Amanote Research
Register
Sign In
Discover open access scientific publications
Search, annotate, share and cite publications
Publications by Keita Xagawa
Concurrently Secure Identification Schemes Based on the Worst-Case Hardness of Lattice Problems
Lecture Notes in Computer Science
Computer Science
Theoretical Computer Science
Multi-Bit Cryptosystems Based on Lattice Problems
Related publications
Lattice-Based Identification Schemes Secure Under Active Attacks
Worst -Case L1 Identification Based on Correlation Analysis
Transactions of the Institute of Systems, Control and Information Engineers
Identification Protocols and Signature Schemes Based on Supersingular Isogeny Problems
Journal of Cryptology
Applied Mathematics
Computer Science Applications
Software
On Domain-Partitioning Induction Criteria: Worst-Case Bounds for the Worst-Case Based
Theoretical Computer Science
Computer Science
Theoretical Computer Science
Provably Secure Identity-Based Identification and Signature Schemes From Code Assumptions
PLoS ONE
Multidisciplinary
Tightly Secure Signatures From Lossy Identification Schemes
Journal of Cryptology
Applied Mathematics
Computer Science Applications
Software
A Secure Proxy Signature Scheme Based on the Hardness of the Decisional Diffie-Hellman Problem
Studies in Informatics and Control
Electronic Engineering
Electrical
Computer Science
Public-Key Identification Schemes Based on Multivariate Quadratic Polynomials
Lecture Notes in Computer Science
Computer Science
Theoretical Computer Science