Search

Your search keyword '"Yamakawa, Takashi"' showing total 679 results

Search Constraints

Start Over You searched for: Author "Yamakawa, Takashi" Remove constraint Author: "Yamakawa, Takashi"
679 results on '"Yamakawa, Takashi"'

Search Results

1. Anonymous Public-Key Quantum Money and Quantum Voting

2. Untelegraphable Encryption and its Applications

3. CountCrypt: Quantum Cryptography between QCMA and PP

4. A New World in the Depths of Microcrypt: Separating OWSGs and Quantum Money from QEFID

5. A Simple Framework for Secure Key Leasing

6. Cryptographic Characterization of Quantum Advantage

7. Quantum Unpredictability

8. Exponential Quantum One-Wayness and EFI Pairs

10. A Note on Output Length of One-Way State Generators and EFIs

11. Revocable Quantum Digital Signatures

12. Unconditionally Secure Commitments with Quantum Auxiliary Inputs

13. Robust Combiners and Universal Constructions for Quantum Cryptography

17. Quantum Complexity for Discrete Logarithms and Related Problems

18. Publicly Verifiable Deletion from Minimal Assumptions

19. Quantum Public-Key Encryption with Tamper-Resilient Public Keys from One-Way Functions

21. Classical vs Quantum Advice and Proofs under Classically-Accessible Oracle

22. Public Key Encryption with Secure Key Leasing

23. Obfuscation of Pseudo-Deterministic Quantum Circuits

24. Certified Everlasting Secure Collusion-Resistant Functional Encryption, and More

25. Quantum Advantage from One-Way Functions

27. Unconditionally Secure Commitments with Quantum Auxiliary Inputs

28. Quantum Complexity for Discrete Logarithms and Related Problems

29. Quantum Advantage from One-Way Functions

30. Certified Everlasting Secure Collusion-Resistant Functional Encryption, and More

31. From the Hardness of Detecting Superpositions to Cryptography: Quantum Public Key Encryption and Commitments

32. One-Wayness in Quantum Cryptography

33. Proofs of Quantumness from Trapdoor Permutations

34. Certified Everlasting Functional Encryption

35. A New Approach to Post-Quantum Non-Malleability

36. Verifiable Quantum Advantage without Structure

37. Quantum commitments and signatures without one-way functions

38. Post-Quantum Simulatable Extraction with Minimal Assumptions: Black-Box and Constant-Round

40. Certified Everlasting Zero-Knowledge Proof for QMA

41. A comprehensive functional form of the optimal harvest control rule for multiple fishery management objectives

42. Quantum Encryption with Certified Deletion, Revisited: Public Key, Attribute-Based, and Classical Communication

43. On the Impossibility of Post-Quantum Black-Box Zero-Knowledge in Constant Rounds

44. Classically Verifiable NIZK for QMA with Preprocessing

46. Verifiable Quantum Advantage without Structure.

47. A Black-Box Approach to Post-Quantum Zero-Knowledge in Constant Rounds

48. Secure Software Leasing from Standard Assumptions

50. Classical Verification of Quantum Computations with Efficient Verifier

Catalog

Books, media, physical & digital resources