23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Xagawa23,
  author       = {Keita Xagawa},
  title        = {On the Efficiency of Generic, Quantum Cryptographic Constructions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1142},
  year         = {2023},
  url          = {https://eprint.iacr.org/2023/1142},
  timestamp    = {Fri, 04 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Xagawa23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Xagawa23a,
  author       = {Keita Xagawa},
  title        = {Signatures with Memory-Tight Security in the Quantum Random Oracle
                  Model},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1734},
  year         = {2023},
  url          = {https://eprint.iacr.org/2023/1734},
  timestamp    = {Fri, 08 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/Xagawa23a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/AgrawalBNXXY22,
  author       = {Shweta Agrawal and
                  Rajarshi Biswas and
                  Ryo Nishimaki and
                  Keita Xagawa and
                  Xiang Xie and
                  Shota Yamada},
  title        = {Cryptanalysis of Boyen's attribute-based encryption scheme in {TCC}
                  2013},
  journal      = {Des. Codes Cryptogr.},
  volume       = {90},
  number       = {10},
  pages        = {2301--2318},
  year         = {2022},
  url          = {https://doi.org/10.1007/s10623-022-01076-6},
  doi          = {10.1007/S10623-022-01076-6},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/AgrawalBNXXY22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tches/UenoXTITH22,
  author       = {Rei Ueno and
                  Keita Xagawa and
                  Yutaro Tanaka and
                  Akira Ito and
                  Junko Takahashi and
                  Naofumi Homma},
  title        = {Curse of Re-encryption: {A} Generic Power/EM Analysis on Post-Quantum
                  KEMs},
  journal      = {{IACR} Trans. Cryptogr. Hardw. Embed. Syst.},
  volume       = {2022},
  number       = {1},
  pages        = {296--322},
  year         = {2022},
  url          = {https://doi.org/10.46586/tches.v2022.i1.296-322},
  doi          = {10.46586/TCHES.V2022.I1.296-322},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tches/UenoXTITH22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/Xagawa22,
  author       = {Keita Xagawa},
  editor       = {Orr Dunkelman and
                  Stefan Dziembowski},
  title        = {Anonymity of {NIST} {PQC} Round 3 KEMs},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2022 - 41st Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Trondheim, Norway, May 30 - June 3, 2022, Proceedings, Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {13277},
  pages        = {551--581},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-07082-2\_20},
  doi          = {10.1007/978-3-031-07082-2\_20},
  timestamp    = {Thu, 02 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/Xagawa22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/TanakaUXITH22,
  author       = {Yutaro Tanaka and
                  Rei Ueno and
                  Keita Xagawa and
                  Akira Ito and
                  Junko Takahashi and
                  Naofumi Homma},
  title        = {Multiple-Valued Plaintext-Checking Side-Channel Attacks on Post-Quantum
                  KEMs},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {940},
  year         = {2022},
  url          = {https://eprint.iacr.org/2022/940},
  timestamp    = {Tue, 27 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/TanakaUXITH22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KosugeX22,
  author       = {Haruhisa Kosuge and
                  Keita Xagawa},
  title        = {Probabilistic Hash-and-Sign with Retry in the Quantum Random Oracle
                  Model},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1359},
  year         = {2022},
  url          = {https://eprint.iacr.org/2022/1359},
  timestamp    = {Sat, 22 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KosugeX22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/MaramX22,
  author       = {Varun Maram and
                  Keita Xagawa},
  title        = {Post-Quantum Anonymity of Kyber},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1696},
  year         = {2022},
  url          = {https://eprint.iacr.org/2022/1696},
  timestamp    = {Thu, 05 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/MaramX22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/XagawaIUTH21,
  author       = {Keita Xagawa and
                  Akira Ito and
                  Rei Ueno and
                  Junko Takahashi and
                  Naofumi Homma},
  editor       = {Mehdi Tibouchi and
                  Huaxiong Wang},
  title        = {Fault-Injection Attacks Against NIST's Post-Quantum Cryptography Round
                  3 {KEM} Candidates},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2021 - 27th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Singapore, December 6-10, 2021, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {13091},
  pages        = {33--61},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-92075-3\_2},
  doi          = {10.1007/978-3-030-92075-3\_2},
  timestamp    = {Fri, 03 Dec 2021 17:36:49 +0100},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/XagawaIUTH21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sacrypt/Xagawa21,
  author       = {Keita Xagawa},
  editor       = {Riham AlTawy and
                  Andreas H{\"{u}}lsing},
  title        = {The Boneh-Katz Transformation, Revisited: Pseudorandom/Obliviously-Samplable
                  {PKE} from Lattices and Codes and Its Application},
  booktitle    = {Selected Areas in Cryptography - 28th International Conference, {SAC}
                  2021, Virtual Event, September 29 - October 1, 2021, Revised Selected
                  Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {13203},
  pages        = {47--67},
  publisher    = {Springer},
  year         = {2021},
  url          = {https://doi.org/10.1007/978-3-030-99277-4\_3},
  doi          = {10.1007/978-3-030-99277-4\_3},
  timestamp    = {Fri, 01 Apr 2022 15:49:26 +0200},
