Name
Affiliation
Papers
TAKASHI YAMAKAWA
The University of Tokyo and National Institute of Advanced Industrial Science and Technology, Chiba and Ibaraki, Japan
27
Collaborators
Citations 
PageRank 
25
12
9.35
Referers 
Referees 
References 
33
294
277
Search Limit
100294
Title
Citations
PageRank
Year
Verifiable Quantum Advantage without Structure10.372022
Tighter Security Proofs For Gpv-Ibe In The Quantum Random Oracle Model00.342021
Secure Software Leasing from Standard Assumptions00.342021
Compact NIZKs from Standard Assumptions on Bilinear Maps.00.342020
Exploring Constructions of Compact NIZKs from Various Assumptions00.342019
Adaptively Single-Key Secure Constrained PRFs for mathrm NC^1.00.342019
(Tightly) QCCA-Secure Key-Encapsulation Mechanism in the Quantum Random Oracle Model.00.342019
Leakage-resilient Identity-based Encryption in Bounded Retrieval Model with Nearly Optimal Leakage-Ratio.00.342019
Designated Verifier/Prover and Preprocessing NIZKs from Diffie-Hellman Assumptions.00.342019
Finding Collisions in a Quantum World: Quantum Black-Box Separation of Collision-Resistance and One-Wayness.00.342018
Tightly-Secure Key-Encapsulation Mechanism in the Quantum Random Oracle Model.50.402018
Constrained PRFs for NC1 in Traditional Groups.00.342018
Adaptively Secure and Succinct Functional Encryption: Improving Security and Efficiency, Simultaneously.00.342018
Adaptively Single-Key Secure Constrained PRFs for NC1.00.342018
Towards Ideal Self-bilinear Map.00.342018
Tighter Security Proofs for GPV-IBE in the Quantum Random Oracle Model.10.362018
Constrained PRFs for \mathrmNC^1 in Traditional Groups.00.342018
Generic hardness of inversion on ring and its relation to self-bilinear map00.342018
Partially Wildcarded Ciphertext-Policy Attribute-Based Encryption and Its Performance Evaluation.00.342017
Efficient key encapsulation mechanisms with tight security reductions to standard assumptions in the two security models.00.342016
Generalized Hardness Assumption for Self-bilinear Map with Auxiliary Information.00.342016
Adversary-dependent Lossy Trapdoor Function from Hardness of Factoring Semi-smooth RSA Subgroup Moduli.10.362016
Self-bilinear Map on Unknown Order Groups from Indistinguishability Obfuscation and Its Applications.10.362015
A Short Fail-Stop Signature Scheme From Factoring20.382014
Chosen Ciphertext Security on Hard Membership Decision Groups: The Case of Semi-smooth Subgroups of Quadratic Residues.10.352014
Reducing Public Key Sizes In Bounded Cca-Secure Kems With Optimal Ciphertext Length00.342013
Efficient variants of the Naor-Yung and Dolev-Dwork-Naor transforms for CCA secure key encapsulation mechanism00.342013