Folgen
Keita Xagawa
Keita Xagawa
NTT Social Informatics Laboratories
Bestätigte E-Mail-Adresse bei hco.ntt.co.jp - Startseite
Titel
Zitiert von
Zitiert von
Jahr
Efficient public key encryption based on ideal lattices
D Stehlé, R Steinfeld, K Tanaka, K Xagawa
Advances in Cryptology–ASIACRYPT 2009, 617-635, 2009
3432009
Concurrently secure identification schemes based on the worst-case hardness of lattice problems
A Kawachi, K Tanaka, K Xagawa
International Conference on the Theory and Application of Cryptology and …, 2008
2112008
Tightly-secure key-encapsulation mechanism in the quantum random oracle model
T Saito, K Xagawa, T Yamakawa
Annual International Conference on the Theory and Applications of …, 2018
1312018
Strongly secure authenticated key exchange from factoring, codes, and lattices
A Fujioka, K Suzuki, K Xagawa, K Yoneyama
Designs, Codes and Cryptography 76 (3), 469-504, 2015
1302015
Multi-bit cryptosystems based on lattice problems
A Kawachi, K Tanaka, K Xagawa
Public Key Cryptography–PKC 2007, 315-329, 2007
1282007
Re-encryption, functional re-encryption, and multi-hop re-encryption: A framework for achieving obfuscation-based security and instantiations from lattices
N Chandran, M Chase, FH Liu, R Nishimaki, K Xagawa
International Workshop on Public Key Cryptography, 95-112, 2014
522014
Practical and post-quantum authenticated key exchange from one-way secure key encapsulation mechanism
A Fujioka, K Suzuki, K Xagawa, K Yoneyama
Proceedings of the 8th ACM SIGSAC symposium on Information, computer and …, 2013
522013
Improved (hierarchical) inner-product encryption from lattices
K Xagawa
International Workshop on Public Key Cryptography, 235-252, 2013
352013
NTRU
C Chen, O Danba, J Hoffstein, A Hulsing, J Rijneveld, JM Schanck, ...
NIST Post-Quantum Cryptography Standardization: Round 3, 2020
322020
Key-Private Proxy Re-Encryption from Lattices, Revisited
R NISHIMAKI, K XAGAWA
IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and …, 2015
272015
Curse of re-encryption: A generic power/em analysis on post-quantum kems
R Ueno, K Xagawa, Y Tanaka, A Ito, J Takahashi, N Homma
IACR Transactions on Cryptographic Hardware and Embedded Systems, 296-322, 2022
262022
Quantum Multicollision-Finding Algorithm
A Hosoyamada, Y Sasaki, K Xagawa
International Conference on the Theory and Application of Cryptology and …, 2017
232017
ModFalcon: Compact signatures based on module-NTRU lattices
C Chuengsatiansup, T Prest, D Stehlé, A Wallet, K Xagawa
Proceedings of the 15th ACM Asia Conference on Computer and Communications …, 2020
202020
Zero-knowledge protocols for NTRU: Application to identification and proof of plaintext knowledge
K Xagawa, K Tanaka
Provable Security-ProvSec2009, 198-213, 2009
202009
Public-Key Cryptosystems Resilient to Continuous Tampering and Leakage of Arbitrary Functions
E Fujisaki, K Xagawa
International Conference on the Theory and Application of Cryptology and …, 2016
192016
Verifiably encrypted signatures with short keys based on the decisional linear problem and obfuscation for encrypted VES
R Nishimaki, K Xagawa
Designs, Codes and Cryptography 77 (1), 61-98, 2015
192015
Security enhancements by OR-proof in identity-based identification
A Fujioka, T Saito, K Xagawa
International Conference on Applied Cryptography and Network Security, 135-152, 2012
182012
Fault-injection attacks against NIST’s post-quantum cryptography round 3 KEM candidates
K Xagawa, A Ito, R Ueno, J Takahashi, N Homma
International Conference on the Theory and Application of Cryptology and …, 2021
172021
Proxy Re-Encryption based on Learning with Errors
K Xagawa, K Tanaka
数理解析研究所講究録 1691, 29-35, 2010
172010
Cryptanalysis of Comparable Encryption in SIGMOD'16
C Horst, R Kikuchi, K Xagawa
Proceedings of the 2017 ACM International Conference on Management of Data …, 2017
132017
Das System kann den Vorgang jetzt nicht ausführen. Versuchen Sie es später erneut.
Artikel 1–20