Ryo Nishimaki
Orcid: 0000-0002-5144-4619
According to our database1,
Ryo Nishimaki
authored at least 74 papers
between 2006 and 2025.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
On csauthors.net:
Bibliography
2025
IACR Cryptol. ePrint Arch., 2025
IACR Cryptol. ePrint Arch., 2025
MicroCrypt Assumptions with Quantum Input Sampling and Pseudodeterminism: Constructions and Separations.
IACR Cryptol. ePrint Arch., 2025
Proceedings of the Public-Key Cryptography - PKC 2025, 2025
Proceedings of the Advances in Cryptology - CRYPTO 2025, 2025
2024
IACR Cryptol. ePrint Arch., 2024
Pre-Constrained Cryptography: Broad Definitions, New Constructions, Unbounded Security.
IACR Cryptol. ePrint Arch., 2024
Proceedings of the Theory of Cryptography - 22nd International Conference, 2024
Proceedings of the Advances in Cryptology - EUROCRYPT 2024, 2024
Quantum Public-Key Encryption with Tamper-Resilient Public Keys from One-Way Functions.
Proceedings of the Advances in Cryptology - CRYPTO 2024, 2024
2023
Proceedings of the Theory of Cryptography - 21st International Conference, 2023
Proceedings of the Theory of Cryptography - 21st International Conference, 2023
Proceedings of the 55th Annual ACM Symposium on Theory of Computing, 2023
Proceedings of the Advances in Cryptology - EUROCRYPT 2023, 2023
2022
Bounded Functional Encryption for Turing Machines: Adaptive Security from General Assumptions.
Proceedings of the Theory of Cryptography - 20th International Conference, 2022
Proceedings of the Public-Key Cryptography - PKC 2022, 2022
Proceedings of the Public-Key Cryptography - PKC 2022, 2022
Proceedings of the Advances in Cryptology - EUROCRYPT 2022 - 41st Annual International Conference on the Theory and Applications of Cryptographic Techniques, Trondheim, Norway, May 30, 2022
Proceedings of the Advances in Cryptology - CRYPTO 2022, 2022
Proceedings of the Advances in Cryptology - ASIACRYPT 2022, 2022
2021
J. Cryptol., 2021
IACR Cryptol. ePrint Arch., 2021
IACR Cryptol. ePrint Arch., 2021
Proceedings of the Theory of Cryptography - 19th International Conference, 2021
Proceedings of the Public-Key Cryptography - PKC 2021, 2021
Round-Optimal Blind Signatures in the Plain Model from Classical and Quantum Standard Assumptions.
Proceedings of the Advances in Cryptology - EUROCRYPT 2021, 2021
Quantum Encryption with Certified Deletion, Revisited: Public Key, Attribute-Based, and Classical Communication.
Proceedings of the Advances in Cryptology - ASIACRYPT 2021, 2021
2020
Equipping Public-Key Cryptographic Primitives with Watermarking (or: A Hole Is to Watermark).
Proceedings of the Theory of Cryptography - 18th International Conference, 2020
Proceedings of the Public-Key Cryptography - PKC 2020, 2020
Proceedings of the Advances in Cryptology - EUROCRYPT 2020, 2020
Proceedings of the Advances in Cryptology - CRYPTO 2020, 2020
Proceedings of the Advances in Cryptology - ASIACRYPT 2020, 2020
2019
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2019
Leakage-Resilient Identity-Based Encryption in Bounded Retrieval Model with Nearly Optimal Leakage-Ratio.
Proceedings of the Public-Key Cryptography - PKC 2019, 2019
Proceedings of the Public-Key Cryptography - PKC 2019, 2019
Proceedings of the Advances in Cryptology - EUROCRYPT 2019, 2019
Adaptively Secure and Succinct Functional Encryption: Improving Security and Efficiency, Simultaneously.
Proceedings of the Advances in Cryptology - CRYPTO 2019, 2019
Proceedings of the Advances in Cryptology - CRYPTO 2019, 2019
2018
IACR Cryptol. ePrint Arch., 2018
IACR Cryptol. ePrint Arch., 2018
IACR Cryptol. ePrint Arch., 2018
Proceedings of the Public-Key Cryptography - PKC 2018, 2018
Proceedings of the Advances in Cryptology - EUROCRYPT 2018 - 37th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Tel Aviv, Israel, April 29, 2018
Proceedings of the Advances in Cryptology - CRYPTO 2018, 2018
2017
From Single-Key to Collusion-Resistant Secret-Key Functional Encryption by Leveraging Succinctness.
IACR Cryptol. ePrint Arch., 2017
Indistinguishability Obfuscation for All Circuits from Secret-Key Functional Encryption.
IACR Cryptol. ePrint Arch., 2017
Indistinguishability Obfuscation: Simpler Constructions using Secret-Key Functional Encryption.
IACR Cryptol. ePrint Arch., 2017
Proceedings of the Advances in Cryptology - CRYPTO 2017, 2017
2016
Proceedings of the Theory of Cryptography - 14th International Conference, 2016
Proceedings of the 48th Annual ACM SIGACT Symposium on Theory of Computing, 2016
Proceedings of the Paradigms in Cryptology - Mycrypt 2016. Malicious and Exploratory Cryptology, 2016
Proceedings of the Advances in Cryptology - EUROCRYPT 2016, 2016
2015
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2015
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2015
IACR Cryptol. ePrint Arch., 2015
Proceedings of the Information Theoretic Security - 8th International Conference, 2015
2014
Re-encryption, Functional Re-encryption, and Multi-hop Re-encryption: A Framework for Achieving Obfuscation-Based Security and Instantiations from Lattices.
Proceedings of the Public-Key Cryptography - PKC 2014, 2014
2013
Verifiably Encrypted Signatures with Short Keys Based on the Decisional Linear Problem and Obfuscation for Encrypted VES.
Proceedings of the Public-Key Cryptography - PKC 2013 - 16th International Conference on Practice and Theory in Public-Key Cryptography, Nara, Japan, February 26, 2013
Proceedings of the Public-Key Cryptography - PKC 2013 - 16th International Conference on Practice and Theory in Public-Key Cryptography, Nara, Japan, February 26, 2013
Proceedings of the Advances in Cryptology, 2013
Universally composable adaptive oblivious transfer (with access control) from standard assumptions.
Proceedings of the DIM'13, 2013
2012
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2012
Constant-Size Structure-Preserving Signatures: Generic Constructions and Simple Assumptions.
Proceedings of the Advances in Cryptology - ASIACRYPT 2012, 2012
2010
Proceedings of the Public Key Cryptography, 2010
Proceedings of the Information Security and Privacy - 15th Australasian Conference, 2010
2009
Proceedings of the Provable Security, Third International Conference, 2009
Proceedings of the Provable Security, Third International Conference, 2009
Proceedings of the Information Security and Privacy, 14th Australasian Conference, 2009
2006
Proceedings of the Progressin Cryptology, 2006