  biburl       = {https://dblp.org/rec/conf/sacrypt/Xagawa21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/AgrawalBNXXY21,
  author       = {Shweta Agrawal and
                  Rajarshi Biswas and
                  Ryo Nishimaki and
                  Keita Xagawa and
                  Xiang Xie and
                  Shota Yamada},
  title        = {Cryptanalysis of Boyen's Attribute-Based Encryption Scheme in {TCC}
                  2013},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {505},
  year         = {2021},
  url          = {https://eprint.iacr.org/2021/505},
  timestamp    = {Thu, 22 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/AgrawalBNXXY21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Xagawa21,
  author       = {Keita Xagawa},
  title        = {The Boneh-Katz Transformation, Revisited: Pseudorandom/Obliviously-Samplable
                  {PKE} from Lattices and Codes and Its Application},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {740},
  year         = {2021},
  url          = {https://eprint.iacr.org/2021/740},
  timestamp    = {Mon, 07 Jun 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Xagawa21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/XagawaIUTH21,
  author       = {Keita Xagawa and
                  Akira Ito and
                  Rei Ueno and
                  Junko Takahashi and
                  Naofumi Homma},
  title        = {Fault-Injection Attacks against NIST's Post-Quantum Cryptography Round
                  3 {KEM} Candidates},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {840},
  year         = {2021},
  url          = {https://eprint.iacr.org/2021/840},
  timestamp    = {Wed, 07 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/XagawaIUTH21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/UenoXTITH21,
  author       = {Rei Ueno and
                  Keita Xagawa and
                  Yutaro Tanaka and
                  Akira Ito and
                  Junko Takahashi and
                  Naofumi Homma},
  title        = {Curse of Re-encryption: {A} Generic Power/EM Analysis on Post-Quantum
                  KEMs},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {849},
  year         = {2021},
  url          = {https://eprint.iacr.org/2021/849},
  timestamp    = {Wed, 07 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/UenoXTITH21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Xagawa21b,
  author       = {Keita Xagawa},
  title        = {Anonymity of {NIST} {PQC} Round-3 KEMs},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1323},
  year         = {2021},
  url          = {https://eprint.iacr.org/2021/1323},
  timestamp    = {Fri, 12 Nov 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/Xagawa21b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/AragonBDGLTX20,
  author       = {Nicolas Aragon and
                  Olivier Blazy and
                  Jean{-}Christophe Deneuville and
                  Philippe Gaborit and
                  Terry Shue Chien Lau and
                  Chik How Tan and
                  Keita Xagawa},
  title        = {Cryptanalysis of a rank-based signature with short public keys},
  journal      = {Des. Codes Cryptogr.},
  volume       = {88},
  number       = {4},
  pages        = {643--653},
  year         = {2020},
  url          = {https://doi.org/10.1007/s10623-019-00702-0},
  doi          = {10.1007/S10623-019-00702-0},
  timestamp    = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/AragonBDGLTX20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcs/HosoyamadaSTX20,
  author       = {Akinori Hosoyamada and
                  Yu Sasaki and
                  Seiichiro Tani and
                  Keita Xagawa},
  title        = {Quantum algorithm for the multicollision problem},
  journal      = {Theor. Comput. Sci.},
  volume       = {842},
  pages        = {100--117},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.tcs.2020.07.039},
  doi          = {10.1016/J.TCS.2020.07.039},
  timestamp    = {Mon, 26 Oct 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tcs/HosoyamadaSTX20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/YoshidaKXT20,
  author       = {Yusuke Yoshida and
                  Fuyuki Kitagawa and
                  Keita Xagawa and
                  Keisuke Tanaka},
  editor       = {Shiho Moriai and
                  Huaxiong Wang},
  title        = {Non-committing Encryption with Constant Ciphertext Expansion from
                  Standard Assumptions},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2020 - 26th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Daejeon, South Korea, December 7-11, 2020, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12492},
  pages        = {36--65},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-64834-3\_2},
  doi          = {10.1007/978-3-030-64834-3\_2},
  timestamp    = {Thu, 10 Dec 2020 10:09:50 +0100},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/YoshidaKXT20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/Chuengsatiansup20,
  author       = {Chitchanok Chuengsatiansup and
                  Thomas Prest and
                  Damien Stehl{\'{e}} and
                  Alexandre Wallet and
                  Keita Xagawa},
  editor       = {Hung{-}Min Sun and
                  Shiuh{-}Pyng Shieh and
                  Guofei Gu and
                  Giuseppe Ateniese},
  title        = {ModFalcon: Compact Signatures Based On Module-NTRU Lattices},
  booktitle    = {{ASIA} {CCS} '20: The 15th {ACM} Asia Conference on Computer and Communications
                  Security, Taipei, Taiwan, October 5-9, 2020},
  pages        = {853--866},
  publisher    = {{ACM}},
  year         = {2020},
  url          = {https://doi.org/10.1145/3320269.3384758},
  doi          = {10.1145/3320269.3384758},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/Chuengsatiansup20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ctrsa/FerradiX20,
  author       = {Houda Ferradi and
                  Keita Xagawa},
  editor       = {Stanislaw Jarecki},
  title        = {Post-quantum Provably-Secure Authentication and {MAC} from Mersenne
                  Primes},
  booktitle    = {Topics in Cryptology - {CT-RSA} 2020 - The Cryptographers' Track at
