Keita Xagawa

From MaRDI portal
(Redirected from Person:494583)



List of research outcomes

This list is not complete and representing at the moment only items from zbMATH Open and arXiv. We are working on additional sources - please check back here soon!

PublicationDate of PublicationType
The security of ML-DSA against fault-injection attacks2026-03-31Paper
The security of hash-and-sign with retry against superposition attacks2025-07-29Paper
Signatures with memory-tight security in the quantum random oracle model2024-11-13Paper
Probabilistic hash-and-sign with retry in the quantum random oracle model2024-11-12Paper
Making the identity-based Diffie-Hellman key exchange efficiently revocable2024-10-16Paper
The Boneh-Katz transformation, revisited: pseudorandom/obliviously-samplable PKE from lattices and codes and its application2024-10-14Paper
Post-quantum anonymity of Kyber
Lecture Notes in Computer Science
2023-11-24Paper
Fault-injection attacks against NIST's post-quantum cryptography round 3 KEM candidates
Lecture Notes in Computer Science
2023-05-12Paper
Non-committing encryption with constant ciphertext expansion from standard assumptions2023-03-21Paper
Cryptanalysis of Boyen's attribute-based encryption scheme in TCC 2013
Designs, Codes and Cryptography
2022-09-22Paper
Anonymity of NIST PQC round 3 KEMs2022-08-30Paper
Quantum algorithm for the multicollision problem
Theoretical Computer Science
2020-10-12Paper
Post-quantum provably-secure authentication and MAC from Mersenne primes2020-08-05Paper
Quantum random oracle model with auxiliary input2020-05-20Paper
Cryptanalysis of a rank-based signature with short public keys
Designs, Codes and Cryptography
2020-03-27Paper
(Tightly) QCCA-secure key-encapsulation mechanism in the quantum random oracle model2020-02-25Paper
Improved quantum multicollision-finding algorithm
(available as arXiv preprint)
2020-02-25Paper
Cryptanalysis of compact-LWE2020-01-21Paper
Tightly-secure key-encapsulation mechanism in the quantum random oracle model2018-07-17Paper
Practical cryptanalysis of a public-key encryption scheme based on non-linear indeterminate equations at SAC 20172018-06-22Paper
Quantum multicollision-finding algorithm2018-03-08Paper
Public-Key Cryptosystems Resilient to Continuous Tampering and Leakage of Arbitrary Functions
Advances in Cryptology – ASIACRYPT 2016
2017-02-01Paper
Accumulable Optimistic Fair Exchange from Verifiably Encrypted Homomorphic Signatures
Applied Cryptography and Network Security
2016-03-10Paper
Verifiably encrypted signatures with short keys based on the decisional linear problem and obfuscation for encrypted VES
Designs, Codes and Cryptography
2015-09-30Paper
Efficient RKA-Secure KEM and IBE Schemes Against Invertible Functions
Progress in Cryptology -- LATINCRYPT 2015
2015-09-17Paper
Strongly secure authenticated key exchange from factoring, codes, and lattices
Designs, Codes and Cryptography
2015-09-01Paper
Practical cryptanalysis of a public-key encryption scheme based on new multivariate quadratic assumptions
Public-Key Cryptography – PKC 2014
2014-03-25Paper
Re-encryption, functional re-encryption, and multi-hop re-encryption: a framework for achieving obfuscation-based security and instantiations from lattices
Public-Key Cryptography – PKC 2014
2014-03-25Paper
Verifiably encrypted signatures with short keys based on the decisional linear problem and obfuscation for encrypted VES
Public-Key Cryptography – PKC 2013
2013-04-19Paper
Improved (hierarchical) inner-product encryption from lattices
Public-Key Cryptography – PKC 2013
2013-04-19Paper
Strongly Secure Authenticated Key Exchange from Factoring, Codes, and Lattices
Public Key Cryptography – PKC 2012
2012-07-20Paper
Security of Encryption Schemes in Weakened Random Oracle Models
Public Key Cryptography – PKC 2010
2010-05-28Paper
Efficient public key encryption based on ideal lattices (extended abstract)
Advances in Cryptology – ASIACRYPT 2009
2009-12-15Paper
Zero-knowledge protocols for NTRU: application to identification and proof of plaintext knowledge
Provable Security
2009-12-11Paper
Concurrently Secure Identification Schemes Based on the Worst-Case Hardness of Lattice Problems
Advances in Cryptology - ASIACRYPT 2008
2009-02-10Paper
Multi-bit Cryptosystems Based on Lattice Problems
Public Key Cryptography – PKC 2007
2007-09-04Paper


Research outcomes over time


This page was built for person: Keita Xagawa