Keita Xagawa

Orcid: 0000-0002-6832-9940

According to our database1, Keita Xagawa authored at least 56 papers between 2007 and 2025.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2025
The Security of ML-DSA against Fault-Injection Attacks.
IACR Cryptol. ePrint Arch., 2025

Post-Quantum Cryptographic Analysis of SSH.
Proceedings of the IEEE Symposium on Security and Privacy, 2025

The Security of Hash-and-Sign with Retry Against Superposition Attacks.
Proceedings of the Public-Key Cryptography - PKC 2025, 2025

2024
Quantum Group Actions.
IACR Cryptol. ePrint Arch., 2024

Strong Existential Unforgeability and More of MPC-in-the-Head Signatures.
IACR Cryptol. ePrint Arch., 2024

On the Efficiency of Generic, Quantum Cryptographic Constructions.
IACR Commun. Cryptol., 2024

Probabilistic Hash-and-Sign with Retry in the Quantum Random Oracle Model.
Proceedings of the Public-Key Cryptography - PKC 2024, 2024

Chameleon Hashing Security Enhancement to Hierarchical Identity-Based Identification.
Proceedings of the International Symposium on Information Theory and Its Applications, 2024

Signatures with Memory-Tight Security in the Quantum Random Oracle Model.
Proceedings of the Advances in Cryptology - EUROCRYPT 2024, 2024

2023
Post-quantum Anonymity of Kyber.
Proceedings of the Public-Key Cryptography - PKC 2023, 2023

Making the Identity-Based Diffie-Hellman Key Exchange Efficiently Revocable.
Proceedings of the Progress in Cryptology - LATINCRYPT 2023, 2023

2022
Multiple-Valued Plaintext-Checking Side-Channel Attacks on Post-Quantum KEMs.
IACR Cryptol. ePrint Arch., 2022

Anonymity of NIST PQC Round 3 KEMs.
Proceedings of the Advances in Cryptology - EUROCRYPT 2022 - 41st Annual International Conference on the Theory and Applications of Cryptographic Techniques, Trondheim, Norway, May 30, 2022

2021
Curse of Re-encryption: A Generic Power/EM Analysis on Post-Quantum KEMs.
IACR Cryptol. ePrint Arch., 2021

Cryptanalysis of Boyen's Attribute-Based Encryption Scheme in TCC 2013.
IACR Cryptol. ePrint Arch., 2021

The Boneh-Katz Transformation, Revisited: Pseudorandom/Obliviously-Samplable PKE from Lattices and Codes and Its Application.
Proceedings of the Selected Areas in Cryptography - 28th International Conference, 2021

Fault-Injection Attacks Against NIST's Post-Quantum Cryptography Round 3 KEM Candidates.
Proceedings of the Advances in Cryptology - ASIACRYPT 2021, 2021

2020
Quantum algorithm for the multicollision problem.
Theor. Comput. Sci., 2020

Cryptanalysis of a rank-based signature with short public keys.
Des. Codes Cryptogr., 2020

Post-quantum Provably-Secure Authentication and MAC from Mersenne Primes.
Proceedings of the Topics in Cryptology - CT-RSA 2020, 2020

ModFalcon: Compact Signatures Based On Module-NTRU Lattices.
Proceedings of the ASIA CCS '20: The 15th ACM Asia Conference on Computer and Communications Security, 2020

Non-committing Encryption with Constant Ciphertext Expansion from Standard Assumptions.
Proceedings of the Advances in Cryptology - ASIACRYPT 2020, 2020

2019
Cryptanalysis of a New Code-based Signature Scheme with Shorter Public Key in PKC 2019.
IACR Cryptol. ePrint Arch., 2019

(Tightly) QCCA-Secure Key-Encapsulation Mechanism in the Quantum Random Oracle Model.
Proceedings of the Post-Quantum Cryptography - 10th International Conference, 2019

Improved Quantum Multicollision-Finding Algorithm.
Proceedings of the Post-Quantum Cryptography - 10th International Conference, 2019

Quantum Random Oracle Model with Auxiliary Input.
Proceedings of the Advances in Cryptology - ASIACRYPT 2019, 2019

2018
Practical Attack on RaCoSS-R.
IACR Cryptol. ePrint Arch., 2018

Practical Cryptanalysis of a Public-Key Encryption Scheme Based on Non-linear Indeterminate Equations at SAC 2017.
Proceedings of the Post-Quantum Cryptography - 9th International Conference, 2018

