Keita Xagawa
Orcid: 0000-0002-6832-9940
According to our database1,
Keita Xagawa
authored at least 56 papers
between 2007 and 2025.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
-
on xagawa.net
On csauthors.net:
Bibliography
2025
IACR Cryptol. ePrint Arch., 2025
Proceedings of the IEEE Symposium on Security and Privacy, 2025
Proceedings of the Public-Key Cryptography - PKC 2025, 2025
2024
IACR Cryptol. ePrint Arch., 2024
IACR Commun. Cryptol., 2024
Proceedings of the Public-Key Cryptography - PKC 2024, 2024
Chameleon Hashing Security Enhancement to Hierarchical Identity-Based Identification.
Proceedings of the International Symposium on Information Theory and Its Applications, 2024
Proceedings of the Advances in Cryptology - EUROCRYPT 2024, 2024
2023
Proceedings of the Public-Key Cryptography - PKC 2023, 2023
Proceedings of the Progress in Cryptology - LATINCRYPT 2023, 2023
2022
IACR Cryptol. ePrint Arch., 2022
Proceedings of the Advances in Cryptology - EUROCRYPT 2022 - 41st Annual International Conference on the Theory and Applications of Cryptographic Techniques, Trondheim, Norway, May 30, 2022
2021
IACR Cryptol. ePrint Arch., 2021
IACR Cryptol. ePrint Arch., 2021
The Boneh-Katz Transformation, Revisited: Pseudorandom/Obliviously-Samplable PKE from Lattices and Codes and Its Application.
Proceedings of the Selected Areas in Cryptography - 28th International Conference, 2021
Fault-Injection Attacks Against NIST's Post-Quantum Cryptography Round 3 KEM Candidates.
Proceedings of the Advances in Cryptology - ASIACRYPT 2021, 2021
2020
Des. Codes Cryptogr., 2020
Proceedings of the Topics in Cryptology - CT-RSA 2020, 2020
Proceedings of the ASIA CCS '20: The 15th ACM Asia Conference on Computer and Communications Security, 2020
Non-committing Encryption with Constant Ciphertext Expansion from Standard Assumptions.
Proceedings of the Advances in Cryptology - ASIACRYPT 2020, 2020
2019
Cryptanalysis of a New Code-based Signature Scheme with Shorter Public Key in PKC 2019.
IACR Cryptol. ePrint Arch., 2019
(Tightly) QCCA-Secure Key-Encapsulation Mechanism in the Quantum Random Oracle Model.
Proceedings of the Post-Quantum Cryptography - 10th International Conference, 2019
Proceedings of the Post-Quantum Cryptography - 10th International Conference, 2019
Proceedings of the Advances in Cryptology - ASIACRYPT 2019, 2019
2018
Practical Cryptanalysis of a Public-Key Encryption Scheme Based on Non-linear Indeterminate Equations at SAC 2017.
Proceedings of the Post-Quantum Cryptography - 9th International Conference, 2018
Proceedings of the Advances in Cryptology - EUROCRYPT 2018 - 37th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Tel Aviv, Israel, April 29, 2018
Proceedings of the Topics in Cryptology - CT-RSA 2018, 2018
2017
Proceedings of the 2017 ACM International Conference on Management of Data, 2017
Proceedings of the Advances in Cryptology - ASIACRYPT 2017, 2017
2016
IACR Cryptol. ePrint Arch., 2016
Public-Key Cryptosystems Resilient to Continuous Tampering and Leakage of Arbitrary Functions.
Proceedings of the Advances in Cryptology - ASIACRYPT 2016, 2016
2015
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2015
Note on the RKA security of Continuously Non-Malleable Key-Derivation Function from PKC 2015.
IACR Cryptol. ePrint Arch., 2015
Proceedings of the Progress in Cryptology - LATINCRYPT 2015, 2015
Accumulable Optimistic Fair Exchange from Verifiably Encrypted Homomorphic Signatures.
Proceedings of the Applied Cryptography and Network Security, 2015
2014
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2014
Re-encryption, Functional Re-encryption, and Multi-hop Re-encryption: A Framework for Achieving Obfuscation-Based Security and Instantiations from Lattices.
Proceedings of the Public-Key Cryptography - PKC 2014, 2014
Practical Cryptanalysis of a Public-Key Encryption Scheme Based on New Multivariate Quadratic Assumptions.
Proceedings of the Public-Key Cryptography - PKC 2014, 2014
2013
IACR Cryptol. ePrint Arch., 2013
IACR Cryptol. ePrint Arch., 2013
Proceedings of the Public-Key Cryptography - PKC 2013 - 16th International Conference on Practice and Theory in Public-Key Cryptography, Nara, Japan, February 26, 2013
Verifiably Encrypted Signatures with Short Keys Based on the Decisional Linear Problem and Obfuscation for Encrypted VES.
Proceedings of the Public-Key Cryptography - PKC 2013 - 16th International Conference on Practice and Theory in Public-Key Cryptography, Nara, Japan, February 26, 2013
Practical and post-quantum authenticated key exchange from one-way secure key encapsulation mechanism.
Proceedings of the 8th ACM Symposium on Information, Computer and Communications Security, 2013
2012
Proceedings of the Public Key Cryptography - PKC 2012, 2012
Proceedings of the Information Security - 15th International Conference, 2012
Proceedings of the Information and Communications Security - 14th International Conference, 2012
Proceedings of the Cryptology and Network Security, 11th International Conference, 2012
Proceedings of the Applied Cryptography and Network Security, 2012
2010
Proceedings of the Public Key Cryptography, 2010
2009
Zero-Knowledge Protocols for NTRU: Application to Identification and Proof of Plaintext Knowledge.
Proceedings of the Provable Security, Third International Conference, 2009
Proceedings of the Advances in Cryptology, 2009
2008
Concurrently Secure Identification Schemes Based on the Worst-Case Hardness of Lattice Problems.
Proceedings of the Advances in Cryptology, 2008
2007
Proceedings of the Public Key Cryptography, 2007