                  the {RSA} Conference 2020, San Francisco, CA, USA, February 24-28,
                  2020, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {12006},
  pages        = {469--495},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-40186-3\_20},
  doi          = {10.1007/978-3-030-40186-3\_20},
  timestamp    = {Tue, 03 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ctrsa/FerradiX20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/YoshidaKXT20,
  author       = {Yusuke Yoshida and
                  Fuyuki Kitagawa and
                  Keita Xagawa and
                  Keisuke Tanaka},
  title        = {Non-Committing Encryption with Constant Ciphertext Expansion from
                  Standard Assumptions},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1210},
  year         = {2020},
  url          = {https://eprint.iacr.org/2020/1210},
  timestamp    = {Fri, 30 Oct 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/YoshidaKXT20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/HhanXY19,
  author       = {Minki Hhan and
                  Keita Xagawa and
                  Takashi Yamakawa},
  editor       = {Steven D. Galbraith and
                  Shiho Moriai},
  title        = {Quantum Random Oracle Model with Auxiliary Input},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2019 - 25th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Kobe, Japan, December 8-12, 2019, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11921},
  pages        = {584--614},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-34578-5\_21},
  doi          = {10.1007/978-3-030-34578-5\_21},
  timestamp    = {Tue, 26 Nov 2019 14:11:51 +0100},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/HhanXY19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pqcrypto/XagawaY19,
  author       = {Keita Xagawa and
                  Takashi Yamakawa},
  editor       = {Jintai Ding and
                  Rainer Steinwandt},
  title        = {(Tightly) QCCA-Secure Key-Encapsulation Mechanism in the Quantum Random
                  Oracle Model},
  booktitle    = {Post-Quantum Cryptography - 10th International Conference, PQCrypto
                  2019, Chongqing, China, May 8-10, 2019 Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {11505},
  pages        = {249--268},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-25510-7\_14},
  doi          = {10.1007/978-3-030-25510-7\_14},
  timestamp    = {Wed, 25 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pqcrypto/XagawaY19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pqcrypto/HosoyamadaSTX19,
  author       = {Akinori Hosoyamada and
                  Yu Sasaki and
                  Seiichiro Tani and
                  Keita Xagawa},
  editor       = {Jintai Ding and
                  Rainer Steinwandt},
  title        = {Improved Quantum Multicollision-Finding Algorithm},
  booktitle    = {Post-Quantum Cryptography - 10th International Conference, PQCrypto
                  2019, Chongqing, China, May 8-10, 2019 Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {11505},
  pages        = {350--367},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-25510-7\_19},
  doi          = {10.1007/978-3-030-25510-7\_19},
  timestamp    = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pqcrypto/HosoyamadaSTX19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1911-02822,
  author       = {Akinori Hosoyamada and
                  Yu Sasaki and
                  Seiichiro Tani and
                  Keita Xagawa},
  title        = {Quantum Algorithm for the Multicollision Problem},
  journal      = {CoRR},
  volume       = {abs/1911.02822},
  year         = {2019},
  url          = {http://arxiv.org/abs/1911.02822},
  eprinttype    = {arXiv},
  eprint       = {1911.02822},
  timestamp    = {Mon, 11 Nov 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1911-02822.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Xagawa19,
  author       = {Keita Xagawa},
  title        = {Cryptanalysis of a New Code-based Signature Scheme with Shorter Public
                  Key in {PKC} 2019},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {120},
  year         = {2019},
  url          = {https://eprint.iacr.org/2019/120},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Xagawa19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/FerradiX19,
  author       = {Houda Ferradi and
                  Keita Xagawa},
  title        = {Post-Quantum Provably-Secure Authentication and {MAC} from Mersenne
                  Primes},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {409},
  year         = {2019},
  url          = {https://eprint.iacr.org/2019/409},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/FerradiX19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HhanXY19,
  author       = {Minki Hhan and
                  Keita Xagawa and
                  Takashi Yamakawa},
  title        = {Quantum Random Oracle Model with Auxiliary Input},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1093},
  year         = {2019},
  url          = {https://eprint.iacr.org/2019/1093},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/HhanXY19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Chuengsatiansup19,
  author       = {Chitchanok Chuengsatiansup and
                  Thomas Prest and
                  Damien Stehl{\'{e}} and
                  Alexandre Wallet and
                  Keita Xagawa},
  title        = {ModFalcon: compact signatures based on module {NTRU} lattices},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1456},
  year         = {2019},
  url          = {https://eprint.iacr.org/2019/1456},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Chuengsatiansup19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijisec/SeoEXY18,
  author       = {Jae Hong Seo and
                  Keita Emura and
                  Keita Xagawa and
                  Kazuki Yoneyama},
  title        = {Accumulable optimistic fair exchange from verifiably encrypted homomorphic
                  signatures},
  journal      = {Int. J. Inf. Sec.},
  volume       = {17},
  number       = {2},
  pages        = {193--220},
  year         = {2018},