Tightly-Secure Key-Encapsulation Mechanism in the Quantum Random Oracle Model.
Proceedings of the Advances in Cryptology - EUROCRYPT 2018 - 37th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Tel Aviv, Israel, April 29, 2018

Cryptanalysis of Compact-LWE.
Proceedings of the Topics in Cryptology - CT-RSA 2018, 2018

2017
Cryptanalysis of Comparable Encryption in SIGMOD'16.
Proceedings of the 2017 ACM International Conference on Management of Data, 2017

Quantum Multicollision-Finding Algorithm.
Proceedings of the Advances in Cryptology - ASIACRYPT 2017, 2017

2016
Groth-Sahai Proofs Revisited Again: A Bug in "Optimized" Randomization.
IACR Cryptol. ePrint Arch., 2016

Public-Key Cryptosystems Resilient to Continuous Tampering and Leakage of Arbitrary Functions.
Proceedings of the Advances in Cryptology - ASIACRYPT 2016, 2016

2015
Key-Private Proxy Re-Encryption from Lattices, Revisited.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2015

Note on the RKA security of Continuously Non-Malleable Key-Derivation Function from PKC 2015.
IACR Cryptol. ePrint Arch., 2015

Efficient RKA-Secure KEM and IBE Schemes Against Invertible Functions.
Proceedings of the Progress in Cryptology - LATINCRYPT 2015, 2015

Accumulable Optimistic Fair Exchange from Verifiably Encrypted Homomorphic Signatures.
Proceedings of the Applied Cryptography and Network Security, 2015

2014
Non-malleable Multiple Public-Key Encryption.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2014

Re-encryption, Functional Re-encryption, and Multi-hop Re-encryption: A Framework for Achieving Obfuscation-Based Security and Instantiations from Lattices.
Proceedings of the Public-Key Cryptography - PKC 2014, 2014

Practical Cryptanalysis of a Public-Key Encryption Scheme Based on New Multivariate Quadratic Assumptions.
Proceedings of the Public-Key Cryptography - PKC 2014, 2014

2013
Message Authentication Codes Secure against Additively Related-Key Attacks.
IACR Cryptol. ePrint Arch., 2013

Cryptanalysis of the Huang-Liu-Yang Cryptosystem from PKC 2012.
IACR Cryptol. ePrint Arch., 2013

Improved (Hierarchical) Inner-Product Encryption from Lattices.
Proceedings of the Public-Key Cryptography - PKC 2013 - 16th International Conference on Practice and Theory in Public-Key Cryptography, Nara, Japan, February 26, 2013

Verifiably Encrypted Signatures with Short Keys Based on the Decisional Linear Problem and Obfuscation for Encrypted VES.
Proceedings of the Public-Key Cryptography - PKC 2013 - 16th International Conference on Practice and Theory in Public-Key Cryptography, Nara, Japan, February 26, 2013

Practical and post-quantum authenticated key exchange from one-way secure key encapsulation mechanism.
Proceedings of the 8th ACM Symposium on Information, Computer and Communications Security, 2013

2012
Strongly Secure Authenticated Key Exchange from Factoring, Codes, and Lattices.
Proceedings of the Public Key Cryptography - PKC 2012, 2012

Secure Hierarchical Identity-Based Identification without Random Oracles.
Proceedings of the Information Security - 15th International Conference, 2012

Security Enhancement of Identity-Based Identification with Reversibility.
Proceedings of the Information and Communications Security - 14th International Conference, 2012

Applicability of OR-Proof Techniques to Hierarchical Identity-Based Identification.
Proceedings of the Cryptology and Network Security, 11th International Conference, 2012

Security Enhancements by OR-Proof in Identity-Based Identification.
Proceedings of the Applied Cryptography and Network Security, 2012

2010
Security of Encryption Schemes in Weakened Random Oracle Models.
Proceedings of the Public Key Cryptography, 2010

2009
Zero-Knowledge Protocols for NTRU: Application to Identification and Proof of Plaintext Knowledge.
Proceedings of the Provable Security, Third International Conference, 2009

Efficient Public Key Encryption Based on Ideal Lattices.
Proceedings of the Advances in Cryptology, 2009

2008
Concurrently Secure Identification Schemes Based on the Worst-Case Hardness of Lattice Problems.
Proceedings of the Advances in Cryptology, 2008

2007
Multi-bit Cryptosystems Based on Lattice Problems.
Proceedings of the Public Key Cryptography, 2007


  Loading...