Takashi Yamakawa
Orcid: 0000-0003-1712-3026
According to our database1,
Takashi Yamakawa
authored at least 91 papers
between 1998 and 2025.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2025
IACR Cryptol. ePrint Arch., 2025
From Worst-Case Hardness of NP to Quantum Cryptography via Quantum Indistinguishability Obfuscation.
IACR Cryptol. ePrint Arch., 2025
IACR Cryptol. ePrint Arch., 2025
IACR Cryptol. ePrint Arch., 2025
IACR Cryptol. ePrint Arch., 2025
MicroCrypt Assumptions with Quantum Input Sampling and Pseudodeterminism: Constructions and Separations.
IACR Cryptol. ePrint Arch., 2025
IACR Cryptol. ePrint Arch., 2025
IACR Commun. Cryptol., 2025
Proceedings of the 57th Annual ACM Symposium on Theory of Computing, 2025
Proceedings of the Public-Key Cryptography - PKC 2025, 2025
Proceedings of the Advances in Cryptology - EUROCRYPT 2025, 2025
A New World in the Depths of Microcrypt: Separating OWSGs and Quantum Money from QEFID.
Proceedings of the Advances in Cryptology - EUROCRYPT 2025, 2025
Proceedings of the Advances in Cryptology - CRYPTO 2025, 2025
Proceedings of the Advances in Cryptology - CRYPTO 2025, 2025
2024
IACR Cryptol. ePrint Arch., 2024
IACR Cryptol. ePrint Arch., 2024
Proceedings of the 19th Conference on the Theory of Quantum Computation, 2024
Proceedings of the 19th Conference on the Theory of Quantum Computation, 2024
Proceedings of the Theory of Cryptography - 22nd International Conference, 2024
Proceedings of the Security and Cryptography for Networks - 14th International Conference, 2024
Proceedings of the 15th Innovations in Theoretical Computer Science Conference, 2024
Proceedings of the Advances in Cryptology - EUROCRYPT 2024, 2024
Proceedings of the Advances in Cryptology - CRYPTO 2024, 2024
Proceedings of the Advances in Cryptology - CRYPTO 2024, 2024
Quantum Public-Key Encryption with Tamper-Resilient Public Keys from One-Way Functions.
Proceedings of the Advances in Cryptology - CRYPTO 2024, 2024
Proceedings of the Advances in Cryptology - CRYPTO 2024, 2024
Proceedings of the Advances in Cryptology - ASIACRYPT 2024, 2024
2023
Proceedings of the Theory of Cryptography - 21st International Conference, 2023
Proceedings of the 55th Annual ACM Symposium on Theory of Computing, 2023
Proceedings of the 14th Innovations in Theoretical Computer Science Conference, 2023
Proceedings of the 64th IEEE Annual Symposium on Foundations of Computer Science, 2023
From the Hardness of Detecting Superpositions to Cryptography: Quantum Public Key Encryption and Commitments.
Proceedings of the Advances in Cryptology - EUROCRYPT 2023, 2023
Proceedings of the Advances in Cryptology - EUROCRYPT 2023, 2023
2022
Bounded Functional Encryption for Turing Machines: Adaptive Security from General Assumptions.
Proceedings of the Theory of Cryptography - 20th International Conference, 2022
Proceedings of the 63rd IEEE Annual Symposium on Foundations of Computer Science, 2022
Proceedings of the Advances in Cryptology - CRYPTO 2022, 2022
Proceedings of the Advances in Cryptology - CRYPTO 2022, 2022
Post-quantum Simulatable Extraction with Minimal Assumptions: Black-Box and Constant-Round.
Proceedings of the Advances in Cryptology - CRYPTO 2022, 2022
Proceedings of the Advances in Cryptology - ASIACRYPT 2022, 2022
2021
J. Cryptol., 2021
IACR Cryptol. ePrint Arch., 2021
IACR Cryptol. ePrint Arch., 2021
Proceedings of the Theory of Cryptography - 19th International Conference, 2021
Proceedings of the 62nd IEEE Annual Symposium on Foundations of Computer Science, 2021
Proceedings of the Advances in Cryptology - EUROCRYPT 2021, 2021
Round-Optimal Blind Signatures in the Plain Model from Classical and Quantum Standard Assumptions.
