Author of the publication

Accelerating the Final Exponentiation in the Computation of the Tate Pairings.

, , and . IACR Cryptology ePrint Archive, (2012)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Invalid Curve Attacks in a GLS Setting., and . IWSEC, volume 9241 of Lecture Notes in Computer Science, page 41-55. Springer, (2015)A new approach to the discrete logarithm problem with auxiliary inputs., and . LMS J. Comput. Math., 19 (1): 1-15 (2016)Asymptotically Faster Multi-Key Homomorphic Encryption from Homomorphic Gadget Decomposition., , , , and . CCS, page 726-740. ACM, (2023)Frequency-domain analysis of discrete wavelet transform coefficients and their adaptive shrinkage for anti-aliasing., , , , , , , and . ICIP, page 1071-1074. IEEE, (2013)The Technical Program of IEEE GCCE 2013 Conference Reports., , , and . IEEE Consumer Electronics Magazine, 3 (1): 50-51 (2014)Extended Tower Number Field Sieve with Application to Finite Fields of Arbitrary Composite Extension Degree., and . IACR Cryptology ePrint Archive, (2016)A New Trapdoor over Module-NTRU Lattice and its Application to ID-based Encryption., , , and . IACR Cryptology ePrint Archive, (2019)Slice more? It leaks: Analysis on the paper Ön the Feasibility of Sliced Garbling".. IACR Cryptol. ePrint Arch., (2024)Accelerating the Final Exponentiation in the Computation of the Tate Pairings., , and . IACR Cryptology ePrint Archive, (2012)Extended Tower Number Field Sieve with Application to Finite Fields of Arbitrary Composite Extension Degree., and . Public Key Cryptography (1), volume 10174 of Lecture Notes in Computer Science, page 388-408. Springer, (2017)