Name
Affiliation
Papers
SHOTA YAMADA
The University of Tokyo, Japan
48
Collaborators
Citations 
PageRank 
58
94
18.10
Referers 
Referees 
References 
203
428
548
Search Limit
100428
Title
Citations
PageRank
Year
Non-Interactive Secure Multiparty Computation For Symmetric Functions, Revisited: More Efficient Constructions And Extensions00.342021
Functional Encryption For Turing Machines With Dynamic Bounded Collusion From Lwe00.342021
Tighter Security Proofs For Gpv-Ibe In The Quantum Random Oracle Model00.342021
Compact NIZKs from Standard Assumptions on Bilinear Maps.00.342020
An Extended Ctrt For Aes-25600.342019
Exploring Constructions of Compact NIZKs from Various Assumptions00.342019
Adaptively Single-Key Secure Constrained PRFs for mathrm NC^1.00.342019
Attribute Based Encryption (and more) for Nondeterministic Finite Automata from LWE.00.342019
Group Signatures without NIZK: From Lattices in the Standard Model.10.342019
Designated Verifier/Prover and Preprocessing NIZKs from Diffie-Hellman Assumptions.00.342019
Non-Zero Inner Product Encryption Schemes from Various Assumptions: LWE, DDH and DCR.00.342019
Attribute Based Encryption for Deterministic Finite Automata from mathsfDLIN.00.342019
Attribute Based Encryption for Deterministic Finite Automata from DLIN.00.342019
Chosen ciphertext secure keyed-homomorphic public-key cryptosystems.00.342018
Attribute-Based Encryption for Range Attributes.60.432018
Constrained PRFs for Bit-fixing from OWFs with Constant Collusion Resistance.00.342018
Precise External Torque Estimation For Two-Inertia System Considering Modeling Errors00.342018
Constrained PRFs for NC1 in Traditional Groups.00.342018
Embedding Lemmas For Functional Encryption00.342018
Adaptively Single-Key Secure Constrained PRFs for NC1.00.342018
Piecewise affine (PWA) modeling and switched damping control of two-inertia systems with backlash00.342018
Note on Constructing Constrained PRFs from OWFs with Constant Collusion Resistance.00.342018
Backlash Identification in Two-Mass Systems by Delayed Relay Feedback.10.402018
Tree-based Secure Comparison of Secret Shared Data00.342018
Tighter Security Proofs for GPV-IBE in the Quantum Random Oracle Model.10.362018
Constrained PRFs for \mathrmNC^1 in Traditional Groups.00.342018
Generic hardness of inversion on ring and its relation to self-bilinear map00.342018
Secure Division Protocol and Applications to Privacy-preserving Chi-squared Tests00.342018
Proposal of State-Dependent Minimum Variance Estimation of Load-Side External Torque Considering Modeling and Measurement Errors.10.372018
Asymptotically Compact Adaptively Secure Lattice IBEs and Verifiable Random Functions via Generalized Partitioning Techniques.50.432017
Partially Wildcarded Ciphertext-Policy Attribute-Based Encryption and Its Performance Evaluation.00.342017
Private Similarity Searchable Encryption For Euclidean Distance00.342017
Efficient Public Trace and Revoke from Standard Assumptions: Extended Abstract.20.372017
Attribute Based Encryption with Direct Efficiency Tradeoff.40.392016
Adaptively Secure Identity-Based Encryption from Lattices with Asymptotically Shorter Public Parameters.70.482016
Joint Torque Control For Backlash Compensation In Two-Inertia System00.342016
Partitioning via Non-Linear Polynomial Functions: More Compact IBEs from Ideal Lattices and Bilinear Maps.00.342016
Self-bilinear Map on Unknown Order Groups from Indistinguishability Obfuscation and Its Applications.10.362015
Joint torque control for two-inertia system with encoders on drive and load sides20.482015
New Security Proof For The Boneh-Boyen Ibe: Tight Reduction In Unbounded Multi-Challenge Security00.342014
Efficient variants of the Naor-Yung and Dolev-Dwork-Naor transforms for CCA secure key encapsulation mechanism00.342013
Two-Dimensional representation of cover free families and its applications: short signatures and more90.522012
Space efficient signature schemes from the RSA assumption40.402012
Verifiable predicate encryption and applications to CCA security and anonymous predicate authentication80.482012
Generic constructions for chosen-ciphertext secure attribute based encryption361.042011
Performance Evaluation Of Tcp/Ip Over Sctp/Ip Parallel Networking With Parallel Route Transmission00.342011
Public Key Encryption Schemes From The (B)Cdh Assumption With Better Efficiency60.422010
Toward an easy-to-understand structure for achieving chosen ciphertext security from the decisional Diffie-Hellman assumption00.342010