Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

AGFSM: An new FSM based on adapted Gaussian membership in case retrieval model for customer-driven design., , , , and . Expert Syst. Appl., 38 (1): 894-905 (2011)Round2: KEM and PKE based on GLWR., , , , , , and . IACR Cryptology ePrint Archive, (2017)Modular lattice signatures, revisited., , , , and . IACR Cryptology ePrint Archive, (2019)Post-Quantum Verifiable Random Function from Symmetric Primitives in PoS Blockchain., , , , , , , and . IACR Cryptol. ePrint Arch., (2021)A signature scheme from the finite field isomorphism problem., , , and . J. Math. Cryptol., 14 (1): 39-54 (2020)Improving Class Activation Map for Weakly Supervised Object Localization., , and . ICASSP, page 2624-2628. IEEE, (2022)Shorter Messages and Faster Post-Quantum Encryption with Round5 on Cortex M., , , , , and . CARDIS, volume 11389 of Lecture Notes in Computer Science, page 95-110. Springer, (2018)Two-Stage Dual Augmentation with CLIP for Improved Text-to-Sketch Synthesis., and . MIPR, page 1-6. IEEE, (2023)Fully Homomorphic Encryption from the Finite Field Isomorphism Problem., , , , , , and . Public Key Cryptography (1), volume 10769 of Lecture Notes in Computer Science, page 125-155. Springer, (2018)Efficient Lattice-Based Zero-Knowledge Arguments with Standard Soundness: Construction and Applications., , , , , and . CRYPTO (1), volume 11692 of Lecture Notes in Computer Science, page 147-175. Springer, (2019)