  url          = {https://doi.org/10.1007/s10207-017-0367-z},
  doi          = {10.1007/S10207-017-0367-Z},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijisec/SeoEXY18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ctrsa/BootleTX18,
  author       = {Jonathan Bootle and
                  Mehdi Tibouchi and
                  Keita Xagawa},
  editor       = {Nigel P. Smart},
  title        = {Cryptanalysis of Compact-LWE},
  booktitle    = {Topics in Cryptology - {CT-RSA} 2018 - The Cryptographers' Track at
                  the {RSA} Conference 2018, San Francisco, CA, USA, April 16-20, 2018,
                  Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10808},
  pages        = {80--97},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-76953-0\_5},
  doi          = {10.1007/978-3-319-76953-0\_5},
  timestamp    = {Tue, 14 May 2019 10:00:52 +0200},
  biburl       = {https://dblp.org/rec/conf/ctrsa/BootleTX18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eurocrypt/SaitoXY18,
  author       = {Tsunekazu Saito and
                  Keita Xagawa and
                  Takashi Yamakawa},
  editor       = {Jesper Buus Nielsen and
                  Vincent Rijmen},
  title        = {Tightly-Secure Key-Encapsulation Mechanism in the Quantum Random Oracle
                  Model},
  booktitle    = {Advances in Cryptology - {EUROCRYPT} 2018 - 37th Annual International
                  Conference on the Theory and Applications of Cryptographic Techniques,
                  Tel Aviv, Israel, April 29 - May 3, 2018 Proceedings, Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10822},
  pages        = {520--551},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-78372-7\_17},
  doi          = {10.1007/978-3-319-78372-7\_17},
  timestamp    = {Tue, 14 May 2019 10:00:53 +0200},
  biburl       = {https://dblp.org/rec/conf/eurocrypt/SaitoXY18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pqcrypto/Xagawa18,
  author       = {Keita Xagawa},
  editor       = {Tanja Lange and
                  Rainer Steinwandt},
  title        = {Practical Cryptanalysis of a Public-Key Encryption Scheme Based on
                  Non-linear Indeterminate Equations at {SAC} 2017},
  booktitle    = {Post-Quantum Cryptography - 9th International Conference, PQCrypto
                  2018, Fort Lauderdale, FL, USA, April 9-11, 2018, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10786},
  pages        = {142--161},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-79063-3\_7},
  doi          = {10.1007/978-3-319-79063-3\_7},
  timestamp    = {Wed, 25 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pqcrypto/Xagawa18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1811-08097,
  author       = {Akinori Hosoyamada and
                  Yu Sasaki and
                  Seiichiro Tani and
                  Keita Xagawa},
  title        = {Improved Quantum Multicollision-Finding Algorithm},
  journal      = {CoRR},
  volume       = {abs/1811.08097},
  year         = {2018},
  url          = {http://arxiv.org/abs/1811.08097},
  eprinttype    = {arXiv},
  eprint       = {1811.08097},
  timestamp    = {Mon, 26 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1811-08097.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Xagawa18,
  author       = {Keita Xagawa},
  title        = {Practical Attack on RaCoSS-R},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {831},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/831},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Xagawa18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/XagawaY18,
  author       = {Keita Xagawa and
                  Takashi Yamakawa},
  title        = {(Tightly) QCCA-Secure Key-Encapsulation Mechanism in the Quantum Random
                  Oracle Model},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {838},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/838},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/XagawaY18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HosoyamadaSTX18,
  author       = {Akinori Hosoyamada and
                  Yu Sasaki and
                  Seiichiro Tani and
                  Keita Xagawa},
  title        = {Improved Quantum Multicollision-Finding Algorithm},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1122},
  year         = {2018},
  url          = {https://eprint.iacr.org/2018/1122},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/HosoyamadaSTX18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/HosoyamadaSX17,
  author       = {Akinori Hosoyamada and
                  Yu Sasaki and
                  Keita Xagawa},
  editor       = {Tsuyoshi Takagi and
                  Thomas Peyrin},
  title        = {Quantum Multicollision-Finding Algorithm},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2017 - 23rd International Conference
                  on the Theory and Applications of Cryptology and Information Security,
                  Hong Kong, China, December 3-7, 2017, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10625},
  pages        = {179--210},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-70697-9\_7},
  doi          = {10.1007/978-3-319-70697-9\_7},
  timestamp    = {Wed, 25 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/HosoyamadaSX17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sigmod/HorstKX17,
  author       = {Caleb Horst and
                  Ryo Kikuchi and
                  Keita Xagawa},
  editor       = {Semih Salihoglu and
                  Wenchao Zhou and
                  Rada Chirkova and
                  Jun Yang and
                  Dan Suciu},
  title        = {Cryptanalysis of Comparable Encryption in SIGMOD'16},
  booktitle    = {Proceedings of the 2017 {ACM} International Conference on Management
                  of Data, {SIGMOD} Conference 2017, Chicago, IL, USA, May 14-19, 2017},
  pages        = {1069--1084},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3035918.3035948},
  doi          = {10.1145/3035918.3035948},
  timestamp    = {Wed, 25 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sigmod/HorstKX17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/HosoyamadaSX17,
  author       = {Akinori Hosoyamada and
