Keita Xagawa
Keita Xagawa
NTT Secure Platform Laboratories
Bestätigte E-Mail-Adresse bei hco.ntt.co.jp - Startseite
Titel
Zitiert von
Zitiert von
Jahr
Efficient public key encryption based on ideal lattices
D Stehlé, R Steinfeld, K Tanaka, K Xagawa
Advances in Cryptology–ASIACRYPT 2009, 617-635, 2009
2422009
Concurrently secure identification schemes based on the worst-case hardness of lattice problems
A Kawachi, K Tanaka, K Xagawa
International Conference on the Theory and Application of Cryptology and …, 2008
1712008
Multi-bit cryptosystems based on lattice problems
A Kawachi, K Tanaka, K Xagawa
Public Key Cryptography–PKC 2007, 315-329, 2007
1092007
Strongly secure authenticated key exchange from factoring, codes, and lattices
A Fujioka, K Suzuki, K Xagawa, K Yoneyama
Designs, Codes and Cryptography 76 (3), 469-504, 2015
1022015
Tightly-secure key-encapsulation mechanism in the quantum random oracle model
T Saito, K Xagawa, T Yamakawa
Annual International Conference on the Theory and Applications of …, 2018
762018
Practical and post-quantum authenticated key exchange from one-way secure key encapsulation mechanism
A Fujioka, K Suzuki, K Xagawa, K Yoneyama
Proceedings of the 8th ACM SIGSAC symposium on Information, computer and …, 2013
402013
Re-encryption, functional re-encryption, and multi-hop re-encryption: A framework for achieving obfuscation-based security and instantiations from lattices
N Chandran, M Chase, FH Liu, R Nishimaki, K Xagawa
International Workshop on Public Key Cryptography, 95-112, 2014
372014
Improved (hierarchical) inner-product encryption from lattices
K Xagawa
International Workshop on Public Key Cryptography, 235-252, 2013
262013
Zero-knowledge protocols for NTRU: Application to identification and proof of plaintext knowledge
K Xagawa, K Tanaka
Provable Security-ProvSec2009, 198-213, 2009
212009
Key-Private Proxy Re-Encryption from Lattices, Revisited
R NISHIMAKI, K XAGAWA
IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and …, 2015
192015
Verifiably encrypted signatures with short keys based on the decisional linear problem and obfuscation for encrypted VES
R Nishimaki, K Xagawa
Designs, Codes and Cryptography 77 (1), 61-98, 2015
172015
Quantum Multicollision-Finding Algorithm
A Hosoyamada, Y Sasaki, K Xagawa
International Conference on the Theory and Application of Cryptology and …, 2017
152017
Public-Key Cryptosystems Resilient to Continuous Tampering and Leakage of Arbitrary Functions
E Fujisaki, K Xagawa
International Conference on the Theory and Application of Cryptology and …, 2016
142016
Security enhancements by OR-proof in identity-based identification
A Fujioka, T Saito, K Xagawa
International Conference on Applied Cryptography and Network Security, 135-152, 2012
142012
Proxy Re-Encryption based on Learning with Errors
K Xagawa, K Tanaka
数理解析研究所講究録 1691, 29-35, 2010
132010
Practical cryptanalysis of a public-key encryption scheme based on new multivariate quadratic assumptions
M Albrecht, JC Faugère, R Fitzpatrick, L Perret, Y Todo, K Xagawa
Public-Key Cryptography-PKC 2014-17th International Conference on Practice …, 2014
122014
Cryptanalysis of Compact-LWE
J Bootle, M Tibouchi, K Xagawa
Cryptographers’ Track at the RSA Conference, 80-97, 2018
102018
Cryptanalysis of Comparable Encryption in SIGMOD'16
C Horst, R Kikuchi, K Xagawa
Proceedings of the 2017 ACM International Conference on Management of Data …, 2017
92017
Efficient RKA-secure KEM and IBE schemes against invertible functions
E Fujisaki, K Xagawa
International Conference on Cryptology and Information Security in Latin …, 2015
92015
(Tightly) QCCA-Secure Key-Encapsulation Mechanism in the Quantum Random Oracle Model
K Xagawa, T Yamakawa
International Conference on Post-Quantum Cryptography, 249-268, 2019
62019
Das System kann den Vorgang jetzt nicht ausführen. Versuchen Sie es später erneut.
Artikel 1–20