Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Lattice-based homomorphic encryption of vector spaces., , and . ISIT, page 1858-1862. IEEE, (2008)An efficient probabilistic public-key cryptosystem over quadratic fields quotients.. Finite Fields Their Appl., 13 (3): 563-576 (2007)I want to ride my BICYCL: BICYCL Implements CryptographY in CLass groups., , , and . IACR Cryptol. ePrint Arch., (2022)What do DES S-boxes Say to Each Other ?, , and . IACR Cryptology ePrint Archive, (2003)Two Generic Constructions of Probabilistic Cryptosystems and Their Applications.. SCN, volume 5229 of Lecture Notes in Computer Science, page 92-108. Springer, (2008)Threshold Linearly Homomorphic Encryption on $Z/2^kZ$., , and . IACR Cryptol. ePrint Arch., (2022)Bandwidth-efficient threshold EC-DSA revisited: Online/Offline Extensions, Identifiable Aborts, Proactivity and Adaptive Security., , , , and . IACR Cryptol. ePrint Arch., (2021)Efficient CCA Timed Commitments in Class Groups., , , and . CCS, page 2663-2684. ACM, (2021)Threshold Linearly Homomorphic Encryption on bfZ/2kbfZ., , and . ASIACRYPT (2), volume 13792 of Lecture Notes in Computer Science, page 99-129. Springer, (2022)Bandwidth-efficient threshold EC-DSA revisited: Online/offline extensions, identifiable aborts proactive and adaptive security., , , , and . Theor. Comput. Sci., (2023)