                  Yu Sasaki and
                  Keita Xagawa},
  title        = {Quantum Multicollision-Finding Algorithm},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {864},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/864},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/HosoyamadaSX17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/SaitoXY17,
  author       = {Tsunekazu Saito and
                  Keita Xagawa and
                  Takashi Yamakawa},
  title        = {Tightly-Secure Key-Encapsulation Mechanism in the Quantum Random Oracle
                  Model},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1005},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/1005},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/SaitoXY17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Xagawa17,
  author       = {Keita Xagawa},
  title        = {Practical Cryptanalysis of a Public-key Encryption Scheme Based on
                  Non-linear Indeterminate Equations at {SAC} 2017},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1224},
  year         = {2017},
  url          = {http://eprint.iacr.org/2017/1224},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Xagawa17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/FujisakiX16,
  author       = {Eiichiro Fujisaki and
                  Keita Xagawa},
  editor       = {Jung Hee Cheon and
                  Tsuyoshi Takagi},
  title        = {Public-Key Cryptosystems Resilient to Continuous Tampering and Leakage
                  of Arbitrary Functions},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2016 - 22nd International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Hanoi, Vietnam, December 4-8, 2016, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10031},
  pages        = {908--938},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-662-53887-6\_33},
  doi          = {10.1007/978-3-662-53887-6\_33},
  timestamp    = {Wed, 25 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/FujisakiX16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Xagawa16,
  author       = {Keita Xagawa},
  title        = {Groth-Sahai Proofs Revisited Again: {A} Bug in "Optimized"
                  Randomization},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {476},
  year         = {2016},
  url          = {http://eprint.iacr.org/2016/476},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Xagawa16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/FujiokaSXY15,
  author       = {Atsushi Fujioka and
                  Koutarou Suzuki and
                  Keita Xagawa and
                  Kazuki Yoneyama},
  title        = {Strongly secure authenticated key exchange from factoring, codes,
                  and lattices},
  journal      = {Des. Codes Cryptogr.},
  volume       = {76},
  number       = {3},
  pages        = {469--504},
  year         = {2015},
  url          = {https://doi.org/10.1007/s10623-014-9972-2},
  doi          = {10.1007/S10623-014-9972-2},
  timestamp    = {Mon, 26 Oct 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/dcc/FujiokaSXY15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/dcc/NishimakiX15,
  author       = {Ryo Nishimaki and
                  Keita Xagawa},
  title        = {Verifiably encrypted signatures with short keys based on the decisional
                  linear problem and obfuscation for encrypted {VES}},
  journal      = {Des. Codes Cryptogr.},
  volume       = {77},
  number       = {1},
  pages        = {61--98},
  year         = {2015},
  url          = {https://doi.org/10.1007/s10623-014-9986-9},
  doi          = {10.1007/S10623-014-9986-9},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/dcc/NishimakiX15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/NishimakiX15,
  author       = {Ryo Nishimaki and
                  Keita Xagawa},
  title        = {Key-Private Proxy Re-Encryption from Lattices, Revisited},
  journal      = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.},
  volume       = {98-A},
  number       = {1},
  pages        = {100--116},
  year         = {2015},
  url          = {https://doi.org/10.1587/transfun.E98.A.100},
  doi          = {10.1587/TRANSFUN.E98.A.100},
  timestamp    = {Sun, 22 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieicet/NishimakiX15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/SeoEXY15,
  author       = {Jae Hong Seo and
                  Keita Emura and
                  Keita Xagawa and
                  Kazuki Yoneyama},
  editor       = {Tal Malkin and
                  Vladimir Kolesnikov and
                  Allison Bishop Lewko and
                  Michalis Polychronakis},
  title        = {Accumulable Optimistic Fair Exchange from Verifiably Encrypted Homomorphic
                  Signatures},
  booktitle    = {Applied Cryptography and Network Security - 13th International Conference,
                  {ACNS} 2015, New York, NY, USA, June 2-5, 2015, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {9092},
  pages        = {192--214},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-28166-7\_10},
  doi          = {10.1007/978-3-319-28166-7\_10},
  timestamp    = {Sun, 25 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acns/SeoEXY15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/latincrypt/FujisakiX15,
  author       = {Eiichiro Fujisaki and
                  Keita Xagawa},
  editor       = {Kristin E. Lauter and
                  Francisco Rodr{\'{\i}}guez{-}Henr{\'{\i}}quez},
  title        = {Efficient RKA-Secure {KEM} and {IBE} Schemes Against Invertible Functions},
  booktitle    = {Progress in Cryptology - {LATINCRYPT} 2015 - 4th International Conference
                  on Cryptology and Information Security in Latin America, Guadalajara,
                  Mexico, August 23-26, 2015, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9230},
  pages        = {3--20},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-22174-8\_1},
  doi          = {10.1007/978-3-319-22174-8\_1},
  timestamp    = {Wed, 25 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/latincrypt/FujisakiX15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/NishimakiX15,
  author       = {Ryo Nishimaki and