Proceedings of the Advances in Cryptology - EUROCRYPT 2021, 2021
Proceedings of the Advances in Cryptology - CRYPTO 2021, 2021
Quantum Encryption with Certified Deletion, Revisited: Public Key, Attribute-Based, and Classical Communication.
Proceedings of the Advances in Cryptology - ASIACRYPT 2021, 2021
2020
Theor. Comput. Sci., 2020
IACR Cryptol. ePrint Arch., 2020
Proceedings of the Theory of Cryptography - 18th International Conference, 2020
Proceedings of the Theory of Cryptography - 18th International Conference, 2020
Proceedings of the Advances in Cryptology - EUROCRYPT 2020, 2020
Proceedings of the Advances in Cryptology - CRYPTO 2020, 2020
Proceedings of the Advances in Cryptology - ASIACRYPT 2020, 2020
Finding Collisions in a Quantum World: Quantum Black-Box Separation of Collision-Resistance and One-Wayness.
Proceedings of the Advances in Cryptology - ASIACRYPT 2020, 2020
2019
(Tightly) QCCA-Secure Key-Encapsulation Mechanism in the Quantum Random Oracle Model.
Proceedings of the Post-Quantum Cryptography - 10th International Conference, 2019
Leakage-Resilient Identity-Based Encryption in Bounded Retrieval Model with Nearly Optimal Leakage-Ratio.
Proceedings of the Public-Key Cryptography - PKC 2019, 2019
Proceedings of the Public-Key Cryptography - PKC 2019, 2019
Proceedings of the Advances in Cryptology - EUROCRYPT 2019, 2019
Adaptively Secure and Succinct Functional Encryption: Improving Security and Efficiency, Simultaneously.
Proceedings of the Advances in Cryptology - CRYPTO 2019, 2019
Proceedings of the Advances in Cryptology - CRYPTO 2019, 2019
Proceedings of the Advances in Cryptology - ASIACRYPT 2019, 2019
2018
IACR Cryptol. ePrint Arch., 2018
Proceedings of the Advances in Cryptology - EUROCRYPT 2018 - 37th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Tel Aviv, Israel, April 29, 2018
Proceedings of the Advances in Cryptology - CRYPTO 2018, 2018
Proceedings of the 5th ACM on ASIA Public-Key Cryptography Workshop, 2018
Proceedings of the Advances in Cryptology - ASIACRYPT 2018, 2018
2017
Partially Wildcarded Ciphertext-Policy Attribute-Based Encryption and Its Performance Evaluation.
IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 2017
2016
Efficient key encapsulation mechanisms with tight security reductions to standard assumptions in the two security models.
Secur. Commun. Networks, 2016
Adversary-Dependent Lossy Trapdoor Function from Hardness of Factoring Semi-smooth RSA Subgroup Moduli.
Proceedings of the Advances in Cryptology - CRYPTO 2016, 2016
Proceedings of the Information Security and Privacy - 21st Australasian Conference, 2016
2014
Chosen Ciphertext Security on Hard Membership Decision Groups: The Case of Semi-smooth Subgroups of Quadratic Residues.
Proceedings of the Security and Cryptography for Networks - 9th International Conference, 2014
Proceedings of the Provable Security - 8th International Conference, 2014
Self-bilinear Map on Unknown Order Groups from Indistinguishability Obfuscation and Its Applications.
Proceedings of the Advances in Cryptology - CRYPTO 2014, 2014
2013
Proceedings of the SECRYPT 2013, 2013
Proceedings of the Information Security, 16th International Conference, 2013
Efficient variants of the Naor-Yung and Dolev-Dwork-Naor transforms for CCA secure key encapsulation mechanism.
Proceedings of the first ACM workshop on Asia public-key cryptography, 2013
1998