Yamakawa, Shota
15  results:
Search for persons X
?
1

A study on parallel-arranged leaky wave antenna with dielec..:

, In: 2024 IEEE International Workshop on Antenna Technology (iWAT),
Yamakawa, Shota ; Yamanaka, Daisuke ; Kagaya, Osamu... - p. 150-152 , 2024
 
?
2

Public Key Encryption with Secure Key Leasing:

, In: Advances in Cryptology – EUROCRYPT 2023; Lecture Notes in Computer Science,
Agrawal, Shweta ; Kitagawa, Fuyuki ; Nishimaki, Ryo.. - p. 581-610 , 2023
 
?
3

Bounded Functional Encryption for Turing Machines: Adaptive..:

, In: Theory of Cryptography; Lecture Notes in Computer Science,
Agrawal, Shweta ; Kitagawa, Fuyuki ; Modi, Anuja... - p. 618-647 , 2022
 
?
4

Round-Optimal Blind Signatures in the Plain Model from Clas..:

, In: Lecture Notes in Computer Science; Advances in Cryptology – EUROCRYPT 2021,
 
?
5

Adaptively Secure Constrained Pseudorandom Functions in the..:

, In: Advances in Cryptology – CRYPTO 2020; Lecture Notes in Computer Science,
 
?
6

Adaptively Secure Inner Product Encryption from LWE:

, In: Advances in Cryptology – ASIACRYPT 2020; Lecture Notes in Computer Science,
 
?
7

Compact NIZKs from Standard Assumptions on Bilinear Maps:

, In: Advances in Cryptology – EUROCRYPT 2020; Lecture Notes in Computer Science,
 
?
8

Automated Image Presentation for Backhoe Embankment Constru..:

, In: 2020 IEEE/SICE International Symposium on System Integration (SII),
 
?
9

Adaptively Single-Key Secure Constrained PRFs for $$\mathrm..:

, In: Public-Key Cryptography – PKC 2019; Lecture Notes in Computer Science,
 
?
10

Estimation of Cone Index from Water Content and Soil Types ..:

, In: 2019 IEEE 8th Global Conference on Consumer Electronics (GCCE),
 
?
11

Designated Verifier/Prover and Preprocessing NIZKs from Dif..:

, In: Advances in Cryptology – EUROCRYPT 2019; Lecture Notes in Computer Science,
 
?
12

Exploring Constructions of Compact NIZKs from Various Assum..:

, In: Advances in Cryptology – CRYPTO 2019; Lecture Notes in Computer Science,
 
?
13

Constrained PRFs for $$\mathrm{NC}^1$$ in Traditional Group:

, In: Lecture Notes in Computer Science; Advances in Cryptology – CRYPTO 2018,
 
?
14

Tighter Security Proofs for GPV-IBE in the Quantum Random O..:

, In: Lecture Notes in Computer Science; Advances in Cryptology – ASIACRYPT 2018,
 
?
15

Efficient variants of the Naor-Yung and Dolev-Dwork-Naor tr..:

, In: Proceedings of the first ACM workshop on Asia public-key cryptography,
 
1-15