                  Keita Xagawa},
  title        = {Verifiably Encrypted Signatures with Short Keys based on the Decisional
                  Linear Problem and Obfuscation for Encrypted {VES}},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {248},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/248},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/NishimakiX15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Xagawa15,
  author       = {Keita Xagawa},
  title        = {Improved (Hierarchical) Inner-Product Encryption from Lattices},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {249},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/249},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Xagawa15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/ChandranCLNX15,
  author       = {Nishanth Chandran and
                  Melissa Chase and
                  Feng{-}Hao Liu and
                  Ryo Nishimaki and
                  Keita Xagawa},
  title        = {Re-encryption, functional re-encryption, and multi-hop re-encryption:
                  {A} framework for achieving obfuscation-based security and instantiations
                  from lattices},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {491},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/491},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/ChandranCLNX15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/FujisakiX15,
  author       = {Eiichiro Fujisaki and
                  Keita Xagawa},
  title        = {Note on the {RKA} security of Continuously Non-Malleable Key-Derivation
                  Function from {PKC} 2015},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {1088},
  year         = {2015},
  url          = {http://eprint.iacr.org/2015/1088},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/FujisakiX15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/FujiokaSX14,
  author       = {Atsushi Fujioka and
                  Taiichi Saito and
                  Keita Xagawa},
  title        = {Secure Hierarchical Identity-Based Identification without Random Oracles},
  journal      = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.},
  volume       = {97-A},
  number       = {6},
  pages        = {1307--1317},
  year         = {2014},
  url          = {https://doi.org/10.1587/transfun.E97.A.1307},
  doi          = {10.1587/TRANSFUN.E97.A.1307},
  timestamp    = {Mon, 26 Oct 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieicet/FujiokaSX14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicet/FujiokaFX14,
  author       = {Atsushi Fujioka and
                  Eiichiro Fujisaki and
                  Keita Xagawa},
  title        = {Non-malleable Multiple Public-Key Encryption},
  journal      = {{IEICE} Trans. Fundam. Electron. Commun. Comput. Sci.},
  volume       = {97-A},
  number       = {6},
  pages        = {1318--1334},
  year         = {2014},
  url          = {https://doi.org/10.1587/transfun.E97.A.1318},
  doi          = {10.1587/TRANSFUN.E97.A.1318},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieicet/FujiokaFX14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/ChandranCLNX14,
  author       = {Nishanth Chandran and
                  Melissa Chase and
                  Feng{-}Hao Liu and
                  Ryo Nishimaki and
                  Keita Xagawa},
  editor       = {Hugo Krawczyk},
  title        = {Re-encryption, Functional Re-encryption, and Multi-hop Re-encryption:
                  {A} Framework for Achieving Obfuscation-Based Security and Instantiations
                  from Lattices},
  booktitle    = {Public-Key Cryptography - {PKC} 2014 - 17th International Conference
                  on Practice and Theory in Public-Key Cryptography, Buenos Aires, Argentina,
                  March 26-28, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8383},
  pages        = {95--112},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-642-54631-0\_6},
  doi          = {10.1007/978-3-642-54631-0\_6},
  timestamp    = {Fri, 01 May 2020 18:32:25 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/ChandranCLNX14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/AlbrechtFFPTX14,
  author       = {Martin R. Albrecht and
                  Jean{-}Charles Faug{\`{e}}re and
                  Robert Fitzpatrick and
                  Ludovic Perret and
                  Yosuke Todo and
                  Keita Xagawa},
  editor       = {Hugo Krawczyk},
  title        = {Practical Cryptanalysis of a Public-Key Encryption Scheme Based on
                  New Multivariate Quadratic Assumptions},
  booktitle    = {Public-Key Cryptography - {PKC} 2014 - 17th International Conference
                  on Practice and Theory in Public-Key Cryptography, Buenos Aires, Argentina,
                  March 26-28, 2014. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8383},
  pages        = {446--464},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-642-54631-0\_26},
  doi          = {10.1007/978-3-642-54631-0\_26},
  timestamp    = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/AlbrechtFFPTX14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/FujiokaSXY13,
  author       = {Atsushi Fujioka and
                  Koutarou Suzuki and
                  Keita Xagawa and
                  Kazuki Yoneyama},
  editor       = {Kefei Chen and
                  Qi Xie and
                  Weidong Qiu and
                  Ninghui Li and
                  Wen{-}Guey Tzeng},
  title        = {Practical and post-quantum authenticated key exchange from one-way
                  secure key encapsulation mechanism},
  booktitle    = {8th {ACM} Symposium on Information, Computer and Communications Security,
                  {ASIA} {CCS} '13, Hangzhou, China - May 08 - 10, 2013},
  pages        = {83--94},
  publisher    = {{ACM}},
  year         = {2013},
  url          = {https://doi.org/10.1145/2484313.2484323},
  doi          = {10.1145/2484313.2484323},
  timestamp    = {Tue, 10 Nov 2020 16:06:16 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/FujiokaSXY13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/Xagawa13,
  author       = {Keita Xagawa},
  editor       = {Kaoru Kurosawa and
