Követés
Keita Xagawa
Keita Xagawa
Technology Innovation Institute (TII)
E-mail megerősítve itt: tii.ae - Kezdőlap
Cím
Hivatkozott rá
Hivatkozott rá
Év
Efficient public key encryption based on ideal lattices
D Stehlé, R Steinfeld, K Tanaka, K Xagawa
Advances in Cryptology–ASIACRYPT 2009, 617-635, 2009
4982009
Concurrently secure identification schemes based on the worst-case hardness of lattice problems
A Kawachi, K Tanaka, K Xagawa
Advances in Cryptology-ASIACRYPT 2008: 14th International Conference on the …, 2008
2572008
Tightly-secure key-encapsulation mechanism in the quantum random oracle model
T Saito, K Xagawa, T Yamakawa
Annual International Conference on the Theory and Applications of …, 2018
2052018
Multi-bit cryptosystems based on lattice problems
A Kawachi, K Tanaka, K Xagawa
Public Key Cryptography–PKC 2007, 315-329, 2007
1602007
Strongly secure authenticated key exchange from factoring, codes, and lattices
A Fujioka, K Suzuki, K Xagawa, K Yoneyama
Designs, Codes and Cryptography 76 (3), 469-504, 2015
1582015
Curse of re-encryption: A generic power/em analysis on post-quantum kems
R Ueno, K Xagawa, Y Tanaka, A Ito, J Takahashi, N Homma
IACR Transactions on Cryptographic Hardware and Embedded Systems, 296-322, 2022
1062022
NTRU
C Chen, O Danba, J Hoffstein, A Hulsing, J Rijneveld, JM Schanck, ...
NIST Post-Quantum Cryptography Standardization: Round 3, 2020
712020
Re-encryption, functional re-encryption, and multi-hop re-encryption: A framework for achieving obfuscation-based security and instantiations from lattices
N Chandran, M Chase, FH Liu, R Nishimaki, K Xagawa
Public-Key Cryptography–PKC 2014: 17th International Conference on Practice …, 2014
692014
Fault-injection attacks against NIST’s post-quantum cryptography round 3 KEM candidates
K Xagawa, A Ito, R Ueno, J Takahashi, N Homma
Advances in Cryptology–ASIACRYPT 2021: 27th International Conference on the …, 2021
622021
ModFalcon: Compact signatures based on module-NTRU lattices
C Chuengsatiansup, T Prest, D Stehlé, A Wallet, K Xagawa
Proceedings of the 15th ACM Asia Conference on Computer and Communications …, 2020
612020
Practical and post-quantum authenticated key exchange from one-way secure key encapsulation mechanism
A Fujioka, K Suzuki, K Xagawa, K Yoneyama
Proceedings of the 8th ACM SIGSAC symposium on Information, computer and …, 2013
592013
Cryptography with lattices
K Xagawa
Theses, Tokyo Institute of Technology, 2010
582010
Improved (hierarchical) inner-product encryption from lattices
K Xagawa
Public-Key Cryptography–PKC 2013: 16th International Conference on Practice …, 2013
382013
Quantum multicollision-finding algorithm
A Hosoyamada, Y Sasaki, K Xagawa
Advances in Cryptology–ASIACRYPT 2017: 23rd International Conference on the …, 2017
342017
Quantum random oracle model with auxiliary input
M Hhan, K Xagawa, T Yamakawa
Advances in Cryptology–ASIACRYPT 2019: 25th International Conference on the …, 2019
322019
Multiple-valued plaintext-checking side-channel attacks on post-quantum kems
Y Tanaka, R Ueno, K Xagawa, A Ito, J Takahashi, N Homma
IACR Transactions on Cryptographic Hardware and Embedded Systems 2023 (3 …, 2023
312023
Post-quantum anonymity of kyber
V Maram, K Xagawa
IACR International Conference on Public-Key Cryptography, 3-35, 2023
292023
Key-Private Proxy Re-Encryption from Lattices, Revisited
R NISHIMAKI, K XAGAWA
IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and …, 2015
292015
Anonymity of NIST PQC Round 3 KEMs
K Xagawa
Advances in Cryptology–EUROCRYPT 2022: 41st Annual International Conference …, 2022
262022
Public-key cryptosystems resilient to continuous tampering and leakage of arbitrary functions
E Fujisaki, K Xagawa
Advances in Cryptology–ASIACRYPT 2016: 22nd International Conference on the …, 2016
222016
A rendszer jelenleg nem tudja elvégezni a műveletet. Próbálkozzon újra később.
Cikkek 1–20