Author of the publication

Lattice-based threshold-changeability for standard CRT secret-sharing schemes.

, , and . Finite Fields Their Appl., 12 (4): 653-680 (2006)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Cryptanalysis of WG-7 (A Lightweight Stream Cipher for RFID Encryption)., , and . IACR Cryptology ePrint Archive, (2011)Foxtail+: A Learning with Errors-based Authentication Protocol for Resource-Constrained Devices., , , , , , , , and . IACR Cryptology ePrint Archive, (2020)COSAC: COmpact and Scalable Arbitrary-Centered Discrete Gaussian Sampling over Integers., , and . PQCrypto, volume 12100 of Lecture Notes in Computer Science, page 284-303. Springer, (2020)Practical attack on NLM-MAC scheme., , and . Inf. Process. Lett., 114 (10): 547-550 (2014)Risk of Asynchronous Protocol Update: Attacks to Monero Protocols., , , and . ACISP, volume 11547 of Lecture Notes in Computer Science, page 307-321. Springer, (2019)Cryptanalysis of LASH., , , , , , and . FSE, volume 5086 of Lecture Notes in Computer Science, page 207-223. Springer, (2008)Fast and private multi-dimensional range search over encrypted data., , , , , and . Inf. Sci., (January 2024)PrivGenDB: Efficient and privacy-preserving query executions over encrypted SNP-Phenotype database., , , , , , and . CoRR, (2021)Security for Signcryption: The Multi-User Model., and . Practical Signcryption, Springer, (2010)Noisy Chinese remaindering in the Lee norm., and . J. Complex., 20 (2-3): 423-437 (2004)