                  Goichiro Hanaoka},
  title        = {Improved (Hierarchical) Inner-Product Encryption from Lattices},
  booktitle    = {Public-Key Cryptography - {PKC} 2013 - 16th International Conference
                  on Practice and Theory in Public-Key Cryptography, Nara, Japan, February
                  26 - March 1, 2013. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7778},
  pages        = {235--252},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-36362-7\_15},
  doi          = {10.1007/978-3-642-36362-7\_15},
  timestamp    = {Fri, 01 May 2020 18:32:25 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/Xagawa13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/NishimakiX13,
  author       = {Ryo Nishimaki and
                  Keita Xagawa},
  editor       = {Kaoru Kurosawa and
                  Goichiro Hanaoka},
  title        = {Verifiably Encrypted Signatures with Short Keys Based on the Decisional
                  Linear Problem and Obfuscation for Encrypted {VES}},
  booktitle    = {Public-Key Cryptography - {PKC} 2013 - 16th International Conference
                  on Practice and Theory in Public-Key Cryptography, Nara, Japan, February
                  26 - March 1, 2013. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7778},
  pages        = {405--422},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-36362-7\_25},
  doi          = {10.1007/978-3-642-36362-7\_25},
  timestamp    = {Wed, 25 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/NishimakiX13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/Xagawa13,
  author       = {Keita Xagawa},
  title        = {Message Authentication Codes Secure against Additively Related-Key
                  Attacks},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {111},
  year         = {2013},
  url          = {http://eprint.iacr.org/2013/111},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/Xagawa13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/TodoX13,
  author       = {Yosuke Todo and
                  Keita Xagawa},
  title        = {Cryptanalysis of the Huang-Liu-Yang Cryptosystem from {PKC} 2012},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {481},
  year         = {2013},
  url          = {http://eprint.iacr.org/2013/481},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/TodoX13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acns/FujiokaSX12,
  author       = {Atsushi Fujioka and
                  Taiichi Saito and
                  Keita Xagawa},
  editor       = {Feng Bao and
                  Pierangela Samarati and
                  Jianying Zhou},
  title        = {Security Enhancements by OR-Proof in Identity-Based Identification},
  booktitle    = {Applied Cryptography and Network Security - 10th International Conference,
                  {ACNS} 2012, Singapore, June 26-29, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7341},
  pages        = {135--152},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-31284-7\_9},
  doi          = {10.1007/978-3-642-31284-7\_9},
  timestamp    = {Fri, 09 Apr 2021 18:46:11 +0200},
  biburl       = {https://dblp.org/rec/conf/acns/FujiokaSX12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cans/FujiokaSX12,
  author       = {Atsushi Fujioka and
                  Taiichi Saito and
                  Keita Xagawa},
  editor       = {Josef Pieprzyk and
                  Ahmad{-}Reza Sadeghi and
                  Mark Manulis},
  title        = {Applicability of OR-Proof Techniques to Hierarchical Identity-Based
                  Identification},
  booktitle    = {Cryptology and Network Security, 11th International Conference, {CANS}
                  2012, Darmstadt, Germany, December 12-14, 2012. Proceedings},
  volume       = {7712},
  pages        = {169--184},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-35404-5\_14},
  doi          = {10.1007/978-3-642-35404-5\_14},
  timestamp    = {Wed, 25 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cans/FujiokaSX12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icics/FujiokaSX12,
  author       = {Atsushi Fujioka and
                  Taiichi Saito and
                  Keita Xagawa},
  editor       = {Tat Wing Chim and
                  Tsz Hon Yuen},
  title        = {Security Enhancement of Identity-Based Identification with Reversibility},
  booktitle    = {Information and Communications Security - 14th International Conference,
                  {ICICS} 2012, Hong Kong, China, October 29-31, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7618},
  pages        = {202--213},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-34129-8\_18},
  doi          = {10.1007/978-3-642-34129-8\_18},
  timestamp    = {Thu, 31 Oct 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icics/FujiokaSX12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isw/FujiokaSX12,
  author       = {Atsushi Fujioka and
                  Taiichi Saito and
                  Keita Xagawa},
  editor       = {Dieter Gollmann and
                  Felix C. Freiling},
  title        = {Secure Hierarchical Identity-Based Identification without Random Oracles},
  booktitle    = {Information Security - 15th International Conference, {ISC} 2012,
                  Passau, Germany, September 19-21, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7483},
  pages        = {258--273},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-33383-5\_16},
  doi          = {10.1007/978-3-642-33383-5\_16},
  timestamp    = {Wed, 25 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isw/FujiokaSX12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/FujiokaSXY12,
  author       = {Atsushi Fujioka and
                  Koutarou Suzuki and
                  Keita Xagawa and
                  Kazuki Yoneyama},
  editor       = {Marc Fischlin and
                  Johannes Buchmann and
                  Mark Manulis},
  title        = {Strongly Secure Authenticated Key Exchange from Factoring, Codes,
                  and Lattices},
  booktitle    = {Public Key Cryptography - {PKC} 2012 - 15th International Conference
                  on Practice and Theory in Public Key Cryptography, Darmstadt, Germany,
