Keita Xagawa

From MaRDI portal
Person:494583

Available identifiers

zbMath Open xagawa.keitaMaRDI QIDQ494583

List of research outcomes





PublicationDate of PublicationType
Signatures with memory-tight security in the quantum random oracle model2024-11-13Paper
Probabilistic hash-and-sign with retry in the quantum random oracle model2024-11-12Paper
Making the identity-based Diffie-Hellman key exchange efficiently revocable2024-10-16Paper
The Boneh-Katz transformation, revisited: pseudorandom/obliviously-samplable PKE from lattices and codes and its application2024-10-14Paper
Post-quantum anonymity of Kyber2023-11-24Paper
Fault-injection attacks against NIST's post-quantum cryptography round 3 KEM candidates2023-05-12Paper
Non-committing encryption with constant ciphertext expansion from standard assumptions2023-03-21Paper
Cryptanalysis of Boyen's attribute-based encryption scheme in TCC 20132022-09-22Paper
Anonymity of NIST PQC round 3 KEMs2022-08-30Paper
Quantum algorithm for the multicollision problem2020-10-12Paper
Post-quantum provably-secure authentication and MAC from Mersenne primes2020-08-05Paper
Quantum random oracle model with auxiliary input2020-05-20Paper
Cryptanalysis of a rank-based signature with short public keys2020-03-27Paper
(Tightly) QCCA-secure key-encapsulation mechanism in the quantum random oracle model2020-02-25Paper
Improved quantum multicollision-finding algorithm2020-02-25Paper
Cryptanalysis of compact-LWE2020-01-21Paper
Tightly-secure key-encapsulation mechanism in the quantum random oracle model2018-07-17Paper
Practical cryptanalysis of a public-key encryption scheme based on non-linear indeterminate equations at SAC 20172018-06-22Paper
Quantum multicollision-finding algorithm2018-03-08Paper
Public-Key Cryptosystems Resilient to Continuous Tampering and Leakage of Arbitrary Functions2017-02-01Paper
Accumulable Optimistic Fair Exchange from Verifiably Encrypted Homomorphic Signatures2016-03-10Paper
Verifiably encrypted signatures with short keys based on the decisional linear problem and obfuscation for encrypted VES2015-09-30Paper
Efficient RKA-Secure KEM and IBE Schemes Against Invertible Functions2015-09-17Paper
Strongly secure authenticated key exchange from factoring, codes, and lattices2015-09-01Paper
Practical Cryptanalysis of a Public-Key Encryption Scheme Based on New Multivariate Quadratic Assumptions2014-03-25Paper
Re-encryption, Functional Re-encryption, and Multi-hop Re-encryption: A Framework for Achieving Obfuscation-Based Security and Instantiations from Lattices2014-03-25Paper
Verifiably Encrypted Signatures with Short Keys Based on the Decisional Linear Problem and Obfuscation for Encrypted VES2013-04-19Paper
Improved (Hierarchical) Inner-Product Encryption from Lattices2013-04-19Paper
Strongly Secure Authenticated Key Exchange from Factoring, Codes, and Lattices2012-07-20Paper
Security of Encryption Schemes in Weakened Random Oracle Models2010-05-28Paper
Efficient Public Key Encryption Based on Ideal Lattices2009-12-15Paper
Zero-Knowledge Protocols for NTRU: Application to Identification and Proof of Plaintext Knowledge2009-12-11Paper
Concurrently Secure Identification Schemes Based on the Worst-Case Hardness of Lattice Problems2009-02-10Paper
Multi-bit Cryptosystems Based on Lattice Problems2007-09-04Paper

Research outcomes over time

This page was built for person: Keita Xagawa