Follow
Keita Xagawa
Keita Xagawa
NTT Social Informatics Laboratories
Verified email at hco.ntt.co.jp - Homepage
Title
Cited by
Cited by
Year
Efficient public key encryption based on ideal lattices
D Stehlé, R Steinfeld, K Tanaka, K Xagawa
Advances in Cryptology–ASIACRYPT 2009, 617-635, 2009
3302009
Concurrently secure identification schemes based on the worst-case hardness of lattice problems
A Kawachi, K Tanaka, K Xagawa
International Conference on the Theory and Application of Cryptology and …, 2008
2082008
Multi-bit cryptosystems based on lattice problems
A Kawachi, K Tanaka, K Xagawa
Public Key Cryptography–PKC 2007, 315-329, 2007
1282007
Strongly secure authenticated key exchange from factoring, codes, and lattices
A Fujioka, K Suzuki, K Xagawa, K Yoneyama
Designs, Codes and Cryptography 76 (3), 469-504, 2015
1272015
Tightly-secure key-encapsulation mechanism in the quantum random oracle model
T Saito, K Xagawa, T Yamakawa
Annual International Conference on the Theory and Applications of …, 2018
1262018
Re-encryption, functional re-encryption, and multi-hop re-encryption: A framework for achieving obfuscation-based security and instantiations from lattices
N Chandran, M Chase, FH Liu, R Nishimaki, K Xagawa
International Workshop on Public Key Cryptography, 95-112, 2014
512014
Practical and post-quantum authenticated key exchange from one-way secure key encapsulation mechanism
A Fujioka, K Suzuki, K Xagawa, K Yoneyama
Proceedings of the 8th ACM SIGSAC symposium on Information, computer and …, 2013
512013
Improved (hierarchical) inner-product encryption from lattices
K Xagawa
International Workshop on Public Key Cryptography, 235-252, 2013
342013
NTRU
C Chen, O Danba, J Hoffstein, A Hulsing, J Rijneveld, JM Schanck, ...
NIST Post-Quantum Cryptography Standardization: Round 3, 2020
282020
Key-Private Proxy Re-Encryption from Lattices, Revisited
R NISHIMAKI, K XAGAWA
IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and …, 2015
272015
Quantum Multicollision-Finding Algorithm
A Hosoyamada, Y Sasaki, K Xagawa
International Conference on the Theory and Application of Cryptology and …, 2017
232017
Curse of re-encryption: A generic power/em analysis on post-quantum kems
R Ueno, K Xagawa, Y Tanaka, A Ito, J Takahashi, N Homma
IACR Transactions on Cryptographic Hardware and Embedded Systems, 296-322, 2022
202022
Zero-knowledge protocols for NTRU: Application to identification and proof of plaintext knowledge
K Xagawa, K Tanaka
Provable Security-ProvSec2009, 198-213, 2009
202009
Public-Key Cryptosystems Resilient to Continuous Tampering and Leakage of Arbitrary Functions
E Fujisaki, K Xagawa
International Conference on the Theory and Application of Cryptology and …, 2016
192016
Verifiably encrypted signatures with short keys based on the decisional linear problem and obfuscation for encrypted VES
R Nishimaki, K Xagawa
Designs, Codes and Cryptography 77 (1), 61-98, 2015
192015
Security enhancements by OR-proof in identity-based identification
A Fujioka, T Saito, K Xagawa
International Conference on Applied Cryptography and Network Security, 135-152, 2012
182012
ModFalcon: compact signatures based on module NTRU lattices
C Chuengsatiansup, T Prest, D Stehlé, A Wallet, K Xagawa
18*
Proxy Re-Encryption based on Learning with Errors
K Xagawa, K Tanaka
数理解析研究所講究録 1691, 29-35, 2010
172010
Fault-injection attacks against NIST’s post-quantum cryptography round 3 KEM candidates
K Xagawa, A Ito, R Ueno, J Takahashi, N Homma
International Conference on the Theory and Application of Cryptology and …, 2021
132021
Cryptanalysis of Comparable Encryption in SIGMOD'16
C Horst, R Kikuchi, K Xagawa
Proceedings of the 2017 ACM International Conference on Management of Data …, 2017
132017
The system can't perform the operation now. Try again later.
Articles 1–20