                  May 21-23, 2012. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7293},
  pages        = {467--484},
  publisher    = {Springer},
  year         = {2012},
  url          = {https://doi.org/10.1007/978-3-642-30057-8\_28},
  doi          = {10.1007/978-3-642-30057-8\_28},
  timestamp    = {Mon, 16 Nov 2020 15:55:52 +0100},
  biburl       = {https://dblp.org/rec/conf/pkc/FujiokaSXY12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/FujiokaSXY12,
  author       = {Atsushi Fujioka and
                  Koutarou Suzuki and
                  Keita Xagawa and
                  Kazuki Yoneyama},
  title        = {Strongly Secure Authenticated Key Exchange from Factoring, Codes,
                  and Lattices},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {211},
  year         = {2012},
  url          = {http://eprint.iacr.org/2012/211},
  timestamp    = {Thu, 21 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iacr/FujiokaSXY12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/KawachiNTX10,
  author       = {Akinori Kawachi and
                  Akira Numayama and
                  Keisuke Tanaka and
                  Keita Xagawa},
  editor       = {Phong Q. Nguyen and
                  David Pointcheval},
  title        = {Security of Encryption Schemes in Weakened Random Oracle Models},
  booktitle    = {Public Key Cryptography - {PKC} 2010, 13th International Conference
                  on Practice and Theory in Public Key Cryptography, Paris, France,
                  May 26-28, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6056},
  pages        = {403--419},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-13013-7\_24},
  doi          = {10.1007/978-3-642-13013-7\_24},
  timestamp    = {Fri, 01 May 2020 18:32:25 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/KawachiNTX10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/KawachiNTX10,
  author       = {Akinori Kawachi and
                  Akira Numayama and
                  Keisuke Tanaka and
                  Keita Xagawa},
  title        = {Security of Encryption Schemes in Weakened Random Oracle Models},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {122},
  year         = {2010},
  url          = {http://eprint.iacr.org/2010/122},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/KawachiNTX10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/StehleSTX09,
  author       = {Damien Stehl{\'{e}} and
                  Ron Steinfeld and
                  Keisuke Tanaka and
                  Keita Xagawa},
  editor       = {Mitsuru Matsui},
  title        = {Efficient Public Key Encryption Based on Ideal Lattices},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2009, 15th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Tokyo, Japan, December 6-10, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5912},
  pages        = {617--635},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-10366-7\_36},
  doi          = {10.1007/978-3-642-10366-7\_36},
  timestamp    = {Wed, 25 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/StehleSTX09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/provsec/XagawaT09,
  author       = {Keita Xagawa and
                  Keisuke Tanaka},
  editor       = {Josef Pieprzyk and
                  Fangguo Zhang},
  title        = {Zero-Knowledge Protocols for {NTRU:} Application to Identification
                  and Proof of Plaintext Knowledge},
  booktitle    = {Provable Security, Third International Conference, ProvSec 2009, Guangzhou,
                  China, November 11-13, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5848},
  pages        = {198--213},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-04642-1\_17},
  doi          = {10.1007/978-3-642-04642-1\_17},
  timestamp    = {Wed, 25 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/provsec/XagawaT09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iacr/StehleSTX09,
  author       = {Damien Stehl{\'{e}} and
                  Ron Steinfeld and
                  Keisuke Tanaka and
                  Keita Xagawa},
  title        = {Efficient Public Key Encryption Based on Ideal Lattices},
  journal      = {{IACR} Cryptol. ePrint Arch.},
  pages        = {285},
  year         = {2009},
  url          = {http://eprint.iacr.org/2009/285},
  timestamp    = {Mon, 11 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iacr/StehleSTX09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/asiacrypt/KawachiTX08,
  author       = {Akinori Kawachi and
                  Keisuke Tanaka and
                  Keita Xagawa},
  editor       = {Josef Pieprzyk},
  title        = {Concurrently Secure Identification Schemes Based on the Worst-Case
                  Hardness of Lattice Problems},
  booktitle    = {Advances in Cryptology - {ASIACRYPT} 2008, 14th International Conference
                  on the Theory and Application of Cryptology and Information Security,
                  Melbourne, Australia, December 7-11, 2008. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5350},
  pages        = {372--389},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-89255-7\_23},
  doi          = {10.1007/978-3-540-89255-7\_23},
  timestamp    = {Wed, 25 Sep 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/asiacrypt/KawachiTX08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pkc/KawachiTX07,
  author       = {Akinori Kawachi and
                  Keisuke Tanaka and
                  Keita Xagawa},
  editor       = {Tatsuaki Okamoto and
                  Xiaoyun Wang},
  title        = {Multi-bit Cryptosystems Based on Lattice Problems},
  booktitle    = {Public Key Cryptography - {PKC} 2007, 10th International Conference
                  on Practice and Theory in Public-Key Cryptography, Beijing, China,
                  April 16-20, 2007, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {4450},
  pages        = {315--329},
  publisher    = {Springer},
  year         = {2007},
  url          = {https://doi.org/10.1007/978-3-540-71677-8\_21},
  doi          = {10.1007/978-3-540-71677-8\_21},
  timestamp    = {Fri, 01 May 2020 18:32:25 +0200},
  biburl       = {https://dblp.org/rec/conf/pkc/KawachiTX07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics